EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

03.07.16

Links 7/3/2016: New Linux RC, Firefox in Devices

Posted in News Roundup at 8:22 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Maybe we could tone down the JavaScript

    I’m having a really weird browser issue, where scripts on some pages just won’t run until about 20 seconds have passed.

    Whatever you’re about to suggest, yes, I’ve thought of it, and no, it’s not the problem. I mention this not in the hope that someone will help me debug it, but because it’s made me acutely aware of a few… quirks… of frontend Web development.

    (No, really, do not try to diagnose this problem from one sentence, I have heard and tried almost everything you could imagine.)

  • Science

    • Remains of Anglo-Saxon island discovered in Lincolnshire village

      The remains of an Anglo-Saxon island have been uncovered in Lincolnshire in a significant find that has yielded an unusually wide array of artefacts.

      The island, once home to a Middle Saxon settlement, was found at Little Carlton near Louth, Lincolnshire, by archaeologists from the University of Sheffield after a discovery by a metal detectorist.

    • E-mail inventor Ray Tomlinson, who popularized @ symbol, dies at 74

      If you’ve ever sent an e-mail, you can thank Raymond Samuel Tomlinson for putting the @ symbol there.

      On Friday, Tomlinson died of suspected heart failure. He was 74.

      Tomlinson was born in Amsterdam, New York in 1941, and he earned a master’s degree from the Massachusetts Institute of Technology. In 1967, he joined Bolt Beranek and Newman (BBN), a company that played a key role in the development of the ARPANET, a precursor to the modern Internet.

      In 1971, according to the Internet Hall of Fame, he wrote the first ARPANET mail client, combining the existing SNDMSG and CPYNET programs. Tomlinson himself came up with the idea of using the @ symbol as a way to separate local e-mails from those that could be sent to external networks through the user@host syntax.

    • The Founder of Email, Ray Tomlinson, Dies

      Ray Tomlinson, the man credited with founding email, has passed away at the age of 74, according to a report from the Sydney Morning Herald. According to the report, Tomlinson died of a heart attack.

    • Email inventor Ray Tomlinson dies at 74

      Internet pioneer Ray Tomlinson, who is credited with the invention of email, has died at the age of 74.

      The US computer programmer came up with the idea of electronic messages that could be sent from one network to another in 1971.

      His invention included the ground-breaking use of the @ symbol in email addresses, which is now standard.

  • Hardware

    • An AMD ARM 64-bit Dev Board Is Launching For $299 USD

      Since last year we have been waiting for AMD to launch their “HuskyBoard” ARM development board built around their Opteron A1100 ARM 64-bit SoC. That board was originally supposed to ship in Q4’15 while now available for pre-order is a new A1100 development board that looks like it may be taking its place.

      AMD had been teasing their ARM development board for nearly one year and talked of it being a low-cost ARM development board that would be in compliance with the 96Boards’ Enterprise Edition specification.

  • Health/Nutrition

    • Post-Flint, Half Of Americans Are Worried About Their Tap Water Too

      Ahead of the Democratic debate in lead-poisoned Flint, Michigan on Sunday, a new poll shows that many Americans don’t trust the public water system.

      Only half the country is “very confident” that tap water is safe to drink. A third of respondents said they were “moderately confident,” while nearly one in five said they aren’t confident at all.

      More than half the respondents said that the water crisis in Flint — in which city water was contaminated with lead for 18 months, potentially causing longterm damage to thousands of children — was a sign of a widespread infrastructure problem in America.

    • ‘Raise The Wage, Clean Our Water’: Flint Residents Demand $15 Minimum Wage

      Tyrone Stitt has worked as a maintenance technician at Taco Bell for 18 years. He started at $3.25 an hour when he was 25 years old and today, despite the skyrocketing cost of living in Flint, he makes just $8.50 an hour. He says that amount is not enough to support himself and his family, let alone afford bottled water.

      “I’m breaking out in rashes and paying for water,” he told ThinkProgress as he marched across the University of Michigan campus in Flint among a group of protesters. “Increasing the minimum wage would help tremendously. It would make a tremendous difference in my life because I’d be able to pay my bills and provide for my family.”

    • Five Years After Fukushima, ‘No End in Sight’ to Ecological Fallout

      And U.S. nuclear regulatory agency comes under fire for ‘half-baked’ reforms that fail to improve public safety

  • Security

  • Defence/Police/Secrecy/Aggression

    • Killing Someone Else’s Beloved

      Yet Trump’s pledge to murder the civilian relatives of terrorists could be considered quite modest — and, in its bluntness, refreshingly candid — when compared to President Obama’s ongoing policy of loosing drones and U.S. Special Operations forces in the Greater Middle East. Those policies, the assassinations that go with them, and the “collateral damage” they regularly cause are based on one premise when it comes to the American public: that we will permanently suspend our capacity for grief and empathy when it comes to the dead (and the living) in distant countries.

    • ‘Obama could have stopped Syria’s suffering. And he didn’t do it’

      Michael Hayden, a former head of both the CIA and the NSA, tells Toby Harnden about righteous violence in the war on terror and the deep moral scar left by the president’s inaction over Assad

    • Bill Clinton neglect left NSA ‘brain dead’ as al Qaeda plotted 9/11 attacks

      Retired Air Force Gen. Michael V. Hayden, the NSA director at the time, describes the decline in a memoir, writing an insider’s view of an agency that the government at one time refused to acknowledge even existed.

    • You Will Obey Me — Trump to Military

      General Michael Hayden, former Central Intelligence Agency director, NSA director, and other experts have said that when you asked the US military to carry out some of your campaign promises, specifically targeting terrorists’ families, and also the use of interrogation methods more extreme than waterboarding, the military will refuse, because they’ve been trained to turn down and refuse illegal orders.

    • High-tech ‘bazooka’ fires a net to take down drones

      Could this bazooka-style device become a crucial weapon in law enforcement’s battle with drones?

      The brainchild of U.K.-based OpenWorks Engineering, SkyWall 100 uses a compressed air launcher to fire smart projectiles at targeted drones.

    • Syria: Phantom “Rebels” Return from the Dead

      The French colonial green, white, and black banner of Syria adapted by the West’s proxy “Free Syrian Army” (FSA) had long been forgotten in the sea of black banners held aloft by Washington and Riyadh’s more extreme ploy to gain leverage upon and more direct access to the battlefield.

      However, as Syrian forces backed by its regional allies and Russian airpower overwhelm these forces while building alliances with other factions, including the Kurds, the West’s entire regime change enterprise faces ignominious collapse.

      It appears that – having exhausted all other options – the West has decided to change as many of those black banners back to the “rebel” green, white, and black as possible, before the conflict draws to a close, giving the West the most favorable position achievable ahead of “peace talks.”

    • State Dept Staffs Syria Ceasefire Violations Hotline — With Non-Arabic Speakers

      telephone

      Is there a better way to ensure no troublesome violations of John Kerry’s signature ceasefire in Syria get reported than by staffing the hotline where violations are to be reported by Syrians with non-Arabic speakers?

      Gotta love those clever gals and guys over at the State Department. The Department is all a twitter, high-fiving each other and sending congratulatory emails to Secretary of State John Kerry over his negotiating a ceasefire in Syria. And, in order to monitor compliance with the terms of the ceasefire, State set up a hotline. Ordinary Syrians, out there on the ground, could call in to report violations.

  • Transparency Reporting

  • Environment/Energy/Wildlife

    • Meet Lucy Gavaghan, The Teen Who’s Trying To Make Tesco Stop Selling Eggs From Caged Hens

      A 14-year-old who is campaigning to stop Tesco from selling eggs from caged hens has rallied more than 88,000 people to support the cause, yet the supermarket giant has failed to change their policy.

      Lucy Gavaghan, from Sheffield, started a Change.org petition after writing letters to stores was not successful.

      “I thought that a petition may be able to create the impact needed to make a company like Tesco change their ways,” she told HuffPost UK. “I think that animal welfare and commercial treatment is a really important issue and I know that many others share this view.”

  • Finance

    • Another Phony Jobs Report

      The monthly payroll jobs reports have become a bad joke.
      No growth in real retail sales, but 55,000 retail trade new jobs in February.
      No growth in real consumer income, but 40,000 more waitresses and bartenders.
      86,000 new jobs in Education, health services, and social assistance. February is a strange month to be hiring new teachers. If February brought a quarter million new jobs, how come a big hike in social assistance jobs? Manufacturing lost 16,000 jobs.

    • The seven sins of the EU investment court

      European trade commissioner Cecilia Malmstroem and Canadian minister for trade Chrystia Freeland have confirmed that the EU-Canada CETA agreement will include far-reaching investor privileges.

      The investor-state dispute settlement (ISDS) clause in the deal is set to be based on EU proposals for an Investment Court System (ICS) that were announced last autumn following unprecedented public outcry. However, ICS is no new departure. Indeed, it is the same special rights for foreign investors come back from the dead.

      Plans for ISDS were among the most contentious parts of the proposed TTIP deal between the EU and US. Debate has been focused on the rights that corporations will acquire to challenge democratic decisions when they consider them a threat to their profits.

    • How Hillary Turned Her Support for Welfare for Banks into an Auto Bailout Attack

      For a campaign that has spent days insisting Bernie Sanders should not launch attacks against her, the Hillary Clinton campaign sure engaged in some dishonest hackery last night.

      During the debate in Flint, Hillary attacked Bernie for “vot[ing] against the money that ended up saving the auto industry.” She was talking about a January 15, 2009 attempt to withhold the second $350 billion of TARP funding that failed (here’s the resolution); Bernie voted not to release those funds. But the vote was not directly about auto bailout funding. It was about bailing out the banks and funding what turned out to be completely ineffective efforts to forestall foreclosures.

  • PR/AstroTurf/Lobbying

    • Explaining Donald Trump’s Dick

      Why did Donald Trump inexplicably defend the size of his penis in Thursday’s debate? Because he’s unnaturally sensitive about it? Because, as Jeet Heer suggests, it’s part of a venerable history of monarchs and presidents? Because Hillary Clinton would be the first penis-free president, so it’s a good way of contrasting himself?

    • Michael Bloomberg Will Not Enter Presidential Race

      Michael R. Bloomberg, who for months quietly laid the groundwork to run for president as an independent, will not enter the 2016 campaign, he said Monday, citing his fear that a three-way race could lead to the election of a candidate he thinks would endanger the country: Donald J. Trump.

      In a forceful condemnation of his fellow New Yorker, Mr. Bloomberg said Mr. Trump has run “the most divisive and demagogic presidential campaign I can remember, preying on people’s prejudices and fears.” He said he was alarmed by Mr. Trump’s threats to bar Muslim immigrants from entering the country and to initiate trade wars against China and Japan, and he was disturbed by Mr. Trump’s “feigning ignorance of white supremacists,” alluding to Mr. Trump’s initial refusal to disavow an endorsement from David Duke.

  • Censorship

  • Privacy

    • EFF Urges Sixth Circuit to Revisit Case Finding No Warrant Needed for Ten Weeks of Covert 24/7 Video Surveillance

      EFF joined NYU Law School’s Brennan Center for Justice, ACLU, National Association of Criminal Defense Lawyers, the Libertarian National Committee, and former Congressman Bob Barr in urging the Sixth Circuit Court of Appeals to revisit a recent opinion finding no reasonable expectation of privacy in 10 weeks of continuous, surreptitious video surveillance. The opinion sets a dangerous precedent that law enforcement officers in Kentucky, Ohio, Michigan, and Tennessee don’t need a warrant to film your every move in front of your house.

    • They Are Watching. Are You?

      Encouraged by millions of dollars in federal grants, local law enforcement agencies across the country are acquiring surveillance technologies at an alarmingly rapid rate. As more and more invasive technologies are created for the military and intelligence agencies, they trickle down to our increasingly militarized police forces. Often, local lawmakers and the public are not familiar with these systems and their dangers to civil liberties, and so public policy in response to surveillance lags behind.

    • French Parents Face Fines, Lawsuits And Prison For Posting Pictures Of Their Own Children Online

      As Techdirt reported recently, the controversial “right to be forgotten” — actually more of a right to be de-linked in search engines — is starting to spread around the world. But its spiritual home is definitely in Europe, where privacy concerns tend to outweigh other considerations, like freedom of speech, that are regarded as paramount elsewhere — in the US, for example. Leading the charge in the EU is France, which has been pushing Google to de-link items even more widely.

    • Verizon Strikes $1.35 Million Settlement With FCC Over Its Use Of Stealth ‘Zombie Cookies’

      Last year you’ll recall Verizon Wireless found itself in hot water after being caught modifying user packets to insert stealth tracking technology. By embedding each packet with a unique identifier traffic header, or X-UIDH. Verizon and its marketing partners were not only able to ignore user browser preferences and track their behavior around the Internet, they were then able to use this technology to build detailed user profiles. Verizon Wireless launched and operated the technology for two years before security researchers even noticed the program, and it required another six months of public pressure for Verizon to even offer an opt-out option.

      According to the FCC’s full press announcement (pdf), the fairly measly $1.35 million settlement doesn’t stop the program, which likely won’t please many privacy advocates. Verizon Wireless will however need to transparently notify users of the system and get their explicit opt-in (a rare dinosaur in online tracking rules) consent before sharing any of this data with third parties. The FCC is quick to highlight how Verizon previously proclaimed the technology couldn’t be abused by third parties to build detailed profiles of users — right before it was.

    • French Parliament Votes For Law That Would Put Tech Execs In Jail If They Don’t Decrypt Data

      Of course, this comes at the same time that basically the entire tech industry is rallying in support of Apple’s stance of refusing to hack into its own systems to remove security features and make it easier to decrypt data. And it’s coming right as the world was ridiculing Brazil for arresting (and then releasing) a Facebook exec for refusing to hand over data from subsidiary Whatsapp.

      This kind of move is so stupid on so many levels that it defies any kind of logic. It’s bad for security, because weak encryption puts us all at much greater risk than the threat of terrorists or criminals using encryption (in part, because this kind of thing won’t stop them from using secure encryption, and in part because those threats are very low probability risks). It’s also bad for the economy, because you’ve just given a ton of important tech companies every reason in the world to no longer operate in France due to such a ridiculous law that may put execs in jail. It’s bad for the public in that it will mean less secure services and devices that put them at risk, while also potentially cutting off more innovative and useful products and services.

      This is the kind of kneejerk reaction from people who are too ignorant and too scared to understand the actual technology and the actual issues at stake. Why do citizens in these countries continue to allow ignorant scared people to make such blatantly bad rules?

    • Book ‘Dark Territory’ chronicles how NSA hacked DoD command-control systems in four days

      In what was the first-ever high-level exercise testing the U.S. military’s ability to defend itself against a cyberattack, the NSA in 1997 hacked into the DoD’s entire network in just four days, using nothing but commercially available equipment and soft­ware, according to a new book by Pulitzer Prize-winning journalist Fred Kaplan.

    • GHCQ head calls for cooler heads amid Apple and FBI encryption feud
    • GCHQ boss calls for new relationship with tech firms over encryption
    • GCHQ boss: Tech firms should co-operate over encryption
    • GCHQ chief offers olive branch to technology firms in online privacy row
    • GCHQ losing cyberwar despite £860mn extra funding – spy chief

      Despite being handed hundreds of millions in taxpayers’ cash, British spooks are losing the cyberwar, a top GCHQ director has acknowledged.

      Alex Dewdney, who is head of the Communications Electronics Security Group (CESG) branch of GCHQ, told an audience in the US that UK intelligence is lagging behind.

    • GCHQ admits £1bn spend on cyber security ‘hasn’t worked’

      GCHQ is losing the cyber security war, according to director of cyber security at CESG (Communications-Electronics Security Group) Alex Dewedney, who admitted that, despite a £1bn spend over the past five years, “the bottom line is it hasn’t worked”.

      Speaking at the RSA security conference in San Francisco late last week, Dewedney also suggested a “more interventionist policy” may now be needed.

    • The Privacy Shield is Riddled with Surveillance Holes

      The European Commission and the U.S. Department of Commerce have finally announced the details of the EU-U.S. Privacy Shield, an agreement designed to ensure that personal data can flow between Europe and the U.S. for commercial purposes while maintaining the privacy rights Europeans have come to love and expect. Lawmakers in the U.S. and abroad were under intense pressure to produce some sort of agreement after the European Court of Justice (CJEU) dissolved the safe harbor agreement related to transatlantic data flows last October, leaving countless international tech firms in a lurch about how to handle data. The court decision and subsequent negotiation could have been a powerful motivator for the U.S. to clean up its surveillance policies. Instead, the patchwork of concessions in the Privacy Shield leaves the door open for the digital surveillance of hundreds of millions of Europeans.

      It’s unclear what, if anything, the new Privacy Shield is supposed to be shielding people from— except perhaps shielding U.S. companies from the inevitable consequences of their country’s mass surveillance program.

    • EFF and 46 Technology Experts Ask Court To Throw Out Unconstitutional Apple Order

      The Electronic Frontier Foundation (EFF) and 46 technology industry experts, including inventors of modern cryptography, told a federal court today that forcing Apple to write and sign computer code disabling crucial iPhone security features that protect millions of users violates the company’s free speech rights.

      The Federal Bureau of Investigation (FBI) should not be allowed to, in effect, stand over the shoulders of Apple programmers and force them to create and sign off on code that would decimate the iPhone’s security, EFF said. The signed code would send a clear message that it’s OK to undermine encryption that users rely on—a view the government endorses but Apple fiercely opposes. EFF made its arguments in a friend-of-the-court brief filed today in U.S. District Court for the Central District of California. The brief was signed by 46 technologists, security researchers, and cryptographers, including digital signature pioneers Martin Hellman and Ronald Rivest.

    • Inside “Eligible Receiver” [Ed: previous headline was "The NSA Hacked Into the U.S. Military by Digging Through Its Trash"]

      The task turned out to be appallingly easy. Many defense computers, it turned out, weren’t protected by passwords. Others were protected by the lamest passwords, like “password” or “ABCDE” or “12345.” In some cases, the Red Team snipped all of an office’s links except for a fax line, then flooded that line with call after call after call, shutting it down. In a few instances, NSA attachés—one inside the Pentagon, the other at a Pacific Com­mand facility in Hawaii—went dumpster diving, riffling through trash cans and dumpsters, looking for passwords. This trick, too, bore fruit.

    • IoT subscriber growth surpasses smartphone users’ in January

      The number of users subscribing to Internet-of-Things (IoT) services grew at a faster pace than those subscribing to smartphones in Korea on-month in January, data showed Sunday, on the back of the rising sales of wearable smart devices.

      According to data compiled by the Ministry of Science, ICT and Future Planning, the number of Koreans subscribing to IoT-related services shot up 83,577 in January from a month earlier, compared to the 70,097 new smartphone subscribers over the cited period.

    • Amazon Flip-Flop Lands Fire OS Back in Encryption Camp
    • After Backlash, Amazon Promises To Bring Back Encryption On Fire OS

      Just to close the loop on this one: just after the firestorm last week when Amazon was called out for removing device encryption from Fire OS 5 (at the very same time as its CTO was saying encryption is “mandatory” and the company signed on to a brief supporting Apple in the encryption fight, the company has admitted that it will restore encryption to Fire OS 5 “sometime in the spring.”

    • Amazon douses flames, vows to restore Fire OS fondleslab encryption

      Amazon has U-turned on its decision to remove filesystem encryption from Fire OS, which powers its Fire and Kindle slabs.

      We’ve been told that a version due out within the next month or two will return support for encrypting documents stored on the devices. This decision to restore the feature comes just days after it emerged that Amazon had axed the encryption from the latest build of its tablet operating system: Fire OS 5.

      Removing the crypto sparked outcry from furious Fire and Kindle owners as well as the wider tech world. Amazon appears to have taken notice.

    • How the FBI will lose its iPhone fight, thanks to ‘West Coast Law’

      The vast majority of it has centered on the rights and the wrongs, about the loss of privacy, and of the precedent that breaking one iPhone would create.

    • US to renegotiate rules on exporting “intrusion software”

      After nearly a year of protests from the information security industry, security researchers, and others, US officials have announced that they plan to re-negotiate regulations on the trade of tools related to “intrusion software.” While it’s potentially good news for information security, just how good the news is will depend largely on how much the Obama administration is willing to push back on the other 41 countries that are part of the agreement—especially after the US was key in getting regulations on intrusion software onto the table in the first place.

      The rules were negotiated through the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, an agreement governing the trade of weapons and technology that could be used for military purposes. Originally intended to prevent proliferation and build-up of weapons, the US and other Western nations pushed for operating system, software, and network exploits to be included in the Wassenaar protocol to prevent the use of commercial malware and hacking tools by repressive regimes against their own people for surveillance.

    • GCHQ: Spy chief admits UK agency losing cyberwar despite £860m funding boost

      A top director at UK spy agency, the Government Communications Headquarters (GCHQ) has admitted he was fighting a losing battle when it comes to cybersecurity – despite an £860m boost in government funding over the past five years.

      Alex Dewdney, director of cybersecurity at CESG which is the information security arm of GCHQ, was speaking during the recent RSA conference in San Francisco where he outlined some major problems encountered by cyber-experts tasked with protecting the UK from attack.

    • Eric Schmidt gets a job at the Pentagon

      Secretary of Defense Ashton Carton on Wednesday appointed Schmidt the head of a new Defense Innovation Advisory Board, which will help the Pentagon keep up with the latest Silicon Valley ideas and apply them at the Department of Defense.

    • Military hits snag in Silicon Valley recruitment

      The fight between the FBI and Apple over a locked iPhone is threatening to undermine the Pentagon’s attempt to recruit talent from Silicon Valley.

      Defense Secretary Ash Carter spent this week out West, meeting with tech executives and launching new cybersecurity initiatives that will rely on help from the Bay Area.

      But under the looming shadow of the FBI’s request that Apple help bypass the iPhone’s security measures, Carter also made a noticeable effort to send a signal to techies: We get you.

    • Ronald Reagan’s Viewing of 80’s Movie Classic ‘Wargames’ Set Basis for NSA Spying

      When Ronald Reagan saw it in a Joint Chiefs meeting, he asked chairman John Vessey to investigate whether it was Hollywood magic, or if American military systems could really be compromised by an industrious kid or a Soviet initiative. Vessey relayed his findings to President Reagan a week later: Not only was it possible, it was, in fact, becoming increasingly probable.

    • Please Write To MPs To Call For More Time To Debate Investigatory Powers Bill

      Last week, the UK government published a revised Investigatory Powers Bill, aka the Snooper’s Charter. Surprisingly, it took no notice of the the serious criticisms made by no less than three Parliamentary committees; indeed, in some respects, it has made the Bill even worse.

  • Civil Rights

    • Stop the global crackdown on academic freedom! Act now!

      A call for the global community of teachers and students to protest against this most dangerous trend by signing, translating and circulating this statement, and organising protest meetings in all universities.

    • The Fight to Keep Abortion Safe & Legal: A Special Report from Outside the U.S. Supreme Court

      The Supreme Court heard oral arguments Wednesday in the most significant abortion case in a generation. Abortion providers in Texas, led by Whole Woman’s Health, have challenged provisions of a sweeping anti-choice law passed by the Texas state Legislature in 2013 despite a people’s filibuster and an 11-hour stand by Texas state Senator Wendy Davis. The provisions at stake force abortion clinics to meet the standards of hospital-style surgery centers and require providers to obtain admitting privileges at a nearby hospital—a task many can’t achieve, in part due to anti-choice sentiment. Similar restrictions have been passed in multiple states. As the case was being argued inside the court, a few thousand people rallied outside in support of Whole Woman’s Health, including fellow abortion providers and women who have had abortions. Democracy Now!’s Amy Littlefield was at the rally and also spoke with the anti-choice protesters, who held a competing demonstration.

    • Don’t Say ‘Opposing Gay Rights’ When You Mean Discriminating Against Gays

      What you aren’t allowed to do—in some situations—is discriminate against LGBT people, and these bills are an effort to make it OK to do so. Discrimination has not generally been seen as a First Amendment–protected activity; if it had been, the civil rights movement would have been effectively stymied. But the organized homophobia movement is trying to rebrand discrimination as a kind of speech—hence the marketing of these pro-discrimination bills as “First Amendment Defense Acts.”

    • The Genesis of #HateHurts

      It is seemingly everywhere nowadays. It’s at the center of the conversation during this perpetual election season. It’s a focal point of the anti-refugee sentiment that is stretching across the Western world. It hangs over the interactions of everyday people, those Muslim and those perceived to be Muslim.

    • Louis C.K. Compares Donald Trump to Hitler: ‘He’s an Insane Bigot’

      Louis C.K. is the latest public figure to criticize Donald Trump, calling him an “insane bigot” and comparing him to Adolf Hitler.

      In a Saturday morning email blast announcing the sixth episode of his web series “Horace and Pete,” C.K. included a lengthy postscript urging readers not to vote for Trump.

      “Please stop it with voting for Trump,” C.K. writes. “It was funny for a little while. But the guy is Hitler. And by that I mean that we are being Germany in the ’30s. Do you think they saw the sh-t coming? Hitler was just some hilarious and refreshing dude with a weird comb over who would say anything at all.”

    • Abuse Of Power: Laws Should Be Designed As If The People We Distrust The Most Are In Power

      There have been a few stories lately that have all combined to make a few key points crystallize in my mind, concerning various legal powers and the way that some people view them. It starts with an excellent article from Trevor Timm in which the title lays out the issue: Imagine Obama’s national security policies in Trump’s hands. After all, this is the guy who hasn’t been shy in promising to settle scores if he’s elected.

    • New Film Delves Into FBI Arrests of Youths for Terrorism Crimes They Might Commit

      IN AN EARLY SCENE from the HBO documentary Homegrown, an FBI agent describes his angst while tracking a teenager’s engagement in the online jihadi world. “You almost want to pick up the phone and say, ‘Son, don’t do this,’” the agent reflects. The teenager in question was Shifa Sadequee, a 19-year-old who was arrested on terrorism charges in 2006. Following a 2009 trial in which Sadequee represented himself, he was sentenced to 17 years in prison plus an additional 30 years of supervision.

      The ethical issues involved in preventive counterterrorism cases like Sadequee’s are the theme behind much of Homegrown. Following 9/11, law enforcement agencies were given a mandate to halt terrorist acts before they occurred, rather than investigate crimes after the fact. This directive inevitably gave rise to some disturbing ethical questions. When is it acceptable to arrest someone for a crime they haven’t actually committed, but you think they might commit in the future? At what point do a teenager’s online postings turn into a terrorism offense?

    • Donald Trump, America’s Own Silvio Berlusconi

      AS A WRITER who has covered Silvio Berlusconi since he became Italy’s prime minister in 1994, it has been difficult not to be overcome with a powerful sense of déjà vu all over again watching the presidential campaign of Donald Trump.

    • Texas’ Annual Roundup of the Working Poor

      The Great Texas Warrant Roundup is an annual statewide collaboration of courts and law enforcement agencies. Their goal is to collect payment of overdue fines and fees from Texans who have outstanding warrants for unpaid traffic tickets and to arrest and jail those who can’t pay. What little press is dedicated to the Roundup focuses on praising cities for the so-called “amnesty” period that precedes it.

  • DRM

    • DRM Is Evil, Part 8,492: Nook Pulls Out Of UK, Exploring Options To Let People Retain Access To At Least Some Books

      Yet another story of how badly DRM screws over legitimate buyers, with no actual benefit for copyright holders. This time, it’s about the total failure of Barnes & Noble’s Nook ebook reader, which is struggling globally, and shutting down entirely in the UK. Nate Hoffelder has a great article explaining why the Nook has been such an abject failure, but a key point highlighted by the Register is that the company is still working to see if there are ways that legitimate buyers can keep access to at least some of the books they purchased.

    • Supreme Court Refuses To Hear Apple’s Appeal In eBook Price Fixing Case

      This isn’t a huge surprise, but this morning the Supreme Court refused to hear Apple’s appeal of its loss in the case brought by the Justice Department for engaging in price fixing on ebooks with the big book publishers. During the course of the case and appeals, Apple worked out a settlement, agreeing to pay $450 million — but only after the appeals process was exhausted. And, that’s now happened. As with basically all appeals rejected by the Supreme Court, the court gave no reason. It just denied cert.

  • Intellectual Monopolies

    • Findings of EU Project On Conservation Of Genetic Resources Due Out In June

      The findings, conclusions and preliminary recommendations of a European Commission initiative on the conservation and sustainable use of genetic diversity are to be presented in June, the Commission has announced.

      The “Preparatory action on EU [European Union] plant and animal genetic resources in agriculture” followed an initiative tabled by the European Parliament, and was launched in July 2014 for a period of two years, according to the commission.

      The EU Biodiversity Strategy to 2020 [pdf] includes an action to conserve Europe’s agricultural genetic diversity. The preparatory action is meant to support the EU “in recognizing the potentials for added value in the field of conservation and sustainable use of agricultural genetic resources,” according to the preparatory action webpage.

    • Copyrights

      • The Donald Sends Cease And Desist Threat To Band Over The Use Of His Name In Music And Video

        So, the political season is really starting to ramp up now, which means the insanity ramps up along with it. This particular go around in presidential politics has been particularly absurd, causing even those of us that try to view it all through the prism of entertainment to be more than a little frightened. Still, there can be no doubt that there has been an uptick in the engagement level of the American people, including from musical artists looking to provide commentary on American politics. Take this song and video released by music duo Fight Clvb, for instance. It’s called Donald Trump and it is massively NSFW.

      • Foreign Copyright Holders Could More Actively Protect IP In Russia

        Russia is continuing to strengthen its national legislation in the field of intellectual property, through the provision of means for foreign copyright holders to more actively protect their intellectual property in Russia and the elimination of bureaucratic hurdles, according to official sources.

        This is taking place as part of the ongoing reform of the national IP policy.

        On 15 February, the scope of the Russian anti-piracy law was significantly expanded, through the inclusion of all copyrighted works (music, books, inventions) and related rights in the subject of protection. This provided an opportunity to foreign rights holders to better protect their IP in Russia.

      • “Kanye Bay” — Kanye West Now Gets His Own Pirate Bay Proxy

        Responding to the latest screenshot that suggested that Kanye West was pirating some music software, the Pirate Bay offered him a dedicated “Kanye Bay” proxy.

      • Apple is Running BitTorrent Trackers in Cupertino

        Apple is not known for being friendly towards BitTorrent software in its App Store but it appears the technology giant isn’t averse to using the technology itself. In fact, according to data provided by “Internet of things” search engine Shodan, Apple is running BitTorrent trackers from dozens of IP addresses in Cupertino.

      • BitTorrent Hater Apple Is Running BitTorrent Trackers At Its Headquarters

        Shodan, the IoT Search engine, has come up with proof that Apple was running BitTorrent trackers in their Cupertino office.

03.06.16

Links 6/3/2016: KDE Sprint at CERN, Collabora Office 5.0

Posted in News Roundup at 10:39 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • ReactOS Participation in Google Summer of Code 2016
  • ReactOS: Building a Free-Licensed Windows

    From dual-booting to WINE, free software has always struggled to provide a solution for running Windows applications. However, few of these efforts have been more ambitious than ReactOS, a free-licensed implementation of Windows. The project has been at work since 2006 and, in February 2016, ReactOS finally released its first alpha version, after a decade of difficult and necessarily cautious development.

  • ReactOS Gains Btrfs File-System Support

    ReactOS, the project aiming for binary compatibility with Microsoft Windows (Server 2003), now has Btrfs file-system support.

    While there’s just a primitive Btrfs driver for Windows, ReactOS has already gained native Btrfs file-system support.

  • MAME is now Free and Open Source Software

    After 19 years, MAME is now available under an OSI-compliant and FSF-approved license! Many thanks to all of the contributors who helped this to go as smoothly as possible!

    We have spent the last 10 months trying to contact all people that contributed to MAME as developers and external contributors and get information about desired license. We had limited choice to 3 that people already had dual-license MAME code with.

  • 10 months later, MAME finishes its transition to open source

    Almost a year after the folks who maintain the Multiple Arcade Machine Emulator or (MAME) said they would make the project completely open source, they’ve declared the transition a success.

    MAME is seen by many developers to be the foremost emulator of arcade games, and while MAME source code has long been freely available for use, it hasn’t technically been open source.

  • MAME is now free as well as free of charge

    MAME, the arcade emulator originally created by Nicola Salmora 19 years ago, is now comprised entirely of free and open-source software. It’s taken a lot of wrangling, reports MAMEDev.org, due to the large number of contributors and interlinked components.

  • After 19 Years, MAME Goes Open Source

    The MAME Team has announced that after 19 years – MAME (Multiple Arcade Machine Emulator) has gone open source.

    The arcade emulator is now available under an OSI-compliant and FSF-approved license. This means the source code for the long-running emulator is readily available to fans – you’ll now be able to modify, utilize, and distribute it for a variety of purposes.

  • Machine Learning for Hackers with Debian and Ubuntu

    Data Science and Machine Learning are hot topics at the moment. Many people are considering how to extend their skills into these areas and many solutions have appeared, including full online degrees, free online courses combined with free software and for those who prefer hard copy, a staggering choice of books on the topic.

  • Machine Learning and Open Source: What You Need to Know Now

    The basic goal with most machine learning tools is to take a vast quantity of data and reduce it to manageable, actionable insights. Now, some of the biggest tech companies are putting the tools in place to let the community advance these efforts. Expect much more in this space as 2016 continues.

  • Serro unveils new open source SDN framework, AuSM

    Serro Solutions, a San Francisco-based technology services firm, has made its new SDN framework open source. Automated Service Manager, or AuSM, is aimed at connecting network tools via API. AuSM creates a single platform from which users can write unified business policies and implement them consistently across data center networks, WANs and storage systems.

  • The One thing you can do to Ensure Success in Open Source Deployments

    What is it about an Open source project that gets business excited? and more importantly, is – ROI- under the hype?

    The primary reason most enterprises focus on Open source solutions is the potential cost savings. This is followed closely by the abilityto fix or modify the technology to something specific for the business, without having to wait for enterprise software updates. Thereare more Open source middleware products, such as Infrastructure-as-a-Service (IaaS) offerings and application development frameworks, with the ability to change out an underlying, closed source vendor.

  • HFOSS: Quiz #1

    In the Humanitarian Free and Open Source Software Development (HFOSS) course at the Rochester Institute of Technology, quizzes are in the form of blog posts submitted during the class period. The room stays quiet, but it is an open IRC quiz, so many of the students collaborated with each other in #rit-foss on freenode for the quiz.

  • VoIP Supply Bolsters its PBX Appliances via Three Open-Source Models
  • NFV/SDN Reality Check: DDoS attack security for NFV- and SDN-powered networks – Episode 49
  • DDoS attack security for NFV- and SDN-powered networks
  • OPNFV Unveils Second Release of Open-Source NFV Platform

    “Brahmaputra” brings a range of new features that come from collaboration with other projects, including OpenDaylight and OpenStack.

    The industry consortium developing an open-source platform for network-functions virtualization is unveiling the second release of its software, which not only brings an array of new features and use cases but also is an indication of the growing maturity of the group.

  • Web Browsers

    • Chrome

      • Chrome 49 released to stable channel, smooth scrolling now enabled by default
      • Taint Tracking for Chromium

        For future work in the Web context, the approach presented here can be made compatible with server-side taint tracking to persist taint information beyond the lifetime of a Web page. A server-side Web application could transmit taint information for the strings it sends so that the client could mark those strings as tainted. Following that idea it should be possible to defeat other types of XSS. Other areas of work are the representation of information about the data flows in order to help developers to secure their applications. We already receive a report in the form of structured information about the blocked code generation. If that information was enriched and presented in an appealing way, application developers could use that to understand why their application is vulnerable and when it is secure. In a similar vein, witness inputs need to be generated for a malicious data flow in order to assert that code is vulnerable. If these witness inputs were generated live while browsing a Web site, a developer could more easily assess the severity and address the issues arising from DOM-based XSS.

    • Mozilla

      • Introducing the WebVR 1.0 API Proposal

        2016 is shaping up to be a banner year for Virtual Reality. Many consumer VR products will finally be available and many top software companies are ramping up to support these new devices. The new medium has also driven demand for web-enabled support from browser vendors. Growth in WebVR has centered on incredible viewing experiences and the tools used to create online VR content.

      • Mozilla Jumps On IoT Bandwagon

        Mozilla has been clarifying some of its plans to convert the Firefox OS project into four IoT based projects. At a casual glance this seems like a naive move that is doomed to failure.

  • SaaS/Big Data

  • Oracle/Java/LibreOffice

    • Collabora Office 5.0 Release
    • Bruce Byfield Interview: Designing With LibreOffice

      Our colleague Bruce has a book coming out! It’s called Designing with LibreOffice. It tackles the subject of how to make documents look good and professional, while taking advantage of all the design features LibreOffice has to offer. So I got together with Bruce and we talked about his book, LibreOffice, design, and the eternal struggle of documenting Open Source projects.

    • Collabora Office 5.0 Released As Its LibreOffice Enterprise Flavor

      The folks at Collabora have released version 5.0 of Collabora Office, their downstream distribution of LibreOffice.

      Collabora Office 5.0 pulls in features from upstream LibreOffice 5.0 as well as some backported features from LibreOffice 5.1. Collabora Office 5.0 features improvements to the Microsoft filters, UI enhancements, remote file open/save support, security fixes, and much more.

    • Losing the Art of Wiki

      The past few months I read here and there around the LibreOffice community complaints about our wiki. According to these sources, our wiki is unusable, chaotic and poorly maintained. As we have a full time team dedicated to infrastructure management I am pretty sure that last criticism is unjustified to a large extent at least, but it also dawned on me that very few people around the LibreOffice project or any other community, for that matter, hail wikis as their most important tool or platform. Obviously, we are no longer in 2007. But what’s happening here is interesting, because it seems that people may have actually forgotten about the basic reasons wikis are around.

    • How To Cite PDF & Make Bibliography with Zotero & LibreOffice
    • How to create list for LibreOffice Calc cell
  • Pseudo-/Semi-Open Source (Openwashing)

  • BSD

    • FreeBSD 10.3-RC1 Brings Security Fixes, Hyper-V Tweaks

      FreeBSD 10.3-RC1 was released today as the newest development milestone leading up to FreeBSD 10.3 that should be officially released later this month.

      FreeBSD 10.3-RC1 has a number of OpenSSL security fixes, Hyper-V driver changes, regression fixes, and other bug fixes.

    • Pre-orders for 5.9 are up!

      OpenBSD 5.9 is shaping up to be quite a big release, and pre-orders for the CD sets have just been activated.

  • Public Services/Government

    • Helsinki region utilities turn to open source

      Helsinki Region Environmental Services Authority (HSY) is turning to open source software solutions for its web applications and other online services. The first open source-based service to go live is the one for water metering. Others will follow soon, says Risto Sipilä, who works for Cybercom, an IT consultancy contracted by HSY to help build the services.

    • Basque open source sector almost doubles

      The revenue and number of IT workers employed by open source service providers in the Basque Country has nearly doubled in 2015, according to figures published by a regional trade group for the sector, ESLE. The combined 2015 revenue of the nearly 40 companies that ESLE represents is 58 million compared to 31 million the year before. The number of workers grew by 413 new staff members. Altogether, ESLE members now employ 1033 people.

  • Licensing

  • Openness/Sharing

    • Open Source on another level

      BrewDog, a UK brewery which soon celebrates its tenth anniversary, has decided to “open source” all of their 215 beer recipes. From their original and still extremely popular (and tasty) beer “PUNK IPA“, moving on to “Hops Kill Nazis“, “Doodlebug” and finally arriving at their latest “Jet Black Heart” which was first brewed last month (!)

    • Raspberry Pi 3, Linux Mint security breach, Google data processing for the Zika virus, and more
    • This Open Source Script Lets You (and Police) Search Twitter For Guns

      It’s now possible to do both of these things, thanks to a free, open-source tool designed by security researcher Justin Seitz as a part of his larger open-source intelligence project.

    • Open Access/Content

    • Open Hardware

      • First Open Source GPU Could Change Future of Computing

        Nyami is significant in the research, computing and open source communities because it marks the first time open source has been used to design a GPU, as well as the first time a research team was able to test how different hardware and software configurations affect GPU performance. The results of the experiments the researchers performed are now part of the open source community, and that work will help others follow in the original research team’s footsteps. According to Timothy Miller, a computer science assistant professor at Binghamton, as others create their own GPUs using open source, it will push computing power to the next level.

      • We are happy to share our FREE and OPEN-SOURCE microprocessor system PULPino!

        Not a toy design: PULPino is a mature design: it has been taped-out as an ASIC in UMC 65nm in January 2016. The PULPino platform is available for RTL simulation as well for FPGA mapping. It has full debug support on all targets. In addition we support extended profiling with source code annotated execution times through KCacheGrind in RTL simulations.

        And it is free, no registration, no strings attached, you can use it, change it, adapt it, add to your own chip, use it for classes, research, projects, products… We just ask you to acknowledge the source, and if possible, let us know what you like and what you like and don’t like.

      • Wiring was Arduino before Arduino

        Hernando Barragán is the grandfather of Arduino of whom you’ve never heard. And after years now of being basically silent on the issue of attribution, he’s decided to get some of his grudges off his chest and clear the air around Wiring and Arduino. It’s a long read, and at times a little bitter, but if you’ve been following the development of the Arduino vs Arduino debacle, it’s an important piece in the puzzle.

Leftovers

03.04.16

Links 4/3/2016: Linux 4.4.4, KDE Outreach Program

Posted in News Roundup at 7:36 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open Source Accounting Software for Small Business

    You can choose from dozens of excellent open source accounting programs for everything from simple basic ledger bookkeeping to invoicing, inventory tracking, point of sale, payroll, taxes, and reporting and forecasting, and this roundup highlights five of the best.

    The main thing to remember about small business accounting software is that it’s not magic. It doesn’t turn you into an accountant any more than owning a hardware store turns you into a carpenter, electrician, or plumber. You still need to know the fundamental principles of accounting and bookkeeping.

  • Image processing at NASA with open source tools

    This past summer, I was an intern at the GVIS Lab at NASA Glenn, where I brought my passion for open source into the lab. My task was to improve our lab’s contributions to an open source fluid flow dynamics simulation developed by Dan Schroeder. The original simulation presents obstacles that users can draw in with their mouse to model computational fluid dynamics. My team contributed by adding image processing code that analyzes each frame of a live video feed to show how a physical object interacts with a fluid. But, there was more for us to do.

  • Borg, Omega, and Kubernetes

    Though widespread interest in software containers is a relatively recent phenomenon, at Google we have been managing Linux containers at scale for more than ten years and built three different container-management systems in that time. Each system was heavily influenced by its predecessors, even though they were developed for different reasons. This article describes the lessons we’ve learned from developing and operating them.

  • Events

  • Web Browsers

    • Mozilla

      • Mozilla unveils Firefox OS based IoT projects

        Mozilla announced four Firefox OS to Connected Devices projects, including a home automation system, an AI agent, a voice interface, and a “SensorWeb.”

        In December, when Mozilla announced a halt to development and sales of its open source, Linux-based Firefox OS mobile distribution, the company said it was already shifting the HTML5-focused open source Linux OS to Internet of Things projects. A month ago, Ari Jaaksi, Mozilla’s SVP of Connected Devices posted a blog entry noting progress on projects such as its Vaani voice interface. Jaaksi has now revealed more details on Vaani and three other projects, and invited open source developers to pitch in.

  • SaaS/Big Data

    • Hortonworks Launches New Stack Components, and Updates its Release Cycle

      On the heels of its introduction as a hot publlic company back in 2015, Hortonworks, which focuses on the open source Big Data platform Hadoop, has steadily expanded and adjusted the focus of its technology stack. Now it is serving up new adjustments. Hortonworks DataFlow (HDF), Hortonworks’ streaming data package, based on Apache NiFi, now includes Apache Storm and Apache Kafka.

      If you’re unfamiliar with Apache NiFi, it is built around Niagarafiles, which is software that the NSA created to aggregate sensor data on the right systems and generate analytics from the data. Onyara will give Hortonworks an important play as the Internet of Things shapes up.

  • Databases

    • Tune Up Your Databases!

      My last full-time job was manager of a university’s database department. Ironically, I know very, very little about databases themselves.

  • Oracle/Java/LibreOffice

    • Google, Oracle setting up jurors to fail in API copyright retrial, judge says

      One of the tech sector’s biggest upcoming trials—Oracle v. Google—careened Tuesday away from the hot-button topic of copyrighting application programming interfaces (APIs) and instead focused on the presiding judge’s concern that the tech giants are setting up jurors to fail. US District Judge William Alsup believes it’s all so the loser could challenge the verdict of the second upcoming trial set for May.

      Judge Alsup said Tuesday that the tech giants jointly submitted a proposed questionnaire (PDF) for prospective panelists containing “so many vague questions” that “the loser on our eventual verdict will seek, if history is any guide, to impeach the verdict by investigating the jury to find some ‘lie’ or omission during voir dire.”

    • Oracle’s JET JavaScript toolkit flies the open source skies

      When it comes to JavaScript, Oracle is not the first name that comes to mind. But the company this week is staking a bigger claim in Web development with the open source release of Oracle JET (JavaScript Extension Toolkit) 2.0.0.

      “The aim of Oracle JET is to provide a stable basis for intermediate to advanced JavaScript developers to efficiently visualize data in the cloud,” said Geertjan Wielenga, principal product manager in the Oracle tools group, in a blog post. Oracle has used JET to develop its own cloud applications during the past three years.

  • Pseudo-/Semi-Open Source (Openwashing)

  • Funding

  • BSD

    • FreeBSD 10.3: Third Beta Available

      That personal tidbit aside, another important part of March — especially this month — is that on the road to FreeBSD 11 sometime later this year, FreeBSD 10.3 is well along the way, with the third beta already available, according to a very detailed post by Marius Strobl on the FreeBSD Stable mailing list.

      To summarize, installations for FreeBSD 10.3 Beta3 are now available for amd64, i386, ia64, PowerPC, Sparc and a variety of ARM processors. Checksums, too numerous to list here, can be found in Strobl’s original post, linked in the paragraph above.

    • LLVM Clang’s OpenMP 4.x Support Continues Maturing

      With LLVM Clang 3.7 came full support for OpenMP 3.1 at long last but with OpenMP 4.5 being the latest spec, Intel and others involved with the Clang OpenMP initiative haven’t let up and continue working towards supporting the latest OpenMP 4.x interfaces.

    • OpenBSD 5.9 network improvements

      There are no doubt many eyes on OpenBSD’s continuing network SMP renovation.

  • FSF/FSFE/GNU/SFLC

    • Foundation of Guix Europe

      I have a pleasant announcement to make! On February 11, 2016, we have started a non-profit around the GNU Guix project, „Guix Europe“, and celebrated comme il faut with a bottle of champagne. Precisely, it is an „Association loi 1901“, named after the venerable French law first passed in 1901 (but many times amended since then).

    • GnuTLS 3.4.10

      Released GnuTLS 3.4.10 a bug fix release of the current stable branch.

  • Openness/Sharing

  • Programming

    • IDE For Python Programming

      Programmers need some tools to writing application and scripts with them, one of the most important tool for programming is a good IDE (integrated development environment). there are different IDEs that you can use such as Pycharm, Spyder, vim, Emacs, Eclipse and ETC.

Leftovers

  • Reports Coming in of Big IBM Layoffs Underway in the U.S.

    Last week, IBM reported to investors that its workforce at the end of 2015 was almost as big as its workforce at the end of 2014 (within less than 1 percent), in spite of a year in which 70,000 employees left the company, to be replaced with new hires and acquisitions.

    By the end of this week, the picture may look quite different. Today reports are coming in that big layoffs across the United States are underway, likely one-third of the U.S. workforce, according to one soon-to-be-laid-off IBMer. (At the end of 2015, IBM had approximately 378,000 employees worldwide; it no longer breaks out numbers for individual countries.) Such reports used to be gathered by the Endicott Alliance, a union organizing effort that closed its doors last year. Now they are being collected by an informal Facebook group, “WatchingIBM,” that was started by former members of that organization.

  • Science

  • Security

    • Security advisories for Thursday
    • State Department Backs Off Criminalizing Security Research Tools

      Some good news for security researchers: the US government’s adoption of the Wassenaar Arrangement will no longer treat the tools of security research like crates of machine guns. While exploits and penetration tools can be used by bad people for bad things, they’re also invaluable to security researchers who use these to make the computing world a safer place.

      Vague wording in the US government’s proposed adoption of the 2013 version of the Wassenaar Arrangement threatened to criminalize the development of security research tools and make any researcher traveling out of the country with a laptop full of exploits an exporter of forbidden weapons.

    • IRS Tool Designed To Protect Identity Theft Victims — Exposes Users To Identity Theft

      Last year, the personal records of 100,000 taxpayers wound up in the hands of criminals, thanks to a flimsy authentication process in the agency’s “Get Transcript” application. In short, the IRS used all-too-common static identifiers to verify taxpayer identity (information that could be found anywhere), allowing criminals to use the system to then obtain notably more sensitive taxpayer information and ultimately steal finances. At the time, the IRS breathlessly insisted it would be shoring up its security standards, though it failed to really detail how it would accomplish this.

    • 1Password sends your password across the loopback interface in clear text

      1Password sends your password in clear text across the loopback interface if you use the browser extensions.

    • Bruce Schneier: We’re sleepwalking towards digital disaster and are too dumb to stop

      Security guru Bruce Schneier has issued a stark warning to the RSA 2016 conference – get smart or face a whole world of trouble.

      The level of interconnectedness of the world’s technology is increasing daily, he said, and is becoming a world-sized web – which he acknowledged was a horrible term – made up of sensors, distributed computers, cloud systems, mobile, and autonomous data processing units. And no one is quite sure where it is all heading.

    • Latest attack against TLS shows the pitfalls of intentionally weakening encryption
  • Defence/Police/Secrecy/Aggression

    • Iran Joins The Using Video Game Footage To Pump Up Your Own Military’s Reputation Arms Race

      I suppose this was inevitable. As video games become more refined as an artform and as those games evince more realistic graphics, animations, and all the rest, I suppose it had to be that some folks out there would try to pass game footage off as real footage depicting their own power. I just never really thought it would be established nations that otherwise purport to be players on the world stage doing this. Yet, as we have seen done by Egypt, North Korea, and even Russia in the past, so too do we now find that Iran is trying to brag about its own military capability using game footage.

    • Debunked: The ace Hezbollah sniper…is from a video game

      Iran’s state television has been running impressive footage claiming to show ace Hezbollah fighters picking off fighters from the Islamic State group (IS) one-by-one with clear, cold precision. But here’s the thing: this video looks just like a scene from a video game. And it is…

    • Brave Afghan Forces Kill Inside Hospital, for Freedom

      Apparently a new feature of the modern war of terror is the shameless, blameless, overt targeting of hospitals, doctors and bed-ridden patients, all without the means of even modest self-defense.

    • ‘The Sense That Everybody Thought They Had WMDs Is a Total Fantasy’

      The Iraq invasion is a good example of Faulkner’s line about the past not even being past. Claims about the lead-up to the calamitous 2003 attack, who believed what and when, and even claims about the war’s impact on the course of Iraq and US history resurface repeatedly in US political discourse, including in the 2016 presidential election.

  • Environment/Energy/Wildlife

    • UK weather: Leeds Bradford Airport closes as snow hits parts of Britain

      Parts of Britain could see almost four inches of snow on Friday, with flights delayed and motorists warned of treacherous driving conditions, as March continues to feel more like winter than spring.

      Ploughs were used to clear the runway at Leeds Bradford Airport, in West Yorkshire, which was forced to close after northern England was hit with snow showers overnight.

      Met Office weather warnings are in place for Northern Ireland, north Wales, northern and western England as well as Scotland as a cold frontal system continues to make its way in from the Atlantic.

  • Finance

    • Bitcoin’s nightmare scenario has come to pass

      Over the last year and a half a number of prominent voices in the Bitcoin community have been warning that the system needed to make fundamental changes to its core software code to avoid being overwhelmed by the continued growth of Bitcoin transactions. There was strong disagreement within the community, however, about how to solve this problem, or if the problem would ever materialize.

    • Comcast Nabs Huge Oregon Tax Break Thanks To Loophole Intended For Google Fiber

      For a few years now, the city of Portland and the state of Oregon have been jumping through hoops to try and make Portland as attractive as possible for Google Fiber. That has involved rewriting city ordinances so that Google can place its utility cabinets along public rights of way, something previously banned in the city.

  • PR/AstroTurf/Lobbying

    • The New Mind Control

      The internet has spawned subtle forms of influence that can flip elections and manipulate everything we say, think and do.

    • Sandy Hook Puzzles

      Perhaps the most unusual feature of the Sandy Hook story is the large number of photographs that have been released in order to document the story. It is as if there is no event without the proof supplied by the photographs. This is unusual. When, for example, the FBI murdered approximately 100 men, women and children in the Branch Davidian compound in Waco, Texas, the reality of the victims did not have to be established with a large number of photos establishing that the victims were real people with real families. When workers “go postal” and shoot their coworkers, photos are not used to prove that those killed were real people with real families. When an airplane crashes, the event does not have to be verified with news coverage of grieving relatives.

    • Talking About Racism May Be Destructive to Cable Relationships–Unlike Domestic Violence Charges

      fter four years, MSNBC cancelled the talkshow of African-American writer and political scientist Melissa Harris-Perry. The cable news network had repeatedly pre-empted her weekend morning show, and in response to questions about her absence from MSNBC’s roster had scheduled Harris-Perry to appear in a weekend news-reading role.

      [...]

      So bringing up the status of people of color at the network is something that you can’t do at MSNBC without destroying your relationship there—despite the fact that, as CNN’s Dylan Byers (3/2/16) pointed out, MSNBC has cancelled or sidelined numerous non-white hosts in recent years, including Martin Bashir, Toure, Karen Finney, Al Sharpton, Joy Reid, Alex Wagner and José Díaz-Balart.

  • Censorship

  • Privacy

  • Civil Rights

    • Breaking: Honduran Indigenous Leader Berta Cáceres Assassinated, Won Goldman Environmental Prize

      Honduran indigenous and environmental organizer Berta Cáceres has been assassinated in her home. She was one of the leading organizers for indigenous land rights in Honduras.

      In 1993 she co-founded the National Council of Popular and Indigenous Organizations of Honduras (COPINH). For years the group faced a series of threats and repression.

      According to Global Witness, Honduras has become the deadliest country in the world for environmentalists. Between 2010 and 2014, 101 environmental campaigners were killed in the country.

      In 2015 Berta Cáceres won the Goldman Environmental Prize, the world’s leading environmental award. In awarding the prize, the Goldman Prize committee said, “In a country with growing socioeconomic inequality and human rights violations, Berta Cáceres rallied the indigenous Lenca people of Honduras and waged a grassroots campaign that successfully pressured the world’s largest dam builder to pull out of the Agua Zarca Dam.”

    • Race and the Crime of Felony Disenfranchisement

      Now that Super Tuesday is behind us and the field of presidential candidates is narrowing with the suspension of Dr. Ben Carson’s campaign, a potentially paradigm-shattering general election looms ever closer. “The stakes in this election have never been higher,” Democratic candidate Hillary Clinton said in her speech after she had been declared the victor over Sen. Bernie Sanders in seven of 11 Super Tuesday states. As Donald Trump, piling victory upon victory on top of insult upon insult, edges closer to clinching the Republican nomination, the GOP is in chaos, with some predicting a historic split in the party. The presidential race to date has been well-characterized by a line of closed captioning text from a recent Republican debate: “unintelligible yelling.” The circuslike atmosphere masks deeply troubling statements made by several candidates that fan the flames of racism, white supremacy and xenophobia. It also deflects attention from a critical, and worsening, deficit in our democracy: the attack on the right to vote, and in particular, the wholesale disenfranchisement of close to 5 million Americans, mostly people of color.

  • Internet/Net Neutrality

    • Canadian Cablecos Dodge Government Demand For Cheaper TV Bundles — By Hiding Them From Consumers

      This week, the Canadian government will begin forcing Canadian cable operators to provide cheaper, more flexible cable TV packages. Under the new CRTC rules, companies must provide a so-called “skinny bundle” of discounted TV channels starting March 1, and the option to buy channels a la carte starting December 1. But while the CRTC’s attempt to force innovation on the cable industry may be well-intentioned, it’s already clear that Canadian cable operators plan to do everything in their power to tap dance around the requirements.

    • AT&T Buying Missouri State Law Ensuring Broadband There Continues To Suck

      For years incumbent ISPs like AT&T have spent millions lobbying for laws in roughly twenty states prohibiting towns and cities from building or expanding broadband networks — even in cases of obvious market failure. The laws are pure protectionism, taking the right to make local infrastructure choices out of the hands of local communities — all to protect companies like AT&T from the faintest specter of competition. And while some states have been waking up to the fact that letting AT&T write protectionist state law hurts consumers and state businesses longer term, Missouri apparently isn’t one of those states.

  • Intellectual Monopolies

    • Trademarks

      • No strict liability for infringement in online advertising, says the CJEU

        Having your own advertising spread all around the internet is every company’s dream. A dream that might become less pleasant, though, if that advertising starts infringing another company’s trade mark and you can’t manage to take it down, whilst the trade mark owner is breathing down your neck. In a nutshell, this is the factual scenario of the decision that the Court of Justice of the European Union (CJEU) issued today in Daimler AG Együd Garage Gépjárműjavító és Értékesítő Kft (C-179/2015). The ruling addresses the notion of “trade mark use” in online advertising and explores possible remedies against trade mark infringements on the internet that may be very useful in the era of viral marketing.

    • Copyrights

      • Copyright History: The Strange Case Of A Book Authored By Mark Twain Via A Ouija Board

        Mark Twain can be the subject of fascinating discussion for any number of reasons, but around these parts we talk intellectual property. Some years back, Mike wrote about Twain’s support for copyright extensions, including when he even went so far as to advocate for infinite copyright. Well, it turns out that Twain’s concept of infinite copyright might have been particularly germane to his legacy, as EFF’s Parker Higgins takes us on a delightful stroll, over at Fusion, through the historical copyright case concerning the novel Twain might or might not have written…from beyond the grave.

        The year 1917 was apparently a time in some ways even stranger than our own, in which the public was wrapped up in its interest in the occult. It was during that time that an author by the name of Emily Grant Hutchings attempted to publish the latest work of Twain’s, entitled Jap Herron. Twain, the pen name of Samuel Clemens, had died in 1910, seven years earlier. So, how did Hutchings get Twain to write this book even as his body decomposed below ground? Why, through a Ouija board, of course!

      • OLG Munich: YouTube not liable for damages for hosting copyright infringing content

        In a decision of 28 January 2016, the Oberlandesgericht Munich, like the first instance court before it, held that YouTube is not liable for financial damages for hosting copyright infringing videos.

        Plaintiff was the German collecting Society GEMA, acting on behalf of composers. It sent YouTube a list of 1,000 videos with music viewable on YouTube.com that were uploaded without the consent of the copyright holders and demanded information on the revenue generated by the display of these videos in preparation of claiming damages. When YouTube refused to comply, GEMA sued before the Landgericht Munich, which dismissed the complaint.

03.03.16

Links 3/3/2016: GNU/Linux in Estonian Schools, Shippable 4.0

Posted in News Roundup at 6:27 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • To Appreciate a Life

    The most useful meanings outlive the words, people and media that carry them. On a Linux Journal Geek Cruise in 2005, I asked Andrew Morton, the Linux kernel maintainer, if he thought Linux would be around a hundred years in the future. He said yes, and that most work on the kernel in 2105 would still be “stamping out bugs”.

    A decade into that century, with Linux more meaningful than ever to our whole networked civilization, I find myself wondering how long the world it maintains will last, and if the world would be lucky to still have Linux, doing what it has always done, and much more—or if the world has come to depend on other ways of computing. No way to know, and few if any of us reading this will be around to find out.

  • Desktop

    • Is It Time For Desktop Linux To Focus On Niche Applications And Stop Obsessing About Flashy GUIs?

      More and more of our life is going to be spent on smaller devices such as phones and so developers would be far better spending their time creating decent web applications and mobile phone applications.

      If you are going to develop for the desktop operating system then you are better focusing on applications that people really need for the desktop.

      Kudos to the Ubuntu developers. The convergence looks really good.

    • Estonian schools piloting open source software

      Schools in Estonia’s capital Tallinn are piloting a new program, gradually moving to PC workstations running on free and open source software. Students, teachers, school administration and kindergartens’ staff members are using LibreOffice, Ubuntu-Linux and other open source tools, saving millions of dollars on software fees.

  • Server

    • Shippable 4.0 Sets Sail with Improved Docker Integration

      The first thing users will notice about Shippable v4.0 is its increased flexibility. Developers can use the tools and platforms they’re working with currently to automate their build and deployment pipelines.

      “When you want to change tools or languages, move to a new technology like microservices or containers, or expand your deployment environment, you don’t have to start over again rebuilding your app delivery pipeline,” said Shippable CEO Avi Cavale.

      Recreating one’s system from the ground up can be a headache, one which Shippable hopes to curb with its improvements made to version 4.0 of the platform.

  • Kernel Space

    • Thunderbolt 3′s lightning-fast speeds hit Linux PCs

      The PC maker is building driver support for Thunderbolt 3 and USB Type-C into the XPS 13 Developer Edition, wrote a Dell employee in a company forum.

      Thunderbolt 3 is a connector technology that can hook up PCs to external peripherals like storage and monitors. It’s like USB, but four times faster. A 4K movie could be transferred from an external storage device to a PC in 30 seconds.

      Linux PCs will be a lot more capable with Thunderbolt 3. Users will be able to connect two 4K monitors simultaneously, connect to external graphics cards and establish a peer-to-peer network with other Linux PCs.

    • Companies that Support Linux: Apprenda

      Last fall, Apprenda — an enterprise platform as a service (PaaS) provider — joined the Linux Foundation and the Open Container Initiative. And, just this week, the company announced it has joined Kubernetes, a container management system developed by Google.

      According to the blog post, Apprenda plans to incorporate Kubernetes into its current architecture, stating “over the course of the next few product releases, we’ll be merging Kubernetes, the open-source container orchestration system from Google, into our architecture and joining the Kubernetes community.”

      As part of our series on companies that support Linux, we talked with Chris Gaun, Director of Strategy at Apprenda, to learn more about the company’s new direction and open source commitment.

    • If You Use An ASUS Motherboard & Hit A Linux Issue, Hopefully It’s On This List
    • Dell is bringing Thunderbolt 3 support to Linux systems

      The Dell XPS 13 is one of our favorite laptops, but that’s only if Windows is your operating system of choice. Mac users have a whole brand just for their computers, but Linux aficionados are typically left out in the cold. There’s good news today though, as the XPS Developer Edition, which runs a custom Ubuntu image, will bring support for Thunderbolt 3 to the platform with the Skylake update, according to chatter on the Dell forums, as pointed out by PCWorld.

    • Graphics Stack

      • OpenSWR High Performance Software Rasterizer Lands In Mesa

        Intel’s OpenSWR high-performance software rasterizer that’s an alternative to LLVMpipe has landed in mainline Mesa.

        OpenSWR is a performant software rasterizer developed by Intel that in their workloads is much faster than using LLVMpipe for rendering OpenGL on x86 CPUs. If this is your first time hearing about OpenSWR, read our earlier articles on the matter: Intel Is Making A High-Performance Software Rasterizer For Mesa and OpenSWR High-Performance Software Rasterizer Revised For Mesa.

      • AMD Sends Out Big Patch Series For HSA/OpenCL Interop Support

        AMD’s Marek Olšák sent out a set of 26 patches this morning for preparing the RadeonSI Gallium3D driver to have interoperability support between OpenGL and HSA/OpenCL.

      • AMD Publishes OpenVX AMDOVX Open-Source Beta

        The latest fruits of AMD’s GPUOpen initiative is the open-sourcing of a beta of AMDOVX.

    • Benchmarks

      • Linux 4.1 Through Linux 4.5 Kernel Benchmarks On An Intel Xeon E3 v5

        For your viewing pleasure to get our March 2016 Linux benchmarking started is a Linux 4.1 through Linux 4.5 kernel benchmark comparison when testing with a 4GHz Intel Xeon E3 v5 Skylake CPU and using a RadeonSI-supported graphics card and SSD for storage.

        Used for today’s kernel benchmark comparison was the new Xeon E3-1280 v5 with 3.7GHz base clock frequency and 4.0GHz turbo frequency, MSI C236A Workstation motherboard, 16GB of DDR4 system memory, 120GB Samsung 850 EVO SSD, and Radeon R7 370 graphics card. Thanks to MSI for making this motherboard and CPU testing possible.

      • Clear Linux vs. Ubuntu 16.04 On The Xeon E3-1280 v5 Skylake Workstation

        With Clear Linux continuing to outperform other Linux distributions on Intel hardware, I was curious to see how the Intel OTC Linux distribution was performing when trying it with one of the new Xeon CPUs at our disposal for testing.

        For some quick Clear Linux vs. Ubuntu 16.04 LTS development benchmarks I compared some of the original benchmarks for the Xeon E3-1280 v5 to that of a fresh install of Clear Linux 6470 as the latest build of this rolling-release-like distribution at the time of testing.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Plasma 5.6 Beta

        Wednesday, 02 March 2016. Today KDE releases a beta update to its desktop software, Plasma 5.6.

        This release of Plasma brings many improvements to the task manager, KRunner, activities, and Wayland support as well as a much more refined look and feel.

      • February KWin/Wayland update: all about input

        I haven’t blogged for quite some time about the progress on KWin/Wayland and had a few people requesting an update. As we are now approaching a feature freeze and I have most of the things I wanted to do for Plasma 5.6 done, it’s time to blog again. I use this also as a public service announcement: thanks to Let’s Encrypt my blog is also available through an encrypted connection.

      • So what is Kube? (and who is Sink?)

        Michael first blogged about Kube, but we apparently missed to properly introduce the Project. Let me fix that for you Wink

        Kube is a modern groupware client, built to be effective and efficient on a variety of platforms and form-factors. It is built on top of a high-performance data access layer and Qt Quick to provide an exceptional user experience with minimal resource usage. Kube is based on the lessons learned from KDE Kontact and Akonadi, building on the strengths and replacing the weak points.

        Kube is further developed in coordination with Roundcube Next, to achieve a consistent user experience across the two interfaces and to ensure that we can collaborate while building the UX.

      • Will the Addons Weather widget be revived for Plasma 5.6?

        If you are deep in coding mode and cannot afford to turn your head or even your eyes to look through the window at outside to check the current weather… or if you are deep down below ground plumbing at your black hole farming machine and now preparing your way home and are unsure whether to put on a rain jacket or the sunglasses… what is there to help you? A widget on your computer telling you about the weather, right.

        Plasma5 so far was missing the port of the weather widgets which were part of the Plasma Addons package with the older Plasma. While there are nice Plasma5 weather widgets on kde-apps.org (1, 2) I wanted the weather widget back I was used to.

      • KDE Makes the Desktop Practical Again

        Before the KDE 4.1 release in 2008, Aaron Seigo announced the end of desktop icons. He was being provocative, because what he was really announcing was the end of being restricted to a single icon set. Instead, KDE Plasma began supporting multiple desktops, and with them several ways to swap sets of icons in and out. These changes have received little publicity, but they are ideal for quickly customizing a desktop for a specialized task.

        You do not have to use these features. However, if you choose to explore them, you can apply them not only to the main desktop, but also to any activities, or even any virtual workspaces, so long as you first select from the main menu System Settings > Workspace Behavior > Virtual Desktop > Different Widgets for each desktop. It’s all a matter of which combination of customizations you prefer: a default desktop, folder views, multiple desktop folders, or a single desktop folder with filters.

      • KDE Plasma 5.6 Is Getting Ready With More Wayland Improvements

        KDE’s Martin Gräßlin has provided a status update concerning KWin/Wayland support with the latest KDE stack.

        Martin Gräßlin has been spending most of his time recently focusing upon the KDE input support for Wayland and better supporting libinput. There’s been a lot of code clean-ups and bug fixes as well as bringing input features closer to parity between X11 and Wayland.

      • KDE Plasma 5.6 Beta Released

        The KDE community has banded together to release the Plasma 5.6 beta today.

        KDE Plasma 5.6 is bringing improvements to the default Breeze theme as well as to the light and dark versions, task manager improvements, smoother widgets, a weather widget has finally returned to Plasma 5, and plenty of Wayland improvements. Plasma 5.6 has also been prepping Plymouth boot screen and GRUB boot-loader screens designed around the Breeze theme in aiming to complete the KDE computing experience.

      • Tumbleweed gets KDE app store

        Since the last update on openSUSE Tumbleweed, there have been five snapshots and some of those snapshots have brought some interesting new packages.

        The 20160225 snapshot allows Tumbleweed users to add a package called ‘discover‘, which is the KDE software installer, implemented as an app store like application.

      • KDE Plasma 5.6 Beta Brings New Light Breeze Theme, Wayland Support, More

        KDE Plasma 5.6 Beta has been announced by the KDE community, marking the start of a new development cycle for the desktop.

        The new KDE Plasma 5.x branch wasn’t all that well received by users when it was initially launched, but the developers continued to improve upon it. This latest 5.6 Beta release shows just how far the project has come. The progress made by the developers is astounding, and it looks like they are still making significant changes.

    • GNOME Desktop/GTK

      • A little teaser for future Maps

        We’ve just entered the UI and string freeze for 3.20, we have a lot of new stuff coming up for Maps in 3.20 that I’m really excited about to see ”out the door”.

        One thing that I’ve been wanting in Maps for a while is support for transit routing (for using public transportation options) in addition to our current ”turn-based” routing for car, bicycle, and walking powered by GraphHopper.

      • GNOME Maps 3.20 to Integrate Lots of New Features

        GNOME Maps 3.20 looks like it’s going to be a great release and developers have added quite a few new features.

        When GNOME Maps was upgraded from 3.16 to 3.18, the jump wasn’t all that obvious. Just a couple of new major features were added. On the other hand, the developers are now preparing for GNOME 3.20, and there’s a lot more interesting stuff going on.

  • Distributions

    • New Releases

    • PCLinuxOS/Mageia/Mandriva Family

      • The March 2016 Issue of the PCLinuxOS Magazine

        The PCLinuxOS Magazine staff is pleased to announce the release of the March 2016 issue. With the exception of a brief period in 2009, The PCLinuxOS Magazine has been published on a monthly basis since September, 2006. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community. The magazine is lead by Paul Arnote, Chief Editor, and Assistant Editor Meemaw. The PCLinuxOS Magazine is released under the Creative Commons Attribution-NonCommercial-Share-Alike 3.0 Unported license, and some rights are reserved.

    • Gentoo Family

      • Sabayon 16.3 Monthly Release Available To Download

        Sabayon is a free, open source and Gentoo based Linux distribution. It aims to provide the easy to use, simple and yet powerful Linux operating system. Sabayon team has made the monthly release Sabayon 16.3 available to download with bug fixes and applications updates.
        Sabayon is a Gentoo based Linux distribution. It is available in all popular flavors, KDE, GNOME, Xfce and MATE. So if you are wanting to try this distribution then you can install Sabayon in your favorite flavor.

    • Red Hat Family

    • Debian Family

      • Last week ‘flu by

        My first chore was to set up VPN access to the development resources (source control, wiki, etc.). I sandboxed the proprietary VPN client in a VM with a systemd unit to run it at boot, so I can control it by starting and stopping that VM. I then set to work on unpacking and exploring the SoC vendor’s evaluation module (EVM), starting by looking at serial output – of which there was none. Nothing on the LCD panel or network port either. A frustrating day.

      • Derivatives

        • Canonical/Ubuntu

          • Canonical and Intel Train Companies on the Use of Snappy Ubuntu Core and IoT

            Canonical and Intel continue to further their partnership in the IoT business, and the two companies have just recently completed a training session for developers at the Taipei Intel Technology Training Center.

          • Flavours and Variants

            • Linux Mint Devs Explain Timeline of Website Hack

              The Linux Mint team is recovering from the website attack in February that seriously affected their credibility. The lead developer of the project, Clement Lefebvre explained in great detail everything that happened.

            • Linux Mint: The right way to react to a security breach

              The Linux Mint developers have posted a summary of their reaction to the recent compromise of their distribution image. It provides an excellent example of what to do in such a situation.

            • Mint Recovery, Tumbleweed Updates, Charlie Brown Ubuntu

              Today in Linux news Clement Lefebvre today said that things are back up and running over in Mintland with more security measures in place. Douglas DeMaio posted of the latest Tumbleweeds news including new KDE app store and Jack Wallen asked, “Why’s everybody all pickin’ on Ubuntu?” The Free Software Foundation said to ‘read the fine manual’ in answer to the ZFS GPL question and another security vulnerability involving SSLv2 was announced.

            • FAQ: What the heck happened to Linux Mint?

              Apparently, a hacker going by the handle “Peace.” Peace gave an interview to ZDNet reporter Zach Whittaker, in which he or she explained that the idea was mainly just to get access to as many computers as possible, possibly for a botnet. Peace first gained access to the site in January, via a security vulnerability in a WordPress plugin.

  • Devices/Embedded

Free Software/Open Source

  • ReactOS – Fake Or Potential Windows Alternative? Review And Extended Test Drive Of Latest Release

    After 10 years of development was released the new major release of ReactOS, this event was highlighted in the most biggest tech resources. But I’m not interested in just talk about release notes from “crazy Russian developers”, more interested is technical opportunities and possibilities.
    Which architecture use React OS now, which hardware are supported, why users and developers might find it interesting, the degree of compatibility with Microsoft Windows? Is there a Windows-based copy with Unix-style? For these and other questions you can find the answers in this article (or ask new questions in comments).

  • FOSS History in Retrospect: 3 Generations of Open Source Coders and Users

    It’s 2016, and open source is everywhere you look. The norms, forms and faces of open source have changed so much, in fact, that they seem to signal the rise of a new generation of open source programmers. Here’s why.

    Lest I ruin anyone’s day by appearing to spread falsehoods on the Internet, I will note that the idea of generations is a construct. I realize there is no actual line separating one so-called generation of people from another. I also realize that most of the people who wrote the first free or open source programs several decades ago are still around and coding.

  • Navigating OPNFV’s Brahmaputra Release

    What we’ve seen with Brahmaputra is key stakeholders collaborating across the industry and a marked increase in community engagement overall. For example, 35 projects were involved in the Brahmaputra release, compared to just five in Arno. That’s a six-fold increase in just ten months! Even more telling is the more than 140 developers involved in the release—which means we’ve seen developer participation in OPNFV as a whole increase five-fold since August of 2015.

  • OPNFV Promises More Powerful Platform
  • OPNFV Project offers second platform release
  • OPNFV Matures with New Release of Open Source NFV Platform
  • Better Intel Skylake & Galileo Support Arrives For Coreboot

    Coreboot received some new Intel feature work yesterday for improving the state of initializing some newer hardware with this open-source alternative to proprietary UEFI/BIOS.

  • Open Source Initiative Welcomes Internet Systems Consortium as Newest Affiliate Member

    The Open Source Initiative® (OSI) is honored to announce ISC (Internet Systems Consortium), the organization behind the ongoing development and distribution of the most used name server software, BIND, has joined the OSI as an Affiliate Member. Founded in 1994, ISC plays a critical role supporting the fundamental architecture of the Internet, driving standards for the Domain Name System (DNS). ISC provides leadership both in standards development and software for the Dynamic Host Configuration Protocol (DHCP) and is an active contributor to the Internet Engineering Task Force.

  • Open source, open borders

    Over the past two decades open source has gone from a fringe interest to a mainstay of the technology industry. The importance of open source code and prominent issues like security flaws in major open source projects have led to open source foundations becoming more and more important, which means the decisions they make matter.

    The foundations are not just for fundraising and patent protection, although Ghost notes: “As a non-profit, no individual stands to gain if we pay more tax or less tax. The foundation either has more, or less money to spend on its mission to create free, open source software — that’s all.”

  • Log Analytics Tools: Open Source vs. Commercial

    In this article, I’m going to relay my own experience and that of other engineers at Search Technologies with log analytics tools–Splunk and Elasticsearch, Logstash, and Kibana (ELK) in the Elastic stack. As every article says, you’ll have to decide what works best for you.

  • Events

  • Web Browsers

    • Mozilla

      • Update on Connected Devices Innovation Process: Four Projects Move Forward

        The Internet of Things is changing the world around us, with new use cases, experiences and technologies emerging every day. As we continue to experiment in this space, we wanted to take a moment to share more details around our approach, process and current projects we’re testing.

      • Moving towards WebVR 1.0

        Consumer VR is at our doorsteps, and it’s sparking the imagination of developers and content creators everywhere. As such it’s no surprise that interest in WebVR is booming. Publications like the LA Times have used WebVR to explore the landscape of Mars, and a doctor was able to save the life of a little girl by taking advantage of Sketchfab’s VR features. The creativity and the passion of the WebVR community has been incredible!

      • Mozilla Releases Proposal For WebVR 1.0 API

        Mozilla’s Virtual Reality team working in conjunction with the Google Chrome team is ready to release a proposal for a new web API for handling VR devices: meet the WebVR 1.0 proposal.

  • SaaS/Big Data

    • Hyperglance Bridges Cloud Worlds with AWS and OpenStack Focus

      Many people on the cloud computing scene will characterize Amazon Web Services as the proprietary platform that rules the roost, while OpenStack gets the nod among open platforms. There are new ways to leverage both platforms, though. Hyperglance Ltd. has announced Hyperglance 4.0 to bring together Amazon Web Services (AWS) and OpenStack cloud infrastructure, including Nagios alerts, into what it is billing as “an interactive, easy to use, 3D topology console within a single browser tab view.”

  • Healthcare

    • MITRE shares an open source FHIR testing tool

      Quina, speaking at the Federal Health IT Pavilion at HIMSS16, demonstrated Crucible, a tool that was created to help developers identify errors in FHIR applications. Funding from MITRE Corp. has made it possible for the software to be offered as an open-source project with an Apache license. Using the web interface at ProjectCrucible.org, a developer can run 228 test suites that include over 2,000 tests of the FHIR specification.

  • FSF/FSFE/GNU/SFLC

  • Openness/Sharing

Leftovers

  • Windows 10 May Delete Important Programs Without Your Permission

    After installing a major update or newer builds, users are reporting issues of losing programs in Windows 10.

  • Health/Nutrition

    • Uganda In Clinical Trials For Ebola Vaccine

      The US National Institutes of Health (NIH) and GSK each own intellectual property that underlies this vaccine candidate. GSK is also the manufacturer of the vaccine.

    • Canada Welcomes USAians

      I love my local hospital. They provide quick, courteous service 24×7. We are also ~30million people in a country larger than yours so we won’t crowd you at all.

    • When did most Americans search for ‘move to Canada’?

      As sure as “Results Wednesday” follows Super Tuesday, Americans were reacting to the outcome of the voting by searching on Google for how to move to Canada.

  • Security

    • Why Linux Distros Look Insecure Even Though They’re Not

      The Linux distro is also likely to tell you about bugs as soon as they are discovered instead of waiting for an arbitrary day like “Patch Humpday” or a press conference where they also announce some sort of positive news — “Now includes NSA-supplied encryption back door for added security!” — or some other new feature they’re proud of.

      When it comes to bugs, hacks, and security breaches, FOSS is typically “no waiting” when it comes to telling users about program flaws.

    • Open-source code from Mars rover used in espionage campaign targeting Indian government

      Two open-source code libraries used in the development of the historic Mars rover have been exploited by cybercriminals and moulded into an effective espionage tool that is being used to target high-level officials in the Indian government.

      First exposed by security researchers at Palo Alto Networks, the malware, now dubbed Rover, was found in a malicious phishing email received by India’s ambassador to Afghanistan that was made to look like it was sent from India’s defence minister which, if opened, would have installed a slew of vicious exploits on the computer system.

      Upon analysis, the experts found the malware, which contained code that attacked a flaw in Office XP, boasted a range of spying features including the ability to hijack computer files, launch a keylogger, take screenshots and even record audio and video in real-time. All of the data compromised would be sent straight to the malware creator’s command and control (C&C) server.

    • Open Source Code Of Mars Rover Being Used To Create Malware To Target Indian Government

      Last year on December 24, 2015, a potential online target was identified which was delivered via an email to a high profile Indian diplomat, an Ambassador to Afghanistan. The email was spoofed and crafted as if it was sent by the current defence minister of India, Mr. Manohar Parikar. The mail commended the Ambassador to Afghanistan on his contributions and success.

    • Report: 3.5 Million HTTPS Servers Vulnerable to DROWN

      A report released Tuesday on the DROWN vulnerability raises concerns about possible attacks that could expose encrypted communications. DROWN is a serious vulnerability that affects HTTPS and other services using SSL version 2, according to the team of security researchers who compiled the report. The protocols affected are some of the essential cryptographic protocols for Internet security. An attack could decrypt secure HTTPS communications, such as passwords or credit card numbers, within minutes.

    • OpenSSL update fixes Drown vulnerability
    • HTTPS DROWN flaw: Security bods’ hearts sink as tatty protocols wash away web crypto

      DROWN (aka Decrypting RSA with Obsolete and Weakened eNcryption) is a serious design flaw that affects HTTPS websites and other network services that rely on SSL and TLS – which are core cryptographic protocols for internet security. As previously reported, about a third of all HTTPS servers are vulnerable to attack, the computer scientists behind the discovery of the issue warn.

    • Security advisories for Wednesday
    • DROWN Security Flaw Is Bad, But It’s Not Heartbleed or OpenSSL’s Fault

      For the second time in as many years, HTTPS encryption has turned out to have a huge flaw. This time, it’s called DROWN, and it affects more than 11 million servers that use the open source OpenSSL library. But that doesn’t make it another Heartbleed, and it doesn’t mean it’s time to give up on OpenSSL entirely.

    • DROWN Attack on TLS – Everything You Need To Know
    • Timely delivery of security updates
    • “Hack The Pentagon” — US Government’s Bug Bounty Program Invites Hackers And Coders

      This program is an initiative of the US Department of Defense’s new division Defense Digital Service (DDS) that’s led by former Microsoft executive Chris Lynch. Mr. Lynch says that he’s using his industry contacts to invite security experts and coders to participate.

    • John McAfee unlocks an iPhone and does not eat a shoe

      SHOE CONSERVATIONISTS should be glad that colourful security character John McAfee has lived up to his word and managed to unlock an iPhone.

    • Fedora Safe from DROWNing Attack

      If you are familiar with security , you likely saw the disclosure yesterday of the openssl v2 vulnerability given the sensational name “Drown”. Good news if you use Fedora (and it’s updated — Update with 20160229 ISOs) you don’t need to worry about a 0 day vuln fix. Openssl-1.0.2g IS the patched version and is on all Fedora Infrastructure and openssl that is shipped in fedora DEFAULTS to having the v2 AND v3 protocols not built-in “Compiled without openSSLv2/v3 support”.

    • Fedora Security Team FAD 2016

      In a couple of weeks (March 11th) the Fedora Security Team will be meeting in Washington, D.C. to hack on training, security fixes, and other issues. All Fedora contributors are welcome to stop by if you’re in the area.

  • Defence/Police/Secrecy/Aggression

    • US Military Launches Cyber Attacks on ISIS In Iraq, And Announces It

      This is the first time when the US has announced an open cyber attack. The cyber attack on ISIS will focus on recapturing the city of Mosul in Northern Iraq from ISIS. The electronic infrastructure of Iraq was set by the US during the reconstruction of Iraq and the US is going to capitalize on those electronics with the cyber attacks.

    • U.S. Military Contractors Return In Droves to Iraq

      America’s mercenaries smell the blood (and the money) and are returning to Iraq.

      Mercs are a great thing for the U.S. government, in that they aren’t counted as “troops,” or as “boots on the ground,” even while they are both. The Defense Department can disavow any mischief the contractors get up like, such as murdering civilians, and keep the headcount low and the body count low when things are going well, or bad. It only costs money, and that America has a bottomless pool of, as long as it being spent on something violent abroad instead of helping Americans at home (which is socialism, sonny.)

  • Environment/Energy/Wildlife

    • The worst drought in 900 years helped spark Syria’s civil war

      The drought that played a role in triggering the catastrophic Syrian Civil War was the worst such climate event in at least the past 900 years, according to a new study published this week.

      The study bolsters the conclusions from other research that found that because of human-made global warming, the drought was made three times more likely to occur, and that it was one of a number of factors that led to the outbreak of hostilities in 2011.

    • BHP Billiton-owned mining company agrees to pay $8.5bn to Brazil Government over 2015 dam collapse

      Millions of cubic metres of mining waste burst from a dam at the iron ore mine, causing what is considered to be Brazil’s worst environmental disaster.

    • Leonardo DiCaprio does a whole lot more than just talk about climate change

      Until his Academy Award acceptance speech on Sunday night, The Revenant star Leonardo DiCaprio had for years slipped under the radar as one of the most committed climate and oceans advocates in Hollywood.

      Instead, the public image that stuck was one of a talented, hard-partying star who seemed to be constantly surrounded by a coterie of models.

    • Climate Change Fuels Boko Haram

      Boko Haram, Nigeria’s homegrown Islamist terror group, continues to rampage across the country with growing impunity. Since its emergence in 2009, the group has killed 20,000 people and forced over 2.5 million Nigerians from their homes.

      Its expansion has been aided by growing ties with more established terrorist networks, especially al-Qaeda in the Islamic Maghreb (AQIM), providing the group with “training and material support” according to the UN Security Council. Last year, Boko Haram pledged allegiance to the Islamic State (ISIS), active in parts of Iraq and Syria.

    • Climate deniers lose key talking point as satellites show temperatures hit all-time highs

      February was the warmest month in the satellite record of atmospheric temperatures, according to new data. This is just the first domino to fall during what will likely prove to be the warmest, or one of the warmest, months on record as more data trickles in on conditions during February.

      The satellite data deals a setback to climate deniers that frequently cite the satellite record of atmospheric temperatures as evidence that human-caused global warming either doesn’t exist or is far smaller than scientists claim.

    • Mosul dam engineers warn it could fail at any time, killing 1m people

      Iraqi engineers involved in building the Mosul dam 30 years ago have warned that the risk of its imminent collapse and the consequent death toll could be even worse than reported.

      They pointed out that pressure on the dam’s compromised structure was building up rapidly as winter snows melted and more water flowed into the reservoir, bringing it up to its maximum capacity, while the sluice gates normally used to relieve that pressure were jammed shut.

  • Finance

    • TPP Is Obama’s Top Trade Priority For 2016

      Passage of the Trans-Pacific Partnership agreement is the Obama administration’s top trade priority this year, the Office of the United States Trade Representative said in its annual trade agenda released today. The agenda highlights intellectual property protection but also says all the right things on copyright limitations and exceptions, safe harbor for internet service providers, promotion of generic medicines, and the ability of countries to use flexibilities under international trade law.

  • PR/AstroTurf/Lobbying

    • Clinton Politics Made Simple

      Hillary summed up the psychological trick of the faux egalitarianism in a simple sentence:
      “If we broke up the big banks tomorrow … will that end racism? Will that end sexism? Will that end discrimination against the LGBT community?”. It is brilliant rhetoric, a masterpiece of sophistry. Of course breaking up the banks will not directly end these other evils. But neither would ending those things end the appalling level of wealth inequality. It comes directly back to my opening question of whether multi-billionaires are OK as long as they are appropriately representative of black, female and LGBT.

    • Hillary Lost My Vote in Honduras

      I am one of the many young women who to the consternation of so many pundits is just not Ready for Hillary in 2016. And it’s not because I am a bad feminist, it’s because I am judging Hillary Clinton, just as she has asked to be judged, on her record and her foreign policy credentials. I spent nearly five years in Central America working as a cross-border solidarity activist and I now work with immigrants in Massachusetts who have fled the violence in that region. So, I might have been moved by Clinton’s recent pledge to “campaign for human rights” and take on immigration reform. But I have seen first-hand how Clinton failed on that front when top military commanders in Honduras (all men, of course) overthrew its democratically elected president Manual Zelaya in 2009.

    • Why Bernie Sanders is No Jeremy Corbyn

      But attaching the label of “movement” to the Sanders’ campaign mistakes appearance for reality. Sanders’ rallies have certainly attracted large crowds – even larger than those of Obama in 2008. But a crowd is not a movement.

    • NYT Works Hard to Present Primary Race as More Boring Than It Is

      Something you often see in media analysis is that campaign reporters have a bias toward the horserace—that is, because they want an audience, they have an incentive to present electoral races as more interesting and competitive than they actually are.

      It’s completely untrue. The fact is, when real politics are at stake, corporate media often go out of their way to make races seem as boring as possible—to declare them over long before most citizens have had a chance to vote.

    • The Trump Campaign: Bad for America, but Good for CBS

      oonves noted that the election has been a boost for ratings—“We had a debate a couple of weeks ago, it was 14 million people on a Saturday night.

  • Censorship

  • Privacy

    • Different Brazilian Judge Orders Facebook Exec Released After Arrest

      A bit of a follow up to yesterday’s story about Brazilian law enforcement arresting Facebook vice president for Latin America, Diego Dzodan, because Whatsapp (a Facebook subsidiary) refused to help in a drug trafficking case. This was a ridiculous move by almost any measure: (1) While Whatsapp is a Facebook subsidiary, it’s operated independently, so arresting a Facebook exec is like arresting an investor for what one of its companies does; (2) Whatsapp uses strong end-to-end encryption from Open Whisper Systems, the folks who make the gold standard encrypted communication system Signal Private Messenger, meaning that it’s impossible for Whatsapp or Facebook to decrypt messages; and (3) jailing unrelated executives over issues like that is just insane.

    • The UK’s Proposed Spy Law Would Force Apple to Secretly Hack its Phones Too

      The FBI’s demand that Apple craft new software to bypass iOS’s security protections has ignited a worldwide debate about a government’s ability to force tech companies to sabotage their own security. One repeated question has been: will other countries, like China, demand the same powers?

    • A Texas City Rescinds “No Cost” License Plate Reader Deal For Being “Big-Brotherish”

      At the beginning of the year, the City of Kyle, Texas, approved a controversial agreement to install automated license plate recognition (ALPR) technology in its police vehicles. The devices would come at no cost to the city’s budget; instead, police would also be outfitted with credit card readers and use ALPR to catch drivers with outstanding court fees, also known as capias warrants.

      With each card swipe, an added 25% surcharge would go to Vigilant Solutions, the company providing the system. As an added bonus the company would also get to keep all the data on innocent drivers collected by the license plate readers—indefinitely.

      But before the license plate readers could even be installed, the Kyle city council voted 6-1 to rescind the order. The reason: public and media outcry over how the system would turn police into debt collectors and data miners.

      “It’s a little Big Brother-ish for me. It’s a little too invasive for me,” Councilmember Daphne Tenorio said at the February 16 hearing. “I’m uncomfortable with it…Because my husband’s in IT, I see what happens and, for me, personally I can’t justify it.”

      The February meeting was the city’s mulligan. Councilmembers grilled Vigilant Vice President of Sales Joe Harzewski with hard questions that should’ve been raised the first time around, such as what data is collected, where is the data stored, how long is it stored, how is it shared, and how is it protected.

    • State AG: We Have A Warrant Requirement For Stingrays; State Police: FILE(S) NOT FOUND

      This is a problem. It’s not that the state police chose to withhold the information, as it has with several other Stingray-related documents requested by the News Journal and the local ACLU. It’s that it says no records exist. This means the warrants the Attorney General says police must use are not being used.

      What do appear to be used by Delaware State Police are vague pen register orders that hide from judges and defendants the technology actually being used to obtain this phone data. Public defender John Daniello had one such document turned over to him by the police — one that apparently was used to deploy Harris Technology’s cellphone-tracking technology.

    • The revised Investigatory Powers Bill: what has changed

      A revised version of the Investigatory Powers Bill was published today, less than three weeks after critical reports by the Intelligence and Security Committee and the Joint Committee, which had scrutinised the Bill. Together with the Science & Technology Committee, they made 123 recommendations. On first reading, it appears that the revised Bill has made minor revisions not the full redraft that many, including ORG, have called for.

    • Stop rushing the Investigatory Powers Bill through Parliament

      Open Rights Group has responded to the publication of the Investigatory Powers Bill.

    • NSA can still spy under new ‘Privacy Shield’ agreement with Europe

      The United States and the European Union are about to reach a new privacy agreement intended to replace the old Safe Harbor agreement that came under intense scrutiny after the Snowden leaks revealed the scope of NSA’s data collection operations.

      The new Privacy Shield was published in full a few days ago, showing the principles that would govern the exchange of digital information between EU consumers and U.S. companies. However, the new agreement also has provisions that explain how and when the NSA can continue bulk data collection in the region.

    • FBI director says bureau asked NSA for help cracking San Bernardino shooter’s iPhone
    • FBI director implies that the NSA was unable to hack San Bernardino shooter’s iPhone
    • The FBI Says It Asked the NSA to Hack the San Bernardino Shootr’s iPhone. The NSA Couldn’t Do It.
    • NSA Chief Exhorts Tech Industry to Join Effort to Bolster Security

      NSA director makes plea to tech industry to partner on security; DROWN vulnerability hits SSL/TLS, but it’s no Heartbleed; EMC, leaving HDDs behind, unveils several new flash arrays; and there’s more.

    • Where is the Tort? Something seems to be missing in the Investigatory Powers Bill

      This provision means a person can sue another person for unlawful interception, rather than just rely on the government to prosecute. It was, in this way, a directly enforceable privacy right. (It was a tort used, I understand, in phone and computer hacking claims.)

      But the Bill does not (seem to) have this tortuous protection for individuals, even though Part 1 of the Bill is supposedly protecting privacy. (If it somewhere else in the vast Bill, I cannot find it. Please correct me if I am wrong.)

      If this is correct, and the tort is being repealed, then why is the government removing this civil law right, leaving the individual only with criminal law protection under what will be the new Act – which in turn needs the prior consent of the Director of Public Prosecutions?

    • Honest, Guv, I Didn’t See Nuffin’

      It is not only that I do not believe they could fail to notice. It is that anyone with that level of frequent access to the Prime Minister, other ministers and Royal family would be checked out by the security services. He would not have experienced full positive vetting (now called direct vetting), but a level of vetting would have been carried out on Savile himself. And many of his friends were subject to frequent direct vetting and it is impossible that a picture of Savile would not have built up tangentially. MI5, Special Branch (now also renamed) and GCHQ have tens of thousands of employees. What do you think these people do all day?

    • With Arrival Of New DA, The DEA’s ‘Likely Illegal’ Wiretap Warrants More Legal, Less Prolific

      The DEA’s South California wiretap kingdom is crumbling. Run almost solely through a single, very obliging judge and approved by an assortment of DA’s office underlings, the wiretap warrants were so toxic the DOJ wouldn’t touch them. Local prosecutors would, however, but now they’re finding their cases falling apart.

      The likely illegal wiretap program skirted guidelines meant to prevent exactly this sort of abuse. In response to the FBI’s abuse of wiretaps to surveil civil rights leaders (including Martin Luther King Jr.) during the 1960s, the DOJ stated warrants had to be signed off by the top prosecutor in the area they were deployed: in this case, Riverside District Attorney Paul Zellerbach. Zellerbach delegated when he shouldn’t have, compounding other problems, like the DEA’s use of a county judge for warrant requests, rather than a federal judge.

    • Former Google CEO Schmidt to head new Pentagon innovation board

      Eric Schmidt, the former chief executive officer of Google, will head a new Pentagon advisory board aimed at bringing Silicon Valley innovation and best practices to the U.S. military, Defense Secretary Ash Carter said on Wednesday.

      Carter unveiled the new Defense Innovation Advisory Board with Schmidt during the annual RSA cyber security conference in San Francisco, saying it would give the Pentagon access to “the brightest technical minds focused on innovation.”

      Schmidt, now the executive chairman of Alphabet Inc (GOOGL.O), the parent company of Google, said the board would help bridge what he called a clear gap between how the U.S. military and the technology industry operate.

    • “Privacy is Surveillance” – Part 1 of the Investigatory Powers Bill

      You will see that “Part 1” of the Bill is called “General Privacy Provisions”.

    • EFF Director Cindy Cohn On Why You Should Support Techdirt’s Encryption Crowdfunding Campaign

      This time around the issues surrounding encryption are much bigger than they were 20 years ago and reach far beyond the technical community. More than ever we need media and analysis that won’t be confused or misled, that will follow stories past the headlines and scare tactics and that will help the much wider range of people affected by this debate understand what’s at stake. Luckily, Techdirt is up for the task and all they need is a little help from their audience to get there. I hope you will help.

    • Congress Seems Pretty Angry About The FBI’s Belief That The Courts Can Force Apple To Help It Get Into iPhones

      Congressional hearings involving law enforcement and intelligence folks tend to be fawning affairs, with most of Congress willing to accept whatever these guys have to say. Sure, you’ll always have a few people critical of certain aspects, but generally speaking, Congress is especially friendly to the FBI, NSA, CIA, etc. So it must have come as a bit of a shock to FBI Director James Comey that during a long House Judiciary Committee hearing yesterday, they seemed pretty pissed off at Comey’s belief that the courts should force Apple to help him open up encrypted iPhones.

    • Rogers: Silicon Valley can benefit from CYBERCOM outreach

      Rogers tried to lighten the mood as he took the stage by calling it “an interesting panel to follow” as the NSA director.

    • NSA seeks to combine offense and defense in its spy efforts

      The NSA has two key missions: foreign intelligence-gathering and information assurance. One mission helps the other, as intelligence gathered by one side can be used by the other team to improve how government networks and private sector networks are protected. The NSA will pull together its offensive and defensive capabilities as part of the NSA21, or NSA in the 21st century, plan, said Michael Rogers, commander of the United States Cyber Command and director of the NSA, at the RSA Conference on Tuesday.

    • RSA 2016: cyber chief says US will fall short of recruiting goals
    • U.S. Spy Chief Expects More Power Grid Attacks Like One In Ukraine

      The head of the U.S. National Security Agency has warned that hackers will inevitably attack U.S. infrastructure in an attempt to cause a power failure like the one in Ukraine last year.

      Admiral Michael Rogers told a cybersecurity conference in San Francisco that it is a “matter of when, not if” a foreign state launches a cyberattack on U.S. targets.

      “An actor penetrated the Ukrainian power grid and brought large segments of it offline in a very well-crafted attack that both focused on knocking the system down but also focused on how was the provider likely to respond to that outage,” Rogers said.

    • NSA asks Silicon Valley to help fight cybercrime, terrorism

      The NSA is too big and slow to effectively fight ingenious cyber attacks without the help of Silicon Valley tech expertise, so it’s time to patch up relations between the two, the head of the NSA told a gathering of tens of thousands at RSA Conference 2016.

    • Apple formally appeals judge’s iPhone unlocking order

      Just in case its motion to vacate wasn’t enough, Apple late Tuesday filed an appeal of a California judge’s order requiring it to help the FBI defeat the password protection on the iPhone of one of the San Bernardino mass shooters.

      Apple’s lawyers filed the appeal “in an abundance of caution,” to cover the possibility that an appeal is the most appropriate way to oppose Magistrate Judge Sheri Pym’s Feb. 16 order, they said in a court filing.

      An appeal and a motion to vacate have similar goals, but attack a judge’s order in different ways. A motion to vacate asks a judge to withdraw her previous order; in this case, Apple asked Pym to reverse her Feb. 16 decision.

  • Civil Rights

    • Pennsylvania bishops hid sex abuse by ‘monster’ priest for 40 years, jury finds

      His alleged victims were humiliated, abused, raped and kept quiet. They were supposed to be able to trust him.

      Monsignor Francis McCaa spent nearly 40 years in the ministry, and for 25 of them, he was a serial abuser of young boys in his care, some as young as eight years old, according to a scathing report by a Pennsylvania state investigative grand jury.

      “Father Francis McCaa was a monster,” the grand jury found on Tuesday, after investigating the sexual misconduct of dozens of clergy in the Altoona–Johnstown diocese in Pennsylvania. The report was largely spurred by the discovery of a secret diocesan archive detailing administrative action around sex abuse, uncovered in August through a search warrant.

    • My School Requires All Girls to Wear Skirts. I’m Fighting for My Right to Wear Pants.

      I am like a lot of eighth grade students. I try to do my best in class. I like sports and playing outside, and I regularly go to Bible classes. I also believe in standing up for myself and others. So last year, along with some friends, I created a petition to ask my school to change its policy that says girls have to wear skirts to school or risk being punished.

    • President Obama, When It Comes to Human Rights, We Need More Action, Not Words

      The Obama administration record on torture and detention undermines its rhetoric.

      The Obama administration this week made new pledges and commitments to protect “human rights and fundamental freedoms” to the United Nations in advance of the U.S. re-election to the U.N. Human Rights Council. Yet while the U.S. has used its first six years of HRC membership to advance human rights overseas, its participation has had little direct bearing on human rights at home. Lack of accountability for torture and cooperation with U.N. human rights experts are just two examples of such double standards.

      When he took office, President Obama promised to disavow many of the disastrous Bush administration policies, including by closing Guantánamo and ending the use of torture. Obama also promised to reassert U.S. global leadership on human rights by joining the HRC later that year.

      While the president issued an executive order on his second day in office ending the CIA’s secret detention and torture program, he declined to support any meaningful measures of accountability for crimes that had taken place. His policy of “looking forward rather than backward,” as well as his administration’s continuing fight against transparency and any attempts to reveal the whole truth about Bush administration torture policies, will undoubtedly stain his human rights legacy.

  • Internet/Net Neutrality

    • 5G Wireless Hype Overshadows Fact Nobody Actually Knows What 5G Is Yet

      At the Mobile World Congress convention in Spain last week, one of the most well-hyped products in convention history was something that doesn’t technically exist. Fifth generation wireless (5G) was all the rage at the show, with multiple carriers promising they were in various stages of bringing the new ultra-fast wireless standard to consumers. The problem is that while engineers have a general idea of some of the technologies that may be included in the final standard when approved, nobody actually knows what 5G is yet. And when it does finally get solidified, it’s likely to be 2020 or later before actual launches occur.

    • Afraid Of Upsetting The Cable Industry, Roku Won’t Support FCC Quest For Increased Set Top Box Competition

      But, because Roku believes it’s first in line for the cable industry’s affections, it appears to be backing away from an initiative that would likely be good for the entire sector (investment by Viacom, 21st Century Fox, and UK cable operator Sky might be shaping Roku’s thinking as well). After all, why support broader, healthy competition when you believe you’ve got the inside track? Well, because should the FCC’s gambit actually work, Roku (which people forget began as a brain child of Netflix) stands to gain a much larger chunk of this suddenly-open market than it will from remaining mute.

  • DRM

    • Join us this Thursday to fight an unjust DRM law

      We’ll be hand-delivering a comment against the the part of the DMCA (Digital Millenium Copyright Act) that makes circumvention of DRM a crime, even when done for important reasons like security research or accessibility. Our comment is co-signed by more than 1,000 people, but the Copyright Office won’t let us submit it online without proprietary software.

  • Intellectual Monopolies

    • USTR Strikes IP Deal With Honduras On Generic Cheese, Signal Piracy

      The government of Honduras has committed to a work plan for protecting intellectual property rights that includes recognition of food names considered generic by the United States such as “parmesano” (parmesan), provolone and bologna, the Office of the United States Trade Representative (USTR) announced today. Other commitments include signal piracy related to cable and satellite, and a customs trademark registry.

    • Trademarks

      • Canadian Smoke Shop Owner Demonstrates How To Turn Trademark Infringement Into Jail Time

        Lots of brands seem to feel trademark infringement should be greeted with the full brunt force of the law — even though it’s rarely anything more than a civil offense. Counterfeited goods are their own issue, with Good Guy ICE on hand to run interference for major studios, the NFL and anyone else with a significant amount of lobbying power. Counterfeiters can end up in jail, but entities that do nothing more than use a trademarked name/logo without permission or in a “confusing” fashion? Not so much.

        There are exceptions, of course. And caveats. But that’s exactly what happened in Canada. Jail time for trademark infringement. Richard Stobbe of IPblog.ca has more details.

    • Copyrights

      • President Barack Obama will speak at the South by Southwest interactive festival this year

        No, that’s not some hipster band. It’s the 44th president of the United States. President Barack Obama will be the first sitting president to speak at the annual music, film and interactive media gathering, which drew more than 80,000 attendees last year.

      • UK government launches initiative against online adblocking, compares it to piracy

        With the rise of users employing adblocking technology in the last 18 months, the conflict between online publishers and users has been mostly left as a problem for the market to resolve organically. However today the UK’s culture secretary John Whittingdale has announced that the British government intends to ‘do something’ on the issue, describing the practice as a ‘modern day protection racket’, and comparing it to piracy.

      • The Murky Waters of International Copyright Law

        Copyright is too often used to stifle speech and restrict common sense uses of creative works, from books, to films, textbooks, images, and music. That’s why we need exceptions and limitations to copyright, to serve as a safety valve against these kinds of abuse. Fair use is the most robust framework to permit uses of copyrighted material without permission from the creator or rightsholders. The United States is particularly known for having a strong, court-tested fair use regime, enabling all kinds of uses and innovation to thrive on the Internet.

        Even though it has been so critical in the U.S. however, fair use is not strictly integrated into international law—nor, for that matter, any of the trade agreements the U.S. itself has negotiated with other countries. Most relevantly, the Trans-Pacific Partnership (TPP) trade agreement carries a framework for governments to enact exceptions and limitations in their laws. That could be enough to justify the introduction of fair use in all the participating countries, but it’s far from a straightforward obligation unlike any of the pro-rightsholder restrictions that the agreement contains otherwise.

03.02.16

Links 2/3/2016: KDE Plasma 5.5.5, SSLv2 Bug

Posted in News Roundup at 5:12 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • The Evolving Market for Commercial Software Built On Open Source

    That is no longer the case. While an awful lot of companies are still stuck running immense software packages critical to their infrastructure, new projects are being deployed on cloud servers using open source technologies. This makes it much easier to upgrade one’s capabilities without having to rip out a huge software package and reinstall something else, and it also allows companies to pay as they go, rather than paying for a bunch of features they’ll never use.

    And there are a lot of customers who want to take advantage of open source projects without building and supporting a team of engineers to tweak one of those projects for their own unique needs. Those customers are willing to pay for software packages whose value is based on the delta between the open source projects and the proprietary features laid on top of that project.

  • Node.js 5.7 released ahead of impending OpenSSL updates

    The Node.js Foundation is gearing up this week for fixes to OpenSSL that could mean updates to Node.js itself.

    Releases to OpenSSL due on Tuesday will fix defects deemed to be of “high” severity, Rod Vagg, foundation technical steering committee director, said in a blog post on Monday. Within a day of the OpenSSL releases, the Node.js crypto team will assess their impacts, saying, “Please be prepared for the possibility of important updates to Node.js v0.10, v0.12, v4 and v5 soon after Tuesday, the 1st of March.”

  • Q&A: H2O.ai’s Vinod Iyengar on Machine Learning and Open Source

    On the tech scene today, it’s clear that cloud computing, Big Data analytics and machine learning are huge themes, and open source technologies are helping to drive these trends. There is also a shortage of skilled workers in these areas, and a shortage of understanding of the relevant technologies. At OStatic, we’ve been conducting an ongoing series of interviews with influencers focused on these key technology areas, and we’re particularly focused on how open source is involved.

    [...]

    We operate under the Apache 2.0 license, the most flexible open source license available.

  • Genode OS 16.02 Ported To RISC-V CPU Architecture

    Genode OS 16.02 has been released as the newest version of this popular, open-source operating system framework.

    The prominent features of Genode OS 16.02 include a port to the RISC-V CPU architecture, secure pass-through of USB devices to virtual machines, and updates to their Muen and seL4 kernels.

  • Events

    • Open Networking Summit

      ONS is the forum for service providers, enterprises, disruptive and incumbent vendors, open source projects, leading researchers and investors to discuss SDN and NFV developments and to shape the future of the networking industry.

  • SaaS/Big Data

    • Cloudera launches open-source effort to harness Hadoop for security analytics

      Hadoop will soon be brought up much more often in enterprise security discussions if Cloudera Inc.’s newest community effort achieves its goal. The Open Network Insight (ONI) project launched on GitHub this week to help organizations take advantage of data crunching platform’s processing power in their breach prevention efforts.

      The documentation for the tool explains that it’s a mix of free technologies from the Hadoop ecosystem and machine learning algorithms that Cloudera created in collaboration with a number of leading network protection vendors. Once all of its components are properly deployed, ONI starts pulling traffic logs from the environment that it’s protecting into the Hadoop File System, where they’re analyzed in stages.

    • Mirantis Delivers its Latest OpenStack Distribution

      Mirantis is out with version 8 of its OpenStack distribution, wrapping in the OpenStack Liberty release. The company says this release is the most stable OpenStack distribution available and it sought much feedback from large customers in building this release. The company has also announced that 26,000 unique users across 3,500 development teams globally are using its distribution now.

  • Oracle/Java/LibreOffice

    • Oracle’s JET flies into open source skies

      Oracle has published the code for its long-awaited open source JavaScript Extension Toolkit (JET) version 2.0.0.

      If you’re interested in looking over the code at GitHub, here’s what Big Red says is in the box: a full JS development toolkit, SPA template-based lifecycle management, two-way binding with a common model layer, single-page app navigation and mobile support.

      Open source libraries used with JET include jQuery, the jQuery UI, Knockout, RequireJS and Hammer.

    • LibreOffice Conference 2016 in Brno

      LibreOffice Conference will take place in Brno, Czech Republic this year. It will be our third international desktop-related conference in Brno. After GUADEC 2013 and Akademy 2014. And we’re very much looking forward to it.

      The conference is still more than 6 months away, but the organization already started some time ago. We made an agreement with the local technical university about the venue. It’s the venue where GUADEC 2013 and DevConf.cz 2015 and 2016 took place. The campus premises used to be a Cartesian monastery which was founded in the 14th century. Just recently, the campus was renovated and now features a beautiful combination of historical and modern architecture.

  • Pseudo-/Semi-Open Source (Openwashing)

  • Openness/Sharing

  • Programming

Leftovers

  • Google’s Self-Driving Car Causes First Accident, As Programmers Try To Balance Human Simulacrum And Perfection

    Google’s self-driving cars have driven millions of miles with only a dozen or so accidents, all of them being the fault of human drivers rear-ending Google vehicles. In most of these cases, the drivers either weren’t paying attention, or weren’t prepared for a vehicle that was actually following traffic rules. But this week, an incident report by the California Department of Motor Vehicles (pdf) highlighted that a Google automated vehicle was at fault in an accident for what’s believed to be the first time.

  • Health/Nutrition

    • NHS comes top in healthcare survey

      The NHS has been declared the best healthcare system by an international panel of experts who rated its care superior to countries which spend far more on health.

      The same study also castigated healthcare provision in the US as the worst of the 11 countries it looked at. Despite putting the most money into health, America denies care to many patients in need because they do not have health insurance and is also the poorest at saving the lives of people who fall ill, it found.

      The report has been produced by the Commonwealth Fund, a Washington-based foundation which is respected around the world for its analysis of the performance of different countries’ health systems. It examined an array of evidence about performance in 11 countries, including detailed data from patients, doctors and the World Health Organisation.

  • Security

  • Defence/Police/Secrecy/Aggression

    • NRA Lobbyist Will Co-Host Hillary Clinton Fundraiser

      Democratic presidential candidate Hillary Clinton has called her support for gun control laws a key differentiator from her opponent Bernie Sanders, who she claims isn’t tough enough on the industry. But in mid-March, a Clinton campaign fundraiser will be co-hosted by a lobbyist whose clients include the National Rifle Association (NRA).

    • Former NSA and CIA director presents book at Nixon Library

      The Richard Nixon Foundation hosted Gen. Michael Hayden at the Richard Nixon Presidential Library and Museum on Tuesday night.

      Hayden, former director of the National Security Agency and the CIA, presented his new book, “Playing to the Edge: American Intelligence in the Age of Terror.”

    • Clinton-Bush Hardliner Attacks Congress for Blocking Invasion of Syria

      Michael Hayden [pictured left] said this in a video clip at Huffington Post Live, where the context of what he was saying was left ambiguous, but it concerned only the treatment of prisoners at Guantanamo Bay, so his comment there was gratuitous: he asserted (at 23:00 in the complete interview) that the prisoners at Guantanamo Bay are prisoners of war and thus can legally be kept imprisoned for the rest of their lives without there being any need at all for them (and there were 775 of them) to be heard in any court — he said they’re prisoners of war and not prisoners of any legal system at all; and, so, even if they were actually captured in error (as many of them were found to have been), they’ve got no legal rights at all. Innocence or guilt is legally irrelevant to their continued imprisonment, says this former chief of America’s CIA and of the NSA.

  • Transparency Reporting

    • Intel Agencies: Clinton Emails Match Top Secret Documents

      Clinton supporters, erroneously, make much out of the idea that of the many, many emails that passed through her private server, none were “marked” classified. They claim that, when in fact thousands of those same emails are indeed now marked classified, that is just after-the-fact Washington squabbling.

      So this new information — that America’s intelligence agencies now say the contents of some of those unmarked emails match the contents of their own classified documents — is a big deal. It also suggests just how Clinton’s unclassified server came to be loaded up with classified material.

  • Environment/Energy/Wildlife

    • Towns In Florida Can Keep Their Fracking Bans, State Senate Says

      It wouldn’t have been the first time something like this happened. People in small towns and counties get together, vote, and agree to ban fracking. And then the state legislature comes in and passes a ban on bans.

      But not this time.

      The Florida Senate’s Appropriations Committee has finally killed a bill that would have stopped towns from banning fracking, a week after the committee voted the measure down by a 10-9 vote. The bill’s sponsor, Sen. Garrett Richter (R) made a motion Tuesday to not consider the bill.

    • “The Old Normal Is Gone”: February Shatters Global Temperature Records

      Our planet’s preliminary February temperature data are in, and it’s now abundantly clear: Global warming is going into overdrive.

      There are dozens of global temperature datasets, and usually I (and my climate journalist colleagues) wait until the official ones are released about the middle of the following month to announce a record-warm month at the global level. But this month’s data is so extraordinary that there’s no need to wait: February obliterated the all-time global temperature record set just last month.

  • Finance

    • Canada Agrees To Use EU’s ‘Lipstick On A Pig’ Version Of Corporate Sovereignty For CETA

      Last September, Techdirt reported on the EU’s plan to replace the highly-controversial corporate sovereignty provisions in TAFTA/TTIP — the “investor-state dispute settlement” (ISDS) chapter — with something it called the “Investor Court System” (ICS). As we reported then, even if ICS addressed all the problems of ISDS — spoiler alert: it certainly doesn’t — there was a huge backdoor in the form of CETA, the trade deal between the EU and Canada. If CETA includes old-style corporate sovereignty provisions, US companies with subsidiaries in Canada will be able to use CETA to by-pass TAFTA/TTIP’s new ICS system completely, and sue EU nations using ISDS with all its widely-recognized faults. In fact, Bernd Lange, the MEP with responsibility for making recommendations on how the European Parliament (EP) should vote on international trade matters, said at the time that he would not support CETA if it included ISDS.

  • Censorship

  • Privacy

  • Civil Rights

    • The Provocative President of the Supreme Court

      In essence, the President was trolling us – in the proper sense of that much-abused word.

    • End This British Atrocity

      One of the worst atrocities of the British Empire occurred well within my own lifetime – the removal of an entire people, the Chagossians, from their homeland. Uprooted and deposited across the seas hundreds of miles away, many died from the physical and psychological effects of this crime against humanity. The thing is, it is still happening. The survivors have clung together as a community, and the British government are still actively preventing their return to their homeland – all to make way for an American military base on Diego Garcia. There is no reason other than simple Imperialism for America to maintain a military base in the middle of the Indian Ocean.

      [...]

      It is of course another example of the unparalleled talent for hypocrisy of the British state that the same politicians who declare their willingness to fight and die for the right of self-determination of the Falkland Islanders, will defend the deportation of the Chagos Islanders and their continued exclusion from their own islands. Again I would stress that Labour have been at least as guilty as Tories. The entire British state is complicit in this atrocity.

    • Debating Glenn Greenwald was like “looking the devil in the eye”: Ex-NSA chief Michael Hayden details distaste for media in new book

      Former CIA and NSA Director Michael Hayden is not a big fan of journalists. At least, that’s what his new book, “Playing to the Edge: American Intelligence in the Age of Terror,” appears to suggest.

    • Ex-CIA Chief: ‘American Armed Forces Would Refuse to Act’ If Trump Ordered Torture
    • On whistleblowers and secrecy: What author Barry Eisler said to a room of ex-intelligence officers

      You might have come across a phrase involving Snowden—in fact, this phrase isn’t easy to avoid if you favor establishment pundits like David Brooks and Fred Kaplan and Josh Marshall—to the effect that Snowden violated his “oath of secrecy.” Even former CIA director David Petraeus has claimed—awkwardly, in retrospect—there is such an oath. I wrote about this supposed oath in a bit more detail after the first Snowden stories broke, in a blog post called “Memo to Authoritarians.”

      All of us in this room know there is no “oath of secrecy”—that the notion of such an “oath” is the product either of ignorance or propaganda. There is a secrecy agreement—what here in Silicon Valley we typically call a nondisclosure agreement, or NDA. But to inflate the status of such an agreement to the level of an “oath,” akin to, say, the president’s oath of office, is false and misleading.

  • Internet/Net Neutrality

    • FCC ‘Probing’ Whether Cable Companies Have Sabotaged Internet Video

      Most people realize that the cable and broadcast industry has worked tirelessly to protect its legacy cash cow from disruption. Dish was forced to make its ad-skipping DVR less useful if it wanted streaming licensing rights. Fox, Disney and Comcast/NBC for years kept Hulu from being too disruptive. ESPN sued Verizon for trying to offer more flexible TV lineups. Apple keeps running face first into broadcasters terrified of real disruption with its own TV plans. That’s before you even get to cable companies busy capping and metering usage to hurt streaming services, while zero rating their own services for competitive advantage.

  • Intellectual Monopolies

    • Copyrights

      • Operator of Sweden’s Largest Streaming Site Arrested on Secret European Warrant

        A man suspected of being the main operator of what was once Sweden’s largest streaming site has been arrested in Germany following the execution of a secret European warrant. The man, reportedly a Turkish national, is believed to have set up advertising deals at Swefilmer resulting in around $1.7m in revenue.

      • Jay-Z’s Tidal Music Streaming Service Hit With $5 Million Copyright Lawsuit

        In a twist of irony, Tidal, the music streaming service owned by Jay-Z and touting its pro-music artist model, is now being sued for not paying its artists.

      • Tidal Sued For Unpaid Royalties And Cooking The Streaming Counts

        It’s been no secret that Tidal, Jay-Z’s foray into the music streaming business, hasn’t exactly had the success it was supposed to have. In the wake of all the angry sentiment about just how much other streaming services were paying musical artists, Tidal positioned itself as artist-friendly, the option for fans that want to make sure musicians get paid. It sounded great, except now Tidal finds itself joining the club of streaming services facing legal action over artist royalties.

03.01.16

Links 1/3/2016: Firefox OS in Panasonic Ultra HD TVs, Raspberry Pi 3

Posted in News Roundup at 11:42 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • How to choose the right brand architecture for your open source project

    Most people who start an open source software project aren’t sitting around waiting for someone to discuss brand architecture models with them, but many of them do have long term goals for their project that include eventually seeing it becoming a paid product or even the basis of a company built around servicing and supporting the project code.

  • Open Source Evolution: From Making Better Code to Making Better Business

    Today, open-source software is thriving in the Cloud, with a whole new generation of projects – such as Docker, Heroku, Open Stack and others. Cumulatively, GNU is still the leading license, but MIT, Apache and other licenses are among the top licenses used in open-source projects.

  • Top Open Source Creativity Apps

    There is a common belief among non-Linux users that there aren’t any good creative applications from the open source camp. In truth, this is absolutely false. The key is knowing which applications are needed to complete a specific task. In this article, I’ll share my recommendations for the top open source creativity apps.

  • 6 essential non-coding careers in open source

    When I started working in open source software in 1999, it was a small part of what I did. My company, SGI, wanted to start shipping Linux-based servers, and my task was to create a process for commercializing Linux. Today we’ve reached a point where open source software is in almost every area of technology. And while we often still think of it as code and developers, a whole ecosystem has evolved around open source—one that includes many full-time careers. These roles are much needed as open source matures, and they allow more of us who believe in the power of collaborative development to get involved.

    To help those looking to get involved in open source professionally, here’s a look at some of the most popular and emerging roles.

  • OPNFV Delivers Second Release of Open Source Network Functions Virtualization Platform
  • OPNFV puts out second release of open source NFV platform, Brahmaputra
  • Alluxio: Open Source Tech Making Baidu’s Data Centers Faster

    Running a successful internet business without using the data you accumulate to your advantage is clearly impossible in this day and age. Until about one year ago, Baidu, the web company behind the largest Chinese-language search engine and the country’s answer to Google, had a major technology problem on its hands.

    The queries Baidu product managers ran against its databases took hours to complete because of the huge amount of data stored in the company’s data centers. Baidu needed a solution, and its engineers were given the goal of creating an ad-hoc query engine that would manage petabytes of data and finish queries in 30 seconds or less.

  • 6 more must-have open source apps for Windows, Mac, and Linux

    In this follow up article, here are some more of the best open source and free apps I’ve found for my heterogeneous environment.

  • Hortonworks seeks salvation in proprietary software

    Three years ago Hortonworks led a chorus of open source Kumbaya as it sought to differentiate itself in the rapidly growing Hadoop market. Today, Hortonworks has significantly changed its tune, embracing proprietary software as a way to improve its financials.

  • Documentation should be concise, consistent, and simple

    “Words mean things” is one of my favorite expressions. I often use it in jest, but it’s an important consideration when writing documentation. I’m normally one to sling words around with great artistic flair, but when it comes to writing technical documentation, I’ve become more deliberate in my wording.

  • Web Browsers

  • SaaS/Big Data

  • Databases

  • Oracle/Java/LibreOffice

    • native gtk3 menubar in libreoffice

      For comparison here’s the (not utterly awful) emulated look prior to this. You can compare the spacing of elements in the menubar, menu separator rendering, distance of checkmarks to the following text, the display of the short cuts in different font attributes with different positioning, and menu entry line spacing.

    • LibreOffice Now Has GTK3-Native Menus

      There’s even more progress now to report on with LibreOffice’s GTK3 tool-kit support.

      LibreOffice has been making lots of progress with their GTK3 tool-kit support to better integrate the open-source office suite on modern Linux desktops and is also needed for running LibreOffice on Wayland. A few days ago we reported on GTK3 native context menus for LibreOffice while the latest to mention now are native menu bars.

    • LibreOffice Is Getting GTK3 Native Menus
  • CMS

    • Acquia adapting to future needs as web trends change

      The Boston-based open source firm Acquia is dabbling in several technologies to ensure that, down the road, it stays as big a player in the market as it is now.

      Acquia uses the Drupal content management system to build websites for companies around the world and has produced and powered roughly 12 per cent of all Drupal implementations, according to Chris Stone, the head of engineering and chief product officer.

  • Pseudo-/Semi-Open Source (Openwashing)

  • Funding

  • BSD

    • Video: 30 Years of Minix
    • Haiku in 2016

      About once a year I like to put aside Linux distributions, and the various flavours of BSD, to look at Haiku. As the Haiku website tells us, “Haiku is an open source operating system that specifically targets personal computing. Inspired by the BeOS, Haiku is fast, simple to use, easy to learn and yet very powerful.”

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • UK open source drive ‘encourages citizens participation’

      The push by the UK government to use more free and open source software for its eGovernment services is helping to get citizens more involved, says Bernard Tyers, a user experience researcher working for the UK’s Home Office. “Everyone can see how the design and research process works, and users are helping to test our prototypes.”

    • Consultations launched for local authority common digital standard

      The views of council staff and other stakeholders are being sought for a draft Local Government Digital Service Standard devised to encourage use of common services and data registers between different authorities based on a similar approach used in Whitehall.

      With support from the Government Digital Service (GDS), a group of councils working as part of the LocalGov Digital network has been working to finalise guidelines for a common approach to service transformation and design.

    • Digital service standard set to mandate data reuse

      Last week, PublicTechnology reported that the new Local Government Digital Service Standard emerged from discussions held earlier this month at the offices of the Government Digital Service.

      Publication of the draft standard covering transactional services has been coordinated by digital practitioner network LocalGov Digital, and based on the existing central government standard could be adapted for councils.

    • Councils urged to use agile, open source and platforms

      LocalGovDigital publishes draft version of Digital Service Standard for local government

  • Licensing

    • Is SFLC Shooting Open Source in the Foot?

      The academic article by SFLC about ZFS is troubling and may unintentionally shoot free software licensing in the foot.

      When I was at Sun (as part of the team that released the Java Programming Language by starting the OpenJDK project) I often heard community concerns about the CDDL license. At the time the big complaint was about the “Choice of Venue” clause.

      I got involved because Sun had developed many essential Java libraries and distributed them under CDDL. The community requested a more permissive license and I was able to convince internal project leaders (and Sun’s lawyers) to make a licensing change for a handful of these projects. And there was much rejoicing.

      Based on my experience in helping Java to become open source I came to appreciate the legal hacks on copyright which make open source possible. It’s the free software license which uses copyright to enable sharing (vs. the default of disabling sharing).

    • The VMware Hearing and the Long Road Ahead

      On last Thursday, Christoph Hellwig and his legal counsel attended a hearing in Hellwig’s VMware case that Conservancy currently funds. Harald Welte, world famous for his GPL enforcement work in the early 2000s, also attended as an observer and wrote an excellent summary. I’d like to highlight a few parts of his summary, in the context of Conservancy’s past litigation experience regarding the GPL.

      First of all, in great contrast to the cases here in the USA, the Court acknowledged fully the level of public interest and importance of the case. Judges who have presided over Conservancy’s GPL enforcement cases USA federal court take all matters before them quite seriously. However, in our hearings, the federal judges preferred to ignore entirely the public policy implications regarding copyleft; they focused only on the copyright infringement and claims related to it. Usually, appeals courts in the USA are the first to broadly consider larger policy questions. There are definitely some advantages to the first Court showing interest in the public policy concerns.

  • Openness/Sharing

    • BrewDog’s open-source revolution is at the vanguard of postcapitalism

      Fast forward to now, and a very interesting thing just happened. BrewDog, the Scottish-based brewery whose beer outlets are spreading rapidly across the globe, just open-sourced its recipe collection. In a cheeky press release, its founders quipped: “Oh, and if you are from one of the global beer mega corporations and you are reading this, your computer will spontaneously combust, James Bond style, any second now.”

    • ‘Platform car’ is driving open-source design
    • The innovators: Skeleton car that is driving open-source design

      The OSVehicle units consist of parts that can be easily swapped without throwing away other working parts, which expands the vehicle’s lifespan, said Yuki. Its core unit contains the most complex parts of a vehicle, which means it is stable and ready to use, she added. Loddo compares it to the Android operating system for mobile phones, where developers can freely access the software as a base on which to build apps.

    • Open Hardware

      • Open Source Hardware is an opportunity for Synthetic Biology research – the DocuBricks approach by Tobias Wenzel

        There is a lesson to be learned from the incompleteness of commercial assembly-set documentations: Open Source Hardware is more than an assembly instruction. It is also about documenting design files and decisions along its functionality and in a modular fashion, complete with testing and calibration instructions. A good documentation enables the project to grow and improve without the doing of the inventor. Only in this way most projects can enfold their benefit well to society and technology companies. To be sure, documenting a hardware project is not easy and requires time. For this reason a handful scientists at the University of Cambridge (including the author), all with a background in technology and biology, recently started the DocuBricks initiative. DocuBricks is an open source and free software that makes documenting hardware and usage procedures easier. The name is a reference to modularity in the same way as Lego or BioBricks. As the name suggests, the editor part of the software guides the user through a modular documentation structure with relevant fields in a standardised, yet general format. The user can create a hierarchy of documentation bricks, explaining their function, implementation and assembly while referring to a parts library. The result is a XML document and a folder with construction and media files that is displayed with the viewer part of the software (a style sheet and script to enable interactivity).

      • Kicad hacking – Intra-sheet links and ERC

        I spent time looking at gEDA and Eagle when I wanted to get back into hardware hacking for my own ends; but neither did I really click with. On the other hand, a mere 10 minutes with Kicad and I knew I had found the tool I wanted to work with long-term.

      • Open-Source System 3D Prints from Custom Powders

        An open-source laser sintering printer has been used to print intricate 3D objects from powdered plastics and biomaterials. The system costs a fraction of equivalent commercial systems and could give researchers a DIY technique for working with their own specialized materials.

  • Programming

  • Standards/Consortia

Leftovers

  • GitHubber wants to revive the first Unix in a PDP-7 emulator

    An IT lecturer from the Australian state of Queensland wants to revive the very first Unix – the version written by Ken Thompson on a Digital Equipment Corporation PDP-7.

    While the PDP-11 is probably the most famous of the series – a genuine watershed in computer history, and a successful system that sold 600,000 units in its 20-year life on the market – the PDP-7 has its own place in history.

    Its most enduring contribution to the life of the sysadmin: it was the machine that then Bell Labs engineer Ken Thompson wrote the first Unix on, in assembly language, in 1969. As the Linux Information Project notes, it was also DEC’s first system to use a mass-storage-based operating system.

    That’s what Warren Toomey is working to re-create in this project.

  • Science

    • Footage of possible meteor in Scotland

      Footage has been recorded of what appears to be a meteor in the sky over Scotland.

      Police received a large number of calls after a big, bright flash was seen.

      People took to social media to report seeing a blue, white or green light, with some saying they also heard a rumbling sound.

      Driving instructor Bill Addison, from Buckie in Moray, recorded what appeared to be a meteor shooting across the sky on his dashboard camera.

      Mike Fleming captured similar footage on the road between Dunecht and Castle Fraser in Aberdeenshire.

      The “flash” was also caught on a security camera at Woodend, Lumphanan, Aberdeenshire, which was sent in by Craig Lindsay.

  • Health/Nutrition

    • Thousands of NHS nursing and doctor posts lie vacant
    • The Rising Threat of Religious Hospitals Denying Women Medical Care

      Imagine you are 20 weeks pregnant, only halfway through your pregnancy, when you start to miscarry. It’s the middle of the night; you call an ambulance and are rushed to the hospital. The hospital admits you and consults with a specialist who concludes that the only option is to induce labor and complete the miscarriage — either way, the fetus will not survive. But without induction of labor you could die too.

      But instead of acting quickly to save your life, the hospital admits you and watches you get sicker and sicker. For 10 hours, the hospital will do nothing to complete the miscarriage, even though the hospital knows that every moment the miscarriage drags on increases your risk of contracting a life-threatening infection, which you ultimately do.

    • Calls Grow for Wendy’s to Join Fair Food Program as Coalition Plans Major Protest of Fast-Food Giant

      It ensures farmworkers access to shade and water, increased pay, as well as freedom from sexual harassment and forced labor. Although fast-food giants like McDonald’s and Subway have signed Fair Food Agreements, Wendy’s has refused—instead opting for their own “Supplier Code of Conduct,” which activists say is less stringent and has no enforcement mechanisms.

  • Security

    • Security updates for Monday
    • Peer-Seeking Webcam Reveals the Security Dangers of Internet Things

      Last week security blogger Brian Krebs revealed that a popular internet-enabled security camera “secretly and constantly connects into a vast peer-to-peer network run by the Chinese manufacturer of the hardware.”

    • Joomla Sites Join WordPress As TeslaCrypt Ransomware Target

      Exploit kits infecting thousands of WordPress websites are setting their sights on the open-source content management system Joomla in a new campaign spotted by a researcher at the SANS Institute’s Internet Storm Center.

      “The group behind the WordPress ‘admedia’ campaign is now apparently targeting Joomla sites,” said Brad Duncan, security researcher at Rackspace. “We are starting to see the same traffic characteristics in infections that are associated with Joomla sites – as we did with the WordPress campaign,” Duncan said.

    • Most software already has a “golden key” backdoor: the system update

      In 2014 when The Washington Post Editorial Board wrote “with all their wizardry, perhaps Apple and Google could invent a kind of secure golden key they would retain and use only when a court has approved a search warrant,” the Internet ridiculed them. Many people painstakingly explained that even if there were somehow wide agreement about who would be the “right” people and governments to hold such an all-powerful capability, it would ultimately be impossible to ensure that such power wouldn’t fall in to the “wrong” hands.

  • Defence/Police/Secrecy/Aggression

    • Texas Academics Told to Avoid ‘Sensitive Topics’ to Prevent Angering Armed Students

      Here’s another swanky benefit of our out-of-control gun culture: university professors should be aware that their students might shoot them.

    • Kerry Phones Serbian PM Over Diplomats Killed in U.S. Libya Strike

      So, those American airstrikes recently in Libya, the ones for freedom and to defeat ISIS and banish Ant Man to hell? Yeah, darn it, they also killed two Serbian diplomats. But don’t worry, America’s own secretary of state John Kerry personally called the Serbian prime minister to say “Sorry, our bad, dude.”

    • Saudis lobby MEPs before arms embargo vote over Yemen

      Riyadh engaged in concerted effort to persuade European parliament not to pass amendment calling for EU sanctions because of bombing campaign

    • The Dulles Brothers and Their Legacy of Perpetual War

      I was intrigued by the 2015 release of David Talbot’s The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government. But it also reminded me of a 2014 book I had been wanting to read titled The Brothers: John Foster Dulles, Allen Dulles, and Their Secret World War by Stephen Kinzer. Since the earlier book covered both important brothers — the younger Allen who was Director of Central Intelligence and the elder John Foster who was Secretary of State — I decided to go with Kinzer.

      As it turned out, I was so fascinated by Kinzer’s discussion of the Dulleses that after finishing The Brothers, I dove right into Talbot’s The Devil’s Chessboard. I am so glad that I did. While there is some unavoidable overlap, reading the two books in quick succession is not at all redundant. In fact, they are such splendid complements of each other, that one almost wonders if the two authors coordinated.

  • Transparency Reporting

    • Freedom Of Information Act To Remain: Here Are Eight Things We Wouldn’t Have Known Without It

      A decision not to charge for Freedom of Information (FoI) requests has been hailed as a “victory for journalism”.

      The government revealed on Tuesday that there will be no legal changes to the FoI Act after a review of the legislation found it was “working well”.

    • Freedom of Information charges ruled out after review

      Freedom of Information requests – used by campaigners and journalists to ask questions of public bodies – are to remain free of charge, a minister says.

      Following a review of the law, Cabinet Office minister Matt Hancock said the FoI Act was “working well”.

      The FoI Commission was asked to examine it amid concerns within government that “sensitive information” was being inadequately protected.

      Its report said FoI had helped “change the culture of the public sector”.

      Mr Hancock said there would be no wholesale changes to the FoI Act.

    • Spain updates compendium of eGovernment rules

      The Spanish government has published an update of its Law on Electronic Administration. Two chapters have been added, on “Transparency and Access to POublic Information” and on “Electronic Judicial Administration”.

  • Environment/Energy/Wildlife

    • Coral bleaching in Qld is the ‘worst in 15 years’

      The worst coral bleaching in more than 15 years has hit Lizard Island off far north Queensland, scientists say, prompting fears about other northern parts of the Great Barrier Reef.

      Lyle Vail, who runs the Lizard Island Research Station north of Cairns, said the majority of the reef flat surrounding the island was showing signs of bleaching.

      “We do notice a bit of minor bleaching most summers but this year is exceptional – it’s the worst since 2002 – that year was quite bad,” he said.

  • Finance

    • CETA Legal Review Completed, Now Off To Parliaments And Governments For Approval

      The European Union and Canada have jointly announced the finalisation of the legal review for Canada-European Union Comprehensive Economic and Trade Agreement (CETA).

      The agreement, which originally was signed by the negotiators in 2014, was re-negotiated to address strong concerns with regard to the investor-state dispute settlement (ISDS) procedures.

    • Restaurants Demand State Freeze Servers’ Wage

      As an example, New York state’s hourly minimum wage for tipped workers rose from $5.00 to $7.50 on January 1 (standard, non-tipped, minimum wage is $9.00 an hour in the state), much to the dismay of the New York State Restaurant Association. The restaurant owners lobbying group sent a letter to NY Governor Andrew Cuomo demanding that he freeze the tipped wage for five years. This letter comes just weeks after the National Restaurant Association filed an appeal with the state Supreme Court, claiming that Cuomo’s plan to raise the minimum wage further by 2018 is part of a longstanding pattern of discrimination “against the hard working men and women that own New York’s restaurants.”

    • WaPo Factcheck Adds Confusion, Not Clarity, on Social Security

      In short, President Bush’s proposal for replacing a portion of the traditional Social Security system did offer a substantial bonanza for Wall Street in a way that was not true of President Clinton’s proposal for investing the trust fund. Secretary Clinton was not wrong to make this distinction, even if some of her comments were not entirely accurate, as Kessler points out.

    • EU referendum: Peter Mandelson breaks silence to warn over effects of Brexit

      British exporters would face trade tariffs of up to 20 per cent on goods such as cars, whisky, pharmaceuticals and fashion sold around the world if the UK pulled out of the European Union, the former Trade Commissioner Lord Mandelson will warn on Tuesday.

      In his first intervention in the referendum debate, the Labour peer will claim that the UK could not only lose access to the single European market but could also lose the EU’s preferential trading status in foreign markets.

  • PR/AstroTurf/Lobbying

    • This terrifying Rupert Murdoch quote is possibly the best reason to stay in the EU yet

      Are you on the fence about Brexit? Do you feel akin to Boris (pre-blatant leadership bid) dithering and mulling your decision over, considering what suits your personal circumstance?

      We think we may have something that’ll sway it for you.

      As you are no doubt aware, although media mogul Rupert Murdoch hasn’t declared which side he stands on in the referendum, there have been a few subtle hints as to his position.

    • Scalia Dined at the Great Trough of Corruption

      Antonin Scalia was the longest-tenured justice on the current Supreme Court, and a great friend to conservatives in his opinions. It turns out he also ate his share at the great trough of American corruption.

    • Antonin Scalia: The Billion-Dollar Supreme Court Justice

      Supreme Court Justice Antonin Scalia was worth billions of dollars to corporate America, if a Dow Chemical settlement made public Friday is any indication.

      Dow was in the midst of appealing a $1.06 billion class-action antitrust ruling, after a jury found that it had conspired with other chemical companies to fix prices for urethane, a material used in furniture and appliances.

      But because of Scalia’s death and the sudden unlikelihood of finding five votes on the Supreme Court to overturn the case, Dow decided to settle for $835 million, the bulk of the original award.

    • Donald Trump’s Appeal to White Nationalism

      AFTER TWO DECADES of studying the inner workings of extremist groups in the United States, Brian Levin, a professor at California State University in San Bernardino, has developed a routine for attending Ku Klux Klan rallies. He’ll tape an interview or two, collect whatever literature is available, see if he can spot any notable figures, and make a count of the demographics on hand. The aim, Levin says, is to maintain a degree of anonymity. That was the plan Saturday afternoon when he showed up to Pearson Park in Anaheim, California, for a demonstration by the local chapter of a Klan faction known as the Loyal White Knights.

    • Will it be Trump or Goldman Sachs?

      It’s largely a choice of style, not substance, dirty business as usual continuing no matter who succeeds Obama. Still, Snowden has a point.

      Hillary Clinton, like husband Bill, got super-rich through speechmaking, lucrative book deals and other Big Money handouts.

      Lots came from Wall Street and other corporate supporters – a rogue’s gallery of crony capitalist interests buying influence.

      Her public financial disclosures show she earned $2,935,000 from 12 speeches to Wall Street banks alone from 2013 – 2015, five for $225,000 (her usual fee).

    • Why Did It Take an Activist to Bring ‘Superpredators’ Into the Campaign?

      The fact that it took Black Lives Matter activist Ashley Williams to bring “superpredators” into 2016 presidential campaign coverage (AlterNet, 2/24/16) truly demonstrates the malfeasance of the corporate press.

    • Hillary Clinton Still Haunted by Discredited Rhetoric on “Superpredators”

      Hillary Clinton is relying on support from black voters to help her carry South Carolina in the Democratic primary on Saturday, but at a fundraiser in Charleston on Wednesday night, she found herself confronted by a young black activist demanding an apology.

      As video of the protest shows, the activist, Ashley Williams, interrupted Clinton’s remarks about criminal justice at the private event by unfurling a banner with the phrase “we have to bring them to heel.” Those words — language that has been taken as an offensive and racist characterization of young black teens as unruly animals — were used by the former first lady at a campaign rally for Bill Clinton in New Hampshire in January 1996.

  • Censorship

    • Fighting the phrase “Polish death camps” with education, not censorship

      However, where a line has to be drawn is when governments threaten to infringe upon the freedom of academic historians. And this appears to be the direction in which Poland’s government is heading, following two announcements made over the last week. Either one on its own would be worrying enough, but taken together they raise the spectre of concerted government interference in historical research.

    • Ridiculous Censorship

      Self-censorship during the final night of Putri Indonesia pageant show in a private TV station last week is really out of the proportion.

      During the show, the TV station decided to completely blur the torsos of contestants who donned the body-hugging Javanese kebaya dress.

    • China silences property mogul on social media after criticism of president

      The Chinese government has deleted the popular social media accounts of property mogul Ren Zhiqiang after he publicly criticized President Xi Jinping.

      On Sunday, the Cyberspace Administration of China ordered Chinese technology companies Sina and Tencent to shut down Ren’s microblog accounts on their platforms.

    • China’s Censorship Clampdown Stirs a Pushback

      A high-profile clash between China’s censors and an influential businessman with a huge social-media following marks a further tightening of a clampdown on public discourse under President Xi Jinping—one that is starting to generate unexpected pushback.

    • Chinese internet watchdog bans former tycoon Ren Ziqiang’s microblog
    • China’s ‘Donald Trump’ is latest victim of government crackdown
    • South Korea Embraces Ridiculous Right To Be Forgotten As Well

      I’m still in a position where I don’t understand this at all. If the information is somehow false or “illegal” I can understand the desire to remove it. But I have a lot more trouble understanding the ability to remove truthful and legal information just because someone doesn’t like it. This kind of system will always be abused to just censor perfectly reasonable and often useful information, just because it exposes something someone doesn’t like. It’s disappointing that South Korea appears to be embracing such a head in the sand approach to information.

    • White House Asked Google & Facebook To Change Their Algorithms To Fight ISIS; Both Said No

      Earlier this year, we wrote about how ridiculous the federal government’s view of Silicon Valley seemed to be, in that they had this weird belief that by nerding a little harder, we could somehow “disrupt” ISIS. The thinking seemed confused, and somewhat typical of people who don’t understand technology or how Silicon Valley works. It’s “magic wand” thinking. People who don’t understand technology tend to view technology as a sort of magic — and thus, they assume it can do anything. And, right now, a bunch of those people in the White House want that magic wand to make ISIS disappear from the Internet.

      Buzzfeed’s Sheera Frenkel has a great detailed report looking “inside” the administration’s attempt to have Silicon Valley help in the fight against ISIS. The main focus of a (not very secret) meeting held on Wednesday seemed to be entirely about fighting ISIS propaganda with American propaganda. As if that ever works. And, from the sound of it, the meeting was equally clueless about why ISIS propaganda is effective, while American propaganda flops.

    • Inside The Obama Administration’s Attempt To Bring Tech Companies Into The Fight Against ISIS

      They flew in from New York, San Francisco, and Los Angeles to hole up in a windowless D.C. conference room for nearly five hours on Wednesday — representatives of the country’s top tech and entertainment companies brainstorming with U.S. counterterrorism officials to tackle one tough question: how to stop the spread of ISIS online.

    • Obama Administration Asked Facebook And Google To Change Their Algorithms To Fight ISIS

      On 24th February, White House invited the biggest names in the tech world to discuss the plans to defeat ISIS online. However, the meeting only reflected the flawed approach of Obama administration that went on to ask Facebook and Google to change their algorithms to hide pro-ISIS stuff.

    • Chinese censors clamp down on popular online videos

      China’s dour censors have long maintained a lengthy naughty list, and used it to keep the country’s television sets unsullied by anything deemed to “lack positive thoughts and meaning.”

      Now, the Chinese Communist Party under President Xi Jinping has vowed to apply the same rules online, slamming shut an era of looser rules for Internet video, amid a sweeping campaign to reassert strict new controls over the country’s cultural life – a campaign motivated in part by fears that speech must be controlled lest a slowing economy sow dangerous unhappiness.

    • I Resign: The Writing Center’s Mission is to Teach Writing, Not Ideology

      I wish I could continue to work at the Writing Center because I feel that it’s important for all students, whether black or white, on financial aid or not, conservative or liberal, to have a place to review and strengthen their writing. Unfortunately, the Writing Center no longer seems to be that place. Until the Writing Center can return to its apolitical mission and forsake its acceptance and appeasement of political harassment, I regret that I must resign my position as a Writing Fellow.

    • Debate is good, but can it be imposed?

      The rise of campus censorship has helped reinvigorate a discussion about free speech across society.

    • The Latest Hillary Clinton Conspiracy Theory Doesn’t Make Sense
    • Is Twitter Censoring Hashtags Critical of Hillary Clinton?
    • Nintendo urged to FIRE feminist employee at centre of furious child pornography censorship row

      In her long essay, Rapp described people who possess child pornography as “simple possessors” or “mere possessors”, even though this is a serious crime.

      Her thesis jumps between discussing child pornography featuring “real children” and fictionalised depictions of sickening acts, meaning it often appears unclear what she is actually discussing.

      However, the content of the essay has provoked a furious response among many of the people who have read it.

      Rapp wrote: “Criminalising the the possession of a type of media – whether violent video games… controversial political or religious texts, or child pornography – is tantamount to criminalising thought, and should be above countries like the U.S. and Japan who have such strong freedom of speech protections.”

  • Privacy

    • Snooper’s charter to extend police access to hack phones and access internet data

      Latest version of investigatory powers bill will allow police to hack people’s computers and view browsing history

    • Sensing Public Support Waning, UK Fast Tracks Snooper’s Charter

      For some time now, we’ve been covering the UK’s plan — led by Home Secretary Theresa May — to pass a new Snooper’s Charter that would increase surveillance powers greatly in the UK. There’s been a growing amount of criticism of the plan in the UK, so rather than respond to it, May has simply moved to fast track the bill, officially called the Investigatory Powers Bill. The bill will officially be “published” today on March 1, and then will likely be voted on before the end of April.

    • The New EU-US Data Sharing Pact Still Allows Mass Surveillance

      A controversial, over decade-old arrangement used to transfer data of European citizens to US companies such as Facebook appears soon to be replaced: The draft text of the EU-US Privacy Shield, the data regulation pact rushed through to substitute the contentious Safe Harbour agreement, was published on Monday.

      Safe Harbour has faced renewed scrutiny since the 2013 Snowden revelations, and a new agreement has been anticipated for months. But surveillance law experts, as well as Max Schrems, who brought on challenges against Safe Harbour in the first place, say that the EU-US Privacy Shield doesn’t solve key privacy problems, and that it still facilitates mass surveillance.

    • GCHQ spy back at work after Plenty of Fish date rape claim

      Two women claim police did not believe that a spy working at the UK eavesdropping headquarters GCHQ raped them. The first woman claims the 28-year-old man – who they allege still works for the secretive agency – raped her in 2010 after they struck up a relationship on the matchmaking website Plenty of Fish.

      The second claimant, who also worked for GCHQ, which is in Gloucestershire, said the same man attacked her in 2012. In both cases, the man – who cannot be named for legal reasons – was given a harassment warning.

    • Encryption still a low priority for too many cloud users

      The vast majority of organisations plan to store confidential or sensitive data in the cloud by 2018, but despite that being just two years away, only a third have already set out an encryption plan which can be described as consistently applied across the entirety of the enterprise.

      According to the 2016 Global Encryption and Key Management Trends Study, more than half of global organisations are already transferring sensitive or confidential information to the cloud, with 56 percent of respondents stating that this already forms part of their data storage strategy, whether or not that data is encrypted or made unreadable via some other mechanism.

    • Next moves for the IPB: Split, Delay or Publish?

      Last week we heard three parliamentary committees’ criticisms of the Investigatory Powers Bill (IPB). All in all they had 123 recommendations about changes that need to be made to the Bill. So what’s next for this huge surveillance Bill?

    • The push-me-pull-yous of public policy: surveillance and freedom of information

      Surveillance and freedom of information are the push-me-pull-yous of public policy.

    • Declassified letter from 2002 defends warrantless taps

      A previously classified letter defending President George W. Bush’s controversial warrantless wiretap program deployed in the aftermath of the Sept. 11 attacks sought to justify the strategy as “the most effective method’’ to defend the country from additional assaults.

    • 2002 Letter Lays Out Bush’s Legal Authority For Conducting Surveillance After 9/11
    • Revealed: How The Bush Administration Argued Legal Loopholes for NSA Snooping
    • Classified 2002 Letter on NSA Eavesdropping Is Made Public
    • Apple Wins Big: Court Rejects FBI’s Argument For Hacking Drug Dealer’s iPhone
    • Former CIA Agent Barry Eisler Turned Writer on Imagining/Predicting Gov’t Surveillance
    • Apple to Court: FBI’s Failure Should Not Force Apple to Undermine Global Security
    • Voter Privacy: What You Need to Know About Your Digital Trail During the 2016 Election
    • Judge In Different Apple Case Says That All Writs Act Doesn’t Mean Apple Needs To Help Feds Break Into Phone
    • Spy continues to work at GCHQ despite rape allegations

      A GCHQ spy accused of rape by two women is still working at the secretive security agency because the police “did not properly investigate” the women’s claims, one of the alleged victims has said.

      The first alleged victim, who met the 28-year-old security officer through the dating website Plenty of Fish in 2010, said police ignored her claims twice, even after a second victim, a woman who worked with him at the GCHQ offices in Gloucestershire, came forward in 2013, the Mirror reports.

    • ACLU Sounds Alarm As Obama Administration Plans Quiet NSA Expansion

      Civil liberties advocates slammed reports on Friday that the Obama administration is poised to authorize the National Security Agency (NSA) to share more of its private intercepted communications with other U.S. intelligence agencies without expanding privacy protections.

      “Before we allow them to spread that information further in the government, we need to have a serious conversation about how to protect Americans’ information,” Alex Abdo, a staff attorney with the ACLU’s Speech, Privacy and Technology Project, told the New YorkTimes.

      The change would loosen restrictions on access to the communications that are collected in mass data sweeps, including emails and phone calls, the Times reported, citing “officials familiar with the deliberations.”

    • Apple Wins Major Court Victory Against FBI in a Case Similar to San Bernardino

      Apple scored a major legal victory in its ongoing battle against the FBI on Monday when a federal magistrate judge in New York rejected the U.S. government’s request as part of a drug case to force the company to help it extract data from a locked iPhone. The ruling from U.S. Magistrate Judge James Orenstein was issued as part of the criminal case against Jun Feng, who pleaded guilty in October to drug charges. It is a significant boost to Apple’s well-publicized campaign to resist the FBI’s similar efforts in the case of the San Bernardino killers.

    • Want To Report A Dangerous Drug Dealer? Just Enter Your Personal Info Into The DEA’s Unsecured Webform

      Chris Soghoian, the ACLU’s chief technologist, has decided to troll the DEA. His complaint is valid, though. The problem is, how do you troll the DEA when it’s almost impossible to find the contact info of the person you want to speak to? Just like the FBI has more options at its disposal than simply demanding Apple help it beat down an iPhone’s front door, Soghoian was able to route around the DEA’s unforthcoming attitude.

    • FBI Claims It Has No Record Of Why It Deleted Its Recommendation To Encrypt Phones

      Then, last year, I noticed that the page had been deleted. Seemed curious, so I sent in a Freedom of Information Act (FOIA) to the FBI to better understand why that page had magically been deleted, just at the time it seemed to contradict the FBI Director’s statements about encryption.

    • Courts, DOJ: Using Tor Doesn’t Give You A Greater Expectation Of Privacy

      In this month alone, we’ve had two federal judges and the DOJ state that there’s no expectation of privacy in IP addresses. This would normally be something covered by the Third Party Doctrine — where an IP address is part of the records retained by ISPs, and therefore, can be accessed with subpoenas rather than warrants.

      The twist, though, is that all of these statements were made in reference to people who made an active effort to obscure their IP addresses by using Tor.

    • Privacy Advocates Blast Plan to Expand NSA Data Sharing

      The Obama administration plans to increase the amount of private communications the National Security Agency can share with other government agencies without first adding privacy protections, according to a report published last week in The New York Times.

      The plan would ease restrictions on the amount of intercepted email and telephone intelligence the NSA gathers, including bulk collection of satellite communications, phone data between foreigners, and messages from overseas that U.S. allies provide, according to the report, which cited unnamed officials familiar with the deliberations.

      The move represents a major expansion of surveillance and data sharing authority and has been a longstanding concern of privacy groups, according to Marc Rotenberg, president of the Electronic Privacy Information Center.

      “There are significant privacy implications that EPIC will examine in detail,” he told the E-Commerce Times.

    • CIA And NSA Directors Blame The Media For Terrorists Using Encryption

      When it comes to the conversation that’s going on about the use of encryption, CIA director John Brennan and NSA Deputy Director Rick Ledgett have acquitted themselves rather poorly on a regular basis. It’s been an ongoing source of frustration to see the aftermath of the Paris terrorist attacks in particular devolve into a discussion on encryption, despite all evidence suggesting that those attacks weren’t planned using any kind of encryption at all. That didn’t keep Brennan from claiming that the CIA was unable to keep attacks from occurring due to encryption, nor has it stopped the calls from intelligence officials for even more data collection, despite the fact that those same officials have proven to be soft targets for hackers themselves. Ledgett, meanwhile, has proven to be an adversary of the free press, cheering on the destruction of computers from The Guardian.

    • European Pact Legalizes Facebook, Google, Amazon Data Transfers

      Privacy advocates railed Monday after the European Union unveiled a 128-page framework for trans-Atlantic data transfers that, the advocates said, amounts to little more than “10 layers of lipstick on a pig.” The document outlines the specifics of the EU-U.S. Privacy Shield, which replaces the 15-year-old Safe Harbor agreement struck down in October in a case that pitted Austrian grad student Max Schrems against Facebook[ticker symb=FB]. Schrems alleged Facebook misused Europeans’ data in cooperation with a National Security Agency program. Facebook has denied the allegation. U.S. spying tactics fell under scrutiny in 2013 after former NSA contractor Edward Snowden released thousands of classified documents allegedly detailing mass surveillance by the government.

    • ‘Privacy shield’ – the new deal governing how Europe’s user data is sent to the US
    • Privacy Shield doomed from get-go? NSA bulk surveillance waved through

      The European Commission has published details of its transatlantic “Privacy Shield” agreement, which is designed to ensure that personal information of citizens is protected to EU standards when it is sent to the US—even though it would appear that the NSA will continue to carry out bulk collection of data under the new pact.

      The new deal replaces the earlier Safe Harbour framework, which was struck down by the Court of Justice of the European Union (CJEU) following a complaint by privacy activist Max Schrems.

      An accompanying Privacy Shield FAQ released by Brussels’ officials explained that there are four main elements. According to the commission, the new agreement will “contain effective supervision mechanisms to ensure that companies respect their obligations, including sanctions or exclusion if they do not comply.”

    • System Updates: Governments Can Hack Most Software Using This “Golden Key” Backdoor

      When you read the headlines like “FBI is forcing Apple to create a backdoor in their products”, what you are really reading is that the FBI is forcing iPhone-maker to use the “pre-existing software update backdoor” present in iPhones. Surprisingly, a backdoor already exists in most software in the form of system updates and the US government is looking to exploit the same.

    • Leaked! Details Of The New Congressional Commission To Take On The Encryption Issue

      Back in December, we wrote about plans by Rep. Mike McCaul and Senator Mark Warner to put together a “commission” to figure out what to do about the encryption “issue.” In his speech, McCaul did at least say that “providing a backdoor into everybody’s iPhone was not going to be a very good strategy” since it would open things up to hackers, but at the very same time, he kept saying that we had to somehow stop bad people (terrorists, criminals, child predators) from using encryption. He also keeps insisting that the Paris attackers used encryption, despite lots of evidence to the contrary. So it’s not entirely clear what the point of this Commission is, other than to chase down some mythical solution that doesn’t exist.

      The basic problem is this: to have real security you need strong encryption. And if you have strong encryption, people who are both good and bad can use it. So either you undermine strong encryption for everyone — harming the vast majority of good people out there — or you allow strong encryption, meaning that some bad people can use it. The only way to have strong encryption but not allow the bad guys to use it is to have a technology distinguish who is “bad” from who is “good.” I’m pretty sure that’s impossible because there’s no universal standard for what makes a “bad” or “good” person, and definitely not one that can be implemented in device hardware or software. So a commission seems like a waste of time.

    • NSA Spying, Privacy and the Fourth Amendment: The Views of U.S. Presidential Candidates

      Sanders, who voted against the Patriot Act and the U.S.A. Freedom Act, stated in a Time article last year: “Do we really want to live in a country where the NSA gathers data on virtually every single phone call in the United States – including as many as 5 billion cellphone records per day? I don’t.”

      Arguing against the U.S.A. Freedom Act in 2015, Sanders wrote: “Do we really want our government to collect our emails, see our text messages, know everyone’s Internet browsing history, monitor bank and credit card transactions, keep tabs on people’s social networks? I don’t.”

      “The Intercept” (theintercept.com) funded by billionaire Pierre Omidyar teamed with Glenn Greenwald, Laura Poitras, and former Nation writer Jeremy Scahill, has become the custodian of Snowden’s immense archive of classified documents, which it continues to mine for stories.

      Edward Snowden is living in asylum in Russia and currently in negotiations with the U.S. Justice Department. In February, he told a libertarian forum he will return home if he is guaranteed a “fair trial” and “can make a public interest defense of why this was done and allow a jury to decide.”

    • The Most Important Passages From Apple’s Challenge to the FBI

      GovtOS. That’s what Apple Inc. calls the newest product in its pipeline. It’s not the brainchild of the gadget masters in Cupertino but rather an iPhone operating system conceived by some buttoned-down folks in Washington, D.C. Unlike the latest iPhone or iPad, it wasn’t revealed on a stage before thousands of the faithful. Instead, it was unveiled in a stark response to the Obama administration’s attempt to force the computer maker to assist in a terrorism probe. And, Apple has warned, it may someday lead to every American being made an unwilling assistant to law enforcement.

    • ‘I’d move heaven and Earth’ to access Lavrov’s emails – former head of NSA and CIA

      Privacy seems less and less attainable these days, as foreign spy agencies target top political figures. The former director of both the NSA and CIA told US Today that he’d “move heaven and Earth” to access Russian Foreign Minister Sergey Lavrov’s email.

      Retired four-star general Michael Hayden, the only person who has ever served as both the director of the NSA and CIA, made the comments while criticizing former Secretary of State Hillary Clinton’s use of a private server for emails.

    • Spy who used Plenty of Fish dating site is accused of rape by two women but is still working for GCHQ because ‘police did not take their claims seriously’

      A spy accused of rape by two women, including one he met on dating website Plenty of Fish, is still working at GCHQ amid allegations police did ‘not take their claims seriously’.

      Both alleged victims say police ignored their claims about the national security expert, who is still working at the top secret intelligence headquarters in Gloucestershire.

      Details of the case emerged in a civil court hearing in which it was revealed that the worker had once been dismissed by GCHQ managers after child porn was discovered on his computer.

    • Spy accused of rape still working for GCHQ because ‘police did not properly investigate’ claims, alleged victim says

      A secret service official accused of rape by two different women he has had relationships with is described him as ‘untouchable’

  • Civil Rights

    • Panel: Poland’s constitutional crisis endangers democracy

      An international human rights commission says a crisis affecting the functioning of Poland’s Constitutional Tribunal has endangered the rule of law, democracy and human rights.

    • Council of Europe criticises Poland’s court changes – report

      The Council of Europe’s advisory body has said reforms of Poland’s constitutional court pose a danger to the rule of law in the European Union member state, dealing another blow to the eurosceptic Warsaw government’s legal changes.

      Poland asked the Council’s Venice Commission to comment on the legal changes after parliament overruled appointments made to the tribunal by the previous government, causing uncertainty over its proceedings.

    • Police Shoot 17-Year-Old Teenager For Refusing To Drop Broomstick

      On Saturday night, two Salt Lake City officers shot a black teenager in his torso because he refused orders to drop his weapon — a broomstick. The shooting, which left the teen in critical condition, led to clashes between protesters and police.

      The Salt Lake City Police Department says the shooting occurred when two officers saw two men, including 17-year-old Abdi Mohamed, attacking another man with metal objects. In the officers’ version of events, Mohamed refused to drop his weapon and moved to attack the victim, prompting the officers to open fire.

    • Virginia Senate Committee Approves Bill to Withhold Public Employee Information

      The legislation was passed by the General Laws and Technology Committee whose rationale was to protect the private information of public employees from possible hackers.

    • Virginia Senate Votes To Exempt Police Officers’ Information From FOIA Responses

      Way to go, Virginia. In a time when police accountability is (finally!) a mainstream media topic, the Virginia state legislature is having none of it.

    • Federal Judge Says Third Party Doctrine A Perfectly ‘Good Law;’ No Warrants Needed To Obtain Cell Location Records

      Back in December, a Connecticut state court ruled that tracking people in near-real time with cell site location info required the use of a warrant. Three months later, a Connecticut federal court has ruled law enforcement can obtain CSLI without a warrant, in bulk and for extended periods of time. While the opinion doesn’t address the use of subpoenas and CSLI as a makeshift Stingray (for real-time tracking), it does come down firmly on the side of the government’s interpretation of the Third Party Doctrine.

    • Freed from Detention in Bahrain, U.S. Journalist Describes Interrogation & Ongoing Crackdown

      We continue our exclusive interview with one of four U.S. journalists who were detained in the Gulf state of Bahrain and released Sunday after an international outcry. Anna Therese Day and her camera crew were in Bahrain during protests marking the anniversary of the kingdom’s February 2011 uprising. She describes their interrogation and the ongoing crackdown on journalists and human rights advocates in Bahrain.

    • Only In America: An Indiscreet Selfie Can Put A Kid In Prison

      Did you know that if you are an American under 18 years old and you use your cell phone to send a nude “selfie” of yourself to a friend, you can be convicted of manufacturing and distributing “child pornography” and sent to prison? In case you are too old to be in the loop, a “selfie” is a photo that one makes of oneself.

      This is how expansively prosecutors, whose main purpose in life is to ruin as many people as possible, interpret laws passed to protect children from sexual exploitation.

    • When Immigration Detention Becomes a Death Sentence

      New report shows ICE is not holding immigration detention facilities accountable for medical neglect.

      On an April morning in 2012, at about 5:24 a.m., a guard inside the Denver Contract Detention Facility initiated a Code Blue emergency because he saw a detainee in medical distress. Minutes later, nursing staff arrived and found 46-year-old Evalin-Ali Mandza lying on the bed in his cell, holding his chest, and complaining of severe chest pain. He was having a heart attack.

      Denver Contract Detention Facility (DCDF) is one of approximately 250 detention facilities around the country that hold immigrants with pending deportation proceedings. It is operated by GEO Group, Inc. — a private prison company with annual revenues of nearly $1.7 billion — under a contract with Immigration and Customs Enforcement (ICE), the federal agency responsible for detaining and deporting undocumented immigrants.

      After moving Mr. Mandza out of his cell, a nurse attempted to take an electrocardiogram. However, she was unable to get a reading because she had not been trained on the EKG machine and did not know how to use it. She then performed the wrong test. Once the nurse performed the correct test, she was unable to interpret the results because she had not been trained on this either.

    • Victory! State Department Will Try to Fix Wassenaar Arrangement

      Regular readers of this blog will likely be familiar with the Wassenaar Arrangement, a 41-nation agreement intended to regulate the export of certain “dual-use” technologies, such as guns and fissile material. In December 2013, the list of controlled technologies was amended to include surveillance systems for the first time and the participating countries have slowly been rolling out their implementations ever since. Today, news outlets in Washington DC are reporting that the State Department has finally agreed to try to renegotiate the language of the Wassenaar Arrangement to eliminate the 2013 changes.

  • DRM

    • Digital Rights Management Faces “Big Data,” Multiple-Rightsholder Challenges

      Managing copyright in digital musical works can be difficult because there are multiple rights holders and no standards for exchanging the massive amounts of data involved. Digital rights management services LyricFind and Rumblefish are among organisations working to streamline access to online content, company chiefs say.

  • Intellectual Monopolies

    • UNITAID Report On Delinking R&D Costs From Medicines Prices

      Delinkage of research and development costs from medicines prices could “vastly expand” access to medicines by drastically dropping costs of the knowledge component of health products, innovative medicines R&D facility UNITAID says in a new report.

      The report, entitled: “An economic perspective on delinking the cost of R&D from the price of medicines,” [pdf] was published on 26 February. The report summary from UNITAID is available here.

    • Re:Route – A Ready Reckoner Of Alternative R&D Models For Health

      The student-driven project, funded by Open Society Foundations, is a qualitative review of the alternative R&D initiatives around the world, in time for the United Nations High Level Panel on Access to Medicines dialogue next month.

    • Copyrights

      • Microsoft Sues Pirating Comcast Subscriber

        Microsoft has filed a complaint at a federal court in Washington accusing a Comcast subscriber of activating various pirated copies of its software. The account was identified by Microsoft’s in-house cyberforensics team which logs suspicious “activation patterns.”

      • Pirate radio playlist

        One of the UK’s most interesting historical legacies in music does not involve the actual bands that made up the British Invasion, but rather the people who played these band’s records illegally.

      • FBI Busts Movie Industry Insider for DVD Screener Leaks

        A 31-year old man from Lancaster has been arrested following an FBI investigation into several leaked DVD-screeners. The man, who worked in the entertainment industry, pleaded guilty to uploading screener copies of The Revenant and The Peanuts Movie to the private BitTorrent tracker Pass The Popcorn.

02.28.16

Links 28/2/2016: Raspberry Pi 3, Copyleft Fights

Posted in News Roundup at 5:52 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Manufacturers start to lock down Wi-Fi router firmware. Thanks, FCC.

    Curious. The FBI wants Apple to open up its own software while the FCC wants wireless router manufacturers to lock theirs down. And both demands are unacceptable, misguided, and will ultimately fail. Why? When it comes to the former, well, we don’t have time to wade through that quagmire, but as to the the latter, we have to go back to 2015 …

    [...]

    Why is this lockdown a bad idea? Because there are thousands of private users, academic researchers, and developers who rely on having wireless routers that are capable of modification. These modifications are to add functionality, fix bugs in the original product (all too common in consumer devices), and improve performance. However, the new FCC rules as written place a complex technical burden on manufacturers to comply and the only way to comply cheaply, is for the manufacturer to lock down their products completely rather than just the wireless components.

  • TP-LINK WiFi Router Firmware Locked Down Due to New FCC Rules

    Last year the FCC rules issues new rules that would prevent installing OpenWRT, DDWRT, or other firmware, but it went viral, and finally the commission launched a consultation with the community which ended by the FCC issued a statement “Clearing the Air on Wi-Fi Software Updates” last November, making the rules more accurate saying that the rules were now “narrowly-focused on modifications that would take a device out of compliance”.

  • Reading comprehension is a big problem in open-source

    Houston, we have a problem. Linux users can’t read good [sic]. Zoolander reference. Word. What am I on about, and where can you buy some of the stuff, you be asking? You can’t, it’s all au naturale, Dedoimedo freerange extract.

    To be serious, this topic is about the flow of information in the Linux world. After having a rather horrible autumn season of distro testing, I happened to come across commentary about my reviews on various forums and portal. It’s always when the negative is being discussed, because articles that praise products never ever get any reaction from the wider community. To put it bluntly, the message was not coming across.

  • Telecoms Band Together to Virtualize and Open Source their Network Stacks

    A group of telecommunication companies and their software providers have come together to bring Network Functions Virtualization to their data centers. NFV is an industry-developed framework to virtualize telecom networks.

    The group, formed under the umbrella of European Telecommunications Standards Institute (ETSI) is called OSM, which stands for Open Source MANO. MANO, which stands for Management and Orchestration, is the part of the NFV framework consisting of orchestrator software, virtualized network functions manager (VNFM) and Virtualized Infrastructure Manager (VIM).

  • Oracle/Java/LibreOffice

  • CMS

  • BSD

    • BSDCan: OpenBSD presentations

      The event will be held on June 8-11th at the University of Ottawa in Canada.

    • The Release Of LLVM 3.8 Should Be Imminent

      While LLVM/Clang 3.8 was supposed to be released last week, its release got delayed but it looks like it should finally ship in the next few days.

      On Tuesday, LLVM release manager Hans Wennborg announced the release of LLVM 3.8 Release Candidate 3. He mentioned, “If there are no regressions from previous release candidates, this will be the last release candidate before the final release.”

    • FreeBSD 10.3 Is Almost Ready For Release

      The third beta of the upcoming FreeBSD 10.3 is now available for testing.

      FreeBSD 10.3 Beta 3 brings updated network drivers, improvements to the filemon device, Hyper-V fixes, a few new commands, and various other minor enhancements and corrections.

    • FreeBSD and ZFS

      For nearly seven years, FreeBSD has included a production quality ZFS implementation, making it one of the key features of the FreeBSD operating system. ZFS is a combined file system and volume manager. Decoupling physical media from logical volumes allows free space to be efficiently shared between all of the file systems. ZFS introduced unprecedented data integrity and reliability guarantees to storage on FreeBSD. ZFS supports varying levels of redundancy for tolerance of hardware failures and includes cryptographic checksums on all data to guard against corruption.

  • FSF/FSFE/GNU/SFLC

  • Project Releases

    • Cloud Explorer is back with v7.1

      Cloud Explorer is a open-source Amazon S3 client that works on any operating system. The program features a graphical or command line interface. Today I just released version 7.1 and hope that you give it a test drive. Feedback and uses cases are always encouraged.

  • Public Services/Government

    • Denmark to accelerate eHealth technology

      Danish public authorities are promoting the development and use of eHealth solutions. Increasing technology-use in healthcare, care for the elderly, social services and in education will “maintain or increase the quality of public welfare services while at the same time reducing public expenditure”, according to an English introduction to Denmark’s Strategy for Digital Welfare (2013-2020), published by the country’s Agency for Digitisation.

  • Licensing

    • Winning the copyleft fight

      Bradley Kuhn started off his linux.conf.au 2016 talk by stating a goal that, he hoped, he shared with the audience: a world where more (or most) software is free software. The community has one key strategy toward that goal: copyleft licensing. He was there to talk about whether that strategy is working, and what can be done to make it more effective; the picture he painted was not entirely rosy, but there is hope if software developers are willing to make some changes.

      Copyleft licensing is still an effective strategy, he said; that can be seen because we’ve had the chance to run a real-world parallel experiment — an opportunity that doesn’t come often. A lot of non-copyleft software has been written over the years; if proprietary forks of that software don’t exist, then it seems clear that there is no need for copyleft; we just have to look to see whether proprietary versions of non-copyleft software exist. But, he said, he has yet to find a non-trivial non-copyleft program that lacks proprietary forks; without copyleft, companies will indeed take free software and make it proprietary.

    • I’m Part of SFConservancy’s GPL Compliance Project for Linux

      I believe GPL enforcement in general, and specifically around the Linux kernel, is a good thing. Because of this, I am one of the Linux copyright holders who has signed an agreement for the Software Freedom Conservancy to enforce the GPL on my behalf. I’m also a financial supporter of Conservancy.

    • Welte: Report from the VMware GPL court hearing
    • Report from the VMware GPL court hearing

      Today, I took some time off to attend the court hearing in the GPL violation/infringement case that Christoph Hellwig has brought against VMware.

      I am not in any way legally involved in the lawsuit. However, as a fellow (former) Linux kernel developer myself, and a long-term Free Software community member who strongly believes in the copyleft model, I of course am very interested in this case – and of course in an outcome in favor of the plaintiff. Nevertheless, the below report tries to provide an un-biased account of what happened at the hearing today, and does not contain my own opinions on the matter. I can always write another blog post about that :)

      I blogged about this case before briefly, and there is a lot of information publicly discussed about the case, including the information published by the Software Freedom Conservancy (see the link above, the announcement and the associated FAQ.

    • I bought some awful light bulbs so you don’t have to

      Anyway. Next step was to start playing with the protocol, which meant finding the device on my network. I checked anything that had picked up a DHCP lease recently and nmapped them. The OS detection reported Linux, which wasn’t hugely surprising – there was no GPL notice or source code included with the box, but I’m way past the point of shock at that. It also reported that there was a telnet daemon running. I connected and got a login prompt. And then I typed admin as the username and admin as the password and got a root prompt. So, there’s that. The copy of Busybox included even came with tftp, so it was easy to get copies of tcpdump and strace on there to see what was up.

    • SFC: GPL Violations Related to Combining ZFS and Linux
    • The Linux Kernel, CDDL and Related Issues

      The license terms on the Linux kernel are those of GPLv2. This is the unanimous consensus of the extensive community of copyright holders. No other terms, or modifications of those terms, are represented in any document as the consensus position of the relevant parties.

    • Conservancy’s Executive Director Testifies in Favor of NYC Free and Open Source Software Acts
    • Match Donation Extended until March 1st
  • Openness/Sharing

  • Programming

    • Java finally gets microservices tools

      Lightbend, formerly known as Typesafe, is bringing microservices-based architectures to Java with its Lagom platform.

      Due in early March, Lagom is a microservices framework that lightens the burden of developing these microservices in Java. Built on the Scala functional language, open source Lagom acts as a development environment for managing microservices. APIs initially are provided for Java services, with Scala to follow.

    • documentation first

      I write documentation first and code second. I’ve mentioned this from time to time (previously, previously) but a reader pointed out that I’ve never really explained why I work that way.

      It’s a way to make my thinking more concrete without diving all the way into the complexities of the code right away. So sometimes, what I write down is design documentation, and sometimes it’s notes on a bug report[1], but if what I’m working on is user-visible, I start by writing down the end user documentation.

Leftovers

  • Science

    • These Chicago teens can’t graduate until they learn some compsci

      The Chicago Public Schools district has become the first in the nation to make computer science training a requirement for high school graduation.

      The district, the third-largest in the US, says that starting with next year’s freshman class (graduating in 2020), all students will be required to complete one credit in a computer science class as a core subject alongside other fields such as science, English and mathematics.

      “Making sure that our students are exposed to STEM and computer science opportunities early on is critical in building a pipeline to both college and career,” said Chicago Mayor Rahm Emanuel.

    • Kauppalehti: Finnish tire firm manipulated test results

      Finnish tire manufacturer Nokian Renkaat manipulated test results for years, according to a report on Friday in the business daily Kauppalehti. The company’s share price took a dive on the reports.

    • The left half – right half divide in human brains is a myth, scientist says

      The myth is thought to stem from social stigmatisation of left handed people and a misunderstood Noble Prize winning research project

  • Security

    • Thursday’s security updates
    • Friday’s security updates
    • Rewrite Everything In Rust

      I just read Dan Kaminsky’s post about the glibc DNS vulnerability and its terrifying implications. Unfortunately it’s just one of many, many, many critical software vulnerabilities that have made computer security a joke.

      It’s no secret that we have the technology to prevent most of these bugs. We have programming languages that practically guarantee important classes of bugs don’t happen. The problem is that so much of our software doesn’t use these languages. Until recently, there were good excuses for that; “safe” programming languages have generally been unsuitable for systems programming because they don’t give you complete control over resources, and they require complex runtime support that doesn’t fit in certain contexts (e.g. kernels).

      Rust is changing all that. We now have a language with desirable safety properties that offers the control you need for systems programming and does not impose a runtime. Its growing community shows that people enjoy programming in Rust. Servo shows that large, complex Rust applications can perform well.

    • Forthcoming OpenSSL releases
    • Improvements on Manjaro Security Updates
    • What is Glibc bug: Things To Know About It
    • IRS Cyberattack Total is More Than Twice Previously Disclosed

      Cyberattacks on taxpayer accounts affected more people than previously reported, the Internal Revenue Service said Friday.

      The IRS statement, originally reported by Dow Jones, revealed tax data for about 700,000 households might have been stolen: Specifically, a government review found potential access to about 390,000 more accounts than previously disclosed.

      In August, the IRS said that the number of potential victims stood at more than 334,000 — more than twice the initial estimate of more than 100,000.

    • Protect your file server from the Locky trojan
    • Google’s Project Shield defends small websites from DDoS bombardment

      If you want to apply, there’s an online form to fill in here which asks for the details of your site, and poses a few other questions about security and whether you’ve been hit by DDoS in the past. Note that you’ll need to set up a Google account if you don’t already have one.

    • 90 Percent of All SSL VPNs Use Insecure or Outdated Encryption

      Information security firm High-Tech Bridge has conducted a study of SSL VPNs (Virtual Private Networks) and discovered that nine out of ten such servers don’t provide the security they should be offering, mainly because they are using insecure or outdated encryption.

  • Defence/Police/Secrecy/Aggression

    • Mini-World War Underway in Syria: The Players

      Various Kurdish forces working with Washington and/or Moscow are taking advantage of the chaos to extend Kurdish territories, in Syria, Iraq and odd bits of Turkey. The Islamic State has snatched land while all the focus was on the other groups, and still holds substantial territory in Syria and Iraq. The Saudis have threatened to invade Syria with ground troops, which the Iranians say they will respond to militarily.

    • Court Considers Releasing Key Documents Governing Secretive Targeted Killing Program

      Yesterday, in one of the three ACLU cases challenging the extreme secrecy shrouding the government’s targeted killing program, a federal judge in New York ordered the government to turn over, for the court’s review and possible release, three crucial documents containing the law and policy that govern the program. The full order is not yet public because, as the judge wrote, she is giving the government “time to vet opinions and orders for classification issues that might escape the notice of a reader of news media in which information that the Government considers to be classified routinely appears.”

  • Finance

  • Censorship

    • Chelsea Manning denied EFF articles because US Army cares about copyright

      Apparently the US Army is interested in a zealous interpretation of copyright protection, too.

      According to the Electronic Frontier Foundation, a Chelsea Manning supporter recently attempted to mail Manning a series of printed EFF articles about prisoner rights. Those materials were withheld and not delivered to her because, according to the EFF, the correspondence contained “printed Internet materials, including email, of a volume exceeding five pages per day or the distribution of which may violate U.S. copyright laws.”

    • Did Twitter’s Exec Censor #WhichHillary in advance of Key Primaries? Twitter users speak out

      Considering the nature of Twitter’s algorithm, it may just be a coincidence that Twitter suspended activist account @GuerrillaDems, at the same time that its massively popular hashtags #WhichHillary & #WhichHillaryCensored were suddenly absent from many users’ trending lists. Twitter now says that the suspension of @GuerrillaDems was a mistake.

      It is entirely natural, and important, for users to be suspicious here. We don’t know whether it was intentional removal, or algorithmic coincidence. However, it is a fact that this past Sunday, Clinton held a political event headlined by Twitter CEO Omid Kordestani. It is also a fact that Clinton’s staff has exerted pressure on members of the media in the past, using its “muscular” influence to promote a certain narrative at the Atlantic, and suggesting experts to rebut Julian Assange during his interview with 60 Minutes. These relationships tend to be mutually beneficial — a journalist gets a scoop — a large media outlet gets favorable treatment by regulatory agencies — in exchange for promoting a certain narrative. It is also no secret that the Clintons have earned $153 million over the past 15 years in legal political graft, much of that coming from the same companies they helped deregulate in the 1990’s. If you would like to know why our media giants are grateful to the Clintons, read up on the Telecommunications Act of 1996.

    • Zuckerberg on refugee crisis: ‘Hate speech has no place on Facebook’

      Speaking in Berlin, Facebook boss calls Germany’s handling of European refugee crisis ‘inspiring’ and says site must do more to tackle anti-migrant hate speech

    • Zuckerberg Vows to Police Hate Speech in German Charm Offensive

      Facebook Inc.Chief Executive Officer Mark Zuckerberg vowed to rid his site of hate speech against migrants and lauded Germany’s leadership in the refugee crisis as part of an effort to win over those critical of the social media site’s handling of the matter.

      “We’ve recognized how sensitive this is, especially with the migrant crisis here,” Zuckerberg said to thunderous applause at a town hall event in Berlin on Friday carried live on German cable news channels. “We hear the message loud and clear and we’re committed to doing better, there’s not a place for this kind of content on Facebook.”

    • Someone At UMich Reported A Snow Penis As A ‘Bias Incident’

      Big Member On Campus — is causing a flurry of controversy.

      A University of Michigan dorm official reported a snow penis as a bias incident, according to the student publication The Michigan Review.

      The frosty phallus was erected in a field this week outside a residence hall after a snowfall, apparently leaving the hall director cold. Hall directors are paid non-students who carry some authority.

    • Site-blocking will make internet access more expensive – little else

      oday Laurie has a guest post at iTWire and looks forward to your comments or those of the content creators and distributors. This posting does not necessarily represent the views of iTWire.

      Last week both Village Roadshow and Foxtel finally launched court actions under the eight months old Copyright Amendment (Online Infringement) Act designed to deal with Internet “piracy”.

      The first thing that needs pointing out is that downloading video and audio content over the Internet is a not a crime as such. It is, however, in breach of the intellectual property rights of the producers and distributors.

  • Privacy

    • EFF Urges Appeals Court to Allow Wikimedia and Others to Fight NSA Surveillance

      San Francisco – The Electronic Frontier Foundation (EFF) urged the United States Court of Appeals for the Fourth Circuit Wednesday to permit Wikimedia and other groups to continue their lawsuit against the NSA over illegal Internet surveillance. A ruling in favor of the plaintiffs in Wikimedia v. NSA would follow the lead of the Ninth Circuit, which allowed EFF’s Jewel v. NSA to go forward despite years of stalling attempts by the government.

    • The Government’s Decades-Long Battle for Backdoors in Encryption

      The FBI wants to crack open a mass shooter’s iPhone, and Apple has refused to cooperate. It’s a story for the 21st century, but the roots go back a whole generation earlier, to the 1990s when the FBI and other law enforcement agencies were trying to curb the then-new encryption technologies and create back door access for themselves.

    • Finland to boost its information security industry

      The Finnish government should help to create a competitive information security industry, recommends a report by a task-force at the Ministry of Transport and Communications. The country should attract investments in this area, assess rules and regulations, and make information security a common digital component.

    • More GOP presidential hopefuls now side with the FBI in iPhone crypto fight

      The now five candidates vying for the GOP presidential nomination discussed everything from immigration, health care, and the Middle East during their latest debate, sponsored by CNN/Telemundo and held in Houston on Thursday evening. But what caught our attention was the candidates’ discourse about the Apple-FBI encryption legal fight.

      CNN moderators Wolf Blitzer and Dana Bash actually initiated the topic. Blitzer first mentioned how Apple responded to the FBI’s court order earlier in the day with a formal motion to vacate. Bash then addressed the topic to Florida Senator Marco Rubio, referencing his defense of Apple last week during a GOP candidate town hall in South Carolina.

    • Tens of Thousands Protest Netflix’s Expanding VPN-Blockade

      Netflix is continuing to expand its VPN and proxy crackdown, affecting VPN ‘pirates’ but also those who use such services for privacy reasons. The VPN crackdown is meeting fierce resistance from privacy activists and concerned users, with tens of thousands calling upon the streaming service to reverse its broad VPN ban.

    • Netflix overblocking non-exit Tor relays

      tl;dr: Even paying customers sharing IPs with non-exit Tor relays are now
      blocked from accessing Netflix

      Hello everyone !

      After two very fruitless attempts to get the issue silently resolved through
      proper Netflix support channels, the time has come to make this public. As
      some of you have probably already read in the news, Netflix recently
      announced a crackdown on what they call “VPN Pirates” and what I call
      “paying customers using the same benefits of globalization that global
      companies like Netflix (ab)use for their taxes”.

    • Tor Project Accuses CloudFlare of Mass Surveillance, Sabotaging Tor Traffic

      Tensions are rising between Tor Project administrators and CloudFlare, a CDN and DDoS mitigation service that’s apparently making the life of Tor users a living hell.

      The issue, raised by a Tor Project member, revolves around a series of measures that CloudFlare implemented to fight malicious traffic coming from the Tor network. These measures are also affecting legitimate Tor users.

      The way CloudFlare deals with Tor users is by flagging Tor exit nodes and showing a CAPTCHA challenge before allowing them to continue to their desired website.

    • German government to use Trojan spyware to monitor citizens
  • Civil Rights

    • The U.S. has Gone F&*%ing Mad

      Do you know how a properly functioning society would react to an event like San Bernardino? I do — because I’ve had the misfortune of living through such an event. On the 28th of April, 1996, a gunman equipped with an AR-15 assault rifle — the same kind that the San Bernardino shooters used — opened fire in Port Arthur, in Australia. 35 people were killed and 23 were wounded. It remains one of the world’s deadliest shootings by a single person.

      Within months, the country’s governing party led a bipartisan effort to prevent such a tragedy from ever happening again.

      They didn’t do it by focusing on creating backdoors into phones.

    • Liverpool police pelted with stones as right-wing ‘infidels’ clash with anti-fascists (PHOTOS)

      Members of an extreme right-wing group and a rival anti-fascist movement have brought chaos to the center of Liverpool, with Merseyside police forced to intervene in violent street skirmishes

    • Former CIA Director: Trump’s foreign policy “would be in violation of all international laws of armed combat”

      “Real Time” host Bill Maher interviewed former NSA and CIA Director, General Michael Hayden.

      Regarding his thoughts on a President Trump, Hayden said, “I would be incredibly concerned if a President Trump governed in a way that was consistent with the language that candidate Trump expressed during the campaign.”

      Asked to elaborate on what he meant by “language,” Hayden cited Trump’s comments on “waterboarding and a whole lot more — because they deserve it” and killing the terrorists’ families.

      “If he were to order that once in government, the American armed forces would refuse to act,” Hayden added. “That would be in violation of all international laws of armed combat.”

    • Ex-CIA, NSA Head: If ‘President Trump’ Implements Certain Campaign Promises, U.S. Military ‘Would Refuse to Act’

      The former head of the CIA and NSA said that if Donald Trump is elected president and follows through on certain campaign promises, the U.S. military would “refuse to act.”

      “I would be incredibly concerned if a President Trump governed in a way that was consistent with the language that candidate Trump expressed during the campaign,” Michael Hayden told “Real Time” host Bill Maher on Friday night.

    • Stand Up For Whistleblowers — Our Liberty Depends On Them

      The inhumane criminal organization that goes under the name of the United States Government has violated its laws and international laws by refusing to punish torturers and war criminals, instead punishing only those who expose the evil and illegal deeds of the United States government.

      After blowing the whistle on torture and domestic surveillance by the George W. Bush administration, former CIA officer John Kiriakou and former NSA executive Thomas Drake were prosecuted under the Espionage Act — by the same Obama Justice Department that has refused to prosecute a single torturer or any official who ordered illegal mass surveillance.

    • Virginia Wisely Rejects Secret Police

      It’s a frightening, Orwellian scenario that some legislators in Virginia thought was a good idea. Fortunately, a state House of Delegates subcommittee blocked the bill on Thursday, which would have allowed even more government information to be hidden away under the state’s F-rated open government laws.

  • Internet/Net Neutrality

    • Germany to fund broadband for underserved areas

      Germany’s Federal Ministry of Transport and Digital Infrastructure (BMVI) is making available funds to bring fast Internet to underserved areas. Municipalities and rural districts (Landkreise) can initially apply for up to EUR 50,000 to plan expansion projects and to complete applications for federal funding of these projects. Approved projects will be funded up to a maximum of EUR 15 million.

  • Intellectual Monopolies

    • Copyrights

      • Content ID and the Rise of the Machines

        In 2007, Google built Content ID, a technology that lets rightsholders submit large databases of video and audio fingerprints and have YouTube continually scan new uploads for potential matches to those fingerprints. Since then, a handful of other user-generated content platforms have implemented copyright bots of their own that scan uploads for potential matches.

      • Pirates Spend Much More Money on Music, Study Shows

        A new study has shown that music piracy is still rampant in the United States with 57 million people between the ages of 13 and 50 accessing music through unauthorized sources. Interestingly, however, these pirates also spend significantly more money on CDs and paid downloads, more than their counterparts who only consume legally.

02.27.16

Links 27/2/2016: New ROSA, Ireland National Library Goes FOSS

Posted in News Roundup at 7:57 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Tesla Fan ‘Incivility’ Forces Indiana To Back Off Direct Sales Ban… For Now

    We recently noted how Indiana was just the latest state to try and pass auto industry-backed bills banning Tesla’s direct-to-consumer sales model. Under the latest GM-backed bill, Tesla’s dealer license would have expired in 2018, forcing the company to embrace the traditional franchise dealership model — or stop selling cars in the state entirely. Telsa had been reaching out for the last few weeks to Tesla fans in the state, quite-correctly highlighting how GM was buying protectionist law instead of competing.

  • Hardware

    • Data Backup Devices for Small Businesses

      You already know you need to back up your small business data regularly, but you may get stuck figuring out the best way to manage the process. Fortunately, you don’t need to spend a scary amount of money to buy and set up a reliable data backup system.

  • Security

  • Environment/Energy/Wildlife

    • New York investigates radioactive leak in groundwater near city

      Radioactive material has leaked into the groundwater below a nuclear power plant north of New York City, prompting a state investigation on Saturday and condemnation from governor Andrew Cuomo.

      Cuomo ordered an investigation into “alarming levels of radioactivity” found at three monitoring wells at the Indian Point energy center in Buchanan, New York, about 40 miles north of Manhattan.

    • Old Nuclear Reactor Leaks Radiation

      Nuclear fission reactors are expensive to build and decommission so it’s natural to keep them running as long as possible to optimize the economic benefit. The licence for the old Indian Point reactor in New York state has been extended and while there have been occasional problems, the reactor was considered reliable. News that a leak of tritium in the ground water has been discovered is a whole new ball-game however. Tritium is a short-lived radioisotope of hydrogen so it’s possible the contamination may not leave the site in dangerous concentrations.

  • Finance

    • TTIP Negotiations: 12th Round Ends With Plan To Hurry Between Official Rounds

      By July trade negotiators from the United States and the European Union want to present a draft text that only has brackets for the “most sensitive issues” in the Transatlantic Trade and Investment Partnership (TTIP). This was announced by Ignacio Bercero, chief negotiator for the European Union, and his US counterpart Dan Mullaney during a press conference today after this week’s 12th round of TTIP negotiations in Brussels.

  • Censorship

    • Self-censorship runs amok on local television

      It should have been a regular live broadcast of a Putri Indonesia pageant show, but those who tuned in were surprised when private station Indosiar decided to completely blur the torsos of contestants who wore the body-hugging Javanese kebaya dress.

      But many considered that local television stations had gone too far when one of them blurred a scene from a popular cartoon show, simply because one of its characters wears a short skirt, and questions began to be raised about why the local channels were taking that conservative turn.

    • Video: Is Canadian self-censorship preventing open debate on racism, discrimination and other important issues?

      Conversations That Matter features former B.C. premier and free speech advocate Ujjal Dosanjh. He argues that people in power in Canada are self-censoring and in doing so are preventing open and honest discourse about issues that form the fabric of Canadian society. Dosanjh has been attacked and beaten for saying what he thinks and continues to do so because he maintains if we cower from vigorous debate then we deprive ourselves.

    • National TV Channel Denies Actor’s Censorship Allegation

      Tunisian actor, Majd Mastoura has accused Wataniya TV of censoring part of his acceptance speech following his win at the Berlinale Film Festival in Germany.

      During an emotional speech, Mastoura paid tribute to the martyrs of the Tunisian Revolution. However, during its showing upon the national channel, the actor’s closing remarks were cut from the broadcast of his award.

    • Twitter Accused Of Censoring Anti-Hillary Hashtag

      Political censorship or coincidence? Activists on Friday were in full pitchfork mode after Twitter users alleged the social media site removed #WhichHillary from its trending topics in an apparent kowtow to the Democratic presidential candidate’s campaign. The collective uproar managed to inspire another Clinton-themed hashtag, #WhichHillaryCensored.

    • Hillary Vs. Hillary: Hashtag Pits Clinton Against Her Past Self

      Hillary Clinton is facing one of her biggest rivals online today: Hillary Clinton. A hashtag mocking the candidate for her flip-flops over the years rocketed to the the top of Twitter’s trending list Thursday—driven not by Republicans but supporters of her Democratic rival, Bernie Sanders.

    • China tightens censorship of online TV programmes

      Beijing has further tightened its muzzle on mainland China’s internet after a senior media content watchdog official demanded all online programmes be censored as strictly as those of traditional television programmes.

      The move comes days after widespread audience dissatisfaction when popular shows, made and aired by Chinese video streaming sites, were removed or suspended until they had been censored to the satisfaction of the media content regulator.

    • Puritanical Facebook Censors Parody Publication, Makes Appeal Process A Threat

      I have no idea why, but there seems to be a sudden influx of stories concerning Facebook patrolling its site and taking down content over rather puritanical standards of offense and vulgarity. The most recent examples of this have concerned a couple of pieces of artwork that the Facebook Decency Office deemed to be to risque, despite the fact that neither of the art pieces could reasonably be described as particularly pornographic. The most recent example of this kind of censorious brigade is less to do with scary, scary sex, and more to do with parody content that some might find vulgar.

    • Mark Zuckerberg Angry At His Employees For Disrespecting ‘Black Lives Matter’ Movement
  • Privacy

    • Techdirt Needs Your Help To Fight Encryption Fearmongering
    • Poll: You Vote to Outlaw Tracking by Advertisers

      Back on February 15 when we ran an article calling for a ban on advertisers’ practice of tracking users who just happen to drive by an ad, much less click on it, we ran a poll to find out what you think. Actually, we were pretty sure we already knew what you thought. You tell us everyday, either in the comments section to our articles or by blocking ads here on FOSS Force. The poll was mainly to put some numbers to what we already knew.

    • FISA Court Accused of Failing to Restrain NSA

      A Washington spy court’s “secret, ex parte proceedings” do not provide the oversight required to restrain the National Security Agency’s Upstream program, a privacy group argued in a court filing Thursday.

    • ‘GCHQ spy who raped us is still working there because police didn’t take us seriously’

      A spy accused of rape by two women is still working at the heart of ­Britain’s security services after police ignored their claims.

      The spook’s first alleged victim, who met him through a dating website, today say detectives TWICE failed to act over her accusations – even after the second woman, who worked with him at the top secret GCHQ base, had come forward.

    • Katherine Jenkins Gives Spies Singing Treat [Ed: Katherine Jenkins has helped create femmewashing puff pieces for GCHQ - by associating with celebrities they created a dozen PR pieces]

      The classical music star hailed workers at Britain’s Government Communications Headquarters (GCHQ) in Cheltenham, England as “heroes”, before singing songs from her repertoire including Habanera from the opera Carmen.

    • Katherine Jenkins performs private show for GCHQ staff to thank them for keeping us safe
    • Obama Administration to Expand Sharing of NSA Data from Snooping
    • Obama To Allow FBI And CIA Access To NSA Data

      The Obama administration will soon allow the National Security Agency to share certain bulk collections of communications and satellite transmissions with other government intelligence agencies. This information includes phone calls and emails from foreigners within the U.S., as well as exchanges that involve or are about Americans collected by the NSA’s foreign intelligence programs.

    • Obama administration closing in on rules to let NSA share more freely with FBI, CIA

      The New York Times is reporting that Obama administration officials are close to agreeing on new rules that would allow the National Security Agency (NSA) to share surveillance information more freely with other federal agencies, including the FBI and the CIA, without scrubbing Americans’ identifying information first.

      In 2008, President George W. Bush put forth an executive order that said such a change to the rules governing sharing between agencies could occur when procedures had been put in place. When the Obama administration took over, it started “quietly developing a framework” to carry out the proposed change in 2009, according to the Times.

      For the past decade, the NSA has collected massive amounts of phone metadata, e-mail, and other information from a variety of sources—sometimes directly from the companies that make such communication possible, sometimes through overseas taps on lines that connect to data centers outside of the US. Currently when an agency wants information on a foreign citizen, it requests that data from the NSA, and the NSA theoretically scrubs it of any incidental references to American citizens who are not being targeted. This process is known as “minimization.”

    • Germany’s New Citizen Monitoring Spyware May Be Creepier Than NSA’s

      The new spyware Trojan virus recently approved by Germany’s Interior Ministry may actually steal personal photos and notes stored on Germans’ phones and laptops.

      The German government’s new computer virus intended for spying in criminal cases has drawn scrutiny because of its potentially unlimited abilities.

    • Barack Obama to allow NSA to share contents of intercepted phone calls and emails

      The Obama administration is planning to allow the National Security Agency to share more of the raw information it acquires through wiretapping with other intelligence agencies.

      The rule change, which would allow intelligence agencies such as the Federal Bureau of Investigations and the Central Intelligence Agency to access the unedited contents of phone calls and emails without having the information filtered by the NSA, was first reported by the New York Times Friday.

  • Civil Rights

    • Kos Bishop: Foreign Reporters Pay Refugees to Play Victims of Drowning

      Foreign reporters pay refugees 20 euros to act as if they have drowned, said Bishop of Kos and Nisyros Nathanael.

      The unusual testimony was made during a radio interview on Alpha 98.9 on Wednesday. Bishop Nathanael said that, “I witnessed with my own eyes foreign television reporters paying people (refugees) 20 euros to play victims of drowning.”

    • A blunt defense of interrogations, targeted killings and domestic spying
    • Former CIA Chief Warns Against Donald Trump

      In an interview with the BBC, ex-CIA boss Michael Hayden warned against the dangers of having, Republican front-runner, Donald Trump as President of the United States of America.

    • Ex-CIA, NSA chief: 2016 GOP rhetoric ‘scares me’

      Former CIA and National Security Agency Director Gen. Michael Hayden says the rhetoric from the GOP candidates in the presidential race is scary — and he suspects the rest of the world is concerned, too.

      Hayden was responding Thursday to a question from CNN’s Michael Holmes about the rhetoric on the campaign trail, with Holmes mentioning Texas Sen. Ted Cruz’s promise of carpet bombing ISIS and GOP front-runner Donald Trump’s praise for waterboarding and harsher interrogation techniques as well as a proposed temporary ban on foreign Muslims.

    • Court Monitor Finds NYPD Still Performing Unconstitutional Stops

      The NYPD is more in its element when it’s creating terrorism/dissent-focused task forces or shipping its officers halfway around the word to get in the way of local investigators. What it’s less interested in doing is ensuring its officers live up to the Constitutional expectations of Judge Shira Scheindlin’s order from nearly three years ago.

    • Estragon’s boot: the Conservatives delay the repeal of the Human Rights Act

      According to a news report today, the Conservative government has “shelved” the proposals to repeal the Human Rights Act and replace it with a “British Bill of Rights”.

      This is not a surprise. It was never going to be an easy task.

      In the last week or so, the proposals – as well as a daft and dappy “Sovereignty Bill” proposal – have been nothing other than tokens in a political game between the Prime Minister and other Conservative politicians about supporting and opposing Brexit. But the tokens turned out to have no value and no purchase in this game.

      Last May this blog set out the “seven hurdles” for repeal of the Human Rights Act. These hurdles included the facts that the Good Friday Agreement requires the European Convention on Human Rights to have local effect in Northern Ireland and that Scotland would have a veto on the replacement legislation.

    • Saudi Arabia sentences a man to 10 years in prison and 2,000 lashes for expressing his atheism on Twitter

      A court in Saudi Arabia has sentenced a man to 10 years in prison and 2,000 lashes for expressing his atheism in hundreds of social media posts.

      The report carried in Al-Watan says the 28-year-old man admitted to being an atheist and refused to repent, saying that what he wrote reflected his own beliefs and that he had the right to express them. The report did not name the man.

  • Internet/Net Neutrality

    • AT&T Sues To Keep Google Fiber Competition Out Of Louisville

      We recently noted how the city of Louisville had voted 23-0 to let Google Fiber bring ultra-fast broadband competition to the city. As part of the vote, the city revamped its utility pole-attachment rules, which previously forced competitors through a six-month bureaucratic process to connect to the poles, an estimated 40% of which are owned by AT&T. The new policy streamlines that down to one month, letting competitors like Google Fiber move hardware already attached to the poles, while holding them financially accountable for any potential damages.

    • Cruz, Rubio Celebrate One Year Anniversary Of Net Neutrality Rules — By Trying To Kill Them

      It has already been a year since the FCC voted to reclassify ISPs as common carriers under the telecom act. And despite the countless calories spent by the telecom industry and its various mouthpieces claiming Title II and net neutrality would demolish all Internet investment and innovation as we know it, you may have noticed that things by and large did not implode. In fact, while the FCC has been snoozing on things like zero rating and usage caps, the mere threat of rules helped the Internet by putting an end to the interconnection shenanigans causing Netflix performance degradation.

  • Intellectual Monopolies

    • Copyrights

      • ‘The Dress’ A Year Later: The Meme Has Faded, But The Copyright Will Last Forever

        Have you heard? Today is the anniversary of “the dress.” You know the one. It was all over the internet exactly a year ago. White and gold or blue and black. It was a phenomenon. And, yes, I know a bunch of you are snidely mocking it as you read this, but shut up. It was a fun way to kill an afternoon a year ago and it made a bunch of people happy, so don’t be “that person.” A year ago, we wrote a short piece about it, noting that you had fair use to thank for it, because the dress was being shared widely, and that was possible due to fair use. And the timing was great, because it was fair use week — as it is again.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts