EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.12.15

Links 12/10/2015: Linux 4.3 RC5, Parsix GNU/Linux 8.0 Reviewed

Posted in News Roundup at 9:06 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Don’t blame Linux for the XOR botnet

    The real culprits are the irresponsible vendors behind cheap broadband routers and their clueless customers

  • 2015 Indonesia Linux Conference Talks About Digital Forensic

    The 2015 Indonesia Linux Conference (ILC) that is held in Tegal, Central Java starting from October 10 to 11 is set to exhibits variety of Linux application. One of interesting application is a mobile digital forensic application that have been used by the police to assist investigation by detecting criminals’ phone and sim cards.

    “Ditigal forensic is aimed to investigate cell phone and Sim Cards, Said Dedy Hariyadi from Ubuntu Indonesia community on Friday, October 9.

  • Desktop

    • Survey: Users love their desktops more than their cheapo tablets

      In the same survey last year by ACSI, tablets scored 80 on a 100-point scale, just one point behind desktops at 81. This year, consumers rated tablets at at 75—alongside laptops, which also fell this year, the survey said. The survey criteria require that the respondent purchased a new personal computer in the last years.

  • Server

    • The 5 states of the modern sysadmin

      I think there’s (at least) 5 states you might find yourself in as a sysadmin in these days:

      Day to day things that aren’t (yet) automated.

      Automating and designing for the future.

      Fires and outages

      Interruptions

      Time to dream

  • Kernel Space

    • Linux 4.3-rc5

      The 4.3 release cycle continues to be fairly smooth – knock wood.
      There’s nothing particularly worrying here: we had some annoying
      fallout from the new strscpy stuff (it’s not actually *used* anywhere
      yet, but we had build failures on some architectures), and a vfs layer
      change uncovered an ancient and fascinating ext[34] bug, but on the
      whole things look pretty normal. It’s the usual “lots of small fixes
      to drivers and architecture code, with some filesystem updates thrown
      in for variety”. The appended shortlog gives an overview of the
      details.

      Things also seem to be calming down nicely, although since there was
      no network pull this week, we might have a bump from that next rc.

      Anyway, if you haven’t tried a recent kernel lately, feel free to hop
      right in – it all looks pretty good.

      Linus

    • BBC bypasses Linux kernel to make streaming videos flow

      Back in September, The Register’s networking desk chatted to a company called Teclo about the limitations of TCP performance in the Linux stack.

      That work, described here, included moving TCP/IP processing off to user-space to avoid the complex processing that the kernel has accumulated over the years.

      [...]

      The Beeb boffins started by getting out of the kernel and into userspace, which let them write what they call a “zero-copy kernel bypass interface, where the application and the network hardware device driver share a common set of memory buffers”.

    • Linux golden age threatened by bug army

      Golden ages are normally brought to an end by a rebellion of giants, titans or plagues. Jim Zemlin, executive director of the Linux Foundation said that Linux will be killed off by giant, titanic plagues of security bugs.

      Several high profile zero-day vulnerabilities in popular open source technologies last year served not only to show the importance of open source to the internet and IT world, but how how badly it projects were under-resourced.

    • Coreboot Now Supports The Sandy Bridge MacBook Air

      With the latest Git code pushed into Coreboot this morning, the Apple MacBook Air 4,2 is now supported.

    • Linux Kernel 4.3 RC5 Uncovers an Ancient and Fascinating EXT3/EXT4 Bug
    • Linux 4.3-rc5: The Cycle Is Going Smooth
    • Learn it Faster: The Complete Linux Kernel in a Single MapLearn it Faster: The Complete Linux Kernel in a Single Map

      The internet runs on Linux, everybody knows this fact. The Linux Kernel is one of the most complex and popular open source projects. If you wish to learn the basics, there is tons of material available online. Still, the core of the Linux kernel is a subject difficult to understand.

    • Linux 4.2 vs. 4.3 Kernel Benchmarks On Other Systems

      Last week I delivered some Linux 4.3 Git kernel benchmarks on Intel Skylake comparing it to Linux 4.2 stable. However, for those not yet on Intel’s latest generation of processors, here are some Linux 4.2 vs. Linux 4.3 benchmarks with older hardware.

    • Structural and semantic deficiencies in the systemd architecture for real-world service management, a technical treatise

      You’re probably wide-eyed and gnawing at your teeth already.

      I was finally tempted into writing this from a Hacker News discussion on “Debian Dropping the Linux Standard Base,” where some interest was expressed in reading an architectural critique of systemd.

      To the best of my knowledge, this article – though it ultimately ended up more of a paper in article format, is the first of its kind. This is startling. It’s been over 5 years of systemd, and countless instances of religious warfare have been perpetrated over it, but even as it has become the dominant system in its area, there really hasn’t been a solid technical critique of it which actually dissects its low-level architecture and draws remarks from it.

      In fact, much more worthwhile has been written on the systemd debate than on systemd itself. Among these include Judec Nelson’s “systemd: The Biggest Fallacies” and my own later “Why pro-systemd and anti-systemd people will never get along”.

      I am very wary of publishing this, due to being keenly aware of how these discussions descend into an inferno with the same dead horse talking points, even in cases where the author makes relatively salient or previously unexplored points. The tribal instinct to show where one stands kicks in and people begin slinging mud about init systems, even if it’s tangential to whatever they’re supposed to be commenting on.

    • Good Software, Bad Behavior

      You might say that those who are critical of the behavior on the list are not grateful for their work, and to make that assumption is a laughable mistake. It’s not the work under indictment, once again it’s the attitudes. The prevailing caustic attitude may change and it may not, but if the latter course is chosen, then the list continues in its cancerous way at its own peril.

    • Graphics Stack

      • Performance-Boosting DCC Support Being Worked On For RadeonSI VI GPUs
      • Intel Haswell Graphics Have A Few Gains With Ubuntu 15.10

        I ran some quick tests of Ubuntu 15.04 vs. 15.10 out-of-the-box to show the performance difference between the Linux 3.19 + Mesa 10.5 stack against the upcoming Linux 4.2 + Mesa 11.0 powered distribution. An Intel Core i7 4790K processor with HD Graphics 4600 was used for this weekend’s tests.

      • NVIDIA 358.09 Beta Prepares For DRM Mode-Setting Interface

        The first public beta in NVIDIA’s 358 driver series for Linux, BSD, and Solaris is available! Building off the NVIDIA 355 series, the 358 series adds in more pieces of the puzzle for interfacing with DRM/KMS and continues stepping closer to Mir/Wayland support.

      • Nvidia 358.09 Beta Linux Driver Brings a New Kernel Module

        A new Nvidia Beta driver has been released, and developers have added quite a few OpenGL changes and improvements, among other things.

        The Nvidia developers have just pushed a new Beta driver out the door and this time it’s full of all kinds of OpenGL updates and fixes. It will be a while until all of these changes make their way onto the stable branch of the drivers, but these are pretty important, and it won’t take all that long.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Plasma 5.5 Promises a Lot of Cool New Features

        The KDE developers are already considering what they need to do to improve the Plasma desktop after the 5.4.2 launch, and they’ve shared some of the features that are going to be made available.

      • KDE Frameworks 5.15.0 Has Just Landed in Kubuntu 15.10 (Wily Werewolf)

        The Kubuntu developers, through Marco Parillo, announced this past weekend that the they updated the KDE Frameworks package in the development version of Kubuntu 15.10 to version 5.15.0, which was released on October 10, 2015.

      • KDE PIM Sprint in Toulouse

        The KDE PIM spring sprint was held in Toulouse, France in March this year in Makina Corpus offices.

        The sprint was very important, because the team needed to decide how to continue from the current situation. At the previous sprint in Munich in November when Christian and Aaron introduced their new concept for next version of Akonadi it was decided to refocus all our efforts on working on that, which meant switching to maintenance mode of KDE PIM for a very long time and then coming back with a big boom. In Toulouse we re-evaluated this plan and decided that it is not working for us and that it will be much better for the project as well as the users if we continue active development of KDE PIM instead of focusing exclusively on the “next big thing” and take the one-step-at-the-time approach.

      • Interview with Pierre Geier

        If I remember correctly I’ve known about Krita since 2005, I guess, when I used KDE and there was this office stuff and a drawing program, which I never used. Until early 2015 I used only MyPaint and GIMP. And now I’ve been using Krita since April 2015.

      • Some Of The Features Coming To KDE Plasma 5.5

        While KDE developers are increasingly working on their Plasma mobile plans, there still are new changes coming to the KDE desktop. For the upcoming Plasma 5.5 release, there is going to be improvements to the user-switcher including a new prompt and new plasmoid, the KDE Color Picker plasmoid has returned, the Solid Device Auto Mounter has also been restored, and there are other plasmoid improvements and smaller changes throughout.

      • KWrite on Mac

        It is still ugly, as scaled on my HiDPI display as the plist file is missing and it crashs on everything (aka open dialog) and has no icons.

    • GNOME Desktop/GTK

      • Star ratings in GNOME Software

        A long time ago, GNOME software used to show star ratings as popularity next to the application using the fedora-tagger application. This wasn’t a good idea for several reasons.

      • GNOME Files/Nautilus Search Is Finally Being Overhauled

        A Google Summer of Code student who worked on GTK+ and Nautilus has managed to overhaul the search feature of GNOME’s file manager.

        The new search feature built into Files/Nautilus is designed to be much more intuitive with new filters and more. The new code hasn’t yet been merged and still needs to be reviewed, but looks promising so far.

      • GNOME Software To Get A “Kudos” Rating System For Apps

        GNOME Software abandoned their “star rating system” over issues with abuse, lack of standardization by reviewers, and that package rating system really not working out. Now they’re going to introduce a “kudos” rating system.

      • GNOME Software Is Getting a New Rating System with Kudos

        The GNOME developers are preparing to reintroduce a rating system for GNOME Software, but nothing as simple as the old one. It will be a complex way of rating the applications so that users can make informed decisions.

      • Boston GNOME Summit update

        The first day was filled with discussions and planning, with one of the central topics being how to make gnome-builder, xdg-app and gnome-continuous play well together. You can find notes and conclusions from this discussion here.

      • GNOME Photos 3.18 App Gets Its First Hotfix Release Ahead of GNOME 3.18.1

        Earlier today, October 12, Debarshi Ray was happy to inform us all about the immediate availability of the first point release of his GNOME Photos 3.18 image viewer application for the soon-to-be-released GNOME 3.18.1 desktop environment.

      • View your GTK3 app or VM on the Web

        Ever wondered how to view gedit in a browser? It’s not a secret anymore, broadway is there for some time.

      • The new search for GNOME Files (aka Nautilus)

        As some (most? none? who knows =P) of you already know, last cycle I worked as a Google Summer of Code intern with Gtk+ and Nautilus. We saw the very positive results of it. And the picky eyes out there noticed that I wrote with these exact words: “While the project is over, I won’t stop contributing to Nautilus. Even with the interesting code, even with all the strange things surrounding it. Nautilus is like an ugly puppy: it may hurt your eyes, yet you still warmly love it.”

  • Distributions

  • Devices/Embedded

    • TI “Processor SDK” initially targets Sitara with Yocto and U-Boot

      TI has launched a “Processor SDK” based on a mainline LTS Linux kernel, U-Boot, a Yocto file system and Linaro tool chain, initially covering Sitara SoCs.

      Texas Instruments has introduced a Processor Software Development Kit based on Linux as well as its own TI-RTOS, that will eventually scale across multiple Sitara and DSP processors families. The first two SoC families supported by Processor SDK are the 720MHz, Cortex-A8 Sitara AM335x and the 1GHz, single-core Cortex-A9 Sitara AM437x. Both SoCs are notable for offering a PRU-ICSS (Programmable Real-Time Unit and Industrial Communication Subsystem), which comprises 32-bit microcontrollers that enable customization of I/O.

    • Linksys WRT1900ACS Router is Ready for Open Source Tinkering

      We still regard the Linksys WRT1900AC as one of the best and fastest routers available, though if you’re eyeing that model, there’s a new version available with more memory and a faster processor.

      It’s the WRT1900ACS, which is essentially an improved version of the WRT1900AC. The new model boasts a 1.6GHz dual-core processor, an upgrade over its predecessor’s 1.2GHz chip; 128MB of flash memory (same as before); 512MB of DDR3 RAM, which is two times as much as the WRT1900AC; and eSATA and USB ports.

    • Linux Foundation Takes on Real-Time Computing for Embedded Apps

      What’s the next step for open source in the embedded computing market? Google (GOOG), the Linux Foundation and other inaugural supporters of the Real-Time Linux Collaborative Project, which launched this month with a focus on the robotics, telecom, manufacturing, aviation, medical and similar industries, think kernel-level real-time support is the answer.

    • Phones

      • Android

        • Huawei Ascend P7 gets Android 5.1.1 indicating imminent rollout of Android M

          Users of Huawei’s flagship Ascend P7 now have lots to cheer as Android 5.1.1, the latest Lollipop build is now seeding to the handset across the world. Owners of the smartphone should notice the latest update via automatic OTA.

          As per a GSMArena report, Huawei Ascend P7 owners can check out the Android 5.1.1 OS update in the form of a 1.26GB size file. Those preferring to download manually can do so by checking out the official firmware section on Huawei’s website.

        • Fun with permissions: Why the change in Android 6.0 may make you repeat yourself

          In switching to a runtime permissions model in Android 6.0 — you’re no longer giving access to your data just by installing an app — developers can now more easily explain themselves. Sort of.

        • Google Android 6.0 Marshmallow: 5 new features you REALLY should know about

          Unfortunately the latest version of the hugely popular Android operating system is currently only available to those running a Nexus or Android One devices.

          Express.co.uk has provided a quick guide on how to upgrade your handset, here.

          If you are lucky enough to be running Marshmallow – here are FIVE new features and tweaks you should know about.

        • Pichai names Lockheimer SVP of Android, Chrome OS, Chromecast

          A member of the Google family since 2006, Lockheimer has been noted to be one of the more friendly faces among the roster of Android engineers. He has been held in high esteem by Pichai, who then also managed Android and Chrome before he was appointed to oversee all Google products last year. Although not as public a persona as Pichai, something that will of course be changing soon, Lockheimer has once in a while gone public about the direction that Android is heading to, like Google’s position on Android Auto and the future of Android in general. Most recently, Lockheimer setup an Reddit AMA thread to answer some of the more pressing questions about the newly announced Nexus 6P and Nexus 5X smartphones.

        • GranitePhone Security-Focused Android Smartphone Now Up for Pre-Orders

          The security-focused smartphone segment has seen a couple of launches from companies such as Silent Circle and Turing Robotic Industries. The security-focused Blackphone 2 smartphone (from Silent Circle), which was introduced back in March at MWC, went on sale recently. Meanwhile, price of the ‘unhackable, unbreakable, and waterproof’ smartphone, the Turing Phone (Turing Robotic Industries), was also revealed recently by the company.

        • Paranoid Android Development Team Taking A Breather

          One of Android’s greatest strengths is that it is open source and relatively easy to modify. This means that the source code may be taken by anybody and modified to suit their particular purpose. A great many handsets sold in China are Android-based, whereby the manufacturer has reinvented how Android works partially because until very recently, one could not access Google Services in China. We have also seen Amazon build their Fire tablets using Fire OS, which is based on Android. At the opposite end of the scale, we have also seen dedicated teams of developers over the planet building custom ROMs for Android devices. By a “custom ROM,” I mean a replacement for the software that runs your Android device. There are many reasons why people will install a custom ROM onto their handset or tablet, from wishing to experiment with different software, to circumventing restrictions placed on them by the stock software, or through wishing to optimize or change how the device performs.

        • 10 Android smartphones that feature laser autofocus cameras

          It took a while — longer than a year, actually — but the innovative laser autofocus system that first made its appearance on the LG G3 has actually made it to no less than nine other Android smartphones. We knew there was something to it ever since we saw the laser beams firing from the LG G3′s sensor and helping it focus quickly and accurately on objects from the scene. So it makes us feel especially cheerful that more manufacturers have discovered this technology for their own smartphones!

        • Use Cabinet to Manage Files on Your Android Device

          File management on Android is improving, but it’s still not great, and it can be frustrating trying to take control of exactly which files are saved and where they’re stored. Numerous third-party apps have rushed in to fill the gap but one of the best we’ve seen in recent times is Cabinet—it’s fast, feature-rich and a signed-up member of the Material Design club.

        • Linux Top 3: Quirky 7.2, NetBSD 7.0 and Android x86 5.1
        • Android 6.0 review: A small but significant bump for the world’s dominant OS

          All the big changes happened in Lollipop. Now it’s Marshmallow’s turn is to show the world how useful and personal Android can be.

        • Leak reveals a brand-new Android phone made by… Pepsi

          Wait, what? And why? A new leak has revealed that Pepsi — yes, that Pepsi — is making an Android phone. Android Headlines has spotted a listing for a new phone on a Chinese website called the Pepsi P1 that appears to be Pepsi’s first attempt at making its own smartphone. Despite selling for roughly $200, it looks like the device will have some decent specs.

        • 5 Reasons to Still Choose an Android Phone Over an iPhone

          Today, you’ll find a handful of Android smartphones that are every bit as beautiful, capable, reliable, and well-designed as the iPhone. In fact, there are plenty of reasons why people should be choosing Android phones over the iPhone.

        • A First Look at the Most Expensive Android Wear Watch Ever Made

          Intel and Tag Heuer have done tons of hyping for its still upcoming, $1,800 Android Wear watch. But after hearsay that a November launch was coming, the Swiss luxury watchmaker is sticking with that rumored game plan. The most expensive Android Watch ever made is coming November 9th.

        • Tag Heuer is unveiling its Android Wear smartwatch next month

          Swiss watchmaker Tag Heuer has set a date for its upcoming Android Wear smartwatch unveiling. The Tag Heuer Connected, as it’s called, will make its debut at the LVMH Tower in New York City on November 9th, according to invites sent out by the company today. The watch is reportedly based on the popular Tag Carrera and will cost around $1,800, according to a interview with Tag CEO Jean-Claude Biver on CNBC last month.

        • ZTE lifts lid on Axon mini Android smartphone pricing and specs

          Chinese handset-maker ZTE has revealed more about the pricing, specs, and availability of the mini version of its Axon flagship smartphone.

          Following on from ZTE’s US launch of its $450 flagship Axon in July, the company has announced it will begin offering two variants of its smaller sibling. Although the mini was also unveiled in July, ZTE has only now revealed prices.

        • Android 6.0 has a great auto backup system that no one is using (yet)

          We recently published a rather lengthy review of Google’s newest operating system, Android 6.0 Marshmallow, but there was one feature we couldn’t get working in time for the review: the new automatic backup feature for app data. The theory is that this feature would take all your app data, stick it in the cloud, and when you restore your phone or buy a new one, it would be like nothing ever changed—all your settings and logins would come back like magic.

        • Android users left at risk… and it’s not even THEIR FAULT this time!
        • Huawei Rolling Out Android 5.1.1 Lollipop To Ascend P7
        • 10 Android Tips And Tricks For A Better, Smarter Phone
        • The need for a 3D Android interface is now

          Fear not, Android faithful, 3D Touch will be coming to our favorite platform. A few days ago, Synaptics announced their ClearForce technology that recognizes different levels of pressure to the screen. Synaptics is working with Android OEMs to make this happen.

          The skeptics, of course, abound. Before Apple rolled out devices with this feature, people were doubtful of its usability. What Apple did, however, was seriously impress. They took a very challenging feature and made it work. That’s something Apple is quite good at.

Free Software/Open Source

  • Open source as a tool of cultural change

    The government is the de facto “keeper of the data” for the entire country. There’s all kinds of useful data on pretty much any topic. The problem is that often, that data is stored in a way that is very difficult to discover and access. In my opinion this is primarily a workflow issue as opposed to a policy issue. Too many datasets exist as documents on a walled-off shared folder somewhere. Even sharing data with another agency is difficult, especially if it’s of substantial size. Most agency networks block file sharing services like Dropbox. So, the opportunities for open data are really endless if we can change the way the government stores, creates, and releases data.

  • The importance of face-to-face in the open source world

    This is particularly important when it comes to Open Source. The Open Source world is a fabric of interconnected personalities, relationships, and expectations. It is critically important to not just get work done but to also ensure the people doing the work feel a sense of connection. To this end, face to face communication and collaboration is essential.

  • Extending a Free, Open Source Community to Our Students

    What makes the open source community so important though? Well, there are a lot of reasons out there, but for Butler, a lot of it has to do with collaboration. This is noteworthy when considering the value an open source community can bring to educational collaboration, then.

  • 3 open source projects for modern COBOL development

    GnuCOBOL (formerly known as OpenCOBOL) is a modern, open source, COBOL compiler. It works by translating COBOL code into C and compiling the code using GCC. While the project does not claim standards compliance, it passes most of the tests in the COBOL 85 test suite from the National Institute of Standards and Technology. Other compilers might be more standards compliant or contain the same quirks as their historical antecedents, but GnuCOBOL is the compiler used by the other two projects I cover below.

  • Open source office at Veneto health care

    The ULSS5 health care organisation, one of 22 in the Italian Veneto Region, has nearly completed the transition to the open source office suite LibreOffice and the open document format ODF. Already 70% of all 1500 workstations have LibreOffice implemented, and the migration will be completed in 2016, says Enio Gemmo, one of the instructors involved in the project. Exchanging documents with others remains one of the main problems.

  • Industry Veterans Partner to Create a School for Software Engineers

    Another interesting angle is that during their first year at school all projects except their own, if they decide otherwise, must be open sourced online on the repository of their choice (such as GitHub).

    “Open source is a great option for teaching students because it not only helps you in building new skills as as software engineers, but also you know how to communicate with your peers. You have to understand how the team is working among many things. So I think open source is a great way to learn software engineering,” added Barbier.

    Because the Linux Foundation also runs many specialized courses, I asked whether the school had any plans to collaborate with the Foundation. I was told that, although they are in touch with the Linux Foundation, it’s too early to comment on it.

  • Eximbank opts for Allevo’s open source application FinTP

    It originates from Allevo’s older offering, qPayintegrator. The open source project has been in the making for a few years.

  • Volkswagen’s Diesel Fraud Makes Critic of Secret Code a Prophet

    A Columbia University law professor stood in a hotel lobby one morning and noticed a sign apologizing for an elevator that was out of order. It had dropped unexpectedly three stories a few days earlier. The professor, Eben Moglen, tried to imagine what the world would be like if elevators were not built so that people could inspect them.

  • Web Browsers

    • Mozilla

      • Mozilla to Bar Many Legacy Plug-ins in Firefox By End of 2016

        As we’ve reported several times, Google has been introducing big changes in its Chrome browser, especially when it comes to how the browser handles extensions. If you’ve regularly used either or both of the most popular open source Internet browsers–Google Chrome and Mozilla Firefox–then you’re probably familiar with the performance and security problems that some extensions for them have caused.

        Mozilla, like the Chrome team, is also focused on the effect that extensions have on performance and reliability. Now, Benjamin Smedberg, a Mozilla senior engineering manager, in a post to a blog, has confirmed that Mozilla will bar almost all plug-ins built using decades-old NPAPI technology by the end of 2016.

  • SaaS/Big Data

  • Healthcare

    • Taunton and Somerset trust explores wider open source adoption

      Taunton and Somerset NHS Foundation Trust has commenced “exploratory work” around expanding its use of open source technology to include an e-prescribing solution after going live with a non-proprietary electronic patient record (EPR) system earlier this month.

      Trust IT director Malcolm Senior said that although work around potentially adopting a new e-prescribing system was at an early stage, Taunton and Somerset was now considering dates for possible implementation.

      Senior said he was confident the trust would be able to meet a timeline for completing development of an e-prescribing service in line with aims for a ‘paperless NHS’ by 2018.

  • Business

  • Funding

    • Your Last Chance To Crowdfund InvizBox Go, A Portable Open Source VPN Router

      A small Irish tech startup is in the last few days of crowdfunding for a small Linux-based router it’s hoping to ship out to supporters in February 2016.

      If its Kickstarter campaign is successful, InvizBox Go will offer users some protection when connecting to WiFi networks. Whether you’re at home, at a hotel, or working out of a coffee shop, the InvizBox Go will be able to connect your devices and route all of your traffic over Tor or a VPN connection (or even both). And since it can connect all devices simultaneously, it’s a great solution for keeping your housemates secure without requiring them to plug into anything or even download any software. Or, let’s face it, it’s also good for watching blocked content from around the world. Users will also be able to block a known list of ad providers. An optional feature will block Windows 10’s tracking domain. Additionally, the device can acts as a WiFi extender or even be used to charge a mobile phone or tablet if users plug into its USB port.

    • Irish firm’s product to mask online activity
  • BSD

    • FreeBSD/PC-BSD 10.2 vs. Ubuntu 15.04/15.10 Benchmarks

      It’s been a while since last running any BSD vs. Linux benchmarks, so I’ve started some fresh comparisons using the latest releases of various BSDs and Linux distributions. First up, as for what’s completed so far, is using the FreeBSD-based PC-BSD 10.2 compared to Ubuntu 15.04 stable and the latest development release of Ubuntu 15.10.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Italy’s Bari switching to LibreOffice and ODF

      The Italian city of Bari is about to complete its transition to LibreOffice and the open document format ODF. At the end of this year, the open source suite of office productivity tools will have been implemented on 75% of the city’s nearly 1700 PC workstations. Change management is a key part of the transition, explains Marini Latini, who helped train the city’s staff members.

    • Another city swaps in LibreOffice to replace Microsoft Office

      Another city has decided to swap out Microsoft Office for the open source LibreOffice productivity suite. As ZDNet reported, the municipality of Bari in Italy is currently installing the open-source office software on its 1,700 PCs after a successful trial involving 100 PCs.

  • Openness/Sharing

    • Open Data

      • ODS Onsite Training – Onsite Training to the European Commission

        The course aims at enhancing the understanding of linked open data principles and technologies. By the end of the course, participants should have a clear understanding of what linked open data is and how linked data technologies can be applied to improve the availability, understandability and usability of EU data.

Leftovers

  • Notable Moments in White People Taking Credit For Discovering Things (Columbusing)

    For some of you, today is Columbus Day. For others it is Indigenous Peoples day and for the rest of you, it’s Monday.

    Christopher Columbus was an Italian sailor who wandered around the Caribbean and the Americas capturing and raping indigenous peoples. For his troubles, he is said to have “discovered” what we now know as the United States, an attribution that—just as he did—leaves out the worth of the millions of people who had been living here for a very, very long time.

    Objectively, fuck Christopher Columbus.

    However, one of the few helpful things he did was inadvertently give us a word for the phenomenon when someone (specifically a white someone) takes or is given credit for discovering something that existed long before it came to that individual’s attention.

  • Field Report: Pirate Bloc – Tory Party Conference demo 4/10/2015

    Over the last week, the Tory party had their conference in Manchester. On Sunday 4th October, 60,000 people took to the streets to protest, organised by the People’s Assembly Against Austerity. We joined them as the Pirate Bloc, with some help from our friends over at the Manchester branch of Open Rights Group. We broadcast a lot of the march live on Periscope, and there are a number of videos saved on Bambuser, but we also have a few pictures to share with you.

  • The Self-Appointed Elite

    I am an unrepentant enthusiast for the European Union, indeed a European Federalist. I think the freedoms of movement of people and goods within the EU are the most profound political achievement of my lifetime, and have made the world a very much better place.

    I am therefore flabbergasted by the group of unpleasant elitist bastards who apparently will lead the pro-EU campaign for the referendum. How could anybody wishing to win a vote believe that a Board including Peter Mandelson and Danny Alexander is going to help? While the appointment of Lord Rose seems to confirm belief in the “Michelle Mone theory”, that selling knickers grants universal expertise.

    Most egregious of all, the Executive Director is Will Straw, whose main qualification is that his father is a war criminal. Founder of the rabid anti-Corbyn website Left Foot Forward and every bit as Atlanticist as Liam Fox, Will Straw is as insanely pro-United States hegemony and as ultra-Zionist as only an extreme Blairite can be. He really is a deeply unappealing figure.

  • Yogi Berra’s 50 greatest quotes

    Yogi Berra probably is better known for his unique take on the English language than for his baseball career — and it was a heck of a baseball career.

  • Science

    • Pressure to ‘publish or perish’ may discourage innovative research, UCLA study suggests

      The researchers’ conclusions are drawn from a database they assembled of more than 6 million scholarly publications in biomedicine and chemistry

    • How PowerPoint is killing critical thought

      I still remember the best lecture I ever attended. It was part of a joint series offered by the English and philosophy departments in my first term at university and, given that the subject was Sartre’s Being and Nothingness, should have been the dullest event in Christendom that night. But it wasn’t. The lecturer, Thomas Baldwin, had a deceptively simple style: he would write a proposition on the blackboard facing us and gaze at it for a moment, like a medium beckoning a spirit. Then he would turn and smile, and start to explain.

    • The Apple bias is real

      If there’s one constant on the consumer tech calendar, it’s iPhone reviews day. Happening sometime between the announcement and the release of the latest iPhone, it manifests itself with glowing accounts of the latest Apple smartphone at the top of the page, and irate accusations of Apple-favoring bias in the comments at the bottom. This is as reliable a phenomenon as today’s autumnal equinox.

      The funny thing is that everyone’s right. Readers are right to claim that the iPhone is treated differently from other smartphones, and reviewers are correct in doing so. Apple makes more in quarterly profit than many of its mobile competitors are worth, and the success and failure of its smartphone plays a large role in shaping the fate of multiple related industries. The iPhone is reviewed like a transcendental entity that’s more than just the sum of its metal, plastic, and silicon parts, because that’s what it is.

  • Hardware

  • Health/Nutrition

    • Sudden and dramatic demise of Addenbrooke’s Hospital is tragic and couldn’t be a starker warning of impact of this government’s reckless policies on the NHS

      “The sudden and dramatic demise of Addenbrooke’s Hospital is tragic and couldn’t be a starker warning of the impact of this government’s reckless policies on the NHS. The Tories are a danger to the security of our NHS and the public’s health.

      The problems at Addenbrookes are symptomatic of a financial crisis right across the NHS with two thirds of trusts predicting a deficit this year. This is a result of chronic underfunding of the NHS following a £20 billion efficiency savings programme over the last five years. Whilst healthcare inflation runs at 4% per year, the NHS budget under Tories increased just 0.8% per year during the last Parliament, the lowest average annual increase of any parliament. With the government intent on another £22 billion of savings over the next five years, the situation for patients can only get worse under the Tories and will be further exacerba‎ted by the growing rift Jeremy Hunt has created with NHS staff over the introduction of a full 24/7 NHS and the imposition of a damaging junior doctor contract.

    • U.S. Paid Healthcare.gov Contractor $4 Million to Fix Its Own Mess

      The U.S. government paid the main healthcare.gov contractor $4 million to correct defects of the botched site and withheld only $267,420 of what it owed the company, according to a new federal audit.

      The report on the Centers for Medicare and Medicaid Services (CMS) and its contract with CGI Federal is to be published today by the Health and Human Services Office of Inspector General. It is the latest in a series of audits critical of federal oversight of the private companies that built the insurance marketplace at the heart of Obamacare. Although CMS replaced the contractor a few months after healthcare.gov’s meltdown in 2013, the agency had little power to recover the money it spent trying to fix the site.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Henry Kissinger, dangerous fraud: Why he’s as responsible for Iraq and the Middle East as Vietnam

      Two weeks ago, a mini-scandal rocked the New York literary world. Gawker revealed that Andrew Roberts, the New York Times Book Review’s choice to review the authorized biography of Henry Kissinger, had in fact been Kissinger’s original choice to write the authorized biography.

      Roberts also was a long-time friend of Niall Ferguson, the man who Kissinger wound up choosing to write his authorized biography. Roberts and Ferguson had even written a lengthy chapter together in a volume of essays edited by Ferguson. Worse yet: Roberts had revealed almost none of these involvements — with Ferguson, with Kissinger — to the New York Times when it asked him to write the review.

      So unseemly were these entanglements, and the lack of transparency about them, that Margaret Sullivan, the New York Times public editor, felt called upon to rap the paper’s knuckles. Which prompted a further back and forth between Sullivan and Pamela Paul, the editor of the Times Book Review. While the back-scratching world of book reviews in the New York Times is an old topic — unlike other publications, the Times purports to be objective and untainted by personal connections, and its reviews help promote or kill books — this scandal brought it into especially sharp relief.

      The person who revealed the scandal in Gawker was Greg Grandin, an NYU historian and winner of multiple academic and literary prizes. Grandin has his own book out on Kissinger, “Kissinger’s Shadow,” which was reviewed by the Times the same day that Ferguson’s bio was.

    • Tories have forgotten that Thatcher wasn’t just a terrorist sympathiser, but close friends with one

      It’s not surprising to see the right-wing Government and press try to assassinate Jeremy Corbyn’s character. So far they’ve linked him with the IRA, Hamas and Hezbollah. In their eyes, the Labour leader is a terrorist sympathiser.

      The problem with this narrative, as with almost all narratives that invoke the spectre of terrorism, is that they rely on a decidedly one-sided view of the world. In their minds, life comprises two neatly opposed groups: those who support terror and those who oppose it.

      The charges against Corbyn, regardless of their merit, cannot exist in a political vacuum of good versus evil though. Some conservatives would be wise to look closer to home before casting the first stone.

      Whatever his views, Corbyn has never wielded the levers of power in government, and has never done more than put forward ideas. Yet if we look to the icon of conservative politics and “keeping Britain safe”, we have someone with a well-documented history of being a terrorist sympathiser. During her time as Prime Minister, Margaret Thatcher openly called a terrorist a “true friend”, invited a terrorist into her home for tea, and personally lobbied against a terrorist’s prosecution for war crimes.

    • The Author of Our Best SF Military Novel Explains the Future of War

      For my money, the best novel to read about the future of war today, in 2015, was published in 1974. Joe Haldeman’s The Forever War is an all-time science fiction classic, but it hasn’t quite enjoyed the same degree of mass cultural saturation as other war-themed SF staples like Ender’s Game or Starship Troopers—maybe because it hasn’t been made into a film or TV show, maybe because its politics are too thorny and complex.

    • The WWII-Era Plane Giving the F-35 a Run for Its Money

      On December 5, 2001, an American B-52 flying tens of thousands of feet above the ground mistakenly dropped a 2,000-pound satellite-guided bomb on an Army Special Forces team in Afghanistan. The aircrew had been fed the wrong coordinates, but had the plane been flying as low and slow as older generations of attack planes did, the crew might’ve realized their error simply by looking down at the ground.

      It was not long after the Twin Towers fell, and American soldiers were killed in Afghanistan by an American bomb dropped by an American plane. That this mistake happened illustrates just how poorly the air campaign in the United States’ longest war was executed, and how efforts ultimately failed to make things better by going after high-tech solutions that aren’t what they’re cracked up to be compared to the old tried and true technology.

  • Transparency Reporting

    • WikiLeaks’ Julian Assange: still wanted, no longer so hunted

      Is now the time for Julian Assange to try to make a break for it?

      The British government has spent more than $19 million over the last three years trying to make sure that Assange, founder of the website WikiLeaks, doesn’t escape its clutches. Assange has been holed up in the tiny Ecuadorean Embassy in London since June 2012, a fugitive from arrest on allegations that he sexually assaulted two women in Sweden.

      But authorities have apparently decided that the vigil is no longer worth it. Scotland Yard announced Monday that it was withdrawing its 24-hour presence at the embassy, which sits in one of London’s toniest neighborhoods, near the famous Harrods department store.

    • Julian Assange: Police end guard at Wikileaks founder’s embassy refuge

      Police will no longer be stationed outside the Ecuadorean embassy in London where Wikileaks founder Julian Assange has sought refuge since 2012.

      Met Police officers had been there since Mr Assange sought asylum to avoid extradition to Sweden over a rape allegation, which he denies.

      The Met said it had cost £12.6m and was “no longer proportionate” – but it would still try to arrest him.

      Wikileaks said the decision did not change Mr Assange’s situation.

    • Police pull 24-hour guard of Julian Assange’s London embassy hide out

      Police in London have removed their around-the-clock guarding of the Ecuadorian Embassy, where Wikileaks founder Julian Assange has been hiding out since 2012.

      Assange sought refuge at the embassy, where he has stayed for three years, while facing extradition to Sweden for questioning about alleged sex crimes.

      For the entirety of his stint inside the building, the Metropolitan Police have posted a guard outside the embassy, until Monday.

  • Environment/Energy/Wildlife

    • Watch A CBS Correspondent Question Charles Koch On Whether Dark Money Is “Good For The Political System”

      Anthony Mason: “Do You Think It’s Healthy For The System That So Much Money Is Coming Out Of A Relatively Small Group Of People?”

    • New Zealand deports climate change asylum seeker to Kiribati

      New Zealand has deported a Kiribati man who lost a legal battle to be the first person granted refugee status on the grounds of climate change alone.

      Ioane Teitiota, 39, has argued that rising sea levels in his homeland meant his family would not be safe there.

    • UK, France and Germany lobbied to keep loopholes in car emission tests

      The UK, France, and Germany lobbied in secret to retain outdated approaches to testing car emissions that would create major loopholes for manufacturers to exploit. According to documents seen by The Guardian, the overall effect would have been to increase real-world carbon dioxide emissions by 14 percent over those shown in the tests. Although not involving software, these loopholes would allow the carbon dioxide testing procedures to be gamed to produce deceptively good results just as Volkswagen has been doing for NOx gases.

    • Volkswagen Diesel Scandal Expands: What Should Jetta, Passat, Golf, Beetle And Audi Owners Do?

      In the wake of revelations that Volkswagen deceived regulators and car buyers about the high level of polluting emissions from its diesel-powered vehicles, you have two options if you own one of these cars: Park it or pollute.

    • Climate activists score huge victory: Hillary Clinton comes out against Keystone XL pipeline

      Breaking her years-long silence on an issue that has galvanized climate activists, Democratic presidential candidate Hillary Clinton came out against construction of the Keystone XL oil pipeline on Tuesday — marking a reversal of the position she seemed to hold as secretary of state and underscoring the issue’s resonance among the progressive voters Clinton needs to secure her party’s nod.

      Speaking in Des Moines, Clinton reiterated that she had not taken a public position on the project because she did not want to interfere with the Obama administration’s deliberations over whether to approve the pipeline, which would transport oil from the tar sands of Canada to the Gulf of Mexico. But given the administration’s persistent delays in announcing a decision on Keystone, Clinton said she now felt a “responsibility” to speak out.

    • Clinton comes out against Keystone XL pipeline

      Democratic presidential front-runner Hillary Clinton came out Tuesday against the Keystone XL oil pipeline, arguing the debate over its construction was a distraction from efforts to tackle climate change.
      The announcement follows years of pressure from environmentalists, and as Clinton seeks to reassure supporters surprised that she faces a tough challenger for the Democratic presidential nomination in Sen. Bernie Sanders (I-Vt.), an opponent of Keystone.

    • Warming Arctic is trouble for Caribou in unexpected way

      Global warming in the Arctic means earlier and more plentiful mosquitoes in Greenland, and that’s bad news for the country’s already shrinking caribou population, Alaska Dispatch Newsreports.

      A new study found that for every degree Celsius the temperature rises in Greenland, mosquitoes take 10% less time to reach full, biting adulthood. And less time spent as larva means more mosquitoes survive into adulthood. The study found that a 5-degree Celsius jump raised mosquito survival rates by 160%.

  • Finance

    • Facebook paid £4,327 corporation tax despite £35m staff bonuses

      Social networking firm paid average of £210,000 to staff in Britain, but overall loss in UK of £28.5m meant very little corporation tax was due

    • Elizabeth Warren demolishes the myth of “trickle-down” economics: “That is going to destroy our country, unless we take our country back”

      Stephen Colbert once described Elizabeth Warren as the “school librarian you had a crush on” but on last night’s Late Show, she was the Sheriff of Wall Street.

      Like every interview with the senior senator of Massachusetts, there was a question about whether or not she’d be running for President in 2016. “You are a household name in American politics,” Colbert said. “And yet, you are one of the few household names that is not running for President of the United States. Are you sure you’re not running for President of the United States? Have you checked the newspapers lately, because a lot of people have jumped in, you might have done it in your sleep…. These days politicians have to check the ‘opt-out’ button. It’s like unsubscribing from an email.”

    • Thailand Might Be Required To Sacrifice Plant And Seed Sovereignty For The Sake Of Trade Agreement With EU

      Compliance with demands of the European Union or hasty government amendments to domestic laws allows the government to claim that Thailand did not amend any laws on account of the EU-Thai FTA negotiations.

      That’s noteworthy, because there’s evidence that the European Commission is aiming to implement key US demands for TAFTA/TTIP before negotiations are completed so that it too can claim that it did not amend any laws on account of it. If the biothai.org post is correct, it’s a sneaky trick that seems to be spreading.

  • PR/AstroTurf/Lobbying

    • No, the Kochs’ Political Spending Is not “Reported”

      Charles Koch misled CBS when he suggested that the Kochs’ political spending is publicly disclosed.

      On October 11, the elder Koch brother gave a rare interview to CBS Sunday Morning. Reporter Anthony Mason asked, “Do you think it’s good for the political system that so much what’s called ‘dark money’ is flowing into the process now?”

      Koch replied: “First of all, what I give isn’t ‘dark.’ What I give politically, that’s all reported. It’s either to PACs or to candidates. And what I give to my foundations is all public information.”

    • Carly Fiorina’s post-truth politics: Even her most delusional defenders admit she’s fudging the facts

      I usually avoid reading anything by Jonah Goldberg because life is short and the world has a finite supply of blood pressure medication. But his column in the Los Angeles Times covering the controversy over Carly Fiorina’s comments about the Planned Parenthood videos is so awful, it has to be read to be believed.

      The editorial starts off with the full Fiorina quote that has become so controversial: “Anyone who has watched this videotape, I dare Hillary Clinton, Barack Obama to watch these tapes. Watch a fully formed fetus on the table, its heart beating, its legs kicking while someone says, ‘We have to keep it alive to harvest its brain.’”

  • Censorship

    • France confirms that Google must remove search results globally, or face big fines

      Google’s informal appeal against a French order to apply the so-called “right to be forgotten” to all of its global Internet services and domains, not just those in Europe, has been rejected. The president of the Commission Nationale de l’Informatique et des Libertés (CNIL), France’s data protection authority, gave a number of reasons for the rejection, including the fact that European orders to de-list information from search results could be easily circumvented if links were still available on Google’s other domains.

    • Mark Crispin Miller, Peter Hart, and Gerry Condon

      Mark Crispin Miller of NYU discusses some of the recent additions to his Forbidden Bookshelf series, which seeks out important out-of-print political works and republishes them as e-books; Miller explains the insidious ways the books were first “disappeared.” Next, Peter Hart with the National Coalition Against Censorship speaks about this year’s Banned Books Week, and some of the means — short of outright banning — which keep important books away from students. The program concludes with Gerry Condon of Vets for Peace, speaking about the historic vessel Golden Rule, brought to San Francisco as part of a protest against the U.S. Navy’s annual Fleet Week activities there.

    • The President Stood Up For Free Speech On Campus — But He Didn’t Mean Middle School Campuses

      Well, it didn’t take him long to reveal that his sudden free speech platform was bullshit — with the blocking of a young conservative activist from seeing or responding to his Twitter feed,” conservative YouTube sensation CJ Pearson, a 13-year-old black middle schooler from Georgia.”

    • The Trend Of Killing News Comment Sections Because You ‘Just Really Value Conversation’ Stupidly Continues

      Over the last year, there has been a tidal wave of websites that have decided to close their news comment sections because the companies are no longer willing to invest time and effort into cultivating healthy on-site discussion. While that’s any site’s prerogative, these announcements have all too often been accompanied by amusing, disingenuous claims that the reason these sites are muting their on-site audience is because they’re simply looking to build relationships or just really value conversation. Nothing says “we care about your opinions” like a shiny new muzzle, right?

    • Pirate Bay Forum Knocked Offline by ICANN Complaint

      The Apple bias is real

      The Pirate Bay’s official SuprBay forum has gone dark after experiencing domain name problems. The forum’s domain name registrar eNom suspended the site following an ICANN complaint over inaccurate Whois information, and the site remains offline for now.

    • Man arrested for disparaging police on Facebook settles suit for $35,000

      A Wisconsin man arrested for posting disparaging and profanity laced comments on a local police department’s Facebook page has settled a civil rights lawsuit and is being awarded $35,000.

      Thomas G. Smith used the Facebook page of a rural Wisconsin village called Arena to, among other things, label local cops as “fucking racists bastards.”

      He was charged criminally in state court on allegations of disorderly conduct and unlawful use of computerized communications. He was sentenced to a year of probation and 25 hours of community service. A state appeals court overturned his conviction last year.

  • Privacy

    • Whoops: OPM Says Hackers Stole 5.6 Million Fingerprints, Not 1.1 Million

      Months after hackers first broke into Office of Personnel Management (OPM), the US government agency that handles all federal employee data, the hack keeps on getting worse.

    • OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought
    • Snowden Treaty Launched: Effort To Get Countries To End Mass Surveillance

      Of course, chances of the US signing on to this are basically nil, but it will be interesting to see if other countries think it’s worth supporting. Countries that have tried to hold themselves out as bastions of free speech and against mass surveillance might make interesting targets. But, of course, actually getting countries to commit to such things isn’t always easy. Still, the effort seems worthwhile, even if it merely raises the issue of what kind of world do we live in that such a thing should even be necessary?

    • Obama administration explored ways to bypass smartphone encryption

      The approaches were analyzed as part of a months-long government discussion about how to deal with the growing use of encryption in which no one but the user can see the information. Law enforcement officials have argued that armed with a warrant they should be able to obtain communications, such as e-mails and text messages, from companies in terrorism and criminal cases.

    • [Old] Facebook case may force European firms to change data storage practices
    • [Old] How NSA Surveillance May Result In Fragmenting The Internet: EU Court Leaning Towards Ending ‘Privacy Safe Harbor’
    • Senate Intelligence Committee Forced To Drop ‘Terrorist-Activity’ Reporting Requirements For Social Media Platforms

      Less than three months after announcing it was considering turning major social media platforms into unpaid government informants, the Senate Intelligence Committee is dropping its proposed requirement that Facebook, Twitter, etc. report “terrorist activity” to designated agencies.

    • FBI Ignores Court Order, Congressional Oversight; Refuses To Respond To Questions About Clinton Emails

      Grassley is right about most of this. The FBI does tend to believe it’s above the law, what with its warrantless surveillance, refusal to cooperate with DOJ oversight and its general indifference to its own internal policies. But what Grassley is complaining about is standard operating procedure by the agency. When not withholding information for bogus reasons, the agency quite frequently cites “ongoing investigations” when refusing to turn over documents.

    • As US Turns Away From Idea Of Backdooring Crypto, David Cameron Has A Problem

      Last week, Mike wrote about what seems an important shift in US government policy on encryption, as the White House finally recognizes that adding backdoors isn’t a sensible option. That leaves a big question mark over what the UK will do, since David Cameron and intelligence officials have been hinting repeatedly that they wanted to undermine encryption in some unspecified way. Just last week, the new head of MI5, the UK’s domestic intelligence service, gave the first-ever live media interview by a senior British intelligence official.

    • [India] National Encryption Policy draft withdrawn: 13 things to know

      If you were worried that deleting WhatsApp, Facebook and Viber chats could put you behind bars, fret not. In a complete u-turn, the government has withdrawn the proposed National Encryption policy that may have landed you in trouble for deleting your WhatsApp, Facebook messages before 90 days.

    • India’s Government Looking At Mandating Backdoors In Encryption
    • India joins war on crypto

      India’s newly released draft national encryption policy includes a requirement that plaintext versions of all encrypted data and messages must be kept by every user, whether a business or an individual, for 90 days. And the “verifiable” plaintext must made available to law enforcement agencies on demand. This unprecedented requirement is likely to make security breaches even more serious, and present enormous logistical problems for companies using encryption on a large scale, since they will have to manage the storage and timely deletion of the plaintext versions.

    • Twitter Makes All Its Shortlinks HTTPS By Default

      We have discussed for years, of course, the value of encrypting more of the web, and especially increasing use of HTTPS-by-default. Kudos to Twitter for making this move and encouraging widespread use of HTTPS to better protect people’s surfing. It’s worth noting that Twitter is also warning sites that they may see a drop in referrals from Twitter, because browsers drop the referrer from the header when an HTTPS link goes to an HTTP destination — but it notes that it will be using referrer policy instead, which is good. Most modern browsers support referrer policy, and thus this isn’t really that big a deal. However, it’s one of the random complaints that some anti-HTTPS campaigners have argued over the years (that the lack of referrer is a big loss under HTTPS).

    • 4chan Message Board Sold to Founder of 2Channel, a Japanese Web Culture Pioneer

      4chan, an anonymous message board founded by Christopher Poole in 2003, has been home to a veritable smorgasbord of everything the web has to offer. With posts on the site lasting only a matter of days or even hours before they are deleted, the message board has been described as the collective id of the Internet, home to hardcore pornography, hardcore cooking tips and everything in between.

    • Government Asks Appeals Court To Change Its Mind On Warrant Requirement For Cell Site Location Info

      The Fourth Circuit Court of Appeals might be revisiting its recent decision of imposing a warrant requirement on the acquisition of cell site location information. The government has asked for an en banc hearing to settle this issue.

      As of now, there is no unified view on the privacy (or lack thereof) inherent to historical cell site information. Nathan Freed Wessler, staff attorney for the ACLU, has put together a map of current decisions that shows where warrant requirements have been established (for now — many are being appealed/challenged) and where they haven’t. (Click through for a [slightly] larger version.)

    • George W. Bush Tried To Retroactively Declare Illegal, Unconstitutional NSA Surveillance Legal, Because He Said So

      When it comes to the NSA, we’ve been discussing just how dangerous it is when the government gets to put in place its own secret interpretation of laws that, when read by the public, appear to say something quite different than the secret interpretation. Otherwise you have secret laws, and that’s no way to run an open Constitutional democracy. For many years, it’s been known that in March of 2004 there was a hospital room showdown between then White House Counsel Alberto Gonzales (with White House Chief of Staff Andy Card) and (at the time, quite ill) Attorney General John Ashcroft and acting Attorney General James Comey, over whether or not to reauthorize some sort of surveillance program. Comey, Ashcroft, and then FBI Director Robert Mueller all threatened to resign over the issue, and eventually, we were told, President Bush overruled Gonzales and Card. We knew at the time that the dispute was over domestic surveillance and whether or not it was legal. More recently, it came out that it was over domestic collection of internet/email metadata. This was a program similar to the phone metadata program that was revealed by Ed Snowden, but for email/internet information.

  • Civil Rights

    • Saudi Arabia declares all atheists are terrorists in new law to crack down on political dissidents

      Saudi Arabia has introduced a series of new laws which define atheists as terrorists, according to a report from Human Rights Watch.

      In a string of royal decrees and an overarching new piece of legislation to deal with terrorism generally, the Saudi King Abdullah has clamped down on all forms of political dissent and protests that could “harm public order”.

      The new laws have largely been brought in to combat the growing number of Saudis travelling to take part in the civil war in Syria, who have previously returned with newfound training and ideas about overthrowing the monarchy.

    • Militant group publishes global hitlist of bloggers, activists and writers

      An Islamic militant group in Bangladesh has issued a hitlist of secular bloggers, writers and activists around the world, saying they will be killed if its demands are not met.

      The list will raise fears that Islamic militant violence within the unstable south Asian country could take on an international dimension.

    • Phone video clears man charged with assaulting cop — even after phone disappears

      Cellphone went missing after police took it, but uploaded file exonerated accused man and left judge questioning officers’ honesty, finding their testimony “deliberately misleading.”

    • Taken Offline: Years in Prison for a Love of Technology

      Writing a letter with a pen has an odd feeling in a digital age. You pick your words carefully, without a delete key. You urge your hands to recall their best handwriting. You ponder about forms of address and how much space to leave; should I fill the page, or sign off half-way down?

      The last time I wrote a letter was to the Syrian technologist, Bassel Khartabil. I had to write a letter, because Bassel’s not online right now, despite being an enthusiastic adopter of new technology when it reached his home town of Damascus. Bassel’s not online, because he was arrested and thrown in jail for his love of the Internet and free culture, and has now been incarcerated for over three and a half years.

    • ACLU, Lawyers Group Sue Cali Police Department Over $3,000 Fee Demand For Body Cam Footage

      Once again, a government agency is attempting to price itself out of the public records market. The Hayward (CA) police department told the National Lawyers Guild that it needed to come up with $3,000 before it would turn over requested body camera footage.

  • Internet/Net Neutrality

    • White House report says Internet is a ‘core utility’ just like electricity

      A White House report says broadband Internet is a core utility people need to participate in modern society. But millions of Americans, especially in rural areas, still don’t have access to high-speed Internet.

    • The Wall Street Journal Doubles Down On Dumb: Falsely Claims Net Neutrality (‘Obamanet’) Has Crushed Broadband Investment

      Last week, we noted that the Wall Street Journal appeared to have reached a completely new low in the “conversation” about net neutrality, with a bizarre, facts-optional missive about how Netflix was to blame for pretty much everything wrong with the Internet. According to Holman W. Jenkins Jr., Netflix is the diabolical villain at the heart of a cabal to regulate the Internet, cleverly convincing regulators to treat hard-working, honest companies like Comcast unfairly. As we noted, the screed is part of a broader telecom-industry attempt to vilify Netflix for not only its support of net neutrality, but for daring to erode traditional cable TV subscriptions through (gasp) competition.

    • Network Engineers Weigh In to Support the Open Internet

      Yesterday, EFF and the ACLU filed a friend-of-the-court brief (press release) defending the Federal Communications Commission’s net neutrality rules in the federal Court of Appeals for the District of Columbia. Along with our legal arguments, we submitted a statement signed by dozens of engineers familiar with Internet infrastructure. Signers include current and former members of the Internet Engineering Task Force and Internet Corporation for Assigned Names and Numbers’ committees, professors, CTOs, network security engineers, Internet architects, systems administrators and network engineers, and even a founder of the company that registered the first “.com” domain.

      [...]

      The engineers explain in detail how ISP discrimination could require innovators to negotiate with ISPs before their applications will work, rather than being able to rely on ISPs to pass data in a neutral manner. ISP interference could also introduce errors and security vulnerabilities that would be challenging to fix.

    • The internet is run by an unaccountable private company. This is a problem

      What if instead of organising a football competition every four years, Fifa took on management of the internet? Leaving aside the arrests and bribery allegations, the organisation might look a bit like the Internet Corporation for Assigned Names and Numbers ( Icann), the private California company responsible for overseeing the running of the internet. The scary thing about Fifa is that, when things go wrong, no one else has the power to intervene.

      It was thought that 30 September 2015 was supposed to be a significant date in internet governance. The US government was going to hand over key responsibilities to the internet community – but that date will be missed, because Icann’s board looks set to oppose plans to make itself more accountable.

      If Icann’s board can override the consensus of its own community, it casts doubt on the viability of the entire Icann model, and exposes the flakiness of the way essential internet resources are governed.

  • DRM

    • White Hat Hackers Would Have Their Devices Destroyed Under the TPP

      Car hackers, farmers fixing their high-tech tractors, and teenage DVD rippers; all over the world, these digital tinkerers could have their devices seized and destroyed by the authorities thanks to provisions in the newly-minted Trans-Pacific Partnership trade deal.

      The finalized copyright chapter of the TPP, leaked on Friday by Wikileaks, reveals that under the agreement, “judicial authorities shall, at least, have the authority to [...] order the destruction of devices and products found to be involved in” any activity that circumvents controls that manufacturers build into their software or devices, known as Digital Rights Management (DRM) technology.

    • Researchers Could Have Uncovered Volkswagen’s Emissions Cheat If Not Hindered by the DMCA

      Automakers argue that it’s unlawful for independent researchers to look at the code that controls vehicles without the manufacturer’s permission. We’ve explained before how this allows manufacturers to prevent competition in the markets for add-on technologies and repair tools. It also makes it harder for watchdogs to find safety or security issues, such as faulty code that can lead to unintended acceleration or vulnerabilities that let an attacker take over your car.

  • Intellectual Monopolies

    • Trademarks

    • Copyrights

      • WikiLeaks: ISPs to hand over copyright infringer details under TPP

        The Trans-Pacific Partnership (TPP) will force internet service providers (ISPs) to give up the details of copyright infringers so that rights holders can protect and enforce their copyright through criminal and civil means with few limitations, according to the intellectual property chapter released by WikiLeaks over the weekend.

      • Pirate Bay: What Raid? Police Never Got Our Servers

        Late last year The Pirate Bay was pulled offline after Swedish police raided a datacenter near Stockholm. The police confiscated dozens of servers which many believed to belong to the notorious torrent site. Today, the TPB team reveals that this is not the case.

      • South African Cybercrime Bill Would Throw the Book at Copyright Infringers

        Last month South Africa released its draft Cybercrimes and Cybersecurity Bill for public comment; the latest in a wave of such laws that has been sweeping the continent and beyond. EFF is currently reviewing the Bill with a view to sending a submission by the deadline of November 30, and we’ll have more to say about it before then. But there is one provision that deserves immediate comment: a clause that would criminalize essentially any infringement of copyright. This provision is oddly timed, given that South Africa is also separately considering amendments to its Copyright Act.

      • [Old] Judge Says Warner Chappell Doesn’t Hold The Copyright On Happy Birthday (But Not That It’s Public Domain)
      • Cox Accuses Rightscorp of Mass Copyright Infringement

        Internet provider Cox Communications has hit back at anti-piracy company Rightscorp. While denying responsibility for the alleged copyright infringements of its subscribers, Cox turns the tables, accusing Rightscorp of sharing thousands of copyrighted works without permission.

      • RIAA CEO: Piracy Notices Are Costly & Increasingly Pointless

        The CEO and chairman of the RIAA says that the current notice and takedown anti-piracy process is both costly and increasingly pointless. Cary Sherman says the safe harbor provisions of the DMCA have forced labels into a “never-ending game” of whack-a-mole while sites under its protection effectively obtain a discount music licensing system.

      • Leaked TPP Chapter Proposes Drastic Copyright Changes

        A leaked chapter of the final Trans-Pacific Partnership (TPP) agreement proposes several changes to the copyright laws of participating countries. The intellectual property chapter covers a broad range of issues including extended copyright terms, ISP liability and criminalization of non-commercial piracy.

      • Kim Dotcom Denied Fresh Bid to Delay U.S. Extradition Hearing

        A judge has denied a bid by Kim Dotcom to suspend his long-awaited extradition hearing. The hearing began yesterday but was met with immediate calls by the Megaupload founder’s legal team to postpone to a later date. The decision handed down today by Judge Nevin Dawson means that evidence will be heard when the court resumes on Thursday.

      • Kim Dotcom’s Extradition Hearing Gets Underway

        After more than 3.5 years of legal argument and ten delays in proceedings, Kim Dotcom’s extradition hearing finally got underway this morning. The United States government wants Dotcom and his co-accused to be tried overseas for their role in Megaupload, but the larger-than-life entrepreneur intends to turn this into a dogfight.

      • U.S. Uncovers Kim Dotcom’s Self-incriminating Skype Calls

        After several years’ delay the extradition hearing of Kim Dotcom finally got moving this morning in the Auckland District Court. Characterizing the case as one of straightforward fraud, Crown lawyer Christine Gordon QC likened Megaupload to a post office shipping drugs, one in which its owners were well aware of their cargo.

10.11.15

Links 11/10/2015: Kate/KDevelop Sprint, Blender 2.76

Posted in News Roundup at 11:28 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Report: Twitter prepping for “company-wide layoffs” next week

    Following the news that Twitter interim CEO Jack Dorsey was fully hired to the post on Monday, the company has been linked to a series of what Re/code has described as “company-wide layoffs” next week.

    A Friday report from Re/code cited “multiple sources” in saying that most of Twitter’s departments will be hit with layoffs starting next week. Those sources did not specify numbers or percentages of staff, but they did point to Twitter’s plans to “restructure” its engineering staff, which may affect how the alleged firings play out in all. When asked to comment on the report, a Twitter representative told Ars that “we’re not commenting on rumor and speculation.”

  • Hardware

    • Smartmobe brain maker Qualcomm teases 64-bit ARM server chip secrets

      Qualcomm, the maker of processors for Nexus smartphones and other mobes and tablets, has revealed early specifications for its upcoming server chips.

      The California company is best known for designing the brains in handheld devices, networking kit, and other embedded gear.

  • Health/Nutrition

    • Monsanto’s Stock Is Tanking. Is the Company’s Own Excitement About GMOs Backfiring?

      Pity Monsanto, the genetically modified seed and agrichemical giant. Its share price has plunged 25 percent since the spring. Market prices for corn and soybeans are in the dumps, meaning Monsanto’s main customers—farmers who specialize in those crops—have less money to spend on its pricey seeds and flagship herbicide (which recently got named a “probable carcinogen” by the World Health organization, spurring lawsuits).

    • Study: Fracking Industry Wells Associated With Premature Birth

      Expectant mothers who live near active natural gas wells operated by the fracking industry in Pennsylvania are at an increased risk of giving birth prematurely and for having high-risk pregnancies, new Johns Hopkins Bloomberg School of Public Health research suggests.

      The findings, published online last week in the journal Epidemiology, shed light on some of the possible adverse health outcomes associated with the fracking industry, which has been booming in the decade since the first wells were drilled. Health officials have been concerned about the effect of this type of drilling on air and water quality, as well as the stress of living near a well where just developing the site of the well can require 1,000 truck trips on once-quiet roads.

  • Security

    • Amazon, Google Boost Cloud Security Efforts

      Not to be outdone, Google introduced its Google Cloud Security Scanner the same day of the Amazon Inspector announcement. Unlike Inspector, Google’s product is already generally available.

    • CryptoLocker Ransomware Springs on Scandinavians [Ed: Windows]

      The screenshot, as gained by Heimdal Security, shows the link within the email that, when clicked, will redirect unsuspecting users to a website that will download the file ‘forsendelse.zip’, containing the executable file, forsendelse.exe.

    • iOS 9 Lock-Screen Bug Grants Access to Contacts, Photos

      A clever iPhone user uncovered a new exploit in iOS 9 (and 9.0.1) that allows a person—presumably with a list of handwritten steps—to bypass the device’s passcode and get into the Contacts and Photos apps.

      So unless you have a bunch of selfies you don’t want anyone to see, or you use an alphanumeric instead of a four-digit passcode, you probably don’t have much to worry about. You can also cripple the exploit by disabling Siri on your lock screen, though you’ll lose convenience in the process.

    • Malware that hit Apple similar to that developed by CIA: report

      The techniques used by XcodeGhost, the infected version of Apple’s Xcode compiler that has caused an eruption of malware on the Apple China app store, are similar to those developed and demonstrated by America’s Central Intelligence Agency.

      A report in The Intercept, a website run by Glenn Greenwald who is well-known for having been the first to report on the NSA spying disclosures made by the former US defence contractor Edward Snowden, claims the CIA detailed the techniques at its annual top-secret Jamboree conference in 2012.

  • Defence/Police/Secrecy/Aggression

    • Media Reports ISIS Nuclear Plot That Never Actually Involved ISIS

      There was only one problem: At no point do the multiple iterations of the AP‘s reporting show that anyone involved in the FBI sting were members of or have any connection to the Islamic State in Iraq and Syria (aka ISIL or Daesh). While one of several smuggling attempts discussed in AP‘s reporting involved an actual potential buyer–an otherwise unknown Sudanese doctor who four years ago “suggested that he was interested” in obtaining uranium–the “terrorists” otherwise involved in the cases were FBI and other law enforcement agents posing as such.

    • Phyllis Bennis on US Bombing of Afghan Hospital

      This week on CounterSpin: The Pentagon has declared the bombing of a hospital in Kunduz, Afghanistan, a “mistake.” But it will investigate itself to determine how US bombs came to destroy the Doctors Without Borders facility, killing at least 22 people. Doctors Without Borders is calling for an independent investigation—and you would think journalists would, too, since who knows better than they the administration’s history of changing its story?

    • Self-censorship

      It is well enough to condemn the US for bombing a hospital and killing Muslims in Kunduz but what about the Muslim members of a wedding party who were bombed into extinction in a formerly friendly country by the air force of an extremely friendly country?

    • Turkish police use tear gas to stop mourners laying carnations at the site of bombings in Ankara that killed 97 people as officials say ‘initial signs point to ISIS responsibility’

      Turkish police fired tear gas to disperse mourners who were laying flowers at the site of Turkey’s deadliest ever terror attack this morning.

      Two Turkish security sources said ‘initial signs’ suggest ISIS were behind the two explosions which killed at least 97 and wounded 247 more at a peace rally in Ankara yesterday.

      Protesters clashed with riot police in Istanbul last night as they took to the streets to denounce the attacks. And today, police clashed with demonstrators and pro-Kurdish officials at the scene of the disaster near Ankara’s main train station.

      They held back the mourners, including the pro-Kurdish party’s leaders Selahattin Demirtas and Figen Yuksekdag, insisting that investigators were still working at the site.

    • The day I met the other victims of extremism: boys brainwashed to kill

      In the mountains of Pakistan I met young men who would have killed me. They would have slit my throat, put a bullet in my brain, caved in my skull with a rock. After I was dead they would have severed my head from my body and displayed it as a warning to all.

  • Transparency Reporting

    • Wikileaks Releases Final Intellectual Property Chapter Of TPP Before Official Release

      Last weekend, negotiators finally completed negotiations on the Trans Pacific Partnership (TPP) agreement. However, as we noted, there was no timetable for the release of the text (though some are now saying it may come out next week). Once again, it was ridiculous that the negotiating positions of the various countries was secret all along, and that the whole thing had been done behind closed doors. And to have them not be ready to release the text after completion of the negotiations was even more of a travesty. Wikileaks, however, got hold of the Intellectual Property Chapter and has released it online.

    • The Final Leaked TPP Text is All That We Feared

      Today’s release by Wikileaks of what is believed to be the current and essentially final version of the intellectual property (IP) chapter of the Trans-Pacific Partnership (TPP) confirms our worst fears about the agreement, and dashes the few hopes that we held out that its most onerous provisions wouldn’t survive to the end of the negotiations.

      Since we now have the agreed text, we’ll be including some paragraph references that you can cross-reference for yourself—but be aware that some of them contain placeholders like “x” that may change in the cleaned-up text. Also, our analysis here is limited to the copyright and Internet-related provisions of the chapter, but analyses of the impacts of other parts of the chapter have been published by Wikileaks and others.

  • Environment/Energy/Wildlife

    • Elon Musk Says Climate Change Will Bring Even Worse Refugee Crisis

      Tech visionary warns that countries must do more to combat climate change

      Climate change could create a refugee crisis far worse than the one currently unfolding in Europe, Elon Musk warned Thursday.

      The Tesla CEO gave a speech in Berlin in which he said changes in Earth’s temperature could lead to depleted water and food supplies, thus forcing millions of people to leave their homes in search of resources, the Huffington Post reports.

    • ‘Polluter Interests Have Been Spending Millions on Disinformation Campaigns’

      Janine Jackson: “New Regulations on Smog Remain as Divisive as Ever.” That was the headline on a September 30 New York Times story which balanced what it called “concerns of lung doctors” that smog, or ozone, is a public health threat with industry claims that installing new equipment, in the reporter’s words, “could kneecap American manufacturing and threaten jobs across the country.” Three different industry sources were counterposed with a single representative of the American Lung Association.

      But if the topic is harmful pollution, is the public really served by coverage that centers the views of the polluters? What’s a different way to talk about it? David Baron is managing attorney in the DC office of the group Earthjustice. His article “Smog Kills” appeared recently in Politico. He joins us now by phone from Washington, DC; welcome to CounterSpin, David Baron.

    • On Climate Change, Listen to Pope Francis, Not Jeb Bush

      The politician says we should disregard the pope because “he’s not a scientist.” But the pope’s background is in chemistry and his counselors are top scientists.

    • The collapse of Saudi Arabia is inevitable

      On Tuesday 22 September, Middle East Eye broke the story of a senior member of the Saudi royal family calling for a “change” in leadership to fend off the kingdom’s collapse.

      In a letter circulated among Saudi princes, its author, a grandson of the late King Abdulaziz Ibn Saud, blamed incumbent King Salman for creating unprecedented problems that endangered the monarchy’s continued survival.

      “We will not be able to stop the draining of money, the political adolescence, and the military risks unless we change the methods of decision making, even if that implied changing the king himself,” warned the letter.

      Whether or not an internal royal coup is round the corner – and informed observers think such a prospect “fanciful” – the letter’s analysis of Saudi Arabia’s dire predicament is startlingly accurate.

      Like many countries in the region before it, Saudi Arabia is on the brink of a perfect storm of interconnected challenges that, if history is anything to judge by, will be the monarchy’s undoing well within the next decade.

    • Report: VW was warned about cheating emissions in 2007

      The Volkswagen scandal—selling 11 million diesel-engined cars designed to fool US emissions regulations—is moving into the “who knew what, and when” phase. Newspapers in Germany are reporting that Bosch (the company that supplies electronics to the auto industry) warned VW only to use the cheat mode internally back in 2007, and that a These findings both emerged from an internal audit at VW in response to the scandal.

  • Finance

  • PR/AstroTurf/Lobbying

    • Major Papers Reject the Opt-Out Option

      All three papers offered arguments that closely align with the rhetoric of corporate education reform, focusing on the plight of low-income students of color while ignoring the realities of how testing affects such populations.

    • New Yorker Calls Corbyn ‘Childlike’–but Who Are They Kidding?

      The landslide victory of left-wing candidate Jeremy Corbyn for Labour Party leader in the United Kingdom has many establishment types bent out of shape. The Blair wing of the party was literally obliterated, with Corbyn drawing more than four times the votes of his nearest competitor. After giving the country the war in Iraq, and the housing bubble whose collapse led to the 2008-2009 recession and financial crisis, the discontent of the Labour Party’s rank and file is understandable.

    • CBS Analyst Pushes Paul Ryan For Speaker Without Disclosing Ryan Paid Him Over $100K

      CBS News analyst Frank Luntz pushed Rep. Paul Ryan (R-WI) for House Speaker, claiming “he’s got a brain for policy, which is what we need in Washington right now,” adding, “if Paul Ryan says no, God help us.” CBS News and Luntz did not disclose that Ryan has paid Luntz’s company over $100,000 in consulting fees in recent years.

    • CNN is basically begging Joe Biden to join its Democratic debate

      This is quite unlike the rules CNN set for its Republican presidential debate earlier this month. In addition to reaching a poll threshold, candidates had to officially file with the FEC and say they were running three weeks before the debate. They also had to have a paid campaign aide working in at least two of the four early voting states (Iowa, New Hampshire, South Carolina, and Nevada). And they had to have visited two of those states at least once.

      Those Republican rules were designed to keep many candidates in the large field offstage. But CNN’s starkly different Democratic rules have seemingly been deliberately designed in hopes of coaxing one potential candidate in particular — Biden — onstage.

    • Noam Chomsky: Bernie Sanders can’t save America

      Throughout his illustrious career, one of Noam Chomsky’s chief preoccupations has been questioning — and urging us to question — the assumptions and norms that govern our society.

      Following a talk on power, ideology, and US foreign policy last weekend at the New School in New York City, freelance Italian journalist Tommaso Segantini sat down with the eighty-six-year-old to discuss some of the same themes, including how they relate to processes of social change.

      For radicals, progress requires puncturing the bubble of inevitability: austerity, for instance, “is a policy decision undertaken by the designers for their own purposes.” It is not implemented, Chomsky says, “because of any economic laws.” American capitalism also benefits from ideological obfuscation: despite its association with free markets, capitalism is shot through with subsidies for some of the most powerful private actors. This bubble needs popping too.

    • Fox News Doc Defends Ben Carson By Criticizing German Jews For Failing To Resist The Nazis

      Fox News contributor Dr. Keith Ablow is defending Republican presidential candidate Ben Carson’s controversial remarks that fewer people would have been killed in the Holocaust had they been armed by criticizing German Jews for not having “more actively resisted” the Nazis.

      Carson sparked an outcry after he claimed the outcome of the Holocaust “would have been greatly diminished if the people had been armed.” Carson has stood by his comments. The Anti-Defamation League called Carson’s remarks “historically inaccurate.”

      In an October 9 FoxNews.com piece, Ablow defended Carson’s comments by asserting, “If Jews in Germany had more actively resisted the Nazi party or the Nazi regime and had diagnosed it as a malignant and deadly cancer from the start, there would, indeed, have been a chance for the people of that country and the world to be moved to action by their bold refusal to be enslaved.”

  • Censorship

  • Privacy

    • Snooper Charter Strikes Back event success

      Earlier in the week we had the pleasure of entraining Jim Killock, ORG’s executive director, ahead of a workshop on talking you MP about intrusive surveillance.

      Jim bought us entertainingly up to date with the current thinking around the still-under-wraps government plans for wide-ranging updates to their subservience powers. Happy to take questions, Jim elaborated a number of points with us, including explaining a bit about what ORG’s plans are, which led neatly into the other half of the evening, but not before everyone had a well deserved tea break.

    • Everything You Need to Know About AOL’s Zombie Apocalypse

      America Online (AOL) will be resurrecting Verizon’s zombie cookies because they are fabulous data-trackers that cannot be “killed”.

    • Obama administration opts not to force firms to decrypt data — for now

      After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not — for now — call for legislation requiring companies to decode messages for law enforcement.

    • Turnbull: Don’t assume government email is more secure than private email

      Australian Prime Minister Malcolm Turnbull responded to concerns over the use of his own private email server by saying politicians use insecure communication all the time.

    • Chinese Credit Scoring System Smacks Of Censorship

      Rogier Creemers, a China-specialist with Oxford University, told ComputerWorld, “With the help of the latest internet technologies the government wants to exercise individual surveillance. Government and big internet companies in China can exploit ‘Big Data’ together in a way that is unimaginable in the West.”

    • China’s new credit reports are the government’s latest censorship tool

      Chinese Internet users now have one more reason to look over their digital shoulders at the government’s nearly inescapable surveillance and censorship regime.

    • ACLU: Orwellian Citizen Score, China’s credit score system, is a warning for Americans

      Gamer? Strike. Bad-mouthed the government in comments on social media? Strike. Even if you don’t buy video games and you don’t post political comments online “without prior permission,” but any of your online friends do….strike. The strikes are actually more like dings, dings to your falling credit score that is.

      Thanks to a new terrifying use of big data, a credit score can be adversely affected by your hobbies, shopping habits, lifestyles, what you read online, what you post online, your political opinions as well as what your social connections do, say, read, buy or post. While you might never imagine such a credit-rating system in America, it is happening in China and the ACLU said it serves as a warning for Americans.

    • White House Takes The Cowardly Option: Refuses To Say No To Encryption Backdoors, Will Quietly Ask Companies

      Last month, we wrote about a document leaked to the Washington Post that showed the three “options” that the White House was considering for responding to the debate about backdooring encryption. The document made it clear that the White House knew that there was zero chance that any legislation mandating encryption backdoors would pass. But the question then was what to do about it: take a strong stand on the importance of freedom and privacy, and make it clear that the US would not mandate backdoors… or take the sleazy way out and say “no new legislation for now.” As we said at the time, option 1 was the only real option. You take a stand. You talk about the importance of encryption in protecting the public.

    • European Supreme Court: Because of NSA, U.S. Corporations Have No Self-Agency To Agree To Privacy Obligations

      This week, the European Court of Justice – the highest court in the European Union – declared that US companies may not transmit private sensitive personal data out of Europe to the United States for processing as they have up until now. It was a cancellation of the so-called Safe Harbor agreement, where U.S. companies self-declare that they meet certain European privacy standards. But the European Court of Justice’s (ECJ) reason for declaring Safe Harbor null and void goes far beyond the cancellation as such – it says that U.S. companies don’t have agency to make any such promises of any kind in the first place, contractual or unilateral, not now, not ever, as long as the NSA operates.

    • Tech companies like Facebook not above the law, says Max Schrems

      The EU’s safe harbour ruling is a “puzzle piece in the fight against mass surveillance, and a huge blow to tech companies who think they can act in total ignorance of the law,” says Max Schrems, the man who brought the case.

      “US companies are realising that European laws are getting more and more enforced. But still, people don’t believe that a court would order Google or Facebook to do something – they wouldn’t dare. Well, yes, they fucking would,” he said, speaking in Vienna.

    • How much money do you make for Facebook?

      How much do you estimate you’re worth to Facebook? If you live in America, it’s a lot more than if you’re a resident of the UK or other countries.

      US Facebook users generate the site on average four times more advertising revenue than users outside of the country, making around $48.76 per year per user as opposed to $7.71, according to market research firm eMarketer.

      The firm predicts revenue is set to rise to $61.06 in 2016 before reaching $73.29 the following year. Non-US users meanwhile, are expected to rise to $9.26 and $10.79 respectively.

    • The node pole: inside Facebook’s Swedish hub near the Arctic Circle

      From the outside, it looks like an enormous grey warehouse. Inside, there is a hint of the movie Bladerunner: long cavernous corridors, spinning computer servers with flashing blue lights and the hum of giant fans. There is also a long perimeter fence. Is its job to thwart corporate spies? No – it keeps out the moose.

    • EU-US Safe Harbour For Personal Data Eliminated

      The European Court of Justice (CJEU) handed down a decision declaring EU-US safe harbour for personal data invalid this morning. It has far-reaching implications for cloud services in particular and may presage increased opportunity for open source solutions from non-US suppliers. Looks like a real gift to companies like Kolab.

    • Facebook: I want out

      Two weeks ago, on my birthday, I decided to check Facebook for birthday wishes because I was having a crappy birthday. It became much worse when Facebook did two things. First, it informed me it had removed an image posted to my timeline based on violating its nudity/obscenity policy — though I had not posted an image, only a link to a post in which I wrote about a new documentary on identity and the gender binary (my link was posted with an NSFW warning). No image. I’ve been around the internet a long time, and I’ve been censored — mostly under inaccurate circumstances — by everyone from the government of Libya to Flickr, feminists and Christian conservatives alike, and Facebook too, when a religious organization campaigned to (successfully) get one of my pages removed on false pretenses.

    • Marketers thought the Web would allow perfectly targeted ads. Hasn’t worked out that way.

      Fake traffic has become a commodity. There’s malware for generating it and brokers who sell it. Some companies pay for it intentionally, some accidentally, and some prefer not to ask where their traffic comes from. It’s given rise to an industry of countermeasures, which inspire counter-countermeasures. “It’s like a game of whack-a-mole,” says Fernando Arriola, vice president for media and integration at ConAgra Foods. Consumers, meanwhile, to the extent they pay attention to targeted ads at all, hate them: The top paid iPhone app on Apple’s App Store is an ad blocker.

    • Stealing fingerprints

      The news from the Office of Personnel Management hack keeps getting worse. In addition to the personal records of over 20 million US government employees, we’ve now learned that the hackers stole fingerprint files for 5.6 million of them.

    • GCHQ tried to track Web visits of “every visible user on Internet”
    • GCHQ’s Karma Police: Tracking And Profiling Every Web User, Every Website

      As of 2012, GCHQ was storing about 50 billion metadata records about online communications and Web browsing activity every day, with plans in place to boost capacity to 100 billion daily by the end of that year. The agency, under cover of secrecy, was working to create what it said would soon be the biggest government surveillance system anywhere in the world.

      That’s around 36 trillion metadata records gathered in 2012 alone — and it’s probably even higher now. As Techdirt has covered previously, intelligence agencies like to say this is “just” metadata — skating over the fact that metadata is actually much more revealing than traditional content because it is much easier to combine and analyze. An important document released by The Intercept with this story tells us exactly what GCHQ considers to be metadata, and what it says is content. It’s called the “Content-Metadata Matrix,” and reveals that as far as GCHQ is concerned, “authentication data to a communcations service: login ID, userid, password” are all considered to be metadata, which means GCHQ believes it can legally swipe and store them. Of course, intercepting your login credentials is a good example of why GCHQ’s line that it’s “only metadata” is ridiculous: doing so gives them access to everything you have and do on that service.

    • Facebook Ads Are All-Knowing, Unblockable, and in Everyone’s Phone

      Sheryl Sandberg’s top concern as she prepares for New York’s largest annual gathering of advertising and media executives this week has nothing to do with ad-blocking software or click fraud. Sandberg, Facebook’s chief operating officer, can brag to Advertising Week attendees about how the world’s largest social network is largely immune to forces that have sent Internet and publishing companies into a panic. But Sandberg is losing her voice, so her pitch will need to be succinct.

      Between sips of strawberry water at the company’s Menlo Park, Calif., headquarters, Sandberg explains how Facebook has avoided controversies around online advertising with its emphasis on a single account tied to a user’s real-world identity and subtle ads that can be easily scrolled past if the user isn’t interested. What advertisers want, according to a raspy-voiced Sandberg, is “to reach people in a way that feels good, that’s not intrusive.” The argument ignores that Facebook trackers are just about everywhere on the Internet. But because most of Facebook’s 1.49 billion users routinely access the service through an app, the ads cannot be hidden using one of the many blocker tools now topping the download charts on Apple’s App Store.

    • CityNews investigation: Prison cellphone surveillance may have hit nearby homes

      A CityNews investigation reveals Correctional Services Canada (CSC) introduced super surveillance technology in at least one federal institution this winter; capturing calls and texts made from inside the jail, the visitor parking lot and, potentially, passing drivers and residents who live in close proximity to the institution.

      “We understand and believe there’s really been a breach of privacy. These were personal cell phones and personal calls. We’re looking at it from a legal aspect,” the Union of Canadian Correctional Officers’ Jason Godin told CityNews.

      A confidential Sept. 17, 2015 email sent by Warkworth Institution’s warden Scott Thompson to staff at the Campbellford-area prison, and obtained by CityNews, details how the technology captures these conversations.

    • How I hacked my IP camera, and found this backdoor account

      The time has come. I bought my second IoT device – in the form of a cheap IP camera. As it was the cheapest among all others, my expectations regarding security was low. But this camera was still able to surprise me.

      Maybe I will disclose the camera model used in my hack in this blog later, but first I will try to contact someone regarding these issues. Unfortunately, it seems a lot of different cameras have this problem, because they share being developed on the same SDK. Again, my expectations are low on this.

    • “Snowden Treaty” proposed to curtail mass surveillance and protect whistleblowers

      A “Snowden Treaty” designed to counter mass surveillance and protect whistleblowers around the world has been proposed by Edward Snowden, and three of the people most closely associated with his leaks: the documentary film-maker Laura Poitras; David Miranda, who was detained at Heathrow airport, and is the Brazilian coordinator of the campaign to give asylum to Snowden in Brazil; and his partner, the journalist Glenn Greenwald. The “International Treaty on the Right to Privacy, Protection Against Improper Surveillance and Protection of Whistleblowers,” to give it its full title, was launched yesterday in New York by Miranda, with Snowden and Greenwald speaking via video.

  • Civil Rights

    • NRA’s Ted Nugent Calls Unarmed Victims Of Gun Violence “Losers”

      National Rifle Association board member Ted Nugent said “losers” who don’t carry a gun “get cut down by murderous maniacs like blind sheep to slaughter” in a column for WND, becoming the latest public conservative figure to blame victims of gun violence who are unarmed.

    • Locked Out Of The Sixth Amendment By Proprietary Forensic Software

      Everything tied to securing convictions seems to suffer from pervasive flaws compounded by confirmation bias. For four decades, the DOJ presented hair analysis as an unique identifier on par with fingerprints or DNA when it wasn’t. A 2014 Inspector General’s report found the FBI still hadn’t gotten around to correcting forensic lab issues it had pointed out nearly 20 years earlier. This contributed to two decades of “experts” providing testimony that greatly overstated the results of hair analysis. All of this happened in the FBI’s closed system, a place outsiders aren’t allowed to examine firsthand.

      That’s the IRL version. The software version is just as suspect. Computers aren’t infallible and the people running them definitely aren’t. If the software cannot be inspected, the statements of expert witnesses should be considered highly dubious. After all, most expert witnesses representing the government have a vested interest in portraying forensic evidence as bulletproof. Without access to forensic software code, no one will ever be able to prove them wrong.

    • Saudi Arabia’s troubling death sentence

      On September 14, local media reported that an appeals court and Saudi Arabia’s Supreme Court had upheld the death sentence of Ali al-Nimr for participating in protests four years ago. He was 16 at the time. Today, he awaits the execution of his sentence, which stipulates that al-Nimr should be beheaded and that his headless body should be strung up for public display.

    • Saudi employer chops off Indian woman’s hand, Delhi seeks action

      Kasturi, 50, is currently undergoing treatment at a hospital in Riyadh, her sister Vijayakumari told The Indian Express from their home in Vellore district.

    • India woman’s arm ‘cut off by employer’ in Saudi Arabia

      India’s foreign ministry has complained to the Saudi Arabian authorities following an alleged “brutal” attack on a 58-year-old Indian woman in Riyadh.

      Kasturi Munirathinam’s right arm was chopped off, allegedly by her employer, when she tried to escape from their house last week, reports say.

    • UK and Saudi Arabia ‘in secret deal’ over human rights council place

      Leaked documents suggest vote-trading deal was conducted to enable nations to secure a seat at UN’s influential body

    • ‘UK did secret Saudi deal on human rights’: Cables allege Britain approached Gulf State about vote trade to support each other’s election to UN council

      Britain has been accused of backing Saudi Arabia’s election to the United Nations top human right’s body as part of a vote trading deal – despite the Gulf State’s appalling abuse record.

      Secret cables reportedly show that Britain approached Saudi Arabia about the trade ahead of the 2013 election for membership of the Human Rights Council (UNHRC).

      The Saudi regime has shameful record on human rights and has executed 135 people since January on charges ranging from murder to witchcraft.

    • Matthew Keys’ Hacking Conviction May Not Survive an Appeal

      The conviction of former Reuters employee Matthew Keys on hacking charges this week has renewed focus on a controversial federal law that many say prosecutors are using incorrectly and too broadly to inflate cases and trump up charges.

      The Computer Fraud and Abuse Act, or CFAA, is a federal law that was designed to target malicious hackers who obtain unauthorized access to protected computers. But judges have used it in a number of controversial cases to, for example, prosecute and convict a woman for violating MySpace’s user agreement, and to convict a former Korn/Ferry International employee for violating his employer’s computer use policy. It was also used to indict internet activist Aaron Swartz for downloading scholarly articles that he was authorized to access.

    • In The Post-Ferguson World, Cops Are Now Victims And It’s The Public That’s Going To Pay The Price

      There’s a new narrative out there — one that’s being repeated by campaigning politicians and buttressed by fearful news reports. Apparently, the public has declared war on law enforcement. Each shooting of a police officer is presented as evidence that it’s open season on cops. Officers aren’t simply killed. They’re “targeted.” The problem is, the stats don’t back this up.

    • 71% Of Americans Oppose Civil Asset Forfeiture. Too Bad Their Representatives Don’t Care.

      Most Americans haven’t even heard of civil asset forfeiture. This is why the programs have run unchallenged for so many years. An uninformed electorate isn’t a vehicle for change. This issue is still a long way away from critical mass.

      Without critical mass, there’s little chance those who profit from it will lose their power over state and federal legislatures. Forfeiture programs are under more scrutiny these days, but attempts to roll back these powers, or introduce conviction requirements, have been met with resistance from law enforcement agencies and police unions — entities whose opinions are generally respected far more than the public’s.

      California’s attempt to institute a conviction requirement met with pushback from a unified front of law enforcement groups. Despite nearly unanimous support by legislators, the bill didn’t survive the law enforcement lobby’s last-minute blitz. They also had assistance from the Department of Justice, which pointed out how much money agencies would be giving up by effectively cutting off their connection with federal agencies if the bill was passed.

    • H&M features its first Muslim model in a hijab

      Twenty-three year old Mariah Idrissi is the first Muslim woman in a hijab to be featured by world’s second largest fashion store

    • America’s most secretive court invites its first outsider

      A well-known Washington, DC lawyer has been appointed to be the first of a total of five amici curae—friends of the court—who will act as a sort of ombudsman or public advocate at the Foreign Intelligence Surveillance Court (FISC).

      The move was one of the provisions in the USA Freedom Act, which passed in June 2015 as a package of modest reforms to the national security system.

      The attorney, Preston Burton, was named to the post by the FISC earlier this month, which was not widely reported until The Intercept noticed it on Friday.

      Burton was likely selected because he has dealt with many security-related cases in the past, including former CIA intelligence agent Aldrich H. Ames, and former FBI Special Agent Robert Hanssen. In addition, according to his own biography, he “has held a Top Secret/SCI level security clearance at numerous points in his career,” which he will likely need again.

    • Facebook ‘unfriending’ can constitute workplace bullying, Australian tribunal finds

      Australia’s workplace tribunal ruled that a woman was bullied after she was unfriended on Facebook following work dispute

    • Absolutely Egregious: Man Jailed For Unpaid Traffic Ticket Gets Ignored Until He Dies In Custody

      This is so terrible. The guy — from a Detroit area suburb — is off his addiction-treatment meds and in withdrawal, and, at one point, lies under his bed, clawing up at it. What kind of person looks at a human being in this condition and just leaves them in their cage?

      During his 17 days in jail, in the final days the horror of his withdrawal, he laid there on the floor for 48 hours, waiting to die — in a cell that was supposed to be specially monitored.

      This guy was not a violent criminal. He lost 50 pounds in 17 days while jailed for an unpaid ticket.

    • Selling Out and the Death of Hacker Culture

      We’ve sold each other for profit and lost what makes us happy.

    • The Jocks of Computer Code Do It for the Job Offers
  • Internet/Net Neutrality

    • Tennessee Voraciously Defends Its Right To Let AT&T Write Awful State Broadband Laws

      After fifteen years in an apparent coma, earlier this year the FCC woke up to the fact that ISPs were effectively paying states to pass laws focused entirely on protecting uncompetitive, regional broadband duopolies. More specifically, they’ve been pushing legislation that prohibits towns and cities from improving their own broadband infrastructure — or in some cases partnering with utilities or private companies — even in areas local incumbents refused to upgrade. It’s pure protectionism, and roughly twenty states have passed such ISP-written laws nationwide.

    • Facebook Hopes Renaming Internet.org App Will Shut Net Neutrality Critics Up

      Facebook is trying its best to defuse worries that the company is trying to impose a bizarre, walled-garden vision of the Internet upon the developing world. As we’ve been discussing, Facebook’s Internet.org initiative has been under fire of late in India, where the government has been trying to not only define net neutrality, but craft useful rules. Early policy guidelines have declared Internet.org to be little more than glorified collusion, since while it does offer limited access to some free services, it involves Facebook determining which services users will be able to access (and encrypted content wasn’t on the Facebook approval list).

    • Mark Zuckerberg tells the UN: ‘the internet belongs to everyone’

      Zuck was presenting a document signed by himself as well as Bill and Melinda Gates, stating: “The internet belongs to everyone. It should be accessible by everyone.”

      [...]

      Google too has been involved in looking for ways to improve coverage in remote areas. The firm’s Project Loon works to provide internet access using weather balloons. Bill Gates slammed this project stating that it won’t uplift the poor. Something has clearly changed his mind.

    • Facebook founder calls for universal Internet to help cure global ills

      Signing on to the connectivity campaign were U2 star Bono, co-founder of One, a group that fights extreme poverty; actress Charlize Theron, founder of Africa Outreach Project; philanthropists Bill and Melinda Gates; British entrepreneur Richard Branson; Huffington Post editor Arianna Huffington; Colombian singer Shakira, actor and activist George Takei and Wikipedia co-founder Jimmy Wales.

    • Where the candidates stand on Net neutrality

      What is it about Net neutrality that invites such political posturing over a principal that enjoys huge bipartisan support among voters? While 85 percent of Republican voters oppose the creation of Internet fast lanes, presidential candidate Jeb Bush made headlines this week saying that if elected he would roll back Net neutrality rules passed under the Obama administration.

      The Open Internet regulations still face legal challenges, but the biggest threat could come in 2016. President Obama has been a firm supporter of Net neutrality rules enacted by the FCC and a sure vetoer of any attempts by Congress to undo them. But what happens with the next president — and the next FCC? The agency is directed by five commissioners appointed to five-year terms by the president, but only three commissioners may be from the same political party. The FCC approved the current rules along party lines, with a 3-2 vote, but in 2017 the next president will be in a position to appoint a new commissioner who could reverse that vote.

  • DRM

    • Librarian of Congress who made phone unlocking illegal retires today

      The Librarian of Congress wields a surprising amount of power over the mobile devices we use every day. Once every three years, the head of the US Library of Congress is responsible for handing out exemptions to the anti-circumvention provisions in the Digital Millennium Copyright Act (DMCA).

    • How the DMCA may have let carmakers cheat clean air standards

      It was by sheer chance that the software “defeat device” that allowed Volkswagen to thwart emission tests on its diesel vehicles was discovered last year. The discovery came after a few university researchers tested a group of European cars made for the U.S. market.

      The West Virginia University researchers drove the vehicles for thousands of miles, testing the emissions as they went along. They weren’t expecting to discover what they did: Nitrogen oxide (NOx) emissions rates 20 times the baseline set by the Environment Protection Agency (EPA).

      The university researchers reported their findings to the California Air Resources Board, which then further investigated. That ultimately led to the charges by the EPA.

    • RIAA chief says DMCA is “largely useless” to combat music piracy

      Cary Sherman, the chairman and CEO of the Recording Industry Association of America, has some choice words about the current state of US copyright law. He says that under the Digital Millennium Copyright Act, rightsholders must play a game of whack-a-mole with Internet companies to get them to remove infringing content.

      But that “never-ending game” has allowed piracy to run amok and has cheapened the legal demand for music. Sure, many Internet companies remove links under the DMCA’s “notice-and-takedown” regime. But the DMCA grants these companies, such as Google, a so-called “safe harbor”—meaning companies only have to remove infringing content upon notice from rightsholders.

  • Intellectual Monopolies

    • Do you need permission to link? Here’s my table attempting a summary of recent CJEU case law

      Earlier this week this blog reported on the latest reference for a preliminary ruling to the Court of Justice of the European Union (CJEU) on hyperlinking and copyright.

    • Copyrights

      • Norway’s Pirate Bay Block Rendered Useless by ‘Mistake’

        Copyright holders celebrated a landmark victory early September when a Norwegian court ordered local ISPs to block the Pirate Bay. A breakthrough verdict perhaps, but one with a major flaw as the rightsholder forgot to list one of the site’s main domain names.

      • Pirate Party Runs Privacy Campaign Ads on YouPorn

        The Austrian Pirate Party is running a rather unusual advertising campaign on one of the largest Internet porn sites. Using an image of the Minister of the Interior the Pirates warn unsuspecting visitors that they might soon be being watched, a reference to a new mass surveillance proposal in Austria.

      • Piracy Isn’t Worth The Risk of Prison, Freed Cammer Says

        That urge to be first was what put Danks on the radars of FACT and then the police. After his arrest and subsequent conviction Danks was initially sent to HMP Hewell, a Category B prison in Worcestershire, later being transferred to the low-to-medium risk HMP Oakwood. But despite committing only white-collar crime, Danks was placed alongside those with a thirst for violence.

        “I was locked up with all sorts of people, including murderers, bank robbers etc. I remember one guy who I worked with in the kitchens who had been sentenced to 18 years for killing someone. He got out and within six hours was arrested again for killing his victim’s friend,” Danks explains.

      • Pirate Bay co-founder Gottfrid Svartholm Warg—aka Anakata—exits prison

        Pirate Bay co-founder Gottfrid Svartholm Warg was released from a Swedish prison Saturday, three years after he began serving time for a Danish hacking conspiracy and for Swedish copyright offenses connected to the file-sharing site, The Pirate Bay.

        Warg hasn’t made any public comments following his release from Skanninge Prison in Sweden.

        But his mother chimed in on Twitter. “Yes, #anakata is free now. No more need to call for #freeanakata. Thank you everyone for your important support during these three years!”

      • Aurous Dev Fires Back at “Fearmongering, Babbling” Rightscorp

        Aurous, the music equivalent of Popcorn Time, is just two weeks away from alpha release but anti-piracy outfit Rightscorp is already touting a ‘solution’ to deal with the software. Biting back, Aurous’ developer Andrew Sampson says that Rightscorp has no idea how his technology works and accuses the company of fear mongering in an attempt to get more clients.

      • Rightscorp Retains Dallas Buyers Club Copyright Troll Lawyer

        Anti-piracy monetization firm Rightscorp says it has retained a lawyer known for his work with infamous copyright troll Dallas Buyers Club. Carl Crowell, who recently claimed that it’s impossible to be anonymous using BitTorrent, will help “educate” people about the effects of piracy while suing “persistent and egregious infringers.”

      • MPAA and RIAA’s Megaupload Lawsuits Delayed Until 2016

        Megaupload has asked a federal court in Virginia to postpone its legal battles with the MPAA and RIAA while the criminal proceedings remain pending. The movie studios and recording labels haven’t objected to the request which means that it will take at least six more months before the civil cases begin.

10.10.15

Links 10/10/2015: IBM’s Linux-based LC Family, KDE Frameworks 5.15

Posted in News Roundup at 11:31 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Using open source principles to build better engineering teams

    We become better software developers by observing how some of the best software in the world is being written. Open source has changed and will continue to change the way the world builds software, not only by creating high-quality reusable components, but by giving us a model for how to produce better software. Open source gives us complete transparency into that process.

  • Examining the KNIME open source data analytics platform

    KNIME is an open source data analytics, reporting and integration platform developed and supported by KNIME.com AG. Through the use of a graphical interface, KNIME enables users to create data flows, execute selected analysis steps and review the results, models and interactive views.

  • Events

    • What to expect from PentahoWorld 2015

      This time last year the Computer Weekly Open Source Insider blog reported on the inaugural PentahoWorld 2014 conference and exhibition.

    • Day 1 of PyCon India 2015

      Day one is the first day of main event. I was late to wake up, but somehow managed to reach the venue around 8:30am. Had a quick breakfast, and then moved into the Red Hat booth. Sankarshan, Alfred, Soni were already there. I don’t know the exact reason, but the booth managed to grab the attention of all the people in the venue. It was over crowded :) While the students were much more interested in stickers, and other goodies, many came forward to ask about internship options, and future job opportunities. Alfred did an excellent job in explaining the details to the participants. The crowd was in booth even though the keynote of day one had started. I missed most of keynote as many people kept coming in the booth, and they had various questions.

  • Web Browsers

    • Subresource Integrity Support Ready For Firefox 43, Chrome 45

      With the upcoming releases of the Mozilla Firefox and Google Chrome web-browsers is support for the W3C Subresource Integrity (SRI) specification.

      The Subresource Integrity feature allows web developers to ensure that externally-loaded scripts/assets from third-party sources (e.g. a CDN) haven’t been altered. The SRI specification adds a new “integrity” HTML attribute when loading such assets where you can specify a hash of the file source expected — the loaded resource must then match the hash for it to be loaded.

    • Windows 10: Microsoft’s new browser is a FAILURE – find out why

      Microsoft tried to move users from its infamous Internet Explorer browser to a minimalist new web browser dubbed Edge following the launch of Windows 10.

      But new data has revealed that Windows 10 users are reluctant to make the transition.

    • Chrome

      • Google open source project aims to speed up web
      • Google Seeks to Speed Up Mobile Web Browsing

        Google has announced a new project that could make a difference for mobile browsing. The company has launched the Accelerated Mobile Pages project (AMP), a fully open source initiative, with the underlying code available on GitHub.

      • Google wants to speed up the mobile web with AMP project

        Google has a plan to speed up mobile Web browsing. The recently unveiled AMP—Accelerated Mobile Pages—project is an open source initiative that restricts certain elements of HTML, CSS, and JavaScript to produce leaner Web pages “that are optimised to load instantly on mobile devices.” How much quicker is “instantly”? According to Google, early testing with with a simulated 3G connection and a simulated Nexus 5 showed improvements of between 15 to 85 percent.

    • Mozilla

      • Mozilla Continues Moving Away From NPAPI Plugins

        Firefox continues making progress on loosening web developers’ and users’ dependence on NPAPI plug-ins with a goal still in place to remove support for most NPAPI plugins by the end of 2016.

  • SaaS/Big Data

    • At the Heart of OpenStack Evolution

      As it matures, OpenStack’s parallel to Linux is clearer. Linux emerged 20 years ago as a somewhat exotic challenger to proprietary operating systems. Today, it is one of the most popular and widely used OSes. However, Linux still exists in a market of mixed use. It’s likely that OpenStack will be subject to the same effect, becoming a viable option among a number of cloud infrastructures.

  • CMS

    • What’s New This October in Open Source CMS

      A little love, please, for Miami-based dotCMS, maker of Java open source content management system (CMS) software. Just yesterday, it was chosen as one of the 20 Most Promising Open Source Software Solution Providers by CIO Review.

  • Business

  • BSD

  • FSF/FSFE/GNU/SFLC

    • GnuCash 2.6.9 Free Accounting Software Patches Serious Bug on Windows OSes

      The GnuCash Project has announced the immediate availability for download of the ninth point release for all supported operating systems, including GNU/Linux, Mac OS X, and Microsoft Windows.

    • CC BY-SA 4.0 now one-way compatible with GPLv3

      Put simply this means you now have permission to adapt another licensor’s work under CC BY-SA 4.0 and release your contributions to the adaptation under GPLv3 (while the adaptation relies on both licenses, a reuser of the combined and remixed work need only look to the conditions of GPLv3 to satisfy the attribution and ShareAlike conditions of BY-SA 4.0).

    • The party is over… but the fight for freedom is ready for another thirty years

      Last Saturday, we celebrated the Free Software Foundation’s thirtieth birthday with a party to remember.

    • FSF’s Nerdy 30
    • VimSpellcheckery

      While I was mass editing the transcripts I used to create the FSF30 wordclouds, I realized I was doing too much manual movery to get to the next misspelled word. In a moment of clarity, I was like “hey, I bet vim has a way to properly do this!” And of course it did!

    • Creative Commons BY-SA 4.0 declared one-way compatible with GNU GPL version 3

      Compatibility means that a person can now take a work they received under the terms of CC BY-SA 4.0 and then distribute adaptations of that work under the terms of GPLv3.

    • Guix-Tox talk at PyConFR, October 17th

      Guix-Tox is a young variant of the Tox “virtualenv” management tool for Python that uses guix environment as its back-end. In essence, while Tox restricts itself to building pure Python environments, Guix-Tox takes advantages of Guix to build complete environments, including dependencies that are outside Tox’s control, thereby improving environment reproducibility. Cyril will demonstrate practical use cases with OpenStack.

  • Project Releases

    • New Version Of JPEG-Turbo Quietly Released

      While the Internet has been buzzing recently about the new FLIF image format, libjpeg-turbo developers released a new version of their JPEG library.

      Libjpeg-turbo 1.4.2 is the new release and it quietly made it out at the end of September. Libjpeg-Turbo 1.4.2 features at least five known bug fixes resulting in crashes and other problems.

  • Public Services/Government

    • U.S. report highlights positive elements of government open source adoption

      The report released by DHS is definitely worth a read. While focused on real problems and challenges facing use of OSS by the USG, it has very useful insights for governments around the world. It confirms my growing view, as I’ve written previously, that we are past some of the old debates about OSS. Instead, many governments are today increasingly focused on the “how tos” of open source choices; not “whether” to use it.

  • Openness/Sharing

    • Open Data

      • Open data Incubator: ODINE selected its first round of start-ups

        Seven start-ups from UK, Italy, France, Estonia and Austria were selected to be part of the first round of companies benefiting from the Open Data Incubator for Europe (ODINE). This two-year programme awarded EUR 650 000 in total to the companies, which can receive up to EUR 100 000 each.

    • Open Hardware

      • Eleven Open Source 3D Printer Hits Kickstarter (video)

        ISG3D has taken to Kickstarter this month to raise $11,000 to help take their open source 3D printer design into production.

        The Eleven 3D printer has been specifically designed to provide users with an affordable machine but offers an impressive 22 x 40 x 40 cm build area and is completely open source allowing for modifications and enhancements to be created.

  • Programming

    • Perl 6 is coming soon: What it will bring

      Perl 6, a long-awaited upgrade to the well-known scripting language, has gone into beta, with the general release planned for Christmastime.

      The upgrade went to beta late last month, Perl designer Larry Wall told InfoWorld on Wednesday, and the October monthly release will feature the first of two beta releases of the Rakudo Perl 6 compiler. There been having monthly compiler releases for years, but the language definition has now stabilized. Wall added, “At this point we’re optimizing, fixing bugs, and documenting, and I feel comfortable saying we can take a snapshot of whatever we have in December and call it the first production release.”

    • PEAR 1.10 Released With PHP 7 Support
    • Couchbase Server 4.0 introduces SQL-based query language N1QL (Nickel)

      Couchbase Server 4.0 is designed to give software application development pros a route to building more apps on Couchbase.

Leftovers

10.08.15

Links 8/10/2015: Manjaro Linux Releases, Linksys WRT1900ACS, FOSS at NHS

Posted in News Roundup at 9:46 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Developer creates an open source glucose monitoring and tracking app he can trust

    According to Diabetes.org, in 2012 over 29.1 million Americans (that’s 9.3% of the population) had diabetes. Chances are, you know someone who has diabetes and you can help them by supporting an open source project that they can trust. If you are a developer, contribute to improve the code; you can help with documentation, or language so it can be translated.

    That’s the only way any open source project succeeds – through collaboration and contribution; through people.

  • Open Source for Log Analytics – Let’s get serious

    “Making machine data accessible, usable, and valuable to everyone” was the main theme at the Splunk .conf2015 last month in Las Vegas. The thousands attending this event are a clear proof of the growing importance and interest in collecting, analyzing and gaining insights from machine data. This interest started years ago mostly with IT related logs but will spread to cover all types of machine generated data. The growing IoT space will make today’s pile of machine data dwarf compared to what else is coming our way in the form of logs and other data generated by machines and sensors.

  • Fears Grow For Safety of Imprisoned Syrian Open Source Developer, Bassel Khartabil

    Bassel sent his letters from Adra prison, a civilian jail in the northeast outskirts of Damascus. Even representatives of the Assad government admit that conditions in Adra are overcrowded and inhumane. The prison was designed for 2,500 and now houses 9-11,000 prisoners. Single rooms hold fifty to a hundred cellmates. Food rations are minimal and prisoners must often pay bribes for sleeping materials. Nearby, according to reports, anti-regime forces attempted to seize the compound.

  • SYRIA: Disclose Whereabouts of Detained Freedom of Expression Advocate Bassel Khartabil
  • Syria: Disclose Whereabouts of Detained Freedom of Expression Advocate

    EFF has joined with organizations around the world in calling for Syria to reveal the whereabouts of detained technologist Bassel Khartabil. Khartabil’s arbitrary detention and treatment by the Syrian authorities have been cause for concern since his initial arrest three and a half years ago. Fears have grown for his safety after he was taken from civil prison to an unknown destination on Saturday. He is one of the five current cases that EFF tracks in our Offline campaign to protect unjustly imprisoned technologists and bloggers.

  • Google AMP: “Instant Articles”-style mobile news plans unveiled – an open source standard for publishers’ content to be immediately in search
  • Google (GOOG) Releases Faster Mobile Web Browsing In New Open-Source Initiative With Twitter And 38 News Organizations

    We’re increasingly living in a mobile world, and Google wants to make it a better experience. The search giant on Wednesday announced an initiative called “Accelerated Mobile Pages” (AMP) that makes viewing news articles on a smartphone even faster, the company said at a New York City event.

  • VoiceNation Releases Revolutionary Open Source Live Answering Software. Georgia CALLS is an Early Adopter

    OpenAnswer is built on familiar open source technology like Asterisk, FreePBX, Apache, Linux, PF Sense, SIP and more.

  • Open Source Needs Enterprise Developers

    Open source projects have risen in prominence over the past few years and are becoming important assets to enterprises. A recent report indicates that some 78 percent of enterprises use open source, and two-thirds build software for their customers that is based on open source software.

  • Making B2B Open To Open Source

    The eCommerce software space is a crowded one, with vendors offering any number of ways to track product data. B2C may grab the spotlight with innovation and omnichannel initiatives, and B2B has some catching up to do. But as small businesses recognize the need to adapt quickly to satisfy both their customers and suppliers, flexible software can make all the difference, according to Yoav Kutner.

  • Events

  • Web Browsers

    • Mozilla

      • Proposed Principles for Content Blocking

        Content is not inherently good or bad – with some notable exceptions, such as malware. So these principles aren’t about what content is OK to block and what isn’t. They speak to how and why content can be blocked, and how the user can be maintained at the center through that process.

        At Mozilla, our mission is to ensure a Web that is open and trusted and that puts our users in control. For content blocking, here is what we think that means.

      • Thunderbird 38.3.0 Lands in All Ubuntu OSes

        Details about a number of Thunderbird vulnerabilities in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems have been revealed by Canonical in a short security notice.

  • SaaS/Big Data

  • Databases

    • Industry Outlook: Open-Source Databases and IoT

      This week, Industry Outlook talks with Pierre Fricke about open-source databases and their role in the Internet of Things (IoT). Pierre has a long history in open-source software. He spent 10 years as director of product marketing for JBoss Middleware. He had joined JBoss Inc. just over a year before its acquisition by Red Hat in 2006 and stayed on until he joined EDB. Pierre first became involved in open-source software in 1998 during his 17 years at IBM. He played a critical role in establishing IBM’s Linux and open-source strategy, being one of seven team leaders whose contributions are still used today. He also spent five years as an industry analyst with an emphasis on Java and Microsoft application development and integration software.

      [...]

      PF: No. “Open source” does not equate to “less secure.” Enterprise open-source solutions such as EDB Postgres boast the same level of security as traditional solutions, including enhanced auditing, row-level security, SQL-injection-attack guard and other capabilities. In addition, better-managed open-source solutions also have fewer vulnerabilities than commercial products owing to the strict reviews and testing process that these types of systems must undergo. Furthermore, the inherent nature of open source—in which the code kernel is available to a large community of developers—means more individuals are looking for potential bugs and problems (an open process that is often prohibited in propriety systems).

  • Healthcare

  • Business

  • BSD

    • NetBSD 7.0 Released With New ARM Board Support, Lua Kernel Scripting

      NetBSD 7.0 was quietly released at the end of September.

      NetBSD 7.0 is a big release for this BSD operating system and it features Lua kernel scripting support, GCC 4.8.4 is the default compiler, DRM/KMS graphics support, multi-core support for ARM, Raspberry Pi 2 with SMP support, NPF improvements, and a variety of other enhancements.

  • Project Releases

  • Openness/Sharing

  • Programming

  • Standards/Consortia

    • EU digital policy moves into public comment phase

      The normal procedural step that the Commission takes after the introduction of such a strategy is to seek specific input and feedback—via a public consultation process—for the general ideas and proposals that they are presenting. A public consultation, as the phrase implies, is an invitation to answer a long list of wide ranging questions on these issues. Although procedural, the information gleaned from the consultation will help shape any formal legislation or other actions and regulations that the Commission deems necessary to achieve the goals of the DSM.

Leftovers

  • Security

    • Malware Peddling Vigilantes behind Linux.Wifatch Speak Up

      The group also add that Linux.Wifatch was never intended to be secretive and added that to be “truly ethical, it needs to have a free license.” However, the developers did not go out of their way to make the Wifatch’s presence known in the wider community, to avoid detection by other malware authors.

      The group haven’t revealed their identity and contend that they are “nobody important,” while adding that although they can be trusted not to do “evil things” with users’ devices anybody could steal the key (speaking figuratively), no matter how well the group protects it.

    • Government Accountability Offices Finds Government Still Mostly Terrible When It Comes To Cybersecurity

      The government has done a spectacularly terrible job at protecting sensitive personal information over the past couple of years. Since 2013, the FDA, US Postal Service, Dept. of Veterans Affairs, the IRS and the Office of Personnel Management have all given up personal information. So, it’s no surprise the Government Accountability Office’s latest report on information security contains little in the way of properly-secured information.

    • This New ‘Secure’ App for Journalists May Not Be Secure At All

      When I started working as a journalist in Colombia in 2006, “What do I do if I get kidnapped?” was a common topic at parties. In fact in 2007, my brother (not a journalist) got kidnapped in a small town outside of Medellín. The Colombian anti-kidnapping squad (GAULA) rescued him.

      So let’s just say I take an interest in journalist security tools. New apps have the potential to help journalists do their jobs, and stay safe while doing so.

      Unfortunately, Reporta, a new app from the International Women’s Media Foundation (IWMF) billed as “the only comprehensive security app available worldwide created specifically for journalists,” sounds like it may put journalists in danger.

  • Defence/Police/Secrecy/Aggression

    • NYT Plays Up Risks to Bomber Pilots, Downplays the Civilians They Kill

      Cooper does her best nevertheless to make the reader empathize with the risks faced by bomber pilots, despite a former flyer’s admission that “if you stay above 10,000 feet, you’re not going to be hit.” Though the mechanical difficulties faced by Yip Yip dominate the story, Cooper asserts that “engine troubles are not the only risk at 25,000 feet.” What else is there? Well, there’s acceleration: “The F/A-18s today require more G-forces than the planes of the Top Gun era, and pilots today pull nine Gs instead of four and five Gs”—so pilots have to make sure they are “not dehydrated or hungover from drinking and crooning the Righteous Brothers to Kelly McGillis at a bar the night before.”

      For comparison purposes, riders on the Shock Wave roller coaster at Six Flags Over Texas experience six Gs–placing the amusement park-goers somewhere between Maverick and Bones on the toughness scale.

  • PR/AstroTurf/Lobbying

  • Privacy

    • What’s in a Boarding Pass Barcode? A Lot

      The next time you’re thinking of throwing away a used boarding pass with a barcode on it, consider tossing the boarding pass into a document shredder instead. Two-dimensional barcodes and QR codes can hold a great deal of information, and the codes printed on airline boarding passes may allow someone to discover more about you, your future travel plans, and your frequent flyer account.

    • US Secret Service Violated Privacy Policy to Embarrass Congressman

      The Secret Service thought we all needed a reminder that databases of personal information will be exploited for political gain. The chair of the Oversight and Government Reform Committee, Rep. Jason Chaffetz, was leading the investigation into one of the recent cases of Secret Service misconduct. Agents within the service accessed records concerning Chaffetz’ application to the Secret Service (which was not acted upon) and then disseminated that information within the agency and talked to the press about it.

    • Anti-Piracy Activities Get VPNs Banned at Torrent Sites

      This week users of popular torrent sites found that they could no longer access them using their VPN. Speaking with TorrentFreak the operator of one of the affected sites revealed that the IP ranges of a popular VPN provider had been banned after they were used for massive anti-piracy activities. Using a VPN for copyright enforcement is apparently quite common.

    • In China, Your Credit Score Is Now Affected By Your Political Opinions – And Your Friends’ Political Opinions

      China just introduced a universal credit score, where everybody is measured as a number between 350 and 950. But this credit score isn’t just affected by how well you manage credit – it also reflects how well your political opinions are in line with Chinese official opinions, and whether your friends’ are, too.

    • Rise of ad-blockers shows advertising does not understand mobile, say experts

      Apple has made ad-blocking mainstream, prompting fears in the $31.9bn mobile ad market. But those grappling with the problem say the user must come first

  • Civil Rights

    • Rupert Murdoch hints that Barack Obama isn’t ‘real black president’

      Murdoch was praising Republican presidential candidate Ben Carson and his wife on Twitter Wednesday evening when he wrote: “Ben and Candy Carson terrific. What about a real black President who can properly address the racial divide?”

    • Saudi husband is caught groping and forcing himself on his maid after his suspicious wife set up a hidden camera… but now SHE faces going to jail

      A Saudi woman may face going to jail after she caught her husband cheating with the family maid and posted it on social media.

      The woman used a hidden camera to catch her husband in the act, but despite his proven infidelity, she may be the one who ends up being punished.

      The video, which she uploaded to YouTube, shows the man forcing himself on one of the family’s members of staff, while the maid appears to attempt to resist his advances.

    • Tacoma Police Sued Over Heavily-Redacted Stingray Non-Disclosure Agreement

      Despite there being multiple copies of nearly-identical FBI/Stingray non-disclosure agreements in the public domain at this point, the Tacoma (WA) Police Department still refuses to provide FOIA requesters with an unredacted version of its own NDA.

      In late 2014, the Tacoma Police Dept. handed Seattle’s Phil Mocek a copy of its NDA, which, perhaps unsurprisingly, failed to disclose much about the non-disclosure agreement. The only things left unredacted were the two opening paragraphs of the agreement and the signatures at the end of it. In the middle was a solid wall of black ink.

    • Sweden is shifting to a 6-hour work day

      Despite research telling us it’s a really bad idea, many of us end up working 50-hour weeks or more because we think we’ll get more done and reap the benefits later. And according to a study published last month involving 600,000 people, those of us who clock up a 55-hour week will have a 33 percent greater risk of having a stroke than those who maintain a 35- to 40-hour week.

      With this in mind, Sweden is moving towards a standard 6-hour work day, with businesses across the country having already implemented the change, and a retirement home embarking on a year-long experiment to compare the costs and benefits of a shorter working day.

  • DRM

    • TPP Also Locks In Broken Anti-Circumvention Rules That Destroy Your Freedoms

      We already wrote about how New Zealand has released some of the details about the finalized TPP agreement before the official text is released. The one we discussed is forcing participants into a “life plus 70 years” copyright term, even as the US had been exploring going back towards a life plus 50 regime like much of the rest of the world. That won’t be possible any more.

    • [Apple] What is the “rootless” feature in El Capitan, really?

      I have just learned about the “Rootless” feature in El Capitan, and I am hearing things like “There is no root user”, “Nothing can modify /System” and “The world will end because we can’t get root”.

      What is the “Rootless” feature of El Capitan at a technical level? What does it actually mean for the user experience and the developer experience? Will sudo -s still work, and, if so, how will the experience of using a shell as root change?

  • Intellectual Monopolies

10.07.15

Links 8/10/2015: KDE Plasma 5.4.2 Released, Linux Drama Queens

Posted in News Roundup at 6:10 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • 5 Popular Safety Measures That Don’t Make You Any Safer

    Thus the no fly list was established. It is estimated to have around 1 million names but nobody knows for sure. Keeping the list secret is a matter of national security, so the only way to find out if you’re on it is to be detained in the airport. Or in the air. For instance, in 2005 a 747 flight from Amsterdam to Mexico was turned back before it could reach its destination. The reason? Two of the plane’s passengers were on the no fly list and the flight crossed over US airspace. Well, better safe than sorry, right?

  • Stephen King’s practical advice for tech writers

    Even if you don’t enjoy writing and have no intentions of becoming a professional tech writer, chances are you’ll have to draft reports, mailing list updates, or technical articles at some point in your career. With a few practical tips in mind—along with solid writing advice from Stephen King—you can improve your writing before you start writing. And, with proper planning, you can easily repurpose your content for multiple audiences.

  • Avoiding tap water has become a way of life in Flint

    Outside a taco shop on Flint’s Fifth Street, Estella Walker balances a gallon jug of water on top of the stroller that holds her 3-month-old son, DeWayne. She’s mixing bottles of formula for DeWayne and his 19-month-old sister Vanessa.

    Nadene Strickland sits outside her home on the city’s north side, watching her grandsons play basketball. She still drinks the water. She can’t afford bottled.

    Shopping at the local farmers market with five of her seven children, Tena Fransioli says she hasn’t used tap water in a long time.

  • Security

    • Security updates for Tuesday
    • LinuxCon 2015 Report: Shrinking the Security Holes in OSS

      Dublin native James Joyce famously wrote that “mistakes are the portals of discovery.” LinuxCon 2015 keynote speaker Leigh Honeywell grabbed hold of the same theme here in Dublin, reminding hundreds of open source professionals that “you’re going to make mistakes; you’re going to introduce security bugs.” The goal, said Honeywell, who works as a senior security engineer at Slack Technologies, shouldn’t be the all-out elimination of these mistakes. Instead, security engineers should strive to make different mistakes next time around.

    • The perils of free digital certificates

      The current certificate is not cross-signed, so loading the page over HTTPS will give visitors an untrusted warning. The warning goes away once the ISRG root is added to the trust store. ISRG expects the certificate to be cross-signed by IdenTrusts’s root in about a month, at which point the certificates will work nearly anywhere. The project also submitted initial applications to the root programs for Mozilla, Google, Microsoft, and Apple so that Firefox, Chrome, Edge, and Safari would recognize Let’s Encrypt certificates.

    • Get Simplified Web Encrytion For Your Website With Let’s Encrypt
    • InvizBox Go Offers Open Source Online Privacy And Security (video)

      Team InvizBox have unveiled a new pocket sized device which has been created to provide an open source solution to online privacy and security.

      The small InvizBox box is capable of offering users a broad range of privacy options, allowing secure connectivity to the Internet from both desktop and mobile devices.

    • New programmer pow-wow for coders paranoid about Android

      DevSecCon is a newly formed, non-profit conference for DevOps and SecOps practitioners, run by practitioners. By creating a neutral platform, it will exchange and create new ideas on how to leverage the best of both worlds and adopt a new mind-set of inclusiveness and collaboration.

    • Cisco disrupts $30 million browser plug-in hacking operation
    • ​Cisco: notorious hackers using Linux cloak earn $30m a year

      Cisco notes that Linux servers were being managed remotely via SSH using root, adding that they were likely compromised systems in Europe and Asia.

    • Linux.Wifatch: The Wireless Router Malware that Increases IoT Security
    • Vigilante Malware
    • Creators of the Benevolent Linux.Wifatch Malware Reveal Themselves

      The Linux.Wifatch malware, also dubbed as the “vigilante malware” has been going around the Internet, infecting IoT devices, cleaning out malware infections, and boosting the devices’ security.

    • Linux.Wifatch Is Protecting Unpatched Routers, Devices

      Today’s topics include how vigilante malware is protecting unpatched routers, HP launches its Open-Source Network OS, Twitter locks in Jack Dorsey as its permanent CEO, and Cisco is driving its investments in network chip startup Aquantia.

      Countless numbers of routers and Internet-connected devices around the world are not properly updated, leaving the devices, their owners and the Internet at large at risk. A new code infection, however, dubbed Linux.Wifatch, is taking unpatched routers and devices a different route, protecting them, rather than exploiting them.

    • Microsoft OWA falls victim to password-pinching APT attack

      SECURITY RESEARCHERS FROM Cybereason have sounded a klaxon over a problem with the Microsoft Outlook Web Application (OWA) that could let attackers swoop in and tag and bag data and documents through the use of APT techniques.

      Cybereason discovered the bug when a customer with some 19,000 endpoints suspected that it was the victim of infection.

    • New Outlook mailserver attack steals massive number of passwords

      Backdoor in Outlook Web Application operates inside target’s firewall.

    • Vint Cerf: The Headline I Fear Is ’100,000 Fridges Hack Bank of America’

      When the ILOVEYOU worm struck on May 4, 2000, it thrust the reality of computer vulnerabilities into the public consciousness in a very big way.

      Sure, computer worms had spread before, but some estimates pegged this particular worm as causing billions of dollars in damage. Entire government departments were crippled. The nature of its spread was unprecedented in scale.

  • Defence/Police/Secrecy/Aggression

    • US Denies WikiLeaks Claims of Plot To Topple Bolivian President

      Bolivia says it is launching a thorough investigation into revelations made public by a WikiLeaks report.

      The U.S. has refuted reports that it planned to topple the government of Bolivia.

      The controversy started after a report surfaced on WikiLeaks that the U.S. government had plotted an assassination attempt against President Evo Morales in 2008.

      A representative described the WikiLeaks accusations as “absolutely false and absurd.”

    • NYT Continues to Obscure Responsibility in US’s Bombing of Hospital

      The New York Times followed up its euphemistic and equivocal coverage (FAIR Blog, 10/5/15) of the US bombing of the Médecins Sans Frontières hospital in Kunduz, Afghanistan, with an article (10/6/15) that continued to downplay the US’s responsibility for the deaths of 12 hospital staffers and 10 patients.

    • Down the Memory Hole: NYT Erases CIA’s Efforts to Overthrow Syria’s Government

      FAIR has noted before how America’s well-documented clandestine activities in Syria have been routinely ignored when the corporate media discuss the Obama administration’s “hands-off” approach to the four-and-a-half-year-long conflict. This past week, two pieces—one in the New York Times detailing the “finger pointing” over Obama’s “failed” Syria policy, and a Vox “explainer” of the Syrian civil war—did one better: They didn’t just omit the fact that the CIA has been arming, training and funding rebels since 2012, they heavily implied they had never done so.

      First, let’s establish what we do know. Based on multiple reports over the past three-and-a-half years, we know that the Central Intelligence Agency set up a secret program of arming, funding and training anti-Assad forces. This has been reported by major outlets, including the New York Times, The Guardian, Der Spiegel and, most recently, the Washington Post, which—partly thanks to the Snowden revelations—detailed a program that trained approximately 10,000 rebel fighters at a cost of $1 billion a year, or roughly 1/15th of the CIA’s official annual budget.

    • ‘Military Intervention in the Middle East Started This Crisis in the First Place’ – CounterSpin interview with Raed Jarrar on the refugee crisis

      Janine Jackson: A recent CNN report said that the worsening Syrian refugee crisis highlights the differences among countries that welcome what they called “desperate migrants” and those that don’t; but if US audiences think that the crisis, some 11 million people now displaced, reflects only on the action or inaction of countries “over there,” they’re misunderstanding the situation. What more do we need to know about this crisis, its roots and possible ways forward? Raed Jarrar is government relations manager at the American Friends Service Committee. He joins us now by phone from Washington, DC. Welcome back to CounterSpin, Raed Jarrar.

    • 9/11 and the Rise of Neoconservative Foreign Policy

      9/11 and the Rise of Neoconservative Foreign Policy. For this 14th anniversary 9/11 special program, co-hosts Mickey Huff and Peter Phillips speak with Media Roots journalist and filmmaker Robbie Martin about his new film “A Very Heavy Agenda.” The film looks in depth at the Kagan family and the rise of neoconservative foreign policy prior to and since the events of 9/11. Tune in for a detailed discussion about the development of the US policy driving American Empire.

  • Finance

    • TPP Negotiations Conclude: What Next for the Trade Deal Without a Public Text?

      The Trans Pacific Partnership negotiations concluded early this morning in Atlanta with the 12 countries reaching agreement on the remaining outstanding issues. The U.S. quickly posted a summary of the TPP and the Canadian government has followed with its own package on the deal. At a just-concluded ministerial press conference, the ministers noted that this is one step in a longer process. The text itself must still be finalized and then each country will have its own rules before signing onto it. In the U.S., there is a review period with the full text, so this will be a 2016 issue. In Canada, new treaties must be tabled for review in the House of Commons, so there will be a Parliamentary review.

    • 12 countries strike Pacific Rim trade accord

      Trade ministers from the Asia-Pacific region have reached a deal on the Pacific trade pact that is intended to cut trade barriers and establish common standards for 12 countries, This is the largest trade pact in 20 years and has been a long-term goal of the Obama administration.

    • Users Have Been Betrayed in the Final TPP Deal—Help Us Tell Washington How You Feel

      Trade negotiators from the U.S. and its 11 Pacific Rim partners announced their agreement on the Trans-Pacific Partnership Agreement (TPP) today, concluding the final round of closed negotiations in Atlanta and marking the culmination of seven years of secrecy. Throughout all that time, the U.S. Trade Representative (USTR) has acted as a de facto representative of the Hollywood big media lobbies in pushing other countries to adopt the most punitive aspects of U.S. copyright policies—such as our over-the-top civil and criminal penalties—while at best giving lip service to pro-user aspects such as fair use.

    • ‘Massive’ Media Hype for TPP

      It is amazing how the elite media can be dragged along by their noses into accepting that the Trans-Pacific Partnership (TPP) can have a big impact on trade and growth. If I had a dollar for every time the deal was described as “massive,” or that we were told what share of world trade will be covered by the TPP, I would be richer than Bill Gates.

    • A Solution To Bitcoin’s Governance Problem

      A key aspect of Bitcoin’s value proposition is that it’s an open source protocol independent of any particular corporation or government.

      Similar to other open source initiatives, the software that runs the Bitcoin network is managed and improved upon by a group of volunteer developers.

  • PR/AstroTurf/Lobbying

  • Censorship

    • State Court Says University Can’t Punish Student For Off-Campus Tweets

      The Appeals Court of Kansas has upheld a lower court’s decision finding it beyond the reach of a university to expel a student for off-campus behavior.

      Beneath this logical conclusion are some not-so-pretty facts. The origin of the lawsuit is a “bad breakup” that resulted in criminal charges for the former boyfriend, Navid Yeasin.

    • Motherboard’s Version Of ‘Valuing Discussion’ Involves No Longer Letting You Comment

      Add Motherboard to the quickly growing list of news websites killing their comment section because they’re so breathlessly in love with reader interaction and visitor conversation. Like The Verge, Recode, Popular Science, The Daily Beast and numerous other websites before it, Motherboard has decided that there’s simply no value whatsoever to having a healthy, on-site local community.

    • Why are students now cheering about the massacre at Charlie Hebdo?

      I witnessed something genuinely disturbing at Trinity College Dublin last night: trendy, middle-class, liberal students cheering and whooping a man who had just given the closest thing I have yet heard to a justification for the massacre at Charlie Hebdo.

      It was as part of a debate on the right to offend. I was on the side of people having the right to say whatever the hell they want, no matter whose panties it bunches. The man on the other side who implied that Charlie Hebdo got what it deserved, and that the right to offend is a poisonous, dangerous notion, was one Asghar Bukhari of the Muslim Public Affairs Committee.

    • Scholarship, Security, and ‘Spillage’ on Campus

      On September 24 I gave a keynote presentation at Purdue University about the NSA, Edward Snowden, and national security journalism in the age of surveillance. It was part of the excellent Dawn or Doom colloquium, which I greatly enjoyed. The organizers live-streamed my talk and promised to provide me with a permalink to share.

      After unexplained delays, I received a terse email from the university last week. Upon advice of counsel, it said, Purdue “will not be able to publish your particular video” and will not be sending me a copy. The conference hosts, once warm and hospitable, stopped replying to my emails and telephone calls. I don’t hold it against them. Very likely they are under lockdown by spokesmen and lawyers.

  • Privacy

    • Landmark EU ruling says US privacy protections are inadequate

      Europe’s highest court today ruled that Facebook cannot send personal information on European users to data centers in the US, invalidating a 15-year trans-Atlantic data transfer agreement. In a decision that could have far-reaching implications for many US tech companies, the European Court of Justice said that the EU’s Safe Harbor agreement with the US is “invalid” because the country does not guarantee adequate privacy protections. The agreement allows technology companies to transfer data from Europe to the US, provided that certain privacy requirements are met. According to The Wall Street Journal, today’s ruling could impact around 4,500 companies that currently rely on the laws to transfer data to the US.

    • EU-US Safe Harbour For Personal Data Eliminated

      The European Court of Justice (CJEU) handed down a decision declaring EU-US safe harbour for personal data invalid this morning. It has far-reaching implications for cloud services in particular and may presage increased opportunity for open source solutions from non-US suppliers. Looks like a real gift to companies like Kolab.

    • Interview with Kirsten Johnson, Director of “The Above”

      Kirsten Johnson talks with Eric Hynes about her new film, which documents a military surveillance blimp over Kabul and its impact on the Afghans living beneath it.

    • Adblock Plus to appoint whitelist watchdog

      The company behind the internet’s most popular advert-blocking plug-in has pledged to open up its controversial “whitelist” to outside scrutiny.

    • Data Transfer Pact Between U.S. and Europe Is Ruled Invalid
    • Verizon’s Sneaky Zombie Cookies Now Being Used Across The Entire AOL Ad Empire

      Poor Verizon. Telco executives for years have sat in their board rooms bored by the billions to be made on telecom and transit, jealously eyeing Facebook and Google ad revenue, and desperately dreaming of being seen as more than just a dull old phone company. That’s why the telecom giant recently paid $4.4 billion to acquire AOL, and is now throwing tens of millions at a new Internet video service aimed squarely at Millennials (hey kids, why get Internet video right from the source or a disruptive content company when you can get it from the phone company?).

    • Facebook can be blocked from passing data to US after treaty ruled invalid

      Facebook, Google and thousands of other US companies can be barred from transferring private information about European citizens across the Atlantic after Europe’s highest court struck down a 15-year-old data sharing treaty.

      The European Court of Justice has declared that the “Safe Harbour” agreement, which gives more than 4,400 US businesses free reign to send data about Europeans to American servers, is invalid.

    • Ireland, Facebook’s European base, pushed to act on ‘safe harbour’ ruling

      Ireland has said it plans to investigate the transfer of data on Facebook users in Europe to the United States after an EU court invalidated the “safe harbour” provisions under which it took place.

      It follows a request by Austrian citizen Max Schrems to the Irish data protection commissioner to investigate if there was adequate protection of his data transferred to the US by Facebook, which has its European headquarters in Dublin.

    • EU ruling means Facebook and Google can’t send data to the US

      If you live in Europe, your online life changed this morning. The European Union’s highest court, the EU Court of Justice, has invalidated the legal agreement by which personal data can be moved from the EU to the US for processing.

      The ruling against the 15-year-old law, known as Safe Harbour, threatens the business models of more than 3000 companies that use it to ship data to the US, including Google, Apple, Microsoft and Facebook.

    • No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans’ Privacy
    • Microsoft sites expose visitors’ profile info in plain text

      If you think using secure HTTP would be enough to protect your privacy when checking webmail, think again. When users connect to their Microsoft user account page, Outlook.com, or OneDrive.com even when using HTTPS, the connection leaks a unique identifier that can be used to retrieve their name and profile photo in plaintext.

      A unique identifier called a CID is exposed because it’s sent as part of a Domain Name Service lookup for the address of the storage server containing profile data and as part of the initiation of an encrypted connection. As a result, it could be used to track users when they connect to services from both computers and mobile devices, possibly even identifying users as their requests leave the Tor anonymizing network.

    • EFF joins Nameless Coalition and demands that Facebook kills its real names policy

      Facebook has come under heavy criticism for its real names (or ‘authentic identities’ as they are known to the social network) policy. Over the last year, all manner of rights groups and advocates have tried to convince Facebook to allow users to drop their real name in favor of a pseudonym if they want.

      Now the Electronic Frontier Foundation is part of the 74-member strong Nameless Coalition and has written to Facebook demanding a rethink on the ground of safety, privacy, and equality. This is far from being the first time Facebook has been called on to allow the use of ‘fake names’, and the latest letter is signed by LGBT groups, freedom advocates, privacy supporters, and feminist organizations.

    • Thousands of “Spies” Are Watching Trackerless Torrents

      BitTorrent is a very efficient way to share large files, but not a very private one. It’s commonly known that anti-piracy outfits monitor users through public trackers. However, new research reveals that BitTorrent’s DHT is also full of “spies” who actively harvest IP-addresses.

      [...]

      Through DHT, BitTorrent users share IP-addresses with other peers. Thus far, little was known about the volume of monitoring through DHT, but research from Peersm’s Aymeric Vitte shows that it’s rampant.

      Through various experiments Vitte consistently ran into hundreds of thousands of IP-addresses that show clear signs of spying behavior.

      The spies are not hard to find and many monitor pretty much all torrents hashes they can find. Blocking them is not straightforward though, as they frequently rotate IP-addresses and pollute swarms.

    • Open Rights Group welcomes CJEU Safe Harbor ruling

      Open Rights Group welcomes today’s decision by the Court of Justice of the European Union (CJEU) that the Safe Harbor agreement is invalid.

    • Why the CJEU ruling on #SafeHarbor is a landmark victory for privacy rights

      In 2013, Austrian law student, Max Schrems brought a case against Facebook in Ireland, where the company has its European headquarters. He argued that revelations by NSA whistleblower, Edward Snowden, showed that the NSA were accessing data held by companies like Facebook. As US law did not offer enough protection against this surveillance, his privacy was being violated.

      The Irish Data Protection Commissioner rejected Schrems’ case because the Safe Harbor agreement governed the transfer of data. The case was then referred to the Court of Justice of the European Union (CJEU).

      [...]

      The ruling places greater obligations on data protection authorities – such as the UK’s Information Commissioner – as it says that they must ensure that fundamental rights are respected in data transfer arrangements to the US by private companies. It also limits the ability of the Commission to claim everything is OK and persuade European regulators to look away.

    • Safe harbor: abusive data collection and mass surveillance repealed by the European Court of Justice!

      By a decision published this morning, the Court of Justice of the European Union (CJEU), the highest European jurisdiction, repealed the Safe Harbor agreement. This agreement in effect since 2000, allows data transfers between Europe and the United States under different versions, authorised the processing of European citizens’ data by US companies, with fewer guarantees than those existing in Europe. Max Schrems, an Austrian citizen, has put Facebook on trial since the monitoring by the NSA of his data hosted by Facebook had an impact on his freedom and privacy. The CJEU today confirmed his viewpoint by invalidating the Safe Harbor and held that the European Commission abused its power by approving it. The CJEU also affirmed that a local data protection authority may dissent a European agreement if guarantees granted to citizens were modified.

  • Civil Rights

    • Valencia Woman Files Suit Alleging She Was Punched By Police In Front Of Her Kids

      A Valencia woman has sued the city of Carlsbad and several of its officers over allegations that she was pinned to the ground and punched by police in 2013.

      Cindy Hahn said the incident on July 31 – a day she calls the worst one of her life – was caught on cellphone video.

    • Google drops ‘Don’t be evil’ mantra as it becomes Alphabet

      EVIL-DOING HAS HAD A BOOST. Google is no longer opposing it in its official company code of conduct for new and improved big brother company Alphabet, where employees will be expected to ‘do the right thing’.

    • Second Saudi Juvenile Faces Beheading As Cameron Tries To Justify “Squalid” Deal

      According to the campaign group Reprieve, “Dawoud al-Marhoon was 17 when he was arrested without a warrant by Saudi security forces in May 2012, at the height of protests in the country’s Eastern Province.”

      The campaign group claims that al-Marhoon signed a “confession”, which was used to convict him, after he was tortured. In a press release the group said: “He has been held in solitary confinement, and has been barred from speaking to his lawyer.

    • David Cameron attacks Jeremy Corbyn’s ‘terrorist-sympathising, Britain-hating ideology’ – live [Ed: opposition compared to terrorism]
    • Leon Brittan vs Julian Assange

      Indeed, the BBC has decided that, given the accusations against Assange are so risible, it would be wrong for any detail at all of the accusations to be given out. Therefore the BBC has never reported the fact that the allegation they describe as “rape” is that, during the act of consensual sex, Assange allegedly tore a condom with his fingers whilst wearing it (of which I doubt the physical possibility). The second sexual molestation accusation is that again consensual sex took place, but after they fell asleep in each others arms, Assange awoke and initiated a repeat of the sex act without requesting permission again.

      Despite the fact that Anna Ardin and Sofia Wilen have given press conferences in Sweden promoting their allegations, the BBC has made no attempt to interview them. The BBC has not reported that, the day after the condom splitting “rape”, Anna Ardin hosted a crayfish party for Assange and tweeted her friends from it that she was with the coolest man in the world. The BBC has not reported that Anna Ardin had invited Assange to share her flat and her bed. The BBC has not reported that Anna Ardin and Sofia Wilen only made accusations after the two of them got together and cooked up the story. The BBC has not reported that Stockholm’s chief prosecutor dismissed it as no case to answer, and that Ardin then took it, as Swedish law allows, to another prosecutor, Marianne Ny who has a campaigning feminist agenda.

      The BBC has not reported any of that because it would be quite wrong to doubt the word of victims of sexual abuse. It would be wrong to put them under pressure, or look sceptically at the evidence for their stories, both direct and circumstantial. It would be quite wrong to prejudice possible legal proceedings.

  • Internet/Net Neutrality

    • Hey, Remember How Net Neutrality Was Supposed To Destroy The Internet?

      Before and after the FCC imposed new net neutrality rules, you’ll recall there was no limit of hand-wringing from major ISPs and net neutrality opponents about how these “draconian regulations from a bygone era” would utterly decimate the Internet. We were told investment would freeze, innovation would dry up like dehydrated jerky, and in no time at all net neutrality would have us all collectively crying over our busted, congested, tubes.

      And, of course, shockingly, absolutely none of that is happening. Because what the ISPs feared about net neutrality rules wasn’t that it would senselessly hurt their ability to invest, but that it would harm their ability to take aggressive and punitive advantage of the lack of competition in last mile broadband networks. Obviously ISPs can’t just come out and admit that, so what we get instead is oodles of nonsense, including bogus claims that net neutrality violates ISPs’ First Amendment rights.

    • Facebook Will Beam the Internet to Africa Using this Satellite [iophk: "zero-rating"]

      Africa’s current state of Internet access is stark: the lowest levels of broadband connectivity, according to the United Nation’s State of Broadband report, are mostly found in sub-Saharan Africa. According to the UN, Internet availability reaches less than 2% of the populations in Guinea, Somalia, Burundi and Eritrea.

  • DRM

    • FCC clarifies third-party router firmware is allowed — but with restrictions

      A few weeks ago, we covered news that the FCC was considering rules that could ban the use of third-party router firmware. The FCC has issued new draft rules that would prevent customers from making changes to certain radio settings that would allow for operation outside of certain parameters. Typically these restrictions are designed to prevent multiple devices in the same geographical area from overlapping and conflicting with each other.

      The FCC has now revealed more details on these new policies, which could theoretically be read to prevent the installation of all third-party router firmware. The FCC’s initial order specifies, for example, that programs like DD-WRT should not be allowed, which is part of why people have been concerned about new restrictions in the first place. According to the FCC, manufacturers don’t need to lock out third-party firmware — they just need to prevent the third party firmware from changing settings the FCC doesn’t allow consumers to modify.

    • The Stagnation Of eBooks Due To Closed Platforms And DRM

      Craig Mod has a fascinating article for Aeon, talking about the unfortunate stagnation in digital books. He spent years reading books almost exclusively in ebook form, but has gradually moved back to physical books, and the article is a long and detailed exploration into the limits of ebooks today — nearly all of which are not due to actual limitations of the medium, but deliberate choices by the platform providers (mainly Amazon, obviously) to create closed, limited, DRM-laden platforms for ebooks.

    • Sorry, Unix fans: OS X El Capitan kills root

      If you haven’t heard, Apple has locked out root from various file system paths and core functions in Mac OS X 10.11 El Capitan. The new sheriff here is System Integrity Protection (SIP), which reduces root privileges in an attempt to increase security.

      The gist is that no user — not even root — can write to /usr, /bin, /System, and /sbin or debug protected processes. Apple has also removed the ability to use unsigned kernel extensions through boot-time flags. It’s important to note that SIP can be disabled, through the recovery partition, but this will typically be done only for development and testing purposes.

  • Intellectual Monopolies

    • Copyrights

      • Megaupload prosecutor wraps up arguments to extradite Kim Dotcom to the US

        For two weeks, Kim Dotcom and three other former Megaupload staffers accused of criminal copyright infringement were bombarded by accusations from New Zealand prosecutors.

        To hear prosecutors tell it, Dotcom is the Joaquin “El Chapo” Guzman of illegal file sharing. The United States Department of Justice (DOJ) alleges that the defendants operated Megaupload as a criminal enterprise designed to profit from the illegal swapping of movies, music and software by users. A hearing is underway to determine whether New Zealand will extradite Dotcom, Mathias Ortmann, Bram van der Kolk, and Finn Batato to the US. Much is at stake for the four, who may eventually face lengthy prison sentences.

      • Megaupload Accuses U.S. of Unfair Tactics, Seeks Stay

        After the United States were given several days to state their case against Kim Dotcom and his former business associates, this morning lawyers for the Megaupload four stated why their clients should not be extradited to the United States. The U.S. has used unfair tactics to gain an advantage so the hearing should be brought to an end, the Court heard.

      • Google Must Expose eBook Pirate, Court Rules

        Google has to hand over the personal details of a user who published pirated eBooks online, a Dutch court has ruled. The information was requested by anti-piracy group BREIN, working on behalf of a local book publishers’ organization.

      • Happy Birthday And The Problem With The Copyright Office’s ‘Orphan Works’ Plan

        A few weeks ago, we wrote about the big ruling by Judge George King in a district court in California that Warner/Chappell does not hold a valid copyright in the song “Happy Birthday.” The press ran with the story, with nearly all of the coverage falsely stating that the judge had declared Happy Birthday to be in the public domain. As we noted in our post, however, that was not the case. While the plaintiffs had urged just such a finding, Judge King noted that there were issues related to this that a jury would need to answer, and he would not go that far. Instead, he merely stated that Warner did not hold a valid copyright. Many people assume that this is good enough. The likelihood of some third party magically showing up after all of these years and not just claiming the copyright, but having enough evidence to prove it seems very slim. Glenn Fleishman has done a nice job writing up a detailed explanation of this copyright mess for Fast Company, in which he notes the “uncertainty is maddening.”

      • Bat-tastic – Batmobile Protected by Copyright in the US

        Amongst the very old school and traditionalist judgments here in the UK, it is always refreshing to read ones that step outside of that dusty judicial demeanor, and often our friends across the pond in the US show us that even judges remember their youth with fondness.

        [...]

        In applying the test judge Ikuta quickly saw that, as the Batmobile has appeared in many renditions in a variety of forms, it has conceptual and physical qualities. The vehicle has also maintained a sufficient amount of distinct features over the years, even with minor (or more major) difference in some iterations, along with its specific characteristics and features in equipment and technology, making it sufficiently delineated to be recognizable as the same vehicle. Finally, judge Ikuta saw that the vehicle was especially distinctive, containing unique elements of expression through its status as a key part of Batman’s crime-fighting repertoire, along with its very distinctive name. The Batmobile therefore was deemed to be protectable under copyright.

10.06.15

Links 6/10/2015: Linux 4.3 RC4, HP OpenSwitch, Wind River Linux 8

Posted in News Roundup at 11:33 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Spider scare causes bus crash

    A child was transported to a hospital with minor head injuries after a shock from spider caused a crash involving a school bus and a “driverless” car, according to the Kosciusko County Sheriff’s Department.

    Around 4:15 p.m. Friday, deputies, along with Syracuse Police and Fire Units, responded to the area of 5571 E CR 1400 N on reports of a vehicle striking a school bus.

  • Security

    • Security advisories for Monday
    • Adobe Fixes 18 Critical Flaws in Latest Flash Player 19.0.0.185 Release: Update Now

      This is a very tiny application that usually does its thing behind the scenes, without interfering with the normal functioning of a phone, tablet or PC.

    • Incompetence, not Linux, is behind the XOR DDoS botnet

      First, no operating system or program is secure. Some are more secure than others. So sure, Linux is inherently more secure than Windows. But a badly managed Linux server will still be more insecure than a well-administered Windows system.

    • Linux.Wifatch ‘malware’ is actually making routers more secure

      We seem to have a vigilante white hat hacker on our hands, as newly discovered ‘malware’ aimed at Internet of Things devices and certain routers appears to be making these devices more secure. The Linux.Wifatch virus is doing the exact opposite of what most viruses would, rather than stealing user information or holding systems for ransom, it is actually improving security.

    • Linux vigilante fixes your router

      A new form of “malware” appears to have been set up by a Linux vigilante who wants to improve your security.

      Software called Linux.Wifatch compromises routers and other Internet of Things devices and appears to try and improve infected devices’ security.

    • Linux routers under attack — for their own good

      Symantec reports on an unusual “Linux.Wifatch” threat that improves the security of old Linux routers. Meanwhile, a new XOR botnet poses a deadlier threat.

      Linux may still be the most secure general-purpose OS in existence, but as its presence grows in the embedded and Internet of Things (IoT) market, it’s increasingly being targeted by malware. Linux-based routers with outdated firmware (see farther below) and wireless enabled home automaton devices seem particularly vulnerable.

  • Defence/Police/Secrecy/Aggression

    • The US decision to send weapons to Syria repeats a historical mistake

      Why does the US continually send deadly weapons to the Middle East, make things even more chaotic than they were before and expect better results the next time?

      As pretty much everyone who was paying attention predicted, the $500m program to train and arm “moderate” Syrian rebels is an unmitigated, Bay of Pigs-style disaster, with the head of US central command admitting to Congress this week that the year-old program now only has “four or five” rebels fighting inside Syria, with dozens more killed or captured.

      Even more bizarre, the White House is claiming little to do with it. White House spokesman Josh Earnest attempted to distance Obama from the program, claiming that it was actually the president’s “critics” who “were wrong.” The New York Times reported, “In effect, Mr Obama is arguing that he reluctantly went along with those who said it was the way to combat the Islamic State, but that he never wanted to do it and has now has been vindicated in his original judgment.”

    • Russia’s False Hopes — Paul Craig Roberts

      Russia miscalculated that diplomacy could solve the crisis that Washington created in Ukraine and placed its hopes on the Minsk Agreement, which has no Western support whatsoever, neither in Kiev nor in Washington, London, and NATO.

      Russia can end the Ukraine crisis by simply accepting the requests of the former Russian territories to reunite with Russia. Once the breakaway republics are again part of Russia, the crisis is over. Ukraine is not going to attack Russia.

      Russia doesn’t end the crisis, because Russia thinks it would be provocative and upset Europe. Actually, that is what Russia needs to do—upset Europe. Russia needs to make Europe aware that being Washington’s tool against Russia is risky and has costs for Europe.

    • Media Are Blamed as US Bombing of Afghan Hospital Is Covered Up

      A US-led NATO military coalition bombed a hospital run by international humanitarian aid organization Doctors Without Borders (known internationally as Medecins Sans Frontières, MSF) in Afghanistan, killing at least 22 people—12 staff members and 10 patients, including three children—and wounding 37 more.

  • Finance

    • Prof. Wolff on TRNN: 38% of American Workforce Still Jobless.

      Prof. Wolff discusses discusses why labor force participation is the lowest since 1977 and what’s really needed to stimulate the economy.

    • Why Debates Over the Fed’s Interest Rate Miss the Point

      Sometimes public debates focus on important social issues; at other times, debates distract from them. Disputes over whether the Federal Reserve System should raise interest rates illustrate that second sort. Yes, “serious people” take strong positions for or against interest rate hikes. They sharply question one another’s motives to spice up what passes for mainstream media economic news. But it is not the debate we could and should have, not even close.

      Both sides of that debate celebrate capitalism. They differ only on how best to have government serve the reproduction of capitalism: by leaving it alone, by intervening intensely or somewhere in between. These days they hassle over raising, lowering or leaving interest rates unchanged. The possibility that capitalism – rather than the Fed or interest rates – might be the problem troubles none of these folks. It does not occur to them. Nor is that surprising given the monotonous mantra of academic economics departments and the journalists and politicians trained by them.

    • Developing Countries Especially Vulnerable to TPP Deal – Trade Union

      Developing countries are most likely to suffer from the effects of the Trans-Pacific Partnership (TPP) trade deal, Daniel Bertossa, director of policy and governance at the Public Services International (PSI) global trade union, told Sputnik Monday.

      Earlier on Monday, 12 Pacific Rim countries, including the United States, reached a consensus on the wording and subject matter of the TPP free trade agreement.

    • Canada’s auto industry could lose 20,000 jobs because of TPP trade deal, union says

      The Trans-Pacific Partnership trade deal could have major ramifications for Canada’s already struggling auto industry, resulting in cheaper vehicles for consumers, but a more competitive landscape for Canadian manufacturers.

      Unifor, the union that represents Canadian workers at the Detroit Three, said the deal would put an estimated 20,000 auto jobs at risk by eliminating tariffs and significantly reducing content rules for vehicles and auto parts.

      Under the TPP agreement, Canada will phase out its existing 6.1 per cent tariff on imported passenger vehicles over the next five years — a move that is expected to lower the cost of Japanese-made vehicles for Canadian consumers.

  • PR/AstroTurf/Lobbying

    • How Larry Lessig’s one-year presidency platform is winning over Silicon Valley

      He’s the only presidential candidate that’s been called a freedom fighter and a geek guru.

      In Silicon Valley, Harvard professor Larry Lessig’s following goes back almost two decades and is rooted in his devotion to a free and open internet.

      As Lessig struggles to be included in the national presidential polls and win a spot in the upcoming democratic debates, he’s banking on his loyal high-tech followers to step out from behind their computers and rally around his election and campaign finance reform platform.

    • 5 Ways Donald Trump Perfectly Mirrors Hitler’s Rise To Power

      … where I’m joined by my Cracked co-worker Randol Maynard and comic/activist/word doctor Genevieve Mueller. Specifically, we talk about all of the terrifyingly real ways that, no matter how crazy it sounds, Donald Trump is the closest the United States has ever come to producing our very own version of Adolf Hitler. Here are a few reasons why.

  • Censorship

  • Privacy

  • Civil Rights

    • How a Canadian scientist became the voice of the anti-Harper movement

      As protest songs go, it wasn’t exactly Pussy Riot. Harperman is a jaunty folk song with acoustic guitars, an amateur choir, and a chorus politely telling Canada’s prime minister Stephen Harper, “It’s time for you to go.”

      But the five-minute protest song became a viral hit, got its mild-mannered creator suspended from his job at the country’s environment department – and gave voice to the pent-up frustrations of Canada’s public servants who say they have found themselves at the receiving end of Harper’s policies.

    • Social media post leads to 2 arrests, drug bust, seizure of guns

      The Bartholomew County Sheriff’s Office arrested two people Friday after one of the suspects posted video of himself committing a crime to social media, according to the sheriff’s office.

      On Thursday night, the sheriff’s office says road signs were shot on the west end of the bridge on CR 400 N, east of US 31.

    • White kid builds nuclear reactor and Homeland Security offers help

      Wilson, now 21 years old, later won $50,000 at a science fair for an anti-terrorism device he invented that can detect nuclear materials in cargo containers.

    • How Hungary’s Prime Minister Turned From Young Liberal Into Refugee-Bashing Autocrat

      Unshaven, without a tie, the young dissident surveyed the crowd before him. It was June 16, 1989, and 250,000 people had gathered in Heroes’ Square for the reburial of Imre Nagy, the leader of the failed 1956 revolution. Viktor Orban demanded that Soviet troops leave Hungary. Soon afterward, they did.

      “It proved to be the right sentence, because it was true and came from the people’s hearts,” Orban told me a decade later.

    • Hungary: New Border Regime Threatens Asylum Seekers

      Hungary’s new border regime denies access to asylum and exposes vulnerable people to violence and prosecution, Human Rights Watch said today.

    • British State Viciously Abuses Child Fantasist

      The sentencing of a 15 year old Blackburn boy – 14 at the time he committed his thought crimes – to life imprisonment is grossly inhuman. It is not quite as evil as the decision of the appalling Saudi regime to crucify and behead a child dissident, but it is recognisably a product of the same world view. History books will look back on this era as one of astonishing state cruelty.

    • Racism Works In the Tories

      That is why Theresa May is going today to give a bloodcurdling speech attempting to stir up racism against immigrants by saying they are making us poor and making our society less cohesive. She will even pander to the ludicrous notion that an economy is of a fixed size no matter how many people are in it, with a fixed number of jobs, so “they” are taking “our” jobs. Doubtless she will also outline yet more definitions of thought crime and new reasons to lock up young Muslims.

    • Hillary Clinton wants gun firms liable for shootings

      She proposes abolishing legislation that protects gun makers and dealers from being sued by shooting victims.

    • Rush Limbaugh Falsely Claims That 92 Percent Of Mass Shootings Since 2009 Have Occurred In Gun-Free Zones
  • Internet/Net Neutrality

  • Intellectual Monopolies

    • Company hikes price 5,000% for drug that fights complication of AIDS, cancer

      A drug treating a common parasite that attacks people with weakened immune systems increased in cost 5,000% to $750 per pill.

      At a time of heightened attention to the rising cost of prescription drugs, doctors who treat patients with AIDS and cancer are denouncing the new cost to treat a condition that can be life-threatening.

    • Copyrights

      • Greek court says that it doesn’t matter whether the content you link to is lawful or unlawful

        Did you think that the story with hyperlinks and copyright was over?

        Of course it’s not.

        On the one hand, there is a new case currently pending before the Court of Justice of the European Union(CJEU): GS Media v Sanoma, C-160/15). This Dutch reference is seeking clarification as to how linking to content (leaked Playboy photographs in this case) freely accessible online, but which is communicated to the public without the consent of the copyright holder, should be qualified.

      • Intellectual Property? Why Words Matter In The Copyright Debate

        Language matters. Whether we get to keep our liberties or not depends on whether those liberties are generally named in positive words. The same thing goes for the privileges of corporations.

10.04.15

Links 4/10/2015: Linux 4.2.3 , 4.1.10; MPlayer 1.2 released

Posted in News Roundup at 8:42 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Curious about Linux? Try Linux Desktop on the Cloud

      Linux maintains a very small market share as a desktop operating system. Current surveys estimate its share to be a mere 2%; contrast that with the various strains (no pun intended) of Windows which total nearly 90% of the desktop market. For Linux to challenge Microsoft’s monopoly on the desktop, there needs to be a simple way of learning about this different operating system. And it would be naive to believe a typical Windows user is going to buy a second machine, tinker with partitioning a hard disk to set up a multi-boot system, or just jump ship to Linux without an easy way back.

  • Server

    • A gentle introduction to microservices

      What are microservices? Have you heard the phrase “microservices” used in a discussion of modern application development and wondered what it’s all about?

  • Kernel Space

    • The Art of Communicating with LKML

      For most users of distros, the distro bug system is the first line of interaction when something kernel related breaks on their system. This makes sense: the kernel most users are using is packaged by a distro so the maintainers should be the first ones to take a look at the problem. Inevitably though, something will arise such that the solution cannot come from the distro maintainers and must come from the greater kernel community. Sometimes the distro maintainers can do the follow up but there may be a request for the bug reporter or reproducer to contact the kernel mailing list directly. Now everything depends on how successful the person is in communicating with LKML.

    • Linux 4.2.3
    • Linux 4.1.10
    • There’s A Lot Of Exciting AMDGPU DRM Code Brewing For Eventual Catalyst Support

      One of the big items still in the works as part of AMD’s unified Linux driver strategy is that the Catalyst proprietary driver will be isolated to user-space and make use of the AMDGPU kernel DRM driver. Being publicly now in development in a few code branches are changes to the AMD DRM code for beginning to suit more of it to Catalyst’s driver design.

    • Linux Kernel 4.2.3 Is Out with Open vSwitch and IPv6 Fixes, Updated Networking Drivers

      After only 4 days from the release of the second maintenance version of the Linux 4.2 kernel series, Greg Kroah-Hartman comes today, October 3, with news about the release of Linux kernel 4.2.3.

    • Linux Foundation Says Open Source Code Worth $5 Billion
    • Graphics Stack

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Ships Plasma 5.4.2, bugfix Release for October

        Tuesday, 06 October 2015. Today KDE releases a bugfix update to Plasma 5, versioned 5.4.2. Plasma 5.4 was released in August with many feature refinements and new modules to complete the desktop experience.

      • KDE Plasma 5.4.2, bugfix Release for October, is already landing in Kubuntu Wily
      • Kubuntu 15.10 Will Have KDE Plasma 5.4.2

        Kubuntu 15.10 “Wily Werewolf” is being released later this month and it will feature the very latest KDE Plasma 5.4 point release.

        Plasma 5.4.2 isn’t being released until next week but the Kubuntu crew is pushing it early into 15.10 Wily now to ensure it arrives with the 15.10 debut.

      • Randa Meetings update

        I am really not a person who blogs much and its bit late, please bare with me in case if anyone does not like the way article is written or how it is formatted. I really feel good being KDE user since 2005. Officially I started coding / contributing to minor stuff in KDE in 2010. Switzerland is an awesome place and I really liked Randa. Speaking of Switzerland, for me those trains are art of engineering. I would like to thank KDE e.v. and other sponsors for making this event happen.

    • GNOME Desktop/GTK

      • GNOME’s 2014 Annual Report Published

        For those wondering about the state of GNOME, their annual report is now available.

        The GNOME Foundation 2014 annual report covers their financial situation, their trademark battle with GroupOn, their temporary financial shortfall due to the OPW project, the hack/developer events engaged in, and much more.

  • Distributions

  • Devices/Embedded

    • Nest Labs advances its Weave home automation ecosystem

      Google’s Nest Labs subsidiary announced more details about the Weave peer-to-peer networking protocol for home automation devices. Nest, which sells the popular Nest Learning Thermostat and other Linux-based home automation products, says it has added Weave to its Works with Nest connected ecosystem program. It also announced the vendors that will support Weave when it is released in 2016, starting with Yale and its “Linus” smart lock (see farther below).

    • Headless box-PC has six GbE ports, runs Linux on G-Series

      Acrosser’s “AND-G420N1” compact headless networking appliance runs Linux on a quad-core 2GHz AMD G-Series SoC, and offers SATA-II storage and six GbE ports.

      Acrosser refers to the AND-G420N1 as a desktop networking microbox, as well as a “cost-effective niche solution.” The networking appliance runs Ubuntu or Fedora Linux on an AMD G-Series GX-420MC SoC

    • OpenDerby Update

      Last year I built a new derby track for my son’s royal rangers group. I used a RaspberryPi with Pidora on it to run the timing system.

    • Phones

      • Five things that doomed the big and brilliant BlackBerry 10

        And being late matters. In a globalised technology industry, hundreds of smaller industries, and their own supply chains, all line themselves up alongside the winners. Being late and going it alone is suicidal. Ask Nokia: it envisaged a ‘computer first, phone second world’ as far back as 2002, when it started Linux development, and devoted billions to being sure it would be competitive when this world came about. But consumers and industry had already anointed a second platform.

      • Tizen

        • [Wallpapers] Tizen Themed Samsung Gear S2 Backgrounds – Vol 1

          Following the release of the Samsung Gear S2 in the US, Korea, Singapore and Germany makets, Tizen Experts present you with custom Gear S2 wallpapers / backgrounds. To celebrate the Smartwatches history, these first batch of wallpapers will have a Tizen theme to them, after all the Gear S2 runs the Tizen Operating System. You can download them directly from our site either using your computer or your mobile device, and then easily transfer them to your Gear S2 Smartwatch.

      • Android

        • Blackphone: privacy-obsessed smartphone aims to broaden its appeal

          Can you hear me now? Not if you’re eavesdropping on a Blackphone. Privacy company Silent Circle has released a second version of its signature handheld, a smartphone designed to quell the data scraping and web tracking that’s become such an integral part of the digital economy in the last few years (and whose results might well end up with the NSA, if the Cybersecurity Information Sharing Act passes).

        • Blackphone 2: NSA-thwarting Android smartphone goes on sale

          The handset runs a new version of the firm’s Android-based SilentOS, and comes with features including Silent Circle’s Silent Phone app, which offers encrypted voice calls, messaging and file transfers.

        • Android fans have yet another reason to cheer Motorola

          Android fans have a lot of good reasons to root for Motorola these days and the company gave them a brand-new one on Friday. Motorola not only announced which of its phones would be getting upgraded to Android but it also announced that it would actually be deleting two pieces of its own software from those devices to make the upgrade process go even faster.

        • Data indicates that Android picked up global market share from iOS last month

          Tracking mobile web traffic, NetMarketShare computes the market share for mobile operating systems. Based on the data from last month, Android was able to widen its gap over iOS globally. Considering that the Apple iPhone 6s and Apple iPhone 6s Plus weren’t launched until September 25th, the recently released phones accounted for a miniscule part of the data. The new models won’t have a major effect on the results until the figures for this month are released.

        • Samsung Galaxy Tab S2 review: One of the best Android tablets available out there

          Reasonably priced in comparison to its rivals, the Tab S2 with its powerful display and fast processor could be the best Android tablet available in the market today.

        • Nvidia Shield Android TV review

          Overall, Nvidia, Apple and Amazon have a clear strategy here. They want to revolutionise the way we interact with television, and they want to provide ‘capable enough’ games machines that appeal to the mainstream too. Nvidia is going one step further – it’s looking to attract core gamers on top of that with its Shield platform and GeForce functionality. But without all of the required media options properly in place and completely integrated into the highly promising interface, what we’re left with is an enthusiasts’ machine where only the core can really put the excellent hardware through its paces.

Free Software/Open Source

  • Three students jump into open source with OpenMRS and Sahana Eden

    We are three students in the Bachelor of Computer Science second degree program at the University of British Columbia (UBC). As we each have cooperative education experience, our technical ability and contributions have increasingly become a point of focus as we approach graduation. Our past couple of years at UBC have allowed us to produce some great technical content, but we all found ourselves with one component noticeably absent from our resumes: an open source contribution. While the reasons for this are varied, they all stem from the fact that making a contribution involves a set of skills that goes far beyond anything taught in the classroom or even learned during an internship. It requires a person to be outgoing with complete strangers, to be proactive in seeking out problems to solve, and to have effective written communication.

  • Your field’s talent is expecting openness

    Open source social and cultural history is the antithesis of traditional organizational management structures, and, unfortunately, it’s younger. Emotion is influenced by surroundings and norms, and what we learned about hierarchy when we were growing up influences how we participate in business today.

  • Events

  • SaaS/Big Data

  • Oracle/Java/LibreOffice

  • BSD

    • Call for Testing: tame userland diff

      The full diff follows in the original mail, but it’s probably simpler to just use a snapshot. For those of you who’ve been looking forward to seeing how it handles, now’s the time to find out.

  • FSF/FSFE/GNU/SFLC

    • Pipe dream – Debian GNU/Hurd 8 Review

      GNU Hurd – microkernel and part of GNU Project. Hurd means “Hird of Unix-Replacing Daemons”, Hird – “Hurd of Interfaces Representing Depth. Total recursion! Development started in 1990 (before Linux kernel) as part of plans to create fully free and open source operation system. Unlike the Linux kernel Hurd have a lot of system daemons (you can see it on video) run by GNU Mach microkernel and some specific system protocols. Popularity of Linux lowered Hurd’s priority, but project progress all this 25+ years.

    • Software that liberates people: feels about FSF@30 and OSFeels@1

      tl;dr: I want to liberate people; software is a (critical) tool to that end. There is a conference this weekend that understands that, but I worry it isn’t FSF’s.

  • Openness/Sharing

  • Programming

    • Teach, Don’t Tell

      This post is about writing technical documentation. More specifically: it’s about writing documentation for programming languages and libraries.

      [...]

      Let’s get started. The first thing to nail down is why we’re documenting a programming language or library in the first place.

    • Remote-First vs. Remote-Friendly

      A lot of companies are using tools like Slack, Hangouts, and GitLab…

Leftovers

10.02.15

Links 2/10/2015: Qubes 3.0, Linux.Wifatch

Posted in News Roundup at 5:52 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Why your Linux PC isn’t vulnerable to the devastating XOR DDoS malware

      Linux isn’t perfectly secure, but there’s no big Linux exploit story here. The real problem is how many poorly configured Linux systems exist in the real world. Linux isn’t a magic bullet that will make a system secure—it has to be locked down properly, too.

    • Google Chromebooks: The most popular classroom computing device

      In Apple’s place, Google with its Chromebooks have stepped in. Chromebooks are cheaper, easier to manage, and easy to share between students. The low upfront price is a big factor, but there’s far more.

      For example, Google offers programs just for schools, Google Apps for Education Suite; class-specific ChromeOS and Android apps, and Google Play for Education. Chromebooks that come with Google Play for Education range at prices from $199 to $227.

    • Kali Linux: Why Aren’t We Arguing More about Mr Robot?

      In episode 0 of Mr Robot, we’re introduced to our hiro protagonist [Elliot], played by [Rami Malek], a tech at the security firm AllSafe. We are also introduced to the show’s Macbeth, [Tyrell Wellick], played by Martin Wallström]. When these characters are introduced to each other, [Tyrell] notices [Elliot] is using the Gnome desktop on his work computer while [Tyrell] says he’s, “actually on KDE myself. I know [Gnome] is supposed to be better, but you know what they say, old habits, they die hard.”

  • Server

    • Google and NASA are getting a new quantum computer

      The famous Quantum Artificial Intelligence Lab is getting some powerful new hardware. A joint project between Google, NASA, and the Universities Space Research Association, the Quantum AI Lab today announced a multiyear agreement to install a D-Wave 2X, a state-of-the-art quantum processor released earlier this year. With over 1,000 qubits, the machine is the most powerful computer of its kind, and will be put to work tackling difficult optimization problems for both Google and NASA.

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Kubuntu: Plasma 5.4.2 Ready testing! Come join the fun.

        Today we have the latest Plasma 5.4.2 ready for Wily (backports will not be made until this one has been tested and released)

      • The Future of Kontact

        Supplemental to what we reported previously about the work in Randa [1, 2] there was a session on the future of Kontact, KDE’s personal information manager (PIM). Over the years this tool has evolved into a monster making both development as well as usage sometimes tricky. It’s time to cut hydra’s arms.

  • Distributions

  • Devices/Embedded

    • Compact, low power IoT gateway runs Linux on i.MX6

      VIA’s 30mm tall “Artigo A820” IoT gateway runs Linux on an i.MX6 DualLite, and offers optional WiFi and 3G in addition to Fast and GbE Ethernet ports.

      Like last year’s Artigo A900 mini-PC, the Artigo A820 runs Linux on a dual-core, 1GHz Cortex-A9 SoC. This time, however, VIA Technologies has turned to Freescale’s i.MX6 DualLite SoC instead of its own Via Elite E1000.

    • Phones

      • Fairphone launches v2 of it conflict-free, upgradeable smartphone

        There’s a company offering a repairable and upgradable smartphone out there and Jack Wallen believe it is just what the world needs. Read on to see if you agree.

      • Android

        • Facebook gives Android a kick in the byte code

          To improve the mobile performance of its social network, Facebook is enhancing Java bytecode on the Android platform with its Redex project, providing a pipeline for optimizing Android DEX (Dalvik Executable) files.

        • 13 of the best Android apps from September

          Coming off the back of the summer holidays always make September a busy month and this year it was no different.

          From useful spam fighting options arriving for Gmail to movie tracking and the launch of a huge repository of online tutorials across a range of subjects.

          We’ve sorted the wheat from the chaff and what follows is the best new and updated apps from September.

          All you need to do is clear a few minutes in your schedule and click your way through the list.

        • Google reveals new Chromecast and Chromecast Audio devices

          Google’s Chromecast streaming media player has proven to be a popular item on Amazon, getting four star ratings and lots of positive comments from Amazon customers. Now Google has announced a brand new Chromecast, and also the new Chromecast Audio device.

        • Hands on: Google Pixel C convertible tablet

          It’s difficult to tell if the new Google Pixel C is a great idea, or an awful one. It feels like a greatest hits list of Windows 8 convertible failures. It’s a clamshell, and the tablet is connected to the keyboard via magnets. But to open it or close it, you have to pull it apart and reconnect it. You can also flip the tablet upright and stick the keyboard to the back of it, though it makes the tablet thicker and heavier than you may like. The entire converting process is messy. Google tries to cover it all up with a beautiful aluminum design and smooth hinges that adjust angle easily. But will it be fun to use every day? I’m not so sure.

        • Google announces the LG Nexus 5X and Huawei Nexus 6P; pre-orders start today

          Google has officially taken the wraps off its new flagship smartphone lineup. In keeping with the current smartphone release trends, Google is announcing two devices today: the Nexus 5X and Nexus 6P. The 5X is made by LG, and the 6P is made by Huawei. The Nexus 5X starts at $379, and the 6P starts at $499, and both phones will ship later this month. Pricing for other territories is starting to dribble in—the Nexus 5X and 6P will begin at £339 and £449 respectively in the UK—but we’ll update the article with more complete information as it’s made available.

        • Google announces the new Chromecast and Chromecast Audio

          The new Chromecast has a disk-like design, a departure from the original’s dongle construction. Its improved internals should also make streaming easier and faster. Now featuring three antennas, it supports 5GHz 802.11ac Wi-Fi for faster connectivity and heavier formats like 1080p. While the new Chromecast handles video and game streaming, the Chromecast Audio device will handle streaming music or podcasts. The new Chromecast plugs into a device with HDMI; Audio uses both optical and headphone jacks to plug into speakers.

        • Huawei’s first Android Wear watch is a beautiful yet basic timepiece

          Huawei isn’t exactly the first company that comes to mind when you think of stylish connected devices. The Chinese manufacturer has delved into wearables with its TalkBand series, but those were slow to come to the US and their fitness tracker-meets-Bluetooth-headset capabilities were peculiar. Now Huawei wants to test the waters of Google’s wearable OS with its new smartwatch, simply dubbed the Huawei Watch, and it’s a solid first attempt at Android Wear.

Free Software/Open Source

  • Apache Foundation retains informal vibe to manage $1m of open-source projects

    The Apache open-source community gathered at its annual conference in Europe this week to collaborate on new projects to drive the future of the web and cloud ecosystems, with a handful of new projects under incubation.

  • Seize the opportunity to explain open source

    Kids have an insatiable appetite for knowledge. I would estimate that all of us with children have had them go through a phase of asking “Why?” constantly. In truth, it often comes at the most inconvenient moment for a parent; like when the world is literally going to explode unless your child puts down the green marker pen, and instead of doing it, they just look up at you and ask “Why?” I was no different. I went through the “Why?” phase. My daughter has been through it and my nephew is going through it right now.

  • AWS launches a managed Elasticsearch service
  • Amazon launches managed Elasticsearch service
  • AWS debuts Elasticsearch Search, its distributed search and analytics engine
  • Amazon flings open source Elasticsearch at Big Data’s cloud
  • New Amazon Elasticsearch service eases setup, with exceptions
  • Amazon Adds Open Source Elasticsearch Platform to AWS Cloud

    Elasticsearch is a Java-based open source framework for searching textual documents on a massive scale. It is designed to be highly scalable and compatible with cluster-based distributed-computing infrastructure.

  • IBM and EMC team up: There’s no “I” in open source

    Sometimes when you are distracting the signal from the noise, you get an exclusive. Today theCUBE, from the SiliconANGLE Media team, got the full story on the EMC and IBM partnership to work in an open-source environment to make Hadoop more accessible to the enterprise.

  • Web Browsers

    • Mozilla

      • Firefox Is Much Better than Any Other Browser and Here’s Why

        We often read about comparative tests between browsers and we see that Google Chrome or Opera are extremely fast, or that some other browser gets really good scores in rendering, and so on. The truth is that none of that really matters when you are using browsers in the real world, and in the real world Firefox shines and it’s head and shoulders above everything else.

  • SaaS/Big Data

    • The return of TryStack, life as a PTL, and more OpenStack news

      Interested in keeping track of what’s happening in the open source cloud?

    • A Brief Comparison of Mesos and Kubernetes

      The recent announcement of Mesos on Windows means developers and organizations that work between Linux and Windows platforms may use their own tools without requiring heavy resource management. Those working with the Google Cloud Engine may prefer working with Kubernetes, while people accustomed to Microsoft Azure may enjoy the Mesosphere workflow pipeline. Each has their own strengths and shortcomings, though the gap between stack management services lessens as more technology is brought to other platforms.

    • MapR Technologies Unveils In-Hadoop Document Database

      MapR integrates Web-scale enterprise storage and real-time database management and adds native JSON support to MapR-DB, its NoSQL database.

  • Databases

    • Pivotal Aims at Oracle Database Business with Open Source Tech

      Software company Pivotal is taking on Oracle’s traditional database business with its latest effort to advance open source. The company is contributing both HAWQ advanced SQL on Hortonworks’ Hadoop analytics and MADlib machine learning technologies to The Apache Software Foundation (ASF).

  • Oracle/Java/LibreOffice

  • CMS

    • If Drupal were a band it would be Rush

      Getting my clients’ developers and sysadmins to stick to all of the documented processes I’ve set up for them.

      I have years of experience implementing Drupal-based solutions, so I have a rather solid understanding of what works and what doesn’t. But some folks without any experience with Drupal try to shoehorn it into incompatible environments. I do my best to explain all of this and why to ensure that, when I’m gone, folks can take all of my wiki documentation and run with it (use it and update it as necessary).

  • Business

    • Semi-Open Source

  • BSD

  • FSF/FSFE/GNU/SFLC

    • What do you have to say? Share it at LibrePlanet 2016

      LibrePlanet 2016 is coming! Next year’s conference will be held **March 19-20, 2016 in the Boston area**. The call for proposals is open now, until November 16th. General registration and exhibitor registration will open later in October.

    • Chicago GNU/Linux talk on Guix retrospective

      Friends… friends! I gave a talk on Guix last night in Chicago, and it went amazingly well. That feels like an undersell actually; it went remarkably well. There were 25 people, and apparently there was quite the waitlist, but I was really happy with the set of people who were in the room. I haven’t talked about Guix in front of an audience before and I was afraid it would be a dud, but it’s hard to explain the reaction I got. It felt like there was a general consensus in the room: Guix is taking the right approach to things.

  • Public Services/Government

    • EC to increase open source for software development

      The European Commission aims to primarily use open source tools for developing software that is distributed publicly, shows an overview on open source adoption that was presented last week by the EC’s Directorate General of Informatics (DIGIT) at a conference in Tampere (Finland). Already much of the EC’s own software is developed using open source. However, over the next 3 years, DIGIT will push to make ‘open source first’ the target for all the new EC software development projects.

  • Openness/Sharing

  • Programming

    • Most Popular Programming Languages In The IT industry

      Programmers are always in high demand these days for jobs, especially if they have fluency in coding language. Learning programming in various languages for engineers is a no-brainer, but some basic understanding of the languages can be invaluable to anyone, even if you’re not looking forward to becoming a master coder.

    • PHPUnit 5.0
    • PHP version 5.5.30 and 5.6.14

      RPM of PHP version 5.6.14 are available in remi repository for Fedora ≥ 21 and remi-php56 repository for Fedora ≤ 20 and Enterprise Linux (RHEL, CentOS).

Leftovers

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts