“They’ll get sort of addicted, and then we’ll somehow figure out how to collect sometime in the next decade.”
–Bill Gates
Summary: Microsoft’s drug dealer-like tactics are facing backlash and lead to a lawsuit, too
“I don’t think Microsoft has a belief in free,” Tim writes. He reminds us that Bill Gates said he would give software to children “to get sort of addicted” (famous quote by now). He also writes about how well “Microsoft knows that the new generation of customers, the ones in school or college are getting competitors products. Microsoft in my view can see that if left unchecked very shortly Microsoft will be an afterthought – Just look at the tablet and smartphone market now, Microsoft barely registers on the scale and has to get a living from Android “licenses” and if these form-factors are the mainstream of the future as the current market stands, Microsoft has a very small and unremarkable future.”
Several years ago we showed that Microsoft started chasing poor people for revenue. Using a proxy, the Business Software Alliance (BSA), Microsoft sued poor people and now it gets sued back:
Microsoft Sued Over ‘Mafia-Like’ Anti-Piracy Raid
One of the largest insurance companies in Guatemala has sued Microsoft over an unwarranted and extortion-like anti-piracy raid. With the help of local law enforcement Microsoft allegedly demanded an on the spot payment of $70,000 for the use of pirated software or the alternative of confiscating all of the company’s computers. These types of raids are not isolated incidents in the software industry. Just last week the BSA and Microsoft lost a similar case in which the court described their raids as “deceptive.”
“Law enforcement helping with Microsoft raids” is iophk calls it and a look at Cablegate diplomatic cables shows how Microsoft, its lobbyists, and of course politicians coerced the police abroad into this. We gave many examples from different poor nations. What we generally see here is a pushback against Microsoft Mafia tactics at another level, not just patents. Microsoft is a Mafia-like company. █
Posted in Patents at 4:10 pm by Dr. Roy Schestowitz
Summary: Misinterpretations of the law, mixing completely disparate concepts, used by patent trolls to justify what they do in Slashdot
Slashdot is a weird beast. I recently re-subscribed just to get a taste of where it’s at after doing all the Microsoft PR [1, 2, 3, 4] (there is a bit less of that now). When it comes to patent news, Slashdot used to be good a decade ago, but recently it became a platform for grooming villains, aiding some ill patent agenda [1, 2]. It is not as though software patents are promoted, but sometimes it seems like trolls are. How truly baffling.
A decision made by CAFC last weeks helped validate some horrific software patent from Ultramercial, leading to rants such as this:
Patent Court Stands By Its Claim That Adding ‘On The Internet’ Can Make An Abstract Idea Patentable
We’ve been following the Ultramercial case quite closely over the past few years. If you’re not aware, this involved a company that more or less patented the idea of “you must watch this ad to get this content” (US Patent 7,346,545) and then sued pretty much everyone. Most of the companies it sued settled rather than fight (which happens all the time), including YouTube and Hulu, but one company, WildTangent, has continued the fight. Eventually, though, the case reached the Supreme Court with the key question being does taking an abstract idea like “watch this before getting that” and adding “on the internet” to it make it patentable? It’s well established that you can’t patent an abstract idea, but for some reason many seem to think that if you say “on the internet” it’s no longer abstract. The Supreme Court did not do a full hearing on the case, but asked the appeals court of the federal circuit (CAFC — known as the patent appeals court) to reconsider its original ruling in light of the Supreme Court’s
ruling in the Prometheus case, where it said that you can’t patent broad medical diagnostics. The rule there was that you “could not simply recite a law of nature and then add the instruction ‘apply the law.’” So, is the same true for “abstract idea” plus “on the internet”?
Therein lies a key problem. Software should not be patentable. There are those, however, who single out trolls as the culprit (culling out trolls is better than nothing), noting/highlighting for instance notorious entities like Intellectual Ventures with its 2,000 or so proxies. According to this report from Pamela Jones, the FTC might fail to challenge those most critical elements of abuse, unless they somehow manage to probe Bill Gates’ close friend, who is by far the biggest troll in the world. As Jones put it:
Now that we know that the FTC is interested in whether patent trolls’ business practices are hurting competition and is planning to investigate, I thought I’d point out something I found interesting in a recent motion for a protective order [PDF] by Intellectual Ventures’ CEO Nathan Myhrvold in a dispute with Lodsys, the patent troll trying to sue multiple companies and Apple app developers in two of the Lodsys litigations in Texas, Lodsys v. Brother International Corp. et al. and Lodsys v. Combay, Inc., et al.. The dispute is being handled separately, as Myhrvold v. Lodsys Inc et al, in Washington State, docketed as 2:13-mc-00088-RSL. The presiding judge is Robert S. Lasnik, hence the RSL in the docket line.
Myhrvold’s lawyer has filed a Declaration in Support, as well some exhibits [PDF], one of them under seal. Myhrvold’s trying to avoid a deposition by Lodsys, and the battle over it has been going on since last October.
From these documents, I learned that the patents Lodsys is using to sue everyone did indeed come from Intellectual Ventures, as we had heard, but there was a middle man, fellow patent troll Webvention LLC. This isn’t the first time we’ve seen Webvention in the news going after multiple victims with goofy, broad-stroke patents it got from IV. Anyway, IV sold the patents Lodsys is using to Webvention first, and Webvention then sold them to Lodsys. Lodsys has some questions it would like Myhrvold to answer about all that.
He also allegedly had some conversations with Bill Gates that they’d like to ask him about, and there is an email to Gates and others at Microsoft dealing with “combinations” that they say came from Myhrvold’s email account that they are interested in asking him about. Finally, there is an IV license with Microsoft that Lodsys would like more information about.
Me, too, and I hope the FTC will feel the same. A subpoena from the FTC would be harder to avoid complying with than one from Lodsys.
This is interesting because it helps show the unique role of Microsoft in the trolls’ shell game. There are other notorious trolls out there (exposed time after time, many connected to Microsoft) and just like Myhrvold, this one too receives grooming from a long-lost ‘geek’ site. To quote the latest: “A few weeks ago you had the chance to ask James Logan, the founder of Personal Audio, about the business, the patents the company holds, and the lawsuits it has filed.” (Slashdotcalled for questions here)
iophk says: “It seems that /. [Slashdot] has wandered very far of the path it started out on. I wonder if that is part of the reason that Malda got forced out.” █
Summary: Legions of cyberattack staff from the NSA can engage not only in espionage but also remote mass-vandalism of hardware in foreign nations
Now that we know calling out Windows is a serious matter of national security (the NSA regularly gets back doors for access, as noted in more and more articles right now), we should consider what it really means. With UEFI it has been demonstrated that motherboards can be bricked [1, 2, 3], irrespective of the platform (provided there is remote access to it). Imagine what can happen at times of war. If the NSA can take over Windows, which it can, it can brick any computer with such motherboards. This is serious because it means that not even reinstalling the operating system or swapping operating systems would help. This is what one gets when the most ferocious cyberarmy has back door access to the system. This new article about restricted boot covers antitrust issues as well:
We take a look at the most recent controversial feature to emerge from Redmond
[...]
But there is another angle to it all. Microsoft probably couldn’t have insisted that manufacturers lock the boot loader on x86 machines. In the EU at least, this would almost certainly be construed as abusing a dominant market position, and that has got Microsoft in trouble before.
With ARM though, they don’t have a dominant market position so are legally free to abuse their non-dominant position as much as they wish. With this in mind, some people have speculated that Secure Boot on ARM is what Microsoft want to do, and on x86 it’s what they’ve been forced to do.
In the future, these people speculate, the x86 version will creep closer and closer to how it is on ARM until it finally locks users out of their own computers.
Reports that Windows RT is headed for the dustbin of failed Microsoft operating systems has become a month — if not weekly — ritual for Asia-based sources.
This time Digitimes has gone so far to compare RT to the fate of Hewlett-Packard’s failed WebOS.
“Microsoft’s Windows RT operating system may fall to the same fate as Hewlett-Packard’s (HP) WebOS as most brand vendors have already stopped developing related products,” Digitimes wrote on Wednesday, citing sources at hardware suppliers.
Microsoft is on its way out, but the damage it causes on its way out is immense. When wars are waged by geeks like Turing and cryptology is where a lot of potential for domination lies, using Windows in any government other than the United States’ is simply unthinkable. Countries like Germany should complete the migration to Free software. █
Posted in Microsoft at 3:34 pm by Dr. Roy Schestowitz
Summary: Antifeatures of Skype continue to be revealed thanks to the leaks from Edward Snowden
We have heard a lot recently about Skype snooping. “See why you just can’t trust proprietary software,” says this post about Project Chess, which is a programme for the NSA to pull in Skype data. It goes quite a long way back. According to this, calls themselves — not just metadata — get included in the bundle. To quote:
In yet another instance of a report indicating that tech giants worked directly with intelligence agencies to enable government surveillance, it is now being reported that Skype began a secret program called Project Chess to enable intelligence agencies and law enforcement to easily get a hold of calls.
This comes after it was revealed that Skype was part of the massive National Security Agency (NSA) surveillance program known as PRISM.
The latest revelation about Skype’s secret program is quite interesting given the controversy surrounding the privacy and security of Skype. Indeed, the NSA leaks hinted that Microsoft may have lied about the security of Skype, though many suspicions were raised last year after they filed for a patent for “legal intercept” technology.
Lies from Microsoft are hardly newsworthy, whereas the strong proof that the government listens to Skype calls is worth documenting. For those are still using Skype, try Jitsi on the desktop or Linphone on smartphones. I tested a lot of different SIP software before settling with those; I use them around 15 hours per day (permanent in daytime over Ethernet and 3G). █
You know those graphs of Earth’s motion recorded by scientists to find location and strength of earthquakes? Here’s one for market-share of operating systems. I obtained it by adding up StatCounter’s page-view shares for M$’s Windows. For a month there was a rapid decline in share and then the rumbling began on May 2, when Earth shifted on its axis the decline in the share of that OS was suddenly reversed until two weeks later, it’s share returned to “normal” and stayed there with no further decline…
Munich City Council is all set to make Linux-based operating system a norm for its citizens. Earlier we had reported on how the city saved over 10 million Euros or $12.8 million by employing Linux and open source software instead of using Windows with Microsoft Office and Windows with OpenOffice. And now, the city is all ready to take the next step. The German city is now eyeing to wean its citizens off Windows XP with free Linux CDs. Munich City Council has plans to distribute thousands of free Linux CDs to the citizens in spring of next year.
Munich City Council has chosen Ubuntu over other distros as the ‘replacement of Windows XP’ for the citizens of the city. Microsoft has recently decided to officially end support of the 11-year old operating system in April next year. This is where the government saw the opportunity of introducing their people to the world of free and open source software.
J.R. Rivers: We’ve had a few customers come in and say, ‘I want to use [Linux tools] for configuration management.’ We made sure it installed and did appropriate things, and then we let customers go to town. More often than not, they were able to use their existing recipes they had built for their server environments pretty much intact on their network devices. They had to augment it some because things are a little bit different. But something like Chef is really about building out a server and making sure all of its packages are put together correctly. A lot of that is based on standard internal policy — setting up your user authentication mechanisms correctly, setting up your IP table filter lists, tying back to your AAA servers, setting up your NTP servers. All of these are the same whether you are running on a networking device or a server.
Most people if they have even heard about Linux, only know Ubuntu. I have been asked to compare Ubuntu and OpenSuse. On technical merits, I think the basic technologies used by both are a tie. But in execution, OpenSuse runs away from Ubuntu. The polish and elegance of OpenSuse’s KDE and Gnome UI’s far exceeds the homeliness of Ubuntu’s Unity desktop. Even Unity’s default color scheme is awful. Some think Ubuntu might be marginally better on ergonomics (Though I really don’t think so) but it is not pleasing to many eyes.
Bangalore: We all know enterprises serve as the home for Linux operating systems. These operating systems can be tweaked so much that, today, they have become a common OS in personal computers too. But earlier or years before, to say exact, Linux was credited to be one of the toughest nuts to crack and apart from that, tweaking a Linux desktop into business-ready machine really gave headaches.
Arvind Krishna has a big job at IBM. Krisha is the General Manager for Development and Manufacturing in the Systems and Technology Group at IBM. His responsibilities include semi-conductor research and development as well as production.
Bcache has been added to the kernel as a second framework for SSD caching. More compact metadata should speed up btrfs. Checksums help XFS prevent data errors in its file system structures.
Lennart Poettering posted a message to the systemd-devel mailing list that outlines some changes coming. It refers to an earlier message that started describing differences coming in the kernel’s control group (cgroup) implementation and their effects on systemd. Those cgroup changes were discussed in February 2012 and cgroup maintainer Tejun Heo decided to eventually drop multiple cgroup hierarchies in March 2012.
Over the last years few years the Linux Foundation has extended their charter beyond Linux. They provide a home for a number of open source projects that extend beyond the Linux kernel.
Linux developers were once just that, developers. But their role is changing says the Linux Foundation, which is expanding its training options to help them.
The foundation, an industry supported non-profit, has added two courses to its program, OpenStack Cloud Architecture and Deployment and Linux Enterprise Automation.
Bcache has been added to the kernel as a second framework for SSD caching. More compact metadata should speed up btrfs. Checksums help XFS prevent data errors in its file system structures.
Up this Saturday morning on Phoronix are some OpenGL/gaming performance benchmarks of eight different desktop environments currently available from the Ubuntu 13.10 “Saucy Salamander” package archive when using Intel Core i7 “Haswell” graphics with the Linux 3.10 kernel and Mesa 9.2.
Since the Computex launch of Intel’s much anticipated Haswell processors at the beginning of the month, there’s been much Linux coverage on Phoronix concerning the compatibility and performance of these new Intel processors from both the processing and graphics sides. Here’s a summary of all of our discoveries and findings over the past few weeks.
Today I want to do a roundup of the available text editor for our Linux computer, in particular I’ll take a look at the graphical text editor, so no vi, emacs, nano or joe today.
Welcome to The Cheapskate’s Corner! Take a deep breath and prepare your wallets because this issue comes loaded with bundles and sales on which to spend your money — sparingly, of course.
The real-time strategy game Planetary Annihilation, developed by Uber Entertainment, has been released in an alpha version for Linux, Windows and Mac on Steam.
The project was financed through the Kickstarter and has collected $2,229,344 of $900,000 pledges in a period of one month.
Europa Universalis IV is expected to appear on 13 August 2013 for Linux, Windows and Mac. It was developed by Paradox Development Studio, the company that has published Crusader Kings II apart of Europa Universalis.
Linux is a solid and secure operating system that’s suitable for gaming, but at this time Windows remains the lead platform for PC games. This may be about to change. Last year, Valve Software brought their game distribution system Steam to Linux, along with several of their popular game titles like Left 4 Dead and Half-Life.
One company wants to boost Linux gaming by putting the game development process on Linux. Leadwerks Software has launched a Kickstarter campaign to bring their game development software to the Linux operating system. The company says this will allow users to build and play games without ever leaving Linux.
Planetary Annihilation, a real-time strategy game out of Uber Entertainment, is now available in alpha form on Linux.
The final release of Planetary Annihilation isn’t expected until year’s end for all major platforms, but Uber Entertainment is keeping the Linux developments in-step with OS X and Windows. Thus, available now is the alpha release of Planetary Annihilation for Linux gamers.
This release just focuses on bugfixing: first hint I had to add about is about qtwebkit version. In this “strange” period, where qt focuses on Qt5, QML and WebKit2, while we are still bound to Qt4 && Webkit1, I think we need to follow the unofficial QtWebKit 2.3.x branch, with its releases about (last should be QtWebKit 2.3.1). People reported, in this 40 days since rekonq 2.3.0 release, a lot of crash bugs that can be fixed just upgrading from QtWebKit 2.3.0 to QtWebKit 2.3.1.
We are really glad to release the first officially stable version of our new Screen Management tool that allows you to configure screens such TV, Projectors or Monitors magically just by plugging them while keeping an interface for those users that want or need a more custom configuration.
Puppy does not disappoint, once again. For the past six or seven years I have been using this little distro and reviewing it occasionally, it has always delivered a very pleasant and efficient experience. Some of the stuff could benefit from extra polish, like making some of the network configurations faster and easier. But overall, given its mission statement, it delivers the most practical combo box.
This weekend, I decided to install a new distro on my netbook. I saw Linux Deepin just released a new version so I gave it a try. And it was a right decision, Linux Deepin is really a perfect distro in my opinion.
Linux Deepin is a Chinese Linux distribution (English ISO files are available as well) based on Ubuntu, that ships with its own desktop environment and some unique applications, which integrate with the overall Linux Deepin look and feel.
Zorin OS, a newbie friendly Linux distribution based on Ubuntu, has now got four new companions in Zorin OS 7 Educational, Business, Multimedia and Gaming editions. All these editions are based on the Zorin OS 7 Core that was released on 9th June. Zorin OS 7 is based on Ubuntu 13.04, and is thus package-compatible with Ubuntu’s repositories. Version 7 and its companion editions come out about a year after the Zorin OS 6 release, and do not differ much from it in terms of features. The new release comes with a huge set of software updates, and a facelift (new logo plus theme) that closely follows on the Windows 8 interface design.
Well, thanks to Megatotoro’s review of Pisi Linux here (and his output problem), I have been fooling around with my “From-PC-to-TV” output lately. I finally discovered how to have two different monitors on KDE. I’ll write about it soon.
I need some time to install Pisi myself. Maybe next weekend. And I need to learn how to install the newer versions of Firefox on Mageia 3, 64 bits.
The PCLinuxOS update went good. I only encountered a minor sound problem because my previous sound configuration was invalid in the new KDE 4.10.4. Yet, it was a matter of changing the position of devices in the hierarchy. Oh, and the new login screen looks great! No wonder PCLinuxOS is now ranked #3 on DistroWatch’s chart.
Soon it will likely be possible to run a KDE desktop over Wayland using Gentoo Linux with its Portage packages.
With KDE 4.11 beginning to support Wayland through KWin window manager changes, a Gentoo maintainer is already readying the support to use Wayland/Weston in conjunction with KDE rather than X11.
In the first quarter of its current fiscal year, which ended in May, US Linux distributor Red Hat increased its revenue by 15% to $363 million, continuing the positive trend of the previous quarters. Net income grew 8% year-over-year to $40 million. Revenue from software subscriptions alone rose 16% to $316 million, according to a press release.
Google is collaborating with Red Hat to enable developers to run Java application designed for Google’s App Engine Platform-as-a-Service (PaaS) in private cloud installations, according to a post on Google’s Cloud Platform Blog. Both companies have been working together, improving the open source App Engine Test Compatibility Kit (TCK) to further interoperability between Google’s own platform and Red Hat’s third party implementation CapeDwarf. The result is an implementation on top of Red Hat’s JBoss application server that allows users to transfer their Java code from Google’s infrastructure to their internal JBoss installation and back.
For those wishing to play with the next-generation Unity 8 interface atop the Mir Display Server while running Ubuntu Touch, a Personal Package Archive (PPA) is now available. There’s also been other Mir and Unity 8 progress made this week.
One question we get a lot around here is whether or not ARM is the top choice out there. Of course, ARM hardware is easy to acquire, but in terms of turn key installation, Intel is still much easier to integrate at this point. We did decide to start running the Linux test suite on a few ARM platforms. The first of which is the mega-popular Raspberry Pi 512MB model. We installed Raspbian and tried our Linux test suite. Luckily, almost everything worked, except the crafty chess benchmark. Otherwise, there are certainly some interesting results. Let’s take a look.
Last week, Apple unveiled the latest incarnation of its mobile operating system, iOS 7. The response was decidedly mixed, with users and critics welcoming a long overdue update to the OS but bemoaning the Easter-colored M&M icons, the inconsistent UI, and an overall look and feel that was wholly lifted from Android and Windows Phone.
Earlier this month, Facebook officially announced its implementation of hashtags, prompting both celebration and outcry from users. But the event also sparked a spate of critical analyses addressing the nature of conversations today, as well as the ways technologies facilitate and organize even the most banal ones. Love them or hate them, hashtags have become an overwhelmingly popular convention for pursuing those recurring questions: What’s going on right now? And how should we make sense of it?
This week news broke that the popular JDownloader download tool had been declared illegal by a German court. The headline was open for debate since the court only took exception to one particular and long-since removed feature which allowed the downloading of encrypted video streams. However, the ruling has concerned the creators of JDownloader who say that it represents a threat to the development of Open Source Software.
Firefox users who use the Windows 7 or Windows 8 operating system benefit from support for H.264, Mp3 and AAC formats that Mozilla implemented in version 21 of the web browser. Support means that users of the browser on those systems can play audio and video files requiring these formats in the browser without plugins.
The Center for Internet and Society at Stanford Law School has announced a list-based exception platform for managing cookies, called the Cookie Clearinghouse (CCH). Mozilla has committed to work with the CCH Advisory Board to develop the platform.
Mozilla’s recent attempts to bring in better handling of cookies – in the form of Safari’s third-party cookie block – and reduce the tracking of users ended up in “development hell” a month ago. This was not, though, a result of criticism from advertising groups, but because it was generating too many false positives and false negatives when deciding whether to block cookies from third-party sites.
The public cloud’s heyday has passed, and enterprises should focus on hybrid cloud investment. So say executives at Rackspace (RAX), the OpenStack-powered cloud hosting vendor. And if deals like the one Rackspace just announced with Fidelity Investments to build an OpenStack cloud is any indication, Rackspace’s vision is on the mark. Here’s the scoop.
Is the NoSQL database trend a threat to Oracle (ORCL)? This is a big week for the company, which announced somewhat disappointing Q4 new software licenses yesterday. While cloud computing and hardware sales are Oracle’s big challenges, you can’t overlook the open source database wars as well. Indeed, Oracle and MySQL faces challenges from smaller NoSQL vendors.
MongoDB is a high performance, open source, non-relational NoSQL database written in C++. MongoDB stores structured data as JSON-like documents with dynamic schemas (MongoDB calls the format BSON). This property helps make the integration of data in certain types of applications easier and faster. MongoDB is network accessible, has full index support, query profiling, replication and fail-over support, indexing, auto-sharding for cloud-level scalability, load balancing and more.
Tokutek has announced version 1.0 of TokuMX, a version of MongoDB that has its storage layer replaced with Tokutek’s storage engine. The storage engine, which is available for MySQL and MariaDB, uses the company’s patented Fractal Tree indexing. In developing TokuMX, the developers have also replaced the locking and replication code of MongoDB to get better workload performance as the client count increases. The focus for TokuMX is on large databases of over 50GB, where its indexing technology can bring the most benefit to performance.
The group responsible for overseeing the development of the LibreOffice free and open source “Office”-style productivity suite of applications has confirmed its latest release.
The Document Foundation says that 98 bug reports and improvements have been included in LibreOffice 4.0.4, with the 4.1.x (and onward) set of releases due to follow as soon as this July.
WordPress 3.5.2 is now available. This is the second maintenance release of 3.5, fixing 12 bugs. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.
The WordPress security team resolved seven security issues, and this release also contains some additional security hardening.
Unpatched vulnerabilities not closed by the developers in time or the lack of a crisis communication plan or brute force protection did have the biggest negative impact on the BSI’s overall rating, while a clunky integration into existing management software only brought down the score a little. However, the security experts did not conduct a penetration test for the study.
I work at a public library in the Washington DC-area and often think about what needs to be designed into the space of future public libraries. I was recently visiting the MAKE magazine website when I saw a fascinating how-to video about building your own portable Raspberry Pi game system.
I can’t promise I’ll post regularly or keep this up to date, in fact I can pretty much promise I won’t but I’m not going to. Anyway this’ll be a blog on my development related activities and maybe some other things, who knows?
Photo by Eric LeblondThe OISF development team is pleased to announce Suricata 1.4.3. This is a small but important update over the 1.4.2 release, fixing some important bugs.
Version 5.0 of the open source Magnolia CMS has been released after a year and a half spent redeveloping the front end tools that deliver content to the CMS’s users. Talking with The H, Pascal Mangold, CEO of Magnolia, explained that Magnolia 4.5 had seen the redevelopment of the backend of Magnolia to create a foundation for the work that has been delivered in Magnolia 5.0. Magnolia is a Java CMS that is built around the concept of being an enterprise integration platform, connecting users with enterprise systems in an accessible way.
Google has released the first beta version of its scripting language Dart, which it originally unveiled as its alternative to JavaScript in October 2011. Google’s new programming language essentially aims to replace JavaScript – unlike Microsoft’s TypeScript and CoffeeScript, two supersets that add important features to the older scripting language.
The video never went viral, probably because it has an unexplained ‘interlude’ after 42 minutes 57 seconds which makes it seem to end at a random point. This bizarre showstopping moment didn’t deter your intrepid iij innovation hunters (it actually resumes after about a minute of serious onscreen weirdness) from recognizing a gem and it certainly shouldn’t stop you watching it
A few days ago I explained why I don’t think “hybrid OA” is a legitimate path to the full-open-access world we all want. The TL;DR is first that it’s offered at stupidly high prices, and secondly that it’s completely impossible to detect or prevent double-dipping because journal subscriptions are the most opaquely priced good in the known universe.
Then I found that Stuart Shieber had written much the same article but much better four years ago, from the perspective of explaining why the Harvard open-access fund does not cover hybrid fees.
Most time in debuggers is spent doing the same few things: setting breakpoints, stepping through code, looking at variables. Which products make those features supremely accessible and useful? We compare 13 debuggers and find out.
Have you compared debuggers lately? Until recently, I’d been programming using only one debugger — the one supplied by my compiler vendor. Suddenly, with a new job programming on Linux, I find the range of choices in debuggers is dizzying. Wikipedia lists 18 GUI front ends for GDB alone. This article is the result of my effort to choose a debugger with a good GUI front end for my first UNIX/Linux job in several years.
Like TypeScript, Dart is a language aimed at making it easier to develop large, complex web applications that are efficient, secure, and maintainable. It compiles into JavaScript, so it can run in any modern web browser, but its syntax is designed to ameliorate some of JavaScript’s more glaring flaws.
As planned in May, Google has now finalised the bit stream for VP9, its open video compression format. Chromium has included a beta VP9 decoder for some time and this has now been activated by default according to an entry in the issue tracker reading “Remove VP9 flag, and enable VP9 by default”. VP9 can also be enabled in the developer version of Chromium and Chrome (“Enable VP9 playback in video elements”). Google is planning to incorporate the final version of VP9 into Chrome 29 and enable it by default by 20 August. It is nonetheless likely to be some time before VP9 achieves a critical mass on YouTube – to date VP9 is limited to a few demo videos.
Sticky fruit labels may soon be things of the past thanks to a new EU ruling that allows grocers and retailers to make laser marks on the skin of citrus fruit, melons and pomegranates. Laser branding, previously banned because of the use of iron oxides and hydroxides, was approved after three years of liaising between the EU and Laser Food – the company behind the technology. The new law will come into effect on June 23rd.
Read more: EU Approves the Use of Laser “Tattoos” on Fruit as Replacement for Sticky Labels | Inhabitat – Sustainable Design Innovation, Eco Architecture, Green Building
Kaspersky Lab is developing a cyber secure operating system to combat state-sponsored hackers in China, Iran, North Korea and more. But when will CEO Eugene Kaspersky offer updates?
LinkedIn, the professional networking site which had been reported as hacked or hijacked yesterday, was in fact the victim of human error at the company’s DNS provider, Network Solutions, an error which appears to have affected up to 5,000 domains in all. Network Solutions has said in a blog posting that while trying to resolve a DDoS (Distributed Denial of Service) attack, it accidentally changed the DNS records of a “small number” of customers.
Tucson, Arizona – As immigration reform debates run hot on Capitol Hill, many members of Congress say a more secure border has to be part of any bill they approve. One of those is Arizona Sen. John McCain, one of the “Gang of Eight” of bipartisan lawmakers pushing reform.
More than 250,000 anti-government protesters have again taken to the streets in several Brazilian cities and engaged police in isolated intense conflicts. Demonstrators vowed to stay in the streets until concrete steps are taken to reform the political system.
Across Brazil protesters gathered to denounce legislation known as PEC 37 that would limit the power of federal prosecutors to investigate crimes. Many fear the laws would hinder attempts to jail corrupt politicians.
Turkish police used water cannon to disperse thousands who had gathered in Istanbul’s Taksim Square on Saturday to observe a memorial for four people killed during recent anti-government protests. The officers later fired teargas and rubber bullets to scatter demonstrators who regrouped in side streets.
The police move came as Turkish Prime Minister Recep Tayyip Erdoğan declared that foreign-led conspirators he alleges are behind the anti-government movement in his country also are fomenting the recent unrest in Brazil.
If an apparent U.S. drone strike this month in the village of Mahashama had killed only its intended targets – an al Qaida chief and some of his men – locals might’ve grumbled about a violation of Yemen’s national sovereignty and gone on with their lives.
But the strike also killed a 10-year-old named Abdulaziz, the younger brother of the targeted militant, Saleh Hassan Huraydan, according to local tribal leaders and Yemenis with close ties to the al Qaida branch here. And that set off a firestorm of complaints that underscores how American airstrikes can so outrage a community that even though al Qaida loses some foot soldiers, it gains dozens of sympathizers.
The Obama administration should “seriously consider” a surgical strike to prevent North Korea from developing long-range missiles capable of carrying a nuclear warhead, argued former CIA director James Woolsey.
In a radio interview Sunday night, Woolsey warned the U.S. is currently wide open and virtually defenseless against a missile coming from a southerly direction, and that both Iran and North Korea made advances toward firing missiles in that direction.
The story behind the development and deployment of this presidential killing corps is told inThe Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth, the latest book by Pulitzer Prize-winning journalist Mark Mazzetti.
On most days, relentless rivers of clouds wash over Alaska, obscuring most of the state’s 6,640 miles (10,690 kilometers) of coastline and 586,000 square miles (1,518,000 square kilometers) of land. The south coast of Alaska even has the dubious distinction of being the cloudiest region of the United States, with some locations averaging more than 340 cloudy days per year.
The Keystone XL Pipeline has been firmly established as North America’s biggest environmental battleground, but another major battle is forming in Bristol Bay, Alaska over the proposed Pebble Mine, a massive gold and copper mine that has the potential to wipe out half the world’s remaining wild sockeye salmon. And like the Keystone pipeline, President Obama will have the final say on whether construction will move forward. The sprawling open-pit mine would decimate vital salmon streams, and commercial fishermen, environmental organizations and native tribes are all voicing their opposition to the mine.
Jeff Goodell has a must-read piece in Rolling Stone, “Goodbye, Miami: By century’s end, rising sea levels will turn the nation’s urban fantasyland into an American Atlantis. But long before the city is completely underwater, chaos will begin.”
California’s Department of Financial Institutions has issued a cease and desist letter to the Bitcoin Foundation for “allegedly engaging in the business of money transmission without a license or proper authorization,” according to Forbes. The news comes after Bitcoin held its “Future of Payments” conference in San Jose last month. (The license information is available on CA.gov and Forbes placed the cease and desist letter on Scribd.)
If found in violation, penalties range from $1,000 to $2,500 per violation per day plus criminal prosecution (which could lead to more fines and possibly imprisonment). Under federal law, it’s also a felony “to engage in the business of money transmission without the appropriate state license or failure to register with the US Treasury Department,” according to Forbes. Penalties under that law could be up to five years in prison and a $250,000 fine.
Starbucks, one of the companies exhorted by the prime minister to “wake up and smell the coffee” over tax, has handed over £5m to HM Revenue and Customs – its first payment in five years.
But the cash has only gone some way towards assuaging critics, one of whom complained that companies should not be able to “pick and choose” how much tax they wanted to pay.
The coffee shop chain said on Sunday it had made the contribution to please its customers and would be paying a second £5m instalment in the last half of the year despite claiming the business overall continued to make a financial loss in Britain.
The “XXXXX is not YYYYY” jokes aside, Europe’s union of nations is beginning to separate increasingly between the haves and the have-nots. The sad truth, as Bloomberg’s Niraj Shah notes, is that recession/depression has pushed Spanish and Italian GDP-per-capita below the EU average in purchasing power terms – just like Cyprus, Slovenia, and Greece. Irish GDP per capita was 29% above the average, while Greek and Portuguese per capita output were 25% below. Output per head for the EU ranged between 47% (Bulgaria) and 271% (Luxembourg) of the average. With today’s news that retroactive ESM recaps are unlikely, the banking-sovereign symbiosis of Spain and Italy will increasingly come under pressure and with productivity so dismal, there is little hope for now.
Southeast Asia, so long a byway of the world economy, has become a well-worn path for foreign investors seeking refuge from the continuing after-effects of the global financial crisis. They have come because the region has been surging ahead over the last few years, even as the West slumped, China readjusted and India stuttered.
As confidence grew in Southeast Asia’s newfound ability to realize its potential, success followed success: Indonesia is on the cusp of becoming the region’s first trillion-dollar economy, and achieved an investment-grade credit rating for the first time in 14 years in late 2011, something the Philippines also attained for the first time ever earlier this year; manufacturing has been booming in Malaysia and Thailand; and the Philippines began to challenge India as the top destination for offshore services, while posting first-quarter GDP growth of 7.8%, Asia’s best performance.
Directly following last month’s Bitcoin 2013 conference event in San Jose, CA that brought decent revenue into the state, California’s Department of Financial Institutions decided to issue a cease and desist warning to conference organizer Bitcoin Foundation for allegedly engaging in the business of money transmission without a license or proper authorization.
If found to be in violation of California Financial Code, penalties can be severe ranging from $1,000 to $2,500 per violation per day plus criminal prosecution which could result in fines and/or imprisonment. Additionally, it is a felony violation of federal law to engage in the business of money transmission without the appropriate state license or failure to register with the U.S. Treasury Department. Convictions under the federal statute are punishable by up to 5 years in prison and a $250,000 fine.
US Federal Reserve Chairman Ben Bernanke is playing a potentially dangerous game of chicken with global financial markets sent reeling by his threat to scale back the central bank’s huge stimulus program.
Austerity has failed. It turned a nascent recovery into stagnation. That imposes huge and unnecessary costs, not just in the short run, but also in the long term: the costs of investments unmade, of businesses not started, of skills atrophied, and of hopes destroyed.
At a press conference to discuss the accusations, an N.S.A. spokesman surprised observers by announcing the spying charges against Mr. Snowden with a totally straight face.
“These charges send a clear message,” the spokesman said. “In the United States, you can’t spy on people.”
Of all the miseries placed on human beings in their everyday lives, the lack of food may be the most inexcusable. Even in a world controlled by unbending attitudes of self-reliance and individual responsibility, the reality of children and seniors and disabled citizens going hungry is a stain on humanity, a shameful testament to the capitalist goal of profit without conscience.
The strike, which will be followed by regional strikes elsewhere in the UK next term leading to a one-day national stoppage before Christmas if the dispute is not solved, is over government curbs on teachers’ pay, cuts to their pension and changes to their working conditions.
In preparation for FISL (where I hope to be speaking next week), I have been continuing to try to understand the protests in Brazil, which are now regularly bringing crowds the size of a European town onto the streets. They aren’t really about “bus fares” — and as far as I have been told are free of violence by the protesters apart from a statistically insignificant number of them. With so many people on the streets, there are bound to be a few disorderly encounters; to focus on them is try to distract from the real issues.
The real issues every Brazilian friend I have spoken to cares about relate to a sequence of governments failing to address structural issues and widespread corruption, and even perhaps joining in. The protesters are people just like you and me, who just won’t take it any more and are peacefully but loudly saying so.
The intelligence whistleblower Edward Snowden will on Monday attempt to complete an audacious escape to the relative safety of South America after his departure from Hong Kong escalated already fraught diplomatic relations between the United States and China.
The plane carrying whistleblower Edward Snowden has landed at Moscow’s Sheremetyevo airport. The former CIA contractor, who left Hong Kong in a bid to elude US extradition on espionage charges, is on his way to a ‘third country’ via Russia.
As the news broke that NSA whistleblower, Edward Snowden, had fled Hong Kong for Russia today, I was invited on RT to do an interview. At that point few people had any idea of his plans. However, it appears that the USA had charged Snowden under the Espionage Act 1917 (no surprises) and then asked Hong Kong to arrest and hold him, pending extradition. Equally unsurprisingly, Hong Kong found mistakes in the paperwork and used the opportunity to complain about US spying activity in its territory.
Mr Edward Snowden, the American whistleblower who exposed evidence of a global surveillance regime conducted by US and UK intelligence agencies, has left Hong Kong legally. He is bound for the Republic of Ecuador via a safe route for the purposes of asylum, and is being escorted by diplomats and legal advisors from WikiLeaks.
[...]
“The WikiLeaks legal team and I are interested in preserving Mr Snowden’s rights and protecting him as a person. What is being done to Mr Snowden and to Mr Julian Assange – for making or facilitating disclosures in the public interest – is an assault against the people”.
The NSA whistleblower left Hong Kong on an Aeroflot flight to Moscow, two days after the US charged him with espionage, before applying for asylum in Ecuador
“On the Internet, nobody knows you’re a dog.” That phrase is ingrained in web culture, stemming from a Peter Steiner comic that was published in a 1993 issue of The New Yorker.
Facebook said Friday it fixed a bug that exposed contact info for over six million accounts. The admission revealed its ‘shadow profile’ data collection activities, and users are furious.
[...]
…users behind closed doors, without their consent.
[...]
One man commented this afternoon, “I just downloaded the “extended backup” and I’m still viewing emails and phone numbers that are NOT PUBLIC!!!!”
[...]
The yearlong gap of exposure as described by Reuters creates a scenario of horrifying possibilities for any woman who has begin to experience harassment, abuse or stalking by an ex within the past year. Or, anyone being maliciously stalked and harassed by a tech-savvy aggressor (or a stalker’s Facebook sock puppet) they may have accidentally friended over the past year.
A program being implemented by the Obama administration titled “Insider Threat” requires millions of federal employees to keep a close watch on each other—a “sweeping” effort to crackdown on whistleblowers and leakers across the U.S. government, McClatchy reports Friday after obtaining a series of government documents.
If the law says you can do whatever you like, saying that everything you do is “in accordance with the law” doesn’t mean anything. If “supervision” over state spying is done in secret, by “trusted” cronies appointed by the executive itself, it offers no safeguards either. We need strict legal rules, transparency at least about the law and the basics of practice, and spies who are accountable to parliament and to the general public.
In early 2003, as the U.S. and British governments were seeking international acquiescence to their aggressive war on Iraq, an unexpected cog throw into the propaganda machine was the disclosure that the National Security Agency was spying on UN Security Council members in search of blackmail material.
The revelation received little attention in the mainstream U.S. news media, which was almost fully onboard the pro-war bandwagon, but the disclosure received wide international attention and stopped the blackmail scheme. U.S. President George W. Bush and British Prime Minister Tony Blair were forced to abandon a UN resolution and invade Iraq with a ragtag “coalition of the willing.”
Guardian journalist Glenn Greenwald took Meet The Press host David Gregory head on in an interview Sunday morning, after Gregory asked if Greenwald would be criminally culpable for “aiding and abetting” NSA leaker Edward Snowden.
“I think it’s pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies,” Greenwald said. “The assumptions in your question, David, is completely without evidence, the idea I’ve aided and abetted him in any way. The scandal that arose in Washington before our stories began was about the fact that the Obama administration is trying to criminalize investigative journalism by going through the e-mails and records of AP reporters, accusing a Fox News journalist of the theory you just embraced, being co-conspirator in felonies for working with sources.”
“If you want to embrace that theory,” Greenwald continued, “it means that every investigative journalist in the United States who works with their sources, who receives classified information, is a criminal. It’s precisely those theories and precisely that climate that has become so menacing in the United States. It’s why the New Yorker’s Jane Mayer said investigative reporting has come to a standstill, as a result of the questions you just mentioned.”
In nominating Jim Comey to be the next FBI director on Friday, President Barack Obama said the former Justice Department official will help strike a balance between the need for information on terrorist plots and respecting Americans’ privacy.
The WikiLeaks founder, Julian Assange, has called on the world to “step forward and stand with” Edward Snowden, after the NSA whistleblower was charged with espionage by US federal prosecutors.
According to a statement on the WikiLeaks website, Assange said: “A few weeks ago, Edward Snowden blew the whistle on an ongoing program – involving the Obama administration, the intelligence community and the internet services giants – to spy on everyone in the world. As if by clockwork, he has been charged with espionage by the Obama administration.”
One of the key refrains that has come out from those who are unhappy about the revelation of details around the NSA’s surveillance efforts is that Edward Snowden’s leaks are somehow harmful to America. During hearings about all of this, NSA boss Keith Alexander claimed that “Americans will die” because of these sorts of leaks. But… between those same hearings and other revelations from the administration and Congress, we’re actually learning much more about the various programs directly from the government, as information is now being “declassified.” And, apparently, President Obama is asking the NSA and the Justice Department to look into declassifying even more. So while the initial shove to declassify information may have come via Snowden, the stuff that we’re really learning about is coming through revelations following Snowden’s leaks — revelations that never would have happened without his leaks.
Ex-CIA contractor, Edward Snowden, has not been seen aboard the plane to Havana on which he would reportedly be traveling, reports RT’s correspondent on the flight. The plane has already departed from Moscow’s Sheremetyevo airport.
According to Berg, that site does not require SSL (secure sockets layer), which means that anyone who visited in the last hour or so sent it their long-lived session cookies in plain text … a potential security risk.
It is not at all clear to me why everyone is so excited about PRISM and the apparently new ability to monitor private communications that the Guardian got all excited about last week. It took me a day or two to remember the name, but I have this piece (below) from 2003 which documents ECHELON which has been around since 1948. PRISM reads like an extension/ subset/ addition to ECHELON.
The payload data was collected by Google’s Street View cars when driving around the countryside; the software that was mapping out the location of Wi-Fi access points was also recording any data packets it could see which could include fragments of Wi-Fi users’ email, passwords or other personal data. The decision to enforce and prosecute over the payload data came as a result of investigations started when ICO reopened the case in April 2012 after concerns about the engineer’s actions working with the data. This then immediately raised questions about how the search company has handled the data.
In the past couple of weeks, the NSA has, unsurprisingly, responded with a series of secret briefings to Congress that have left the public in the dark and vulnerable to misstatements and word games. Congress has many options at its disposal, but for true accountability any response must start with a special investigative committee. A coalition of over 100 civil liberties groups agrees. Such a committee is the right way the American people can make informed decisions about the level of transparency and the reform needed.
Over the past few years, we’ve found that Rep. Mike Rogers, the head of the House Intelligence Committee, has an incredible knack for spewing pure bullshit in defense of whatever he’s supporting, rarely even bothering to make sure his statements are internally consistent. Still, his statements on Meet the Press this weekend take that nonsense to a new high.
So the revelations from Edward Snowden keep on coming, exposing ever-more profound attacks on privacy and democracy in the UK and elsewhere. News that GCHQ is essentially downloading, storing and searching through the entire flow of Internet traffic that comes into and goes out of the UK without any specific warrant to do so is one side of that. That seems to be taking place through an extremely generous interpretation of the out-of-date RIPA law that is supposed to bring some level of accountability to just this sort of thing. The fact that it doesn’t shows that we must reform RIPA and make it fit for the Internet age.
Just as important was what the Japanese government and people did not do. They didn’t panic. They didn’t make sweeping changes to their way of life. They didn’t implement a vast system of domestic surveillance. They didn’t suspend basic civil rights. They didn’t begin to capture, torture, and kill without due process. They didn’t, in other words, allow themselves to be terrorized. Instead, they addressed the threat. They investigated and arrested the cult’s leadership. They tried them in civilian courts and earned convictions through due process. They buried their dead. They mourned. And they moved on. In every sense, it was a rational, adult, mature response to a terrible terrorist act, one that remained largely in keeping with liberal democratic ideals.
With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.
However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”
It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”
Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.
President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.
Many Americans have known for a long time that the IRS is a rogue agency that will readily break the law to accomplish its “mission.”
A friend of ours tells the story: He got a call from the local police department in the pre-dawn hours of a dark night. The dispatcher told him he needed to go immediately to his business, a heating and air conditioning business. When he arrived he learned that his business had been burglarized. The investigating police wanted him to determine what had been taken. After a couple of hours of searching he could find nothing noticeable missing. Even some cash had been left behind. “Well, you need to get ready for an IRS audit,” the policeman said. Sure enough, a few days later when he arrived at work he found a chain and padlock on his door and a notice from the IRS to contact them.
In case you’re interested, the audit revealed that he was due a refund. Nobody paid any attention, even the Congressman whom the business man contacted.The result of what happens when government operates in secret—whether it be the Beaufort County Sheriff’s Department and the Washington Police Department or the FBI/CIA, can be seen in the FISA Court. That’s the apparatus set up by the Patriot Act to review government eavesdropping. We now learn that the “Foreign Intelligence Surveillance Act” Court approved 99.97% of the government’s request to snoop, and that many of them were aimed at Americans, within America, not foreigners outside the USA.
The Met is out of control. The revelation that it sought to smear the Lawrence family in the hunt for Stephen Lawrence’s killers – perhaps to stifle racist aspersions on its detectives – beggars belief. Less surprising is that the operation was unknown to the then police chief, Sir Paul Condon, to the home secretary and to the Macpherson inquiry. It is merely further evidence of the Met’s gift for malpractice and skulduggery.
The myriad protests from Istanbul to São Paulo have one thing in common – growing dissent among the young, educated and better-off protesting against the very system that once enriched them. And therein lies the danger for governments
Kim Dotcom wasn’t making it up. European Web-hosting company LeaseWeb did indeed delete massive amounts of data from the former MegaUpload servers. Now the two sides are arguing about why.
TODAY we officially begin a series of interviews with Dr. Richard Stallman, as promised last week. Stallman was proven to be right on the issues of privacy and freedom as more information was being shown for everyone to see how surveillance is used to control users’ behaviour and distort/impede communications in some cases. As more evidence came to light, showing in concrete form what a lot of people already knew but could not always prove, there was a lot to be discussed not hypothetically but realistically.
This is the first part of many and the transcript follows (some parts were too incomprehensible due to low recording quality, so we duly apologise for inaccuracies).
Dr. Roy S. Schestowitz: As I said before, I think the plan was mostly to focus on things that we hadn’t touched before and primarily things to do with privacy. I think we were — and many people were — advocating for freedom in technology were proven to be correct in the sense that on the issue of privacy and freedom everything seems to be very symbiotic and I think in recent weeks we found that more and more people have woken up to the fact that they need to assure they can control their software.
Dr. Richard M. Stallman: It’s not just about what happens in your computer. With Free software you control what happens in your computer, but of course there are other systems of snooping. The NSA is setting up snooping that we have been reading about recently. They don’t work through software in your computer. So, what this shows is, a) they have {users must have} control over the software in your computer; b) we need to work politically to make sure that the software that’s not in our computer — the systems that are not ours — are nonetheless not being used to snoop on us.
RSS: I think information is increasingly being used to change behaviour in people and also to distort the ways of communication between entities and I think that routers, for example, play a role in the way in which we interact with computers, so I wonder what your take is on the [snooping] in routers, many of them [are] Cisco ones.
“Of course encryption in itself doesn’t disguise who we are talking to and it’s been played out that if the government knows who knows who, then it is a tremendous start on breaking any dissident movement.”RMS: Ed Snowden, I think, said that the NSA takes control of routers in order to monitor Internet traffic in other countries.
RSS: It is actually proven to be the case and any interested person who researched this subject before would know that Cisco was working with the Chinese government to enable things like sending E-mail port back to communication and such things, so we do know that there is a degree of collusion between them. I think we’ll touch on this later when we’re just thinking the possibility of back doors. But I think it’s more evident now that it comes to light, showing in concrete terms what we already know was probably happening all these years.
RMS: There are many routers you can get that you can then install free software into. So if we are talking about your router, then yeah, you should put Free software into it. But when you talk to other [incomprehensible] it’s critical to ask first if they are not yours. And some of them will belong to companies that might very well be collaborating with surveillance. And Free software is not going to fix that problem, because if that company which [incomprehensible] for its switch/routers was to collaborate with the NSA, it is going to collaborate with the NSA or the Chinese government or whatever. So, Free software means you can control over the software or what your computer is doing or your computers are doing, but it doesn’t necessarily mean that the other organisations you deal with are going to respect your privacy.
RSS: Unless of course we use encryption, for example.
RMS: Yes. Of course encryption in itself doesn’t disguise who we are talking to and it’s been played out that if the government knows who knows who, then it is a tremendous start on breaking any dissident movement.
The Linux operating system has been around since the beginning of the first computers and the first operating systems. Since its first formation in the form of a small operating system running on the command line interface it has been constantly evolving into a much more powerful and robust operating system capable of sustaining heavy workload and performing multiple tasks at once.
Uruguay is a small country, only 3 million people. That explains the fluctuations on the graph but the trend and substance is clear. According to Statcounter Uruguayans are using GNU/Linux regularly and in great numbers. That almost certainly means government, business and consumers have ready access.
One of the elements that made the original RoboCop (1987) so good was seeing Alex Murphy deal out some major butt-kicking in spite of the losing battle he was facing against the city, politicians and his makers. And Dredd (2012) serves this very experience ala carte. I don’t think the reboot of Robocop can come close to the sheer audacity of Dredd. Dredd is a straightforward no-nonsense cop-thriller set in the future. Judge Dredd is presented as he should be – a dedicated, incorruptible cop with a powerful firearm.
How is networking like farming? JR Rivers, the co-founder and CEO of Cumulus Networks, which launched earlier today, tried to use our evolution from a hunter-gatherer society to today’s food acquisition environment to explain how technological advances that speed up distribution and make distribution or product manufacturing cheaper change societies.
While the Raspberry Pi has grabbed many headlines as a tiny, ultra-inexpensive, pocketable computer that runs various open source operating systems, it’s actually only one of many tiny LInux computers being touted as part of a new “Linux punk ethic.” As we’ve noted, there are various pocket-size Android devices selling online for under $100 (see the photo).
Linux developers were once just that, developers. But their role is changing says the Linux Foundation, which is expanding its training options to help them.
The foundation, an industry supported non-profit, has added two courses to its program, OpenStack Cloud Architecture and Deployment and Linux Enterprise Automation.
With NVIDIA entering the GPU IP licensing business, the need to support EGL by their binary display driver — and with that the Ubuntu Mir display server and Wayland — has become more pressing.
While there hasn’t been any official communication out of NVIDIA yet, it’s likely that their binary display driver will soon be bearing EGL support to complement their GLX windowing system support. The EGL interface is for sitting between OpenGL and the windowing system. EGL is used by Google’s Android operating system for mobile devices. Beyond that, both the Mir Display Server and Wayland/Weston are using EGL rather than the GLX windowing system API.
The many Intel Haswell Linux benchmarks delivered on Phoronix this month have been from updated Ubuntu 13.04 configurations. However, if you’re curious about what the performance is like when upgrading to an Ubuntu 13.10 “Saucy Salamander” daily development snapshot, here are some benchmarks.
Opera 15 is the first version of the Opera web browser that is based on Blink and not the engine used in previous versions of the browser. That is a big change which has consequences for that first version. First, it is only available for Windows and Mac systems and not Linux.
Opera Software promised to deliver a Linux version of the new Opera at a later point in time, but not initially. The new browser is also bare bones in comparison to previous versions and while that will remain so for a while, it is again something that Opera Software promises to change in the future.
The Steam for Linux client has been out for some time now as a stable version, but users have reported not being able to properly use the web interface of the application.
Or so they say. We developers are used to high-resolution screens but many users use netbooks with 1024×600 screens (the horror!). Unfortunately, KMail configuration dialog did not fit in such a small rectangle, so I massaged the various configuration pages to reduce the minimum necessary size for the dialog. The minimum size for the dialog is now 780×567 pixels on my machine (you may get different results depending on widget style and fonts).
We are less than 100 days away from the official GS 3.10 release and another little step towards another amazing major release has been made yesterday with the release of 3.9.3. This new version brings some tweaks and fixes, while also porting to new technologies like the bluez 5.
Everyone’s favourite UX polish extravaganza is back for another round. For the next months we will be targeting a host of bugs that will add polish and finesse to the GNOME 3 user experience.
This is the third time that I’ve run Every Detail Matters. Over the last two rounds, the initiative has gone from strength to strength. A total of 82 bugs have been fixed so far, and the GNOME 3 user experience has been massively improved as a result of everyone’s contributions.
Lets start with the honest truth right out of the blocks, there isn’t a best OS, there isn’t a worst OS, there is only preference and the right tool for the job you want it to do.
[...]
We are bound by our choices, find it hard to change them unless we have a reason to, but can do if the pain level is righ. There is no such thing as the perfect OS, only the right tool for us and the job we want them to perform. We find excuses, reasons to justify out choices however most to the time they are just that, sometimes they are based on experience, most of the time on FUD. Forcing an OS on someone is never going to work, and suggesting one might seem like a great idea, but usually ends in disaster.
I waited eagerly for the beta release of Pisi Linux. As soon as it was out, I downloaded it and installed it into a partition my ZaReason’s Alto 4330 had.
The installation took about 25 minutes. Once it was over, I noticed a few bugs. For example, Pisi’s Grub 2 installed into the MBR, not into the partition I chose. Well, that’s not a show stopper to me. Besides, Pisi’s Grub is very well designed. Anyway, I booted my brand new Linux kitten to see what it looked like and what it was capable of.
Those who used old-school Pardus will feel familiar with Pisi. Kaptan greets you and lets you choose your first-time settings. Yes, it was great to see Kaptan again!
AntiX, a fast, lightweight and easy-to-install Linux Live CD distribution based on Debian Testing and MEPIS, for Intel-AMD x86 compatible systems, is now at version 13.1.
ROSA company is glad to announce a further expansion of ROSA Desktop Fresh R1 distribution series — an update of its distribution based on lightweight desktop environment, LXDE.
Slackel is a live system based on Slackware and usually ships in Openbox and KDE editions. Today the Slackel crew announced their latest, Slackel Live KDE-4.10.4. “A collection of two KDE live iso images are immediately available that can be burned to a DVD or used with a USB drive.”
Mandriva is one of the major stakeholders of the Aeolus Project, a French research initiative on cloud innovation. Involving several leading universities as well as Mandriva, the project aims at solving complex technological issues surrounding cloud deployment and management. As such its concrete objectives is to develop not just advanced theories but actual technologies .
The first alpha release of OpenMandriva Linux is now available. This new OpenMandriva distribution is derived from the Russian-based ROSA Linux distribution, which in turn was forked from mainline Mandriva last year.
Red Hat (RHT), the largest provider of open-source software, noted that the IT spending environment isn’t as strong as everyone would like it to be. However, it’s not getting worse, either.
In an interview with TheStreet, CEO Jim Whitehurst noted that it’s a “tough IT environment” right now, but nothing has fundamentally changed for Red Hat. “It’s a little bit of a slower IT environment right now, and projects are a little slower. Nothing has fundamentally changed about the business, though.”
Red Hat OpenStack will generate zero revenues, billings and bookings this year. Does that make the open source cloud platform a failure? Absolutely not. Here’s why Red Hat (RHT) partners need to pay attention.
So I’ve been working with Fedora for over a week now, and I have to say that it’s been fun. I haven’t hit any major issues that are deal breakers for me. I’ve fully personalised Fedora’s Gnome Shell desktop environment, and I’m really happy. However, I think it’s time to go back to Ubuntu,and here’s why…
Ubuntu Community Council member Elizabeth Krumbach and Community Manager Jono Bacon have detailed Canonical’s plans to distribute community-oriented donations from the donations page on the Ubuntu web site. After Canonical implemented a page asking for donations from users who download the Linux distribution, the company faced criticism for not making it sufficiently clear exactly how the money collected under the “community participation”, “better coordination with Debian and upstreams” and “better support for flavours” sliders would be used. Bacon promised to deliver a plan to make the process more transparent and accountability more clear and this plan has now been delivered and has been approved by the Community Council.
With the Unity design aesthetic allied to a speedy and robust engine, Ubuntu 13.04 Raring Ringtail may just be the one Linux OS to rule them all. Read our Ubuntu 13.04 Raring Ringtail review to find out why.
Taking a break from blogging about UEFI and Secure Boot, Linux kernel developer Matthew Garrett is now writing about how Canonical’s choice of license for their Mir Display Server is a bit scary. It’s not the GPLv3 license alone that’s raising eyebrows, but the GPLv3 combined with the Ubuntu Contributor’s License Agreement that is unfortunate in the mobile space.
Basically, Matthew explains how Canonical is trying to push Ubuntu (in the form of Ubuntu Phone/Touch) into markets generally hostile towards the GPLv3 licensem since the license requires users be able to replace the GPLv3 code. Android and other open-source mobile platforms tend to be under a more liberal license that keeps open-source enthusiasts happy along with mobile phone vendors.
DAVE announced an SODIMM-style computer-on-module based on a Texas Instruments Sitara AM335x ARM Cortex-A8 system-on-chip, complete with dual CAN interfaces, Linux support, and two evaluation baseboard options. The Diva computer module is also available from U.S.-based Smart Embedded Systems, with turnkey support including Linux drivers and firmware for the processor’s programmable real-time unit (PRU).
A Chinese startup called “Geak” (seriousy!) has developed an Android 4.1 smartwatch with built in WiFi, Bluetooth 4.0, NFC, and GPS wireless communications. The China-targeted Geak Watch runs on a 1GHz MIPS architecture SoC equipped with 512MB RAM and 4GB flash, and features a 1.55-inch 240 x 240-pixel touchscreen and IPX3 water resistance.
With news this week that GitHub is banning storage of any file over 100Mb and discouraging files larger than 50Mb, their retreat from offering download services is complete. It’s not a surprising trend; dealing with downloads is unrewarding and costly. Not only is there a big risk of bad actors using download services to conceal malware downloads for their badware activities, but additionally anyone offering downloads is duty-bound to police them at the behest of the music and movie industries or be treated as a target of their paranoid attacks. Policing for both of these — for malware and for DMCA violations — is a costly exercise.
I’ve been looking into how easy it is to confirm that a binary package corresponds to a source package. It turns out that it is not easy at all. So I’ve written down my findings in this blog entry.
I think that the topic of reproducible builds is one that is of fundamental importance to the free software and larger community; the trustworthiness of binaries based on source code is a topic quite neglected. We know about tivoization and the reality that code can be open yet unchangeable. What is not appreciated in sufficient measure is that parties can, quite unchecked, distribute binaries that do not correspond to the alleged source code.
When Oracle announced it was discontinuing the development of OpenSolaris, there was shock among the free Unix community. OpenSolaris was popular and had a very loyal user-base and good support from developers, internal and community. A fork of OpenSolaris was quickly announced. A fork of the kernel would become what is known as Illumos. And the operating system would become OpenIndiana, which would use the Illumos kernel.
One enterprising netizen has compiled a list of services, from social networks to email clients, and even web browsers, that offer better protection from surveillance. They are listed on a web page called prism-break.org.
When asked about steps that a digital native can take to protect his privacy and online data, Sunil Abraham, executive director of Bangalore-based non-profit Center for Internet and Society said, “Stop using proprietary software, shift to free/open source software for your operating system and applications on your computer and phone. Android is not sufficiently free; shift to CyanogenMod. Encrypt all sensitive Internet traffic and email using software like TOR and GNU Privacy Guard. Use community based infrastructure such as Open Street Maps and Wikipedia. Opt for alternatives to mainstream services. For example, replace Google Search with DuckDuckGo.”
Most open source developers like to think about the quality of the software they build, but the quality of the documentation is often forgotten. Nobody talks about how great a project’s docs are, and yet documentation has a direct impact on your project’s success. Without good documentation, people either do not use your project, or they do not enjoy using it. Happy users are the ones who spread the news about your project – which they do only after they understand how it works, which they learn from the software’s documentation.
The maker of the popular Firefox browser is moving ahead with plans to block the most common forms of Internet tracking, allowing hundreds of millions of users to eventually limit who watches their movements across the Web, company officials said Wednesday.
Firefox’s developers made the decision despite intense resistance from advertising groups, which have argued that tracking is essential to delivering well-targeted, lucrative ads that pay for many popular Internet services.
If you’re like nearly everybody else, you get annoyed by how advertising cookies in your browser seem to know what your interests are and serve up creepy ads that hit a little too close to home. With that problem in mind, Mozilla has been steadily working toward standardizing Do Not Track features in the Firefix browser. The idea is not welcome to everyone, though. The Internet Advertising Bureau (IAB) has accused Mozilla of “undermining American small business” with the move.
Netflix runs a lot of Hadoop jobs on the Amazon Web Services cloud computing platform, and on Friday the video-streaming leader open sourced its software to make running those jobs as easy as possible. Called Genie, it’s a RESTful API that makes it easy for developers to launch new MapReduce, Hive and Pig jobs and to monitor longer-running jobs on transient cloud resources.
In an effort to commoditize the world of open source cloud computing, Red Hat is throwing their weight behind OpenStack in the same way they threw their weight behind Linux over a dozen years ago.
Who says you have to be a vendor or a channel partner to get involved in industry associations driving the adoption of cloud computing? If there’s an unwritten rule somewhere, nobody bothered to tell the City of Chicago, which announced this week it had joined the Open Cloud Consortium (OCC).
The OCC is a not-for-profit organization that manages and operates cloud computing infrastructure to support Big Data for scientific, medical, healthcare and environmental research. That’s quite the huge mandate, and the organization’s membership is made up of a variety of corporations (most in the technology sector in some way), universities, U.S. national laboratories and federal agencies, as well as international partners.
In a major missive from Dell Computer recently, the company announced that its public cloud ecosystem and strategy will be centered on partners Joyent, ScaleMatrix and ZeroLag, and will emphasize recent acquisition Enstratius. That represented a very major reversal of its plans to deliver public cloud services based on the open source OpenStack cloud platform. Right on the heels of that news, IBM–which has been firmly in the OpenStack camp–announced that it is spending billions to buy SoftLayer for its cloud computing infrastructure tools and services.These were high level departures from the OpenStack camp, although IBM is still pursuing OpenStack cloud plans by pass-through, since SoftLayer delivers OpenStack services.
Comic Relief has confirmed its use of 10gen’s open source non-relational NoSQL database, MongoDB, to create a computing for this year’s event which raised £75 million.
The charity enlisted cloud services firm Armakuni to build the platform so that it could handle 10,000 concurrent call centre operators and a peak of 500 donations per second.
The Document Foundation (TDF), the charitable entity behind LibreOffice, the leading free office suite, today announces the upcoming availability of @libreoffice.org addresses for its members, starting July 1st.
A report on the EC’s open source portal, Joinup, states that the decision to move to LibreOffice was taken by a roundtable representing the province’s IT experts, municipalities, health care and others. The reason given for the switch is to avoid “vendor lock-in, increase flexibility, save costs and support the region’s small and medium sized ICT service providers.”
In recent years, the open source WordPress content management (nee Blog) platform has emerged to become the dominant player in web CMS space. That’s why when there is a security update you should RUN DON’T WALK to patch.
A new survey has reported that more than half of UK private and public sector organisations will spend at least 20% of their IT budget on open source applications and software within five years.
FreeBSD celebrates its 20th birthday this week. On 19 June 1993, David Greenman, Jordan Hubbard and Rod Grimes announced the creation of their new fork of the BSD 4.3 operating system, and its new name: FreeBSD
Just because your activities are being monitored by the powers that be does not mean that you should throw up your arms in the air and give up. Yes, complete privacy is almost impossible to achieve in the age of bits and bytes, but there are things you can do to minimize how much of your privacy you give up.
Mostly, it comes down to the tools you employ to navigate this interconnected universe of ours. The most popular tools are owned by major technology companies, the same outfits that give government agencies free, warrantless access to your data.
Here’s a nice example of the DIY spirit at work. A former Portland, OR, restaurant owner was looking for a way to better monitor food storage temperatures (which had to be regularly checked and written in a notebook). There didn’t seem to be a good automated system available, so he built his own, using open-source hardware to develop a unit that can monitor temperature, humidity and barometric pressure of a given location, then transmit the data via the Internet and a Wi-Fi network.
Open source robots are back in the news. In late May, we reported on the Arduino Robot (shown) — which puts much of the intelligence in the open hardware Arduino kit on wheels and includes an interface for creating custom robots. The Arduino Robot’s Motor Board controls motors, and the Control Board reads sensors and helps to operate. Each of the boards is a full Arduino board using the Arduino IDE. Now, there are robots arriving based on the open platform that you can control with swipes from your smartphone.
The greatest need for improving the manageability of Linux systems is to provide a standard programming interface – an API – for system management functions.
The API should be a low-level interface that provides the needed control over managed systems. It should also support a higher level abstraction, making it easy for system administrators to use it for routine tasks.
The Xiph.Org Foundation has taken the wraps off Daala, a “next-next-generation” video codec that has been under development for some time; this was until recently overshadowed by development work on the Opus audio codec at Xiph. However, the developers at the foundation think that the right time has come to open up development of the codec to a wider audience, even though they still classify the software as “pre-pre-alpha”. According to Xiph, a prototype of the codec successfully encoded and decoded a video stream over the internet at the end of May.
Defense Minister Juan Carlos Pinzón will travel Sunday to Belgium where he is scheduled to sign Tuesday its first cooperation agreement with the North Atlantic Treaty Organization.
According to El Tiempo newspaper, the two-page document will be signed by Pinzon and NATO Secretary General Anders Fogh Rasmussen, and will be broadened with a second chapter in the next two months.
Microsoft’s Windows RT operating system may fall to the same fate as Hewlett-Packard’s (HP) webOS as most brand vendors have already stopped developing related products, leaving Microsoft’s second-generation Surface RT, the only Windows RT-based device in the next-generation tablet competition, according to sources from the upstream supply chain.
When Star Trek debuted in the mid-60s, everybody geeked out about the food synthesizers. Even my mom, a reluctant but compulsory Trek viewer, recognized the utility of this amazing gadget, particularly with two ravenous boys around the house. My brother and I knew, of course, that the real magic food box was the refrigerator.
A team of scientists from the University of Maryland School of Medicine has found the strongest evidence yet that bacteria occasionally transfer their genes into human genomes, finding bacterial DNA sequences in about a third of healthy human genomes and in a far greater percentage of cancer cells. The results, published today (20 June) in PLOS Computational Biology, suggest that gene transfer from bacteria to humans is not only possible, but also somehow linked to over-proliferation: either cancer cells are prone to these intrusions or the incoming bacterial genes help to kick-start the transformation from healthy cells into cancerous ones.
Even by the standards of an industry that claims to be able to end hunger, prevent environmental catastrophe and bring prosperity to the developing world, it must have felt like a breathtakingly audacious move.
Last summer, the world’s biggest biotech corporations decided the time was right to convince the Government to allow so-called Frankenstein food to be grown in its fields.
The number of new mothers attempting to breastfeed has fallen in England for the first time in almost a decade.
New figures suggest that 5,700 fewer women initiated breastfeeding with their child in 2012-13 than the year before. It is the first recorded fall since the Department of Health began collecting and releasing the statistics in 2004.
The Agriculture Department has approved a label for meat and liquid egg products that includes a claim about the absence of genetically engineered products.
It is the first time that the department, which regulates meat and poultry processing, has approved a non-G.M.O. label claim, which attests that meat certified by the Non-GMO Project came from animals that never ate feed containing genetically engineered ingredients like corn, soy and alfalfa.
After the government pushed through its widely opposed privatisation regulations it is time now to focus on the big trade deals and look to the G8 meeting in June. There is a reason the public are being told nothing about them – because they won’t like what they hear.
Authorities and media outlets have predictably moved to dismiss claims that Rolling Stone journalist Michael Hastings – who complained of being under investigation by the FBI before his death in a fiery car crash on Tuesday – was murdered as a result of foul play, despite the vehicle’s engine being found 100 feet away from the scene of the blaze.
[...]
Following his role in bringing down Gen. Stanley A. McChrystal, Hastings was told by a McChrystal staffer, “We’ll hunt you down and kill you if we don’t like what you write.” The Rolling Stone journalist also “had the Central Intelligence Agency in his sights” and was set to release an article exposing the agency, according to L.A. Weekly.
Despite the fact that investigating whether or not a journalist who had made a number of enemies at the very top of the power structure could have been the target of an assassination is a perfectly legitimate question, news outlets have characterized such inquiry as being insensitive and crass.
General Wesley Clark, on the talk circuit in 2007, explained how the U.S. military planned to destroy the governments of seven countries in five years and enumerates them in this YouTube video.
Native Americans focused on defending their homelands and upholding the Rights of Nature during June, as they prepared for non-violent resistance to the threats of the tarsands pipeline, uranium mining and coal-fired power plants.
Recognition that 95 million human beings were killed in World War I and II has helped the people of the world understand that the method of war is not cost-effective. An awakened world hoped the United Nations could, as determined in the UN Charter, eventually ‘save succeeding generations from the scourge of war’.
The scourge of war in Afghanistan continues, with the United Nations reporting that more than 3,000 Afghan civilians have been killed and wounded in the first five months of this year, a fifth of whom were Afghan children. So, ordinary people should seize opportunities to tell the truth about war.
The first ever double-shell tank to have leaked at Hanford may be in far worse condition than anyone imagined. Hanford workers conducting routine maintenance on the tank, known as AY-102, Thursday were shocked to find readings of radioactivity from material outside the tank. Until now leaked nuclear sludge had only been detected in what’s known as the tank’s annulus — the hollow safety space between the tank’s two walls.
By century’s end, rising sea levels will turn the nation’s urban fantasyland into an American Atlantis. But long before the city is completely underwater, chaos will begin
It’s long been suspected that ratings agencies like Moody’s and Standard & Poor’s helped trigger the meltdown. A new trove of embarrassing documents shows how they did it
The Bank of Spain has called for the elimination of the minimum wage, more flexibility in the labour market and other attacks on the working class.
Its annual report states, “The seriousness of the labour market advises maintaining and intensifying reform momentum through the adoption of additional measures to promote job creation in the short term and facilitate wage flexibility.”
The BBC’s reporting of issues from NHS reform, welfare reform and the looming EU US trade deal can be better understood by looking at the BBC’s Business Unit. A narrow and questionable ‘business perspective’ drives more coverage than viewers may think.
According to newly revealed secret documents, the NSA retains wide discretion over targeting individuals for surveillance – including, potentially, Americans. Civil libertarians say ‘it confirms our worst fears.’
The request from the United States that Hong Kong detain Edward J. Snowden, who has been accused of stealing government secrets, before it seeks his return to America is likely to set off a tangled and protracted fight, with Mr. Snowden and his legal advisers having multiple tools to delay or thwart his being surrendered to American officials.
Some of Britain’s most respected industries routinely employ criminals to hack, blag and steal personal information on business rivals and members of the public, according to a secret report leaked to The Independent.
The Serious Organised Crime Agency (Soca) knew six years ago that law firms, telecoms giants and insurance were hiring private investigators to break the law and further their commercial interests, the report reveals, yet the agency did next to nothing to disrupt the unlawful trade.
[...]
Victims of computer hacking identified by Soca – who suffered eBlaster Trojan attacks which allowed private investigators to monitor their computer usage remotely – include the former British Army intelligence officer Ian Hurst. He was hacked by private investigators working for News of the World journalists who wanted to locate Freddie Scappaticci, a member of the IRA who worked as a double-agent codenamed “Stakeknife”.
StartPage and Ixquick, two strongly privacy oriented search engines owned by the same company, announced recently that they surpassed three million daily searches for the first time.
According to information Startpage provided to Infowars, traffic to the Search Engine has grown from 2.8 million daily searches to now approaching 4 million.
Britain’s European partners have described reports of Britain’s surveillance of international electronic communications as a catastrophe and will seek urgent clarification from London.
Sabine Leutheusser-Schnarrenberger, the German justice minister said the report in the Guardian read like the plot of a film.
“If these accusations are correct, this would be a catastrophe,” Leutheusser-Schnarrenberger said in a statement to Reuters. “The accusations against Great Britain sound like a Hollywood nightmare. The European institutions should seek straight away to clarify the situation.”
Britain’s Tempora project enables it to intercept and store immense volumes of British and international communications for 30 days.
So is it a Milly Dowler moment? Will the revelation that GCHQ taps every internet communication that enters or leaves the UK mark the moment when ordinary citizens stop and say: “Oh, now I get it.” A moment when people realise that the stuff that nerds and activists had been droning on about might actually affect them?
My hunch is that it isn’t such a moment. Most people will just shrug their shoulders and get on with life. They will accept the assurances of those in authority and move on. If they do, then they will have missed something important. It is that our democracies have indeed reached a pivotal point. Ever since it first became clear that the internet was going to become the nervous system of the planet, the 64 billion dollar question was whether it would be “captured” by giant corporations or by governments. Now we know the answer: it’s “both”.
Senior figures inside British intelligence have been alarmed by GCHQ’s secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.
According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: “We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: ‘If this was used against us, we wouldn’t stand a chance’.”
At the Netroots Nation conference this weekend, Representative Nancy Pelosi (D-CA) was questioned publicly about her stance on NSA spying. While she was quick to defend the program as markedly different from the warrantless wiretapping program established under President Bush, she also noted that more needed to be done to improve transparency around the program.
Pelosi’s comments were met with skepticism and disapproval from at least some members of the audience. Marc Perkel, a small business owner and technology activist, interrupted Pelosi when she was talking about finding a balance between security and civil liberties. According to Politico, Marc Perkel yelled, “It’s not a balance. It’s not constitutional!…No secret laws!”
Facebook has inadvertently exposed six million users’ phone numbers and e-mail addresses to unauthorized viewers over the last year, the company said late Friday.
Edward Snowden, the former CIA technician who blew the whistle on global surveillance operations, has opened a new front against the US authorities, claiming they hacked into Chinese mobile phone companies to access millions of private text messages.
His latest claims came as US officials, who have filed criminal charges against him, warned Hong Kong to comply with an extradition request or risk complicating diplomatic relations after some of the territory’s politicians called for Snowden to be protected.
The latest developments will raise fears that the US’s action may have pushed Snowden into the hands of the Chinese, triggering what could be a tense and prolonged diplomatic and legal wrangle between the world’s two leading superpowers.
The United States said on Saturday it wants Hong Kong to extradite Edward Snowden and urged it to act quickly, paving the way for what could be a lengthy legal battle to prosecute the former National Security Agency contractor on espionage charges.
Clearly a crashing ferry that injured no-one, and some high society wedding are more important than a programme which, if proven, would be equivalent to PRISM and conducted by the UK.
A D-Notice has been issued to the press (see Guido Fawkes here) to not report on the leaks in this case, but when one newspaper is still leaking, surely a point has to come that others should report and debate it too?
The Kansas City man is Khalid Ouazzani, who, as part of a plea bargain in 2010, admitted that he sent money to Al Qaeda. He was never charged with planning any attacks inside the United States, and the NYSE bombing was described as “nascent plotting,” so it’s hard to know just how serious this was. Still, at least Ouazzani actually did something. The San Diego man merely planned to send money.
When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency.
[...]
The disclosure of the spy agency’s program called Prism, which is said to collect the e-mails and other Web activity of foreigners using major Internet companies like Google, Yahoo and Facebook, has prompted the companies to deny that the agency has direct access to their computers, even as they acknowledge complying with secret N.S.A. court orders for specific data.
The Whitehouse petition to pre-emptively pardon NSA whistleblower Edward Snowden for “crimes he may have committed while blowing the whistle” has reached its goal of 100,000 signatures. This means that the U.S. Administration, by its own rules, need to take it seriously enough to craft a response to it. While that response is unlikely to be anything else than “we politely disagree and intend to impolitely hunt this man down”, it is still an important signal of dissent.
What is the real reason that certain of the authorities are so keen on universal surveillance of communications data? Is it the fight against terrorism? It doesn’t seem very likely. It’s a supremely ineffective method of dealing with terrorism at best – even the examples quoted by the security services as ‘proof’ that it works have pretty much all been swiftly debunked (see for example here). In practice, it seems, targeted, intelligence-driven, almost ‘traditional’ methods seem to do the job far better. So why do the authorities all around the globe seem to be so enthusiastic about communications surveillance? One word: control
House Minority Leader Nancy Pelosi (D-Calif.) was booed onstage Saturday when she said former government contractor Edward Snowden broke the law by leaking classified documents on National Security Agency (NSA) surveillance programs.
Speaking at the NetRoots Nation conference in San Jose, Calif., Pelosi told the audience to reject comparisons between President Barack Obama and his predecessor, President George W. Bush, on their oversight of surveillance programs. The top House Democrat said Obama is poised to reveal “in another few days, a few more proceedings” of the secret Foreign Intelligence Surveillance Court.
After a brief respite, the Guardian newspaper has resumed its publication of leaked NSA documents. The latest round provides a look at the secret rules the government follows for collecting data on U.S. persons.
More than a million protesters have taken to the streets in Brazil as demonstrations over a range of social issues grow. Demonstrating people flooded into Rio de Janeiro and more than 100 cities. Violence and clashes erupted in many places and an 18-year-youth died when a car drove through a barricade in Sao Paulo state. This is the largest protests in the country in more than two decades.
Government announcement to lower transport fares and promises of better public services failed to stem the tide of discontent in the country.
We recently had a video showing then Senator Joe Biden, from seven years ago, “debating” the current President Obama on government surveillance. I hadn’t seen this until now, but someone else has put together a much better video showing Presidential candidate Obama in 2008 vs. President Obama in 2013.