EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

04.19.14

Links 19/4/2014: Slow Easter News Day

Posted in News Roundup at 6:25 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • What open source really means

    As open source software continues to develop, many companies have begun to see the incredible value that it could bring to their organizations.

  • Open source trounces proprietary software for code defects, Coverity analysis finds
  • Open source code has fewer errors than proprietary code

    THE QUALITY of open source code has overtaken that of proprietary code for the first time, according to a survey.

  • Coverity Scan: Open Source Code Is Better Quality – The VAR Guy
  • Open source trounces proprietary software for code defects, Coverity analysis finds
  • Hey! Don’t Criticize Open Source Code Over Quality
  • ReactOS Working On A Community Windows OS

    A few months after ReactOS announced plans for a Cloud OS, the open-source project aiming for binary compatibility with Microsoft Windows platforms, is now trying to spin a community edition of its operating system.

  • Open source now tier 1 for software development

    As Day 2 begins, I wanted to take the time to remember all the way back to yesterday on theCUBE. It may have been only 24 short hours ago, but the conversations had with some of the top executives, regarded by John Furrier as luminaries in their field, really highlighted the overall maturity of Linux and the open source community as both the future of the Cloud and that community seem to have converged this year.

  • Telerik Makes Framework for JavaScript Available via Open Source

    With strong roots in the Microsoft ecosystem, Telerik has always been part of the commercial software landscape. But starting today Telerik, a provider of application development tools, is embracing open source. The company today announced Telerik Kendo UI Core, an open source implementation of the JavaScript framework and user interface tools that Telerik created for its cross-platform application development environments.

  • Infoblox Announces Support for XenServer Open-Source Virtualization By Delivering a Virtual Appliance for Network Control

    Infoblox Inc. (NYSE:BLOX), the automated network control company, today introduced Infoblox Virtual Appliance Software for XenServer, bringing the full range of Infoblox enterprise-grade network control technologies to the open-source XenServer virtualization platform.

  • Infoblox to support XenServer open source virtualization
  • Open The Box: Cloud Company Gives Back To Community With Open Source

    Box has made its identity as a cloud company with generous file management features. The company showed another generous side by contributing to the Open Source movement with its own repository.

  • Box offers new open source initiative ahead of $250m IPO
  • The Cost of Open Source: the Problem

    Although I might give Mr Seggelmann the benefit of the doubt, the NSA’s track record for veracity in the wake of Edward Snowden’s astonishing leaks is not been of the best, and I am not inclined to do the same for them. But that’s another article. Here I want to concentrate on what is perhaps the most interesting facet of this story for readers of this column: the fact that the OpenSSL code suffering from Heartbleed is open source.

  • Box announces open source initiatives to ramp up community engagement

    Enterprise cloud storage and collaboration firm Box announced this week that the company is open sourcing a range of internal initiatives to “give back” to the coding communities that have contributed to its success.

  • Intel on open source: Software, hardware conversations must merge

    Doug Fisher, VP & GM, Software Services Group, Intel, took a trip down the memory lane of being a part of the open source community since its beginning and discusses his takes on the matter with theCUBE co-hosts John Furrier and Stu Miniman, live from the 2014 Red Hat Summit.

  • SocioBoard Wants To Be Your Open Source Social Media Dashboard. Can It?

    Social media networks need to be streamlined otherwise you will get lost. A common problem that has been solved by a lot of social media dashboard startups already and SocioBoard is another startup trying to grab a pie from the existing market. The Mumbai based startup calls itself an open source product in social media space, the first of its kind globally from India. There have been Indian startups in the past that have tried to crack the space, they have had to face challenges. So it was interesting to give SocioBoard a spin.

  • Web Browsers

    • Chrome

      • New tab page for Chrome: which one do you use?

        If you go to the Chrome Web Store and search for ‘new tab page’ or ‘startpage,’ you will find at least 30 different apps and extensions claiming to be the best. However, you do not have time to sift through all of them, so you settle for the one with the best reviews. Usually, the app or extension with the best reviews is the one I would suggest. However, when it comes to your new tab page, you cannot just pick the one with the highest reviews, and if you still use Google‘s standard new tab page, it is time for you to install a different one.

  • SaaS/Big Data

    • With OpenStack Icehouse Here, Database-as-a-Service Tech Draws Attention

      One notable thing about Icehouse is that it introduces a new database-as-a-service feature, focused on building and managing relational databases, called Trove. Trove is starting to get a lot of notice, and Tesora is among the companies with a stake in Trove’s success. The company is focused on Database-as-a-Service technology.

    • Getting Hit By The Variable Performance Of The Public Cloud

      With yesterday’s official release of Ubuntu 14.04 LTS I set out to do some benchmarks of Ubuntu 12.04 LTS vs. 14.04 LTS in the public cloud. Unfortunately, that testing was drawn out due to the variable performance out of instances/droplets in the public cloud that are even of the same instance type.

    • Leveraging Cloud, Open Source To Aid Embattled IT

      IT executives laid out the challenges and opportunities created by cloud computing, open source, and other disruptive technologies during this week’s Red Hat summit in San Francisco.

  • CMS

    • We still believe in Linus’ law after Heartbleed bug, says Elie Auvray of Jahia

      Today Jahia is the #1 Open Source alternative to proprietary CMS vendors for upper tier digital projects. Over the years, we’ve focused on building a content platform that delivers true technology convergence: business user and developers work in harmony to deploy digital projects (Portals, multichannel, multi site, Multilanguage corporate sites, extranets, intranets and even full digital applications) securely and seamlessly.

  • FSF/FSFE/GNU/SFLC

    • XP shutdown: Switch to free software, say FSMI activists

      Activists of the Free Software Movement of India say you had better switch to free software that can easily substitute the proprietary, costly licences of Microsoft. “When you migrate, it involves a lot of cost on hardware upgrades and migration. Besides buying the OS copy of a higher version, users need to upgrade their hardware so that their systems can support the new OS,” Y Kiran Chandra, General Secretary of the Free Software Movement of India, told Business Line.

    • Please protest the “Windows 8 Campus Tour”

      Microsoft is running “Windows 8 Campus Tour” events at many US universities. We’re inviting free software supporters, associated with the universities in question, to mount simple nondisruptive protests at these events.

    • GNU Dap 3.10 Released

      I am happy to announce the next release of GNU Dap.

  • Public Services/Government

    • Public sector slowly embracing cloud and open source

      The Red Hat Summit, celebrating its 10th anniversary this week, is being held at the Moscone Center in San Francisco. Continuing its commitment to live coverage of tech events, SilconANGLE’s theCUBE is there, hosted by SiliconANGLE founder John Furrier.

  • Openness/Sharing

    • Meet TrustTheVote, A Project To Make Voting Open Source And Transparent
    • Blender Foundation needs more help to crowdfund the world’s first fully open source animated feature

      Julius writes, “With people like Wikipedia founder Jimmy Wales backing them up, the Blender Foundation’s first full feature length film looks like one of those things that’s just bound to happen by itself. Except right now it isn’t. Having successfully collected over $630 000 in funding from over 3500 individual pledgers (setting a new world record for animated film), Project Gooseberry needs more to become what it promises to be — a historic open content film production.”

    • OSCAL, creating an open source ecosystem in Albania

      OSCAL (Open Source Conference Albania) is the first annual conference in Albania organised to promote software freedom, open source software, free culture and open knowledge, a global movement that originally started more than 25 years ago.

    • Open Hardware

      • Open Source 3D Printers for Small Business

        You may have heard of 3D printers—they’ve been all over the news. But you may not know that they represent real opportunity for small business owners. While 3D printers have been around since the 1980s in manufacturing (they were more commonly known as industrial robots), the big change came just a few years ago, when affordable models for hobbyists hit the market. Savvy small business owners take note: we’re witnessing the start of an affordable technological revolution, and it’s just the beginning.

      • Robohand: 3D-printed open source hand replacements

        Supposing you’ve had several fingers chopped off in the recent past and you understand how to operate a scissors, Robohand may well have a solution for you. The company began with a fellow by the name of Richard van As, a fellow who lost his fingers in a carpentry accident in 2011. Searching for the past several years for a solution to his problem, as a good carpenter never gives up, he discovered a future partner with whom he’d eventually found Robohand.

      • Open-Source Designs Could Turn You Into The Next Philippe Starck [Video]

        Customizable clothing has been inching its way into society for a while now, but with the kick off of Milan Design Week, a new company has unveiled an opportunity to customize your own designer furniture.

      • Open-source project teaches design of ARM boards

        A Linux programmer from the Slovak Republic has created an open-source project to help engineers and students to learn about advanced hardware design and how to port Linux to your own ARM board.

        It is the idea of Robert Feranec at the Fedevel Academy and colleague Martin Murin who has created the iMX6 Rex module based on a Freescale i.MX6 1.2GHz quad-core processor.

      • Build this open source DIY wind turbine for $30

        Getting started with home wind energy projects can set you back a pretty penny if you buy a finished product, but if you’re a little bit handy and don’t mind scrounging for materials and getting creative in the garage or backyard, you can try your hand at building one of these DIY wind turbines for about $30 in materials. After all, it is #iheartrenewables week!

  • Programming

    • [ANNOUNCE] Git v2.0.0-rc0

      A major version bump between v1.x.x series and the upcoming v2.0.0
      means there are a handful of backward incompatible UI improvements,
      but for most people, all the tricky preparation for the transition
      would have been already done for you and the upcoming release just
      flips the default. Unless you were living in a cave and have stayed
      with an ancient version of Git (e.g. one before 1.8.2 that was
      released more than a year ago) for all these times, that is—those
      of you may want to double check the backward compatibility notes
      section at the beginning of the draft release notes.

    • Using Clang’s Static Analyzer To Find Bugs In Your Code

Leftovers

  • Science

  • Security

    • GNUtls: GnuTLS 3.3.1

      Released GnuTLS 3.3.1 which is a bug fix release on the next stable branch of GnuTLS.

    • gnutls 3.3.1

      libgnutls: Enforce more strict checks to heartbeat messages
      concerning padding and payload.

  • Defence/Police/Secrecy/Aggression

    • Ukraine: how America’s coup machine has destroyed democracy worldwide since 1953

      Soon after the 2004 US coup to depose President Jean-Bertrand Aristide of Haiti, I heard Aristide’s lawyer Ira Kurzban speaking in Miami. He began his talk with a riddle: “Why has there never been a coup in Washington D.C.?” The answer: “Because there is no US Embassy in Washington D.C.” This introduction was greeted with wild applause by a mostly Haitian-American audience who understood it only too well.

  • Environment/Energy/Wildlife

    • Caroline Lucas cleared of anti-fracking protest charges

      Caroline Lucas, the Green party MP, has been found not guilty of obstructing a public highway and a public order offence during high-profile anti-fracking protests.

    • GMO Lobby Works Tirelessly Against Mandatory Labeling

      A coalition of genetically modified organism (GMO), pesticide, grocery and agriculture corporate trade groups are fighting mandatory labeling efforts at the state and local level by pushing preemption measures in Congress and at the U.S. Food and Drug Administration (FDA).

  • Finance

    • Krugman: Worried About Oligarchy? You Ain’t Seen Nothing Yet

      In an interview with journalist Bill Moyers set to air Friday, Nobel laureate and New York Times columnist Paul Krugman celebrates both the insights and warnings of French economist Thomas Piketty whose new ground-breaking book, Capital in the Twenty-First Century, argues that modern capitalism has put the world “on the road not just to a highly unequal society, but to a society of an oligarchy—a society of inherited wealth.”

      The conclusions that Piketty puts forth in the book, Krugman tells Moyers, are revelatory because they show that even people who are now employing the rhetoric of the “1% versus the 99%” do not fully appreciate the disaster that global wealth inequality is causing.

    • South Carolina City Approves Plan To Exile Its Homeless

      Many homeless people in Columbia, South Carolina are facing an arduous choice: vacate downtown or be arrested.

    • Zero-hours contracts cause shopworkers’ misery

      Super-flexible working results in financial insecurity for supermarket workers and create potential for abuse by managers

  • Censorship

    • Florida on bloggers didn’t go far enough

      Remember when the word “blog” was first being bandied about? That was back in the early 2000′s when free web hosting from Geocities and Angelfire was still a big deal. Then the idea began taking off, especially after bloggers exposed Jeff Gannon of “Talon News” as James Guckert.

      It was a sordid affair that left CNN and other so called “mainstream” outlets in the dust as it proved how irrelevant they were becoming.

      Unfortunately, people in positions of power aren’t dealing with this new media very well. Neither are businessmen such as Christopher Comins. He attempted to sue a blogger because they posted about him shooting two dogs in a field. Comins claimed that bloggers such as Matthew Frederick VanVoorhis didn’t count as media since he was a blogger.

  • Privacy

    • Forget Dropbox: BitTorrent Sync Allows You To Skip the Cloud Entirely

      As cloud service companies battle it out for supremacy, one file sharing service sets itself apart by skipping the cloud altogether. It’s called BitTorrent Sync, and starting this week, it’s going to be available through Netgear’s native app store.

    • Making sense of Snowden

      This is a fantastic example of how to conduct an academic discussion of a really contentious subject. It brings together academics and NSA people to talk calmly about what’s happened and what it means. The participants are Yochai Benkler, Bruce Schneier, and Jonathan Zittrain of the Berkman Center and John DeLong and Anne Neuberger of the National Security Agency. The conversation is expertly moderated by the Berkman Faculty Director Terry Fisher.

  • DRM

    • ‘Kill Switch’ Included on All Cell Phones Made in U.S. by 2015

      Yeah, because law enforcement really cares quite a bit about whether or not your smartphone is stolen…unless it’s law enforcement stealing your phone from you in the first place because you’ve used the camera on it to protect yourself from police state activity by taking incriminating photos and videos of said law enforcement.

      Well, now they won’t even have to physically take your phone from you, because apparently they’ll be able to just push a button and remotely wipe it clean of all data.

      On an aside, someone tried to break into my house and it took a whole day for the cops to even bother to show up…like they really give a crap about whether or not your phone is stolen.

      As with every other trendy new technology advertised as making consumer’s lives just Jetsons-level awesome, there’s an obvious flipside that can be used (abused) for quite the opposite.

      By the way, the 2014 CTIA Board of Directors and Officers include the higher ups (Presidents, CEOs and VPs, etc.) from most of the major communications companies including Ericsson, Verizon Wireless, Blackberry, AT&T, Sprint, Qualcomm, LG Electronics, Samsung, T-Mobile, Motorola, U.S. Cellular, Nokia and Apple.

      And remember, many of these companies are the same ones the NSA taps to track all your online communications and populate their databases with your data.

  • Intellectual Monopolies

    • Knock off Nigel is back! – You won’t believe who it is.

      If I may we will start with Knock Off Nigel. For those that don’t live in the UK and maybe missed this treat, its an advert showing the evils of Copyright infringement, or it tries too. With an unsophisticated attempt to create a stigma around Copyright Infringement, because the creators seem to have been of roughly GCSE level, it created a cult following for its catchy jingle and cheesy character. Shamefully previous campaigns failed too, with the Channel 4 Series “IT Crowd” even getting in on the act of mocking the creators of these “adverts”.

    • Eli Lilly Enlists Congress In Fight Against Canada For Refusing Patent On Useless Drug

      Eli Lilly bet its entire business model on patents years back, rather than on creating useful products that people want to buy. Lately it’s been having trouble getting new patents, and is reacting extremely poorly to the fact that its last-gasp efforts to get new patents aren’t working. As we’ve noted, a few years back, Canada rejected some patent applications for some Eli Lilly drug after the Canadian patent board “determined that the drug had failed to deliver the benefits the firm promised when obtaining the patent.” In other words, after realizing that the drug is not useful, Canada rejected the patent.

    • Novel Open Source Seed Pledge aims to keep new vegetable and grain varieties free for all

      Jack Kloppenburg (left), professor in the Department of Community and Environmental Sociology, Irwin Goldman (center), chair of the Department of Horticulture, and Claire Luby (right), graduate student in the UW’s Plant Breeding and Plant Genetics program, fill envelopes with non-patented seeds in the Horticulture office in Moore Hall.

    • U.S.: open source seed program keeps varieties in public domain

      Twenty-nine broccoli, celery, kale, quinoa and other vegetable and grain varieties have been made public through the University of Wisconsin-Madison’s Open Source Seed Initiative (OSSI).

04.18.14

Links 18/4/2014: New KDE, Kubuntu, and More

Posted in News Roundup at 5:16 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Security

  • Defence/Police/Secrecy/Aggression

    • Amnesty Responds to Comments on CIA torture by Dr James Mitchell
    • John Pilger: Obama’s coup in Ukraine has ignited a civil war and lured Putin into a trap

      Since the collapse of the Soviet Union, the US has ringed Russia with military bases, nuclear warplanes and missiles as part of its Nato enlargement project. Reneging on the Reagan administration’s promise to the Soviet president Mikhail Gorbachev in 1990 that Nato would not expand “one inch to the east”, Nato has all but taken over eastern Europe. In the former Soviet caucuses, Nato’s military build-up is the most extensive since the second world war.

    • Why Allende had to die

      The truck owners’ strike was the final blow. Because of the wild geography of the country, the Chilean economy is at the mercy of its transport. To paralyse trucking is to paralyse the country. It was easy for the opposition to co-ordinate the strike, for the truckers’ guild was one of the groups most affected by the scarcity of replacement parts and, in addition, it found itself threatened by the government’s small pilot programme for providing adequate state trucking services in the extreme south of the nation. The stoppage lasted until the very end without a single moment of relief because it was financed with cash from outside. “The CIA flooded the country with dollars to support the strike by the bosses and . . . foreign capital found its way down into the formation of a black market,” Pablo Neruda wrote to a friend in Europe. One week before the coup, oil, milk and bread had run out.

    • In War, Truth Is the First Casualty

      Thank God we live in America, where this kind of thing doesn’t happen.

    • Greece’s Golden Dawn party describes Hitler as ‘great personality’
    • The criminalisation of anti-fascist protest

      Tomorrow, 14 April, the Metropolitan police and CPS will prosecute five anti-fascists arrested on 1 June 2013 while trying to stop the British National party from marching on the Cenotaph. Police decided the anti-fascist protest was a “threat to public safety” and imposed a dispersal order under section 12 of the Public Order Act 1986; 59 people were arrested. A few months later 286 protesters against the English Defence League, which had declared its intention to march on a park named after Altab Ali, who was murdered in a racist attack, were arrested in Tower Hamlets.

  • Environment/Energy/Wildlife

  • Finance

    • Seattle’s Elite Begin Their Counter Attack

      Seattle’s corporations were blindsided, it all happened so fast. Socialist candidate Kshama Sawant’s successful City Council campaign tore through Seattle politics like a tornado, leaving the 1% devastated, unable to cope with a storm they didn’t see coming. The Seattle elite had no way to counter her arguments, silence her supporters, or keep her from gathering a tidal wave of support for the $15 campaign. The establishment was paralyzed, powerless.

    • Caring too much. That’s the curse of the working classes

      “What I can’t understand is, why aren’t people rioting in the streets?” I hear this, now and then, from people of wealthy and powerful backgrounds. There is a kind of incredulity. “After all,” the subtext seems to read, “we scream bloody murder when anyone so much as threatens our tax shelters; if someone were to go after my access to food or shelter, I’d sure as hell be burning banks and storming parliament. What’s wrong with these people?”

      It’s a good question. One would think a government that has inflicted such suffering on those with the least resources to resist, without even turning the economy around, would have been at risk of political suicide. Instead, the basic logic of austerity has been accepted by almost everyone. Why? Why do politicians promising continued suffering win any working-class acquiescence, let alone support, at all?

      I think the very incredulity with which I began provides a partial answer. Working-class people may be, as we’re ceaselessly reminded, less meticulous about matters of law and propriety than their “betters”, but they’re also much less self-obsessed. They care more about their friends, families and communities. In aggregate, at least, they’re just fundamentally nicer.

    • Matt Taibbi: America Has A ‘Profound Hatred Of The Weak And The Poor’

      Living in America has taught Matt Taibbi that we as a society have “a profound hatred of the weak and the poor.”

      That’s one claim the former Rolling Stone writer makes in his new book, “The Divide: American Injustice in the Age of the Wealth Gap.” Taibbi defended this statement in a HuffPost Live interview on Tuesday.

    • Happy Tax Day, and Why the Top 1% Pay a Much Lower Tax Rate Than You

      It’s tax time again, April 15, when our minds turn toward paying the taxes we owe or possibly getting a tax refund. But what we don’t think about enough is whether our tax system is fair. The richest 1 percent of Americans are now getting the largest percent of total national income in almost a century. So you might think they’d pay a much higher tax rate than everyone else.

    • New study finds US to be ruled by oligarchic elite

      Political scientists show that average American has “near-zero” influence on policy outcomes, but their groundbreaking study is not without problems.

      It’s not every day that an academic article in the arcane world of American political science makes headlines around the world, but then again, these aren’t normal days either. On Wednesday, various mainstream media outlets — including even the conservative British daily The Telegraph — ran a series of articles with essentially the same title: “Study finds that US is an oligarchy.” Or, as the Washington Post summed up: “Rich people rule!” The paper, according to the review in the Post, “should reshape how we think about American democracy.”

    • PR/AstroTurf/Lobbying

      • The Corruption of Mainstream Media

        America’s mainstream media still pretends it is the custodian of “serious journalism,” but that claim continues to erode as the corporate press shies away from its duty to challenge propaganda emanating from various parts of the U.S. government, as Danny Schechter describes.

    • Censorship

      • Censorship on the rise: CPJ

        According to the New York-based Committee to Protect Journalists (CPJ), the latest report documents 52 instances of censorship during the first three months of 2014 compared with 45 during the same period last year. The most notable example is the abrupt blackout of a live telecast on the final moments of parliamentary deliberations and voting on a controversial bill to create the new state of Telangana. While the government claims the blackout was due to a technical glitch, the opposition Bharatiya Janata Party (BJP) insists it was a tactical move by the ruling Congress party to ram through the vote to shore up support during an election in which its prospects look grim. Other parties also slammed the blackout as “undemocratic.”

      • Oliver Stone: China’s film-makers need to confront country’s past

        Hollywood’s habit of allowing Chinese censors to cut offending material from blockbuster movies has led to accusations of artistic surrender from some critics. But at least one US film-maker has clearly not been reading the script: Oliver Stone has told an audience in Beijing that the world’s most populous nation desperately needs to confront its past on the big screen if its burgeoning film industry is to be taken seriously.

      • Weibo Warns Censorship Could Hit Future Earnings
      • Turkey to censor tweets with ‘malicious’ content

        Twitter might not be banned in Turkey anymore, but the country’s government isn’t quite done putting it through the censorship wringer yet. In fact, Turkish Communications Minister Lütfi Elvan just released a written statement that says: “We [Twitter and Turkey] have reached a consensus to ‘neutralize’ malicious content that is the object of court decisions by pixelating.” He didn’t expound on what he means by “pixelating,” but it’s typically associated with the mosaic-like classic approach to censorship. If Turkish authorities can indeed blur out tweets, then this saga might have taken an even crazier turn. Since that’s bordering on the absurd, though, it’s possible that “pixelating” might have just been the term Lütfi used for Twitter’s Country Withheld Tool, which the website uses to hide tweets and accounts from a whole nation.

    • Privacy

    • Civil Rights

      • Answers and Questions About Military, Law Enforcement and Intelligence Agency Chatbots

        Sgt. Star is the U.S. Army’s dedicated marketing and recruitment chatbot, and he isn’t going to turn whistleblower any time soon. There’s no use threatening him for answers either—he’s programmed to report that kind of hostility to the Army Criminal Investigation Division.

      • Army comes clean about its recruitment AI, accidentally discloses info about pedophile- and terrorist-catching chatbots that roam the net

        Dave from the Electronic Frontier Foundation writes, “Not too long ago, Boing Boing covered EFF’s (at the time) unsuccessful attempt to retreive records about Sgt. Star (the Army’s recruiter-bot) using the Freedom of Information Act. We’ve now received the files and compiled our research: It turns out Sgt. Star isn’t the only government chatbot — the FBI and CIA had them first.

      • US Has A ‘Secret Exception’ To Reasonable Suspicion For Putting People On The No Fly List

        Over the past few months, we covered the bizarre trial concerning Rahinah Ibrahim and her attempt to get off the no fly list. In January, there was an indication that the court had ordered her removed from the list, but without details. In February, a redacted version of the ruling revealed that the whole mess was because an FBI agent read the instructions wrong on a form and accidentally placed her on the no fly list, though we noted that some of the redactions were quite odd.

      • Outside counsel to probe FBI’s action in Guantánamo 9/11 case

        A four-day hearing meant to edge legal arguments closer to an actual 9/11 trial ended in uncertainty Thursday as the war crimes prosecutor named a special outside counsel to probe for possible FBI spying on defense lawyers.

      • Iranian woman pardons son’s killer — after slapping him at the gallows — moments before his scheduled execution

        But at the last minute, Hosseinzadeh’s mother, Samereh Alinejad, forgave him, after giving a speech to the crowd and then slapping Bilal in the face. Hosseinzadeh’s father helped take the noose off of Bilal, whose weeping mother hugged Alinejad in thanks, as seen in the photos.

      • Arundhati Roy: Another World Is Not Only Possible, She Is on Her Way

        Speech to the People’s University of the Occupy Movement

        Yesterday morning the police cleared Zuccotti Park, but today the people are back. The police should know that this protest is not a battle for territory. We’re not fighting for the right to occupy a park here or there. We are fighting for Justice. Justice, not just for the people of the United States, but for everybody. What you have achieved since September 17, when the Occupy Movement began in the United States, is to introduce a new imagination, a new political language, into the heart of Empire. You have reintroduced the right to dream into a system that tried to turn everybody into zombies mesmerized into equating mindless consumerism with happiness and fulfillment. As a writer, let me tell you, this is an immense achievement. I cannot thank you enough.

      • Bay Area transit police conduct militarized training exercises with TSA

        Among the problems that got us here is that the federal government asserts we have no Fourth Amendment rights at the border, and claims that the border extends a full 100 miles inside the country. That extremely broad definition of “the border” means two-thirds of Americans live in the Constitution Free Zone. To give you a sense of the magnitude of this assertion, consider that both the Bay Area and the entire state of Massachusetts fall within this 100-mile rights-swallowing vortex.

    • DRM

      • Kill-switch coming to smartphones

        CTIA and participating wireless companies today announced the “Smartphone Anti-Theft Voluntary Commitment,” which is the most recent effort by the industry to deter smartphone thefts in the U.S. The safety and security of wireless users remain the wireless industry’s top priority, and is why this commitment will continue to protect consumers while recognizing the companies’ need to retain flexibility so they may constantly innovate, which is key to stopping smartphone theft.

    • Intellectual Monopolies

      • Grand majority of Parliament votes in favour of a regulation on investor-state lawsuits – Greens sharply criticise the result

        Investor-state dispute settlement (ISDS) has come into the focus of critics since the start of negotiations on a free trade agreement with the US (TTIP). ISDS means that foreign investors can sue the states hosting their investments in front of international courts when they see their rights and profit expectations violated. Often it is environmental or social legislation of a state which investors claim to be in violation of their investment expectations. Currently, for example, Vattenfall is suing the German federal government for 3 billion euros because of the German nuclear phase-out. Since Lisbon, the EU has gained the competence on investment policy, and thus also on ISDS policy. This Regulation establishes rules on whether EU or Member States act as a defendant in ISDS proceedings and who pays in the case of successful investor claims.

      • Copyrights

Some Perspective on Heartbleed®

Posted in GNU/Linux, Microsoft, Security at 8:12 am by Dr. Roy Schestowitz

Looking through the tube

Summary: Our views on the whole Heartbleed® bonanza, which seems like partly a PR stunt (for multiple stakeholders)

A LOT has been said about Heartbleed® since the firm of Microsoft's 'former' security chief (who had worked with the FBI, the NSA’s more evil twin) irresponsibly 'leaked' the flaw, and did so at the very same moment that Windows XP users rushed to GNU/Linux for security reasons. I know of such users (even corporations I deal with) and I saw their reaction to this unforeseen ‘leak’. Funny timing.

In this post we outline some key facts (carefully and patiently studied over the past 10 days). As my doctoral degree is not far from cryptography and I have consulted people who do security for a living, I can assure readers that we do grasp the technical details, unlike many so-called ‘journalists’ with degrees in English or history. We are not going to delve into less plausible theories like a connection between the flaw and the NSA although there are circumstantial connections, an NSA program specifically designated to this (NSA operation ORCHESTRA), and we already know that Red Hat relays non-SELinux code directly from the NSA to Torvalds, as we covered earlier this year (meaning that only a developer in the middle knows where the code originally came from). In this particular post we are going to focus on other important points that ought to be made now that Heartbleed® is mostly out of the headlines and little new information will come out during Easter. This post is based on assessment of about 100 reports and subsequent research lasting many hours.

A little and slightly old tidbit shared with us by iophk (a network security professional) said that even the NSA and its circles are negatively affected by Heartbleed®. This article states: “”I am waiting for a patch,” said Jeff Moss, a security adviser to the U.S. Department of Homeland Security and founder of the Def Con hacking conference.”

There are reasons to believe that the NSA was not aware of this flaw or had not exploited it. For instance, the government’s demands from Lavabit may suggest that OpenSSL back doors were not known at that time (2013). Also, reading all about the personal background of the man behind the bug, it’s nearly impossible to find any connection to the NSA and its ilk. The guy is German, but another German Danish developer (Poul-Henning Kamp, a FreeBSD and Varnish developer) spoke only some months ago about a US program of introducing bugs into FOSS (see “NSA operation ORCHESTRA” above).

iophk responds to the article about firewalls woes by asking: “Why the hell is he not running one based on Linux or BSD? Something’s not right. Proprietary “solutions” have no place in infrastructure for just these kinds of reasons.”

Well, with Windows, for example, the NSA perhaps assumes a monopoly on back doors. It’s a form of total control.

The BSD community, which is also behind OpenSSH, has begun doing some commendable things [1,2] short of throwing away OpenSSL [3]. There is a new release of GnuTLS [4], for example, but we cannot be 100% certain that GnuTLS is immune to “bug doors”, as Julian Assange recently called them. “GnuTLS was immune to the OpenSSL bug,” writes iophk, “but in regards to the latter was ‘responsible disclosure’ followed? I got the feeling that it wasn’t and that the web site was set up and publicized before even the OpenSSL team was informed. Where can I find a detailed timeline of events?”

Well, a deceiving timeline was later published by the Australian press. Security gurus have widely chastised this form of ‘responsible’ disclosure of Heartbleed®; even the project site of OpenSSL hadn’t been patched before the disclosure. The same goes for the FBI, which again helps validate claims that the government was not fully aware of the issue.

OpenSSL was having limited resources and some articles covered it [5-7]. Regardless, it’s now claimed NSA knew about the bug for 2 years and we should always remember that Microsoft’s Howard Schmidt was connected to FBI before his firm published Heartbleed® for fame, fun, and profit. It’s not just Microsoft that makes his motives a tad suspicious. The whole Heartbleed® thing “has a very media friendly name and a cute logo,” as a British FOSS professional put it. It’s like a branding exercise. Also see this post titled “What Heartbleed Can Teach The OSS Community About Marketing”. “Ties in a bit with what you’ve posted,” iophk told me after I had noted the marketing angle.

As a recap, Heartbleed® was pretty much branded and released like a product by a firm headed by a Microsoft (and FBI) veteran. This firm also works with Microsoft, so the disclosure on Windows XP’s EOL date is too hard to ignore, If this was already known about by the NSA for years, then one may wonder if the disclosure came through whispers rather than research. Glyn Moody was told by Wikileaks (Twitter account seemingly run only by Julian Assange) that “Assange spoke about vulnerability of OS’s to bribes and bugdoors in upstream components.”

Howard Schmidt (chairman of board of company that marketed Heartbleed®) worked with the FBI and another NSA partner/PRISM pioneer (Microsoft). If the NSA knew about the bug, then one wonders what role Schmidt may have played. The last thing that the NSA wants is people (especially outside the US) adopting Free software and GNU/Linux because Microsoft is where back doors are; by design, not by accident. Heartbleed® was reportedly known to the NSA for years (every article that claims this cites Bloomberg, which is notable corporate press and usually a bit dubious when it comes to agenda). If true, this was the type of bug that Edward Snowden’s leaks had alluded to (bug doors, not back doors). Schmidt et al. might be trying to exploit it for FUD and profit, by opportunistically divulging it as soon as mass migration to GNU/Linux in enterprises and homes begins. A decade ago it seemed like a back door had been put inside Linux by the NSA, but the developers caught the intrusion and removed it. There were numerous reports last year saying that the NSA had approached Torvalds, asking him for back doors in Linux, so what Seggelmann did in OpenSSL should not be treated too lightly. The time of the committal is a little suspicious [8] (people away from home to celebrate New Year) and the reputation of OpenSSL is now thoroughly destroyed, which will help its competitors (including proprietary) [9]. There is now a lot of FUD out there about FOSS (the only one we’re willing to cite is [10] because it’s not too malicious), sometimes coming from the mouths of Microsoft boosters or challenging Torvalds’ famous “law” [11,12]. I even get taunted over this in Twitter. The old FUD is back, never mind Coverity’s latest report which again contradicts such FUD.

Mind the article “Heartbleed security flaw may not be as dangerous as thought” [13], which sheds some light on who’s able to exploit and who’s not able to exploit Heartbleed® given the resource limitations (the thing about crackers of the NSA and GCHQ is that they have supercomputers to have a crack at it, and the same is probably true when it comes to the FBI, which is in many ways worse and more aggressive than the NSA; the FBI infiltrates Windows with CIPAV). If the widely-cited reports are true and the NSA knew Heartbleed® (and used it for two years) [14-17], then it’s a massive revelation (the NSA denies this, but denials from the NSA are worthless given its track record when it comes to truth-telling).

Perhaps the most disturbing thing about the story is, the NSA may have discovered Heartbleed® years ago (if not made it, which sounds unlikely [18]) and the firm of Microsoft’s ‘former’ security chief is making a profit from this [19] (the Heartbleed® bounty is partly paid by Microsoft and the partly Microsoft-owned Facebook). A bunch of opportunists got paid for irresponsible disclosure that damaged the Internet [20,21] and harmed many people’s privacy (potentially leading to some people’s deaths).

The GNU/Linux brand is profoundly damaged by this (many GNU/Linux sites mentioned it [22-24]) even though the bug also affects Windows and Apple operating systems. To us it will always seem like marketing campaign coordinated to take place at a strategic date (Windows XP EOL).

Has Microsoft’s Howard Schmidt decided to ‘leak’ it to distract from XP EOL (which means insecurity by policy)? Perhaps. Schmidt had worked with the FBI, so he could have some inside knowledge. He might have former colleagues who could tell him about this (even leak it to him) before he would hype it up, give it a scary name, make a dot com web site, a logo, et cetera, essentially ‘merchandising’ the FUD.

Related/contextual items from the news:

  1. OpenBSD Team Cleaning Up OpenSSL
  2. OpenBSD has started a massive strip-down and cleanup of OpenSSL
  3. Please Put OpenSSL Out of Its Misery
  4. GNUtls: GnuTLS 3.3.0
  5. How to stop the next Heartbleed bug: pay open-source coders to protect us
  6. Will Open-Source Money Prevent the Next Heartbleed?
  7. 3 big lessons to learn from Heartbleed

    The devastating OpenSSL vulnerability proves the importance of data center orchestration, the wisdom of running older versions, and the need to give back to the OpenSSL project

  8. Heartbleed: developer who introduced the error regrets ‘oversight’

    Submitted just seconds before new year in 2012, the bug ‘slipped through’ – but discovery ‘validates’ open source

  9. After Heartbleed: 4 OpenSSL alternatives that work
  10. Heartbleed: Open source’s worst hour”>Heartbleed: Open source’s worst hour
  11. Does the Heartbleed bug refute Linus’s Law?

    The mistake being made here is a classic example of Frederic Bastiat’s “things seen versus things unseen”. Critics of Linus’s Law overweight the bug they can see and underweight the high probability that equivalently positioned closed-source security flaws they can’t see are actually far worse, just so far undiscovered.

  12. Heartbleed: Is Linus Torvald’s law invalid?

    How much data was compromised? How many billions lost? None that we know of. How much does the world loses every year because of Microsoft’s proprietary technologies? Billions of dollars are lost; nations’ securities are compromised and people lives are exposed to risks.

    A majority of NSA attacks won’t be possible without bugs in Microsoft products which the company reportedly shares with the agency so that it can be exploited to hack into computers that NSA can spy on. Microsoft bugs allowed USA to take down nuclear programs of countries like Iran, Microsoft bugs enabled NSA to spy on French president. Microsoft bugs allowed ‘alleged’ Chinese crackers to run a massive scale espionage against human rights activists in the US. In addition there are unaccounted thousands of cases every year where people and businesses lose millions due to security holes in Microsoft products.

  13. Heartbleed security flaw may not be as dangerous as thought

    But today, the content distribution network CloudFlare has announced Heartbleed may not allow access to those private keys after all. In two weeks of testing, the company has been unable to successfully access private keys with Heartbleed, suggesting the attack may not be possible at all. “If it is possible, it is at a minimum very hard,” researcher Nick Sullivan writes. “And we have reason to believe… that it may in fact be impossible.” If true, it makes Heartbleed much less dangerous than many had feared, offering a saving grace for compromised sites. Sullivan acknowledged that, in security tests, some private keys had been revealed by first requests to Apache servers, but he linked this to the process of restarting the server, which would severely limit the exposure to outside actors. Methods have also surfaced to help services tell if attackers have hit their servers using the bug. “Heartbleed still is extremely dangerous,” says CEO Matthew Prince, “but some of the worst fears about it having been used by organizations like the NSA to hoover up everyone’s private SSL keys look pretty unlikely to us based on this testing.”

  14. NSA has been exploiting Heartbleed for two years, leaving Americans exposed to cyber criminals: report [updated]

    As people were wondering NSA’s role in Heartbleed, it turned out that the agency was reportedly aware of the bug, as Bloomberg reports, for the last two years and has been exploiting it to spy on people. If the reports are true and NSA was aware of the bug and instead of getting it fixed it let extremely critical info of US citizens exposed to cyber criminals then NSA does need more oversight from the government.

    Heartbleed was not some minor bug, it affected almost every major web-service including Gmail, Amazon, Yahoo! and many more – holding the potential of exposing sensitive data to criminals. However, as soon as the bug was discovered the Open Source community immediately responded, patched the bug and start pushing the updates.

    While the Americans and the people from around the globe were exposed to cybercriminals, NSA was supposedly busy harvesting passwords and other critical to add it to already massive database.

    Bloomberg quotes Jason Healey, director of the cyber statecraft initiative at the Atlantic Council and a former Air Force cyber officer, “It flies in the face of the agency’s comments that defense comes first. They are going to be completely shredded by the computer security community for this.”

  15. NSA Said to Exploit Heartbleed Bug for Intelligence for Years
  16. Bloomberg: NSA Knew About, Exploited Open Source Heartbleed Bug for Years
  17. The NSA has exploited Heartbleed bug for years, Bloomberg reports
  18. Heartbleed coder admits ‘oversight’ but backs open source

    Seggelmann submitted the code at 11:59pm on New Year’s Eve 2011, but claims the timing had nothing to do with the mistake. Although the bug was also missed by the review process for OpenSSL, an open source project written and reviewed by volunteers, Seggelmann told British newspaper The Guardian that the bug’s eventual discovery shows the value of publically available open source code.

  19. Why a hacker got paid for finding the Heartbleed bug

    Microsoft and Facebook have also provided financial backing to Internet Bug Bounty, out of which Mehta’s prize money came, after running their own internal bug bounties that were very successful. Their money is benefiting the internet as a whole, but they don’t decide what money goes where.

  20. The Internet’s Telltale Heartbleed
  21. Heartbleed developer explains OpenSSL mistake that put Web at risk
  22. SteamOS Affected by Heartbleed Bug, Valve Hasn’t Updated the OS Yet
  23. Linux Foundation Responds to the Heartbleed Bug

    It’s nearly impossible to know for sure, due to the nature of the vulnerability, how much the Heartbleed vulnerability was used to snoop on secure data. We recommend for our sites the same as for other sites: first, watch for a statement to come out from your financial institutions, email providers, and others, which shares whether they were affected. Start changing your passwords. Use different passwords on different sites and store them in a password safe like KeePass, LastPass or 1Password. That way, if any sites that remain vulnerable leak your password, it won’t affect any other sites. Check back on sites that post statements after you changed the password, and then change the passwords again if needed.

  24. Working Out “Serious Security Flaws” In DRM Drivers

    While many are still busy working through fallout of the OpenSSL Heartbleed bug within organizations, on a separate but security related note, kernel developers specializing in the Direct Rendering Manager (DRM) graphics drivers are working to beef up their own driver security.

Microsoft is Leaving Windows — Including Vista 8.1 — Vulnerable to Non-Government Crackers, Not Only to NSA

Posted in Microsoft, Security, Windows at 6:39 am by Dr. Roy Schestowitz

Install the latest back doors or be left vulnerable to crackers other than the NSA

Back doors

Summary: Microsoft makes it ever more evident that securing users of Windows is not at all a priority, and perhaps not even a desire

MICROSOFT WILL never brag about it to the public (only to the government), but Windows, including Vista 8, contains back doors for the NSA. While FOSS developers work hard to ensure security of their programs, with Microsoft any such concerns are irrelevant because security is not even a goal.

It was rather amusing to see this report which says “Microsoft TechNet blog makes clear that Windows 8.1 will not be patched; users must get Windows 8.1 Update if they want security patches” (the report is titled “Microsoft confirms it’s dropping Windows 8.1 support” and it was published by the Microsoft-affiliated IDG).

But wait, it gets worse than abandonment of users and NSA back doors. According to this: “If you still have XP and use Microsoft Security Essentials you will have problems today.. You will get errors relating to MsMpEng.exe when trying to go into windows and windows will slow down to a crawl mimicking a virus.. You need to boot into safe mode and disable the Microsoft Antimalware Service in your services then boot into your normal profile and uninstall the program.”

“Microsoft makes shutdown of their meaningless “security” application cripple XP,” wrote Will Hill. “I’m surprised that I have not gotten any calls about this. Oh yeah, no one is at work yet. I don’t think the treatment planning computers use this, but I’m going to sent a heads up.”

So Microsoft goes further in making Windows XP users less secure from non-government crackers. Wonderful!

04.17.14

Links 17/4/2014: Android RDP, New Ubuntu, RHEL 7 Milestone

Posted in News Roundup at 4:14 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Witnesses Report a ‘Loud Noise’ Before Ferry Sinks Off South Korean Coast

    It’s not clear what caused the multi-story vessel to list and sink, but witnesses reported an impact and loud noise just before the ship began to roll over in the water.

  • Health/Nutrition

    • UN Report Says Small-Scale Organic Farming Only Way to Feed the World

      Transformative changes are needed in our food, agriculture and trade systems in order to increase diversity on farms, reduce our use of fertilizer and other inputs, support small-scale farmers and create strong local food systems. That’s the conclusion of a remarkable new publication from the U.N. Commission on Trade and Development (UNCTAD).

  • Defence/Police/Secrecy/Aggression

    • Donetsk leaflet: Jews must register or face deportation

      Fear replaced communal atmosphere in Donetsk’s Jewish community as armed men handed out a leaflet Passover eve calling on Jews register their religion and property with the interim pro-Russian government or face deportation and loss of citizenship.

    • “We Are Not Beginning a New Cold War, We are Well into It”: Stephen Cohen on Russia-Ukraine Crisis

      As negotiations over the crisis in Ukraine begin in Geneva, tension is rising in the Ukrainian east after security forces killed three pro-Russian protesters, wounded 13 and took 63 captive in the city of Mariupol. Ukrainian officials said the pro-Russian separatists had attempted to storm a military base. The killings came just after the unraveling of a Ukrainian operation to retake government buildings from pro-Russian separatists. Earlier today, Russian President Vladimir Putin accused the authorities in Kiev of plunging the country into an “abyss” and refused to rule out sending forces into Ukraine. Meanwhile, NATO Secretary General Anders Fogh Rasmussen has announced a series of steps to reinforce its presence in eastern Europe. “We will have more planes in the air, more ships on the water and more readiness on the land,” Rasmussen said. We are joined by Stephen Cohen, professor emeritus of Russian studies and politics at New York University and Princeton University. “We are not at the beginning of a new Cold War, we are well into it,” Cohen says, “which alerts us to the fact ‘hot war’ is imaginable now. It’s unlikely, but it’s conceivable — and if it’s conceivable, something has to be done about it.”

    • Putin reveals NATO chief secretly recorded their talk, leaked it to media

      Vladimir Putin says that current NATO General Secretary Anders Fogh Rasmussen secretly recorded and leaked a private conversation with him, when he was the head of the Danish government.

  • Transparency Reporting

  • Environment/Energy/Wildlife

  • Finance

    • Thousands of China workers on strike

      Labour disputes pop up regularly in China, but one strike in the southern Chinese city of Dongguan is attracting attention because of its size.

    • The Neoliberal Theory of Society: The Ideological Foundations of Neo-liberalism

      Neoliberalism presents itself as a doctrine based on the inexorable truths of modern economics. However, despite its scientific trappings, modern economics is not a scientific discipline but the rigorous elaboration of a very specific social theory, which has become so deeply embedded in western thought as to have established itself as no more than common sense, despite the fact that its fundamental assumptions are patently absurd. The foundations of modern economics, and of the ideology of neoliberalism, go back to Adam Smith and his great work, The Wealth of Nations. Over the past two centuries Smith’s arguments have been formalised and developed with greater analytical rigour, but the fundamental assumptions underpinning neoliberalism remain those proposed by Adam Smith.

    • Markets Are the Problem (Not the Solution)

      As might be expected, underlying this monument to excess is an army of laborers from Pakistan, India, Sri Lanka, Bangladesh, and Nepal. These desperate souls arrive heavily indebted to recruiters and those who pay their passage, only to be brutally exploited by sponsoring employers, who confiscate their passports. It is a system of semi-slave labor; workers are not free to leave, even if they have not been paid.

    • Nearly one million people relying on food handouts in UK

      One of Britain’s largest food charities says that more than 900,000 people visited its food banks last year. The Wednesday report comes as 600 religious leaders urge the government to take action against the country’s growing hunger problem.

      The new information shows the shocking number of people reliant on food handouts in the UK, largely because of harsh new benefits sanctions.

      According to The Trussell Trust, Britain’s largest food bank charity, 913,138 people received emergency food aid from the organization in 2013-2014, compared to just 346,992 in 2012-2013 – marking an increase of 163 percent.

  • Censorship

    • Did You Retweet The USAir Pornographic Tweet? You May Have Violated New Jersey’s Revenge Porn Law

      We’ve pointed out for a while how the various attempts at creating revenge porn bills will have serious unintended consequences and raise serious First Amendment issues. This is not to minimize the problems of revenge porn (or to absolve the sick and depraved individuals who put together, submit to or regularly visit such sites). However, it’s to point out that pretty much any way you try to legislate such actions as criminal likely will create other problems. For example, I’m sure many of you heard the story recently about US Airways… um… unfortunate pornographic tweet. It was the story of the internet a few days ago, in which a United Air social media employee did a very unfortunate cut and paste error, tweeting out a very graphic image that involved a naked woman and a plane where it… doesn’t quite belong (for slightly lighter fare, I highly recommend reading some of the of the funny replies to that tweet). For what it’s worth, US Air has said that it was an honest mistake and it’s not even firing the person responsible.

    • US Airways Tweeted An Extreme Pornographic Image And Left It Up For A Long Time

      The photo shows a completely nude woman on her back with a plane inserted into her vagina.

  • Privacy

    • Galaxy S5 fingerprint scanner hacked with glue mould

      The fingerprint sensor on Samsung’s Galaxy S5 handset has been hacked less than a week after the device went on sale.

      Berlin-based Security Research Labs fooled the equipment using a mould it had previously created to spoof the sensor on Apple’s iPhone 5S.

  • Civil Rights

  • Intellectual Monopolies

Racing to 1984: Mass Surveillance, Cracking, ‘Targeted’ Assassinations, and Illegal Torture

Posted in News Roundup at 10:23 am by Dr. Roy Schestowitz

Pulitzer

  • Exposing the NSA: A Public Service Worthy of a Pulitzer Prize

    Earlier this week, journalism’s most prestigious award, the Pulitzer Prize for public serice, was given to two newspapers for their exposés of mass surveillance by the U.S. government. The award citation praised the Washington Post for “its revelation of widespread secret surveillance by the National Security Agency, marked by authoritative and insightful reports that helped the public understand how the disclosures fit into the larger framework of national security.” The Guardian was recognized for “aggressive reporting” that helped “to spark a debate about the relationship between the government and the public over issues of security and privacy.”

  • Pulitzer Prize Winners 2014: Edward Snowden NSA Leaks, Boston Marathon Coverage Win Awards

Cracking

Lavaboom and Lavabit

  • Snowden-inspired crypto-email service Lavaboom launches

    Lavaboom, a German-based and supposedly NSA-proof email service, will go into private beta this week. Its mission is to spread the Edward Snowden gospel by making encrypted email accessible to all.

  • ‘Zero knowledge privacy’: NSA-proof email service goes online

    A new email service that protects its users from the prying eyes of the NSA and other spy agencies has gone online. The service’s creators say it will make encrypted messaging accessible to all and curtail internet snooping.

    Germany-based Lavaboom was inspired by Lavabit, the encrypted email service that was believed to have been used by whistleblower Edward Snowden before it shut down its operations in August last year. The service pioneers a new system called “zero-knowledge privacy”, which allows users to personally encrypt and decrypt their mail from their browsers using JavaScript codes.

  • Lavabit loses contempt of court appeal over Edward Snowden encryption keys

    Court ruled against Lavabit for refusing to hand over encryption keys to government investigation into NSA whistleblower

  • Edward Snowden Email Firm Loses Appeal On Contempt Charge
  • Here’s the software that helps Edward Snowden avoid the NSA

    Edward Snowden hasn’t escaped the NSA’s watchful eyes purely by exploiting lax security — he also uses the right software. He communicates with the media using Tails, a customized version of Linux that makes it easy to use Tor’s anonymity network and other tools that keep data private. The software loads from external drives and doesn’t store anything locally, so it’s relatively trivial for Snowden and his contacts to discuss leaks without leaving a trace.

Europe

US

  • NSA whistleblowers to speak at WCU

    Bill Binney and Thomas Drake, both former executives with that agency, plan to discuss their views on the collection of personal data by the NSA as well as the risk taken by those who expose wrongdoings and violations of the law, according to a release from the university.

  • NSA has ‘piggybacked’ on corporate surveillance efforts

    As online providers thrive on offering free products and services in exchange for marketing data, government has started piggybacking on these surveillance mechanisms.

  • The IRS is Taking a Page From the NSA’s Playbook and Snooping on Social Media

    According to Marketplace the Internal Revenue Service (IRS), which loses an estimated $300 billion due to tax evasion every year, is using data from social media sites such as Facebook, Instagram, and Twitter in order to investigate those who don’t file taxes or file suspicious returns.

  • Is the NSA out of control?

    An attorney and specialist on Constitutional Law, Shahid Buttar, was the third panel member. He is the Executive Director of the “Bill of Rights Defense Committee.” Buttar traced the history of government-sanctioned spying and warned that the NSA’s egregious conduct has currently reached Orwellian proportions and is a serious threat to “Freedom of Thought”

Drones

Militarism

  • U.S. Efforts to Arm Jihadis in Syria: The Scandal Behind the Benghazi Undercover CIA Facility

    In January, the Senate Intelligence Committee released a report on the assault by a local militia in September 2012 on the American consulate and a nearby undercover CIA facility in Benghazi, which resulted in the death of the US ambassador, Christopher Stevens, and three others. The report’s criticism of the State Department for not providing adequate security at the consulate, and of the intelligence community for not alerting the US military to the presence of a CIA outpost in the area, received front-page coverage and revived animosities in Washington, with Republicans accusing Obama and Hillary Clinton of a cover-up.

  • America’s Great Leap towards Global Tyranny

    Not only is there a quantitative difference now, there is a new qualitative difference. After the holocaust of Vietnam (3 million dead Vietnamese justify the term), the United States military realized that it could no longer depend upon citizen-soldiers in its colonial wars. It also realized that that it could no longer tolerate even a moderately free press nosing around its battlegrounds, thus was born the idea of an imbedded press in a professional army. Of course, in the intervening years, America’s press itself changed, becoming an intensely concentrated corporate industry whose editorial policies are invariably in lock-step over colonial wars and interventions and coups, almost as though it were an unofficial department of government. In addition, this corporatized press has abandoned traditional responsibilities of explaining even modestly world affairs, reportage resources having been slashed by merged corporate interests as well as by new economic pressures on advertising revenue, the result of changing technologies.

  • Why isn’t the K.C. shooting suspect a ‘terrorist?’

    Frazier Glenn Cross is a former KKK leader with political ambitions accused of killing three people outside Jewish centers. The shooting seems to fit the Justice Department’s definition of terrorism: 1) premeditated, 2) political, 3) aimed at civilians, 4) and not carried out by another nation. And yet, this has been classified as a hate crime.

  • US Air Strike Kills Three Civilians in Eastern Afghanistan

    An overnight US air strike against the Khost Province in eastern Afghanistan has killed three civilians, a woman and her two children. It also injured the father of the children.

  • Militias and mayhem: The truth about American military assistance in Libya

    Is the U.S. secretly training Libyan militiamen in the Canary Islands? And if not, are they planning to?

    That’s what I asked a spokesman for U.S. Africa Command (AFRICOM). “I am surprised by your mentioning the Canary Islands,” he responded by email. “I have not heard this before, and wonder where you heard this.”

    As it happens, mention of this shadowy mission on the Spanish archipelago off the northwest coast of Africa was revealed in an official briefing prepared for AFRICOM chief General David Rodriguez in the fall of 2013. In the months since, the plan may have been permanently shelved in favor of a training mission carried out entirely in Bulgaria. The document nonetheless highlights the U.S. military’s penchant for simple solutions to complex problems — with a well-documented potential for blowback in Africa and beyond. It also raises serious questions about the recurring methods employed by the U.S. to stop the violence its actions helped spark in the first place.

  • Too High A Price

    Why we need to #movethemoney out of the military and into healing people and the planet

  • Putin Jokes on Possible Reunification of Alaska with Russia: Who Needs It?

    Russian President Vladimir Putin jokingly commented on a suggestion of unifying Alaska with Russia the same way as with Crimea.
    Alaska was part of Russia until 1867 and was sold to the United States for $7.2 million in gold.

  • Why CIA Director Brennan Visited Kiev: In Ukraine The Covert War Has Begun

    Ukraine is on the brink of civil war, Vladimir Putin has said, and he should know because the country is already in the midst of a covert intelligence war. Over the weekend, CIA director John Brennan travelled to Kiev, nobody knows exactly why, but some speculate that he intends to open US intelligence resources to Ukrainian leaders about real-time Russian military maneuvers. The US has, thus far, refrained from sharing such knowledge because Moscow is believed to have penetrated much of Ukraine’s communications systems – and Washington isn’t about to hand over its surveillance secrets to the Russians.

  • CIA Directs Kiev Proxy Regime to Launch Military Assault against Rebels in Eastern Ukraine
  • CIA director in Kiev searching for missing mercenaries

    Russian Foreign Minister Sergei Lavrov revealed that CIA director John Brennan was in Kiev last weekend. One of his advisors told the newspaper Vzgliad that Brennan had not come to oversee the “anti-terrorist” operations conducted by the Ukrainian authorities, but to seek information and rescue twenty Greystone Ltd mercenaries of whom there has been no news.

  • CIA presence in Ukraine gives the wrong impression, senator warns

    CIA Director John Brennan visited Kiev this weekend as pro-Russian militants seized control of a police station in eastern Ukraine. The reason for Brennan’s visit is still unknown.

Torture

04.16.14

More Microsoft Subsidies to Patent Troll Intellectual Ventures

Posted in Bill Gates, Microsoft, Patents at 3:03 pm by Dr. Roy Schestowitz

Patent sharks still collaborate

Bill and Nathan

Summary: Microsoft hands money to Bill Gates’ close friend who is the world’s largest patent troll

WE recently explained that Apple and Microsoft were helping trolls and preventing patent reform in the United State. Intellectual Ventures, the world’s largest patent troll (funded in part by Microsoft and Bill Gates) was having financial difficulties, so guess who’s stepping in to the rescue, essentially subsidising trolling? Intellectual Ventures is said to have “persuaded Microsoft and Sony to invest in its latest acquisition fund” (of patents). Once again, as in Rockstar, Microsoft and Sony align in patent agenda and as Masnick puts it, “while many of the companies have indeed avoided giving IV any more money, it appears that Microsoft and Sony were quite happy to dump a lot more cash into IV, which has now ramped up its patent buying efforts again (as well as its lobbying and political contributions in an effort to kill off patent reform). Microsoft, of course, has always been close to IV, seeing as it was started by the company’s former CTO, Nathan Myhrvold, who is also a close friend of Bill Gates (who has directly helped IV get some patents). Similarly, Microsoft has become one of the most aggressive patent abusers over the last decade, increasingly relying on its stock of patents to make money from other people’s innovations, rather than innovating on its own.”

“This is racketeering by proxy.”Masnick correctly concludes that “via Intellectual Ventures and its own patent holdings, Microsoft seems to be trying to make sure Gates’ prediction is a reality. It all fits in to the same paradigm we’ve observed for years. When you’re young, you innovate. When you’re old, you litigate. Microsoft appears to have given up on innovation, but is ramping up on litigation, and re-investing in patent trolling via Intellectual Ventures is merely the latest step.”

This is racketeering by proxy. It’s part of the patent-stacking strategy which includes even Nokia and Apple. Bill Gates, which is a close partner of the world’s largest troll, has a lot to do with it. In a system where billionaires enjoy zero accountability jails are reserved only for petty ‘crimes’.

Aiding Microsoft Under the Disguise of ‘Pro-FOSS’

Posted in Free/Libre Software, Microsoft, Mono at 2:47 pm by Dr. Roy Schestowitz

Summary: Not everything which is FOSS necessary becomes, by virtue of existence, a positive contribution, as we are constantly reminded by projects that help proprietary software and/or restrictions get a strong grip on FOSS

THE word is out that Mono booster Seif Lotfy has just joined the Microsoft Trojan horse best known as Ximian/Novell/Xamarin — the company where Microsoft MVP Miguel de Icaza uses financial support from Microsoft to infect everything (not just FOSS) with .NET. This is yet another recruitment which helps reinforce our suspicions about the goals of Xamarin.

Meanwhile, suggests this post from a UEFI ‘secure’ boot apologist, “a significant proportion of existing systems can probably have their Secure Boot implementation circumvented.”

So why support them in the first place? We have already shown several ways of breaking ‘secure’ boot and even remotely vendalising entire motherboards using ‘secure’ boot. Both Mono and ‘secure’ boot deserve to be dropped into the digital wastebasket. Their outcome is harm to FOSS and to computing in general.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts