EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.24.15

The Lie or the Fiction of Microsoft Tolerating GNU/Linux

Posted in Site News at 9:43 am by Dr. Roy Schestowitz

Vladimir Putin loves puppies!

Vladimir Putin

Summary: The ‘Microsoft loves Linux’ nonsense cannot be put to rest, as that tired old lie keeps resurfacing in the media

Linking to a rather poor article from Matt Weinberger (saying that “Microsoft is working with its most bitter enemies”), iophk, our reader, called it “entryism.”

“Also,” he wrote, “can any normal person or team even build one of the containers from source? I thought not. Between stuff like systemd and certain containers, we’re seeing a new kind of closed, proprietary software.”

“Between stuff like systemd and certain containers, we’re seeing a new kind of closed, proprietary software.”
      –iophk
Weinberger wrote another article a short moment ago. It’s the latest Microsoft puff piece with the “Microsoft loves Linux” mythology. After Russinovich glorification (the man who pretends there is a “new Microsoft” and also openwashes Windows) we inevitably see this rather bizarre new article in which Microsoft wants to sell us the illusion that it stopped attacking Linux, despite attacking it on many ways, e.g. UEFI ‘secure’ boot, patent lawsuits, bribes etc. As a reminder, see these posts (a series of six) from a few months ago:

Microsoft hates GNU/Linux. When it participates it’s in order to make Linux Windows-dependent (see Hyper-V for instance) or devour the platform in various other ways so as to make Microsoft’s non-Windows cash cows take over, in due course. This has nothing to do with Free/libre software as trying to make it proprietary software-dependent is not a contribution. It’s derailment.

Microsoft is Again Demonstrating That It is Not Interested in Making Windows Secure

Posted in Microsoft, Security, Windows at 9:33 am by Dr. Roy Schestowitz

“Our products just aren’t engineered for security.”

Brian Valentine, Microsoft executive

Michael S. Rogers
“I don’t want a back door. I want a front door.”Director of the NSA (2015)

Summary: Microsoft decides to leave Windows with flaws in it, claiming that fixing the flaws would not be worth Microsoft’s resources

FOR A LONG period of time (3 months or more) Microsoft refused to fix a serious flaw in Windows. It only did something about it when it was too late because the public had found out. Microsoft blamed the messenger.

This is not the exception, it’s pretty much the norm. Some Windows flaws exist for as long as 15 years, but they have no "branding" like a name or a logo.

“People with access to the world’s biggest stockpile of nuclear weapons still use Windows XP.”“Dustin Childs says the company couldn’t get Microsoft to patch an IE exploit,” says this new report, pointing to HP’s Web site. “Since Microsoft feels these issues do not impact a default configuration of IE,” Childs wrote, “it is in their judgment not worth their resources and the potential regression risk” (a lot more damning information can be found in the HP Security Research Blog).

Given Microsoft’s cooperation with the NSA on back door access, this hardly surprises us. Even more sad than this is a new report about the US Navy wasting millions in taxpayers’ money to run an operating system initially released in 2001. People with access to the world’s biggest stockpile of nuclear weapons still use Windows XP. As IDG put it:

The U.S. Navy is paying Microsoft millions of dollars to keep up to 100,000 computers afloat because it has yet to transition away from Windows XP.

After the Office of Personnel Management (OPM) disaster (Windows involved), we oughtn’t be too shocked about some nuclear disaster happening because of dependence of ancient Windows.

Not Only is Vista 10 Not Free, It is Getting More Expensive, According to the Taiwanese Press

Posted in GNU/Linux, Microsoft, Vista 10, Windows at 9:17 am by Dr. Roy Schestowitz

Microsoft is hiding the price tag

Price tag

Summary: More proof that Microsoft charges quite a lot for Vista 10 (at OEM level), despite the perpetual deception about costs

“NOT FREE” is the only way to describe Vista 10, despite repeated lies from Microsoft and its boosters [1, 2, 3, 4, 5, 6, 7]. Vista 10 not just nonfree (proprietary) but also not free (non-gratis) and exceedingly expensive. There is no other way to put it.

We gradually see (or start seeing) Vista 10 puff pieces that promise us everything and make this yet-unreleased piece of software sound like the best thing to ever reach planet Earth. We caution our readers and ask them to remember that Microsoft bribes bloggers, journalists, etc. who review the latest Windows before anyone else gains access to it. In addition, we saw Microsoft shamefully blacklist ‘unwanted’ voices, then ask the media to claim that reviews (bribed for at approximately $1000 a pop) are largely positive. It’s intended to shape consensus before the release. It’s trend-setting by gross manipulation.

Regarding the cost of Vista 10 (hidden in OEM contracts, under NDA), now we have a clue. According to the media in Taiwan, “Microsoft has been talking to notebook brand vendors about the licensing of Windows 10 recently and is planning to charge extra fees for notebook models with high-end hardware such as Core i7 processors or Full HD display.”

So Microsoft is quietly raising the price of Windows. There’s nothing “free” about it. “Expect GNU/Linux to have a really great year,” writes Robert Pogson. Microsoft hopes to bamboozle people into the false belief that Windows and GNU/Linux are the same price. It’s all about perception, even if by repeatedly lying.

“There’s no company called Linux, there’s barely a Linux road map. Yet Linux sort of springs organically from the earth. And it had, you know, the characteristics of communism that people love so very, very much about it. That is, it’s free.”

Steve Ballmer

EPO Protest in Munich and Growing Unpopularity of EPO Management, Media Manipulation by the Management

Posted in Deception, Europe, Patents at 8:44 am by Dr. Roy Schestowitz

Endowing/bribing the media not a wise policy

A stack of newspapers

Summary: Poll shows that the European Patent Office (EPO) comes under fire for its media strategy which involves wasting taxpayers’ money on fake/organic media coverage that glorifies the EPO

PROTESTS are said to have just taken place in Munich. EPO abuse was the cause. Although there are no reports (yet) about the gathering, not even about the scale or number of people in attendance, it is the principle that counts. Maybe the protesters too should ape their managers and hire ‘media partners’ such as Les Echos? Probably not. Only Benoît Battistelli would be desperate enough to do that.

We are meanwhile learning that patent lawyers in Europe, who are the target audience of this blog, don’t have a positive opinion of the EPO. As a recap:

A few weeks ago, the IPKat asked whether the EPO ought to be organising and funding the European Inventor of the Year award. His concerns were twofold: the resources that are devoted to this event, and the fundamental question of whether the EPO ought to be seen to be ranking different inventions in terms of their merits.

As it turns out, “43% (296 votes) were also unsupportive of the EPO involvement: “It lies outside the powers and duties of the EPO.””

As we explained before, this is misuse of public funds. The EPO wastes public money on paid placements ('articles') and 'media partners', hoping to bury or pro-actively suppress any potentially negative publicity (even when it is very much deserved).

“The IPKat wonders whether the EPO should now review its involvement with and funding of this event,” says the above blog post, “in the light of these concerns which appear to be shared by much of the IP community (or of this blog’s readership, at least)?”

Links 24/6/2015: Meizu MX4, Red Hat and Samsung Partner, Women in Open Source Awards

Posted in News Roundup at 7:58 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • How I got eviscerated in front of the entire company (and why it was good)
  • Health/Nutrition

    • 7 reasons you should throw your chicken dinner in the garbage

      Could there be anything worse for the chicken industry than this month’s outbreak of an antibiotic-resistant strain of salmonella that hospitalized 42 percent of everyone who got it—almost 300 in 18 states?

      Yes. The government also announced that China has been cleared to process chickens for the US dinner plate and that all but one of arsenic compounds no one even knew they were eating have been removed from US poultry production. Thanks for that. Also this month, some food researchers have revealed the true recipe for chicken “nuggets”…just in time for Halloween.

  • Security

    • Security advisories for Monday
    • “EPIC” fail—how OPM hackers tapped the mother lode of espionage data

      Government officials have been vague in their testimony about the data breaches—there was apparently more than one—at the Office of Personnel Management. But on Thursday, officials from OPM, the Department of Homeland Security, and the Department of the Interior revealed new information that indicates at least two separate systems were compromised by attackers within OPM’s and Interior’s networks.

    • How encryption keys could be stolen by your lunch

      Israel-based researchers said they’ve developed a cheaper and faster method to pull the encryption keys stored on a computer using an unlikely accomplice: pita bread.

    • OS Security: Windows and Linux/UNIX

      For those new to Linux/UNIX command line interfaces, there are lots of Internet sources that provide cheat sheets for the most common commands you’ll need to navigate and perform actions. Here’s another option we like because it’s particularly handy.

    • Why are there still so many website vulnerabilities?

      The larger the site, the greater its functionality and visibility, and the more it uses third-party software, the more that the process of reducing inherent vulnerabilities in the site will be costly.

    • Breach Defense Playbook: Open Source Intelligence

      The Internet allows for information to be readily available at your fingertips. However, it also allows for the same information to be accessed by malicious threat actors who are targeting your organization with cyberattacks. The recent explosion of social media has only increased the information available, and with it the risks to your corporate data, intellectual property, and brand. Some organizations call the awareness of this risk “threat intelligence,” but we have found that organizations need to focus on more than just current threats. Organizations can leverage an emerging intelligence-gathering capability to determine data leakage, employee misbehavior, or negative brand exposure at a higher level than threat intelligence using Open Source Intelligence, or OSINT.

  • Finance

  • Privacy

    • Software companies are leaving the UK because of government’s surveillance plans

      The company behind the open-source blogging platform Ghost is moving its paid-for service out of the UK because of government plans to weaken protection for privacy and freedom of expression. Ghost’s founder, John O’Nolan, wrote in a blog post: “we’ve elected to move the default location for all customer data from the UK to DigitalOcean’s [Amsterdam] data centre. The Netherlands is ranked #2 in the world for Freedom of Press, and has a long history of liberal institutions, laws and funds designed to support and defend independent journalism.”

      O’Nolan was particularly worried by the UK government’s plans to scrap the Human Rights Act, which he said enshrines key rights such as “respect for your private and family life” and “freedom of expression.” The Netherlands, by contrast, has “some of the strongest privacy laws in the world, with real precedents of hosting companies successfully rejecting government requests for data without full and legal paperwork,” he writes.

  • Civil Rights

    • Cop accused of exposing himself faces jail time for dashcam tampering

      A 37-year-old New Jersey cop accused of exposing his genitalia to the young male motorists he pulled over has accepted a plea deal in which the officer loses his job in exchange for pleading guilty to tampering with his patrol car’s dashcam “to conceal unprofessional and inappropriate conduct.”

  • Intellectual Monopolies

    • Copyrights

      • ISPs Dump VPN After Legal Threats From Big Media

        Providers who defied TV company demands to switch off their VPN services have caved in following legal threats. CallPlus and Bypass Network Services faced action from media giants including Sky and TVNZ for allowing their customers to access geo-restricted content. Their ‘Global Mode’ services will be terminated by September 1.

06.23.15

Links 23/6/2015: Cinnamon 2.6.9, Red Hat Summit

Posted in News Roundup at 4:16 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • The Third Platform: The Time for Open Source Is Nigh

    The main purposes of open source are overt in the name itself. The biggest differentiator of open source is its innate openness, or transparency. Not only is the source code available, but so too are the other aspects. This characteristic contrasts with the often clandestine processes of proprietary vendors. Open-source products are thus easier to evaluate to determine whether they are right for a specific enterprise.

  • Business

  • FSF/FSFE/GNU/SFLC

    • Introducing Adam Leibson: summer Campaigns intern

      Hello free software supporters, my name is Adam Tobias Leibson. I’ve been an avid GNU/Linux user since my first year of high school. Around that time, I read Cory Doctorow’s book Little Brother. That book challenged me to think more deeply about the effects of mass surveillance on society, and brought about my interests in privacy and cryptography.

  • Public Services/Government

    • Russia to replace proprietary software with open source

      The Russian Ministry of Telecom and Mass Communications has announced a plan to replace proprietary software with open source and locally produced software. The plan is one of the measures aimed at promoting sustainable economic development and social stability announced earlier this year.

  • Openness/Sharing

Leftovers

  • Security

  • Censorship

    • Australia passes controversial anti-piracy web censorship law

      A controversial bill to allow websites to be censored has been passed by both houses of the Australian parliament. The Copyright Amendment (Online Infringement) Bill 2015 allows companies to go to a Federal Court judge to get overseas sites blocked if their “primary purpose” is facilitating copyright infringement.

      Dr Matthew Rimmer, an associate professor at the Australian National University College of Law, points out that there is a lack of definitions within the bill: “What is ‘primary purpose’? There’s no definition. What is ‘facilitation’? Again, there’s no definition.” That’s dangerous, he believes, because it could lead to “collateral damage,” whereby sites that don’t intend to hosting infringing material are blocked because a court might rule they were covered anyway. Moreover, Rimmer told The Sydney Morning Herald that controversial material of the kind released by WikiLeaks is often under copyright, which means that the new law could be used to censor information that was embarrassing, but in the public interest.

    • Australia Passes ‘Pirate’ Site Blocking Law

      A few minutes ago Australia passed controversial new legislation which allows for overseas ‘pirate’ sites to be blocked at the ISP level. Despite opposition from the Greens, ISPs and consumer groups, the Senate passed the bill into law with a vote of 37 in favor and 13 against. Expect The Pirate Bay to be an early target.

    • Germany Says You Can’t Sell Adult Ebooks Until After 10 PM

      Why is it that many efforts made “for the children” are so stupid most tweens could point out the obvious flaws? Back during the discussion of the UK’s now-implemented ISP porn filtration system, Rhoda Grant of the Scottish Parliament wondered why the internet couldn’t be handled the same way as television, where all the naughty “programming” isn’t allowed to take to the airwaves until past the nationally-accepted bedtime.

    • Google follows Facebook and Reddit with ‘revenge porn’ crackdown

      GOOGLE HAS STARTED accepting takedown requests for so-called revenge porn, following in the footsteps of Facebook, Twitter and Reddit.

      Google announced that users can now request that sexually explicit images shared without their consent are removed from search results, despite the firm having generally resisted efforts to limit what is viewable in search.

  • Privacy

    • US, UK Intel agencies worked to subvert antivirus tools to aid hacking [Updated]

      Documents from the National Security Agency and the United Kingdom’s Government Communications Headquarters (GCHQ) obtained by former NSA contractor Edward Snowden reveal that the two agencies—and GCHQ in particular—targeted antivirus software developers in an attempt to subvert their tools to assure success in computer network exploitation attacks on intelligence targets. Chief among their targets was Kaspersky Labs, the Russian antivirus software company, according to a report by The Intercept’s Andrew Fishman and First Look Media Director of Security Morgan Marquis-Boire.

    • US and British Spies Targeted Antivirus Companies

      When the Russian security firm Kaspersky Lab disclosed recently that it had been hacked, it noted that the attackers, believed to be from Israel, had been in its network since sometime last year.

      The company also said the attackers seemed intent on studying its antivirus software to find ways to subvert the software on customer machines and avoid detection.

      Now newly published documents released by Edward Snowden show that the NSA and its British counterpart, GCHQ, were years ahead of Israel and had engaged in a systematic campaign to target not only Kaspersky software but the software of other antivirus and security firms as far back as 2008.

      The documents, published today by The Intercept, don’t describe actual computer breaches against the security firms, but instead depict a systematic campaign to reverse-engineer their software in order to uncover vulnerabilities that could help the spy agencies subvert it. The British spy agency regarded the Kaspersky software in particular as a hindrance to its hacking operations and sought a way to neutralize it.

    • Popular Security Software Came Under Relentless NSA and GCHQ Attacks

      The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden.

      The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products.

    • GCHQ Dinged For Illegally Holding Onto Human Rights Groups Emails Too Long, Not For Collecting Them In The First Place

      Following on a ruling nearly two months ago, where the UK’s Investigatory Powers Tribunal — for the very first time — found that GCHQ had broken the law with its surveillance of client/attorney communications, now the IPT has ruled against GCHQ again. The IPT says that GCHQ held emails of human rights activists for too long — but found that the initial collection of those emails was no problem at all.

    • GCHQ’s spying on human rights groups was illegal but lawful, courts find

      GCHQ’S SPYING on two international human rights groups was illegal, according to a ruling by the Investigatory Powers Tribunal (IPT) which is responsible for handling complaints against the intelligence services.

      The court case was raised by a number of privacy groups and challenged how GCHQ surveys similar groups. It found that the government body operated in breach of its own rules.

      The decision in the High Court on Monday followed concerns raised by groups including long-time snooping critics Privacy International, Liberty, Amnesty International and the American Civil Liberties Union.

      The IPT ruled that British spies had breached Article 8 of the European Convention on Human Rights, and that GCHQ had retained emails for longer than it should and violated its own internal procedures.

    • Supreme Court declares warrantless searches of hotel registries illegal

      The Supreme Court gave a big boost to privacy Monday when it ruled that hotels and motels could refuse law enforcement demands to search their registries without a subpoena or warrant. The justices were reviewing a challenge to a Los Angeles ordinance requiring hotels to provide information to law enforcement—including guests’ credit card number, home address, driver’s license details, and vehicle license number—at a moment’s notice. Similar ordinances exist in about a hundred other cities stretching from Atlanta to Seattle.

      Los Angeles claimed the ordinance (PDF) was needed to battle gambling, prostitution, and even terrorism, and that guests would be less likely to use hotels and motels for illegal purposes if they knew police could access their information at will.

    • Supreme Court Says Motel Owners Must Be Allowed To Challenge Warrantless Searches Of Guest Registries

      A smallish victory for Fourth Amendment protections comes today as the Supreme Court has struck down a Los Angeles ordinance that allowed police warrantless, on-demand access to hotel/motel guest records. This win is very limited, and the court’s discussion of the issue at hand pertains solely to the Los Angeles statute and doesn’t address the potential unconstitutionality of other, similar records sweeps granted by the Third Party Doctrine. Nor does it address the potential Fourth Amendment violations inherent to “pervasive regulation” of certain businesses — like the records legally required to be collected and handed over on demand to law enforcement by entities like pawn shops, junk yards and firearms dealers.

    • Texas Dept. Of Public Safety Forced To Admit Its Stratfor-Crafted Surveillance Tech Isn’t Actually Catching Any Criminals

      Concerns over pervasive surveillance are often shrugged off with “ends justify the means” rationalizing. If it’s effective, it must be worth doing. But as more information on domestic surveillance programs surfaces, we’re finding out that not only are they intrusive, but they’re also mostly useless.

      TrapWire — software produced by Stratfor and used by security and law enforcement agencies around the world — utilizes facial and pattern recognition technology to analyze CCTV footage for “pre-attack patterns,” meshing this information with other law enforcement databases, including online submissions from citizens reporting “suspicious behavior.”

  • Civil Rights

    • 4-year-old struck by officer’s bullet in Ohio

      A 4-year-old child was struck by a bullet fired from a Columbus Police Officer’s gun, reports CBS affiliate WBNS.

      According to the station, a patrol officer was answering a call Friday afternoon when a family in the area started screaming for help because of a medical emergency.

    • Florida mail man who landed gyrocopter at US Capitol rejects plea offer that would have involved prison time

      A Florida postman who flew a gyrocopter through some of America’s most restricted airspace before landing at the US Capitol said he rejected a plea offer on Monday that would have involved several years in prison.

      Douglas Hughes, 61, of Ruskin, Florida, said he rejected the offer because no one got hurt during his stunt.

      Hughes was arrested on April 15 after he took off in his gyrocopter from Gettysburg, Pennsylvania, and landed on the Capitol’s West Lawn in his bare-bones aircraft.

    • Los Angeles police shoot unarmed man in the head who ‘waved at them for help with a towel’

      A Los Angeles Police Department officer shot a man in the head after he attempted to flag down officers for help with a towel in his hand.

      Officers responded to the scene following an officer-needs-help call in the area, CBS Los Angeles reported.

      The officers believed the man was holding a gun and, after ordering him to drop the alleged weapon, officers fired four shots. One of the rounds appeared to shoot the suspect in the head. A motorist posted graphic video of the scene online — which was widely shared on social media — showing the man rolled over and cuffed by police.

      “The officers stopped to investigate and see what was needed,” LAPD spokesman John Jenal told NBC Los Angeles. “This person then extended their arm, which was wrapped in a towel.”

      LAPD Commander Andrew Smith told the Los Angeles Times that the officers were following standard procedure for cuffing the man who seemingly had a gaping gunshot wound to the head with blood pouring from it.

      Mr Smith said the man was standing on the side of the road asking for the officers’ help yelling: “Police, police.”

      However, police said no weapons were found and only a towel was recovered from the scene.

    • Two British teenagers arrested over Auschwitz theft

      The unnamed pair were held by guards at the site, now a museum, on Monday and are in custody, police told AFP.

      They took artefacts belonging to prisoners held there during World War Two, including buttons and pieces of glass, a museum spokesman told AFP.

      The UK Foreign Office confirmed two British nationals had been arrested.

  • Internet/Net Neutrality

    • Net neutrality will prove as evil as the VCR

      An interesting and melancholy event is taking place not far away from me. An honest-to-goodness independent movie rental store is closing its doors with much fanfare and a going-out-of-business sale.

      This is a small business that has been around almost since the advent of the VCR and rolled right through the dawn of the Internet and into the era of widespread streaming content — by renting videos. If you wanted to watch a movie, you drove down to the store, hoped there was a copy on the shelf, rented it on the contract you’d signed possibly decades ago, and returned it within a day or two.

  • Intellectual Monopolies

    • Copyrights

      • Alleged Dallas Buyers Club Pirates To Be Asked For Employment, Income And Health Details

        In the previous instalment of the long-running saga involving alleged pirates of the Dallas Buyers Club film in Australia, the court agreed that Australian ISP iiNet should hand over information about its customers. But it added an important proviso: the letter and telephone script to be used to contact and negotiate with them had to be approved by the court first in an effort to prevent “speculative invoicing” of the kind all-too familiar elsewhere.

      • Taylor Swift vs Apple: nobody wins

        So why did Apple think for one second that it could get away with not paying Taylor Swift?

      • Libgen Goes Down As Legal Pressure Mounts

        Libgen, the largest online repository of free books and academic articles, has pretty much vanished from the Internet. Earlier this month the site’s operators were sued by academic publishing company Elsevier, who asked a New York federal court for a preliminary injunction hoping to keep the site down for good.

06.22.15

Microsoft Injects Its Proprietary Software Into Free Software Stacks and the Open Container Project

Posted in GNU/Linux, Microsoft at 6:25 pm by Dr. Roy Schestowitz

“The email details how, surprise surprise, Microsoft has arranged virtually all of SCO’s financing, hiding behind intermediaries like Baystar Capital.”

Bruce Perens

Summary: The Microsoft plot to paint its proprietary software ‘open’ is largely successful, as even the Linux Foundation relents on defensive antagonism and gives up on software freedom

SEVERAL weeks ago we wrote about the openwashing of “Edge” (not to be confused with Ubuntu Edge), which is a Microsoft rebrand essentially, pretending that Microsoft embraces “Open Source” on the Web. Microsoft is still openwashing proprietary software by virtually googlebombing [1, 2, 3] “open source edge” etc. When searching for “open source windows” you might expect ReactOS, but that’s no longer the case, surely not after a misleading media blitz. Here is an example from a Microsoft propaganda site. It says: “Microsoft now makes all these feature demos available as open-course on GitHub, so that the developers can get them hands-on to learn more about it. The sole aim of presenting the Test Drive Site is to help developers play around with the new interface and its features and to get hands-on review and endways experience before the official launch of Windows 10 in July 29.”

“Are all these recent hires from Microsoft making the Linux Foundation unable to say “no” to Microsoft?”The kind of openwashing extends from Edge (proprietary) to Vista 10 (also proprietary and definitely not free, no matter how many times Microsoft lies about the cost [1, 2, 3, 4, 5, 6]). How can Microsoft get away with this? If people are passive enough, it might actually pass muster.

We have meanwhile found this new article titled “Install Microsoft Visual Studio Code on 32-bit Ubuntu Systems with Ubuntu Make 0.8.2″. It’s an article from a Linux site (Softpedia’s Linux section) which tactlessly helps Microsoft entrap GNU/Linux users. That’s the second time in about a month and once again, installing proprietary software from Microsoft is described as a reasonable thing to do (or worth doing, like installing Microsoft’s malware Skype on GNU/Linux). Visual Studio Code is proprietary and it may have malicious antifeatures that no audit can yet demonstrate. That’s aside from the fact that helping Microsoft is unwise. The editor promotes .NET and other Microsoft lock-in. GNU/Linux already had plenty of fantastic code editors, most of which are Free software and framework-neutral.

Speaking of helping Microsoft, watch the Linux Foundation’s Open Container Project — like others before it — getting infiltrated by Microsoft upon launch:

Microsoft and a bunch of its biggest competitors, including Google and Amazon, have joined forces for the Open Container Project, a non-profit organization housed under the Linux Foundation – the governing body of the Linux open source operating system, which Microsoft once considered its biggest competitor.

The Linux Foundation needs to watch out as it foolishly opens the lion’s mouth wide open yet again, as if just to look at what’s deep inside the lion’s throat (lots of carcasses of other prior fools like Corel, Yahoo!, Nokia, and Novell). Microsoft still wants to destroy GNU/Linux and its participation in the Open Container Project is about promoting Windows (containers greatly contribute to the obsolescence of Windows, according to a new Red Hat study). What was the Linux Foundation thinking in this case? Are all these recent hires from Microsoft making the Linux Foundation unable to say “no” to Microsoft?

“We [Microsoft] believe every Linux customer basically has an undisclosed balance-sheet liability.”

Steve Ballmer, Microsoft

Microsoft’s Continued and Seemingly Never-Ending Lies About Vista 10 Being ‘Free’ (Lock-in)

Posted in Deception, GNU/Linux, Microsoft, Vista 10, Windows at 5:47 pm by Dr. Roy Schestowitz

“The purpose of announcing early like this is to freeze the market at the OEM and ISV level. In this respect it is JUST like the original Windows announcement…

Nathan Myhrvold, Microsoft

Summary: In a shameless effort to discourage migrations to the zero-cost BSD and GNU/Linux, Microsoft continues to flood the media with false claims about the cost of Windows and the price of Vista 10 (not even released yet) in particular

READERS have let us know that Microsoft propagandist Ed Bott is spreading the ‘free’ Vista 10 myth (it’s out there again and spreading quickly in corporate media; it’s a myth that is not dead, despite a lot of debunking [1, 2, 3, 4, 5, 6]). It reaches a large audience in the CBS-owned ZDNet, despite being a lie and a nasty form of PR. No matter how it turns out (Microsoft Peter already admits that Microsoft just lies about ‘free’ Vista 10 this time too), a lot of the public may be left with the false impression about the cost of Vista 10. This propaganda or semi-truths (i.e. lies) would target ‘useful idiots’ or people who hardly follow the news. Many still think that Vista 10 will be made available free of charge. There is a war on the minds.

“People choose GNU/Linux not just for cost savings; some people are capable of thinking long term and factor in external transactional aspects.”Freedom, as ever before, is not free, so even if Vista 10 is somehow obtained (legally or illegally) at no cost it is not worth it; the price is people’s control over their own lives.

For those who truly pursue Free software on computers (as well underlying hardware, which assures freedom in other ways) there is now “Purism”. $1,649 will buy you a secure laptop with only Free software. As ZDNet (surprisingly enough) put it the other day:

The company hopes to expand the notebook lineup running its open-source PureOS with a smaller, $1,649 portable that will ship in September if it receives sufficient backing.

$1,649 may sound like a lot of money, but for a machine that can serve a person for many years (almost a decade) and ensure autonomy, privacy etc. in an age of increasingly-oppressive technology it might actually be worth it. People choose GNU/Linux not just for cost savings; some people are capable of thinking long term and factor in external transactional aspects. Windows lock-in is far too expensive even at $0 or negative pricing. Price can change over time and the abuses that come with proprietary software (e.g. espionage) are unforeseeable.

“Some weeks it looks like Redmond feels entitled to capture not just part of what we save, but all of it. That just isn’t going to fly with corporate America forever. When your margins are more sensitive to Bill Gates’ pricing whims than they are the price of oil, that’s an untenable position for a large company to be in.”

John Chapman Sr., BP Amoco Technology Executive

“They’ll get sort of addicted, and then we’ll somehow figure out how to collect sometime in the next decade.”

Bill Gates

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts