Gemini version available ♊︎

Links 9/10/2018: Plasma 5.14, Flatpak 1.2 Plan

Posted in News Roundup at 1:11 pm by Dr. Roy Schestowitz

GNOME bluefish



Free Software/Open Source

  • How Linux Is Changing The Face Of End-User Computing
  • DT’s Clauberg Sounds Warning on Profusion of Industry Groups

    A senior technology executive at Deutsche Telekom has warned the telecom sector it must avoid duplicating effort through the mishmash of industry associations and groups that have sprung up in recent years.

    Axel Clauberg, a vice president at the German operator, told an audience of telecom executives at this week’s SDN NFV World Congress that some groups would have to form partnerships to ensure they do not gobble up telco resources.

    “We have limited resources we can contribute into these organizations and the worst for me would be an overlap between organizations and duplication of efforts,” he said during a keynote presentation in The Hague. “Sometimes we have to step back and think about where we need to partner.”

    Clauberg’s warning follows a mushrooming of industry associations in the past decade as operators have wrestled with the technical and skillset challenges that surround the rollout of software-defined and virtualized networks.

  • Databricks Launches First Open Source Framework for Machine Learning

    Databricks recently announced a new release of MLflow, an open source, multi-cloud framework for the machine learning lifecycle, now with R integration.

    Databricks recently announced a new release of MLflow, an open source, multi-cloud framework for the machine learning lifecycle, now with R integration.

    RStudio has partnered with Databricks to develop an R API for MLflow v0.7.0 which was showcased at the Spark + AI Summit Europe.

    According to a release issued by the company, before MLflow, the machine learning industry did not have a standard process or end-to-end infrastructure to develop and produce applications simply and consistently.

  • Web Browsers

    • Mozilla

      • TenFourFox FPR10b1 available

        TenFourFox Feature Parity 10 beta 1 is now available (downloads, hashes, release notes). This version is mostly about expanded functionality, adding several new DOM and JavaScript ES6 features, and security changes to match current versions of Firefox. Not everything I wanted to get done for this release got done, particularly on the JavaScript side (only one of the ES6 well-known symbols updates was finished in time), but with Firefox 63 due on the 22nd we’ll need this period for sufficient beta testing, so here it is.

        The security changes include giving document-level (i.e., docshell) data: URIs unique origins to reduce cross-site scripting attack surface (for more info, see this Mozilla blog post from Fx57). This middle ground should reduce issues with the older codebase and add-on compatibility problems, but it is possible some historical add-ons may be affected by this and some sites may behave differently. However, many sites now assume this protection, so it is important that we do the same. If you believe a site is behaving differently because of this, toggle the setting security.data_uri.unique_opaque_origin to false and restart the browser. If the behaviour changes, then this was the cause and you should report it in the comments. This covers most of the known exploits of the old Firefox behaviour and I’ll be looking at possibly locking this down further in future releases.

      • Mozilla Firefox Collabs With Windows 10 Action Center for Push Notifications

        Similar to other browsers, Firefox supports push notifications but for some reason, it never used the Microsoft Windows 10 Action center for notifications. However, that is about to change with the in-development Mozilla Firefox build 64, as reported by Tech Radar.

        The browser is getting updated soon to support Windows 10 Action Center for notifications. The aim here is to improve the overall user experience and make it seamless to access your notifications from Mozilla Firefox.

  • BSD

    • DragonFlyBSD 5.3 Offering Some Performance Improvements

      Since the release of DragonFlyBSD 5.2 this past April there have been many improvements to this popular BSD operating system, including on the performance front. I recently wrapped up some fresh benchmarks of DragonFlyBSD 5.3-DEVELOPMENT for seeing what the performance is looking like in what will eventually be released as DragonFlyBSD 5.4.

      A lot of recent DragonFlyBSD coverage has been around its support/optimizations for Threadripper 2 with lead DragonFlyBSD developer Matthew Dillon being a big fan of these new high-core count CPUs. In this article though tests are being done from an Intel Xeon “Skylake” CPU for looking at the performance work outside of that scope.

  • Licensing/Legal

  • Programming/Development

    • 4 best practices for giving open source code feedback

      In the previous article I gave you tips for how to receive feedback, especially in the context of your first free and open source project contribution. Now it’s time to talk about the other side of that same coin: providing feedback.

      If I tell you that something you did in your contribution is “stupid” or “naive,” how would you feel? You’d probably be angry, hurt, or both, and rightfully so. These are mean-spirited words that when directed at people, can cut like knives. Words matter, and they matter a great deal. Therefore, put as much thought into the words you use when leaving feedback for a contribution as you do into any other form of contribution you give to the project. As you compose your feedback, think to yourself, “How would I feel if someone said this to me? Is there some way someone might take this another way, a less helpful way?” If the answer to that last question has even the chance of being a yes, backtrack and rewrite your feedback. It’s better to spend a little time rewriting now than to spend a lot of time apologizing later.

    • 6 tips for receiving feedback on your open source contributions

      In the free and open source software world, there are few moments as exciting or scary as submitting your first contribution to a project. You’ve put your work out there and now it’s subject to review and feedback by the rest of the community.

      Not to put it too lightly, but feedback is great. Without feedback we keep making the same mistakes. Without feedback we can’t learn and grow and evolve. It’s one of the keys that makes free and open source collaboration work.

    • What was your first open source pull request or contribution?

      Contributing to an open source project can be… Nervewracking! Magical. Boring?

      Regardless of how you felt that first time you contributed, the realization that the project is open and you really can contribute is quite awesome.

    • Stop hiring for culture fit: 4 ways to get the talent you want

      If you’re looking for talented people you can turn into cultural doppelgängers—rather than seeking to align productive differences toward a common goal—you’re doing it wrong.

    • Who was the first computer programmer?

      Ada Lovelace, daughter of the English poet Lord Bryon and Anne Isabella Noel Byron (née Milbanke), was arguably the world’s first computer programmer. Her notes on Babbage’s Analytical Engine, published as additions to her translation of Luigi Menabrea’s Sketch of the Analytical Engine Invented by Charles Babbage contain an algorithm for computing Bernoulli numbers.

      Some biographers downplay, or outright dismiss, Ada Lovelace’s contributions to computing, but James Essinger, author of “Ada’s Algorithm: How Lord Byron’s Daughter Ada Lovelace Launched the Digital Age” is a firm supporter of Lovelace’s place in the history of computing.


  • Health/Nutrition

    • ‘The CIA introduced LSD into American society. They weaponised it’

      It was eight years ago in a train station car park. Alan Glynn’s name came up on my phone and I answered immediately, hoping to hear gossip from the set of The Dark Fields, the movie adaptation of his 2001 debut novel, which was shooting in Philadelphia and New York at the time.

      “They want to change the title. To Limitless.”


      “I’m not going to let them.”


      “I can’t stop them though, can I?”

      You might have heard of Limitless. It starred Bradley Cooper and Robert De Niro, it grossed $161 million (€139 million) and it was that rare thing: a cinematic adaptation that did more than justice to its ingenious source material.


      The allure of MDT-40, Glynn’s mind-enhancing wonder drug that will not only unleash your full potential but induce other humans to engage favourably with you, is less equivocal in Under the Night.

      “It’s a broader application of what a drug like that might be able to do, it’s more positive. There’s a sense now that humans can and will be able to transcend what we think of as human limitations, the rate of technological development is so fast and so staggering that we will actually be able to do things that 20 years ago seemed like science fiction.”

    • Why some people are worried about drug patent protections in the new NAFTA

      A win because it would fend off competition from generics for a few extra years. That, of course, means a loss for makers of lower-price meds known as biosimilars. In Canada, they’d have to wait an extra two years to get to market, and that would keep prices high, said Jim Keon of the Canadian Generic Pharmaceutical Association. He said some U.S. biologic drugs make a billion dollars every year in Canada alone.

      “If you could introduce a biosimilar effectively into the market, the savings could be in the hundreds of millions of dollars, just on that one product alone,” Keon said.

  • Security

    • Google+ social network shut down after data leak exposed

      Alphabet, the parent company of Google, will shut down the Google+ social network after confirming on Monday that data from up to half a million user accounts may have leaked due to a bug in the system.

    • Google+ shutting down after data leak affecting 500,000 users

      Google Chief Executive Sundar Pichai knew of the glitch and the decision not to publicly disclose it, the WSJ reported. Based on a two-week test designed to measure the impact of the API bugs before they were fixed, Google analysts believe that data for 496,951 users was improperly exposed. According to the report:

    • RIP, Google+: long ailing and finished off by a security bug

      One bright spot in all this: the defect in Google+ was discovered through “Project Strobe,” a serious privacy and security audit of every Google product.

    • Project Strobe: Protecting your data, improving our third-party APIs, and sunsetting consumer Google+

      Many third-party apps, services and websites build on top of our various services to improve everyone’s phones, working life, and online experience. We strongly support this active ecosystem. But increasingly, its success depends on users knowing that their data is secure, and on developers having clear rules of the road.

    • Google+ Is Shutting Down After Data Breach

      Google has decided to shut down the consumer version of its failed social network Google+. This news comes in the wake of a previously undisclosed security flaw that exposed the data of the profile of users.

      The bug in question remained active between 2015 and 2018, and Google discovered it in March; during this period, the flaw affected more than 500,000 users. However, Google claims to have no evidence that suggests that any external developer or app had access to the data.

    • Google Concealed Data Breach Over Fear Of Repercussions; Shuts Down Google+ Service

      Google opted in the Spring not to disclose that the data of hundreds of thousands of Google+ users had been exposed because the company says they found no evidence of misuse, reports the Wall Street Journal. The Silicon Valley giant feared both regulatory scrutiny and regulatory damage, according to documents reviewed by the Journal and people briefed on the incident.

      In response to being busted, Google parent Alphabet is set to announce broad privacy measures which include permanently shutting down all consumer functionality of Google+, a move which “effectively puts the final nail in the coffin of a product that was launched in 2011 to challenge Facebook, and is widely seen as one of Google’s biggest failures.”

    • Google+ is Dead, Survived By Better Privacy Controls

      Earlier this year, Google started a project to review third-party developer access to Google accounts through the use of APIs. It found a security breach surrounding Google+, and is now shutting the service down, at least for consumers.

      The long and short of the issue is that there was a security hole that allowed third-party developers to access Google+ users’ account data, including name, email address, occupation, gender, and age—even if the account was set as private.. This isn’t particularly sensitive data, but regardless, a breach is a breach.

      The bug was discovered in March of 2018, but was presumed to have been open since sometime in 2015. To make matters slightly more troubling, Google only keeps this particular API’s data log for two weeks…so the company has no way of knowing which users were affected. Presumably, however, some 500,000 users were on the list.

    • How does TLBleed abuse the Hyper-Threading feature in Intel chips?

      A new side-channel attack called TLBleed abuses the Hyper-Threading feature of Intel chips. Researchers say there is a high success rate of TLBleed exploits, but Intel currently has no plans to patch it. How does TLBleed work, and what are the risks of not patching it?

    • Trusting the delivery of Firefox Updates

      Providing a web browser that you can depend on year after year is one of the core tenet of the Firefox security strategy. We put a lot of time and energy into making sure that the software you run has not been tampered with while being delivered to you.

      In an effort to increase trust in Firefox, we regularly partner with external firms to verify the security of our products. Earlier this year, we hired X41 D-SEC Gmbh to audit the mechanism by which Firefox ships updates, known internally as AUS for Application Update Service. Today, we are releasing their report.

      Four researchers spent a total of 27 days running a technical security review of both the backend service that manages updates (Balrog) and the client code that updates your browser. The scope of the audit included a cryptographic review of the update signing protocol, fuzzing of the client code, pentesting of the backend and manual code review of all components.

    • Reproducible Builds: Weekly report #180
    • Security updates for Tuesday
  • Defence/Aggression

  • Environment/Energy/Wildlife/Nature

    • To fix the climate crisis, we must face up to our imperial past

      There are many ways to see colonialism. A breakneck rush for riches and power. A permanent pillage of life. A project to appropriate nature, to render it profitable and subservient to the needs of industry.

      We can see colonialism as imposition, as the silencing of local knowledges, and erasure of the other. Colonialism as a triple violence: cultural violence through negation; economic violence through exploitation; and political violence through oppression (2).

      Colonialism was not a monolithic process, but one of diverse expressions, stages and strategies. Commercial colonialism, centred around ports, differed from settlement colonialism. But its common factor is that colonialism took states to seek access to new lands, resources and labourers. Impelled by God, fortunes or fame, with almost limitless ambition, countries and companies scrambled to acquire control of land. New territories were seen as business enterprises. Local inhabitants were either obstacles to be removed or workforces to be subjugated.

  • Finance

    • Amazon is reportedly planning checkout-free shops in the UK

      Amazon Go, for those unaware, is a store without checkouts – not even those automatic ones that yell about unidentified items in baggage areas. Instead, you scan in on your smartphone when you enter the store, and then just take items off the shelf and walk out the store. Your phone will register your exit, and your card will be charged later. Here it is being demoed by some impossibly good-looking people buying healthy things, rather than a six-pack of Stella and a scratch card.

    • Facebook’s UK tax bill rises to £15.8m – but it is still just 1% of sales

      The social media giant’s accounts show that while Facebook increased its UK income by more than 50% in 2017, its pre-tax profits increased by only 6% to £62.7m. The Silicon Valley-based company’s UK taxable profits were reduced by a £444m charge for unexplained “administrative expenses”.

      Globally, Facebook made $20bn (£15.3bn) of profit on total sales of $40bn last year, meaning it converted half of its sales into profits. However, in the UK only 5% of sales were converted into UK-taxable profits.

    • Huawei Says U.S. Blacklisting Will Only Raise U.S. Networking Hardware Prices And Delay 5G Deployment

      So we’ve noted for a while now how the U.S. government has deemed Chinese hardware vendor Huawei a nefarious spy for the Chinese government, and largely blackballed it from the U.S. telecom market. From pressuring U.S. carriers to drop plans to sell Huawei phones, to the FCC’s decision to ban companies from using Huawei gear if they want to receive federal subsidies, this effort hasn’t been subtle. But there’s numerous problems with the Trump administration’s efforts here, ranging from protectionism to blistering hypocrisy.

      While it’s certainly possible Huawei helps the Chinese government spy on American consumers en masse, nobody has been able to provide a shred of actual public evidence supporting that allegation. That despite an eighteen month investigation by the White House finding no evidence of actual spying on U.S. consumers. Also ignored: the fact that U.S. hardware vendors like Cisco routinely like to hype this threat to scare gullible lawmakers toward protectionism and providing Cisco an unearned advantage in the network and telecom market.

      Even if you want to ignore those facts and still claim Huawei routinely spies, you’d have to ignore the fact that countless hardware, including gear made by U.S. companies, contains an ocean of Chinese-made parts that could just as easily be used to spy on Americans. The reality is that China doesn’t even need Huawei to spy on Americans. The internet of broken things sector alone provides millions of new potential attack vectors annually that are often exploited by intelligence agencies.

  • AstroTurf/Lobbying/Politics

    • Heidi Heitkamp was ready to vote ‘yes’ on Kavanaugh. Then she watched him with the sound off.

      Sen. Heidi Heitkamp was ready to vote ‘yes’ on Supreme Court nominee Brett Kavanaugh.

    • Facebook ads for Kavanaugh confirmation targeting swing states
    • New Partnership Will Help Us Hold Facebook and Campaigns Accountable

      We launched a new collaboration on Monday that will make it even easier to be part of our Facebook Political Ad Collector project.

      In case you don’t know, the Political Ad Collector is a project to gather targeted political advertising on Facebook through a browser extension installed by thousands of users across the country. Those users, whose data is gathered completely anonymously, help us build a database of micro-targeted political ads that help us hold Facebook and campaigns accountable.

      On Monday, Mozilla, maker of the Firefox web browser, is launching the Firefox Election Bundle, a special election-oriented version of the browser. It comes pre-installed with ProPublica’s Facebook Political Ad Collector and with an extension Mozilla created called Facebook Container.

    • Let Us Know About Voting Problems During the Midterm Elections

      The election is only 28 days away. If you’re planning to vote, either on Nov. 6 or during your state’s early voting period, we need you to be our eyes and ears as we look for voting problems across the country.

      We’re on the lookout for any problems that prevent people from voting — such as long lines, registration problems, purged voter rolls, broken machines, voter intimidation and changed voting locations.

    • Obama endorses DSA’s Ocasio-Cortez, along with CIA Democrats

      Last week, Barack Obama endorsed several hundred Democratic Party candidates running in key state and congressional midterm races around the country. “Today, I’m proud to endorse … Democratic candidates who aren’t just running against something, but for something,” declared the former US president.

      Most politically significant among Obama’s endorsements was Democratic Socialists of America member Alexandria Ocasio-Cortez, who is running for Congress in New York. In response to Obama’s endorsement, Ocasio-Cortez tweeted a courteous “Thank you, [Barack Obama]. Time to bring it home this November. Help us organize for healthcare, housing, education, and justice for all.”

      This effective reverse endorsement by Ocasio-Cortez for Obama, whom she has never criticized, is also a declaration of solidarity with the Obama administration’s policies. The administration oversaw the bailout of Wall Street and a massive transfer of wealth to the corporate and financial elite; an attack on health care fraudulently packaged as a reform; the deportation of 3 million immigrants, more than any president before him; and eight years of unending war, including drone assassinations and the expansion of the intelligence apparatus’ spying on the population.

    • Election Experts: We Need You

      Electionland is gearing up for the midterms, and we’re looking for experts in election administration and election law to be part of an expert database. We’d love to have you participate. Our goal is to ground real-time coverage of elections in fact and context — you could be a huge part of helping us achieve it.

      Electionland 2016 was the largest-ever collaborative journalism project around a single event, with more than 1,000 journalists and technologists participating. We covered the voting experience on Election Day — from long lines to equipment failures to voter intimidation. We sifted through thousands of call-center records, social media posts and text messages, referring real problems to local journalists who covered the issues in real time. You can read an entire case study about it here.

    • The Hidden Money Funding the Midterms

      Allies of Senate Majority Leader Mitch McConnell used a blind spot in campaign finance laws to undercut a candidate from their own party this year — and their fingerprints remained hidden until the primary was already over.

      Super PACs, which can raise and spend unlimited sums of money in elections, are supposed to regularly disclose their funders. But in the case of Mountain Families PAC, Republicans managed to spend $1.3 million against Don Blankenship, a mustachioed former coal baron who was a wild-card candidate for a must-win West Virginia Senate seat, in May without revealing who was supplying the cash.

  • Censorship/Free Speech

    • Jamal Khashoggi’s disappearance fits a brutal new pattern

      Their alarm shows just how widely the crackdown is being felt. Whatever the ultimate fate of Khashoggi, Saudi Arabia’s new zero-tolerance approach to dissent is being broadcast loud and clear.

    • Silicon Valley-Loving Saudi Prince at Center of Scandal Over Missing, Possibly Murdered Journalist

      On October 2nd, 2018, Saudi journalist-in-exile and frequent critic of the country’s ruling monarchy Jamal Khashoggi, a U.S. resident, entered the Saudi Consulate in Istanbul to obtain routine documentation for his upcoming marriage to his Turkish fiancée Hatice Cengiz. He was never seen leaving—and, according to the New York Times, Turkish officials are anonymously confirming that investigators believe he was killed inside. Other sources said he may have been later dismembered to smuggle his body out of the building.

      Much remains unknown about what happened inside the embassy. The Times noted that Turkish officials have been reluctant to publicly accuse the Saudi government of killing Khashoggi, and the Saudi government has been adamant no such thing happened. It’s possible that instead of being brazenly murdered, Khashoggi was the subject of a brazen kidnapping. The Washington Post’s sources, however, said one source relayed that investigators believe a 15-man Saudi assassination team arrived in Turkey as part of a “preplanned murder.” And the incident has put Saudi Crown Prince Mohammed bin Salman, the day-to-day ruler of the kingdom who has promoted himself as a reformer and robot-loving tech innovator while simultaneously cracking down on dissent, right in the spotlight.

    • Media owner Jeff Bezos snapped laughing with Saudi prince accused of having a journalist murdered

      Bezos is pictured with the same Saudi prince whose regime journalists and the Turkish government believe has murdered a Washington Post contributor.

      Jamal Khashoggi entered a Saudi consulate in Istanbul to obtain official recognition that he’s divorced his ex-wife. Khashoggi’s Turkish fiancée waited outside for 11 hours, but the dissident journalist reportedly never returned.

      Turkish officials insist that’s because a 15-man Saudi hit squad murdered him. They say they have “concrete proof”, although they haven’t yet provided any. Saudi Arabia said the allegations were “baseless”. Meanwhile, journalists familiar with Khashoggi are treating a Saudi-planned murder as the most likely story. Middle East Eye editor and former Guardian chief foreign writer David Hearst called it “a murder that comes straight out of a scene of Pulp Fiction“.

    • These columns allegedly spurred Saudi Arabia to kill journalist Jamal Khashoggi

      Khashoggi left Saudi Arabia for self-imposed exile in the US after he was allegedly warned to stop tweeting, and his al-Hayat newspaper column was canceled. The 59-year-old started writing for the Washington Post’s opinion section in 2017, and has more than 1.6 million Twitter followers.

    • Polytechnic University students end hunger strike after school backs down over censorship row

      Three students at the Hong Kong Polytechnic University have ended a 44-hour-long hunger strike after the school agreed to their demands on Sunday.

      The students were protesting the university’s decision to take back parts of the “Democracy Wall,” a campus bulletin board. The decision was made after the student union refused to remove messages supporting Hong Kong independence, which started appearing on the wall in late September.


      Since September 24, the student union converted parts of the Democracy Wall to a “Lennon wall” in commemoration of the fourth anniversary of the Umbrella Movement, during which a similar wall was set up in Admiralty.

    • ‘Goblin Slayer’ Reveals Major Censorship Changes

      The Fall 2018 anime season is packed to the brim with major returns and premieres, but the standout among these new releases is the mysterious Goblin Slayer. Setting itself up to be the darkest series of the season, the premiere unleashes a gross level of brutality.

      But there were a few changes from the brutal events of the manga, which were major, but the anime was more effective with its scenes thanks to the censorship of a certain traumatic event.

    • Myanmar: Censorship board bans nude scenes in film about Austrian painter Egon Schiele

      The European Film Festival in Yangon cancelled screenings of an Austrian movie about painter Egon Schiele after the Myanmar censorship board banned scenes in the film containing nudity on 21 September, reported Frontier.

      The Goethe-Institut in Yangon was due to show the film Egon Schiele: Death and the Maiden as part of the 27th annual European Film Festival on 22 and 30 September. But when the censorship board said it wanted to censor the film’s nude scenes, the screenings were cancelled.

      “We want to keep our independence and we do not accept censorship in our institution, therefore we decided not to screen the movie at all,” Franz Xaver Augustin, director of the German cultural association Goethe-Institut Myanmar, told Frontier.

    • We’ve got a front-row seat for Europe’s internet censorship plan

      The EU’s wide-ranging plan for indiscriminate internet censorship has progressed from a vote in the European Parliament and now reps from the EU will meet with reps from the 28 countries that make up the EU to hammer out the final text that will be put to the Parliament for what might be the final vote before it becomes law.

      Normally this next phase — the “trilogues” — would be completely secret. But a European Court of Justice recently ruled that the public has a right to know what happens behind the trilogues’ closed doors, and Julia Reda, the German Pirate Party MEP who led the fight over censorship in the new Copyright Directive, has promised to publish all the documents from the trilogues. It’s a European first.

    • Thomas Goolnik Gets Google To Forget Our Story About Him Getting Google To Forget Stories About Thomas Goolnik

      You’ll recall, of course, that prior to the GDPR, there was a big case against Google in the EU that created, out of thin air, a “right to be forgotten” (perhaps, more accurately, “a right to be delinked”) saying that for certain classes of information that showed up in Google’s search index, it should be treated as personal data that had to be delinked from that user’s name as no longer relevant. This never made any sense at all. A search result is not like out-of-date customer database info, yet that’s how the Court of Justice in the EU treated it. Unfortunately, with the General Data Protection Regulation (GDPR) going into effect earlier this year, the “right to be forgotten” was even more officially coded into law. We’ve noted recently, there have been a few attempts to use the GDPR to delete public information on American sites, and now we at Techdirt have been hit with what appears to be just such an attempt.

      This particular attempt goes back to some previous attempts under the pre-GDPR “right to be forgotten” setup. We need to dig into the history a bit to understand the details. You see, soon after the floodgates opened on delinking names from Google, we wrote about an article in the NY Times discussing how five of its articles had been delinked via RTBF claims. It was not 100% clear who had made the requests, but we did highlight some of the names and stories, including one where we called the removal “questionable.” It involved a NY Times article from 2002 about a legal action by the FTC which went after a group of companies allegedly run by a guy named Thomas Goolnik. The companies — TLD Network, Quantum Management and TBS Industries — were accused of “unfair or deceptive acts or practices” by selling domains that did not exist at the time (specifically, they were trying to sell domains using top level domains that did not exist, including .sex, .bet, .brit, and .scot.)

    • Federal Court Dumps Another Lawsuit Against Twitter For Contributing To Worldwide Terrorism

      The lawsuits against social media companies brought by victims of terrorist attacks continue to pile up. So far, though, no one has racked up a win. Certain law firms (1-800-LAW-FIRM and Excolo Law) appear to be making a decent living filing lawsuits they’ll never have a chance of winning, but it’s not doing much for victims and their families.

      The lawsuits attempt to route around Section 230 immunity by positing the existence of terrorists on social media platform is exactly the same thing as providing material support for terrorism. But this argument doesn’t provide better legal footing. No matter what approach is taken, it’s still plaintiffs seeking to hold social media companies directly responsible for violent acts committed by others.

      Eric Goldman has written about another losing effort involving one of the major players in the Twitter terrorism lawsuit field, Excolo Law. Once again, the plaintiffs don’t present any winning arguments. The California federal court doesn’t even have to address Section 230 immunity to toss the case. The Anti-Terrorism Act allegations are bad enough to warrant dismissal.

    • Prize a defeat for Australian censorship – Manus refugee

      Mr Boochani regularly contributes to the Guardian and the Saturday Paper in Australia but said other publications supported the Australian government’s efforts to restrict information about its offshore detention regime.

      “The Australian government couldn’t keep two thousand people, including children and women, in a harsh prison camps on Manus and Nauru without systematic censorship,” Mr Boochani said.

      “I have many experiences working with the media in Australia and also internationally over the past five years and I know that the government always tries to manage the information and censor the situation,” he said.

      “But after five years I think they are defeated because international media and public opinion are aware completely of what the government has done on Manus and Nauru.”

      The Guardian reported that the award’s organisers paid tribute to Boochani’s “commitment to condemning a fact which has been intentionally kept out of the spotlight”.

    • China flexes its political muscles in Africa with media censorship, academic controls

      When he announced another US$60-billion in financing for Africa last month, Chinese President Xi Jinping promised that the money had “no political strings attached.”

      But a series of recent incidents, including cases of media censorship and heavy-handed academic controls, have cast doubt on that promise. China’s financial muscle is rapidly translating into political muscle across the continent.

      At a major South African newspaper chain where Chinese investors now hold an equity stake, a columnist lost his job after he questioned China’s treatment of its Muslim minorit

      When he announced another US$60-billion in financing for Africa last month, Chinese President Xi Jinping promised that the money had “no political strings attached.”

      But a series of recent incidents, including cases of media censorship and heavy-handed academic controls, have cast doubt on that promise. China’s financial muscle is rapidly translating into political muscle across the continent.

      At a major South African newspaper chain where Chinese investors now hold an equity stake, a columnist lost his job after he questioned China’s treatment of its Muslim minorit

    • Metea Valley High student journalists move on from censorship debate

      Two student journalists at Metea Valley High School in Aurora say their work was censored when administrators prevented them from airing a broadcast story about a new restaurant because of footage showing alcohol.

      But student reporters for “The Mane,” a show that airs every two weeks, say they’ve made their case and it’s time to move on.

      Instead of continuing to push to air their review of VAI’s Italian Inspired Kitchen + Bar or taking legal action, reporters Triya Mahapatra and Laurel Westphal say they’re on deadline and focused on their next stories.

    • How the Ugandan media has borne the brunt of censorship for decades

      But for many in the media this was nothing new, as intimidation and violence is an almost daily threat. Uganda is now ranked 117th out of 180 countries in Reporters Without Borders’ 2018 World Press Freedom Index, five places lower than in 2017.

      Uganda has a long history of media censorship. The country’s first post independence head of government, Milton Obote who became prime minister in 1962, banned the intellectual Rajat Neogy’s Transition magazine. Idi Amin overthrew Obote in 1971 – during his regime, key journalists disappeared without trace.

  • Privacy/Surveillance

    • US Whistleblowers Launch Intelligence Startup in Europe

      William Binney and J. Kirk Wiebe had been working on a technology that could help to prevent terrorist threats. With over 30 years of experience in the National Security Agency (NSA), the pair worked relentlessly on systems and protocol that would aid security enhancement to millions of people across the country and further across the world.

    • From NSA Whistleblowers to Analytics Entrepreneurs

      A pair of NSA analysts who blew the whistle on the spy agency’s misuse of their security and privacy controls have come out of retirement to form a startup providing data analytics services based on a proprietary “decision intelligence” framework.

      Whistleblowers Bill Binney and Kirk Wiebe announced they are launching Pretty Good Knowledge to provide “strategic advisory and project services” to commercial and government clients. Those services include real-time decision intelligence that scales.

      The partners said they have completed prototype projects over the last year involving European government agencies and financial services companies.

      Since leaving NSA, Binney and Wiebe have been working with data scientists “on how to conduct data analysis in ways which are more powerful in producing relevant results, while respecting the law and the human right to privacy,” according to the startup, which emerged on Monday (Oct. 8).

    • NSA whistleblowers come out of retirement to launch data intelligence startup

      If you’re looking for an ordinary story of Silicon Valley startup founders, then keep looking, because Bill Binney and Kirk Wiebe aren’t your run-of-the-mill tech presidents. The two men spent decades at the National Security Agency before making their legacies known as whistleblowers when they alerted politicians, and ultimately the public, to an abusive spy program called Trailblazer.

      Though Binney and Wiebe had developed their own safer prototype that they say could have identified and prevented the 9/11 attacks, the NSA chose to ignore the model in favor of the more expensive and less efficient Trailblazer.


      As data companies become bigger and more influential – the International Data Corporation (IDC) estimates international revenues for big data businesses will grow to more than $203 billion by 2020 – Pretty Good Knowledge wants to position itself as a helping hand that can reveal important insights into a given operation.

      “Most organizations are wasting money trying to manage more data than they can handle. Others are missing out on business value by not utilizing the data they already have,” said Wiebe, the Director of Analytics at Pretty Good Knowledge. “At Pretty Good Knowledge we work closely with you to make the impact of data on your business measurable, meaningful and scalable.”

    • The Total Censorship Era: Chinese Journalists Reflect on Their Experiences

      On September 9, Hong Kong-based Initium Media published a lengthy article by freelancer Jiang Yannan which included several oral accounts from journalists and media employees working in various publications and websites in China. In their interviews, they discuss the current state of journalism in China and how the increasing restrictions on the media under Xi Jinping are impacting their day-to-day work. These accounts provide valuable firsthand details about dealing with propaganda directives, sensitive words on internet platforms, and other forms of censorship that they face as a matter of routine. One interviewee asks, “Right now, the scariest thing is that we don’t know where the ‘bottom line’ is. In the end, how low will it go?”

    • China’s New Cybersecurity Regulations Allow Unfettered Police Search, Inspections of Internet-Service Providers

      Beijing is expanding its draconian measures to police the internet to include service providers and any company that uses the internet in China, according to a recent announcement by Chinese state media.

      The latest “internet safety supervision and inspection regulations” announced by China’s Ministry of Public Security were reported by China’s state-run Xinhua on Oct. 4.

      Chinese internet-service providers include China Telecom, China Unicom, and China Mobile.

    • DHS and GCHQ join the China spy BS brigade

      Last week Bloomberg unveiled a weighty report which pointed the finger at the Chinese government for an in-depth and delicate espionage campaign which would have shaken the telco industry’s global supply chain. By allegedly compromising motherboards produced by Super Micro, the security protocols and trade secrets of more than 900 companies have been directly compromised. Who knows how wide the web could spread when you look at the indirect implications, partners who use the infected networks or collateral damage.

      While the claims have been refuted by all the parties involved, including Apple and AWS, and despite confidence from the DHS and the National Cyber Security Centre, a division of GCHQ, without a denial from the body likely to be conducting the supposed investigation, the CIA, or a flat-out rejection from the White House, there is still an air of possibility.

    • Facebook’s security is so bad it’s surprising Zuckerberg hasn’t deleted his account

      This latest blunder also builds on our picture of Facebook as unreliable and undependable, but this time it’s because they can’t protect us, not because they won’t. The Cambridge Analytica story was shocking but unsurprising: it revealed that Facebook didn’t care about our data, except insofar as it could sell it off, packaging it up for the consumption and use of the highest bidder. While it was scandalous that data-hungry, advertiser-friendly Facebook had even allowed such a feature as the one that allowed people to click away their friends’ data, it was in line with their data-hungry, advertiser-friendly MO. The truth about the social network, only vaguely obscured, became clear –Facebook was happy for advertisers to leach our data, to look the other way, as long as it kept advertisers’ happy – but we kept on using it, taking more personal care. Being on Facebook, for those of us who remained, hasn’t felt the same since.

    • How to get all your stuff out of Facebook before deleting it

      Ronald Langeveld has had enough, but realized you have to do more than simply quit: you gotta get years of your stuff out, too. He posted instructions on exfiltrating all your photos, comments and posts before ridding yourself of Facebook.

    • The USMCA, international trade and your digital rights

      While the USMCA will primarily impact North American residents, there are a number of changes that could have greater implications for the broader digital community. The deal also highlights key negotiating priorities for member countries, which may be reflected in future global trade agreements.

    • Walmart Patent Wants To Monitor Your Health & Stress Levels While You Shop

      The patent states that “the shopping cart, upon being moved, ‘wakes up’ from being in a low-power or ‘sleep’ state mode.”

      Then, readings on temperature, pulse, speed, and the force at which someone grips the handle or pushes the cart would be used to create a baseline of the customer’s condition.

    • Internet Australia asks Dutton to consult widely on encryption bill

      Internet Australia, a not-for-profit that claims to represent Internet users in the country, has urged Home Affairs Minister Peter Dutton to interv ene in what it characterises as “the inadequate consultation process” over the encryption bill that was presented to Parliament last month.

  • Civil Rights/Policing

    • Tech workers are downing tools and refusing to work on unethical projects

      It’s part of a wider movement to formulate an ethical basis for technical work (here’s a list of more than 200 university tech ethics syllabi) and a sense among established and new engineers that their work has an all-important ethical dimension.

    • Tech Workers Now Want to Know: What Are We Building This For?

      Across the technology industry, rank-and-file employees are demanding greater insight into how their companies are deploying the technology that they built. At Google, Amazon, Microsoft and Salesforce, as well as at tech start-ups, engineers and technologists are increasingly asking whether the products they are working on are being used for surveillance in places like China or for military projects in the United States or elsewhere.

      That’s a change from the past, when Silicon Valley workers typically developed products with little questioning about the social costs. It is also a sign of how some tech companies, which grew by serving consumers and businesses, are expanding more into government work. And the shift coincides with concerns in Silicon Valley about the Trump administration’s policies and the larger role of technology in government.

    • China’s “Missing” Actress Fan Bingbing Back in Beijing After Secret Detention

      On Wednesday, China’s tax authorities slapped Fan with a fine equivalent to about $130 million (nearly 892 million yuan) for tax evasion and other offenses. She then issued her first public statement in months — a groveling apology to the Communist Party of China and the public at large, admitting to all wrongdoing and begging for forgiveness.

      A central issue that remained unclear, however, was where Fan had been during the intervening months, and whether she had regained her freedom. The star, usually a ubiquitous presence at glamorous events of East and West, still hasn’t been seen in public since July 1.

    • Shuffled Between Jails By Bureau Of Prisons, Reality Winner Hasn’t Been Outside For Weeks

      More than a month ago, former NSA contractor Reality Winner was sentenced to federal prison. Yet, instead of directly transferring Winner to the facility where she will serve her sentence, the Federal Bureau of Prisons has shuffled her around from county jail to county jail for the past weeks.

      Winner was charged with violating the Espionage Act after she mailed a copy of a classified report from the NSA on alleged Russian hacking of voter registration systems to the Intercept. She accepted a plea deal on June 26 and was sentenced to five years and three months in prison on August 23, which was the longest sentence ever for a person accused of an unauthorized disclosure.

      As of October 8, Winner is at Grady County Jail in Chickasha, Oklahoma, which is a facility the Bureau of Prisons uses for overflow when there are not enough beds. She has heard she could be at the facility for up to 30 days but hopes she will be on a bus to Federal Medical Center Carswell in Fort Worth, Texas, on October 9, where she will serve the bulk of her sentence.

      Winner said she tries “not to dwell on the negative,” but also declared, “We keep saying it can’t get any worse, and it seems like they’ve taken that as a challenge,” when referring to Grady County Jail.

      “It’s one filthy warehouse, eighty-plus women. One shower. Couple toilets. There’s no services. No programs. No recreation. We’re just in here 24/7,” Winner shared.

    • Texas Panel Faults Lab Chemist in Bryan Case for “Overstated Findings” and Inadequate DNA Analysis

      An influential state commission issued a highly critical assessment on Friday of a second key player in the murder conviction of Joe Bryan, saying a Texas Department of Public Safety crime lab chemist had “overstated findings, exceeded her expertise and engaged in speculation” when she testified in 1989.

      In a report issued at its quarterly meeting, the Texas Forensic Science Commission also found that the now-retired chemist, Patricia Retzlaff, failed to do thorough analysis of key DNA evidence in 2012, after a judge allowed such testing.

    • US Told Vilnius Unable To Submit Information On CIA Secret Prison – Prosecutor’s Office

      Washington did not give Lithuania the information on alleged illegal transfer of people across the border to be kept in secret jails run by the Central Intelligence Agency (CIA), the Lithuanian Prosecutor’s Office said on Monday.

      The European Court of Human Rights (ECHR) ruled in May that Lithuania and Romania were knowingly hosting CIA secret prisons in 2000s.

      “In response [to the prosecutors' request], it was said that the United States is not able to supply the required information or responses to the questions of Lithuanian prosecutors,” the statement of the Prosecutor’s Office read.

      According to the prosecutors, the preliminary trial is ongoing.

      “The prosecutor’s office is stressing that all circumstances can be determined and assessed only after all the necessary information has been collected,” the statement read.

      The Lithuanian Prosecutor’s Office noted that the requests were sent to the United States, Poland and Romania as well as other states in 2015.

    • Zambia’s journey to Chinese slavery and colonization

      So much has been said past weeks about a possible takeover of our great country, Zambia by the Chinese, an impossible thing to imagine, there has been the issue of Chinese policemen, then Chinese nationals seen driving state owned Zesco vehicles, could this be a sign that we are already bought as a people, and that we are headed for slavery and potential re-colonization? Well let’s break this down, and to do this we will have to take a peek into both African Slave trade and colonization.

      I will first deal with the results of both slavery and colonization before talking about how we got to that point.

  • Intellectual Monopolies

    • The IP cases the US Supreme Court will rule on this term

      The Supreme Court has already taken on one patent case and two copyright cases. We preview those and ask what other intellectual property cases have a chance of being granted cert

    • A 2012 Connecticut Informal Ethics Opinion that is a Doozy!

      But, when it’s not clear: I’ve written about this issue a few times, and there are six or so cases where lawyers have been sued, disqualified, or a privilege has been lost. (Search for DePuy on patentlyo and you’ll find the last of these).

      So, that brings me to Connecticut Informal Ethics Opinion 2012-02, here. It says that even if the agreement says “Company A’s lawyers don’t represent Company B, or its employees” in-house lawyer for Company A has an attorney client relationship with Company B and its employee-inventors. Company A’s lawyer can never be adverse to Company B in the same/related matter.

    • The Role of Objective Indicia in Non-Obviousness Doctrine

      In 2014, Nash Manufacturing, Inc. (“Nash”) brought its wakeboarding invention, the “Versa Board,” to market. The Versa Board had several holes on the top surface of the board that allowed users to attach handles or foot bindings in various configurations, but Nash warned its users against having the handles attached to the board while standing. If a user theoretically ignored Nash’s warnings, the user could attach the handles and foot bindings in a configuration that paralleled the method of riding that ZUP described in the ZUP Board patent.

      ZUP filed an infringement claim against Nash. Nash counterclaimed, seeking a declaration of non-infringement and invalidity on obviousness grounds. ZUP presented evidence of secondary considerations to the district court. However the district court found the claims obvious in light of a combination of six prior patents involving water recreational boards. Images of some of the prior art patents are shown below.

    • Trademarks

      • Fiji Government to contest ‘Bula’ trademark by US bar, says it is a ‘blatant case of heritage-hijacking’

        Tensions have grown in recent weeks after Florida-based Ross Kashtan trademarked the common Fijian greeting for his bar Bula on the Beach, sparking heated online debate and a petition by those seeking to protect the word.

        Mr Sayed-Khaiyum said Fiji’s Government was “shocked and outraged” and described the bula trademark as a “blatant case of heritage-hijacking”.

        “We would never give permission for anyone — particularly someone outside of Fiji looking to profit — to effectively claim ownership of bula, a word so deeply-rooted in our national identity that it has become synonymous with Fiji itself,” Mr Sayed-Khaiyum said.


        “It will be really good as well for the trademark office in America and also trademark offices around the world — with the support of WIPO in Geneva — that there should be some sort of guidelines that have to be developed so that questions needed to be asked to business people who want to trademark words, or music, or designs, or whatever they want to trademark, that it’s not theirs.”

        The Fiji Government’s move comes after a Fiji opposition MP, Niko Nawaikula, said he would consider taking the fight to the United Nations’ mechanisms of redress for indigenous peoples.

        The word bula, or combinations of words including bula, have been trademarked at least 43 times in the United States, as well as in other countries, including Australia.

        The ABC sought comment from the Bula bar but were asked to make all requests via their website.

    • Copyrights

      • WIPO Broadcasting Treaty Unfit For Needs, Might Jeopardize Access To Culture, Scholar Says

        World Intellectual Property Organization delegates have been negotiating a treaty aimed at protecting broadcasting organisations against signal piracy without success for the last two decades but has started to show signs of movement at the UN agency. A seminar held by a civil society group last week explored the potential implications of such a treaty on access to culture. At the event, a well-known copyright specialist argued that the current draft treaty being discussed, intended to update a 1961 treaty, does not take into consideration changes that took place since then, and in particular the transformation of broadcasting in the digital age.


        In the Rome Convention, this is exactly why neighbouring rights for phonogram producers and broadcasting organisations were justified, he said. Both industries, at the time, required huge up-front investments and both were vulnerable to piracy. From the emergence of broadcasting in the 1930s, the industry required massive investments for a number of things such as the production, recording, broadcasting studios, and transmission infrastructures. “It was a very expensive operation,” he said.

        However, with the proliferation of low-cost and high-quality digital recording technologies, the technical costs of radio and television production costs “dramatically” fell, and with the broadband internet, the costs of distributing audiovisual content are approaching zero, he said.

        In 2018, “all you need to be in broadcasting is a smartphone, a microphone, a headset, and a broadband internet connection with access to a radio or a television streaming channel,” according to Hugenholtz. He went on citing the numerous video channels on the internet, such as YouTube, and the social medial and “countless” radio stations and podcasts available online.

        Many of those low-budget or no-budget broadcasts reach a sizeable audience and make substantial amounts of money without the incentive of broadcasters rights, he said.

      • New Copyright Exceptions Treaty Proposed By Civil Society; Seeking Country Support

        Negotiations on possible exceptions to copyright for specific actors such as libraries, archives, universities and research institutions at the World Intellectual Property Organization have been stalling for years. Last week, a group of civil society organisations published a proposed draft treaty text for copyright exceptions for educational and research activities. Now they are seeking support from WIPO members to shoulder the text.

        Limitations and exceptions to copyright will be discussed again at the 37th session of the WIPO Standing Committee on Copyright and Related Rights, which will take place from 26-30 November.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New

  1. IRC Proceedings: Tuesday, October 19, 2021

    IRC logs for Tuesday, October 19, 2021

  2. Links 19/10/2021: Karanbir Singh Leaves CentOS Board, GPL Violations at Vizio

    Links for the day

  3. [Meme] Giving the Knee

    The 'knee' champion Kratochvìl and 'kneel' champion Erlingsdóttir are simply crushing the law; they’re ignoring the trouble of EPO staff and abuses of the Office, facilitated by the Council itself (i.e. facilitated by themselves)

  4. Josef Kratochvìl Rewarded Again for Covering Up EPO Corruption and the EPO Bribes the Press for Lies Whilst Also Lying About Its Colossal Privacy Violations

    Corrupt officials and officials who actively enable the crimes still control the Office and also the body which was supposed to oversee it; it's pretty evident and clear judging by this week's press statements at the EPO's official Web site

  5. [Meme] Sorry, Wrong Country (Or: Slovenia isn't Great Britain)

    Team UPC is trying to go ahead with a total hoax which a high-level European court would certainly put an end to (if or when a referral is initiated)

  6. How Denmark, Iceland, Finland, Norway and Sweden Voted on Patently Unlawful Regulations at the EPO

    We look back and examine what happened 8 years ago when oppressed staff was subjected to unlawful new “regulations” (long enjoyed by António Campinos, the current EPO autocrat)

  7. The EPO’s Overseer/Overseen Collusion — Part XVII: The Non-Monolithic Nordic Bloc

    We start our investigation of how countries in northern Europe ended up voting on the unlawful “Strike Regulations” at the EPO and why

  8. Proof That Windows “11” is a Hoax

    Guest post by Ryan, reprinted with permission

  9. Firefox Becomes as Morally Reprehensible as Apple, Facebook, or Uber

    Guest post by Ryan, reprinted with permission

  10. Links 19/10/2021: GNU dbm 1.22 and Godot 3.4 RC 1

    Links for the day

  11. [Meme] [Teaser] GitHub an Expensive and Dangerous Trap (Also: Misogyny Hub)

    The ongoing Microsoft GitHub exposé will give people compelling reasons to avoid GitHub, which is basically just a subsidised (at a loss) trap

  12. Norway Should Have Voted Against Benoît Battistelli's Illegal (Anti-)'Strike Regulations' at the European Patent Office

    Benoît Battistelli‘s EPO faced no real and potent opposition from Norwegian delegates, who chose to abstain from the vote on the notorious and illegal so-called ‘Strike Regulations’ (they’re just an attack on strikes, an assault on basic rights of labourers)

  13. Links 19/10/2021: Sequoia PGP LGPL 2.0+, Open RAN Adoption

    Links for the day

  14. [Meme] [Teaser] Benoît Battistelli, King of Iceland

    Later today we shall see how the current deputy of the head of the EPO‘s overseeing body was in fact likely rewarded for her complicity in Benoît Battistelli‘s abuses against EPO staff, including staff from Iceland

  15. IRC Proceedings: Monday, October 18, 2021

    IRC logs for Monday, October 18, 2021

  16. Links 19/10/2021: MyGNUHealth 1.0.5 and Ubuntu 22.04 Now Developed

    Links for the day

  17. [Meme] [Teaser] Thrown Under the Bus

    Tomorrow we shall look at Danish enablers of unlawful EPO regulations, Jesper Kongstad and Anne Rejnhold Jørgensen

  18. The World Needs to Know What Many Austrians Already Know About Rude Liar, the Notorious 'Double-Dipper'

    Today we publish many translations (from German) about the Austrian double-dipper, who already became the subject of unfavourable press coverage in his home country; he’s partly responsible for crushing fundamental rights at the EPO under Benoît Battistelli‘s regime

  19. The EPO’s Overseer/Overseen Collusion — Part XVI: The Demise of the Austrian Double-Dipper

    Friedrich ‘Rude Liar’ Rödler is notorious in the eyes of EPO staff, whom he was slandering and scandalising for ages while he himself was the real scandal

  20. Links 18/10/2021: Porteus Kiosk 5.3 and Ventoy 1.0.55

    Links for the day

  21. [Meme] [Teaser] More to Life Than Patents

    Greedy sociopaths oughtn’t be put in charge of patent offices; this is what’s dooming the EPO in recent years (all they think about is money

  22. Microsoft GitHub Exposé — Part II — The Campaign Against GPL Compliance and War on Copyleft Enforcement

    Microsoft contemplated buying GitHub 7.5 years ago; the goal wasn’t to actually support “Open Source” but to crush it from the inside and that’s what Microsoft has been doing over the past 2.5 years (we have some details from the inside)

  23. Links 18/10/2021: Linux 5.15 RC6 and 7 New Stable Kernels

    Links for the day

  24. [Meme] The Austrian School of Friedrich Rude Liar

    With reference to the Austrian School, let’s consider the fact that Friedrich Rude Liar might in fact be standing to personally gain by plundering the EPO‘s staff by demonising them while helping Benoît Battistelli crush them

  25. IRC Proceedings: Sunday, October 17, 2021

    IRC logs for Sunday, October 17, 2021

  26. How (Simple Technical Steps) to Convince Yourself That DuckDuckGo is Just Spyware Connected to Microsoft, Falsely Advertised as 'Privacy'

    In recent days we published or republished some bits and pieces about what DuckDuckGo really is; the above reader dropped by to enlighten us and demonstrate just how easy it is to see what DuckDuckGo does even at the client side (with JavaScript); more people need to confront DuckDuckGo over this and warn colleagues/friends/family (there’s more here)

  27. Austria's Right-Wing Politicians Displaying Their Arrogance to EPO Examiners

    The EPO‘s current regime seems to be serving a money-hungry lobby of corrupt officials and pathological liars; tonight we focus on Austria

  28. [Meme] Friedrich Rödler's Increasingly Incomprehensible Debt Quagmire, Years Before EPO Money Was Trafficked Into the Stock Market

    As it turns out, numerous members of the Administrative Council of the EPO are abundantly corrupt and greedy; They falsely claim or selfishly pretend there’s a financial crisis and then moan about a "gap" that does not exist (unless one counts the illegal gambling, notably EPOTIF, which they approved), in turn recruiting or resorting to scabs that help improve ‘profit margins’

  29. The EPO’s Overseer/Overseen Collusion — Part XV: Et Tu Felix Austria…

    Prior to the Benoît Battistelli and António Campinos regime the EPO‘s hard-working staff was slandered by a corrupt Austrian official, Mr. Rödler

  30. Links 17/10/2021: Blender 2.93.5, Microsoft Bailouts

    Links for the day

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts