EPO Exposé: The Besieged Baltic States – Part I – More Captured Delegates?

Posted in Europe, Patents at 6:10 pm by Dr. Roy Schestowitz

Series index:

  1. You are here ☞ More Captured Delegates?

Baltic flags
The Baltic States – far away from the Balkans, but just as susceptible to “capture”.

Summary: “In the upcoming series we plan to take a look at the relationship between the national patent offices of the Baltic States and the European Patent Organisation.”

Just like most of the countries in the Balkan peninsula, the Baltic States – Estonia, Lithuania and Latvia – are small countries which are at high risk of “capture” by rogue supranational organisations such as the EPO.

From the geopolitical perspective, the Baltic States are situated on the fault-line between the Nordic, German and Russian spheres of influence.

“From the geopolitical perspective, the Baltic States are situated on the fault-line between the Nordic, German and Russian spheres of influence.”In the eighteenth century, the territories of what are today Estonia, Lithuania and Latvia were swallowed up by the expanding Russian Empire and remained under Russian hegemony until the end of the first World War.

After the collapse of Tsarist Russia and the Bolshevik Revolution of 1917, they enjoyed a brief period of precarious freedom until 1939 when they were once again swallowed up by Russia – this time the Soviet Union.

Stalin’s annexation of the Baltic states was “agreed” with Nazi Germany under the terms of the “secret protocol” to the Ribbentrop-Molotov Pact signed in August 1939.

“Once they had regained their independence, these countries proceeded to re-establish various state institutions which had been abolished under Soviet rule, including their national patent offices.”After the end of the Second World War, the Russians held onto the Baltic States and they only succeeded in reclaiming their independence in 1991 as a result of the disintegration of the Soviet Union.

Once they had regained their independence, these countries proceeded to re-establish various state institutions which had been abolished under Soviet rule, including their national patent offices.

In the upcoming series we plan to take a look at the relationship between the national patent offices of the Baltic States and the European Patent Organisation.

“In the upcoming series we plan to take a look at the relationship between the national patent offices of the Baltic States and the European Patent Organisation.”There are clear indications that these states belonged to the “large group of smaller countries” which Benoît Battistelli had under his sway and which he was able to influence to the detriment of good governance and the rule of law at the EPO, as publicly reported by the Netherlands delegation back in April 2017.

Amongst other things, we hope to reveal some little known details of the “Baltic Crusade” conducted by Battistelli when he was running for the position of EPO President in 2009/2010.

“Until now Enäjärvi’s role in EPO affairs has been a well-kept secret.”A key figure in this saga was the former Director-General of the Finnish Patents and Registrations Office, Martti Enäjärvi, who acted as a local “facilitator” to open doors for Battistelli in the Baltic region.

Until now Enäjärvi’s role in EPO affairs has been a well-kept secret. Even many EPO insiders fail to appreciate the extent of his behind-the-scenes influence and his hidden contribution to EPO affairs over the last decade and a half.

“In addition to this, we will also look at Enäjärvi’s close links to Battistelli’s successor at the EPO, António Campinos, formerly Executive Director of the EU trademark agency OHIM/EUIPO in Alicante.”The present series will endeavour to cast some badly needed light on these matters.

Amongst other things, we plan to present an in-depth exposé of how Enäjärvi helped to pave the way for Battistelli’s power grab at the EPO. In addition to this, we will also look at Enäjärvi’s close links to Battistelli’s successor at the EPO, António Campinos, formerly Executive Director of the EU trademark agency OHIM/EUIPO in Alicante.

Stay tuned for more coming up shortly…

Links 24/8/2021: Escuelas Linux 7.1 and Clonezilla Live 2.7.3

Posted in News Roundup at 5:31 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • WOW! Borderlands 3 with AMD FSR on Linux – Invidious

        I’ve gone down the AMD FSR rabbit hole, and I am a happy Linux gamer! Before I kick off the FSR deep dive and guide, here’s a look at how it makes a meaningful difference on 2 different PCs!

      • Enterprise Linux Security – Episode 02: Attack Vectors – Invidious

        Regardless of your role in your company, understanding the various types of attack vectors is extremely important. In this episode of Enterprise Linux Security, Jay and Joao discuss the most common attack vectors that are used today, which will set the foundation for future episodes.

      • Debian 11 Quick overview #Shorts – Invidious

        The Debian Project is an association of individuals who have made common cause to create a free operating system. This operating system is called Debian. Debian systems currently use the Linux kernel. Linux is a completely free piece of software started by Linus Torvalds and supported by thousands of programmers worldwide. Of course, the thing that people want is application software: programs to help them get what they want to do done, from editing documents to running a business to playing games to writing more software. Debian comes with over 50,000 packages (precompiled software that is bundled up in a nice format for easy installation on your machine) – all of it free. It’s a bit like a tower. At the base is the kernel. On top of that are all the basic tools. Next is all the software that you run on the computer. At the top of the tower is Debian — carefully organizing and fitting everything so it all works together.

    • Kernel Space

      • Linux turns 30 [Ed: GNU/Linux is nearly 38; at least this article mentions the GPL, GNU and Stallman]

        Something happened back in 1991 that dramatically changed the future of computing. Linus Torvalds, a Finnish-American software engineer, released the Linux kernel and the second version of the GNU General Public License (GPLv2). A good portion of the technology we use today would not be what it is had this not happened.

        It all started on August 25th of that year when Torvalds announced in a usenet post that he was working on a free OS and that it would be ready within a few months. He also said it “won’t be big and professional like gnu,” but that wasn’t exactly how things turned out!

    • Applications

      • Psst – New Native Spotify App for Linux, Built in Rust & GTK

        For those don’t like Electron apps, ‘Psst’ is a new GTK client for the Spotify music service.

        Since the official Spotify app for Linux is a web app running via Chromium engine, native Linux apps may be preferred. And ‘Psst’ is a free open-source app written in Rust programming language with GTK framework for user interface. Besides Linux, it also works on Windows and macOS.

    • Instructionals/Technical

      • How To Install Parallels Plesk Panel on CentOS & RHEL 8 – Unixcop

        Plesk Panel is a commercial web hosting and server data center automation software. In this article, you will learn how to install Plesk Obsidian on CentOS / RHEL 8.

        It’s a centralized Control Panel.

        You can build and manage multiple sites from a single dashboard. You can also run updates, monitor performance and onboard new prospects all from the same place.

      • How to set up and use the Fragments BitTorrent Client on Linux

        Are you looking for an easy-to-use, beautiful BitTorrent client for the Gnome desktop? Check out Fragments! It’s a simple, useful GTK3-based torrent client for Gnome. Here’s how to set it up on your system.

        Notice: AddictiveTips in no way condones the download of illegal content with the Fragment torrent client. Only use this program to download legal files, such as Linux distribution or other open-source software apps.

      • How to Instantly Log Out of Ubuntu From a Terminal – OMG! Ubuntu!

        There are a several ways to log out of an Ubuntu desktop session you’re using, but most are so obvious you don’t need a guide that points them out to you!

        But what you may not know is how to logout of Ubuntu from a terminal (or log out of GNOME on any Linux distro that uses it).

        I didn’t until around a minute ago.

      • How to install and use Backports in Debian 11 Bullseye – Linux Shout

        The applications installed in the stable version of Debian don’t get new version updates immediately to maintain the high stability of the system. However, that is not the case with the security updates maintained by the Debian security team. So, what to do to get the new features for installed software because it is not possible for us to compile each software manually to achieve its latest version. This is exactly where the backports come into play.

      • Deploy this powerful open-source invoicing system to your data center – TechRepublic

        Recently, I realized I was having to work too hard to invoice all of my various clients. I’d been using the same old spreadsheets for years, but it was getting a bit too cumbersome to deal with. I could have turned to a commercial platform for this, but given open-source was my jam, I figured it would be even better to find a solid solution for my on-premise virtual data center. Turns out, there’s a rock-solid tool, called Invoice Plane, that’s just the ticket.

        Invoice Plane includes the necessary features for you to manage invoices, such as easy invoicing, customer management, payment tracking and quotations. It might not have all of the bells and whistles associated with larger, commercial tools, but of the open-source options I’ve found, this is (by far) the best.

      • OpenGL Error After Upgrade on Ubuntu, Game on Steam Won’t Run! – Fosslicious

        This happened when I finished upgrading Ubuntu 20.04. On the list of updates, there is an update of Mesa to the version provided in the Ubuntu repositories. However, after the upgrade, All games running on Wine and Proton can’t open properly. When opening game with Wine via terminal, there is information: X Error of failed request: GLXBadFBConfig. So, the problem is that all games can’t run on Wine and Proton.

        I tried searching the forums and saw some Ubuntu users’ posts with the same problem. However, none of them could solve this problem on my computer. This makes me frustrated and regrets why I have to upgrade Mesa, if the package will error on my laptop.

      • Connecting a Wireless Adapter To Kali Linux Virtual Machine

        In “Network hacking,” most people get confused when talking about Network adapters and Network cards.

        Most don’t know what they are, why we need them, and how to select the best adapter since we have so many brands and models available in the market.

        A wireless adapter is a device that you connect to your computer via the USB port, and it allows you to connect to WiFi networks and communicate with other devices on the network.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Ezike Ebuka: Week 10 11 kdesoc

          As the end of google summer of code draws near most of the time is used to write test, fix bugs and possibly add new printers.

          For classes that works with OS paths, i had to make the path consisistent between operating systems see the commit below.

      • GNOME Desktop/GTK

        • HighContrast Variants For Adwaita-Qt

          In the past we used to have a completely different project to cover HighContrast variants of GTK Adwaita theme. This was all implemented as Highcontrast-qt, a project nobody has touched for 6 years. You can imagine how it looks like these days when you compare it to what we have now. I think even GTK variant of HighContrast was a completely separate theme back then, while today days it’s just Adwaita with a different set of colors.

          Since GTK made the new HighContrast theme with just few modifications to the original Adwaita theme, I decided to use same approach and have Adwaita-qt to provide all four variants as well (Adwaita, Adwaita-dark, HighContrast and HighContrastInverse). While this looks like a simple thing to do, as you just need to add additional color palette, it was a pain to do it in Adwaita-qt. The reason is that Adwaita-qt is full of hardcoded color definitions, where all of them were randomly taken from GTK Adwaita stylesheets. Everytime something changed in GTK Adwaita, we would have to manually pick the change and replace the changed color value on our side. This was not really sustainable, especially when I wanted to have four different variants.

        • No place like GNOME: 41 is in beta, features frozen for forthcoming release

          he next release of the GNOME desktop, version 41, is now in beta and its features and API are frozen.

          GNOME 40 was released in March and, despite the huge leap in version number, was not intended to radically different from the 3.x line in the same way as GNOME 2 and 3 were. “Radical technological and design changes are too disruptive for maintainers, users, and developers,” said Emmanuele Bassi from the GNOME Team.

          He expressed the view that 4.0 would be perceived as more different than 40, which was intended to express merely that this was roughly the 40th release of GNOME (actually the 41st according to Bassi).

          Version 40 did, nevertheless, introduce quite a few changes to app-launching and navigation, as well as for the core apps. There is also an associated update of GTK (GNOME Toolkit) to version 4.x and the combination justified some caution before moving, such as from Canonical developer Sebastien Bacher who declared in January that “there are quite some moving parts in GNOME 40,” considering both the new shell design and GTK4, concluding that Ubuntu would stick to GTK3 and GNOME 3.38 for version 21.04.

    • Distributions

      • Educational Distro Escuelas Linux 7.1 Comes with Linux Kernel 5.11, Updated Apps

        Escuelas Linux 7.1 comes only one and a half months after the major Escuelas Linux 7.0 release and introduces a newer kernel, Linux 5.11, from the upcoming Ubuntu 20.04.3 LTS (Focal Fossa) point release. Of course, Escuelas Linux 7.1 is still derived from Bodhi Linux 6.0 and uses the latest Moksha (version 0.3.3-13) graphical desktop environment.

        Updated educational apps in Escuelas Linux 7.1 include Blender 2.93.3 3D modeling software, eXe Learning 2.6 software for creating educational interactive web content, GeoGebra 5.0.650 interactive geometry, algebra, statistics and calculus application, Inkscape 1.1.1 vector graphics editor, LiveCode 9.6.3 and Scratch Desktop 3.25 IDEs, LibreOffice 7.2 office suite, and Veyon 4.5.6 computer monitoring and classroom management tool.

      • New Releases

        • Clonezilla Live 2.7.3 Disk Cloning/Imaging Tool Released with Various Improvements

          Coming almost three months after Clonezilla Live 2.7.2, the Clonezilla Live 2.7.3 release is here with an up-to-date package base that was synced with the Debian Sid (Unstable) software repository as of August 17th, 2021, an a newer kernel based on Linux 5.10.46 LTS.

          Clonezilla Live 2.7.3 is not a major release, but it includes some important improvements to make your disk cloning/imaging experience better. For example, it introduces a mechanism in the ocs-clean-disk-part-fs (formerly ocs-clean-part-fs) tool to clean the RAID metadata in disk, a new program to expand LVM (Logical Volume Manager) called ocs-expand-lvm, as well as support for mounting BitLocker (Windows 10) devices as image repositories.

      • Screenshots/Screencasts

      • SUSE/OpenSUSE

        • Wayland Display Server on openSUSE Tumbleweed in 2021

          I became aware of the Wayland Display Server project in 2012 when I was playing with using DisplayLink on openSUSE. I was told that when Wayland is released, it would fix my woes. Nine years later, it was time to give Wayland an honest go with openSUSE again. The impetus behind it was curiosity since it is in the news a lot and I have heard so many good things about it.

          Making the switch on openSUSE running KDE Plasma was as easy as selecting a drop down on the login screen and using the “Wayland” session instead of the X11 session. For the most part, the experience looked the same to my non-picky eyes. Though, I can say, there was something subtly smoother about the interface. Making sure I wasn’t crazy, I went back and forth between X11 and Wayland and sure enough, there is a kind of smoothness to Wayland.

        • SUSE Linux Enterprise Server 15 SP2 is Now EAL 4+ Level Certified for IBM Z, Arm, and x86-64

          SUSE has announced that its flagship Linux distribution has earned Common Criteria EAL 4+ certification. SUSE Linux Enterprise Server (SLES) 15 SP2 is now EAL 4+ level certified for IBM Z, Arm, and x86-64 architectures, signifying compliance with the demanding security requirements for mission-critical infrastructure. SUSE’s Common Criteria EAL 4+ software supply chain certification includes secure production, delivery of updates, and protection of critical digital assets.

        • ‘When You Come to a Fork in the Road, TAKE IT!’

          For close to 30 years, SUSE has excelled at helping businesses choose an Open path. From the industry’s most adaptable Enterprise Linux to a leading Container Management solution providing full management of all Kubernetes distributions, SUSE enables customers to choose the right combination of technology and solutions to ensure their business success.

          To provide our customers with choice, SUSE has led enablement of and works across all major processor instruction set architectures (ISAs). As such, SUSE Linux Enterprise Server is available across x86_64, arm64, POWER and z/Architecture today with our container management solutions expanding its availability (currently on x86_64 and arm64) to include IBM ISAs as well. (See associated blog post by my colleague Michael Friesenegger for more details on Rancher on IBM System Z and LinuxONE).

      • Debian Family

        • Top 12 Things To Do After Installing Debian 11 (Bullseye)

          Good news for Debian users as Debian 11 was released a few days back. Code name “Bullseye”, Debian 11 comes packed with lots of goodies and exciting new updates. Debian is one of the best Linux distros available, but you need to spend some time to customize Debian according to your requirement.

          If you haven’t installed Debian 11 yet, please take a look at our “How to Install Debian 11 Step by Step” in your system. In this article, we’ll look at the top 12 things to do after installing Debian 11 (Bullseye).

        • The mystery of Bullseye wi-fi device not ready

          What about other Bullseye-based pups? Puppy Forum member ‘josejp2424′ has created DevuanPup, built with the Chimaera release of devuan — which is the same as Debian Bullseye, just without systemd.

        • DebConf21 Kicks Off Online For Annual Debian Conference – Phoronix

          DebConf21 officially got underway this morning with being a second year of this annual Debian conference being held exclusively online due to the ongoing COVID-19 pandemic.

          DebConf21 has an action-packed week of talks around Debian Linux and related open-source projects. This time around the event is happening just days after the release of Debian 11.

      • Canonical/Ubuntu Family

        • Early Ubuntu 21.10 Performance Is Looking Good – Especially For Radeon Graphics

          While there is still two months to go until the Ubuntu 21.10 “Impish Indri” release, since the feature freeze has now begun I’ve started some early testing of this next Ubuntu release. So far things are looking good as a nice upgrade over Ubuntu 21.04 and prior. Here is the first round of Ubuntu 21.04 vs. 21.10 development tests using an AMD Ryzen 9 5950X with Radeon RX 5700 XT graphics.

        • Atresmedia modernises Spain’s most popular streaming platform with Canonical Charmed Kubernetes | Ubuntu

          The streaming service for the leading communication group in Spain leaves behind outdated applications and adopts a microservices architecture enabled by Canonical.

          SPAIN, August 24, 2021— Canonical, the publisher of Ubuntu, announces that Atresmedia, the leading company in the Over-The-Top (OTT) services market in Spain, selected its Charmed Kubernetes to build a new microservice-based architecture for the communication group’s streaming platform, ATRESplayer.

          Despite the strong presence of competitors from all over the world, ATRESplayer is the most popular streaming platform in Spain, with more than 8.6 million registered, offering quality content such as La Casa de Papel (Money Heist), #LUIMELIA, Veneno and many more.

          Having a monolithic architecture in environments that couldn’t be upgraded easily, became a significant drawback for ATRESplayer. The architecture prevented Atresmedia’s content management solution from operating effectively and only offered limited scalability, making it difficult for the streaming platform to cope with peaks in demand during live broadcasts that generate high traffic.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Haiku activity report – Summer 2021

        Hi there, let’s do another activity report! You may have noticed that there were a lot of news since the previous one, but here’s a recap in case you missed it: a new beta release, the celebration of the 20th birthday of the Haiku project, the end of Google Summer of Code (final evaluations are being filled in as I write this), and also news from the promotion team which was re-launched a few months ago and is working on various things (read their own report for more details).

        What’s nice for me is that this was all already covered by various articles, which means I can focus on what I know best, and take a look at what’s happening in the git repository with the code.

        This report covers hrev55224-55342.

      • Haiku OS Gets TRIM Working For SSDs, Continues Bringing Up RISC-V Support – Phoronix

        The Haiku open-source operating system project that continues advancing as the virtual successor to BeOS has been enjoying a successful summer.

        Along with Haiku R1 Beta 3 having been released at the end of July, there has been a lot of other activity this summer. The Haiku project just published their 2021 summer recap with some of the highlights including:

      • Web Browsers

        • Mozilla

          • Henri Sivonen: The Text Encoding Submenu Is Gone

            Firefox 91 was released two weeks ago. This is the first release that does not have a Text Encoding submenu. Instead, the submenu has been replaced with a single menu item called to Repair Text Encoding. It performs the action that was previously performed by the item Automatic in the Text Encoding submenu: It runs chardetng with UTF-8 as a permitted outcome and ignoring the top-level domain.

            The Repair Text Encoding menu item is in the View menu, which is hidden by default on Windows and Linux. The action is also available as an optional toolbar button (invoke the context menu on empty space in the toolbar and choose Customize Toolbar…). On Windows and Linux, you can invoke the menu item from the keyboard by pressing the v key while holding the alt key and then pressing the c key. (The keys may vary with the localization.)

          • Mozilla Performance Blog: Performance Sheriff Newsletter (July 2021)

            In July there were 105 alerts generated, resulting in 20 regression bugs being filed on average 6.6 days after the regressing change landed.

            Welcome to the July 2021 edition of the performance sheriffing newsletter. Here you’ll find the usual summary of our sheriffing efficiency metrics, followed by some details on how we’re growing the test engineering team. If you’re interested (and if you have access) you can view the full dashboard.

          • Here’s what I learned from reading dozens of essays about the internet

            This past graduation season, Mozilla’s Pocket teamed up with Her Campus for The Future Connection, a writing contest for college students to reflect on what it’s like to come of age in a “hyper-online and always-connected world.” While this isn’t a new concept for them — this generation, including our essay contest winner, Ester Omole, were born into a digital society — the postponement and outright cancelation of in-person graduations and prom-nights because of COVID-19, made the last truly “offline” rites of passage to adulthood into virtual events.

      • SaaS/Back End/Databases

        • PostgreSQL: New pg_msvc_generator tool available

          I’m pleased to announce the release of pg_msvc_generator, version 1.0.0 beta.

          pg_msvc_generator is a new tool created to help extension authors to provide Windows versions of their extensions. It’s written in Perl and is open source with a PostgreSQL license.

          You can refer to the project’s README for a complete description, or the bug tracker if you experience any problem.

      • Productivity Software/LibreOffice/Calligra

        • Hypra joins the Advisory Board of The Document Foundation

          Hypra is a French social-impact company with a specific competence in hardware and free software accessibility. Its mission is to make IT accessible to everyone – especially seniors, people with disabilities and first-time users – through a universal design approach. By relying mainly on free software, Hypra is giving back users full control over their personal data, and making them part of a global project for a “digital common good”.

          Hypra was founded in 2015 by Corentin Voiseux and Jean-Philippe Mengual, and is based in Paris. The company provides hardware solutions for seniors and people with disabilities, supported with training and technical assistance, and enterprise solutions to facilitate the integration of people with disabilities into the business world.

      • Programming/Development

        • Rewriting My Website In Org Mode – Invidious

          In the last few days, I spent some time rewriting my website. I wanted to move over to a completely Emacs/Org-based website where I write everything in Org mode and then use Org Publish to convert everything to HTML. This is fantastic since I write everything in Org. All of my past show notes that I wrote in Org can now be easily added to my website.

        • Perl/Raku

          • gfldex: Dynamic declaration

            Shortly after my last blog post, Stashes raised a question. Coincidence? Conspiracy? You decide! Anyway, the EVAL caught my eye, because with it we can dynamically create compile time constructs such as a package.

        • Shell/Bash/Zsh/Ksh

          • zbarimg and blurry QR codes

            This is a tinkering post about zbarimg (from the zbar suite of barcode tools) and its ability to read QR code images. Because there are so many possible ways to produce an image of a QR code, I decided to start with a readable image and progressively degrade it, to see what happened.

  • Leftovers

    • Integrity/Availability

      • Proprietary

        • Security

          • FluBot Android malware now targets UK banks

            FluBot has built up a community of compromised Android phones in the UK since April and in the past 24 hours has commenced monetising them by sending overlays for British Banks.

            FluBot first appeared in 2020, targeting mainly Spanish banks, but recently it has spread its reach, with Australian, German and Polish banks all affected within the last few weeks. UK banks are now firmly in its sights, with HSBC and Santander the first to be affected, and Lloyds and Halifax following shortly after.

          • Security updates for Tuesday

            Security updates have been issued by Debian (ledgersmb, tnef, and tor), Fedora (nodejs-underscore and tor), openSUSE (aws-cli, python-boto3, python-botocore,, fetchmail, firefox, and isync), SUSE (aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 and python-PyYAML), and Ubuntu (linux-aws-5.8, linux-azure-5.8, linux-gcp-5.8, linux-oracle-5.8).

          • Red Hat Announces Second FIPS 140-2 Validation for RHEL 8 – Database Trends and Applications

            Red Hat has announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. As the second FIPS certification for the Red Hat Enterprise Linux 8 platform, the company says this validation indicates Red Hat’s leadership and commitment to providing a more secure backbone for the innovation of open hybrid cloud.

          • ISTIO-SECURITY-2021-008

            Envoy, and subsequently Istio, is vulnerable to six newly discovered vulnerabilities (note that Envoy’s CVE-2021-32779 is merged with Istio’s CVE-2021-39156)…

          • Istio / Announcing Istio 1.9.8

            This release fixes the security vulnerabilities described in our August 24th post, ISTIO-SECURITY-2021-008 as well as a few minor bug fixes to improve robustness. This release note describes what’s different between Istio 1.9.7 and 1.9.8.

          • Istio / Announcing Istio 1.11.1

            This release fixes the security vulnerabilities described in our August 24th post, ISTIO-SECURITY-2021-008. This release note describes what’s different between Istio 1.11.0 and 1.11.1.

          • Istio / Announcing Istio 1.10.4

            This release fixes the security vulnerabilities described in our August 24th post, ISTIO-SECURITY-2021-008 as well as a few minor bug fixes to improve robustness. This release note describes what’s different between Istio 1.10.3 and 1.10.4.

          • Hackers Could Increase Medication Doses Through Infusion Pump Flaws
          • Samsung can remotely disable their TVs worldwide using TV Block
          • Samsung: We will remotely brick smart TVs looted from our warehouse
    • Defence/Aggression

      • The Father, The Son, and The Mencius Moldbug

        Norman Yarvin’s Yarchive.net has instructions to help you make, design or/and detonate dry ice bombs, ammonium nitrate, H-6 (aluminized explosives), fertilizer bombs, thermite, TNT, and nitroglycerine, just to name a few. These “insightful” posts that Norman has taken the time to save forever were not written by anonymous anarchists, either. Rather, these posts were written by experts such as Arno Hahma, who now works for German missile company Dhiel BGT Defence; Gerald “Jerry” Hurst, the chemist, explosive expert, defence contractor, and inventor of a binary explosive device known as the Kinepak; and Timothy Melton, who is now a Deputy at Oklahoma County Sheriff’s Office as well as member of the bomb squad and part of the Technology Services Unit.

        The experts on Usenet discussed in detail about how to make explosives and how to detonate them under such subject headings as: “Homemade Bomb Recipe for Prisoners”, “Booby Traps”, and “Napalm Recipe (Use Extreme Caution)”. After Usenet boomed in the 1980s, it was no longer just a select few professionals with access to this information. On 26 December 2000, a man named Michael McDermott shot and killed 7 co-workers at a tech company called Edgewater based in Wakefield, Massachusetts. McDermott claimed that God had agreed to give him a soul if he travelled through time and killed Hitler and his top men to stop the Holocaust from happening. His computers, which were seized after the Wakefield Massacre, showed McDermott had purchased a clinical textbook on malingering and searched the Internet for materials on “how to fake mental illness.” McDermott was also a regular on the more alternative Usenet newsgroups, posting under the name “Mucko”. Mucko posted 23 times to alt.engr.explosives, 5 times to alt.tasteless.jokes, and 3 times to alt.humor. It was also noted on Gwern.net that “he says nothing interesting”. Even though McDermott didn’t really add anything of note to the online discussions on Usenet, the Usenet newsgroups like alt.engr.explosives saw experts in explosives give tactical training and advice to anyone who had internet access.

        Directly after the Wakefield Massacre took place, George Herbert, the author of the Pipe Bomb posts archived on Yarchive.net, discussed the press coverage of the shooting and the fact that Michael “Mucko” McDermott had been a regular visitor to their alt.engr.explosives Usenet newsgroup. He stated that “It has always been a struggle in this group for the professionals and serious safe amateurs present to carry on discussions without providing useful information to the dangerous uneducated amateur pyros and those with malign intent. Those readers have always been literally and figuratively looking over our shoulders as we participate here. Every time I post, I think ‘Is what I am posting here going to lead some kid to blow himself up, or someone to blow someone else up on purpose?’”

        Regarding McDermott’s posts, George Herbert goes on to say: “My reading of those posts indicates that McDermott came to Usenet with fairly extensive prior knowledge of at least some aspects of explosives (chemical compounds used in professional and military explosives, some of their detailed characteristics).” George Herbert would finish his piece by saying, “I think that, in retrospect, I see no evidence that McDermott showed signs of being dangerous or violent, anything at the time as other than just another newsgroup user. Usenet doesn’t always offer a good window into people’s souls.” Where Usenet may not be a good window into people’s souls, personal Usenet Archives such as Yarchive.net can be a good window into people’s interests.

    • Monopolies

      • Patents

        • Carve outs and Causation: Moving Away From Hypothetical Hatch-Waxman Infringement

          The Hatch-Waxman Act allows the FDA to permit a generic version of a branded product, which is partially patent protected, to come to market if the generic manufacturer “carves out” the patent-protected indication from its label. The scope of protection from a finding of induced infringement afforded to generic manufacturers by this “skinny label” provision has, however, engendered significant debate. In two recent decisions, the U.S. Court of Appeals for the Federal Circuit and the Delaware District Court have addressed this very important issue. Both decisions are particularly noteworthy as they do not involve the more typical Hatch-Waxman case, which requires an analysis of a hypothetical post-FDA approval world wherein the generic product can be marketed. Instead, the generic products at issue in these cases were FDA approved and being sold, and that has triggered a discussion regarding causation and opened the doors to novel claims of infringement.

        • A Nose of Wax and Splitting Hairs

          CommScope and Dali are competing in the wireless communications infrastructure market. Both of the parties are making distributed antenna systems that allow for seamless wireless communications within a wide area. CommScope has 30,000 employees and is a Goliath. Although Dali’s CEO Albert Lee has no sling+pebble, he does have a potential secret weapon. Lee is a former patent attorney. The two companies have been battling in court and before the PTAB for the past several years.

          In 2019, CommScope sued Dali for patent infringement (asserting five different patents); Dali counterclaimed asserting two of its own patents. A jury agreed, and found that both sides were infringing. N.D.Tex. Chief Judge Lynn denied the cross-JMOL motions and entered judgment. Dali gets $9 million and CommScope gets $6 million and a permanent injunction against sales of particular distributed antenna systems. On appeal, the Federal Circuit has reversed in-part – finding no infringement of Dali’s ‘521 patent.


          Here, the court bolstered its non-infringement conclusion by looking at the patentee’s arguments regarding anticipation.

        • Analysis of the Decision (23.06.2021) of the German Federal Constitutional Court regarding UPC Agreement [Ed: Team UPC basically... Kather Augenstein Rechtsanwälte PartGmbB]
        • Ericsson settles patent dispute with TCL
        • SolarEdge and Hogan Lovells destroy another of SMA Solar’s patents [Ed: Latest of many fake patents from the corrupt EPO; patent quality waning]

          The patent dispute between SolarEdge and SMA Solar Technology concerns inverter technology for solar energy systems – a growing market worldwide. In mid-August, the Federal Patent Court struck down SMA Solar’s European patent EP 2228895 B1.

          The judges have not yet provided detailed reasoning for the ruling (case ID: 6 Ni 14/19). According to the oral hearing, a lack of inventive step could have been the decisive factor.

          The Federal Patent Court judges had already revoked SMA Solar Technology’s EP 1610452 B1 last October. SMA Solar Technology appealed against this decision. That patent protects inverters with cooling units for cooling electronic components (case ID: 6 Ni 15/19). EP 2228895 B1 in the current case protects an inverter with an isolation point.

          Inverters ensure that the direct current produced by photovoltaic systems is converted into alternating current. This step is necessary for when the electricity is fed into the power grid or used in the home.

        • Software Patents

          • Sky avoid voice recognition patent infringement with invalidity ruling
          • $5,000 Awarded for SaveItSafe prior art

            Unified is pleased to announce PATROLL crowdsourcing contest winner, Erica Ghironi, who received a cash prize of $5,000 for her prior art submission for U.S. Patent 8,929,552. The patent owner is SaveItSafe, LLC, an NPE. The ’552 patent relates to securement of electronic information and cryptographic keys. SaveItSafe asserted the ’552 patent against Oracle and Ultra Electronics Holdings in the Western District of Texas. However, the prior owner, No Magic, Inc., previously asserted the patent against Futurex, Atos IT Solutions and Services, SafeNet, Townsend Security, and Thales e-Security in 2015 through 2017. Litigation history can be found here.

      • Copyrights

        • Book Review: Art and Copyright [Ed: We need artists, not lawyers, to wrote about copyrights]

          This book review of Art and Copyright by Simon Stokes (Partner at Blake Morgan) is kindly provided to you by Alexander Herman, Assistant Director, at the Institute of Art and Law and co-directs the Art, Business and Law LLM developed with the Centre for Commercial Law Studies at Queen Mary University of London. He teaches regularly on copyright. On 30 September, his new book Restitution: The Return of Cultural Artefacts will be published by Lund Humphries. Here is what Alexander has to say:

          It was a delight to learn last year that Simon Stokes, copyright solicitor at Blake Morgan in London, was working on a third edition of his eminently useful Art and Copyright. The book was released this year by Hart Publishing, an imprint of Bloomsbury, and one does not need to progress deep into the book to appreciate the wisdom behind the revision.


          The new edition of Stokes’s classic work makes a welcome addition to any library. It brings into play all the developments of the past decade, overlaid neatly onto the bedrock of the two earlier editions. It is easily accessible for anyone working in the art sector without a legal background, whose work nevertheless requires an understanding of the essential elements of IP. This would include museum registrars, curators, archivists, contemporary art gallery managers, art agents, art dealers and artwork photographers. Yet there is enough legal depth to satisfy the lawyer as well. And let us not forget the artists – with new art forms and digital reproduction now so prevalent, there is no better time for creators to familiarise themselves with the rights they hold in works, as well as any limitations on those rights. This book will help them through.

GNU/Linux Turns 38 Next Month

Posted in Deception, GNU/Linux at 4:51 pm by Dr. Roy Schestowitz

Richard M. Stallman publishes the GNU Manifesto

Summary: Watch out for revisionism and distortion of history (by omissions and misattributions)

GNU/Linux turns 38

[Meme] Internal Stacked Committees, Sponsored by Special Interests

Posted in Europe, Patents at 2:35 pm by Dr. Roy Schestowitz

EPO internal court

Summary: There’s hardly even an illusion of justice left at the EPO

Expecting the Administrative Council of the European Patent Organisation to Actually Follow the Law…

Posted in Courtroom, Europe, Law, Patents at 2:24 pm by Dr. Roy Schestowitz

Video download link | md5sum 4449a20ad1a87e19292b30bd9031f5f5

Summary: The representatives of staff of the EPO, the Central Staff Committee (CSC), are approaching the Heads of Delegation of the Administrative Council of the European Patent Organisation along with their Chairman; they’re politely asking for better safeguards against systematic abuses of the law, including abolition of workers’ basic rights

The Central Staff Committee (CSC) of the EPO has distributed a letter, an open letter, and readers of Techrights typically ensure that we too can see a copy. This letter only partly concerns the unlawful regulations of Benoît Battistelli — regulations which António Campinos continued to exploit while keeping 100% silent on the court’s outcome (he doesn’t seem to care what tribunals say unless those tribunals are controlled by him).

“The intent is to raise awareness and garner sympathy from the Administrative Council of the European Patent Organisation (mostly a bunch of legal hacks rather than scientists).”The letter from the CSC mostly concerns the internal Appeals Committee, which was mentioned earlier this year and several times last year. The intent is to raise awareness and garner sympathy from the Administrative Council of the European Patent Organisation (mostly a bunch of legal hacks rather than scientists).

“On 7 July 2021,” the CSC said, “the Administrative Tribunal of the International Labour Organization (ILOAT) delivered several important Judgments on the rules governing the exercise of the right to strike at the EPO. The ILOAT found that virtually every single one of the strike rules blatantly and obviously violated the fundamental right to strike, that the President exceeded his competence when drawing up Circular No. 347 in 2013 and that the Circular is therefore unlawful in its entirety and is set aside. Already in 2015 a national court in The Hague, the so-called Gerechtshof, found that the EPO violated fundamental European rights. In view of the long list of violations of the fundamental right to strike identified by the ILOAT, the question can be raised of why a majority in the internal Appeals Committee (ApC) reached a completely opposite opinion, based on the same facts and arguments.”

Then they spoke of the internal Appeals Committee (ApC). “The members of the ApC are laypersons. However, the Chair and Vice-Chairs are expected to possess the qualifications required for appointment to high judicial office or be lawyers with experience in the area of employment law acquired at national or international level (see Article 111(3) ServRegs). A reasonably objective and informed person might question whether they would at times give up their independence and impartiality.

“The damage caused by the ApC’s massively wrong assessment of the strike rules and their application is considerable, both for the Organisation and for its staff.

  • The Organisation is now stigmatised in the public eye as an employer that has been violating fundamental rights of its staff for over eight years and has been depriving them of an important tool for collective bargaining.
  • Staff have also definitively lost confidence in the internal means of settling disputes.

Much of the rest of the publication is included in letter form, as shown in the video above, and we’ve decided to replicate it as HTML so that it makes it into IPFS and Gemini space.

European Patent Office | 80298 MUNICH | GERMANY

Reference: sc21102cl – 0.3.1/1.3.1
Date: 13/08/2021

To the Chairman and
the Heads of Delegation of the
Administrative Council of the
European Patent Organisation


System for the settlement of disputes – Proposals for strengthening the Appeals Committee

Dear Mr Chairman,
Dear Heads of Delegation,

On 7 July 2021, the Administrative Tribunal of the International Labour Organization (ILOAT) delivered several important Judgments on the rules governing the exercise of the right to strike at the European Patent Office1, introduced in 2013 with decision CA/D 5/13 and Circular No. 347, as well as on subsequent implementing decisions. ILOAT found that virtually every single one of the strike rules blatantly and obviously violated the fundamental right to strike, that the President exceeded his competence when drawing up Circular No. 347 and that the Circular is therefore unlawful in its entirety and is set aside2. The ILOAT furthermore ruled that a salary deduction for absence due to strike participation of 1/20th of the monthly remuneration per day of absence instead of 1/30th as for all other unpaid lawful absences was punitive3 and that the President had abused his power when applying the strike rules and through his interpretation of Circular No. 347, of which he was the author4, justifying high moral damages.

Already in 2015 a national court in The Hague, the so-called Gerechtshof, found that the EPO violated fundamental European rights5.

1 Judgments Nos. 4430 to 4435
2 Judgment No. 4430, consideration 16 and decision
3 Judgment No. 4435
4 Judgments Nos. 4432 to 4434
5 The decision of the Gerechtshof was later on set aside by the Dutch Supreme Court, the Hoge Raad, only on the ground that the Organisation could invoke its immunity from national jurisdiction and that the Dutch courts therefore have no jurisdiction (see Judgement of the Gerechtshof Den Haag).

Based on the same facts and arguments the internal Appeals Committee (ApC), by a majority, concluded in the underlying internal appeal procedures that the new strike rules as well as the salary deductions were lawful, that the President did not act ultra vires when laying down the strike rules in Circular No. 347 and that he did not abuse his powers in applying them6. The ILOAT found that the ApC had erred in all these points. In view of the long list of violations of the fundamental right to strike identified by the ILOAT7, this is remarkable and raises the question of why a majority in the ApC reached such an opposite opinion. The members of the ApC are laypersons. However, the Chair and Vice-Chairs are expected to possess the qualifications required for appointment to high judicial office or be lawyers with experience in the area of employment law acquired at national or international level, pursuant to Article 111(3) ServRegs. A reasonably objective and informed person might question whether they would at times give up their independence and impartiality, codified in Article 112 ServRegs.

The Staff Representation has already pointed out several times8 that the unilateral selection and appointment of the Chair and the Vice-Chairs by the President (Article 111(2)(a) ServRegs) does not ensure the required balance in the ApC and does not promote confidence in its opinions. The Staff Representation has therefore repeatedly requested to be involved in their selection and that the GCC be consulted on the appointments, to no avail9.

Internal appeals are procedure where a Committee is composed with an equal number of members appointed by the President and by the Staff Representation, however with the Chair taking alone all procedural decisions (Article 111a(1) ServRegs), leading the debate and making sometimes the difference in the opinions. Therefore, a mutual agreement on their appointment is key for arriving at balanced opinions accepted by staff and for preventing from overloading ILOAT with complaints which could have easily been settled internally. This was the reason why the GAC10 had to be consulted on the appointment of the Chair and Vice-Chairs since the founding of the European Patent Organisation11 until 2013. However, with decisions CA/D 8/12 and 9/12 this consultation process was abolished and the Chair and Vice-Chairs have since then been unilaterally appointed by the President.

6 Only in the internal appeals procedure underlying Judgment No. 4432 the ApC concluded that a postponement of a strike ballot had been unlawful, but despite the blatant abuse of power no moral damage was awarded.
7 See, in particular, Judgment Nos. 4430, cons.16 and 4435, cons.15 to 17
8 See for example the letter to the Administrative Council of 31 January 2020
9 Although Staff Representation has been granted an observer status in the last selection procedure for a new chair, this cannot be a substitute for being able to appoint members to the selection board and for the required consultation of staff representation in the GCC.
10 Replaced by the GCC with decision CA/D 2/14
11 Article 110(4) ServRegs, version 1977 (CA/D 9/77)

The damage caused by the ApC’s massively wrong assessment of the strike rules and their application is considerable, both for the Organisation and for its staff.

The Organisation is now stigmatised in the public eye as an employer that has been violating fundamental rights of its staff for over eight years and has been depriving staff of an important tool for collective bargaining, as their right to strike has been severely obstructed at a time when many fundamental reforms were pushed through (inter alia “social democracy”, the new career system, the new salary adjustment procedure, the new rules for the education allowance, …).

Staff have also definitively lost confidence in the internal means of settling disputes and will, in most cases, eventually file a complaint with the ILOAT for protecting their rights. In addition, there is a high risk that many other decisions in appeal cases were also based on opinions where the ApC erred in law.

In view of the fundamental importance of legal certainty and legal peace and in order to restore staff’s confidence in the opinions of the ApC as soon as possible, and to prevent that disputes have to be settled outside the Organisation, we urge you that the Administrative Council takes steps to ensure that:

• Staff Representation is allowed to appoint members to the selection board for the Chair and Vice-Chairs of the ApC,
• the GCC is consulted prior to appointment of the Chair and Vice-Chairs,
• no Chair or vice-Chair may be appointed who does not find consensus in the GCC.

Yours sincerely,

Alain Dumont
Chairman of the Central Staff Committee

cc.: President of the EPO
Administrative Tribunal of the International Labour Organization

In short, there seems to be a tendency to enshrine unlawful rules as “the law”; moreover, “there is a high risk that many other decisions in appeal cases were also based on opinions where the ApC erred in law.”

This is by design; in the past we saw EPO dictators intervening when the ApC got it right; so, as usual, there’s not even any regard/respect to those appointed to assess legality within the EPO.

Links 24/8/2021: GNU Taler 0.8 and Beta of MX Linux 21

Posted in News Roundup at 12:34 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Kernel Space

      • Linux Kernel Changes Proposed So Intel TDX KVM Guests Avoid Crashing The Host – Phoronix

        Shortly after Intel’s TDX whitepaper was made public last year for better protecting virtual machines, Intel open-source engineers began posting support patches for bringing up Trust Domain Extensions under Linux. That work remains ongoing and now further Linux kernel infrastructure work is pending to better deal with the notion of guest private memory afforded by TDX.

        Intel Trust Domain Extensions (TDX) allow for better hardware isolation between virtual machines and the VMM/hypervisor. TDX introduces a secure arbitration mode, multi-key total memory encryption, remote attestation, and other features. TDX is expected with next-gen Xeon Sapphire Rapids CPUs.

      • HSE 2.0 Open-Source Storage Engine Is On The Way From Micron

        Announced back in April of 2020 was Micron’s HSE as an open-source storage engine optimized for solid-state drives and persistent memory. After quickly crossing the v1.0 milestone and working its way up to HSE 1.9 at the end of last year, there hasn’t been any updates since. Fortunately, the project is still alive and HSE 2.0 is on the way.

        The Heterogeneous-Memory Storage Engine (HSE) is designed for SSDs and persistent memory and to be useful for HPC, machine learning, IoT, and other key-value store use-cases. HSE is much faster than the likes of RocksDB and MongoDB on modern, speedy storage products — such as those from Micron.

      • Graphics Stack

        • AMDVLK 2021.Q3.5 Released With Radeon RX 6600 XT Support – Phoronix

          AMDVLK 2021.Q3.5 is out as the newest snapshot for this open-source AMD Radeon Vulkan Linux driver.

          AMDVLK 2021.Q3.5 adds Navi 23 GPU support, adds a setting to override the bin size calculation, and fixes additional Vulkan CTS failures.

          The Navi 23 support is for the Radeon RX 6600 XT that launched earlier this month. The Mesa RADV driver and packaged Radeon Software for Linux Vulkan drivers have already supported this new RDNA2 GPU while AMDVLK has been late to the party in supporting this mid-range graphics card. Thankfully today that changed with this new AMDVLK code drop.

        • AMD’s Open-Source Mesa Driver Continues To Be Ruthlessly Optimized For Workstation Performance – Phoronix

          One of the areas where AMD’s long-standing “PRO” OpenGL driver has generally held an advantage over RadeonSI Gallium3D has been around workstation software but that has been changing.

          Over the past year there have been AMD developers working on making major optimizations for SPECViewPerf workloads, lowering the driver overhead, and other improvements for workstation OpenGL software.

        • NVIDIA DLSS for Proton + Linux with DirectX 11 / 12 lands in September | GamingOnLinux

          NVIDIA announced today an expansion of RTX and DLSS for plenty of Windows games, and for Linux users there’s something exciting coming too: NVIDIA will hook up DLSS with DirectX 11 and 12 with Proton in September.

          What is DLSS? NVIDIA DLSS (Deep Learning Super Sampling) is an AI-powered rendering tech to help increase performance for NVIDIA GPUs using their dedicated Tensor Core AI processors. It helps to boost framerates by rendering frames at a lower resolution and then it’s made to look much crispier using deep learning.

    • Instructionals/Technical

      • How to Find the IP Address in Linux

        An IP address is a unique address that identifies a device on the internet or a local private network. Every computer in the network requires its own unique IP address to get identified. There are two different IP addresses: private and public. A computer can be assigned private IPs or public IP or both.

        A public IP is an address that is exposed to the internet. Devices that are assigned public IP can be accessed from the internet. Whereas private IP is accessible to a local internal network.

        In this tutorial, we learn the different ways to find the IP Address of a Linux system.

      • How to Install Icinga 2 Monitoring Tool on CentOS 8

        Monitoring is one of the most important components of the server infrastructure and data center. It will help you to detect problems and issues that will occur on your servers so you can solve that issues faster. There are some open-source monitoring tools available out there, and one of the most popular is ‘Icinga 2′.

        Icinga is created as a fork of the popular Nagios monitoring tool and now has been rewritten from scratch in C++. As fork from the Nagios project, Icinga has come with additional tools and features, including the icinga director, icinga modules, and icinga plugins. Also, it has support for distributed monitoring that allows you to manage multiple Icinga instances from one dashboard.

        In this tutorial, we will show you step-by-step how to install and configure Icinga2 with Apache2 and MariaDB on CentOS 8 server.

      • How to organize your lists in Linux with Dynalist

        Do you have a habit of creating to-do lists or idea lists on a notepad on your Linux PC? If so, there’s a better way to go about it. Introducing Dynalist: an excellent note-taking editor for Linux. Here’s how to use it on Linux.

      • How to play Splitgate (Beta) on Linux

        Splitgate is a PVP game that the developer says is “Halo meets Portal.” In the game, users can portal with a portal gun while defeating enemies with various weapons. The game is in Beta, so it can be unstable. However, it is free to play. Here’s how to enjoy Splitgate on Linux!

      • How to install SolveSpace on Linux

        SolveSpace is an open-source, parametric 2d and 3d CAD software suite for Linux, Mac, and Windows. SolveSpace has a lot of exciting features that CAD modelers will love. In this guide, we’ll show you how to install SolveSpace on Linux.

      • How To Set Or Change Hostname In Debian 11 Bullseye – OSTechNix

        The other day I upgraded my Debian 10 buster system to Debian 11 bullseye. The upgrade was smooth and easy! Now, I want to update the old hostname in Debian 11 system. In this brief guide, let me explain how to set or change hostname in Debian 11 bullseye system from commandline.

      • How to use RustDesk on Linux

        RustDesk is an excellent, open-source remote desktop application. It is similar to Teamviewer and Anydesk. However, it is better as it allows users to host their own connection server if they choose (it is not required, though). Here’s how to use RustDesk on Linux.

      • How to play Divinity: Original Sin 2 on Linux

        Divinity: Original Sin 2 is an RPG video game developed and published by Larian Studios. It is the sequel for Divinity: Original Sin 1. In the game, players can play solo or with three friends. The game is very similar to Dungeons & Dragons and is known for its in-depth RPG mechanics. Here’s how to play it on Linux.

      • How To Install GlassFish on AlmaLinux 8 – idroot

        In this tutorial, we will show you how to install GlassFish on AlmaLinux 8. For those of you who didn’t know, GlassFish is an open-source application server for the Java EE platform. GlassFish project is initially started by Sun Microsystem and is now sponsored by Oracle Corporation. GlassFish allows developers to create applications for enterprises that are portable, scalable, and that integrate with legacy technologies.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the GlassFish on AlmaLinux 8. You can follow the same instructions for Rocky Linux.

      • How To Enable Hibernation On Ubuntu (When Using A Swap File) – Linux Uprising Blog

        This article explains how to enable hibernation using systemd on Ubuntu when using a swap file (which is default for Ubuntu at least since version 18.04).

        My laptop’s battery drains quite fast while it’s sleeping. I’ve tried some solutions / workarounds, like this one (except for me the problem wasn’t that the laptop was losing half its energy overnight, but all of it in only a few hours), but to no avail. So I decided to enable the hibernate option (suspend to disk) and use that instead of the default sleep option (suspend to RAM), because it uses less power, so the laptop battery is not drained while not in use, albeit taking a bit longer to wake up from hibernation than from sleep. So here’s how to do that.

        The instructions below may work on other Linux distributions, but I only tested this on Ubuntu (it should work in the exact same way on any Debian-based and Ubuntu-based Linux distributions, including Pop!_OS, etc.). On non Debian-based Linux distributions you may need to use different commands for updating GRUB 2 (step 4) and regenerating initramfs (step 6) as these are Debian-specific commands.

      • How to Install Brave Browser on Debian 11

        Brave is a free and open-source web browser developed by Brave Software, Inc. based on the Chromium web browser. Brave is a privacy-focused Internet web browser, which distinguishes itself from other browsers by automatically blocking online advertisements and website trackers in its default settings. Brave has claimed its browser puts less strain on your computer’s performance than Google Chrome, regardless of how much you ask of it. Even with multiple tabs open at once, Brave uses less memory than Google Chrome-like, up to 66% less.

      • How to Install Fail2ban with Firewalld on Rocky Linux 8

        Fail2ban is an intrusion prevention software framework that protects computer servers from primarily brute-force attacks, banning bad user agents, banning URL scanners, and much more. Fail2ban achieves this by reading access/error logs of your server or web applications. Fail2ban is coded in the python programming language.

        The guide will give a rundown on installing Fail2ban on Rocky Linux 8 and some basic setup and tips.

    • Games

      • GOverlay just got an awesome update to make editing MangoHud even easier | GamingOnLinux

        GOverlay, the open source app for managing various Linux gaming overlays just got a fantastic upgrade, with it now having a live OpenGL preview for MangoHud.

        MangoHud is awesome but configuring it by hand is a bit of a nuisance, diving into text files and remembering all the different options. GOverlay gives you simple checkboxes and dropdowns to adjust your overlay and now you only need to tap a button to update a real-time preview. Nothing external needed now and it makes everything even simpler – exactly what we love to see.

      • Aliens: Fireteam Elite is out and works right away on Linux with Proton | GamingOnLinux

        Aliens: Fireteam Elite from Cold Iron Studios is a brand new co-op third-person shooter, which is out officially today and it works right away on Linux with Steam Play Proton. Note: key personally purchased.

        Since I am an absolute fanatic when it comes to the Alien franchise, I couldn’t pass up this opportunity. Not only that, we don’t get a lot of good online shooters that work on Linux with so many blocked by anti-cheat. Thankfully this is one game that seems to just work. Testing with the latest Proton 6.3-6, everything appears to work out of the box.

      • Office Point Rescue – Out the Office is a wonderful homage to retro shooters | GamingOnLinux

        If you loved going to arcades to play shooters when you were younger, or you loved the classic console first-person shooters you should check out the new Office Point Rescue – Out the Office. Developed by Magellanic Games, it’s their first full-length title following on from multiple smaller free retro games released on itch.io.

        This is actually a follow-on from Office Point Rescue – Deja Vu, which acts as the first free chapter so you can get a feel for it by playing that first. This is much bigger though, with a lot more varied content.

        “Continuing on from the terrorist incident at the Emeraldalo Corporation’s headquarters, Agent Foldon uncovers schemes and projects far more horrific than could be imagined. All was not what it seemed at, or rather below, EMC’s headquarters.”

      • Sci-fi colony management sim Stardeus has hit the Kickstarter goal and then some | GamingOnLinux

        Stardeus is an exciting looking game coming from developer Kodo Linija and the good news is that it’s managed to hit the funding goal on the recent Kickstarter. Inspired by the likes of RimWorld, Factorio, Dwarf Fortress, Oxygen Not Included, Prison Architect and FTL it certainly has plenty to live up to.

        With 21 days still to go the initial £12,000 was pretty low and with such a grand idea, it was clear it was going to be a success. There’s a demo too available on itch.io and Steam which has certainly helped. It’s one thing to have a good idea and a flashy video but if you’re a mostly unknown name it can be difficult to pull people in. After over a year in development the developer said part of the reason for the Kickstarter was publicity for the demo to help feedback.

      • Stardew Valley just became an esport with a $40,000 tournament in September | GamingOnLinux

        I still can’t quite believe it’s real but it really is. The casual farming game Stardew Valley just became something of an esport with a new competition with a $40,000 prize.

        Stardew creator Eric “ConcernedApe” Barone has teamed up with Zach “Unsurpassable Z” Hartman to host the tournament which will be live on Hartman’s Twitch channel on September 4 starting at 09:00 PST / 16:00 UTC. It’s a celebration of the game and some of the top speedrunners and creators in the community.

        For a game that’s supposed to be about chilling-out, doing a little farming and possible a little romance, having a competitive event might seem a little odd but quite probably thoroughly entertaining too thanks to over 100 challenges that have been set for the event. Instead of trying to speedrun through, each team has a few hours to complete as many of the challenges as possible with each worth a different amount of points. There will also be additional challenges thrown in every 30 minutes that teams won’t know until they happen.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • OBS builds of KDE/Plasma for Debian/Bullseye – Testing – Unstable

          With the release of Debian/Bullseye last week, we can now support the stable Debian release (Bullseye) as well as Testing and Unstable releases with our build of KDE/Plasma (frameworks, plasma, gears, related programs) on the OBS builds. We used this switch to also consistently support three architectures: amd64, i386, and aarch64.

      • GNOME Desktop/GTK

        • GNOME 41 Beta is Now Available For Linux–Here Are the Updated Packages

          GNOME Project announced that its newest beta version will now soon become available for Linux testers. The GNOME 41 public beta is set to be available on Sept. 2.

          GNOME Project unveiled that the newest beta 41 is now available. Here are the features that Linux users should know.
          According to a report by 9to5Linux on Tuesday, Aug.24, the release of GNOME 41 was the first update that the project developer created since GNOME 41. The team said that the beta will introduce several improvements, including bug fixes, new features, and applications.

        • GNOME 41 Beta Introduces SIP/VoIP Support with Significant Updates to Applications – It’s FOSS News

          While GNOME 40 was a significant upgrade, GNOME 41 is the next version bump with several improvements and new feature support.

          It should be available as a stable release next month. Now, the beta version is available for public testing.


          Considering its official release announcements, let me mention a few essential changes.

          Start with GNOME 41; you can now manage your SIP (Session Initiation Protocol) account using the UI.

          You can easily place VoIP calls using the dial pad right from the system.

          Even though this is not something, every user needs, you may want to opt for a SIP account if you need to cut costs with international calls. GNOME 41 will make it easy for you to integrate the account and use it from the get-go.

        • Apple M1 Now Boots Gnome Desktop on Debian Linux

          In an important update from the battle to tame the Apple M1 chip into running Linux natively, as noticed by The Register, graphics developer Alyssa Rosenzweig, along with her Asahi Linux colleagues, has managed to get the Gnome Shell running on the bare metal, albeit without GPU acceleration.

    • Distributions

      • New Releases

        • MX Linux 21 KDE Plasma Edition Is Now Available for Beta Testing with Plasma 5.20 Desktop

          Last week, I told you about the Xfce and Fluxbox beta releases of the forthcoming MX Linux 21 “Wildflower” distribution, which will be based on the recently released Debian GNU/Linux 11 “Bullseye” operating system series and the long-term supported Linux 5.10 LTS kernel series.

          And now, the KDE Plasma edition is ready for testing too, based on the AHS (Advanced Hardware Support) images of MX Linux 21 KDE and available only for 64-bit computers. The KDE Plasma edition ships with the Plasma 5.20 desktop environment series, more precisely the 5.20.5 point release.

        • MX Linux 21 With Fluxbox is a New Edition Available for Beta Testing

          The MX Linux community is preparing for a new release in the MX Linux 21 series. This release will be based on the freshly released Debian 11 “Bullseye” and MX components.

          Unlike previous releases, the Fluxbox edition will be available as a separate ISO file along with the XFCE and KDE desktop editions.

          The new Fluxbox edition is a good addition to the series with a lower resource requirement.

          Let’s take a look at what MX Linux 21 with a customized Fluxbox desktop offers.

      • IBM/Red Hat/Fedora

        • Enabling Simple Content Access and registering to Red Hat Insights with Subscription Manager

          Simple Content Access (SCA) allows you to access Red Hat software content without attaching a subscription to a particular system or environment. Separating subscriptions and content management makes it easier for admins to fully utilize their RHEL subscriptions efficiently.

          In this three-part series, we will cover how to enable Simple Content Access and register your systems to Red Hat Insights and how to view your Red Hat Enterprise Linux (RHEL) systems in the Red Hat Customer Portal. We’ll also cover how to create custom tags to use tag filtering in Red Hat Insights to support more refined views of your RHEL environments.

        • Building a DevSecOps culture and shifting security left

          There is an old saying that you can pick only two of the following traits: good, fast, and cheap. If you choose a good and fast path, it will be expensive. If you choose good and cheap, it will take time to get it delivered. Lastly, the fast and cheap selection will yield poor quality.

          Over the past decade, companies have embraced DevOps methodologies, and understand the tough selection between the three traits. Tool selection is extremely important to implement a DevOps culture, although it will require more than just the perfect tool.

          Successfully implementing DevOps, as a culture and practice, is predicated on automation. Efficient automation is how a company like Etsy does 50 deployments per day. This speed of development and deployment has some obvious advantages—bugs don’t live in production very long because rapid development and deployment replaces them very quickly with corrected code. You can also introduce new features quickly without having to wait for long development cycles to create a complete package. A new feature can be developed and deployed while other features are being developed alongside.

        • Exploring our bugs, part 2: resolution – Fedora Community Blog

          This is this second part of a series I promised during my Nest With Fedora talk (also called “Exploring Our Bugs”). In this post, I’ll analyzing the bug report resolutions from Fedora Linux 19 to Fedora Linux 32. If you want to do your own analysis, the Jupyter notebook and source data are available on Pagure. These posts are not written to advocate any specific changes or policies. In fact, they may ask more questions than they answer.

        • 4 IT automation myths dispelled | Enable Sysadmin

          If it takes more time to automate a certain task than simply to accomplish the job manually, it is not worth automating.

          You are likely to get resistance from your peers or management about automating tasks based on time savings. In reality, every job you do as an engineer is worth automating, but you have to be cognizant of the time and deliverables. When certain tasks appear to be not worth automating, I have often found that what is actually meant is that it’s just not possible to automate it at this time. However, in the future, your objective should be to automate the task—you are likely to get less resistance from your team if you keep this perspective. Just make sure to communicate the automation proposal in a way that meets your immediate goals and improves future effectiveness.

        • Game telemetry with Kafka Streams and Quarkus, Part 1 | Red Hat Developer

          Apache Kafka makes it possible to run a variety of analytics on large-scale data. This is the first half of a two-part article that employs one of Kafka’s most popular projects, the Kafka Streams API, to analyze data from an online interactive game.

        • Remote work: 4 misconceptions about workplace re-entry | The Enterprisers Project

          When COVID forced the world to quickly adapt to a remote work environment, many of us thought that we were facing our biggest workforce challenge. But as leaders and employees grapple with how to move forward post-pandemic, we’re quickly realizing that our greatest obstacle may well be re-entry into the workplace.

          From the very beginning of the pandemic, we knew work would never look the same, and discussions surrounding “back to normal” quickly changed to “the new normal.” But as much as we’ve hyped this concept, no one has been able to define it: Employers are struggling to outline what expectations they should have for employees, who in turn are wondering how they will adjust, again, and rework their schedules to accommodate their employer’s expectations.

          On top of all this, many people are reexamining what a successful career looks like and are trading cutthroat, always-on jobs for roles that allow for more flexibility and meaning – a trend that’s becoming known as the “Great Resignation.”

      • Canonical/Ubuntu Family

        • Icons Look too Small? Enable Fractional Scaling to Enjoy Your HiDPI 4K Screen in Ubuntu Linux

          A few months ago, I bought a Dell XPS laptop with a 4K UHD screen. The screen resolution is 3840×2400 resolution with a 16:10 aspect ratio.

          When I was installing Ubuntu on it, everything looked so small. The desktop icons, applications, menus, items in the top panel, everything.

          It’s because the screen has too many pixels but the desktop icons and rest of the elements remain the same in size (as on a regular screen of 1920×1080). Hence, they look too small on the HiDPI screen.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Intel Releases OSPray Studio 0.8

        One year ago to the day Intel announced OSPray Studio as a scene graph application for rendering glTF assets and other 3D models. OSPray Studio is built off their OSPray ray-tracing engine that they’ve been working on for years. These Intel efforts are all part of their oneAPI initiative and today happens to mark a shiny new feature release.

      • FSF

        • GNU Projects

          • Drop-in replacements for Core Utilities

            The GNU Core Utilities or coreutils is a package of GNU software containing implementations for many of the basic tools, such as cat, ls, and rm, which are used on Unix-like operating systems.

            Every day, we use many command-line tools to manage our systems, and perform basic tasks. Many of the programs provided by coreutils are staples in our daily life. Over the years, these tools have been updated and ported to other systems, but they still retain many of their original traits.

            Alternative implementation packages, with a slightly different scope and focus, or license. For example, GPLv2-licensed BusyBox and BSD-licensed Toybox are available for use in embedded devices. There also a project called uutils-coreutils which seeks to write cross-platform CLI utilities in Rust. It aims for high compatibility with coreutils. Adoption of the tools hasn’t spread to production environments. There’s also an alternative to coreutils using software from FreeBSD but compatibility is low, user adoption is very low, and like uutils-coreutils it’s missing many commands.

          • 2021-9: GNU Taler v0.8 released

            We are happy to announce the release of GNU Taler v0.8.

            We have addressed over 400 individual issues, our bug tracker has the full list.

      • Programming/Development

        • Solve the repository impedance mismatch in CI/CD | Opensource.com

          An impedance mismatch in software architecture happens when there’s a set of conceptual and technical difficulties between two components. It’s actually a term borrowed from electrical engineering, where the impedance of electrical input and output must match for the circuit to work.

          In software development, an impedance mismatch exists between images stored in an image repository and its deployment descriptors stored in the SCM. How do you know whether the deployment descriptors stored in the SCM are actually meant for the image in question? The two repositories don’t track the data they hold the same way, so matching an image (an immutable binary stored individually in an image repository) to its specific deployment descriptors (text files stored as a series of changes in Git) isn’t straightforward.

        • Arm Posts New GCC Compiler Patches Due To New Vulnerability Affecting ARMv8-M TrustZone – Phoronix

          Made public on Monday was CVE-2021-35465 as a new security vulnerability affecting various Arm products. For unmitigated (ARMv8-M) hardware, Arm has posted a series of GCC compiler patches for working around the issue.

          CVE-2021-35465 is this new Arm processor vulnerability affecting a subset of their designs — particularly ARMv8-M and ARMv8.1-M products for micro-controllers and other embedded use-cases for TrustZone and more.

        • Shell/Bash/Zsh/Ksh

          • Choosing and changing your Linux shell

            There are quite a few shells on Linux system and more that can be easily added. This post examines some of the more popular shells, how they differ and the files that contribute to their configuration.

            The default shell on most Linux systems is bash. Unless you make an effort, any user accounts added to the system will be assigned bash as their login shell. Bash has been around since 1989 and was meant to replace the Bourne shell (sh). In fact, if you take a look at /bin/sh, you’ll probably find that it’s nothing more than a symbolic link to /bin/bash.

  • Leftovers

    • The lazy audiophile

      Whenever I mention that next to my regular headphones, I also use a pair of Bluetooth headphones, people swear at me, claiming that it substantially degrades sound quality. Yes, that is right. And to add insult to injury, I even use active noise canceling, which changes the original sound even more. But who cares when it is just background music, so I can concentrate on my work when people are talking around me? It does its job: keeps the noise out. Of course I switch to my studio headphones as soon as I want to focus on the music itself. But when it comes to background music, Bluetooth is a lot more comfortable.

    • Integrity/Availability

      • Proprietary

        • CloudChomp Adds Discovery for Secure Shell for Linux Machines

          CloudChomp, Inc., a leader in AWS cloud migration planning and discovery solutions and an Advanced Technology Partner in the Amazon Web Services (AWS) Partner Network (APN), announces their latest release which includes support for Secure Shell (SSH), a secure cryptographic protocol. SSH will be the primary data collection standard for stand-alone Linux machines and will supplement the data collected from vCenter for Linux machines to include application discovery and application dependency mapping.

        • Security

          • 13 million malware attacks on Linux seen in wild [Ed: It's hardly about the "Linux" kernel and these "attacks" are not successful one]

            Cryptominers, web shells and ransomware are the most common varieties of malwares targeting Linux systems, thanks to its prevalence as the backbone of most public cloud services

          • Report Details Linux Threat Landscape [Ed: Of course “FOSSlife Team” had to amplify this marketing/sales pitch as well
          • Linux cloud environments face an onslaught of malware attacks [Ed: Mayank Sharma the latest to parrot this self-promotional FUD of an insecurity firm]
          • New Linux malware family evades antivirus detection [Ed: Mayank Sharma seems to have chosen a focus on "Linux" fear-mongering rather than news; pushing AV nonsense, which is proprietary software]

            Cybersecurity researchers have uncovered severalmalicious Linux binaries that have successfully managed to sneak past most antivirus products.

          • 38 million records exposed, Microsoft Power Apps blamed

            Thousands of web apps left sensitive data exposed online due to misconfigured settings for Microsoft Power Apps. Thirty-eight million records appeared online, including social security numbers, COVID-19 vaccination statuses, home addresses, and phone numbers. American Airlines, J.B. Hunt, Microsoft, and several government bodies are among the affected organizations. UpGuard notified 47 entities regarding the data exposure and reached out to Microsoft about it as well (via WIRED).

            The data leaks came as a result of organizations using Microsoft’s Power Apps. These can be used to create websites and to manage data, but if misconfigured can result in security risks. Power Apps can be used to manage data that organizations would like to have public, such as the locations of vaccination centers, as well as data that should remain private, such as Social Security numbers. The default settings for Power Apps left data publicly accessible until a recent change from Microsoft.

Links 24/8/2021: GNOME 41 Beta and KaOS 2021.0 Screencasts

Posted in News Roundup at 5:10 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

    • Audiocasts/Shows

      • Late Night Linux – Episode 139

        What we all thought about the open and federated Twitter alternative Mastodon, plus your feedback about the new user experience, and why Graham and Joe don’t use Linux for making music.

      • Most Stable Linux Distros Are Really Semi Rolling! – Invidious

        Typically we split up linux distros into rolling and stable releases but in reality there are very few distros which are actually stable releases, the vast majority of these are actually known as a semi rolling release and I’d like to see the correct term used.

      • Destination Linux 240: 30 Years of Linux & What Linux Means To Us

        This week’s episode of Destination Linux, we’re going to celebrate 30 Years of Linux starting with “What Linux Means To Us” discussion. Then we’re going to have Philip Müller from Manjaro on to discuss their latest 21.1 release. Plus we’ve also got our famous tips, tricks and software picks. All of this and so much more this week on Destination Linux. So whether you’re brand new to Linux and open source or a guru of sudo. This is the podcast for you.

    • Instructionals/Technical

      • What we’ll likely do when Linux distributions drop Python 2 entirely

        Currently, Linux distributions claim that they want to stop including even a minimal Python 2 at some point, although when that will be isn’t clear (the latest Debian and Ubuntu in development versions both seem to still include it). Since we have any number of perfectly functional small Python 2 programs used in managing our systems (and no particular time or enthusiasm for porting them all to Python 3), this presents a potential future problem, never mind the disruption for our users (who may also have such programs). Thus, it seems likely that we will roll our own version of Python 2 even after Linux distributions stop doing so.

      • SSH quoting

        A while back there was a thread on one of our company mailing lists about SSH quoting, and I posted a long answer to it. Since then a few people have asked me questions that caused me to reach for it, so I thought it might be helpful if I were to anonymize the original question and post my answer here.

      • How to install MCreator on a Chromebook

        Today we are looking at how to install MCreator on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How To Install MariaDB on Debian 11 – idroot

        In this tutorial, we will show you how to install MariaDB on Debian 11. For those of you who didn’t know, MariaDB is a popular open-source relational database, developed by MySQL developers. Unlike MySQL, MariaDB was meant to be totally free for use. The original creators of MySQL developed MariaDB in response to fears that MySQL will suddenly become a paid service due to Oracle acquiring. With its history of doing similar tactics, the developers behind MariaDB have promised to keep it open source and free from such fears as what has happened to MySQL.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the MariaDB database on a Debian 11 (Bullseye).

      • How to Create Database in MySQL a Complete Guide 2021

        As you know MySQL is the most popular and open-source relational database management system. If you don’t have MySQL installed on your Linux machine then read another article “How to install MySQL in Ubuntu 19.04“.

        Remember one more thing, this is important MySQL must be installed in your system. If you don’t have, then where will you create a database?. Many People in the world start running the command, without knowing the basic requirement. And last they will blam to writer or trainer.

        If you are an administrative user (the minimum privilege required to create a new database is CREATE) or with a root user account then you can run all commands. You can read the article on “How to create a user in MySQL”.

        In this tutorial, I will cover How to create database in MySQL, create the database if not exists, show all database, select database for starting work, and use of mysqladmin and more. This article is good for beginners.

      • How to Enable SSH on Debian 11

        SSH is a network protocol for secure communication between a client and a server. This enables you to remotely connect to your Debian machine to perform commands, file transfer, or administrative tasks. SSH provides strong authentication using passwords and public key authentication. Once the connection is established, the data that is transmitted is encrypted.

        In this tutorial, we learn how to enable SSH on a Debian Desktop system.

      • How to Install and Use Tmux (Terminal Multiplexer) in Linux

        As the naming convention suggests, tmux is indeed a terminal multiplexer. Linux users that are used to server-based or terminal-based OS environments mostly find themselves opening more than one terminal instance while running programs. With tmux, it is possible to limit your Linux OS interactions to a single terminal.

        The tmux command flexibility makes it possible to switch between a user or system programs. You can detach from these programs and keep them running on the Linux system background and also re-attach them back to the same command line instance or a different terminal.

      • How to Install the Latest MySQL 8 on Debian 11

        MySQL is a relational database management system based on SQL (Structured Query Language). It is one of the most widely used database software for several well-known applications that utilize it. MySQL is used for data warehousing, e-commerce, and logging applications, but its most used feature is web database storage and management.

        Debian 11 comes with MySQL in its repository, however as many know, Debian stable provides only security updates for its releases in line with keeping its stable build essentially stable. This has great benefits but some drawbacks; in the tutorial, you will learn how to install MySQL 8 for Debian 11.

      • How to Kill Linux Process Using Kill, Pkill, and Killall

        Linux Operating System comes with a kill command to terminate a process. The command makes it possible to continue running the server without the need to reboot after a major change/update. Here comes the great power of Linux and this is one of the reasons, why Linux is running on 96.4% of servers, on the planet.

        Kill command sends a signal, a specified signal to a currently running process. The kill command can be executed in a number of ways, directly or from a shell script.

      • How to Mine Etherum in 2021: Beginner’s Guide

        Etherium mining is an excellent way for people with high-end graphics cards to earn some cash while sleeping – at least until the eth2 rolls out completely. Even after the recent crypto dip, Etherium’s value has been up considerably. Not to mention the congestion on the Ethereum network has been driving up gas fees. All this means Etherium mining is still a profitable business in 2021.

        In this comprehensive guide for beginners, we will dive deep into the features of Ethereum mining, what makes it different from Bitcoin mining, and how you can get started. We will also discuss everything you need to consider before investing your hard-earned cash in Ethereum mining, such as software, hardware, and online mining forums/community. So, grab a cup of coffee and read on!

      • How to Rename a File in Linux with Examples, beginner’s guide 2021

        Do you not like the name of any file or directory? Do you want to change it? Do you want to give new name to file or directory?

        If you don’t know how to rename a file in Linux then this article is helpful for you.

        When you read complete article, You will learn about move and change name of files.

        You must read warnings mentioned in the article. Cautions make you perfect, and save you from disaster happen by using wrong command.

      • How to Script ssh Login with Passwords

        This tutorial explains how to automatically login with a password when connecting to ssh.

        After reading this tutorial, you’ll know how to implement a script to automatically login with passwords to connect to ssh. Additionally, you’ll find instructions for automatic ssh password login using the sshpass tool. Finally, this tutorial explains how to connect without a password with public key authentication.

      • How to Share ZFS Volumes via iSCSI

        ZFS volumes are block storage devices that work like any other storage device (HDD/SSD). You can create partition tables, create new partitions, format these partitions, create filesystems, and mount them on your computer.

        You can also share ZFS volumes via the iSCSI protocol and access them from remote computers.

        In this article, I am going to show you how to share ZFS volumes via iSCSI and access them from remote computers. I will be using the Ubuntu 20.04 LTS operating system for the demonstration. However, the steps shown in this article should also work on other Linux distributions with some adjustments.

        Let’s get started.

      • How to include options in your Bash shell scripts | Opensource.com

        Terminal commands usually have options or switches, which you can use to modify how the command does what it does. Options are included in the POSIX specification for command-line interfaces. It’s also a time-honored convention established with the earliest UNIX applications, so it’s good to know how to include them in your Bash scripts when you’re creating your own commands.

      • How to use mkdir command to create a directory in Linux Guide 2020

        If you are looking at how to make a directory in Linux then you are at the right place, use mkdir command to create a directory in Linux by using the terminal.

        You are using a graphical interface to create a folder in windows, but you must use the command to create a folder in Linux. I will teach you to create a new directory, multiple directories, a directory with full permission, etc.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • GNOME 41 Desktop Environment Enters Beta Testing with New Apps, Better Wayland Support

          GNOME 41 will be the first major update to the popular desktop environment since the release of GNOME 40 with its redesigned Activities Overview, and promises new apps, new features, as well as numerous improvements and bug fixes.

          Highlights of GNOME 41 include a new Calls app that acts as a phone dialer and call handler, mostly useful for mobile devices but capable of doing VoIP calls too, and support for the GDM login manager to allow Wayland user sessions even if the login screen is on X.Org, as well as for single GPU vendor NVIDIA machines.

        • GNOME 41 Beta Released With “Calls” SIP/VoIP Support, Wayland Improvements – Phoronix

          The GNOME 41 beta is now available ahead of next month’s official half-year update to this open-source desktop environment.

          There is a lot that’s been queued up for GNOME 41 beta. Below is a look at the highlights of the lengthy changes for this beta milestone.

        • GNOME 41.beta released!
          GNOME 41.beta is now available. It also marks the start of the UI,
          feature and API freezes
          (collectively known as The Freeze). Any string changes need to be
          announced to the i18n mailing list in advance of the string freeze
          which should start next weekend. If you'd like to target the GNOME 41
          platform, this is the best time to start testing your apps or
          You can use the 41beta branch of the flatpak runtimes, which is now
          available on Flathub beta.
          This branch is based on the 21.08 branch of freedesktop-sdk and as
          such has quite a few ABI breaks. In addition, this release removed
          zenity and librest. The additions of this release are libmanette and
          sysprof-capture. The release team has agreed to pre-announce removals
          at least one cycle in advance. Starting with GNOME 42, all removals
          have to be announced at least one cycle in advance. As such, the
          following are deprecated and will be removed in a future release:
          clutter and friends (cogl, clutter-gtk and clutter-gst) and libsoup
          version 2.x (to be replaced with version 3.x).
          An installer image is also available for testing and porting extensions
          This is meant to be installed in a virtual machine with EFI support
          (such as the GNOME Boxes version available on Flathub). You can also
          try to install it on bare metal but be warned that hardware support is
          very limited.
          If you want to compile GNOME 41.beta yourself, you can use the
          official BuildStream project snapshot:
          The list of updated modules and changes is available here:
          The source packages are available here:
        • GNOME 41 beta is here — the best Linux desktop environment is getting better

          There are a lot of great desktop environments for Linux, such as Cinnamon, KDE Plasma, and Xfce to name a few. With that said, only one can be the best, and that is GNOME. If you prefer a different environment, you are simply wrong or ignorant on the subject. You know what? That’s fine. As they say, ignorance is bliss, so if you are happy not using GNOME, more power to you.

          For those of us superior Linux users that prefer GNOME, it is time to get excited. You see, as of today, the GNOME 41 Beta is officially here! Keep in mind, the Beta tag is quite literal — unless you are a Beta tester or Linux developer, you shouldn’t be bothering with it just yet.

    • Distributions

      • The 8 Best Linux Distributions for Penetration Testing

        Linux users have a plethora of free operating systems when it comes to penetration testing and digital forensics. The world of ethical hacking has continued to evolve, which is probably one of the reasons why many people find themselves being attracted to these auditing fields.

        To serve this purpose, several Linux distros and software are available for forensic investigation, ethical hacking, and penetration testing. If you are an advanced Linux user looking to flex your brain muscles and get the ball rolling, it’s time for you to check some of these cybersecurity-related Linux distros.

      • Screenshots/Screencasts

      • Canonical/Ubuntu Family

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Perceived Relations Between Gopher Gemini And HTTP

          I present my perceptions of Gemini and Gopher, and how they seem to be all somewhat overlapping, and then give my two cents for people to fight over.

          The piece is structured so the focus is Gemini (as it’s the subject of the day) compared to HTTP and Gopher. It’s not necessary to read sections which don’t align with your interests.

        • Mozilla

          • Firefox follows Chrome and prepares to block insecure downloads

            Called mixed content downloaded blocking, the feature works by blocking file downloads initiated from an encrypted HTTPS page but which actually take place via an unencrypted HTTP channel.

          • Mozilla Firefox will also block insecure downloads on HTTPS pages

            According to references in Mozilla’s bug tracker, the feature is planned to be generally available with Firefox 92. That’s the next major update for Firefox, and it’s currently planned for September 7. It’s already available in experimental versions of Firefox, though, and you can also enable it in the stable release via a flag. Simply go to about:config and search for dom.block_download_insecure. Setting this value to true will enable mixed content download blocking.

          • OpenPOWER Firefox JIT update

            As of this afternoon, the Baseline Interpreter-only form of the OpenPOWER JIT (64-bit little-endian) now passes all of the JIT tests except for the Wasm ones, which are being actively worked on. Remember, this is just the first of the three phases and we need all three for the full benefit, but it already yields a noticeable boost in my internal tests over the C++ interpreter. The MVP is Baseline Interpreter and Wasm, so once it passes the Wasm tests as well, it’s time to pull it current with 91ESR. You can help.

      • CMS

      • Programming/Development

        • If Conditions in Ruby

          Decision-making is a base factor in programming and human life. They allow us to perform certain actions when a condition fits a specific scope.

          In this tutorial, we will focus on how to implement condition statements in Ruby programming language. Using Ruby conditionals, we can check for a specific condition and take a specified action based on the result.

          The simplest way to make a single decision in Ruby is to implement an if statement.

        • Let’s write a compiler, part 7: Arrays

          Arrays are an important feature for our language and compiler. Not defined in the original PL/0 specification but later added in its successor language, Oberon-0, arrays allow us to carve out pre-defined regions of memory of any arbitrary size to be used as we see fit. Because the original PL/0 language has no concept of arrays, we are free to define our own syntax for them.

          These are our challenges for today: choosing a syntax for arrays, implementing that syntax, and allowing array identifiers to be used just the same as the TOK_VAR identifiers we already have.

        • Python

          • How to Use Frozenset Objects in Python

            This article will cover a guide on using the “frozenset” function in Python that returns a new frozenset type Python object. These objects are similar to set objects available in Python with some key differences. All code samples in this article are tested with Python 3.9.5 on Ubuntu 21.04.

          • How to Use the Tokenize Module in Python

            This article will cover a guide on using the “Tokenize” module in Python. The tokenize module can be used to segment or divide the text into small pieces in various ways. You can use these segments in Python applications that use machine learning, natural language processing, and artificial intelligence algorithms. All the code samples in this article are tested with Python 3.9.5 on Ubuntu 21.04.

        • Shell/Bash/Zsh/Ksh

          • How to Use Boolean Value in Bash

            The boolean value can contain two types of data. These are True or 1 and False or 0. Bash does not support Boolean values, but any bash variable can contain 0 or “true” and 1 or “false“. The logical boolean operators are supported by bash. The boolean value is required to use when the script needs to generate the output based on the True or False value of a variable. The way to declare and use boolean values in the bash script has shown in this tutorial.

        • DB

          • PostgreSQL Union All Query

            This tutorial will show you how to use PostgreSQL Union and Union All queries to combine results from select statements.

          • PostgreSQL Limit Clause

            Let’s discuss the ins and outs of using the PostgreSQL LIMIT clause to limit the output to a specified value.

            Although the LIMIT clause is an optional statement, it is very handy when you do not want a query to return thousands and thousands of records.

          • PostgreSQL Grant Privileges

            In PostgreSQL, a user must have the LOGIN privilege to log into the database. However, explicit permissions must be assigned to perform database operations, including selecting tables, columns, and records.

            The PostgreSQL GRANT query allows you to modify privileges for users on database objects such as tables, columns, views, functions, schemas, and more.

            This tutorial will walk you through using the PostgreSQL GRANT command to modify privileges for various database objects.

          • PostgreSQL Functions

            PostgreSQL is a powerful and easy-to-use database management system that provides secure, fast, and very intuitive features, allowing you to focus on the data and not the query syntax.

            One way PostgreSQL makes its usage very easy is the functionality of pre-defined functions. These functions allow you to call them and pass the required arguments to get an output.

            In this post, we will give you a cheat sheet of the most common PostgreSQL functions and even show you how to define custom ones if needed.

          • PostgreSQL Count Function

            In most cases, when working with databases, our interest is the actual records stored in the database. However, an instance may occur where we need to determine the number of records in a specific column or entire table.

            To achieve this, we can define a custom function or use the built-in count function. In this guide, we will discuss the count function and various examples of how to use it.

          • MySQL IN Clause

            This tutorial will discuss using the MySQL IN query to check if a specific value is within a set of values, which is useful in replacing a set of OR operators.

  • Leftovers

    • Web of Connections

      A popular song lyric from 1927 ran: “I’ve danced with a man, who’s danced with a girl, who’s danced with the Prince of Wales.” The poet Allen Ginsberg liked to boast that a line of three intermediate lovers connected him back to his idol, Walt Whitman. Well before the development of social media, the 1993 film Six Degrees of Separation made many of us aware of just how few steps it takes to connect you, or me, to millions of others around the globe.

    • Science

      • The August 2021 full moon is, somehow, a Blue Moon. Here’s why.

        That explanation said that the full moon “usually comes full 12 times in a year, three times for each season.” Occasionally, however, there will come a year when there are 13 full moons, not the usual 12. The almanac explanation continued:

        “This was considered a very unfortunate circumstance … and it upset the regular arrangement of church festivals. For this reason 13 came to be considered an unlucky number.”

        And with that extra full moon, it also meant that one of the four seasons that year would contain four full moons instead of the usual three. When a particular season has four full moons the third was apparently called a Blue Moon so that the fourth and final one can continue to be called the “late moon.”

    • Education

      • In First ‘Fatwa’, Taliban Ban Co-education in Afghanistan’s Herat; Call it ‘Root of All Evils’

        Taliban officials on Saturday issued their first ‘fatwa’ in Afghanistan, banning co-education in government and private universities in the restive Herat province, describing it as the ‘root of all evils in society’ validating fears that the country will undergo major ‘regressive’ changes despite their promises.

        The announcement comes as the terror group vowed to respect women’s rights in Afghanistan. The decision was taken after a meeting between varsity professors, owners of private institutions, and Taliban authorities, Khaama Press News Agency reported on Saturday.

    • Health/Nutrition

      • Once Secret Prices Expose ‘Irrational and Cruel’ Nature of US Healthcare System

        “Keep these prices in mind the next time you see a report…that tries to figure out whether a particular single payer plan’s reimbursement rate would be unworkable.” —Matt Bruenig, People’s Policy Project

        “It was the most convoluted, useless process,” Eichelberger, told the Times.

      • NYC to Require Teachers, School Staff to Get Vaccinated Starting Next Month
      • Key ‘Milestone’ in Pandemic Fight as FDA Grants Full Approval to Pfizer’s Covid Vaccine

        The U.S. Food and Drug Administration on Monday granted full approval to the Pfizer-BioNTech coronavirus vaccine for people who are 16 years of age or older, a long-awaited step that came as Covid-19 cases and hospitalizations are rising sharply across the country—particularly in undervaccinated regions.

        Some public health experts have argued that the FDA’s decision to issue a final seal of approval for the Pfizer vaccine—which until Monday had been administered under emergency authorization—could be helpful in easing hesitancy among those who have yet to get vaccinated against the coronavirus, which has killed more than 628,000 people in the U.S.

      • The Sub-Prime of Ms. Jane Brody: Still Ignoring the Science on Medical Marijuana

        Big Pharma has had good reason to fund the longterm effort to divert and choke off the medical marijuana movement. If US doctors had been routinely recommending cannabis instead of SSRIs like Zoloft to treat depression all these years, the bottom would have fallen out of the anti-depressant market. Instead, sales continue to soar. According to the CDC, “During 2015–2018, 13.2% of adults aged 18 and over used antidepressant medications in the past 30 days… Use was highest among women aged 60 and over (24.3%).”

        A small example of Big Pharma’s success was provided by Jane Brody’s August 2 column on Irritable Bowel Syndrome (IBS), Brody has been the New York Times “Personal Health” columnist since 1976. An influencer before they had a word for it, she anchors the Tuesday Science Section with a half-page column on page 7.

      • Are Bans Against School Mask Mandates Against the Law?

        My son, a 14-year-old autistic boy with Down syndrome, has the right to be educated thanks to federal civil rights legislation passed in the 1970s and updated in the years since. These laws promise him a free and appropriate education in the least restrictive environment adapted, within reason, to his needs.

      • The Virus and the Storm

        It was supposed to be homecoming concert For New York City 60,000 people crowded Central Park To celebrate New York City’s Return to normal cultural life After a year and a half of COVID-19 shutdowns Barry Manilow began to sing his 1980 song “I Made It Through The Rain” “We dreamers have our ways Of facing rainy days And somehow we survive We keep the feeling warm Protect them from the storm Until our time arrives” The Delta Variant said to Hurricane Henri “I just finished my all-you-can-eat buffet. Now it’s your turn.” Hurricane Henri said, “Yeah, I’ve heard enough of his singing. Let’s shut this thing down.” Four to five inches of rain began to flood Central Park And people got soaking wet as they ran screaming To get out of the rain. The concert never resumed.

        August 21, 2021.

      • Republicans Rush to Squash Local Control in Fight Against COVID
      • Pfizer Vaccine Gets Full FDA Approval, Potentially Triggering Mandates
      • FL’s Capital City to Have School Mask Rules, Defying DeSantis’s Anti-Mask Order
      • Facebook’s Most Viewed Article In Early 2021 Raised Doubt About COVID Vaccine

        The social media giant prepared the report about the most widely viewed posts on its platform from January through March of 2021, but decided not to publish it “because there were key fixes to the system we wanted to make,” spokesperson Andy Stone tweeted on Saturday.

      • Geert Vanden Bossche is back and still blaming vaccines for COVID-19 variants

        I was perusing the in box of my account for this blog a week ago, when I came across a bit of what I like to call “fan mail.” No, this wasn’t hate mail (which is what a lot of my “fan mail” consists of), but rather an email of the “Won’t you reconsider what you wrote about a crank?” variety. Today, I decided finally to answer, but publicly. The crank is Geert Vanden Bossche, whom I first wrote about in March in the context of an open letter by him that had gone viral warning of global catastrophe if the mass vaccination campaign against COVID-19 were not stopped. The reason for his warning was a prediction that mass vaccination would select for more dangerous variants of SARS-CoV-2, the virus that causes COVID-19. This led a reader (whose name I will not reveal) to ask me whether, in light of the much more transmissible (and possibly more virulent) Delta variant that’s been spreading across the US like proverbial wildfire over the last few of months, I might want to “reconsider” my previous criticism of Vanden Bossche:

    • Integrity/Availability

      • Proprietary

        • .docx With Embedded EXE

          What is hiding in this maldoc, is just 2 embedded files: [...]

        • Finland’s Nokia wins 5G order for three European markets

          Finnish telecom gear maker Nokia (NOKIA.HE) said on Monday it had won a 5G network order from A1 Telekom Austria Group for operations in Bulgaria, Serbia, and Slovenia.

        • Hillicon Valley: Millions exposed due to Microsoft misconfiguration

          Data from private companies was also exposed, including from various other Microsoft groups, Ford, American Airlines and J.B. Hunt. Data exposed included COVID-19 contact tracing, vaccination appointments, Social Security numbers, employee IDs and other personal information on millions of individuals.

        • Security

          • Get paid to improve Linux and open-source security | ZDNet

            To help remedy this, David A. Wheeler, the LF’s director of Open Source Supply Chain Security, recently revealed the LF or its related foundations and projects directly fund people to do security work. Here’s how it works.

          • What You Need to Know About Linux Rootkits [Ed: Overlooks the fact that those rootkits need to get there in the first place; for this, the system needs to be compromised in the first place. This is just a stealth thing.]

            Rootkits are an effective way for attackers to hide their tracks and keep access to the machines over which they have gained control. Read on to learn about rootkits, how to detect them and how to prevent them from being installed on your system in the first place.

          • Privacy/Surveillance

            • ACLU Advocate Reining in Government Use of Face Surveillance, Champion of Privacy Rights Research, and Data Security Trainer Protecting Black Communities Named Recipients of EFF’s Pioneer Award
            • Researchers Who Built Similar System Explain Why Apple’s CSAM Scanning System Is Dangerous

              Jonathan Mayer, a Princeton University professor and former chief technologist at the FTC, is one of the smartest people I know. Every time I’ve spoken with him I feel like I learn something. He’s now written a quite interesting article for the Washington Post noting how he, and a graduate researcher at Princeton, Anunay Kulshrestha, actually built a CSAM scanning system similar to the one that Apple recently announced, which has security experts up in arms over the risks inherent to the approach.

            • atracids

              which reminded of a speech by my daughter in which she denounced surveillance capitalism and privacy abuses through software with pictures of Big Bad Wolf disguised as Little Red Riding Hood’s grandma with sentences like Aral’s citation, and of the witch offering Snow White a poisoned Apple, of Jack climbing the beanstalk and meeting the Giant on the Clouds, and of Rapunzel seeing the world only through the tower Windows. Shortly thereafter, she demanded to switch schools, because her school was rolling out Google for Ad-ucation (her term) and she couldn’t take that any more.

            • Confidentiality

              • T-Mobile breach hits 53 million customers as probe finds wider impact

                In its latest update, which comes days after the U.S. Federal Communications Commission (FCC) opened an investigation into the breach, T-Mobile revealed it had identified 5.3 million additional wireless subscribers who were impacted by the breach as well as 667,000 more accounts of former customers.

                The data includes addresses, dates of birth and phone numbers of customers, the company said, adding that it had no indication that the accessed data contained financial information such as credit card or other payment data.

    • Defence/Aggression

      • Investigation Of ShotSpotter’s Practices Is Raising Questions The Company’s Angry Statement Really Doesn’t Answer

        Earlier this month, another courtroom challenge of evidence exposed another questionable alteration of a gunshot report by law enforcement tech supplier, ShotSpotter. In 2018, a man shot by police officers claimed in his lawsuit that ShotSpotter altered gunshot detection records at the request of law enforcement to back up the officers’ narrative — one that claimed he had shot at them first. No gun was ever recovered and the number of shots originally detected by ShotSpotter matched the number fired by officers, leaving them at least one shot short of their “he shot first” story.

      • Biden’s Botched Withdrawal From Afghanistan is Consistent With Two Decades of America’s Missteps There

        Republicans predictably jumped on this demonstrable foreign policy failure, neglecting to mention that it was Biden’s predecessor Donald Trump who laid the groundwork for the withdrawal of U.S. troops and worked with the Taliban to do so. Senate Minority Leader Mitch McConnell (R-KY) expostulated, “This debacle was not only foreseeable, it was foreseen,” as if Trump would have done any better as a second-term president. Trump’s former Secretary of State Mike Pompeo in an interview on Fox News with Chris Wallace chimed in, saying, “It looks like the Biden administration has just failed in its execution of its own plan,” even though of course the Democratic president was essentially carrying out Trump’s plan. The Republican National Committee has now deleted a page on its website that had celebrated Trump’s dealings with the Taliban, perhaps hoping no one would notice.

        The corporate media was equally unforgiving of Biden. The Washington Post’s editorial board issued a scathing opinion blaming Biden for any future deaths, saying that the U.S. “assumed at least partial responsibility for all Afghans. Leaving them now means walking away from that responsibility.” The Post also worried about America’s global prestige, saying, “at risk is the United States’ reputation as a partner, as would-be allies around the world watch and calculate the value of an American commitment.”

      • After Vietnam, Iraq and Afghanistan, Is It Credible to Trust the Intel Agencies on Wuhan?

        On May 26, these words should have poured forth from the White House Press Corps and the mainstream Commentariat when Joe Biden declared that he was placing the question of Covid-19’s origins securely in the hands of the “National Intel Agencies.”  They were to report back in 90 days.

        Have not the Intel Agencies been up to their eyeballs in deception about the “Global War on Terror” for the past 20 plus years?  Must we really remind the press and commentariat of the scandal of the Weapons of Mass Destruction hyped by the Intel Agencies to bamboozle a highly skeptical public into the War on Iraq?

      • ‘The Answer Is No’: Taliban Reject Idea of US Extending Exit Deadline

        Taliban leaders on Monday said they will not accept any effort by the Biden administration to extend its August 31 deadline for the U.S. withdrawal from Afghanistan, warning that such a move would be certain to “provoke a reaction.”

        “If the U.S. or U.K. were to seek additional time to continue evacuations—the answer is no,” Taliban spokesman Suhail Shaheen told Sky News in an interview Monday. “Or there would be consequences.”

      • The Myth of Empire and the Real Message of Dune

        Over the last few days, I have been thinking a lot about this book, as well as the movie adaptations. When Westerners (see: Americans, Canadians, Europeans, Brits, Australians) see Dune this fall, I wonder if any of them will have any idea that Arrakis is a perfect symbol for Afghanistan (or even Iraq, or Bolivia, etc.). Or that the much coveted and fought over “spice” is code for opium (or oil, or lithium, or whatever the Empire and its imperial houses demand or wish to control). Or that the imperial bad guys in the film, complete with their noble houses, obscene material wealth and military might, are symbolic of their own governments, corporate powers and armed forces?

        Of course, the same questions could be asked about other modern cinematic epics, from Star Wars to Avatar, even The Hunger Games. Despite the obfuscation of Hollywood and its unholy alliances with the Pentagon, the underlying mythic message remains, if even as a whisper largely drowned out by the latest computer-generated effects and Pentagon approved technology. An empire brutally forces its hegemony on the poorest and most maligned peoples. These people happen to sit on a vast wealth of minerals or resources or “spice.” And many of them resist the brutal incursion onto their lands. But it always seems lost on the audience that should get the message the loudest and the clearest. There is a disconnect with most Western audiences when it comes to the reality of their government’s foreign policies and military aggressions in the Global South. How much of the propaganda have Westerners swallowed?

      • Opinion | Star Trek: Anti-Imperialist Doctrine

        On February 9, 1967, hours after the US Air Force pounded Haiphong Harbor and several Vietnamese airfields, NBC television screened a politically momentous episode of Star Trek. Entitled “The Return of the Archons,” the episode marks the debut of the Prime Directive – the supreme law of the fictional United Federation of Planets, and its Starfleet, banning any and all purposeful interference with alien people, civilizations, and cultures. Devised in 1966, as President Lyndon B. Johnson was sending another 100,000 troops into Vietnam, the Prime Directive constituted a direct, though well-camouflaged, ideological challenge to what the US government was up to.

      • In Must-Watch Rant, Mehdi Hasan Rips War Hawks for Lecturing World on Afghan Exit

        In a brief and fiery monologue on national television Sunday night, MSNBC host Mehdi Hasan took aim at the journalists, hawkish politicians, and defense industry-funded ex-military officials who are currently denouncing the ongoing U.S. withdrawal from Afghanistan after playing an integral role in launching—and lying on behalf of—the catastrophic 20-year war that set the stage for the chaotic departure.

        “Our newspaper op-ed pages, our TV screens are filled with people who got it wrong still trying to lecture the rest of us about what should happen now in Afghanistan,” Hasan said in the “60-second rant” segment of his weekend show.

      • The Poison of Nationalism

        The ideal of a post-cold war tolerant world where resources (including food and water), are shared equitably, governments cooperate and borders soften has been usurped by rabid intolerance and racism, wall building, flag waving, cruel unjust immigration policies and violent policing of migrants and migrant routes. Rather than addressing issues and tackling underlying causes the ardent nationalist blames some group or other, ethnic, religious or national.

        Love, distorted but potent, and hate sustain the monster: Love and corrupted pride of nation and ‘our way of life’, seen among the flag wavers as somehow superior; hatred of ‘strangers’, and hatred of change to that which is familiar. It is an insular reactionary movement of introspection and division based on false and petty notions of difference: skin color, religion, language, culture, even food.

      • Opinion | Despite Trillions Spent, the US Military Hasn’t Won a Real War Since 1945

        The United States emerged from its victory in World War II as the world’s preeminent superpower. Its annual military budget—about three-quarters of a trillion dollars a year—exceeds the aggregate of the next ten countries in the world.

      • Far Right Groups Tied to Jan. 6 Attack Reporters and Others at Anti-Mask Rally
      • Media Rediscover Afghan Women Only When US Leaves

        Just as US corporate news media “discovered” Afghan women’s rights only when the US was angling for invasion, their since-forgotten interest returned with a vengeance as US troops exited the country.

      • The US and UK Got Things So Wrong in Afghanistan Because They do Not Understand the Afghan Way of War

        The Afghan way of war has created confusion among foreign political and military leaders in the past 20 years, but never more so than during the past few weeks as the Taliban swept through the country, capturing city after city without facing serious resistance.

        Intelligence agencies had generally assured western leaders that the Afghan government had the soldiers and weapons to make a fight of it. They did so, even after president Joe Biden announced on 14 April that all American troops would be out of Afghanistan by the 20th anniversary of 9/11. Biden said that a Taliban victory was not “inevitable” and Boris Johnson added that the Taliban had “no military path to victory”. Experienced politicians do not make such confident predictions unless their intelligence chiefs have been telling them the same thing.

      • Will Americans Who Were Right on Afghanistan Still Be Ignored?

        That decision set in motion a cycle of violence and chaos that no subsequent U.S. policy or military strategy could resolve over the next 20 years, in Afghanistan, Iraq or any of the other countries swept up in America’s post-9/11 wars.

        While Americans were reeling in shock at the images of airliners crashing into buildings on September 11, 2001, Defense Secretary Rumsfeld held a meeting in an intact part of the Pentagon. Undersecretary Cambone’s notes from that meeting spell out how quickly and blindly U.S. officials prepared to plunge our nation into graveyards of empire in Afghanistan, Iraq and beyond.

      • Why We Lost in Afghanistan

        “The soul of [an] army can’t be breathed into the army by a foreign military power or a foreign military force on the ground.” Any inquiry into why the American enterprise in Afghanistan ended in abject failure should begin with this cogent observation by retired Lt. Gen. Karl Eikenberry, who commanded all US forces in Afghanistan and subsequently served as US ambassador in Kabul. “Only the Afghans,” Eikenberry emphasized “can give their army a soul and its identity.”

      • Guam Was Ready to Help Relocate Afghans. Biden Ghosted.

        Hagåtña, Guam—Before the Taliban toppled the US-backed government of Afghanistan, refugee advocates and government insiders had been calling on President Joe Biden to take steps to evacuate Afghans at risk of violence. They offered resources, ideas, and expertise, but for months they received no response. The State Department sluggishly issued “special immigrant visas” for those who had helped the US military, seemingly with no plan for what to do with the tens of thousands of SIV applicants—and those facing persecution who don’t fall under SIV parameters—who would be stranded in Afghanistan when the US troops were gone. This article was published with support from Columbia University’s Ira A. Lipman Center for Journalism and Civil and Human Rights.

      • Invasion of the US Capitol
      • Proud Boys & Far-Right Groups Tied to Jan. 6 Attack Reporters & Others at Anti-Mask, Anti-Vax Rally

        As COVID-19 cases surge in the United States, anti-mask and anti-vaccine protests are continuing nationwide, with some turning violent. In a shocking story out of California, at least one person was stabbed and two journalists were attacked while covering an anti-vaccine, anti-mask demonstration outside Los Angeles City Hall on Saturday, August 14. The protest was attended by members of the Proud Boys and other right-wing groups. A Southern California mortgage broker named Tony Moon, who also participated in the deadly January 6 insurrection at the U.S. Capitol, was videotaped attacking the independent journalist Tina-Desiree Berg. “He started screaming ‘Unmask them all!’ He ripped my mask off and manhandled me,” says Berg, a reporter at Status Coup News in Los Angeles, who describes how the same people have been involved in violent protests nationwide. “This is a group that has been traveling around … and they instigate violence wherever they go.”

      • The Taliban’s Resurgence Was Years in Making & Aided by Trump, Who Sidelined Afghan Gov’t in Talks

        Concern is growing over a broader humanitarian crisis across Afghanistan as people continue to crowd the Kabul airport to flee after the Taliban takeover of the country. The World Health Organization says about one-half of Afghanistan’s population, including nearly 10 million children, already need humanitarian assistance, and the numbers are expected to soar as Afghanistan’s economic crisis intensifies. The Taliban is now under intense pressure, says Emran Feroz, an Austro-Afghan journalist and author. “They know that any kind of Afghan state in future will be dependent on foreign money, which includes American money; otherwise, the people of Afghanistan and the state itself cannot survive,” says Feroz. “The Taliban must be really pragmatic and try to find a way to build a very inclusive government within a short time, because otherwise they will have a lot of problems.”

      • MintPress News Confronts Senator Cruz on Murderous US Sanctions

        On Saturday, MintPress News’ Ben Rubinstein ran into Senator Ted Cruz at Las Vegas’ McCarran International Airport. Recognizing the senator’s long-standing support for economic warfare on the Global South via unilateral coercive measures, or sanctions, Rubinstein jumped at the chance to confront Cruz.

      • Expanding the Military Draft Is Not Feminism. Abolishing Draft Registration Is.
      • Some Taliban websites go offline amid broader tech crackdown

        The downed websites come amid a growing crackdown from some tech companies on the Taliban. Throughout the week, the Taliban have used WhatsApp groups in Afghanistan to help relay messages about their government takeover. But some Taliban WhatsApp groups have recently disappeared, according to SITE, a private intelligence firm that tracks extremist groups.

      • UK: During the half-time interval at the home game of the Blackburn Rovers football team, the stadium announcer calls on Muslims to pray!

        On August 10, when Lancashire Rovers were playing against Morecambe, the stadium announcer cordially invited all Muslims who wished to go to the designated prayer room to perform Salat Maghrib (prayer just after sunset).

        Note that at the entrance to the Rovers Stadium “multi-faith prayer room”, which consists of a room for men and a room for women, it is advised to take off one’s shoes….

      • Nigerian Gunmen Free 15 More Abducted Baptist Students

        Around 1,000 students have been kidnapped since December after gangs started to target schools and colleges. Most have been released after negotiations, but scores are still being held in forest camps.

      • Spike Lee Says He Still Has ‘Questions’ About What Happened on 9/11

        The four-part docuseries, which weaves together stories, memories and insights of New York’s greatest challenges in the 21st century, premiered on Aug. 22 on HBO and HBO Max. For the series, Lee conducted over 200 interviews with first responders, politicians, journalists and Lee’s own family and friends. Featured interviewees offering first-hand accounts include Jon Stewart, Rosie Perez, Jeffrey Wright, John Turturro, Chuck Schumer, Bill De Blasio, Alexandria Ocasio-Cortez and more.

    • Environment

      • Beyond Science: Art and the Environment
      • Forest people offer the best hope of saving them

        Trees are vital for solving the climate crisis. But there’s nothing simple about the forested world, as forest people know.

      • ‘Extreme Weather’ Ads Target Democrats Defending Fossil Fuel Subsidies

        More than two dozen advocacy groups launched “extreme weather ads” in five state newspapers on Monday to pressure right-wing Senate Democrats to stop giving taxpayer money to the oil, gas, and coal companies most responsible for the climate emergency.

        “It’s time for Congress to stop taking over $15 billion from hardworking Americans and giving it to billionaire fossil fuel CEOs.”—Anusha Narayanan, Greenpeace

      • Global Warming’s Walking Dead

        Today, it is a time when NASA is able to present its data without having to be afraid to get its budget cut by conservative politicians for using the words “global warming”. Yet, conservatives and right-wing populists are all too eager to replay the Galileo Galilei vs. Catholic Church power struggle in which, the world’s foremost astronomer had the knowledge but the church had the power and the instruments of torture.

        As the journal Nature said on the IPCC climate report, earth is warmer than it’s been in 125,000 years. Collectively, the 7.9bn people on earth have moved earth into what we know as Anthropocene – the geological epoch dating from the time when human beings began to make a significant impact on earth’s geology and ecosystems. Some set the Anthropocene’s starting date as the early 1950s – the beginning of routine above-ground atomic testing. Anthropocene means rampant global warming.

      • Extinction Rebellion Blockade Central London Street to Kick Off Fortnight of Protests

        Hundreds of climate activists are occupying a busy street in central London today in the first of two weeks of protest against the UK financial sector’s continued investment in fossil fuels.

        The environmental campaign group Extinction Rebellion (XR) has erected a large pink “crisis table” at the junction of Long Acre and St Martins-In-the-Fields in Covent Garden.

        Stay up to date with DeSmog news and alerts

      • Opinion | Carbon Dividends Provide a Win-Win Solution for People and the Climate

        Win-win solutions that bring tangible benefits in the present generation while safeguarding the planet for future generations can broaden public support for policies to fight climate change. This is the political intuition behind the Green New Deal, which reframes climate policy as an opportunity to reboot the economy and create millions of jobs. The same logic applies to carbon dividends, a strategy that puts a price on carbon emissions and returns the money straight to the people.

      • Energy

        • 15 Insurers Drop Trans Mountain Pipeline After Grassroots Pressure
        • As Subsidies Roll in, the Fossil Fuel Industry Is Winning Efforts to Cast Blue Hydrogen as a ‘Clean’ Fuel

          As global efforts to ramp up the hydrogen industry gain support with big government subsidies, new research casts increasing doubt on the climate credentials of the main recipient of that support, so-called “blue” hydrogen, which is extracted from natural gas and paired with carbon capture technology. 

          Hydrogen, an energy carrier proposed for helping transition the world away from fossil fuels, is well-suited for the oil and gas industry’s public relations machine. The industry, a major player in the main lobbying group, the Hydrogen Council, can run ads and talk about moving toward green hydrogen, which is produced from water using renewable energy, while working in the interim to get the world hooked on blue hydrogen. Blue hydrogen is made from natural gas, which is mostly methane, using electricity generated by burning more gas, and hydrogen is considered “blue” (rather than “gray”) when its carbon emissions are sequestered. The process uses lots of energy and releases carbon dioxide, plus, the natural gas supply chain is known to leak the powerful greenhouse gas methane. 

          Stay up to date with DeSmog news and alerts

        • Tallinn’s train stations missing bicycle parking lots

          People taking trains often use bicycles as a means to get to the train station and leaving bicycles at the station would be a comfortable way of transportation. In many larger Tallinn train stations, such as Ülemiste, Kitseküla or Balti jaam, there is no option to do so, however, ETV’s daily affairs show “Aktuaalne kaamera” reported on Sunday.

    • Finance

      • In Win for Gig Workers, Judge Rules California’s Prop 22 Unconstitutional
      • Opinion | A Victory for Gig Workers as California Rules Uber Can’t Hack Labor Laws

        Gig workers have won an important victory in California’s courts. On August 20, a judge ruled that a ballot initiative by Uber, Lyft, and DoorDash aimed at creating a permanent precarious workforce was unconstitutional. The decision is a major blow to the platform companies, which spent well over $200 million last year on Prop 22 to overturn a state law extending employee rights to most California gig workers.

      • Understanding The California Ruling That Said Prop 22, The Gig Worker Ballot Initiative, Was Unconstitutional

        Opponents of Uber et al. have been cheering the recent California court decision declaring Proposition 22 unconstitutional. Proposition 22 was a ballot measure passed to override significant parts of the legislature’s AB 5 bill, which affected all sorts of untraditional employment arrangements, including those of “gig workers.” Some people unhappy with the policy effects of Proposition 22 then sued to challenge its validity under the California Constitution. And, at least initially, have won.

      • Explaining 21st-Century Capitalism in a Way Everyone Can Understand

        Capitalism is just one particular way of—a system for—organizing the production and distribution of goods and services. It differs from other systems such as slavery and feudalism but also shares some similarities with them. Capitalism, like slavery and feudalism, divides those engaged with the production and distribution of goods and services into two groups, one small and the other large. Slavery had masters (few) and enslaved people (many), while feudalism divided the groups into lords (few) and serfs (many). Employers are capitalism’s smaller group. They control, direct, and oversee the economic system. The employers use production and distribution to grow their wealth. Capital is wealth engaged in self-expansion. As the systemic agents who are socially positioned to perform that expansion, employers are capitalists.

        Capitalism’s much larger group comprises the employees (or workers). As the majority in the system’s workplaces, they do most of the work. Employees are divided into two groups. One group, often called “productive workers,” are those directly involved in producing goods or services. In a company that produces chairs, for example, they are the makers of the chairs (people directly transforming wood into chairs). The second group of employees, often called “unproductive workers,” are not directly involved in contributing to the workplace’s output. Rather, unproductive workers provide the conditions and the context that enable the productive workers to directly produce the output. Examples of unproductive workers in a workplace include clerks who keep records and sales and purchasing departments’ employees who secure inputs and market outputs.

      • Sex workers made OnlyFans valuable — then it sold them out

        In 2019, OnlyFans, a content subscription platform founded three years prior, had about 120,000 creators registered with the site. But after the pandemic left millions of people out of work and sex workers unable to safely meet with clients in person, people flocked to the platform, which was already well-known for its adult content. By the end of 2020, OnlyFans boasted 1 million creators and 90 million users.

    • AstroTurf/Lobbying/Politics

      • Opinion | Will Senate Democrats Stoop to Confirming Rahm Emanuel as Ambassador?

        When President Biden announced late Friday afternoon that he will nominate Rahm Emanuel to be the U.S. ambassador to Japan, the timing just before the weekend was clearly intended to minimize attention to the swift rebukes that were sure to come.

      • Opinion | Our Progressive Agenda Is Popular and Our Candidates Can Win

        Progressive policies are popular. Progressive candidates are winning. But you would not know that after the establishment takeover in the op-ed pages and political pieces following former state Sen. Nina Turner’s (D) loss in the Ohio special primary election. 

      • The Fall of the House of Cuomo – Lessons Unlearned

        First, the comparisons: Former President Donald J. Trump must be chuckling. As the worst sexual predator to rule the White House, he must be wondering about the “weak” (his word) loser who quit while protesting his actions were innocent. Trump, the rapacious, super sexual assaulter, physically pushed women around, boasted about his prowess, and bragged about his seizures of women’s private parts. He also paid hush money to prostitutes in violation of campaign laws during his 2016 presidential campaign.

        Yet the Democrats, led by Senator Kirsten Gillibrand (D-NY), hounded Senator Al Franken out from the Senate before his requested investigations by the U.S. Senate Select Committee on Ethics began its inquiry for alleged sexual harassment. Franken’s actions were not Trump-like by any measure and occurred before Franken even ran for office. The women who worked for him, past and present, voluntarily came forward to vouch for Franken as a Senate champion both of women and of consumer rights.

      • Primary Challenger Hits Henry Cuellar for Trying to Tank Biden Agenda

        Jessica Cisneros, a Democratic candidate for U.S. Congress in Texas’ 28th district, on Monday slammed the district’s incumbent Democratic Congressman Henry Cuellar for being willing to obstruct his own party’s effort to expand Medicare, establish a pathway to citizenship, and fight the climate crisis.

        “It is sad to see Henry Cuellar work so hard to stand in the way of improving the lives of everyday South Texans.”—Jessica Cisneros

      • Buffalo’s Democratic Establishment Still Trying to Defeat Socialist India Walton

        “I can promise every person in Buffalo that if I lost the primary, I wouldn’t be trying to change election laws and work with Republicans to override the will of Buffalonians.”—India Walton

      • Bernie Sanders’s Third Campaign

        Burlington, Vt.—Bernie Sanders does not want to be mistaken for an optimist. “I’m a glass-half-empty kind of guy,” he grumbles, as he works his way through the stacks of budget documents that are strewn across the desk in his spartan office on the third floor of a 123-year-old red-brick building on the north end of downtown Burlington. That’s the image he’s fashioned for himself across five decades of political campaigning, and he’s comfortable with it. But the thing is, for all his genuine cynicism about the political and governing mechanisms he has long decried as corrupt, Sanders keeps erring on the side of what the writer Rebecca Solnit refers to as “hope in the dark.” He’s willing to take chances in order to push the boundaries of the possible: to run for and secure a seat in the US Senate as an independent, to bid for the presidency as a democratic socialist, to propose a political revolution. So it shouldn’t come as a surprise that—from his recently acquired position of prominence and power as chair of the Senate Budget Committee—Sanders has launched a new campaign to achieve “the most progressive moment since the New Deal.”

        For Sanders, this is an urgent mission that is about much more than the proposals outlined in the budget plan he joined Senate majority leader Chuck Schumer in outlining on August 9. It is a necessary struggle to address the simmering frustration with politics as usual that Donald Trump and his Republican allies have exploited to advance an antidemocratic and increasingly authoritarian agenda.

      • The Biggest Gamble of Nancy Pelosi’s Life
      • Right-Wing Dems Begin to Cave as Progressives Hold Their Ground on Reconciliation Vote

        An effort by nine conservative House Democrats to force a quick vote on a bipartisan infrastructure bill reportedly began to collapse over the weekend as progressive lawmakers—and Speaker Nancy Pelosi—made clear that they would not allow the legislation to advance until the Senate also passes a sweeping reconciliation package, a centerpiece of the majority party’s agenda.

        Earlier this month, Rep. Josh Gottheimer (D-N.J.) and eight other Democrats sent a letter to Pelosi (D-Calif.) threatening to vote down a $3.5 trillion budget resolution—a measure that sets the stage for the reconciliation package—unless the House first passes a $550 billion bipartisan infrastructure bill that the Senate approved on August 11. Their stance won the support of powerful actors in Washington, most prominently the U.S. Chamber of Commerce, the biggest-spending corporate lobbying organization in the country.

      • Afghanistan: the Miserable Performance Of The Mainstream Media

        The editorial boards and oped writers of our mainstream media in discussing the war, continue to cite “enduring American faith in the values of freedom and democracy” as the underlying purpose of our effort.  The New York Times, in fact, cited the “purity of U.S. values” such as civil rights, religious tolerance, and women’s empowerment as a justification for our occupation of Afghanistan.

        Although the U.S. press praises our benighted efforts at nation building, the Soviet Union actually built more hydroelectric dams, tunnels, and bridges in Afghanistan than the United States has.  This includes the Friendship Bridge that provided an exit ramp for the Afghan military.  Moscow also educated about 200,000 Afghan engineers, military officers, and administrators, which allowed the Najibullah government to hang on for several years in the wake of the Soviet withdrawal in 1989.  The Ghani government didn’t last for 24 hours after our withdrawal.

      • Dennis Kucinich and Lisa Wells – The Project Censored Show, Uncategorized

        Dennis Kucinich, of Ohio, served eight terms in the US House of Representatives, and twice ran for President.

      • Apple’s Tim Cook, Microsoft’s Satya Nadella Plan to Visit White House

        Apple’s Tim Cook, Microsoft’s Satya Nadella and Amazon’s Andy Jassy plan to attend the event scheduled for Wednesday afternoon, according to people familiar with the matter.

      • Joe Biden reportedly hosting cybersecurity meeting with Tim Cook, Satya Nadella, and Andy Jassy attending

        Apple, Microsoft, Google, Amazon, IBM, JPMorgan, and Southern Company all declined to comment to Bloomberg, and a Southern Company spokesperson declined to comment to The Verge. The other companies and the White House have not replied to requests for comment from The Verge.

    • Censorship/Free Speech

    • Freedom of Information/Freedom of the Press

      • Statement On Receiving The Serena Shim Award For Uncompromised Integrity In Journalism

        Kevin Gosztola was awarded the Serena Shim Award for Uncompromised Integrity in Journalism for his work thus far on WikiLeaks founder Julian Assange’s case. The Association for Investment in Popular Action Committees, based in California, is an antiwar group that gives the award to those whose work is “deemed important, courageous, and relentless in pursuit of truth, however inconvenient it may be to those who use deception for political gain.” “Thank you for this award,” Gosztola said. “It validates the commitment I have to covering a case that has widespread implications for truth-tellers and freedom of the press. My coverage will not stop until the United States government is no longer trying to bring a publisher to the U.S. for a trial. ” Gosztola joins an esteemed group of independent journalists and organizations that have previously received the award including: Max Blumenthal, Glen Ford, Danny Haiphong, Caitlin Johnstone, Rania Khalek, Margaret Kimberley, Aaron Maté, Ben Norton, Gareth Porter, Black Agenda Report, Consortium News, The Grayzone, MintPress News, and Venezuela Analysis. In fact, Julian Assange previously received the award. All of these people or organizations are in some way, shape, or form scorned by think tank members or staff of outfits that receive funds from U.S. government-affiliated institutions, military and security contractors, or private companies in the banking or oil and gas industry. They are despised because they are effective in challenging the warfare state. What this award amounts to is a much needed but rare form of solidarity that will make it possible for Gosztola’s independent journalism on Assange and other truth-tellers, who are treated as enemies of the United States, to continue.

    • Civil Rights/Policing

      • 1984 in 2021: We’re Doing Big Brother’s Job for Him

        Disturbing, yes, but a prediction fail on Orwell’s part. The political class’s openly stated desire for a Ministry of Truth to suppress “misinformation” on social media notwithstanding, there’s little evidence that it needs any such brute mechanism to let it have its way with the facts.

        Circa 2021, mainstream media spend most of their ink and bandwidth uncritically regurgitating, and affirming their faith in, the political establishment’s preferred narrative of the moment.

      • Opinion | We Reject the Right-Wing Attacks on Racial Justice and Our Classrooms

        As of the middle of August, more than two dozen states have introduced—and 11 states have enacted—bills or rules to restrict the teaching of history and contemporary social realities. Right-wing activists have mounted similar attacks at school board meetings throughout the country. This stunning barrage of legislation and policies aims to ban teaching critical race theory (CRT), and supposedly “divisive topics” in the curriculum.

      • How Will the UK’s Nationality and Borders Bill Affect Migration Across the English Channel?

        I attempt to put myself in the shoes of those desperate asylum seekers who put their life on the line knowing they may not make it to their destination. Unfortunately, while you, as a reader, and I, as a writer, and those policymakers in our safe place have the option to choose sides, the sea does not. The sea does not care where you come from or who you are; the sea does not discriminate; and the sea can kill, particularly those in those fragile boats.

        These asylum seekers are heroes fleeing persecution, oppressive governments, and, in many cases, wars in search of protection, security, and a better life. These asylum seekers are actual heroes, but if the current bill is passed, they will become criminals the moment they arrive in the UK.

      • Truth and Justification: On the Cruelties Against Indigenous People

        “Kill the Indian, save the man,” proclaimed Richard Henry Pratt, a veteran officer of the Indian Wars and follower of Gen. George Custer. Pratt was describing the true mission of the Carlisle Indian Industrial School in Pennsylvania, which opened on a former Army base in 1879. By 1900, there were 150 such schools across the United States, all dedicated to eradicating the culture, language, and customs of Indigenous children. Europeans sailed across the Atlantic to “discover” the so-called New World, and they kidnapped our siblings, parents, aunts, uncles, grandparents, and great-grandparents. In these schools, our names were changed, our heads were shaved, and our clothes and other belongings were taken from us. Our families endured enormous physical, emotional, psychological, spiritual, and sexual abuse. And it’s not ancient history; we live with survivors of those schools.

      • He Admitted to a Rape 41 Years After the Fact. For One Survivor: “It’s the Most Freeing Experience in the World”

        Julienne Wood was walking through the aisles of Costco this June when a college friend rang her up.

        “Jules, where are you?” asked her friend, out of breath and barely able to speak. “I have something REALLY BIG to tell you. … You’re gonna finally get answers you’ve been looking for. … I sent you a series of articles from ProPublica. … It’s big — way, way bigger than we thought.”

      • Why Americans hate and fear the poor: Joanne Samuel Goldblum on the price of inequality

        The Institute for Policy Studies recently reported on how the world’s richest people have profited from the human misery of the coronavirus pandemic while returning little if anything to the common good: [...]

      • EXPOSED: Western Females Groomed to Embrace Islamic Garb as Afghani Females Shot for Improper Attire (Video)

        Muslims have launched a sharia propaganda campaign aimed at veiling non-Muslim western girls using TikTok. The video-sharing platform has already been under scrutiny for its illegal use of data about children and ties to the Chinese government. Young women in German and Austrian cities are approached by Muslims who offer to “restyle” them with Hijabs and Islamic body coverings. Muslims film the young western girl’s “hijabi transformations” then post them on their TikTok channel. The channel is linked to an online Hijab store.

        The videos are inundated with comments by hundreds or thousands of what appear to be Muslim men, praising the girls for their beautiful Islamic transformation. The videos are being celebrated among radical Muslim circles.

        This embracement and glamorization of Islamic headwear and bodywear are helping to advances sharia in Germany, Austria, and the West. Cultural jihad is the attempt to change and subvert Western culture from within, or more simply put: to Islamize it. Sharia fashionwear is an example of a cultural and civilizational jihad   and the submission of Western non-Muslim women to that jihad.

      • Taliban ‘going door to door’ marking those of prominent women

        “Just an hour ago, I received an update from Kabul where they are going house to house searching for women who were activists, women who were bloggers, YouTubers, any women who had a role in the development of civil society in Afghanistan,’ she told Women’s Hour.

        “They are going door to door targeting those women and marking the doors with bright pink or bright-coloured paint to ensure ‘this is the house we need to come back to and do something about them’.”

      • Police killed a Black Army veteran outside his home. His family wants answers.

        She said she believes that because of her brother’s race, police took no measures to de-escalate the situation.

    • Internet Policy/Net Neutrality

    • Monopolies

      • NY Times And Washington Post Criticize Facebook Because The Chicago Tribune Had A Terrible Headline

        I’m going to try, once again, to do that stupid thing where I try to express a nuanced point on the internet, where there’s a high likelihood of it being misunderstood. So, consider this opening a warning that you should read this entire article to try to get at the larger point.

      • Patents

        • Unilin Granted Patent on Digital Structuring Technologies in Europe [Ed: Unilin seems not aware that the ‘European’ Patent Office is granting lots of fake patents these days, not caring about quality or validity]

          Waregem, Belgium, August 23, 2021-The European Patent Office will grant a new European Patent on Unilin Technologies’ digital structuring technologies.

          The specific patent EP 3 381 710 will further extend Unilin Technologies’ patent portfolio on “digital structure technologies” for panels.

      • Copyrights

        • Aerosmith Hands Entire Catalog to Universal Music Group

          Since Aerosmith’s founding 50 years ago, the group has gone on to sell more than 150 million albums around the world. Universal says the group are “the best-selling American hard rock band of all time”.

        • The Pirate Bay Earned Millions in Bitcoin Donations (If it HODLed)

          The Pirate Bay continues to receive a steady stream of Bitcoin donations. Over the past year, these added up to roughly $10 per day, which isn’t a life-changing amount. However, if the site had kept all bitcoins received over the years, it would now be sitting on a pile of more than $6 million in Bitcoin.

        • Two DJ Music Piracy Cases Five Years Apart, Two Very Different Outcomes

          Dutch anti-piracy group BREIN says it has shut down a music piracy service that offered an illegal pool of 350,000 tracks in exchange for an annual payment of 250 euros. That matter has now ended in a cash settlement but five years ago, a man who provided a similar service in the UK with a not-for-profit motive, was jailed for a year.

        • Meet the CC Summit Presenter: Leo Cunha

          Leo is a seasoned systems architect and education technology executive with over 30 years of progressively challenging experience in management, leadership, and the design and development of mission critical software systems for education.

DRM: Defectis Repleta Machina

Posted in DRM, Free/Libre Software at 4:01 am by Dr. Roy Schestowitz

By Alexandre Oliva and Fernanda G. Weiden


Summary: This article is a draft of a revised version of the one published in the ComCiência magazine on December 10, 2006 [ORG], translated by FSFLA’s translation team.

As you start your brand new car to go to the beach, you realize it won't let you do it. Murphy's law can often make it seem like mechanical failures are nature's way of opposing your wishes. But what if the car manufacturer had reasoned that, by selling you a car that will take you to work but not to have fun at the beach, it would be able to sell you another car specifically for beach visits?

“What's the distance from an electronic failure that gets a Thai official stuck in his automobile [BMW,BM2] to an anti-theft device that deliberately imprisons inside the car anyone not explicitly authorized, restraining her right to freedom of movement under the pretext of stopping a potential crime?”"The Right to Read" [R2R], published in the magazine Communications of the ACM (CACM), one of the best-regarded publications in computing, prophesied in 1996 the pervasive use of software and remote monitoring as tools to control access to knowledge and culture. In the article, textbooks and articles are only available electronically, and students are forbidden from sharing them with their colleagues; monitoring
software on every computer, and severe penalties upon those that merely appear to be attempting to circumvent it, pretty much ensure compliance. After a mere 10 years, we may get the impression that the author got it both right and wrong. Access restrictions are indeed already present in some electronic textbooks and articles, but they have showed up far more often in the entertainment field, limiting access to music, movies, etc. Are we facing a problem even bigger and worse than the CACM article forecast?

DRM, for Digital Restrictions Management, means any technique that seeks to artificially limit, by software, hardware or a combination thereof, the features of a digital device with regards to access or copying of digital content, so as to privilege whoever ultimately imposes the technique (e.g., not the DVD player manufacturer, but the movie industry), in detriment of whoever uses the device. Considering that nowadays microprocessors inhabit not only computers, but also cellular telephones, electronic games, sound, image and video devices, remote controls, credit cards, automobiles and even the keys that open them, it should be at least worrying that all this equipment may be programmed to turn against.

What's the distance from an electronic failure that gets a Thai official stuck in his automobile [BMW,BM2] to an anti-theft device that deliberately imprisons inside the car anyone not explicitly authorized, restraining her right to freedom of movement under the pretext of stopping a potential crime?

In spite of all resources used to keep potential invaders outside homes and cars, as far as we can tell there aren't any anti-theft devices that keep them in, should they succeed in breaking in. This is due in part to respect for invaders' rights, and in part for vendors' fear of imprisoning the device owner himself, his relatives or friends, or of causing them other kinds of physical or moral harm.

DRM systems are portrayed by their proponents as anti-theft devices, similar to those available for homes and automobiles. Oddly, even people who'd never accept an anti-theft device that could imprison themselves are often willing to pay for the restraint on their freedoms imposed by DRM systems.

The same publishers that are powerful enough to pressure customers to pay for the development and adoption of DRM systems also use that power to make authors sign contracts that let the publisher decide what restrictions to impose, all under the pretext of hindering unauthorized access and copying, that cause them alleged losses.

The moral value of sharing, formerly taught at schools as something good for society, through incentives to sharing toys taken to classrooms, is slanderously labeled with a term that also refers to people who attack ships, stealing their cargoes and killing or enslaving their crews [MIC]. The confusion and bias of the term intellectual "property" [NIP], further elaborated in the Orwellian fallacy of copyright "protection" [WTA], turns people's attention away from the fact that copyright was created with the express purpose of growing the body of works available to the whole society, using, as incentive to creation, temporary and limited monopolies granted by society to their authors [EPI].

As a result of these misconceptions, the Brazilian population silently accepted the change to its copyright law, that up to 1998 permitted the creation of complete copies, for personal use, of works covered by copyright, so as to permit only copies of small portions [PNL]. Americans, in their turn, accepted a new delay in Mickey's entry in the public domain, with an extension of the copyright duration for another 20 years [CLG]. These are the first steps to the scenario described in the CACM article [R2R].

Unlike the practice for anti-theft devices, that are designed to respect the users, enabling them to activate or deactivate the system, and to respect even the rights of transgression suspects, DRM takes a far more aggressive posture, treating even the owner of the device as a criminal, without room for presumption or even proof of innocence. DRM takes control of the system away from the users' hands, since, just like the defective Thai car, it doesn't offer an option to turn the system off. Since, in the DRM case, the defect is deliberate [DlD], the control remains in third parties' hands, who use the devices you pay for to promote their interests to your own detriment. In fact, for DRM, you are the invader. But since you pay their bills, they want to keep you not outside, but rather inside, entertained and controlled [EeC].

DRM does not hesitate in trampling over your rights; not only international human rights [HRD,DlD,ADR], but also those guaranteed b copyright laws throughout the world, even restrictive ones like Brazil's [RDA]. Some examples of rights trampled over by DRM are:

  • copying a work that has fallen in the public domain;

  • copying a work, in full or in part, for personal use, study, criticism, legal proof, parody or accessibility;

  • participating in cultural life of the community, enjoying the arts and sharing in scientific advancement and its benefits;

  • being presumed innocent until proved guilty according to law in a public trial with all guarantees necessary for the defense;

  • holding opinions without interference and expressing them freely;

  • seeking, receiving and imparting information and ideas through any media and regardless of frontiers;

  • having one's privacy respected and protected by law against arbitrary interferences.

In fact, these systems often collect information and send it to a remote controller, interfering arbitrarily with the user's privacy. In at least one of these cases, that got widely known, a DRM system developer did not hesitate in infringing third parties' copyrights to create a spying program, that installed itself, silently and automatically, in a computer in which a music CD containing it was loaded, and enabled the computer to be remotely controlled, without any option to remove or deactivate it [SNY]. Is it legitimate to disregard others' rights to try and seek bigger profits?

DRM systems are implemented by combining software and hardware. There are several techniques; we cite but a few examples:

  • brutal quality degradation of video cassette recordings made out of DVD (Digital Versatile Disk) reproductions;

  • cryptography that prevents the reproduction of a DVD in any player, requiring multiple licenses to be able to play the same content anywhere in the world;

  • violation of the CD (Compact Disc) specification so as to make it difficult or impossible to play the songs in it on several CD players and general-purpose computers;

  • file formats that are secret or regulated by patents to limit the performance of the content to software or devices with artificially-restricted functionality;

  • authentication mechanisms between digital devices that prevent the propagation of high-quality digital signal to unauthorized devices [WVC], such as from the new high-definition DVD and digital TV standards to analog TVs and VCRs, or even more modern digital devices that refuse to restrain their users' freedoms.

As ways to work around these artificial restrictions become public, enabling people to exercise their rights guaranteed by law, new ever-more-restrictive efforts take their place, in an attempt to avoid alleged losses that disregards actual losses imposed on society, not only because of the increased direct and indirect costs of equipments due to the imposition of unfair restrictions [WVC], but even more importantly because of the unfair restrictions themselves.

Some of these efforts are in the legislative front: USA's Digital Millennium Copyright Act criminalizes the mere distribution of devices or publication of knowledge that enables people to bypass DRM. USA have tried to impose similar legislation on other countries with whom they sign "Free" Trade Agreements [TLC]. Laws that strengthen DRM turn its proponents into private legislators, with powers to unilaterally change contracts, by restricting access retroactively.

Other efforts are in the judicial front: associations that claim to represent the interests of musical authors, but that in fact represent the interests of record labels, have spread fear by suing regular people, accusing them, without proof, of copyright violations [RLS,MdM].

The technical front is not ignored: a security architecture based on a combination of software and hardware, formerly called Trusted Computing, has been co-opted to serve not the interests of computer owners, but rather those of DRM systems [TCM], the reason why we prefer to call it Treacherous Computing [TcC,CTr]. This technique can be used to stop installation or execution of software, against the user's will, or even the creation or correction of such software; to selectively prevent the creation, access or preservation of certain files [IRM]. That is, to prevent a general-purpose computer from obeying user's commands, turning it into a limited entertainment platform, that puts on third parties' hands the decision on what, when and how the user can use or consume. Somewhat like the car programmed to not go to the beach, or the electronic books stored in computers in the CACM article.

All these techniques do a lot to make law-abiding regular citizens' lives difficult, but they can't stop those who run their businesses based on commercialization of unauthorized copies. For the latter, the investment needed to work around the restrictions pays off, so all these restrictions end up missing their goal, while they limit and disrespect freedoms of most of the population.

This disrespect is not new and, in fact, it has made room to make DRM techniques effective. Free Software [FSD], that respects users' freedoms to inspect the program, modify it or hire third parties to do so, and run the original or the modified program, without restrictions, when used to implement DRM techniques, renders them ineffective, since the user would have the power to disable artificial restrictions or add features that had been left out. As a result, laws that prohibit tools to bypass DRM have the effect of prohibiting Free Software for accessing published works.

Software patents [SPE,NSP] are another threat to freedom that a few developed countries are trying to impose upon other countries. A legally-valid software patent, issued in a country that allows such patents, gives the patent holders the power to block, in that country, the development and distribution of software which implements the patented feature. If the companies in a DRM conspiracy have patents on some aspects of the decoding process, they can use these patents as another means to block software that can access the same works but without the restrictions.

It shouldn't be surprising that the Free Software Foundation [FSF] and its sister organizations all over the world denounce the risks of these limitations to individual freedoms [DbD,DRi,EeC], and at the same time update the most widely used Free Software license in the world [Gv3,GPL,Gv1], such that it better defends software users' and developers' freedoms against these new threats. The GNU GPL is the license used by most components of the GNU operating system, and by the Linux kernel, the most common kernel used with the GNU operating system. (Most users unknowingly refer to this combination Linux, but that is properly speaking the name of the kernel alone [YGL].)

Anyone who seeks knowledge or culture in digital formats has her rights threatened by DRM. In fact, the impossibility to preserve society's knowledge and culture in face of all these artificial limitations may cause our civilization to be seen in the future as a dark age, since, unless we can help it, all of our knowledge will have been stored in formats that, instead of ensuring its preservation, in the perfect conditions enabled by digital storage, seek to ensure its unavailability.

"If consumers even know there's a DRM, what it is, and how it works, we've already failed," — Peter Lee, an executive at Disney [Eco]

When you see the acronym DRM in a product's ad, remember that it's not a feature, it's a warning label. Remember that DRM stands for Defectis Repleta Machina, or Defect-Ridden Machine. So, when you get to make a choice, while purchasing movies, songs, electronic books, games, etc, between a form limited by DRM and an unlimited one, prefer the unlimited form, unless you can work around the DRM techniques. When there isn't such a choice, reject monopolized and restricted content, as well as the legal mechanisms, the equipment and the techniques that support them. Use your freedom of choice today, avoiding short-sighted decisions that empower interests that, should they prevail, will restrain any possibility of choice in the future. Spread the word on the risks and support campaigns that do it [DbD,DRi,EeC,BDV]. Join us in the Latin-American anti-DRM campaign, Entertained and Controlled, in the FSFLA [FLA] mailing list [A-D].

We thank Richard M. Stallman, Eder L. Marques, Glauber de Oliveira Costa and Fernando Morato for their reviews and suggestions.

[R2R] http://www.gnu.org/philosophy/right-to-read.html

[BMW] http://catless.ncl.ac.uk/Risks/22.73.html#subj4

[BM2] http://www.zdnetasia.com/news/hardware/0,39042972,39130270,00.htm

[MIC] http://www.gnu.org/philosophy/misinterpreting-copyright.html

[NIP] http://www.gnu.org/philosophy/not-ipr.xhtml (see also the discussion on Intellectual Property on the [WTA] page)

[WTA] http://www.gnu.org/philosophy/words-to-avoid.html#Protection

[EPI] http://www.fsfla.org/?q=en/node/128#1

[PNL] http://www.petitiononline.com/netlivre

[CLG] http://www.cartacapital.com.br/index.php?funcao=exibirMateria&id_materia=3446 (in Portuguese)

[DlD] http://www.fsfla.org/?q=en/node/101

[EeC] http://www.entretidosecontrolados.org/

[HRD] http://www.unhchr.ch/udhr/lang/eng.htm

[ADR] http://www.fsfla.org/?q=en/node/107

[RDA] https://www.planalto.gov.br/ccivil_03/Leis/L9610.htm, articles 46 to 48 (in Portuguese)

[SNY] http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal#Copyright_violation_allegations

[WVC] http://www.cs.auckland.ac.nz/~pgut001/pubs/vista_cost.txt is a good article overall, even if it falls prey of the "content protection" fallacy [WTA] and it mistakes Linux for an operating system name [YGL].

[TLC] http://www.fsfla.org/?q=en/node/117

[RLS] http://info.riaalawsuits.us/howriaa.htm

[MdM] http://overmundo.com.br/overblog/inaugurado-o-marketing-do-medo (in Portuguese)

[TCM] http://www.lafkon.net/tc/, with subtitles at http://www.lafkon.net/tc/TC_derivatives.html

[TcC] http://www.gnu.org/philosophy/can-you-trust.html

[CTr] http://www.dicas-l.com.br/zonadecombate/zonadecombate_20061106 (in Portuguese)

[IRM] http://www.informationweek.com/story/showArticle.jhtml?articleID=196601781

[FSD] http://www.gnu.org/philosophy/free-sw.html

[SPE] http://www.fsfeurope.org/projects/swpat

[NSP] http://www.nosoftwarepatents.com/en/m/dangers/index.html

[FSF] http://www.fsf.org/

[DbD] http://www.defectivebydesign.org/

[DRi] http://drm.info/

[Gv3] http://gplv3.fsf.org/

[GPL] http://www.gnu.org/copyleft/gpl.html

[Gv1] http://www.gnu.org/copyleft/copying-1.0.html

[YGL] http://www.gnu.org/gnu/why-gnu-linux.html

[Eco] http://www.economist.com/displaystory.cfm?story_id=4342418

[BDV] http://badvista.fsf.org/

[FLA] http://www.fsfla.org/

[A-D] http://www.fsfla.org/cgi-bin/mailman/listinfo/anti-drm

[ORG] http://www.comciencia.br/comciencia/?section=8&edicao=20&id=216 (in Portuguese)

Copyright 2006 Alexandre Oliva, Fernanda G. Weiden

Copyright 2007 FSFLA

Permission is granted to make and distribute verbatim copies of this entire document without royalty provided the copyright notice, this permission notice and the URL below are preserved.


« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts