This Aged Very Poorly: Unified Patent Court (UPC) “Should Enter Into Force in 2014.”

Posted in Europe, Patents at 7:51 pm by Dr. Roy Schestowitz

Also see: This Did Not Age Well: UPC to Start… 5 Years Ago

Lies from a decade ago:


Always trust the lawyers…

Links 16/11/2021: New Fedora 35 (F35) Builds and Red Hat Satellite 6.10

Posted in News Roundup at 6:57 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • 10 risks when dual-booting operating systems

        Today, it is common to have several operating systems installed natively on a computer. If, for instance, you need to use both Linux and Windows interchangeably, the best thing you can do is Dual-boot your machine obliging you to select which operating system to boot every time you turn on your PC.

        Dual-booting your machine, for instance, Windows and Linux, can positively boost productivity and negatively introduce risks and issues that affect performance. Have you considered installing a second or third operating system and want to be aware of the risks? Then you are at the correct place, mate. Having Windows and Linux on your PC gives you the best of both worlds.

        Nevertheless, it is not always smooth cruising. Dual-booting sometimes causes issues, some of which are challenging to foresee; as the saying goes, every Pro has its con.

    • Audiocasts/Shows

    • Kernel Space

      • Linux 5.17 To Boast A Big TCP Performance Optimization – Phoronix

        While the Linux 5.16 merge window just ended and that kernel won’t be out until the tail end of the calendar year, already for Linux 5.17 new material is beginning to accumulate in the respective subsystem development trees… One set of changes merged this morning from Google can provide a sizable performance win around TCP performance in the datacenter.

        Merged this morning by David Miller is these TCP optimizations from Eric Dumazet, a Google engineer.

    • Instructionals/Technical

      • Install phpLDAPAdmin on Debian 10/Debian 11 – kifarunix.com

        In this guide, you will learn how to install and setup phpLDAPadmin on Debian 10/Debian 11. phpLDAPadmin (also known as PLA) is a web-based application written in PHP for administering LDAP servers. PLA is designed to manage records in an LDAP server, including creating, modifying, deleting records.

      • How to Install and Configure AppImage on Ubuntu 20.04

        To install software’s on Ubuntu or any other Linux distributions, you might notice that you would have to download .dep or .rmp files and then double click or run them through the terminal.

        While it is convenient and easy to install software for their respective distributions users, it is not convenient for the developer.

        The developer has to create multiple files and packages for that specific software needed for that distribution. That’s where AppImage comes into play.

      • How to change the Debian version for Crostini on a Chromebook

        Today we are looking at how to change the Debian version for Crostini on a Chromebook. Crostini is the Linux Development platform on a Chromebook. The Current options are Debian 9 (stretch), 10 (buster), and 11 (bullseye). Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How To Install WPS Office on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install WPS Office on Ubuntu 20.04 LTS. For those of you who didn’t know, WPS Office is a high-performing, yet considerably more affordable solution that is recognized as a preferred alternative to Microsoft Office and is fully compatible and comparable to Microsoft PowerPoint, Excel, and Word. Although the WPSoffcie is a premium office suite, however, it is available free of cost for personal usage, thus being a cross-platform product, one can use it free of cost on Microsoft Windows, Linux, macOS, and Android.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the WPS Office on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • Getting Started with Docker: Dry – interactive CLI for Docker containers

        There are some great tools that make Docker easier to use. We covered the web-based Portainer CE in the previous article in this series.

        But what if you want an easy way to manage Docker from the terminal? Dry is a terminal application to manage Docker and Docker Swarm.

        Dry shows information about containers, images and networks, and, if running a Swarm cluster, it shows information about nodes, service, stacks and the rest of Swarm constructs. It can be used with both local or remote Docker daemons.

        Besides showing information, Dry can be used to manage Docker. Most of the commands that the official Docker CLI provides are available in Dry with the same behaviour.

      • Output your microphone to a remote computers speaker – blackMORE Ops

        The following command will Output your microphone to a remote computers speaker.

      • Easily Create Virtual Machines in Linux With QEMU-based Quickgui

        At present, it is fairly easy to create virtual machines thanks to programs like VirtualBox, VMware, and a few others.

        You can still install VirtualBox in your Linux system to proceed. But, in this article, I put my focus on an exciting tool that’s simple to use, works fast, and quickly helps you to spin up a virtual machine, i.e., Quickgui.

      • How to dual-boot Ubuntu and Windows 11
      • How to install Erlang on Ubuntu 20.04

        Erlang is a functional, general-purpose, concurrent programming language and garbage-collected runtime environment built for concurrency, fault tolerance, and distributed application architectures. It is supported and maintained by Ericsson OTP product unit.

      • How to Install PHP 8.1 on Debian 11 Bullseye – LinuxCapable

        PHP 8.1 is a significant update of the PHP language that will be “officially” released on November 25, 2021. This is a giant leap forward from the existing PHP 8.0 release with the new PHP 8.1 is bringing enums, fibers, never return type, final class constants, intersection types, read-only properties amongst the long list of new features and changes.

        In the following tutorial, you will learn how to import the Ondřej Surý Repository and install PHP 8.1 on your Debian 11 Bullseye system.

      • Red Hat (RHEL) 9 Netinstall Guide / GNOME 40 Tour [Full Install Guide] – If Not True Then False

        This is full guide, howto install RHEL 9 (Red Hat Enterprise Linux 9 Plow) using boot iso image. I use here RHEL 9 Beta iso image, but this will work later pretty much same way, when final Red Hat 9 arrives. I install Red Hat 9 Workstation, but also RHEL 9 Server installation is possible using exactly same method. I also use network installation (netinstall), but you can also download and use full Red Hat 9 DVD iso image.

      • Toggle Panel Visibility & Custom GNOME Shell All-In-One via Extension | UbuntuHandbook

        How to hide top-bar, remove left dock and ‘Activities’, as well as toggle visibility of a few other Gnome Panel items are often asked questions. I used to use a few extensions to do the jobs until met ‘Just Perfection’.

        Just Perfection includes a list of options to toggle visibility of GNOME UI Elements, customize panel size, padding, and change the behavior.

    • Games

      • Blast through a comic book online in the latest Fury Unleashed update | GamingOnLinux

        Fury Unleashed, a modern action-platformer that has an awesome style to it recently had a huge upgrade finally bringing with it online co-op support. Taking inspiration from other rogue-lite platformers including Dead Cells and Rogue Legacy with a little explosive flair from Contra and Metal Slug it certainly delivers.

        One of the key points of interest in Fury Unleashed is how you’re playing through a living comic book, with ink being your main valuable resource. Each room you blast through is a different panel from this comic.

      • Tactical cyberpunk turn-based RPG Mechajammer launches December 2 | GamingOnLinux

        Mechajammer from developer Whalenought Studios and publisher Modern Wolf, is an upcoming cyberpunk horror CRPG set on a grim future colony world and it’s set to release on December 2.

        Giving you plenty of freedom in how you approach the game with the open-world design, they said it was “designed with the player agency as the key focus”. How you do things is down to you. Set in a far-future Earth that has been ravaged by overcrowding, pollution, and war – Mechajammer looks like it ticks a lot of boxes for me and that’s some pretty tasty looking pixel-art included too.

      • Plan ahead and heist away in Spirited Thief, with an open Alpha on Steam | GamingOnLinux

        Need something fresh this week? How about scouting out and planning for a heist? That’s what you’ll be doing in Spirited Thief and you can get in on the action early.

        Planned to release on Steam in 2022, the developer has turned on their Steam Playtest, so anyone can request access to play through the current open Alpha version. The developer mentioned they’ve been developing some of it on Manjaro Linux too which is interesting to see.

      • Open Hexagon, a spiritual successor to Super Hexagon is out now | GamingOnLinux

        Inspired firmly by Super Hexagon with approval from Terry Cavanagh, the fast-paced and adrenaline-inducing paced arcade experience Open Hexagon is now available after leaving Early Access.

        With simple gameplay it’s easy to get into but it gets hard – really damn hard! You get four actions with spinning, swapping by 180° degrees, and focus (slow down). It requires a lot of concentration and good timing with your fingers. Your goal is always the same: last as long as possible.

      • Base-building bronze-age RTS TFC: The Fertile Crescent has a new demo on Steam | GamingOnLinux

        TFC: The Fertile Crescent continued to be upgraded for the upcoming Steam release and now there’s a new demo available with online multiplayer.

        “Inspired by the real history of the Near East Bronze Age era, TFC utilizes classic RTS elements while offering a unique perspective for the genre. Taking technological limitations and advancements into account, players will need to carefully consider how to spend their precious Knowledge Points, as they explore the Village Improvements that are designed to enable players to quickly counter an opponent’s strategy.”

    • Distributions

      • Experiment desktop UI without ROX

        EasyOS, Quirky, and all the pups before, use Joe’s Window Manager (JWM) for the system tray and menu, and ROX-Filer to manage the desktop icons and wallpaper. There have been some pups developed by the Puppy-community that use other desktop UIs, such as XFCE, but none, that I know of, were official pup releases.

        On and off over the years, I have wondered about cleaning up the desktop. One issue, is you select a nice wallpaper, then it gets partly obscured by icons. Those icons might not match the wallpaper nor the overall theme, and they may be not obvious on a very “busy” wallpaper. I mean, getting the icons to look nice on top of the wallpaper is a challenge.

      • Screenshots/Screencasts

      • SUSE/OpenSUSE

      • IBM/Red Hat/Fedora

        • Red Hat Satellite 6.10 is now available

          We are pleased to announce the availability of Red Hat Satellite 6.10. This release includes many new and updated features, including improved support for Secure Environments and new features to simplify operation and administration.

          Red Hat Satellite streamlines the deployment and maintenance life cycle of Red Hat environments to enable organizations to focus on their lines-of-business applications and reduce operations overhead. In 6.10, Satellite improves the user experience by focusing on simplicity and enhancing support for secure environments.

        • Alma and Rocky Linux release 8.5 builds, Rocky catches up with secure boot

          AlmaLinux and Rocky Linux, both of which provide community builds of Red Hat Enterprise Linux (RHEL), have released builds matching RHEL 8.5, with Rocky’s work catching up with Alma by being signed for secure boot.

          Would-be CentOS replacements AlmaLinux and Rocky Linux track RHEL closely, and differ from CentOS Stream in that they aim to be binary compatible with RHEL, whereas CentOS Stream is upstream of Red Hat’s commercial distribution.

        • CentOS Linux 8 Updated Against RHEL 8.5 Before Going EOL – Phoronix

          Following last week’s release of Red Hat Enterprise Linux 8.5, CentOS Linux 8 version 2111 has been released as its RHEL 8.5 rebuild. This comes ahead of CentOS 8 becoming end-of-life at year’s end.

        • Top 10 reasons to use automation

          Are you unsure whether Red Hat Ansible Automation Platform is right for you? Or are you having problems convincing other people in your organization to give automation a try?

          Have no fear! We’re here to help with our top 10 reasons to use Ansible Automation Platform in your organization. And, in the grand tradition of late night talk shows of yore, we’ll count these down from ten.

        • Fedora Linux 37 intends to end support for 32-bit ARM architecture

          For implementation in Fedora Linux 37 scheduled transfer into the discharge legacy architecture ARMv7, also known as ARM32 or armhfp. All development efforts for ARM systems plan to focus on the ARM64 (Aarch64) architecture. The change has not yet been reviewed by the Fedora Engineering Steering Committee, which is responsible for the technical development of the Fedora distribution. If approved, the last 32-bit ARM release will be Fedora 36 with updates until June 2023.

        • Ben Williams: F35-2021115 Updated Lives Released

          The Fedora Respins SIG is pleased to announce the latest release of Updated F35-2021115-Live ISOs, carrying the 5.14-14-200 kernel. This is the First Set of Fedora 35 updated isos.

          This set of updated isos will save considerable amounts of updates after install. ((for new installs.)(New installs of Workstation have about 918MB of updates savings )).

    • Devices/Embedded

      • Jetson edge AI system features eight PoE ports

        GigaIPC’s rugged “QBix-Jetson” system offers a choice of Jetson Nano or Xavier NX modules plus DP, HDMI, SATA, 2x GbE, 8x GbE with PoE, 4x USB, 4x COM, 2x M.2, and mini-PCIe.

        GigaIPC, the embedded computing unit of Gigabyte, has announced its first Arm-based QBix system, following earlier models such as its Apollo Lake based QBix-WP. The new QBix-Jetson-Nano and QBix-Jetson-Xavier-NX are identical except for the choice of an Nvidia Jetson Nano or Jetson Xavier NX module.

        Designed for edge AI computing, machine vision, and deep learning applications in smart city and factory environments, the QBiX-Jetson ships with Nvidia’s Ubuntu-based L4T distribution, which is based on an LTS Linux kernel. It also supports Nvidia’s JetPack SDK, which includes TensorRT, cuDNN, CUDA Toolkit, VisionWorks, GStreamer, and OpenCV.

      • Open Hardware/Modding

        • Jigglypuff Sensor Breathes CO2 So You Don’t Have To | Hackaday

          But even when compared with such an extensive body of previous work, this Jigglypuff IoT environmental monitor created by [Kutluhan Aktar] is pretty unusual. Sure, the highlights are familiar. Its MH-Z14A NDIR CO2 sensor and GP2Y1010AU0F optical dust detector are read by a WiFi-enabled microcontroller, this time the Arduino Nano RP2040 Connect, which ultimately reports its findings to the user via Telegram bot.

        • Binaural Hearing Modeled With An Arduino | Hackaday

          You don’t have two ears by accident. [Stoppi] has a great post about this, along with a video you can see below. (The text is in German, but that’s what translation is for.) The point to having two ears is that you receive audio information from slightly different angles and distances in each ear and your amazing brain can deduce a lot of spatial information from that data.

          For the Arduino demonstration, cheap microphone boards take the place of your ears. A servo motor points to the direction of sound. This would be a good gimmick for a Halloween prop or a noise-sensitive security camera.

        • Opa is an open source boat bot that navigates the open water | Arduino Blog

          Starting with an idea in 2019, Redditor wesgood has been steadily working on the Opa — an autonomous 3D-printed boat that can navigate open water while relaying its telemetry back in real-time to a client device over WiFi. After creating a small prototype, Wes built a second one that featured a pair of pontoons held together with a couple of struts and a central platform. This design contains a single water jet that is situated in the back of each pontoon that takes in water and shoots it out at a high velocity, similar to a jet ski. Best of all, they can be independently throttled which eliminates the need for a rudder.

        • Pluto Spectrum Analyzer Uses Command Line

          If you don’t care about shortwave frequencies, the PlutoSDR is a great deal. The device is supposed to be an evaluation board for Analog Device’s radio chips, but it does great as a software-defined radio that can receive and transmit and it even runs Linux internally. [SignalsEverywhere] shows how to use it as a spectrum analyzer that works from the command line in the video you can see below.

          The software used is Retrogram. Despite the ASCII graphics, the program has many features. You can use simple keystrokes to change the center frequency, the sampling rate, the bandwidth, and more. You can run the software on a Linux host or compile a binary on the box or cross-compile using tools on the Raspberry Pi.

          The Pluto connects via USB but looks like a network adapter. That means you can talk to it like a remote computer and software can run on the host computer or directly on the hardware which has an ARM processor (or two, if you hack it).

    • Free, Libre, and Open Source Software

      • CloudStack 4.16 adds cluster autoscaling, plays nice with Dell EMC PowerFlex and Rocky Linux

        The Apache Foundation’s infrastructure-as-a-service platform CloudStack was just released in version 4.16. The update is an LTS release, which means blocker defects, vulnerabilities and exposures found to impact the release will be merged and released for the next 18 months (so until about April 2023).

        Amongst the 22 new major features the release notes list — which also include support for OpenSuse and Rocky Linux — are a couple of UI enhancements which should make the project a bit more comfortable to use.

      • Web Browsers

        • Chromium

          • Partitioning Chrome’s Code for Faster Launch Times on Android

            Mobile devices are generally more resource constrained than laptops or desktops. Optimizing Chrome’s resource usage is critical to give mobile users a faster Chrome experience. As we’ve added features to Chrome on Android, the amount of Java code packaged in the app has continued to grow. In this The Fast and the Curious post we show how our team improved the speed and memory usage of Chrome on Android with Isolated Splits. With these improvements, Chrome on Android now uses 5-7% less memory, and starts and loads pages even faster than before.

      • FSF

        • GNU Projects

          • GCC 12 Moves On To Fixing Bugs – Now In “Stage 3″ Development – Phoronix

            As expected GCC 12 has now entered its “stage 3″ development phase where the free software developers involved will focus on bug fixing rather than landing shiny new features.

            SUSE’s Richard Biener announced on Monday that the GCC development branch is now focused on general bug-fixing. At the moment there are around 34 P1 regressions (bugs of the highest priority) followed by 306 at the P2 level, and around 237 P3 regressions. Those bugs need to be worked out or demoted before GCC 12.1 will ultimately be released next year.

        • Licensing/Legal

          • Wrapping up my internship, focused on helping build the GPLv3 drafting archive

            My name is Daniel Katz, and I interned at the FSF this past summer. My internship was easily a high point of the past year (and not just because it’s been a rough one). I got to make real contributions, learned more about the amazing free software community, and had a blast.

            I started things off by scavenging around the office for RAM to put in my laptop before delving into my first project: archiving the GPLv3 drafting website. As I poked around the servers, I found that the site had mostly been created with circa-2006 versions of Plone, MediaWiki, and a custom text-annotation/commenting system called Stet. To get the site’s static content, I finetuned a wget call; the tricky part came when I realized that simply throwing those files onto an Apache server and calling it a day wouldn’t be possible. Many files came from URLs with “?”s, which signify the start of a query string which have semantic meaning and are not treated as plain characters. I eventually came up with a solution involving renaming files and using Apache’s URL rewriting engine, which was a journey all its own.

            After that, I turned my mind to fixing the intractable commenting system of the site, which used dynamic, client-side HTTP requests to fetch comments. I came up with a solution that allowed the archive to be fully static by scraping the comments, turning them into JSON, and then writing new JavaScript and editing the comment page’s HTML to display the now-static comments. I even had to write a sorting algorithm to ensure the comments appeared in the correct order on the page (who says you never use CS fundamentals). So far, so good!

      • Programming/Development

        • Some notes on using esbuild

          I’ve been writing more frontend code in the last year or two – I’ve been making a bunch of little Vue projects. (for example nginx playground, sql playground, this dns lookup tool, and a couple of others)

        • Adam Young: Calling a Function in Assembly

          In my last post, I reversed a string. I want to build on that to make reusable code; I want to reverse multiple strings. I do this by turning the reverse code into a function and then call it.

          The first step is to reorder the code so that the logic to reverse the string is at the end, and is called using the BL (Branch with link) instruction. We also need to add a return at the end of our code so that we can continue processing. We make sure that the code to exit the program sits in between the calling point and the function.

        • Adam Young: Reversing a String in Assembly

          In my last post, I showed that I could modify a single character in a string. I want to build upon that to perform more complext string manipulations. Lets start with something simple.

          First, lets change a character other than the first. Since we want to reverse the string, changing the last character is a good next step. Insert this into the middle of the previous example.

        • Implement client-side search on your website with this JavaScript tool

          Search is a must-have for any website or application. A simple search widget can allow users to comb through your entire blog. Or allow customers to browse your inventory. Building a custom photo gallery? Add a search box. Website search functionality is available from a variety of third-party vendors. Or you can take the DIY approach and build the entire backend to answer search API calls.

          Lunr.js works on the client-side through JavaScript. Instead of sending calls to a backend, Lunr looks up search terms in an index built on the client-side itself. This avoids expensive back-and-forth network calls between the browser and your server. There are plenty of tutorials online to showcase Lunr’s website search functionality. But you can actually use Lunr.js to search any array of JavaScript objects.

          In this how-to, I build a search index for the top 100 books of all time. After that, I show you how to pre-build the index for faster indexing. I’ll also show you how to make the most of Lunr’s search options. And finally, I’ll show off findmymastodon.com—a real-world implementation of Lunr.

        • AMD Releases ROCm AOMP 14.0 Compiler – Switches To New “amd-stg-open” Branch – Phoronix

          AMD released AOMP 14.0 during SC21 week as the newest version of their LLVM/Clang-based compiler providing OpenMP GPU offload support for Radeon graphics processors.

          AOMP 14.0 was released this morning as the newest version of this patched-up version of LLVM/Clang that gets OpenMP GPU offload into good shape with Radeon GPUs and AMD Instinct accelerators.

        • Perl/Raku

          • Rakudo Weekly News: 2021.46 Cro Once Again

            The Cro Development team proudly announced version 0.8.7 of Cro, the set of Raku libraries for building reactive distributed systems, lovingly crafted to take advantage of all Raku has to offer. Sites such as raku.land and the IRC logs server beta run Cro in production. Check out all the fixes, improvements and new features such as async reverse proxying and improved warnings from rendering templates with undefined values.

        • Shell/Bash/Zsh/Ksh

          • What’s wrong with my footprintWKT?

            Long, long ago, the elder gods of GIS (Geographic Information System) judged that there were only three fundamental shapes you needed for digital mapping on a plane, and that they were all based on points:

        • Rust

          • Making Your Own Touchpad With PWM and Rust

            After writing some quick firmware in Rust, he was reporting the values read by the PWM channels. Using python, he could get a good idea of the raw values that were being written over USB and visualized. So rather than implement filtering in hardware or firmware, he elected to do the filtering and processing on the host computer side in Python. We suspect this gave him much shorter iteration cycles.

    • Standards/Consortia

      • Vulkan 1.2.199 Released With New Extension To Help VKD3D-Proton – Phoronix

        Vulkan 1.2.199 is out with another new extension driven as part of Valve’s work around Steam Play (Proton) and the Direct3D over Vulkan efforts.

        Vulkan 1.2.199 has fixes for a number of documentation issues raised both internally and via the community. For the most part it’s just another routine Vulkan spec update without any really exciting changes.

  • Leftovers

    • Science

      • Tech In Plain Sight: Eyeglasses | Hackaday

        People generally think of vision problems as being far-sighted or near-sighted. That is, fuzzy objects up close or far away, respectively. However, you can also have astigmatism which just causes general fuzziness and what we think of as far-sight can be caused by two distinct problems with your eye.

        Astigmatism is when the shape of the cornea is not perfect, so light coming in can wind up at more than one spot on the retina. If you have astigmatism, everything looks fuzzy and something like an LED will appear to be more than one LED from a distance.

        Hyperopia, a type of far-sightedness, and myopia or near-sightedness happen when the length of the eye is not correct or the lens system has an incorrect focal length. For hyperopia, the image focuses behind the retina and myopia has the focus ahead of the retina. The other cause of far-sightedness is presbyopia which is where the center of the eye’s lens hardens with age. The end effect is the same as hyperopia and it is why as we get older we can’t read fine print.

      • Microplastics Are Everywhere: Land, Sea And Air | Hackaday

        Plastics took off in the 20th century, with the new class of materials finding all manner of applications that metal, wood and paper simply couldn’t deliver on. Every field from electronics to the packaging of food found that plastics could play a role.

        Now, over 150 years since the development of Parkesine in 1867, we’re now realizing that plastics come with more than a few drawbacks. They don’t break down well in nature, and now microplastics are beginning to appear all over the Earth, even in places where humans rarely tread. It seems they may even spread via the air, so let’s take a look at this growing problem and what can be done about it.

    • Hardware

      • High-Resolution Audio: is it worth the hype?

        Can you hear the difference between a CD and an MP3 file? Most people cannot. But even if only one in ten can hear something, that means hundreds of millions of people. However, even if you can hear the difference, there is a good chance that the recording you love is not available in better than CD quality. Still, this problem is not as big as you first think. Let me show you why!

        The topic of high-resolution audio (or HiRes audio for short) comes up often in my discussions. In this blog, I try to summarize my experiences in a few simple points.

      • 3D Printed Marble Music Machine Looking Good Already | Hackaday

        To be clear, plans are to ‘go big’ and this little eight-channel testbed is just to explore this issues around ball guiding, transport and ball release onto the first audio test device, a Korg Nano Pad 2.

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • Going Beyond Source Code in 2021‭: ‬Joint Development Foundation and Open Standards Efforts

                In 2019, the Linux Foundation added the Joint Development Foundation (JDF) to its family of project communities to build upon its existing body of specification work. The addition of JDF to the Linux Foundation brought with it a unique but straightforward process that allows new projects to form quickly and collaborate under a standardized set of governance principles that ensure the resulting specification can be implemented with open source licenses.

                In 2021, the Linux Foundation has steadily increased interest and new project formation under Linux Foundation Standards (LFS) across various technical disciplines. We have also seen an acceleration of members and contributions in our established projects.

                “2021 can be characterized as a year of progress for LF Standards and JDF. We saw solid operational improvements in our traditional specification efforts, steady uptake on the Community Specification program, and some new wins with the acceptance of the SPDX specification by JTC1. The ability to quickly wrap a specification project with an open source project using well-established governance and standards-making processes seems to have fulfilled an unmet need in our industry,” said Seth Newberry, the General Manager of JDF.

                “We reached out to the Linux Foundation because we wanted to create the Coalition for Content Provenance and Authenticity (C2PA.org) under a simple but formal project structure. Given our project goals of creating technical specifications for countering misleading information online through digital provenance, it was critical to get up and running quickly and with minimal complexity” said Andy Parsons of Adobe Systems.

        • Security

          • Security updates for Tuesday

            Security updates have been issued by Debian (libxml-security-java), Fedora (botan2), openSUSE (drbd-utils, kernel, and samba), Red Hat (kernel and webkit2gtk3), SUSE (drbd-utils and samba), and Ubuntu (vim).

          • Google Releases Security Updates for Chrome | CISA

            Google has released Chrome version 96.0.4664.45 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.

    • Censorship/Free Speech

      • Lumen Researcher Interview Series: Turkish NGO EngelliWeb

        The relevant government agencies as well as the official government sources do not publish or reveal the number of blocked websites, news articles as well as social media content from Turkey. The authorities also do not publish the number of decisions issues and by whom they are issued as there are several administrative bodies which can issue blocking decisions in addition to the judiciary in Turkey. Furthermore, lack of judicial transparency means that the blocking and removal decisions are also not published and they are not publicly available. As we work in the field of Internet freedom in a specialized freedom of expression association, we decided to conduct detailed and extensive research in this field as we believe in transparency and we are trying to achieve transparency in this field.

    • Monopolies

EdgeDeflectorGate is Turning Into a Major Scandal for Microsoft

Posted in Antitrust, GNU/Linux, Microsoft at 6:29 pm by Guest Editorial Team

Guest post by Ryan, reprinted with permission from the original

Although Microsoft is now directly responding to this, as are their paid mouthpieces, it is clear now the scope of the EdgeDeflector PR disaster.

Here’s two such paid trolls defending Edge while at the same time claiming they’re not happy.

Microsoft Calls Firefox’s Browser Workaround “Improper,” Will Block It

I like Edge — too bad Microsoft is being a jerk about it

I don’t know what’s to like. Edge is basically just Chrome with Google’s spyware scooped out and Microsoft’s spyware put in.

On GNU/Linux it is even more absurd. We didn’t stop using Windows so we could start using the browser that Windows users don’t open unless it’s with one of these damned accidental clicks that’s all over Windows “11”.

Windows “11” is the most malicious OS Microsoft has ever released, just like every new version is.

Their official statement on breaking EdgeDeflector is basically that it’s their operating system, and if you don’t like it, up yours.

With Windows “11” barely a month old and not even registering in stat counters yet, over 500,000 people had already downloaded EdgeDeflector, according to Daniel Aleksandersen, the author of the program.

Given numbers like these, it’s obvious why Microsoft is being a bag of dicks and heading it off at the pass. This would have been where Edge stalled out and bled to death. Millions would have used EdgeDeflector because it’s easier to stuff a cork in it if Microsoft leaves this “issue” unaddressed than it is to make Windows take its medicine and put a real OS on the PC, like GNU/Linux. Edge only has 4% of users now, even with all of these ports.

EdgeDeflector users are a lot of people compared to the paltry number of Windows “11” victims so far. Some get conned into ‘free bait’ downgrade offers, some wake up and it found its way onto their computer, and OEMs will ship computers with it and not offer a choice at some point…..this is the only way new Windows versions gain any serious traction…Everyone knows they’re worse than the thing they already have and puts them off as long as possible.

In fact, there’s a perverse incentive to stay on an unsupported release of Windows. Microsoft will stop bricking it every month with crap updates they test on you.

Microsoft is minimizing (the number of users who think Edge is a dodgy spying piece of junk), denying, and blaming others. Which are the hallmarks of an abuser, as any victim of domestic violence will know if they’ve gone to a therapist about it.

“Microsoft isn’t a good steward of the Windows operating system. They’re prioritizing ads, bundleware, and service subscriptions over their users’ productivity,” developer Daniel Aleksandersen added in his blog.

For what it’s worth, the Free Software Foundation sent Microsoft a hard drive asking them to open source Windows 7 so that the community could correct it and maintain it. No reply. 😉 It read like a WTF moment, but they were being flippant, pointing out that Microsoft will never share Windows as open source, so the only wise move is to leave it.

Alexsanderson continue to pontificate, as if this were news to anyone who had driven a PC lately…..

“Microsoft still charges 200 USD for a Windows license while simultaneously filling the operating system with ads and crapware. Weeks before launch, Windows 11 wouldn’t even show the taskbar when it failed to display an advertisement dialog. Just last week, first-party apps and features of Windows 11 stopped working due to an expired encryption certificate.

For users, the best action is to complain to their local antitrust regulator or switch to Linux. Your Web browser is probably the most important — if not the only — app you regularly use. Microsoft has made it clear that its priorities for Windows don’t align with its users’.”

In the US, the antitrust regulators are going after Google, and to some extent Apple, and inexplicably (at least on the surface) leaving Microsoft alone.

While these other companies certainly have issues, neither of them are as nasty as Windows. Microsoft managed to water down the aftermath of US v. Microsoft so much that the consent decree eventually expired, and they said they’d behave.

This is much like the southern US states suing to overturn the Voting Rights Act of 1965. The law required them to get “pre-clearance” from the Department of Justice before enacting new election restrictions.

They went to the courts and said things had changed since 1965 and they would behave now, and then as soon as the law got struck down, they enacted hundreds of new voting restrictions, aimed largely at minorities and the poor, and criminalized black churches gathering votes from their congregants.

It’s simply revolting that all a bad actor has to do is promise to behave and then whether they’re a convicted criminal monopolist or want to bring back the Jim Crow south, they’re off the hook.

The court systems at the federal level are completely broken, obviously, and with so many Trump holdovers that he packed them with, I really doubt anything will happen to Microsoft there, so States need to take the initiative in enforcing their own laws, and citizens of the several States need to petition their State government to do so.

In 2016, I filed an antitrust and consumer fraud complaint against Lenovo in the State of Illinois, and if anyone wants the emails, I’ll release the damned emails. Nothing else I did got their attention. I posted about them locking GNU/Linux out of the Yoga 900-ISK2 series on Reddit /r/linux (full of Microsoft shills) and was banned and called deceptive, I went to the “tech news” naively, and was dismissed by Microsoft propagandists at ZDNet and elsewhere, which are even more a shitposting outfit now than they were then.

When they did post anything at all before I went to the Attorney General, it was some sort of PR blurb about how Lenovo designed the “360 degree hinge” for Windows 10 and “Linux couldn’t possibly work” with, you know, a hinge. Only, it did. As soon as you flipped it over into tablet mode, GNOME activated the virtual keyboard, screen orientation worked, the touchscreen worked, the physical keyboard was disabled until you put it in laptop mode again.

Actually, Windows 10’s on screen keyboard was a complete nightmare. If I tried using it in Firefox, nothing happened at all. It only worked in Edge (Legacy). Dirty tricks even then!

Nothing worked, until I complained in 16 pages of detail, to Lisa Madigan, the Illinois Attorney General, and THEN Lenovo quickly offered a BIOS repair for the affected models and not to do that again.

That laptop is blacklisted from running Windows “11”. It runs Kubuntu 20.10 fine.

This isn’t the first time I’ve had to take action against a company for things like this. There was also GPL compliance problems at Samsung. I sent them a letter and they refused to comply, and I got the SFLC after them regarding their infringements against BusyBox, and a source code tarball for my Blu Ray player appeared very soon after that.

Back to Edge…. We need a “Don’t use Edge!” campaign. We really do. If people refuse it and boycott it and even change operating systems over it, it will die.

If people really want a Chromium browser, recommend Brave to them instead.

On a strictly technical level, it’s hard to be much more terrible than Microsoft Internet Exploder. The reason “Edge” seems to crash less and get better security fixes is that Microsoft just brings all of those in from Chromium without doing much of anything. To the extent it’s better, it’s because they’ve gotten out of their own way there.

But with all of that spyware in there, and this “shove it in your face” attitude, it’s like, why do it?

Brave has all of the same important rendering engine features, it’s more secure, it’s the most private major browser out there. The same 2020 study found that Microsoft Edge and Yandex (a Russian search engine) were tied for the worst browsers.

We need to gravitate towards Free and Open Source Software, which doesn’t need your private information and doesn’t want it. We need to encourage these programs for others too.

Right now, the only browsers I’m recommending by name to people who ask are Brave, GNOME Web, and LibreWolf. The rest of them deserve each other.

Mozilla in 2021 is so pathetic that they removed support for setting your Windows “11” default browser in one click from the installer you could download from their Web site, and then said it’s because they wanted it to be just as crippled as the Windows Store version. (Mozilla’s blog has also gone straight to hell. They keep talking about things like magic fairy dust called “AI”, which doesn’t exist. They also clearly won’t be around when it does. It’s buzzword bullshit bingo at this point.)

Windows Store is a joke. Most of the apps are fake or are hobbled in some way. Everyone should avoid it.

With GNU/Linux we have real applications, secure applications, from sources like Debian’s Apt repositories, and FlatHub. No fakes in here.

I developed a hobby of collecting Web browsers when I was a child, and switching back and forth, and I still do that quite a bit, on Debian GNU/Linux now.

People would ask me why I tore apart Windows 98 (with a program called “Revenge of Mozilla” by Bruce Jensen, based on a demonstration tool written by Professor Ed Felten to demonstrate Microsoft’s lying to the court) and gutted it of Internet Exploder, the Trident engine, Outlook, and dozens of other things, and put in the FAT32-aware Windows 95 OSR 2.1 shell.

“I like browsers. I just don’t like theirs. Plus, my operating system doesn’t crash anymore now that it’s not causing the shell to leak out until there’s a Blue Screen of Death.”.

-Me (circa 1998)

Bill Gates testified in court that my operating system was broken.

I found that it ran what I wanted it to just fine.

Far from going deep, deep into the plumbing of the OS, an INF file could run through things in 2-3 minutes, unregistering COM objects, deleting files, cleaning registry keys, asking for the Windows 95 Shell, and you reboot and you’re running this greatly improved OS that’s much faster in less memory.

Microsoft added gratuitous dependencies on IE into programs that never needed it before, and created bloat and security hazards in things like Office 97, just to push Windows 95 users into giving up and embracing the horrors, so I switched to Star Office. I bought it at Staples the same day I bought MandrakeLinux.

What does go deep deep into the bowels of Microsoft is the sleazy, disreputable, lying scumbags.

“Creepy Uncle Bill” handpicked his successors and many of them are still there. Who do you think a guy who cheated on his wife every day with a different woman and flew around with Jeff Epstein trying to buy a Nobel Prize is going to pick to replace him?

How much could they have changed? Obviously not much.

Bonus: Here’s a tour of Windows 98 without Internet Explorer and with a Windows 95 shell patched to say Windows 98. Nathan Lineback at ToastyTech used a similar program called 98Lite, which was not freeware. I used RoM because it was freeware and I was a broke kid.

Microphone Visualisation/Spectrograms for GNU/Linux (Real-Time Status for Audio Input)

Posted in Free/Libre Software, GNU/Linux at 5:44 pm by Dr. Roy Schestowitz

noisetorch and glfer

Summary: When you are recording something and cannot be entirely sure that input from the microphone is indeed being registered/saved it can be helpful to use a spectrogram; today’s data loss was a motivator for exploring what’s out there for GNU/Linux users

Earlier today I recorded a video, which about third-way from the start simply stopped getting any sound (only video/screen persisted). I did not even notice this until half a day after the upload (someone reported it to me) because I don’t double-check whole videos, I only do a sanity check on the edges (start and finish). I had 3 video files left from this whole process and they seem to indicate the error had nothing to do with conversions/transcoding. It happened at the time of recording.

This didn’t upset me as much as previous incidents of this kind, probably because that was just 13 minutes in total (lost audio). Prior to that I lost the sound of very long videos (about an hour long). It happened several in the past, so I became more pedantic about testing stuff before recording. It’s just really frustrating trying to redo or recreate things from memory, not to mention that this whole experience can be a bit boring.

“It happened several in the past, so I became more pedantic about testing stuff before recording.”Spectrograms, which are not to be mistaken for spectrometers (confusing terminology that may deceive people outside those professional fields), can be implemented easily in software and as it turns out many implementations already existed a decade ago. Many are freely available also for GNU/Linux. Many studios like the platform.

They say the best way to improve is by learning from past mistakes and prevention of disaster is better than trying to mitigate (typically an impossibility in this context). I’ve tried alsa tools, hoping to find something handy (command line software) to no avail and later on I found a couple of different programs which are Free software. One did not work (friture, latest build), whereas the other one did (glfer). Picking up its input from noisetorch, it helps display the microphone’s input in waves or heat maps. It still assumes one uses older sound systems, so for pulseaudio a compatibility redirection is needed: padsp glfer

glfer is in the Debian repositories and also in Ubuntu’s. Maybe it’ll turn out to be a waste of time and CPU; but if there’s a chance it can prevent disaster or salvage lost work (the latter is unlikely), then it’s probably worth a try. I’ll have a go at it. I’m trying to record videos every day (Daily Links and general articles take up a lot of time too), so anything that can make the process smoother will be added to the workflow/pipeline. Much of this is automated or semi-automated already. Extra sanity checks cannot hurt.

Links 16/11/2021: Stratis 3.0.0 Released, New EndeavourOS ISO Imminent

Posted in News Roundup at 1:16 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Destination Linux 252: COSMIC Level Review of Fedora 35

        This week’s episode of Destination Linux, we are going to take a look at Fedora 35 now that it’s out. All of our hosts have been playing with this distro and it’s time to share our thoughts. Then we’re going to discuss a new desktop environment from System76. Plus we’ve also got our famous tips, tricks and software picks. All of this and so much more this week on Destination Linux. So whether you’re brand new to Linux and open source or a guru of sudo. This is the podcast for you.

    • Kernel Space

      • Graphics Stack

        • New Vulkan Extension Proposed To Help In Emulating AMD’s Old Mantle API – Phoronix

          Besides the efforts out there for implementing the likes of Direct3D, OpenCL, and OpenGL on top of Vulkan, there does still exist the hobbyist project for implementing AMD’s Mantle API atop Vulkan for which the Khronos API was originally based. A new Vulkan extension is now being proposed to help in that Mantle-on-Vulkan effort.

          GRVK is that open-source project implementing AMD’s Mantle API atop Vulkan. GRVK has seen a few releases over the past year, most recently was GRVK 0.4 from back in April.

        • Freedreno Gallium3D Lands Basic Support For “Clover” OpenCL – Phoronix

          Mesa 22.0 development code now has basic support in the Freedreno Gallium3D driver for OpenCL powered by the Clover state tracker.

          Freedreno is the open-source Gallium3D driver for Qualcomm Adreno graphics hardware that started out as a reverse-engineering effort and these days is now being used within Google Chromebooks along with the accompanying TURNIP Mesa Vulkan driver and the MSM DRM/KMS driver in kernel-space.

        • NVIDIA Releases Open-Source Image Scaling SDK With Cross-Platform GPU Support – Phoronix

          Along with introducing DLSS 2.3 today, NVIDIA is making public an open-source Image Scaling SDK with promised cross-platform GPU support.

          NVIDIA is launching an Image Scaling SDK that is open-source and aims to better compete with AMD FidelityFX Super Resolution. On NVIDIA GPUs, the Image Scaling SDK supports making use of DLSS. But with this being open-source under the MIT license may end up working on Intel and AMD Radeon graphics via generic compute shaders.

        • NVIDIA takes on AMD FSR with their new open source Image Scaling | GamingOnLinux

          While NVIDIA has had DLSS available for a while, it does depend on game support with a compatible NVIDIA GPU. So we saw AMD come along with FidelityFX Super Resolution that worked across both vendors and now NVIDIA has something of an answer with their own open source Image Scaler.

    • Applications

      • Best Self-hosted Email Clients

        Self-hosted email clients are those that we can host on our own server or on our local network. The advantage of using a self-hosted email client is that it makes your email accounts accessible to any devices on a network. We can use these clients to not only integrate third-party email accounts, but also to construct our own email server, which allows us to communicate in perfect privacy over the internet.

        If you’re asking why someone would need a self-hosted email client, the answer is simple: accessibility and privacy. If you value privacy, you can set up your own email server. It will give you complete control over your data, and no third-party services will be able to share it with advertising businesses. Second, you may integrate third-party email services with these email clients, allowing them to be accessed via the local network or the Internet.

      • EverSticky: Sticky Notes App For Your Linux Desktop That Syncs With Evernote

        EverSticky is a simple new Qt sticky notes tool for Linux that synchronizes with Evernote and displays rich text formatting.

        The application lets users quickly take notes using post-it note-like windows displayed on their desktop. The notes are automatically saved, and synchronized to Evernote (including free Evernote accounts) at a given interval or on demand.

        Eversticky sticky notes
        The sticky notes are accompanied by a tray icon from where users can create a new note (new notes can also be created by using the + button from an existing sticky note), force sync to Evernote, bring the notes to the foreground, log out of Evernote, and access the application settings. In the settings you’ll find options like setting the sync interval, check for application updates, and set the tray icon style to light or dark.

    • Instructionals/Technical

      • How to Install Liquorix Linux Kernel on Debian 11 Bullseye – LinuxCapable

        Liqourix Kernel is a free, open-source general-purpose Linux Kernel alternative to the stock kernel with Debian 11 Bullseye. It features custom settings and new features and is built to provide a responsive and smooth desktop experience, especially for new hardware. Liquorix Kernel is popular amongst Linux Gaming, streaming, and ultra-low latency requirements and often boasts the latest Linux Kernels, having multiple branches to choose from the stable, edge, and development.

        For users seeking to have their Debian 11 Bullseye system kernel up to date and not wanting to manually install kernels or use the testing/unstable repositories, installing a third-party kernel that may be for you.

        In the following tutorial, you will learn how to import the Liquorix Kernel repository and install the latest Linux Kernel on your Debian 11 Bullseye.

      • How to Install Liquorix Linux Kernel on Ubuntu 20.04 – LinuxCapable

        Liqourix Kernel is a free, open-source general-purpose Linux Kernel alternative to the stock kernel with Ubuntu 20.04 LTS Focal Fossa. It features custom settings and new features and is built to provide a responsive and smooth desktop experience, especially for new hardware. Liquorix Kernel is popular amongst Linux Gaming, streaming, and ultra-low latency requirements and often boasts the latest Linux Kernels, having multiple branches to choose from the stable, edge, and development.

        For users seeking to have their Ubuntu 20.04 LTS system kernel up to date and not wanting to manually install kernels or use the testing/unstable repositories, installing a third-party kernel that may be for you.

        In the following tutorial, you will learn how to import the Liquorix Kernel PPA and install the latest Linux Kernel on your Ubuntu 20.04 LTS Focal Fossa.

      • How to install and use Podman in Ubuntu

        Podman is a container engine that’s compatible with the OCI Containers specification. It is part of RedHat Linux, but can also be installed on other distributions. As it’s OCI-compliant, Podman can be used as a drop-in replacement for the better-known Docker runtime. Most Docker commands can be directly translated to Podman commands. Podman implements almost all the Docker CLI commands (apart from the ones related to Docker Swarm).

        Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn’t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons. There are no daemons in the background doing stuff, and this means that Podman can be integrated into system services through systemd.

      • How to Install and Enable sudo on FreeBSD 13 – Citizix

        In this guide we will learn how to install and enable sudo in FreeBSD 13. FreeBSD is known for its robustness and for being another valid alternative for servers to Linux servers.

        Unlike su, sudo authenticates users against their own password rather than that of the target user. Sudo allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments. This allow the delegation of specific commands to specific users on specific hosts without sharing passwords among them.

      • How to Install XanMod Linux Kernel on Debian 11 Bullseye – LinuxCapable

        XanMod is a free, open-source general-purpose Linux Kernel alternative to the stock kernel with Debian 11 Bullseye. It features custom settings and new features and is built to provide a responsive and smooth desktop experience, especially for new hardware. XanMod is popular amongst Linux Gaming, streaming, and ultra-low latency requirements and often boasts the latest Linux Kernels, having multiple branches to choose from the stable, edge, and development.

        For users seeking to have their Debian 11 Bullseye system kernel up to date and not wanting to manually install kernels or use the testing/unstable repositories, installing a third-party kernel that may be for you.

        In the following tutorial, you will learn how to import the XanMod repository and install the latest Linux Kernel on your Debian 11 Bullseye.

      • How to find duplicate files in Linux – Unixcop the Unix / Linux the admins deams

        Hello, friends. Working in the terminal is common for all of us who work with Linux servers. However, in between uses, there may be tricks that we have overlooked or simply don’t know about. That’s why, in this post, we’re going to show you how to find duplicate files in Linux.

      • How to Find Files with the fd Command in Linux

        Finding files under a Linux operating system is a skill set that most Linux users have mastered and perfected. Linux command-line tools like the find command are very reliable and effective when handling file-finding tasks. However, using the find command to retrieve misplaced files on a Linux operating system environment is not everyone’s cup of tea due to its non-user-friendly tag.

        The fd command is a user-friendly alternative to the usage complexity of the find command. It is a simple and fast file-finding command-line-based tool. Despite fd not having the functionality depth of find, the functionalities it offers are sufficient for most of your use cases and you might not even miss its alternative.

      • How to install RPM fusion on AlmaLinux 8 / Rocky Linux 8 – Linux Shout

        RPM Fusion is a repository specifically for Fedora Linux. It is an amalgamation of the software repositories Livna, Freshrpms, and Dribble to bundle resources. Among other things, the repo provides packages for multimedia and the required codecs. The repo is divided into “free” and “non-free“.

      • Paul Tagliamonte: Measuring the Power Output of my SDRs

        Over the last few years, I’ve often wondered what the true power output of my SDRs are. It’s a question with a shocking amount of complexity in the response, due to a number of factors (mostly Frequency). The ranges given in spec sheets are often extremely vague, and if I’m being honest with myself, not incredibly helpful for being able to determine what specific filters and amplifiers I’ll need to get a clean signal transmitted.

        Hey, heads up! – This post contains extremely unvalidated and back of the napkin quality work to understand how my equipment works. Hopefully this work can be of help to others, but please double check any information you need for your own work!

      • How To Restore Sudo Privileges To A User In Ubuntu Linux – OSTechNix

        This tutorial explains how to restore sudo privileges to a user from recovery mode on Ubuntu Linux and its derivatives like Linux mint, Pop OS operating systems. I tested this guide on Ubuntu 18.04 LTS system. However, It should work on other Linux distributions as well.

      • How to Install Mattermost on Rocky Linux 8 – VITUX

        Mattermost is an open-source, self-hosted Slack alternative. Being free of the requirement to depend on a third-party vendor means that you are able to host your data in your own infrastructure.

        There are many reasons why you would want or need this – security being one of the most prominent ones. Furthermore, having full control over all processes will greatly increase the reliability and uptime of your team communication platform.
        You can use Mattermost in your browser, on mobile devices like Android and iOS, or integrate it with various other services via API or webhooks. Also, it’s very modular in its design; you are able to choose the components you actually need.

        In this tutorial, we will walk through the steps required to install Mattermost on Rocky Linux 8.

        This article is based on the Community Edition of Mattermost, which is freely available for download at its official website. Other Editions are also available there – you could start with the Enterprise Edition if you have a bigger team or require more extended security features, an on-premise solution instead of self-hosting, voice chat, etc.

      • How to create a VPC using Python Boto3 on Ubuntu

        Boto3 is the Amazon Web Services (AWS) SDK for Python. It is the Python library that allows users or developers to create, configure, and manage AWS services and resources. Boto3 provides an API for AWS services that can be used to manage AWS services and resources such as EC2, RDS, S3, etc.

        To learn more about Boto3, you can visit its official site here.

        Before we continue, I assume that you are familiar with VPC. If not, you can click here to learn how to create a VPC from the AWS console.

        In this article, we will see how to install the Boto3 library and use it to create a simple VPC together with its dependent components in AWS. We will create a public subnet in the VPC.

      • What’s the Difference Between curl and Wget?

        curl and Wget are the two most common utilities for making requests to servers from the Linux command line.

        If you ever find yourself swapping between the two, one is just piquing your curiosity, or you have ever just seen some good old discussion online about it, there are some differences that might be helpful to know about.

        While you’ll hopefully have a smooth experience using either, knowing the basic differences between the two will help you have a better grasp on using both (and hopefully resolve anything from the aforementioned question-filled discussions).

      • How to Create a Website Using Hugo on Debian 11

        Hugo is a free and open-source website framework written in developed in Go. Hugo provides a reliable and modern static site generator that allows you to create a simple and fast website easily. It comes with pre-made templates and other features including, SEO, commenting, analytics, and other functions. Hugo sites can run without any expensive run times like PHP, Python, Ruby and don’t need any database.

        In this post, we will show you how to install and use the Hugo site generator on Debian 11.

      • How to install and use Terminator Terminal Emulator on Ubuntu 20.04

        Terminator is a terminal emulator program that helps users easily manage multiple terminals. It provides flexibility for arranging multiple terminals side by side.

      • How To Install Lynis on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install Lynis on Ubuntu 20.04 LTS. For those of you who didn’t know, Lynis is the popular security auditing tool for Linux, Unix, and macOS systems. The aim of leveraging an auditing tool such as Lynis is to probe and resolve any underlying security vulnerabilities, and configuration errors such as weak user account passwords or inappropriate file permissions that might compromise the system in face of an attack. Lynis was commonly used by system administrators and auditors to assess the security defenses of their systems.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Lynis security auditing tool on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • How to Install PHP 8.1 on Ubuntu 20.04 – LinuxCapable

        PHP 8.1 is a significant update of the PHP language that will be “officially” released on November 25, 2021. This is a giant leap forward from the existing PHP 8.0 release with the new PHP 8.1 is bringing enums, fibers, never return type, final class constants, intersection types, read-only properties amongst the long list of new features and changes.

        In the following tutorial, you will learn how to import the Ondřej Surý PPA and install PHP 8.1 on your Ubuntu 20.04 LTS Focal Fossa system.

      • How to Install XanMod Linux Kernel on Ubuntu 20.04 – LinuxCapable

        XanMod is a free, open-source general-purpose Linux Kernel alternative to the stock kernel with Ubuntu 20.04 LTS. It features custom settings and new features and is built to provide a responsive and smooth desktop experience, especially for new hardware. XanMod is popular amongst Linux Gaming, streaming, and ultra-low latency requirements and often boasts the latest Linux Kernels, having multiple branches to choose from the stable, edge, and development.

        For users seeking to have their system kernel up to date and not wanting to manually install kernels or use the testing/unstable repositories, installing a third-party kernel may be for you.

        In the following tutorial, you will learn how to import the XanMod repository and install the latest Linux Kernel on your Ubuntu 20.04 LTS Focal Fossa.

      • How to install and configure Memcached on Fedora 35

        In this tutorial guide I will be guiding you through installation and configuration of Memcached on Fedora 35.

        Memcached is a general-purpose distributed memory caching system. It is used to speed up dynamic databases-driven websites by caching data and objects in the RAM to reduce the number of times an external data source must be read.

        Memcached has an API with a very large hash table distributed distributed across multiple machines. when a table is full, subsequent inserts cause older data to be purged in least recently used order.

        Memcached is simple yet powerful. Its simple design provides quick deployment, ease of development and solves many problems facing large data caches.

      • How to Check internet speed in Linux – Unixcop the Unix / Linux the admins deams

        In this article, we’ll explain how to check internet speed in Linux with two different methods.

        Speedtest is an old favorite. It’s implemented in Python, and also available with pip. You can use it as a Command line interface for testing internet bandwidth using speedtest.net.

        This is an open-source tool that enables you to check your internet and network speeds at the command line is Speedtest.

        speedtest-cli is a command line interface for testing internet bandwidth using speedtest.net

      • How to replace Docker with Podman on a Mac, revisited | Enable Sysadmin
      • Create Windows, macOS, and Linux Virtual Machines Easily With QEMU-based Quickgui

        At present, it is fairly easy to create virtual machines thanks to programs like VirtualBox, VMware, and a few others.

        You can still install VirtualBox in your Linux system to proceed. But, in this article, I put my focus on an exciting tool that’s simple to use, works fast, and quickly helps you to spin up a virtual machine, i.e., Quickgui.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • Robert Roth: Calculator and GTK4

          It was a long time since I last wrote, but important news coming up, so I thought it’s time to post again.

          The kind Christopher Davis has spent some time on porting Calculator to GTK4, a process which looks like complete to me know, with the merge into master happening fairly soon. This was a lot of work, given the framework changes, and would be nice to have some testing mileage on it, so I’m asking the curious people to check it out, and report any issues you may find.

          Currently it is only available on the merge request branch, but it is fairly easy to try out using Builder. Thanks go out to the developers behind Builder+Flatpak for building up the whole ecosystem which makes development fairly easy without breaking the local environment, and without having to maintain a full JHBuild environment.

    • Distributions

      • Distrowatch Top 5 Distributions Review: Manjaro

        I used to exclusively run Manjaro on my home system, because of its power, simplicity, and my love of Arch based systems. While I don’t currently, I have zero troubles recommending this OS to anyone who wants to use an Arch based system, but not Arch itself. If you’re looking for a nice, easy to use system with plenty of GUI tools, but the power and flexibility of Arch, you won’t be disappointed using Manjaro; at least in my opinion!

      • Parrot OS vs Kali Linux vs Ubuntu Comparison: Which To Choose?

        Linux has been known for its different distributions that cater to different needs. The most famous among all is the Kali Linux which is a penetration testing oriented for security professionals. From the time it has been released, it has gone through various iterations in the form of updates while others were also being developed throughout the globe.

        There are also alternative choices for those who like to look at options. Our detailed comparison between Parrot OS vs Kali Linux vs Ubuntu will help you decide to choose the best Linux for you. We have compared and analysed and taken into consideration various factors.

      • New Releases

        • EndeavourOS: Our ISO refresh is coming soon

          It’s been a couple of months since we released our ISO-NEXT release and we are completely aware of the bugs in it that have risen to the surface, which have become major obstacles through time.

          As we explained earlier, the ISO had received a complete overhaul between April and August and after releasing the community gave us very valuable feedback by submitting bug reports.

          Joe and Manuel, together with a lot of help from our community members and the Calamares dev community, began starting to improve the ISO and with every improvement, another issue arose.

          Among those improvements are Nvidia handling, Grub and lots of other improvements we will reveal in the release announcement.

      • BSD

        • FreeBSD Improving Boot Times, Adds Hole-Punching, Better Linux Binary Compatibility

          The FreeBSD project has published their latest quarterly status report highlighting the work achieved on this open-source BSD operating system. Even with the pandemic and limitations on physical events, the FreeBSD developers continue making significant progress on their goals and technology road-map.

          For their period covered from July through September, some of the FreeBSD achievements included:

          - FreeBSD is at $180k in fundraising for its $2M budget. Their heightened budget stems from their technology road-map and paying more developers now. FreeBSD is working towards better WiFi, graphics, and hardware support at large, They also want to get features like Thunderbolt 3 and USB4 working in the months ahead along with installer improvements, new performance tooling, and virtualization improvements for Bhyve.

      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • Seamonkey Browser » PCLinuxOS

          The SeaMonkey project is a community effort to develop the SeaMonkey Internet Application Suite (see below). Such a software suite was previously made popular by Netscape and Mozilla, and the SeaMonkey project continues to develop and deliver high-quality updates to this concept. Containing an Internet browser, email & newsgroup client with an included web feed reader, HTML editor, IRC chat and web development tools, SeaMonkey is sure to appeal to advanced users, web developers and corporate users. Updated to 2.53.10.

      • IBM/Red Hat/Fedora

        • Custom JFR event templates with Cryostat 2.0

          Welcome back to our series of hands-on introductions to using Cryostat 2.0. This article shows you how to preconfigure custom event templates for Java application monitoring with JDK Flight Recorder (JFR). First, you’ll use the new Cryostat Operator and a Red Hat OpenShift ConfigMap to create a custom event template, then you’ll instruct the Cryostat Operator to use the ConfigMap when deploying Cryostat. You can use the OpenShift console to interact with Cryostat or edit the YAML file for your Cryostat custom resource. We’ll demonstrate both approaches.

        • JVM performance monitoring with JMC agent | Red Hat Developer

          With the recent JDK Mission Control (JMC) 8.1 release, now is a good time to look at the new JMC agent plugin. The plugin, which was merged upstream, provides a convenient way to add custom JDK Flight Recorder (JFR) events to a running Java virtual machine (JVM) without restarting or rebuilding the Java application.

        • Building machine learning models in the cloud | Red Hat Developer

          Many people think of training models when they hear “data science” or “machine learning.” Training and models are certainly important, but making intelligent enterprise software involves many other tasks and technologies. These include gathering and processing data from disparate, voluminous sources; testing and comparing different algorithms; deploying models into production applications; continuous monitoring and updating of models, etc.

          Enter our AI/ML platform cloud service: Red Hat OpenShift Data Science. OpenShift Data Science provides a platform where developers can easily collaborate with data scientists to develop, deploy, and monitor models. Find out how it can improve your machine learning projects, and explore hands-on resources to help you get up to speed quickly with natural language processing, Jupyter notebooks, and more.

        • Digital transformation: Are IT leaders and teams on the same page?

          When Red Hat conducts surveys, one of the factors that we keep an eye on is differences within the population we’re surveying, which, in the case of Red Hat’s Global Tech Outlook 2022, is IT decision makers at medium- to large-sized enterprises.

          Such differences may reveal themselves in job title, industry, or geographic region. There’s a limit to how finely we can slice results – the more granular we get, the smaller the bucket of responses, and the less confident we can be in our conclusions. Nonetheless, it’s useful to seek out cases where the average results obscure important distinctions.

          Across a variety of surveys conducted during the past few years, the most consistent pattern we’ve observed is that IT decision makers are far more similar than they are different.

          Nonetheless, in this year’s Global Tech Outlook research, which surveyed 1,341 IT decision makers from June through August of 2021, we spotted a few differences of interest around digital transformation, including differences that were also present in past surveys.

        • Planning vs. agility: 5 ways leaders can find a balance

          The global pandemic caused a fierce, sudden shift in just about every aspect of life, both at home and at work. For business leaders, it was the redirect of a lifetime as statistics and business forecasts gave way to corporate survival instinct.

          Restaurant chains sold fresh groceries and paper goods along with takeout orders. National hotel conglomerates offered day rates for employees needing somewhere to work remotely when being at home wasn’t cutting it. Alcohol distilleries shifted gears to mass-produce hand sanitizer.

          Coming out the other side, we’re able to see the positive takeaways from an unprecedented crisis, including proof that the ability to shift quickly can be the most important business skill of all. This begs the question: Given lessons learned in 2020, how can enterprise leaders plan for business growth while maintaining the ability to be flexible in an unpredictable landscape?

        • Red Hat Global Customer Tech Outlook 2022: Hybrid and multicloud strategies lead the way as funding priorities hold steady

          Results from Red Hat’s annual Global Tech Outlook survey are in, and as in years past we explore what the data reveals about the current state of cloud and organizations’ cloud strategies, their major funding priorities, and the factors influencing digital transformation success. This helps us not only understand the current business environment, but also how we can better serve our customers and help meet their needs. Here, we highlight key findings from the report and how these results have changed over time.

        • Rocky Linux 8.5 Distribution Released, Replacing CentOS – itsfoss.net

          The Rocky Linux 8.5 distribution has been released , aimed at creating a free build of RHEL that can take the place of classic CentOS, after the Red Hat company decided to end support for the CentOS 8 branch at the end of 2021, and not in 2029, as originally intended. This is the second stable release of the project, recognized as ready for production deployments. Rocky Linux builds are prepared for x86_64 and aarch64 architectures.

          As in the classical CentOS made to the Rocky Linux packages changes boil down to get rid of binding to the brand Red Hat. The distribution is fully binary compatible with Red Hat Enterprise Linux 8.5 and includes all the improvements proposed in this release . This includes additional packages for OpenJDK 17, Ruby 3.0, nginx 1.20, Node.js 16, PHP 7.4.19, GCC Toolset 11, LLVM Toolset 12.0.1, Rust Toolset 1.54.0, and Go Toolset 1.16.7.

        • Rocky Linux 8.5 is Out, Secure Boot is Now Officially Supported

          Rocky Linux, one of the most anticipated CentOS replacements, has announced the general availability for Rocky Linux 8.5 “Green Obsidian”.

          The Rocky Enterprise Software Foundation (RESF) has announced general availability (GA) of Rocky Linux 8.5. It’s an important milestone because it’s the first Rocky Linux release that officially supported Secure Boot.

          For those of you unfamiliar with Secure Boot, it’s a feature found in the startup software for your computer that’s designed to ensure your computer starts safely and securely by preventing unauthorized software like malware from taking control of your PC at boot-up.
          In other words, Secure Boot allows only software or firmware signed with approved keys to execute during the boot process.

        • Red Hat’s Stratis Storage 3.0 Released With Many Improvements – Phoronix

          For over four years now Red Hat has been working on Stratis as their new Linux storage solution. As an alternative to shifting to newer file-systems like Btrfs or the controversial OpenZFS, Stratis has been about offering similar advanced Linux storage features while building atop LVM, DeviceMapper and XFS all while using the modern Rust programming language. Stratis Storage 3.0 is now available as the latest work on this front.

        • Stratis 3.0.0 Release Notes

          In stratisd 3.0.0 the D-Bus API has undergone a revision and the prior interfaces are all removed. The FetchProperties interfaces that were supported by all objects have been removed. The values that were previously obtainable via the FetchProperties methods are now conventional D-Bus properties. The possible values of error codes returned by the D-Bus methods have been reduced to 0 and 1, with the usual interpretation.

      • Debian Family

        • Raspberry Pi OS 11 Is Now Available: Here’s What’s New

          Approximately every two years, Debian releases a new stable version of its operating system, and the time has come again. And since Raspberry Pi OS is based on Debian, the developers release a new version every time Debian gets an LTS release. The latest update is here and packed full of useful changes.

          Debian Linux 11–codenamed “Bullseye”—offers a range of features that make the latest Raspberry Pi OS slicker and more functional than before. Let’s take a look at the latest iteration of Raspberry Pi OS and its noteworthy features.

      • Canonical/Ubuntu Family

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Mozilla

          • Mozilla Performance Blog: Performance Tools Newsletter (Q3 2021)

            As the Perf-Tools team, we are responsible for the Firefox Profiler. This newsletter gives an overview of the new features and improvements we’ve done in Q3 2021.

            This is our second newsletter and you can find the first one here which was about the H1 2021. With this newsletter, we wanted to focus on only Q3, so it would be less crowded and you can see the new features and improvements easily. I hope you enjoy the work that we’ve done this quarter.

          • Eitan Isaacson: speechSynthesis.getVoices()

            Half of the DOM Web Speech API deals with speech synthesis. There is a method called speechSynthesis.getVoices that returns a list of all the supported voices in the given browser. Your website can use it to choose a nice voice to use, or present a menu to the user for them to choose.

            The one tricky thing about the getVoices() method is that the underlying implementation will usually not have a list of voices ready when first called. Since speech synthesis is not a commonly used API, most browsers will initialize their speech synthesis lazily in the background when a speechSynthesis method is first called. If that method is getVoices() the first time it is called it will return an empty list. So what will conventional wisdom have you do?

          • Niko Matsakis: CTCFT 2021-11-22 Agenda

            The next “Cross Team Collaboration Fun Times” (CTCFT) meeting will take place next Monday, on 2021-11-22 at 11am US Eastern Time (click to see in your time zone). Note that this is a new time: we are experimenting with rotating in an earlier time that occurs during the European workday. This post covers the agenda. You’ll find the full details (along with a calendar event, zoom details, etc) on the CTCFT website.

          • The Mozilla Blog: Firefox Relay now available with more email aliases with Premium service, protecting your identity and email addresses from spammers

            Today, Firefox Relay, a privacy-first and free product that hides your real email address to help protect your identity, is available with a new paid Premium service offering. The release comes just in time for the holiday season to help spare your inbox from being inundated with emails from e-commerce sites, especially those sites where you may shop or visit a few times a year.

            In real life you have a phone number where family and friends can call and reach out to you directly. You likely have it memorized by heart and it’s something you’ve had for years. In your online life your email address is like your phone number, it’s a personal and unique identifier. Your email address has become the way we login and access almost every website, app, newsletter, and hundreds of other interactions we have online every single day. That means your email address is in the hands of hundreds, if not thousands, of third parties. As you think more about your email address and the places it’s being used, Firefox Relay can help protect and limit where it’s being shared.

            Firefox Relay is a free service available at relay.firefox.com where you’ll get five email aliases to use whenever you sign-up for an online account. Over the last year, the team has been experimenting with Firefox Relay, a smart, easy solution that can preserve the privacy of your email address. Firefox Relay was initially rolled out to a beta phase for early adopters who like to test new products. We heard back from beta testers who provided feedback where we improved the free service and added a new paid Premium service that we’re introducing today.

      • SaaS/Back End/Databases

        • Ora2Pg v23.0 released

          Version 23.0 of Ora2Pg, a free and reliable tool used to migrate an Oracle database to PostgreSQL, has been officially released and is publicly available for download.

          This release fix several issues reported since last release and adds several new features and improvements.

        • PostgreSQL: PostgreSQL Weekly News – November 14, 2021

          PostgreSQL 14.1, 13.5, 12.9, 11.14, 10.19, and 9.6.24 released. This is the final release in the 9.6 series, so put those upgrade plans in action if you haven’t already.

      • Productivity Software/LibreOffice/Calligra

        • The Month of LibreOffice, November 2021 – Half-way point!

          Two weeks ago, we started the Month of LibreOffice, giving thanks to all contributions across our projects. Everyone who takes part can claim a sticker pack – and at the end of the month, we’ll award some extra merchandise to ten lucky winners as well!

          So, how’s it looking so far? Well, so far we’ve awarded 277 sticker packs! If you see your name (or username) on that page, check this blog when the month ends with details. And if you’re not there yet, read on to find out how you can join in…

      • FSF

        • GNU Projects

          • Guile-CV version 0.3.1

            This is a maintenance release, which fixes a bug in the pre-inst-env script, which is used by Guile-CV at build time and may also be used to test and run an uninstalled Guile-CV instance.

        • Licensing/Legal

          • the problematic GPL “or later” clause

            However, for all of the success of the GPLv3 drafting process, it must be noted that the GPL is ultimately published by the Free Software Foundation, an organization that many have questioned the long-term viability of lately. When the “or later version” clause was first introduced to the GPL, it was unthinkable that the Free Software Foundation could ever be in such a state of affairs, but now it is.

            And this is ultimately the problem: what happens if the FSF shuts down, and has to liquidate? What if an intellectual property troll acquires the GNU copyright assignments, or acquires the trademark rights to the FSF name, and publishes a new GPL version? There are many possibilities to be concerned about, but developers can do two things to mitigate the damage.

            First, they can stop using the “or later” clause in new GPL-licensed code. This will, effectively, limit those projects from being upgraded to new versions of the GPL, which may be published by a compromised FSF. In so doing, projects should be able to avoid relicensing discussions, as GPLv3-only code is compatible with GPLv3-or-later: the common denominator in this case is GPLv3.

            Second, they can stop assigning copyright to the FSF. In the event that the FSF becomes compromised, for example, by an intellectual property troll, this limits the scope of their possible war chest for malicious GPL enforcement litigation. As we have learned from the McHardy cases involving Netfilter, in a project with multiple copyright holders, effective GPL enforcement litigation is most effective when done as a class action. In this way, dilution of the FSF copyright assignment pool protects the commons over time from exposure to malicious litigation by a compromised FSF.

      • Programming/Development

        • Python

          • Python: Please stop screwing over Linux distros

            This comic is almost 4 years old and it has become much worse since. Python is a mess. I really want to like Python. I have used it for many years and in many projects, including SourceHut, which was predominantly developed in Python. But I simply can’t handle it anymore, and I have been hard at work removing Python from my stack.

            This has always been a problem with Python, but in the past few years everyone and their cousin decided to “solve” it by building another mess which is totally incompatible with all of the others, all of the “solutions” enjoying varying levels of success in the community and none of them blessed as the official answer.

            I manage my Python packages in the only way which I think is sane: installing them from my Linux distribution’s package manager. I maintain a few dozen Python packages for Alpine Linux myself. It’s from this perspective that, throughout all of this turmoil in Python’s packaging world, I have found myself feeling especially put out.

  • Leftovers

    • Hardware

      • Circuit Sculpture Lamp Is A Colorful Cube Companion | Hackaday

        Circuit sculpture is engineering and art all at play together. One must combine the functional with the aesthetically appealing. [EdwardA61] did just that with this enchanting lamp build.

        Like many other circuit sculptures, the build relies on the aesthetic qualities of brass, though [EdwardA61] notes that copper wire can be used as well. Four WS2812B LEDs, in their bare PCB-mount form, are soldered into a circuit using the brass to carry the power and data signals as needed.

    • Health/Nutrition/Agriculture

      • Latvia bans unvaccinated lawmakers from voting, docks pay

        Latvia’s parliament voted on Friday to ban lawmakers who refuse COVID-19 vaccine from voting on legislature and participating in discussions.

        Latvia, which has one of the lowest vaccination rates in European Union, was the first in the bloc to reimpose a lockdown this autumn as a surge in COVID-19 cases threatens to overwhelm its health system.


        The ban on unvaccinated MPs in parliament was necessary to promote public confidence in the government’s policies to control COVID-19 infections, the legislation’s sponsor, lawmaker Janis Rancans, was cited as saying by the parliamentary press service.

        Latvia, home to 1.9 million people, has reported 236,765 infections and 3,646 coronavirus-related deaths since the pandemic began.

      • Flint water crisis costs Michigan $600 million—preventing it would have cost $80/day

        Residents of Flint, Michigan, began complaining in 2014 that their water tasted bad, smelled foul, and came out of the tap discolored. The city had switched water supplies to save money, and in the process, the city and state failed to add anti-corrosion chemicals to the new supply. Flint’s aging pipes began to poison its residents. People suffered rashes after bathing, children were exposed to high levels of lead, and at least a dozen people died from Legionnaires’ disease.

        Residents, pediatricians, and pastors sounded the alarm, but it wasn’t until they sued the city and state that a federal judge ordered bottled water to be delivered to every affected home.

    • Integrity/Availability

      • Proprietary

        • Security

          • Why I Hate Password Rules

            The other day I was creating a new account on the web. It was financial in nature, which means it gets one of my most secure passwords. I used PasswordSafe to generate this 16-character alphanumeric password:


            Which was rejected by the site, because it didn’t meet their password security rules.

          • New Federal Government Cybersecurity Incident and Vulnerability Response Playbooks

            The White House, via Executive Order (EO) 14028: Improving the Nation’s Cybersecurity, tasked CISA, as the operational lead for federal cybersecurity, to “develop a standard set of operational procedures (i.e., playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity” for federal civilian agency information systems. In response, today, CISA published the Federal Government Cybersecurity Incident and Vulnerability Response Playbooks. The playbooks provide federal civilian executive branch (FCEB) agencies with operational procedures for planning and conducting cybersecurity incident and vulnerability response activities. The playbooks provide illustrated decision trees and detail each step for both incident and vulnerability response.

          • Vulnerability allowing an update to be released for any package in the NPM repository [Ed: Once again we're meant to pretend that this isn't Microsoft's fault; it typically blames the victims, to whom it ships malware]

            GitHub has disclosed two incidents in the NPM package repository infrastructure. On November 2, third-party security researchers ( Kajetan Grzybowski and Maciej Piechota ) as part of the Bug Bounty program announced a vulnerability in the NPM repository that allows you to publish a new version of any package using your account, which is not authorized to perform such updates.

          • I will pay you cash to delete your npm module

            npm’s culture presents a major problem for global software security.

          • Google introduced fuzzing testing system ClusterFuzzLite – itsfoss.net

            Google presented the ClusterFuzzLite project , which allows organizing fuzzing testing of code for early detection of potential vulnerabilities at the stage of continuous integration systems operation. Currently, ClusterFuzz can be used to automate fuzzing testing of pull requests in GitHub Actions , Google Cloud Build, and Prow , but support for other CI systems is expected in the future. The project is based on the ClusterFuzz platform , created to coordinate the work of fuzzing-testing clusters, and is distributed under the Apache 2.0 license.

            It is noted that after the introduction of the OSS-Fuzz service by Google in 2016, more than 500 important open source projects were accepted into the continuous fuzzing testing program. Based on the checks carried out, more than 6,500 confirmed vulnerabilities have been eliminated and more than 21,000 errors have been fixed. ClusterFuzzLite continues to evolve fuzzing testing mechanisms with the ability to identify issues earlier in the peer review phase of proposed changes. ClusterFuzzLite has already been introduced into the processes of reviewing changes in systemd and curl projects, and made it possible to identify errors missed by static analyzers and linters that were used at the initial stage of checking new code.

          • The Quickest Way to Set Up HTTPS

            I registered on blogs.perl.org today so that I could comment on posts about object systems. However, the very first thing I encountered was a password page with NO SSL. So, even though I have a ton to say about object systems, my first blog post will instead be about setting up SSL.

            (I’m aware that this is a “legacy server problem” but I also recently learned that it doesn’t matter with traefik.)

            In this grand year of 2021 you can add SSL to any site, on any architecture, for free, by adding 3 files to your server, making one small config change to Apache, and running a service. We are truly living in the future.

    • Finance

      • The FBI has put out a PSA about an interesting crypto scam

        The FBI is warning people of a new breed of scam involving cryptocurrency ATMs. A con artist convinces a person to put cash into a cryptocurrency ATM and send the purchased coins to the scammer using an address stored in a QR code (via CoinDesk). While the actual scamming is relatively low-tech, it’s an interesting misuse of technology and shows how criminals are using crypto to “improve” on old methods.

      • Wire Fraud Scam Upgraded with Bitcoin

        The “upgrade” (as it were) for scammers with the crypto ATM method is two-fold: it can be less friction than sending a wire transfer, and at the end the scammer has cryptocurrency instead of fiat. With wire transfers, you have to fill out a form, and you may give that form to an actual person (who could potentially vibe check you). Using the ATM method, there’s less time to reflect on the fact that you’re about to send money to a stranger. And, if you’re a criminal trying to get your hands on Bitcoin, you won’t have to teach your targets how to buy coins on the internet and transfer them to another wallet — they probably already know how to use an ATM and scan a QR code.

    • Internet Policy/Net Neutrality

      • [Revealed] Jaipur Internet Shutdown Orders: Cut, Copy, Paste!

        Twice recently, Internet shutdowns were imposed in Rajasthan to prevent cheating in exams. So, we filed Right to Information applications to determine the extent of the Rajasthan government’s compliance with directions in Anuradha Bhasin. We previously analysed the response received from the office of the Udaipur Divisional Commissioner, which had issued 26 internet shutdown orders, most of which were similar. We have also received a response from the Jaipur Divisional Commissioner, who issued 30 Internet shutdown orders, which also follow the identical copy, cut, paste format!

    • Monopolies

      • Copyrights

        • Social Science researchers move Delhi High Court to protect LibGen & SciHub

          Three global publishers, Elsevier, Wiley and American Chemical Society, filed a copyright infringement suit in the Delhi High Court against websites, LibGen & Sci-Hub, that enable researchers worldwide to access knowledge without cost. In their suit, they have asked the Court to block these websites permanently because they are ‘rogue’. A group of social science researchers have filed an intervention application, with legal support from IFF, highlighting the adverse impact any decision to block the websites will have on them. A Joint Registrar of the Delhi High Court has issued notice on the application after hearing Ms Vrinda Bhandari, the counsel for the researchers, and has asked the Plaintiffs to file their reply within 4 weeks. The case is now listed on 18.02.2022.

        • Theresa Babb’s Photographs of Friendship (ca. 1898) – The Public Domain Review

          Theresa Babb’s turn of the century photographs let us glimpse into a personal world of female friendship.

Free Software and Privacy Aren’t for Extremists; Those Who Take Them Away Exercise Extremism and Totalitarian Control in the Name of “Protecting Us”

Posted in Free/Libre Software at 9:04 am by Dr. Roy Schestowitz

Video download link | md5sum dd551413d353e7c3669b062a3237c8ec

Summary: Fear, Uncertainty, and Doubt (FUD) tactics along with irrational fear-mongering against Free software are leveraged against the wider acceptance and broader adoption of Free software; comparing it to extremism is a pattern foreseen in the Halloween Documents when in fact much of the extremism is supported, for a profit, by companies like Microsoft that rely on Pentagon-connected ‘bailouts’, i.e. they profit from dictatorship (while receiving subsidies/grifting as a reward for abusing human rights)

THE sad thing is, lies can be repeated again and again if they’re left unchallenged. Repeated challenges can put an end to them. Earlier this year we saw Free software being conflated with crimes and dangerous ideologies. We responded to it [1, 2] as we said similar FUD would likely come back, recurring to the point of becoming impossible to ignore.

“Earlier this year we saw Free software being conflated with crimes and dangerous ideologies.”This morning Ryan published a lengthy and detailed response to something he had commented on yesterday. It concerns the Southern Poverty Law Center, which is an infiltrated and mostly defunct organisation, mostly a political drone that exploits the good old reputation of the Southern Poverty Law Center. It’s not the same people; it’s just the same name. It’s like comparing Linux itself to the Linux Foundation, which isn’t even using Linux.

I’ve decided to separate/isolate my own views (and response) from the original by Ryan and did this in the form of a video.

Links 16/11/2021: Rocky Linux 8.5 and Tor Browser 11.0.1

Posted in News Roundup at 7:02 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • Linux Kernel 5.16 RC1 Unveils New Features and Hardware Support

        Linux Kernel 5.16 RC1 is now available for download and testing. In this article, we touch-up the important features of this Kernel release.

      • All your tracing are belong to BPF

        BPF, a tracing technology in the Linux kernel for network stack tracing, has become popular recently thanks to new extensions that enable novel use-cases outside of BPF’s original scope. Today it can be used to implement program performance analysis tools, system and program dynamic tracing utilities, and much more.

        In this blog post we’ll show you how to use the Linux implementation of BPF to write tools that access system and program events. The excellent tools from IO Visor make it possible for users to easily harness BPF technology without the considerable time investment of writing specialized tools in native code languages.

      • OP-TEE gains a clock framework contributed by Bootlin – Bootlin’s blog

        OP-TEE is a popular open-source reference implementation of a Trusted Execution Environment that relis on the Arm Trustzone technology. While working on the OP-TEE port for an ARM 32-bit system-on-chip, the Microchip SAMA5D2, we needed to add support for the complete clock tree of this SoC. OP-TEE did not have any generic clock support at all and we felt the need to add such a framework. Thanks to this framework, support the 10+ clocks of the Microchip SAMA5D2 was easily imported from Linux with less work than a complete rewrite of the clock tree. Using generic subsystems allows to lower the maintenance cost and easily add new clocks.

      • AMD Releases Updated Zen 3 CPU Microcode (November 2021) – Phoronix

        A new Family 19h microcode binary was merged today into the linux-firmware.git repository that serves as the central source for all of the binary firmware/microcode files for Linux systems.

        The updated AMD Family 19h “Zen 3″ microcode was committed today to linux-firmware.git. Unfortunately, as usual, there isn’t any public change-log to note what has changed with this AMD CPU microcode revision.

      • Graphics Stack

        • Mike Blumenkrantz: Pipe Magic

          Over the past months, I’ve been working with Adam “X Does What I Say” Jackson to try and improve zink’s path through the arcane system of chutes and ladders that comprises Gallium’s loader architecture. The recent victory in getting a Wayland system compositor running is the culmination of those efforts.

          I wanted to write at least a short blog post detailing some of the Gallium changes that were necessary to make this happen, if only so I have something to refer back to when I inevevitably break things later, so let’s dig in.

        • Vulkan Video Support Progressing For Open-Source Intel, AMD Radeon Hardware – Phoronix

          The open-source Vulkan driver support for the video decode (and presumably after that, encode) extensions continues moving along for the Radeon “RADV” and Intel “ANV” Mesa drivers.

          Earlier this month well known open-source Linux graphics driver expert David Airlie (Red Hat) began experimenting with RADV Vulkan Video support and after that was toying around with Vulkan Video for Intel’s Mesa driver too. Those efforts have continued with the latest milestones being hit.

        • Intel’s Linux Graphics Driver To Allow Runtime Power Management Auto-Suspend By Default – Phoronix

          Following a lot of improvements the past few years to the Intel Linux kernel graphics “i915″ driver it looks like it’s ready to enable run-time power management auto-suspend support by default.

          The Intel Linux kernel graphics driver has seen a lot of work in recent time around enabling Intel discrete graphics hardware support and as part of that to be able to support local device memory (dedicated vRAM), transitioning to more GuC/HuC usage, preparing for their high performance discrete graphics hardware supporting many new features, etc.

    • Instructionals/Technical

      • Chrome may start restricting requests to private networks

        Chrome (and apparently Microsoft Edge) are likely to add new restrictions on allowing things to talk to private network addresses (in a surprisingly broad sense). The reference for this is Feature: Restrict “private network requests” for subresources from public websites to secure contexts (via), which describes the first steps. The first steps Chrome is making is that such “private network requests” may only be made from a public context that is secure, ie from a HTTPS website instead of a HTTP one.

      • What the Web Still Is

        Make no mistake: I feel a lot of what makes the web great is actively being dismantled, either inadvertently or deliberately. But as I mentioned earlier, cynicism is easy. My wish for next year? That all the qualities mentioned here are still present. My New Year’s resolution? To help ensure it.

      • Your CSS is an interface

        Stylus on the Chrome Web Store has more than half a million users. Stylish has over three million. That’s a lot of people modifying the web to get what they want. We can also do a little bit better than an appeal to popularity. I’d like you to consider the ability for an individual to improve their quality of life. Some web experiences you’re forced to use. Think jobs, medical portals, government services, etc. If the bright red of the web app someone is forced to use for their job 8‒10 hours every day gives them tension headaches, shouldn’t they be able to dial it down to something more soothing? Being able to fix something you’re forced to endure creates an immediate and appreciable improvement on your quality of life. And that’s important.

      • Monitoring Linux system resources with bpytop

        The bpytop tool is similar to other performance monitoring tools available for Linux systems like top, iotop, htop, bashtop etc. It’s a terminal-based resource monitor that works efficiently and is visually appealing.

        The tool was ported from bashtop and rewritten in Python, so you need to have Python—version 3.6 or later—installed on your system to use it. (The “bpy” portion of the name undoubtedly stands for “bash Python”.)

      • How to Install Magento 2.4.3 on Ubuntu 20.04 | RoseHosting

        Magento is a highly popular open-source e-commerce platform written in PHP. It is completely customizable to every user’s requirements, thus allowing them to create and launch a fully functional online store in minutes, making it an excellent choice for businesses looking to have an online shop set up without hassle.

        Magento offers a community and a commercial version of its platform – the community version is free and is designed primarily for individuals and/or small businesses. On the other hand, the enterprise version is mainly aimed at medium to large businesses and more of an enterprise environment. In this tutorial, we will show you how to install Magento 2.4.3 on Ubuntu 20.04.

      • Samba nmbd failed to start

        After releasing Easy 3.1.10, Alfons tested ‘smbd’ and that starts, however, ‘nmbd’ daemon fails to start.
        Yeah, it has the same error, cannot create a directory in which to place the pid file. In this case, the log file does not identify what directory it is failing to create.

      • How To Install Magento on Debian 11 – idroot

        In this tutorial, we will show you how to install Magento on Debian 11. For those of you who didn’t know, Magento is a free and open-source eCommerce platform based on PHP and MariaDB that is used by millions of small businesses to sell and manage their products online. Magento comes with a rich set of features including Website management, SEO, Order management, Customer service tools, Marketing tools, a Checkout system, as well as Payment and Shipping systems.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of Magento CMS on a Debian 11 (Bullseye).

      • How To Install phpPgAdmin on Debian 11 – idroot

        In this tutorial, we will show you how to install phpPgAdmin on Debian 11. For those of you who didn’t know, phpPgAdmin is a free web-based administration tool for managing PostgreSQL databases. It allows you to perform activities like creating, modifying, and deleting databases, tables, views, fields. PhpPgAdmin is written in PHP and it makes the administration of PostgreSQL databases easier, not to mention the web-based GUI making everything more user-friendly and easier to use.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of phpPgAdmin on a Debian 11 (Bullseye).

      • How to Install & Configure CyberPanel and Create a WordPress Website – Dracula Servers Tutorials

        In this tutorial we’ll cover installing CyberPanel on an Ubuntu 20.04 remote server, we will configure some of CyberPanel’s options, and we’ll finally use it to set up a WordPress website.

      • How to Install & Configure Postgres 14 on FreeBSD 13

        Postgresql is an open source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance. Postgres, is a free and open-source relational database management system emphasizing extensibility and SQL compliance.

        It was originally named POSTGRES, referring to its origins as a successor to the Ingres database developed at the University of California, Berkeley. PostgreSQL is used as the primary data store or data warehouse for many web, mobile, geospatial, and analytics applications. PostgreSQL can store structured and unstructured data in a single product.

        In this guide we are going to install Postgresql 14 in FreeBSD 13.

      • How to Install Cockpit on Ubuntu 20.04 – ByteXD

        Cockpit is an open-source web-based utility that helps administer or monitor the local or remote servers. It also allows you to configure the multiple remote servers and shows the server components statistics in a graphical form. Cockpit has a user-friendly web-based interface through which you can easily monitor system resources, install applications, manage user accounts, and install necessary security updates. The cockpit utility can be installed on almost all Linux distributions such as Ubuntu, Debian, Mint, CentOS, Fedora, etc.

      • How to Install Joomla 4.0 on Ubuntu 20.04 | LinuxHostSupport

        Joomla is one of the most popular open-source content management systems (CMS). It is used to publish applications and websites online. It is written in PHP and is commonly configured to use MySQL/MariaDB databases.

      • How to Install PrestaShop on Ubuntu 20.04 | LinuxCloudVPS

        In this tutorial, we are going to show you How to Install PrestaShop on Ubuntu 20.04.

        PrestaShop is an open-source eCommerce platform written in PHP, that uses MySQL as a database server to store the information. It helps individuals or small business companies to raise their online shop and is very intuitive to use with its simplicity and easy features that you will discover after the installation. In this installation, we are going to explain every step of installing the LAMP stack because it is necessary for the PrestaShop to work properly.

        Installing PrestaShop is a very easy and straightforward process. Let’s get started!

      • How to enable Minimize and Maximize buttons on Elementary OS 6.0 – Invidious

        In this video, we are looking at how to enable Minimize and Maximize buttons on Elementary OS 6.0.

      • How to install Dofus on a Chromebook in 2021

        Today we are looking at how to install Dofus on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to install and configure PhPMyAdmin on Ubuntu 21.10 – NextGenTips

        In this tutorial guide we will be learning how to install and configure PHPMyAdmin on Ubuntu 21.10 9 (Impish indri).

        PHPMyAdmin is free and open source administration tool for MySQL and Mariadb database server. PHPMyAdmin assist users who are not well conversant with the command line because PHPMyAdmin is user friendly because of its user interface presence. Still you can perform database tasks such as creating users, running transactions, creating databases etc.

      • How to play Risk of Rain 2 on Linux

        Risk of Rain 2 is a rouge-like action game. In it, the player fights through hordes of monsters — either co-op with friends or alone. The game was developed by Hopoo Games and published by Gearbox. Here’s how to play it on Linux.

      • How to play S.T.A.L.K.E.R.: Shadow of Chernobyl on Linux

        S.T.A.L.K.E.R.: Shadow of Chernobyl is a survival-horror FPS game developed by GSC Game World and published by THQ. In this guide, we’ll show you how to get S.T.A.L.K.E.R.: Shadow of Chernobyl up and running on Linux.

      • How to run a Google search from the Linux command line – TechRepublic

        The majority of people depend on Google as a search engine. We use it every day to find the necessary information to keep us in the know. When you want to Google something, you either reach for your phone or open a browser.

        But if you’re a Linux user, you might want a faster way of doing so (because efficiency is the name of the game). So what if I told you it’s possible to perform a google search from the command line? It’s not only possible, it’s easy.

        Now, before we get into this, know that the application I’m going to show only presents the search results and requires a default web browser to open the results. So, although you can issue your initial search within the command line, clicking a link will take you out of the command line and into a GUI application. However, having a Google like this around does have implications for bash scripts and other command line utilities.

      • How to use systemctl in Linux – Unixcop the Unix / Linux the admins deams

        Unix-based operating systems give you flexible tools to manage your OS and its related services smoothly. And it’s our responsibilities as administrators to monitor our systems and manage it and of course, keep it running by troubleshooting the problems that occur on our system services. So, in this post you will learn how to use systemctl on Linux.

      • How to use terraform targets to run specific resource

        Terraform allows you to target specific resources when you plan, apply, or destroy your infrastructure. You can use Terraform’s -target option to target specific resources, modules, or collections of resources.

        This command Instructs Terraform to focus its initialization, planning, application or destruction efforts only on resource instances which match the given address and on any objects that those instances depend on.

        Terraform target is useful when you have terraform file which contains lots of resources but you only do not want to apply the complete terraform configuration but instead, you just want to run one specific or some specific resource out of your Terraform configuration.

      • Install OwnCloud on CentOS 8 – Unixcop the Unix / Linux the admins deams

        OwnCloud is a software application that provide file hosting service. You can use OwnCloud as your own file server, where you can upload / sync your files from a client machine. It also provides options to sync / share files between different devices. In this tutorial we will learn to install OwnCloud on CentOS 8.

      • Install and Configure Pure FTPd with Mysql on Centos 8 – Unixcop the Unix / Linux the admins deams

        Pure FTPd is an open source and secure FTP server. It is one of the widely used FTP server for its security, ease of use and ability to connect to a database.

        In this article we will install and configure FTPd on CentOS 8.

      • Fedora Post Install Setup Util – Security and Linux

        A number of years ago I shared a script to help with getting your system up and running with software and tweaks when you had freshly installed Fedora (F27 I think it was at the time)

        Looking around on the internet I found that a lot of Fedorians were asking the same questions “How do I install this?” “How do I get that?” So I thought to myself I’d create a revamped version to help with this so it’s all in one place.

        I mainly use it for myself but I thought I’d release it to the public with the hope that some of you also find it useful.

      • “Authorization not available”. Check if polkit service is running – Unixcop the Unix / Linux the admins deams

        One of the most irritant issues for system admins that I have encountered this morning on My Redhat/Centos 7.9 Server . let me show you in easy steps how to solve that and check if the Polkit Service is running.

    • Games

      • Another spin to Gamification: how we used Gather.town to build a (great!) Cyber Security Game

        Let’s recap October. Cyber Security Awareness Month. For a cyber awareness enthusiast, it is hard to conceal the excitement that comes with a full month of initiatives in all shapes and sizes, built around a genuine and strong effort to help keep companies and their people “safe online”. At NVISO also, the buzz is tangible, and everyone is eager to know what great projects we will be launching for this year’s Cyber Security Awareness Month. We’re lucky enough to have a client who will go the extra mile and allowed us to let our imagination run wild. And that is exactly what we did.

      • Forza Horizon 5 multiplayer should work on Linux with Proton Experimental | GamingOnLinux

        A few days ago Forza Horizon 5 became playable on Linux and now Valve / CodeWeavers have upgraded Proton Experimental yet again to try and get multiplayer sorted. Sadly, as it turns out, the game will still not work right on NVIDIA so for now this is one for the AMD GPU crew.

        The one single change noted for Proton Experimental’s update on November 15 is “Fix Forza Horizon 5 multiplayer”. So with that in mind, it might be time to load it back up if you previously had issues. You can continue to report problems on the official Valve GitHub for Forza Horizon 5.

      • Check out some upcoming games made with Godot Engine | GamingOnLinux

        Godot Engine is the feature-filled free and open source game engine. Want to see some games that are being made with it? Well we’ve got good news there, as the team just released their latest showreel.

        Before we get into the video though, here’s a list of all the games featured and a link for where you can find out more to make it easy for you.

      • Lila’s Sky Ark looks trippy in the new trailer and gets a publisher | GamingOnLinux

        Lila’s Sky Ark is the next game from Monolith of Minds (Resolutiion) and it not only has a new trailer but it also now has a publisher too. Announced during The MIX NEXT 2021, it was announced that Graffiti Games will be tackling the publishing on this one.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • Just Perfection GNOME Shell Extension v16 Released

          The popular GNOME Shell extension Just Perfection celebrates one year of successes with a brand new version.

          Sometimes you may feel somehow limited by the default GNOME desktop and the few options you have to tweak. No worries. With Just Perfection you can change the visibility of almost all components of GNOME Shell, behavior tweaks and customize panels.

          In other words, the extension allows you to get a super minimal GNOME desktop.

    • Distributions

      • Our new way of waiting for the network to be “up” in systemd’s world

        Systemd has a long standing philosophical objection to waiting until the network is up; they have an entire web page on the subject. Never the less, we need to do this (like many sysadmins). I’ve written before about this, and if you’re using systemd-networkd either directly or through Ubuntu’s netplan, you can in theory use systemd-networkd-wait-online.service. Usually it works, but today we discovered that it didn’t on some of our Ubuntu 18.04 servers (the specifics of this issue are beyond the scope of this entry). Since we needed a way to fix the issue, we opted to solve our problem with a hammer.

      • A linear, sequential boot and startup order is easier to deal with

        A linear order is straightforward to see, understand, reason about, and generally to manipulate. It’s easy to know what order things will happen in and have happened in, which avoids surprises during boot and helps diagnose problems afterward; you’re much less likely to be left trying to sort out what happened when from boot time logs. It’s nice to to understand the dependencies of services when that information is reliable, but we have a great deal of evidence that taxonomy is hard for people, and dependencies are a form of taxonomy. When dependencies are inaccurate, they can be worse than knowing that you don’t know that information in the first place.

      • Report: Assessing the Viability of an Open-Source CHERI Desktop Software Ecosystem

        In September 2021, we released our final report, Assessing the Viability of an Open-Source CHERI Desktop Software Ecosystem, which describes our three-staff-month effort to deploy CHERI within a substantive slice of an open-source desktop environment based on X11, Qt (and supporting libraries), and KDE. We adapted the software stack to run with memory-safe CHERI C/C++, performed a set of software compartmentalisation white boarding experiments, and concluded with a detailed 5-year retrospective vulnerability analysis to explore how memory safety and compartmentalisation would have affected past critical security vulnerabilities for a subset of that.

      • Reviews

        • 4 Ways elementary OS Still Falls Short

          elementary OS has come a long way since its humble beginnings. It’s not only a free and open-source operating system but a full platform. There’s a desktop to use apps, an app store to find them, along with all the tools and instructions you need to make them.


          AppCenter is the name of the elementary OS app store. When you launch the app store for the first time, you will only see apps designed specifically for elementary OS.

          In some ways, this is a great experience. It means unlike other Linux app stores, you don’t have to weed through dozens of options that may work but don’t integrate with your desktop environment at all. The downside is that there aren’t yet all that many apps available. Searching for a writing app may only yield a handful of results.

          Plus, many elementary OS apps are small, hyper-focused tools. For more powerful general-purpose software, you will still need to turn to more well-known apps. Think LibreOffice, GIMP, VLC, or Kdenlive. These apps can run on elementary OS just fine, but you will need to turn to third-party sources of Linux apps to get them.

          Does this mean elementary OS should preinstall a third-party resource like Flathub, rather than point users toward it? Not necessarily.

          At the end of the day, people are accustomed to the company providing an app store to perform quality control over the apps inside it, and the elementary team has no influence or control over the software in Flathub. This is one of the reasons elementary has provided for not doing so.

          But until the AppCenter fills up, the initial experience can feel jarring, especially if you’re coming from an older version of elementary OS.

      • BSD

        • OpenBSD and Linux comparison: data transfer benchmark

          I had a high suspicion about something but today I made measurements. My feeling is that downloading data from OpenBSD use more “upload data” than on other OS

          I originally thought about this issue when I found that using OpenVPN on OpenBSD was limiting my download speed because I was reaching the upload limit of my DSL line, but it was fine on Linux. From there, I’ve been thinking since then that OpenBSD was using more out data but I never measured anything before.

      • IBM/Red Hat/Fedora

        • CentOS Alternative Rocky Linux 8.5 Is Out Now with Secure Boot Support, Updated Components

          Derived from Red Hat Enterprise Linux 8.5, Rocky Linux 8.5 is here to introduce an important feature for the mass adoption of this CentOS Linux alternative, namely Secure Boot support.

          This is the first release of Rocky Linux to include the official Rocky Linux signed Secure Boot shim, but users need to validated it to ensure that it’s properly activated. As such, the developers ask users to run a few commands after installing Rocky Linux 8.5.

        • Fedora Drafts Plans For Retiring ARMv7 Support – Phoronix

          It’s crazy to think it has already been ten years since Arm disclosed ARMv8 with 64-bit support. Given the success of ARMv8 (and Armv9 now on the way) and there not being much in the way of useful ARMv7 hardware in recent years and the like, Fedora has drafted plans for retiring its ARMv7 support.

      • Canonical/Ubuntu Family

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • How I use data to connect with my open source project’s contributors

        Open source projects need developers to survive, and one of the primary sources of developers is a project’s user base. I’m involved with the openEuler project, where understanding the conversion rate of contributors from user to developer is a key metric. This article takes a look at the open source community from a hierarchical perspective, hoping to provide a new dimension to observe a community’s health through data.

        To gain an operational perspective of how a community works, you often can look to the code hosting platform a project uses, such as Gitlab, Github, or in the case of openEuler gitee.com. This is where your developers work, and probably where many of your users visit to check in with the project’s progress. These platforms leave a digital footprint based on contribution, and it helps you understand the different type of interactions your contributors have with the project’s codebase. For openEuler, the different developer types include those with permission to make commits to the the official openEuler website, those who’ve downloaded and installed the distribution, and those who update software packages daily.

      • The Apache Weekly News Round-up: week ending 12 November 2021

        Hello, everyone –let’s review the Apache community’s activities from over the past week…

      • Web Browsers

      • SaaS/Back End/Databases

        • PGroonga 2.3.4 released

          PGroonga 2.3.4 has been released!


          PGroonga is a PostgreSQL extension that makes PostgreSQL fast full text search platform for all languages! It’s released under PostgreSQL license.

      • Education

        • Birmingham R talks about the difficulties of socializing in an online space

          AF: We were struggling in the beginning because we didn’t know what to do. It depends on how you deal with it as an organizer and a community builder. I was leaning on face-to-face contact and others to help me out. Online, it was harder to engage with people and to ask for speakers from the local community. We didn’t have a meetup for 4 or 5 months. In the autumn we had a meetup. Then we didn’t have anything until the winter. At the beginning of this year, we decided to do meetings online and jumped on the bandwagon of the Global R community. We advertised their meetings on the Birmingham R page to give the community something to watch. Then we organized a meetup of our own in between their events. There is a lot less interaction with the members this way. People tend to be less interactive in online meetings and spaces. Since you must put a lot of effort into forcing socialization in these online spaces. I am looking forward to being able to go back in person.

      • FSF

        • GNU Projects

          • health @ Savannah: Thalamus documentation now at GNU Health portal

            MyGNUHealth (Personal Health Record) and Thalamus have been already migrated and translated to different languages (Spanish, German, French). The GH Hospital Management System component is in the process of migration. This requires quite a bit of work, updating the documentation and images from 40+ packages.

      • Programming/Development

        • Git 2.34.0 released [Ed: LWN and Phoronix act as if Microsoft owns Git now, linking to nothing but Microsoft’s site, which is proprietary software and EEE against Git]

          Version 2.34.0 of the Git source-code management system is out. “It is comprised of 834 non-merge commits since v2.33.0, contributed by 109 people, 29 of which are new faces”.

        • Git 2.34 Released With Sparse-Enabled Index Feature, More Performance Work

          Git 2.34 is out today as the newest feature update to this widely-used, distributed version control system.

          Git 2.34 is another incremental step forward for this leading open-source DVCS software. Git 2.34 adds a sparse-enabled index for helping deal with very large Git repositories for “monorepo” like setups. The index format is able to understand marked directories indicate the bounary between the contents during sparse checkouts.

        • How should we compare neural network representations?

          In the literature, researchers often propose new metrics and justify them based on intuitive desiderata that were missing from previous metrics. For example, Morcos et al. motivate CCA by arguing that similarity metrics should be invariant to invertible linear transformations [5]. Kornblith et al. disagree about which invariances a similarity metric should have, and instead argue that metrics should pass an intuitive test – given two trained networks with the same architecture but different initialization, layers at the same depth should be most similar to each other – and their proposed metric, CKA, performs the best on their test [4].

          Our paper, Grounding Representation Similarity with Statistical Testing, argues against this practice. To start, we show that by choosing different intuitive tests, we can make any method look good. CKA does well on a “specificity test” similar to the one proposed by Kornblith et al., but it does poorly on a “sensitivity test” that CCA shines on.

        • A Novel Way to Optimize Robots

          As they describe in Nature Communications, he and his colleagues have devised a way of testing this idea. In doing so, they have brought to robotics the principles of evolution by natural selection. They have also cast the spotlight on an evolutionary idea that dates from the 1890s, but which has hitherto proved hard to demonstrate.

          There is a wrinkle. The team’s robots, which they dub “unimals”, are not things of metal and plastic. Rather, they are software entities that interact with a virtual environment in the way that metal-and-plastic devices might interact with a real one. Unimals are pretty simple, having spheres for heads and cylinders for limbs (see picture). The environments through which they roamed were also simple, and came in three varieties: flat arenas, arenas filled with hills, steps and rubble, and ones that had the complexities of the second sort, but with added props like cubes that needed to be moved around.

        • Introducing hRPC: a simple RPC system for user-facing APIs – Janet’s Shenanigans

          hRPC is a new RPC system that we, at Harmony, have been developing and using for our decentralized chat protocol. It uses Protocol Buffers (Protobufs) as a wire format, and supports streaming.

          hRPC is primarily made for user-facing APIs and aims to be as simple to use as possible.

          If you would like to learn more, the hRPC specification can be found here.


          hRPC uses REST to model plain unary requests, and WebSockets to model streaming requests. As such, it should be easy to write a library for the languages that don’t already support it.

        • Vincent Bernat: Git as a source of truth for network automation

          The first step when automating a network is to build the source of truth. A source of truth is a repository of data that provides the intended state: the list of devices, the IP addresses, the network protocols settings, the time servers, etc.

        • Python

          • Why Python needs to be paused during profiling – but Ruby doesn’t always

            One of the cool things about the rbspy profiler is that it can profile any running Ruby program, without even pausing the Ruby program that is being profiled. Rbspy is a sampling profiler, and when the –nonblocking argument is passed to it, it will collect each stack trace from the profiled program without pausing it or doing any synchronization. This has the advantage of not slowing down the profiled program at all, but has the disadvantage of leading to a data race between the rbspy profiler and the Ruby program being profiled. In the nonblocking mode, rbspy tries to get an accurate stack trace from the Ruby program while the Ruby program is actively changing the stack by running the code – and since there is no locking happening there is potential for a data race. Amazingly, rbspy still manages to get good results even without doing any synchronization.

        • Shell/Bash/Zsh/Ksh

          • With A Linux Shell Comes Great Power… And Great Responsibility

            But its what happens next that really forces me to put a lions share of the blame for this on Linus. See up until this point, he just couldn’t install Steam. That was the actual bug. However Linus decided to give the system permission to do whatever it decided it needed to do to fix the issue, consequences be damned. Oh sure he didn’t read any of the warnings in the terminal where apt informed him that proceeding might result in catastrophe, but that doesn’t absolve him of responsibility for authorizing it.

            So yeah, he “bricked” his system. While it was fixable, I don’t blame any new Linux user for cutting lose of the distro and trying something else at this point. But I do blame them when they open a shell, run a command with root privileges and utterly ignore the warnings its plastering across the screen about very bad consequences and tell it to proceed anyway.

            It turns out however that a large percentage of the Linux community disagrees with this assessment, especially the Tech Linux YouTube contingent who have thus far universally expressed sympathy for what happened to Linus. Oh sure it sucks… but he made it a thousand times worse by treating the system like a black box which produces output and warnings that can be safely ignored.

            Linux isn’t Windows. It’s not a black box. While the apt tool could’ve just opted to not do this stupid thing (note: System 76 has already patched their version to ensure this and is attempting to get the patch upstreamed with Debian), it instead opted to provide the user with a transparent accounting of everything that would happen if he chose to proceed. The user made the decision to proceed. Then it did exactly what it told the user it would do.

          • Testing shell commands in Go

            A standard way of running shell commands in Go is via exec.Command. However, calling this function directly within your business logic makes the code hard to test.

            This post demonstrates an approach I developed when I had to adapt my code for running shell commands both locally and remote over SSH, while also keeping it testable.

            TL;DR: extract exec.Command into an interface and create a mock implementation for testing. Implement it for your SSH client too, if needed. See example code here.

            The code below assumes it is executed in a unix-like operating system where sh shell is available. This simplifies the whole enterprise quite a bit, but also brings some limitations.

        • Java

          • LWJGL 3.3 Released For This Popular Java Library – OpenCL 3.0 Added, New Bindings – Phoronix

            The Lightweight Java Game Library “LWJGL” has seen its first release in more than two years for this library that provides bindings for a number of different native APIs. With not seeing a release since before the pandemic, there is a lot in store with today’s LWJGL 3.3 release.

            LWJGL 3.3 has many changes with the last v3.2 point release being back in September 2019 or the introduction of v3.2.0 since July 2018. There are some new bindings but mostly a ton of updates for various libraries targeted by this widely-used Java library for high performance access to native APIs.

  • Leftovers

    • Mort Sahl, 1927–2021: The Comic as Social Critic

      Mort Sahl died on October 26, and the news brought back memories of the 1960s and early ’70s and what it was like to grow up in Los Angeles, where he lived and worked. Sahl’s career was unpredictable and vagrant from the start; he joined the ROTC at 15 to escape the boredom of high school and eventually went into the Army Air Forces.

    • Write like a human

      Given that I have been writing three decades, including eighteen-plus years a blogger, I am hardly surprised that I am repeatedly asked: how should I write? And my answer is always the same — write like a human.

      We are getting buried under freeze-dried news reports and hot takes that make supermarket baloney feel like a prime cut. Everything feels like a faded facsimile of everything else. It is the [Internet] equivalent of the same strip mall mediocrity.

      So that is why I say. Be real. Write like a person. That is how your words will be unique because only you can be you.

    • Beg Bounties

      When someone passed me hundreds of thousands of records on kids taken from CloudPets a few years ago, I had a nightmare of a time getting in touch with the company. They’d left a MongoDB instance exposed to the public without a password and someone had snagged all their data. Within the data were references that granted access to voice recordings made by children, stored in an S3 bucket that also had no auth. So, why didn’t CloudPets respond to attempts to contact them? Their CEO later explained it very succinctly: [...]

    • A Reality Where CSS And JavaScript Don’t Exist…?

      A similar look would be trivial to achieve with just a few lines of CSS, which would really improve the reading experience, I think.

    • Teensy MIDI Air Harp Sounds Huge | Hackaday

      Some of the coolest sounds come from wild instruments like orchestra strings, fretless basses, and theremins — instruments that aren’t tied down by the constraints of frets and other kinds of note boundaries. [XenonJohn]’s air harp is definitely among this class of music makers, all of which require a certain level of manual finesse to play well.

      Although inspired by Jean-Michel Jarre’s laser harp, there are no lasers here. This is a MIDI aetherharp, aka an air harp, and it is played by interrupting the signals from a set of eight infrared distance sensors. These sensors can be played at three different heights for a total of 24 notes, plus there’s a little joystick for doing pitch bends.

    • Science

      • Uncovering the Secrets Behind Earth’s First Major Mass Extinction

        A team of scientists from Syracuse University’s Department of Earth and Environmental Sciences, the University of California, Berkeley and the University of California, Riverside, Université Bourgogne Franche-Comté, the University of New Mexico, the University of Ottawa, the University of Science and Technology of China and Stanford University recently co-authored a paper exploring the Late Ordovician mass extinction (LOME), which is the first, or oldest of the “big five (~445 million years ago).” Around 85% of marine species, most of which lived in shallow oceans near continents, disappeared during that time.

    • Education

      • LUT University appoints former MythBuster Hyneman as Professor of Practice

        Hyneman’s five-year term begins on Monday, and he is scheduled to visit LUT’s Lappeenranta campus on Tuesday. He is to give his first lecture, “Peeling the Onion: How to Start Prototyping,” on Thursday.

      • MythBuster’s Jamie Hyneman appointed Professor of Practice at LUT University of Finland

        Inventor and product developer Jamie Hyneman, also known for his work on the TV show MythBusters, has been appointed as LUT University’s Professor of Practice for a five-year term from November 15, 2021 to November 14, 2026.

        “I’m truly honored by the appointment. I am happy to help LUT by contributing what I know about technology and business and am looking forward to future projects and challenges,” Hyneman says.

        Hyneman was awarded an honorary doctorate at LUT University in 2017. In addition, LUT named its prototype lab in Lappeenranta after him: the J. Hyneman Center (JHC) is a workshop where students can develop new ideas and solutions to problems and build and test prototypes. It is open to all students and staff members of the university group LUT Universities.

    • Hardware

      • 50 years since Intel’s groundbreaking 4004 processor arrived – wow!

        The Intel 4004 was “the first commercially available microprocessor,” and while it is extremely primitive by today’s standards, it “paved the way” for the modern microprocessor computing revolution and changed the world as we know it.

      • The hardware behind my old mail filtering server

        In writing about my dumb little “mailserv” project this past weekend, I purposely avoided mentioning some of the parameters lest they distract from the message I was trying to convey. My attempted message was something along the lines of “everyone starts somewhere, ignorance is the default state until changed, and look at some of the shit I have inflicted upon the world as proof”.

      • Hexagonal Mirror Array Hides Hidden Message | Hackaday

        [Ben Bartlett] recently got engaged, and the proposal had a unique bit of help in the form of a 3D-printed hexagonal mirror array, whose mirrors are angled just right to spell out a message with the reflections. A small test is shown above projecting a heart, but the real deal was a bigger version reflecting the message “MARRY ME?” into sand at sunset. Who could say no to something like that? Luckily for all of us, [Ben] shared all the details of what went into designing and building such a thoughtful and fascinating device.

      • Vacuum “Tube” Might Replace GPS One Day | Hackaday

        GPS and similar satellite navigation systems changed everything. The modern generation is far less likely to have had to fold a service station map or ask someone for directions on the side of the road. But GPS isn’t perfect. You need to see the sky, for one thing. For another, an adversary could jam or take down your satellites. Even a natural disaster could temporarily or permanently knock out your access to the satellites.

        The people at Sandia National Labs worry about things like that and they want to replace GPS with quantum accelerometers and gyroscopes. The problem: those things take expensive and bulky vacuum systems and lasers. Sandia, however, has had a sealed device about the size of an avocado that weighs about a pound that could possibly do the job. Their goal is to see it work without maintenance for four more years.

      • Treasure Hunting With A Handful Of Common Components | Hackaday

        Sometimes simpler is better — when you don’t need the the computational power of an onboard microcontroller, it’s often best to rely on a simple circuit to get the job done. With cheap Raspberry Pis and ESP32s all over the place, it can be easy to forget that many simpler projects can be completed without a single line of code (and with the ongoing chip shortage, it may be more important now than ever to remember that).

    • Health/Nutrition/Agriculture

      • Big Ag Furious After EPA Determines Top Herbicides Driving Vulnerable Species Toward Extinction

        As Big Ag fumed Monday over a U.S. Environmental Protection Agency determination that herbicides including the endocrine-disrupting atrazine and carcinogenic glyphosate are likely to harm more than 1,600 protected plant and animal species, environmentalists pointed to the agency’s findings as proof of the need for stricter limits on the use of the dangerous poisons.

        “Without real conservation action, these pesticides will continue to push our most endangered wildlife closer to extinction.”

      • ‘Unconscionable’: Despite Outcry Over Lead Poisoning, New Asphalt Plant Approved in Flint, Michigan

        Less than a week after a federal judge approved a $626 million settlement for thousands of lead poisoning victims in Flint, Michigan, state officials on Monday rubber-stamped an air permit for a new asphalt plant in the city despite strong opposition from residents and advocates, who denounced the decision as another manifestation of environmental injustice.

        “The plant will be an additional source of air pollution in a community of color that already has one of the highest rates of asthma hospitalizations in the state.”

      • ‘Just Scandalous’: UK Threw Out 600,000+ Covid Vaccine Doses in August

        The government of the United Kingdom threw out more than 600,000 doses of the AstraZeneca coronavirus vaccine in August after they expired unused, a revelation that came as billions of people in low-income countries still lack access to a single dose more than a year and a half into the global pandemic.

        “When vaccines are scarce and some countries have inoculated less than 1% of their population, this level of wastage is painful to see.”

      • GOP, Big Pharma Plotting to Convince Senate Parliamentarian to Help Kill Drug Price Reforms

        The pharmaceutical industry and its allies in the Republican Party are reportedly teaming up to craft challenges to congressional Democrats’ drug price reform plan in the hopes of convincing the Senate parliamentarian—an unelected functionary—to help tank the proposal.

        Earlier this month, Democrats struck a deal on a scaled-back plan that would allow Medicare to directly negotiate prices for a more limited subset of prescription medicines and penalize companies that raise drug prices more rapidly than inflation. The proposed fines for violating the inflation cap would apply to both Medicare and private plans, threatening the pharmaceutical industry’s virtually unchecked power to set prices as they please.

      • Concerning New Covid Variant Spotlights Dangers of Vaccine Apartheid

        The detection of an unusual—and potentially more contagious—Covid-19 variant is intensifying fears that denying vaccines to large swaths of the world’s population could allow the coronavirus to mutate unabated, prolonging the pandemic indefinitely and adding to the staggering global death toll.

        “Every day, there are six times more boosters administered globally than primary doses in low-income countries. This is a scandal.”

      • Big Pharma, GOP Plot to Use Senate Parliamentarian to Stop Drug Price Reforms
      • Some Observations On The NZ CovidPass System

        The main idea is very simple. You ask the Ministry (probably via the My Covid Record Web site, but possibly in other ways) to generate a statement of the form “<full-name>, <date-of-birth> is considered fully vaccinated”. The Ministry computer system checks your records to ensure that they agree you’re fully vaccinated, then generates that statement, digitally signs it with the Ministry’s private key, and encodes the statement and the signature as a QR code. You can store that code on your phone, or print it out on a piece of paper. Later, you show that QR code to a gatekeeper who wants to check your vaccination status. They scan it with their own app, which decodes the statement, checks that the statement has a valid signature from the Ministry, and if it does, tells the gatekeeper “<full-name>, <date-of-birth> is considered fully vaccinated”. To confirm that you’re the person the statement is talking about, the gatekeeper will need to check your driver’s license or other ID.

      • Caring, confident dads have structurally different brains – new research

        The study, which surveyed 2,045 UK fathers, found that many reported spending more time than usual on childcare and education during the lockdown. Dads also predominantly indicated that they emerged from this experience more confident as parents and in better relationships with their children. Now our own new research, published in the journals Child Development and Social Neuroscience, unveils just how deeply this confidence can be traced. We found that dads who have more positive attitudes about their parenting abilities, and about fatherhood in general, show differences in their brains to those who don’t.

    • Integrity/Availability

      • This is The End of The Beginning

        It happens sometimes when a company is acquired that the Founder/CEO chooses not to continue with the combined entity, and so it is for me. I am indescribably proud of what we’ve accomplished and what those accomplishments can mean for the course of human history, but I am also aware that the company’s need for me is more in the past than in the future. This is my fifth startup, and I expect it to be my last. I will continue as a Strategic Advisor to my friend Tim Chen (CEO of DomainTools), assisting with the integration of two companies into one, and helping with outreach. I will also continue as a Director at SIE Europe U.G., and as a technical advisor to Fuxi Institute where SIE China will be built.

      • Decentralization may be key to protecting our digital identities

        It raises a serious question of trust. With more and more devices getting connected to the internet, virtually all of our data is still centrally stored: on our computers or other devices, or in the cloud. Can we trust the businesses, organizations, and institutions that store and manage our data against any form of corruption – either internally or externally, on purpose or by accident?

      • Proprietary

        • [Old] Capturing and Archiving MiniDV Tapes on macOS

          Even though it took some time, I now have a solid process for archiving MiniDV tapes and adding them to my Photos library. There are so many precious moments on there and I’m happy that I invested the time to transfer and catalog them.

          If I could talk to my 12-year-old self, I would tell him to not re-use those tapes. It degrades their quality and overwriting means losing the old material. Still, I’m happy with the results.

          In the next article I’ll be writing about the process of cataloging photos from old hard drives in macOS’ Photos app.

        • Endpoints are turning into biggest security nightmare for enterprises

          Businesses generally have followed the model of protecting their business critical servers from possible cyber attacks over the years. They never really envisioned regular devices such as user endpoints and operational systems as a possible avenue for such attacks. But as the industries and technologies evolve and with the COVID-19 forced digital transformation and remote work culture, it has become clear that endpoints are more favored by attackers and considered easier attack targets, yet somehow companies are still oblivious to this fact.

          So, it is essential for organisations to plan their IT security strategy with active focus on safeguarding the endpoints that are widespread. Experts suggest that as a company grows, the attack surface also grows with the increase of endpoints. For any organization be is a small or big enterprise, one way to shut out this danger is to secure the endpoints by building strong detection and response systems.

        • OneDrive will stop syncing files for users on Windows 7 & 8 in March 2022

          This is all makes sense because it will push the subset of users who are on OneDrive (who are also affected) to upgrade to the newer version of Windows rather than trundle along on Windows 7 and 8. Moreover, users will be better protected from viruses and malware because they will be closer to the newer release software and security upgrades.

        • Interpol issues arrest warrants for members of Clop ransomware gang
        • Biden signs $1 trillion infrastructure package into law [iophk: Windows TCO]

          The infrastructure package also includes $50 billion to combat the effects of climate change and cyberattacks on national infrastructure and another $73 billion to improve the power grid.

        • U.S. President Biden signs into law $65 billion for more accessible and affordable internet – Access Now

          Today, President Biden signed the bipartisan infrastructure bill into law, which includes $65 billion to close the digital divide by bringing broadband to those who lack it and addressing broadband affordability.

          The law allocates approximately $42 billion for high-speed broadband deployment in unserved and underserved areas. It also provides roughly $14 billion for a $30-per-month Affordable Connectivity Program to help ensure low-income communities can afford broadband access, replacing the $50-per-month Emergency Broadband Benefit program supported temporarily through the COVID-19 relief package.

        • Security

          • Privacy/Surveillance

            • Opinion | Why We Should Reject Mark Zuckerberg’s Dehumanizing Vision of a “Metaverse”

              The deeper implications of this apparent “technology coup” are troubling for the dealing with the looming climate crisis and urgent need to restore the environment

            • After Facebook Leaks, Here Is What Should Come Next

              It’s not for lack of trying, of course—much like Facebook, Congress is a many-headed beast, and its members rarely agree on the specific problems besetting American life, let alone the solutions. But this year may be different.

              Many of the problems highlighted by these documents are not particularly new. Regardless, we may finally be at a tipping point.

              For the last month, Facebook has been at the center of a lengthy, damaging news cycle brought on by the release of thousands of pages of leaked documents, sent to both Congress and news outlets by former Facebook data scientist Frances Haugen. The documents show the company struggling internally with the negative impacts of both Facebook and its former-rival, now-partner platform, Instagram. (Facebook’s attempt to rebrand as Meta should not distract from the takeaways of these documents, so we will continue to call the company Facebook here.)

            • Want your Grindr data? Show your ID and take a selfie!

              Today, noyb filed a GDPR complaint against Grindr – a dating app for gay, bi, trans and queer people, where many users share very personal and even explicit sexual details. Instead of authenticating against the data that users have provided, like the email and password – Grindr requires users to identify in maybe the most grotesque way imaginable: Users have to hold up a piece of paper with their email address, as well as their passport – all while balancing their phone to take a selfie. This is not just absurd, but also a violation of the GDPR.

            • EU interior ministers welcome mandatory chat control for all smartphones

              At the meeting of EU interior ministers in Brdo, Slovenia, the government representatives today spoke out in favour of mandatory screening of our private communications. In the final declaration of the two-day conference convened by the Slovenian Council Presidency, the participants welcome the EU Commission’s intention to present draft legislation early 2022. It would oblige providers of messenger services such as Whatsapp and email services to automatically search encrypted and unencrypted communications, private messages and attached photos for suspected content and report it to the police.

            • Confidentiality

              • Hacker Tricked Robinhood Support Into Revealing Data Of 5 Million Users

                When it comes to privacy and security, the weakest link continues to be of the human variety.

              • Rollercoaster: Communicating Efficiently and Anonymously in Large Groups

                End-to-end (E2E) encryption is now widely deployed in messaging apps such as WhatsApp and Signal and billions of people around the world have the contents of their message protected against strong adversaries. However, while the message contents are encrypted, their metadata still leaks sensitive information. For example, it is easy for an infrastructure provider to tell which customers are communicating, with whom and when.

                Anonymous communication hides this metadata. This is crucial for the protection of individuals such as whistleblowers who expose criminal wrongdoing, activists organising a protest, or embassies coordinating a response to a diplomatic incident. All these face powerful adversaries for whom the communication metadata alone (without knowing the specific message text) can result in harm for the individuals concerned.

              • Maxim Healthcare notifies patients of breach that occurred in October, 2020

                On November 4, Maxim Healthcare Group, including Maxim Healthcare Services and Maxim Healthcare Staffing (collectively “Maxim Healthcare”) issued a press release about a breach — a press release they describe as issued “out of an abundance of caution.” That sounds like they had an option not to disclose. I would think that they were required to make notification as a matter of law, but their lawyers might disagree with my non-lawyerly opinion.

    • Defence/Aggression

      • Yemenis Remain Unbowed as Saudis Intensify Bombing in Wake of Renewed International Pressure

        This week, dozens of people were killed and injured near the Yemen-Saudi border when U.S.-made warplanes and French-made howitzer cannons fired unabated on many populated border areas in Sadaa and Hajjah — including the Monabeh, Sahar, alSafra, al-Dhaher and Sheda areas. Samer Manea Ali Hussein, a 15-year-old Yemeni boy, was killed along with others on Monday when a French-made howitzer cannon hit a village in the Monabeh region, one of Yemen’s border areas that are subjected to daily bombardment. Shrapnel from an artillery shell penetrated Samer`s body when he was walking to a school, local witnesses told MintPress. Unrelenting Saudi airstrikes have also deepened the crisis and tragedy afflicting the poorest country in the Middle East since 2015.

      • Novel Appeal Filed with the European Court of Human Rights in Nuclear Weapons Protest Case

        On November 11, 2021, Stefanie Augustin of Dortmund and Marion Küpker of Hamburg submitted the appeal through their lawyer Anna Busl. The ECHR will now decide whether to review the case and issue a ruling, or to deny it further consideration.

        Background: On Sunday, July 15, 2018, Augustin and Küpker were among eighteen people from four different countries who entered Germany’s Büchel air base, near Cochem, where approximately 20 US nuclear bombs are kept at the ready by the US Air Force’s 702nd Munitions Support Squadron. Seven of the activists came from the United States, six from Germany, four from The Netherlands, and one from England. In five groups, they clipped fences to enter the base and once inside some climbed onto a hangar where nuclear weapons may have been stored, and others read aloud to soldiers a warning about military and civilian laws that prohibit planning and preparing attacks using nuclear weapons.

      • Why is the U.S. Fueling the November 15 Cuba Protests?

        Almost two months have passed since these letters were sent, but there are few indications that the march will take place in Cuba. Florida’s propaganda machine assures the opposite and adds that similar marches will take place across more than a hundred cities in the world, a third of them in the United States.

        On November 10, Cuban Foreign Minister Bruno Rodríguez warned the diplomatic corps accredited in Havana that the Cuban government “will not tolerate an opposition march” and further said that “Cuba will never allow actions of a foreign government in our territory, trying to destabilize the country,” while referring to the U.S.’s support of these marches. The provocation follows the plot seen many times before. Meanwhile, this march, which has been scheduled for November 15, is not what many hope it will be: a movement for change in Cuba.

      • [UPDATED]: Myanmar’s Military Junta Sentences American Journalist To Eleven Years In Prison

        [UPDATE]: Well, that was quick. Fenster has been released, which hopefully indicates Myanmar’s unelected government is discovering it’s a bad idea to pick fights with most of the rest of the world. However, I’m sure it will continue to brutalize its own citizens because those advocating for their rights on a local level won’t have the leverage of the US State Department. Here’s the statement by the US Secretary of State Antony Blinken celebrating Fenster’s unexpected release:

      • Pistols and ammunition: Frontex chooses weapons manufacturer from Austria

        With a „Standing Corps“, the European Union has a uniformed and armed police unit for the first time. Whether Frontex is allowed to buy, store and transport weapons at all, however, is controversial. A planned loan agreement with Greece has not yet materialised.

      • At General Assembly, OAS Role in Bolivia Coup Remains Major Concern

        In the last few weeks, several events have brought the coup back to the forefront of regional politics. In August, an interdisciplinary group of independent human rights experts, known as the GIEI for its initials in Spanish, released its report on human rights violations committed during the crisis surrounding Bolivia’s 2019 elections. Among its many findings, the 468-page document clearly establishes that Bolivian state security forces perpetrated “massacres” following the coup. The report outlines a number of recommendations regarding the treatment of victims, calls for the perpetrators of human rights violations to be held accountable, and denounces the prevalence of pervasive racism in the Bolivian state and society.

        The GIEI report has been well received by the international community. It was welcomed by the United Nations Office of the High Commissioner on Human Rights, which highlighted its conclusion “that serious human rights violations, including systematic torture, summary executions and sexual and gender-based violence, took place in the Plurinational State of Bolivia during the post-electoral crisis in 2019.” The Inter-American Commission on Human Rights (IACHR), which is formally an appendage of the OAS but enjoys autonomy from the OAS Secretary General’s office, has also been highly supportive of the GIEI’s work, findings, and recommendations. It was the IACHR, under the leadership of former Executive Secretary Paulo Abrão, that pressured the Áñez government to agree to the creation of the independent group of experts to investigate human rights violations.

      • What Are the Prospects For Peace? An Interview With Lee Camp

        Lee is the head writer and host of the national TV show Redacted Tonight with Lee Camp on RT America. He’s a former contributor to The Onion, former staff humor writer for the Huffington Post, and his web series Moment of Clarity has been viewed by millions. He’s toured the country and the world with his fierce brand of standup comedy and hard-hitting political commentary. His book, Bullet Points & Punch Lines has earned enormous praise. RadMediaNews is his most recent project, an alternative to the propaganda of mainstream media and a vehicle for speaking truth to power. His responses below are exactly as he provided.

        The questions here are not philosophical or abstract. They focus on the realities of the international power struggle unfolding in real time. They directly address the role of the U.S. in the escalating tensions and its capacity to reduce them. We also probe the role of everyday citizens in affecting the relationship the U.S. now has and will have with the rest of the world community.

      • Groups to US: Take Money for ‘Dangerous and Outdated’ Nuclear Bomb and Vaccinate the World Instead

        Dozens of organizations on Monday urged U.S. lawmakers to stop sustaining a “dangerous and outdated” nuclear bomb program and instead reallocate $98 million to life-saving global Covid-19 vaccine production efforts.

        “The pandemic has made abundantly clear that our most urgent threats can not be solved by pouring more money into weapons of war,” the groups, including Public Citizen and Council for a Livable World, wrote in a letter to senators.

      • The “Seam Zone”: Israeli Officials Are Barring Thousands of Palestinian Farmers from Their Land

        Taysir Amarneh, a farmer whose land is located west of Israel’s notorious apartheid wall, has been waiting 30 minutes for Israeli soldiers to open Gate 408 so he can enter his fields. The military is supposed to open the checkpoint at 11:15 a.m. but they’re often late, Amarneh explained. The army finally arrives a little after noon so that Amarneh can prune his olive trees.

      • Trapped Between The Taliban And US Empire: Afghan Women Mobilize For A Democratic Afghanistan

        Sana, a 26-year-old Afghan asylum seeker living in the United States, received a phone call from her mother in Afghanistan, which she long dreaded would come. Her mother calmly told Sana: “I’m going to tell you something. It happened yesterday.”

        After over a year of begging her family to leave Afghanistan, Sana’s younger sister was arrested by the Taliban while walking on the streets of Jalalabad to go shopping with her friend. Unaccompanied by a man, the two young women caught the attention of Taliban security forces on patrol. They were taken into custody, questioned for hours, and falsely accused of prostitution. 

      • Rittenhouse Judge Drops Illegal Gun Possession Charges Ahead of Final Arguments
      • The Rittenhouse Trial and Two Sides in Contention: A Beautiful Rising or Rising Fascism

        On the evening of August 25, 2020, the Trump-loving 17-year old carried an illegally obtained AR-15 across state lines to Kenosha, Wisconsin, where he shot three protesters, killing two of them. He immediately became a hero to the fascist movement led by Trump. Not only did fascists quickly raise $2 million for Rittenhouse’s defense, he was photographed after his release hanging out with Proud Boys wearing a tee-shirt that said “Free as Fuck”. All this was backed by Trump, who said Rittenhouse was in “very big trouble” that night and probably would have been killed. The Trump regime even released talking points to federal law enforcement on how to sympathetically frame Rittenhouse’s murders, and championed other racist vigilantes at the full-on fascist Republican National Convention. 

        The protests in Kenosha were a righteous response to an incident two days earlier in which police shot a Black man, Jacob Blake, in the back at close range seven times, leaving him partially paralyzed. This was at the end of a summer that saw massive protests against the torturous police murder of George Floyd. This beautiful rising filled the streets across the country, bringing together Black people who’d had enough of the knee of white supremacy on their necks and people from different races and backgrounds who refused to stand on the sidelines. The uprising became a repudiation and rejection of the deep-rooted white supremacy of America, and was a real crisis for the Trump regime. After almost four years of a president who came to power on the basis of his racism, misogyny, and xenophobia, these months of protest opened up and reset the terms of debate on race in this country. For much of that summer, the fascists were on the defensive. Confederate statues were being torn down, Trump hid in his bunker, and even the amped-up repression brought down on protesters by the National Guard and a Gestapo-like force of secret federal agents could not contain the protests. People all over the country, and all over the world, saw and felt our power in the streets.

      • In Guns We Trust
      • As Damning New Memo Shakes Trump’s Defense, January 6 Committee Turns Up Heat
      • What’s Behind the Latest Violence in Kashmir?

        Both India and Pakistan continue to claim Kashmir in its entirety and have had several wars over the territory. As each acquired nuclear arms, their rivalry has become a major security concern for peace and stability in the world.

        While Pakistan-administered Kashmir has become religiously homogeneous over the past decades, Indian-administered Kashmir is home to several religious groups. Pakistan-administered Kashmir is 99 percent Muslim, with negligible numbers of Hindus and Buddhists registering at 0.6 percent and 0.3 percent, respectively, according to the 2017 census. In Indian-administered Kashmir, 68.3 percent of inhabitants are Muslim, 28.4 percent are Hindus, 1.9 percent are Sikhs, 0.9 percent are Buddhists, and 0.3 percent are Christians, according to the 2011 census.

      • “A grim outlook”: How cyber surveillance is booming on a global scale

        The research, from the American think tank the Atlantic Council, offers one of the most thorough accountings ever assembled of a booming, cross-continental surveillance industry that makes billions of dollars and yet mostly manages to stay out of the limelight. After years of rising demand for [cracker]-for-hire products and an increase in reported abuses by companies like NSO Group, countries around the world are now trying to deal with this largely hidden industry.

        The report is based on 20 years of data collected from the cyber surveillance trade show ISS World and arms fairs like France’s Milipol, where [cracking] is the fastest-growing business segment alongside more traditional wares like guns and tanks. Its authors examined 224 surveillance companies present at these shows, looked at their marketing material, examined where in the world they advertised their products, and detailed the known sales of surveillance and [cracking] tools.

      • Sandy Hook families win legal victory against Alex Jones in defamation case

        Jones and entities owned by him were found liable by default Monday in a defamation case against them.

        Connecticut Superior Court Judge Barbara Bellis cited the defendants’ “willful noncompliance” with the discovery process as her core reasoning behind the ruling. She specifically noted that they had not turned over financial and analytics data requested multiple times by the Sandy Hook family plaintiffs.

      • Erdoğan’s Quest for a New Sharia-Based Alliance

        Afghanistan is not Erdoğan’s only pro-sharia ambition after the U.S. withdrawal… Turkey ramped up its drone attacks on Yazidis in Iraq’s Sinjar district….. “The Turkish drone strikes increasingly threaten to undercut refugee repatriation inside Iraq and create space for the Islamic State to regroup, as the most effective Kurdish groups fighting ISIS are Sinjar’s grassroots Kurdish and Yazidi militias,” warned Michael Rubin in the Washington Examiner.

        Erdoğan’s Islamist, neo-Ottoman ambitions are now taking a pro-sharia turn. That is bad news for the region to Turkey’s south and east. Worse, it is a slow-fuse time bomb for the West.

      • Taxi Blast Outside U.K. Hospital Is Declared a Terrorist Act

        Mr. Jackson, the police official, described how the blast had unfolded shortly before 11 a.m., when the taxi driver, identified by local news media as David Perry, picked up a man who asked to be taken to the Liverpool Women’s Hospital. As the taxi approached the drop-off point at the hospital, an explosion went off inside the vehicle and engulfed it in flames. Remarkably, the driver escaped with minor injuries.

        An initial investigation determined that the passenger had taken an explosive device into the cab. The passenger’s identity is known to the police but has not yet been released publicly.

      • Liverpool Women’s Hospital explosion: Police name suspect killed in blast

        Al Swealmeen is believed to have manufactured and brought the device into the taxi.

      • What Should Be Done With Those ISIS Brides?

        Why should Germany have allowed Stephanie A. back into the country? If it was to punish her with a very long prison term, and then to expel her from Germany so that she would have to live out the rest of her days in some Muslim hellhole, that is understandable. But that is not what has been happening to ISIS brides. If recent history is any guide, she will be given at most only a few years In prison, and then allowed to remain in Germany. She joined two terrorist groups – Al-Qaeda and the Islamic State, and allowed, indeed encouraged, her young son to become a terrorist, but there is no evidence that she herself committed a terrorist act. Another German woman who joined ISIS, and helped her husband to murder a five-year-old Yazidi girl whom they had enslaved, and whom, as punishment for wetting her bed, they chained to a post, and then left her to die of thirst under a blazing sun, received only ten years, and that sentence can be reduced even further if she behaves herself in prison.

    • Environment

      • The US finally adopts a national recycling strategy

        The recycling plans the EPA announced today are just the first piece in “a series” of forthcoming documents the agency plans to release to work towards a “circular economy,” or an economy where resources are recovered and reused to make new products rather than allowed to wind up in landfills. It’s a sort of tacit acknowledgement that recycling alone doesn’t make a huge dent in the world’s trash problems.

      • Two environmentalists sabotaged an oil pipeline in America. Are they terrorists or heroes?

        That day, the judge had to decide whether Reznicek, a few weeks shy of her 40th birthday, was a domestic terrorist under the law. The Patriot Act, passed after 9/11, included its definition of domestic terrorism any illegal activity “dangerous to human life” that “appears to be intended to influence the policy of a government by intimidation or coercion”. The question of whether this definition of terrorism includes direct action motivated by the climate crisis has so far been little tested.

        Reznicek told herself that she was no terrorist. She’d taken a blow torch to a private company’s property, not the government’s, and only when sites were deserted. No one had been injured. Not only that, none of the rioters who stormed the Capitol on January 6th 2021 had thus far been charged with domestic terrorism. Reznicek couldn’t imagine how she could be classified this way. Then again, she’d never really imagined that Montoya would one day turn against her.

      • Russia blows up a satellite, creating a dangerous debris cloud in space

        This morning, Russia destroyed one of its own satellites with a ground-based missile, creating thousands of pieces of debris that have spread out into Earth orbit, according to the US State Department. The US has identified more than 1,500 trackable pieces of debris from the event, and many thousands of smaller ones that cannot be traced, Ned Price, a spokesperson for the State Department, said during a briefing.

      • Kessler Syndrome and the space debris problem

        The Kessler Syndrome describes, and warns of, a cascade of orbital debris that could potentially hinder humanity’s space ambitions and activities down the road. The original paper predicted that satellite collisions would become a source of space junk by the year 2000, if not sooner, unless humanity changed how it lofted payloads to orbit. But a timeline is not essential to the core idea.

      • Astronauts shelter from debris: Kessler syndrome coming to life?

        On Monday, November 15, 2021, the astronauts on the International Space Station took shelter from debris in their return vehicles. The United Kingdom’s Seradata, which produces a launch and satellite database, suspected the debris is the result of a Russian anti-satellite missile test that may have destroyed the Kosmos 1408 satellite. While the crew has returned to the space station for now, they closed off some modules as a precaution. The cloud of debris has a 90-minute orbital period, so additional close encounters are possible. The U.S. Space Command is working to learn more and will notify countries to maneuver their satellites out of harm’s way if necessary.

      • Russia Conducts Destructive Anti-Satellite Missile Test

        The events of November 15, 2021, clearly demonstrate that Russia, despite its claims of opposing the weaponization of outer space, is willing to jeopardize the long-term sustainability of outer space and imperil the exploration and use of outer space by all nations through its reckless and irresponsible behavior.

      • Shell ditches the Dutch, seeks move to London in overhaul

        Royal Dutch Shell (RDSa.L) said on Monday it would scrap its dual share structure and move its head office to Britain from the Netherlands, pushed away by Dutch taxes and facing climate pressure in court as the energy giant shifts from oil and gas.

      • Glasgow Pact Denounced for Betraying the Global Poor Hurt Most by Climate Crisis
      • Kids and Climate Change: New Book Exposes Why Some Schools Fail to Teach the Science
      • The COP26 President Fights Back Tears as the Summit Comes to a Close

        This column is part of Covering Climate Now, a global journalism collaboration cofounded by Columbia Journalism Review and The Nation to strengthen coverage of the climate story. The author is CCNow’s co-founder and executive director.

      • COP26 Ends With Promises, but Not Nearly Enough Progress

        This column is part of Covering Climate Now, a global journalism collaboration cofounded by Columbia Journalism Review and The Nation to strengthen coverage of the climate story.

      • Indigenous Amazonian Leader: We Must End Fossil Fuel Extraction to Protect the “Lungs of the Earth”

        Among the unprecedented moments for Indigenous participation in the U.N. climate summit in Glasgow were the protests to protect the Amazon rainforest, the largest remaining rainforest on the planet, that activists argue is on the brink of ecological collapse. “We cannot win the battle against climate unless we protect the world’s remaining rainforests,” Atossa Soltani, founder of Amazon Watch, tells Democracy Now! We also speak with Uyunkar Domingo Peas Nampichkai, Indigenous Achuar Nation leader from the Ecuadorian Amazon, who is demanding an end to logging, mining and oil drilling. “We don’t want more extraction,” says Nampichkai.

      • Glasgow Pact Slammed for Betraying the Global Poor Who Suffer Most from the Climate Emergency

        The U.N. climate summit in Glasgow, Scotland, ended Saturday with over 190 nations agreeing to the Glasgow Climate Pact, which calls on governments to return next year in Egypt with stronger plans to curb their emissions and urges wealthy nations to provide more funds to vulnerable countries in the Global South. It also pushes countries to phase out fossil fuel subsidies and reduce the use of coal, but activists say the final language of the agreement is too weak to meaningfully reduce emissions and limit global heating to 1.5 degrees Celsius, which scientists say is needed in order to avoid the most catastrophic consequences of the climate crisis. “There has been no real progress,” says Mitzi Jonelle Tan, a youth climate justice activist from the Philippines. “Once again, the U.N. climate summit just prioritized the voices of the privileged and not those that are most affected by the climate crisis.” We also speak with Brandon Wu, director of policy and campaigns at ActionAid USA, who says rich countries are scapegoating India and China for blocking stronger action on phasing out fossil fuels, while still growing their own oil and gas projects. “The real climate criminals are the wealthy countries,” says Wu.

      • Opinion | Why It’s Impossible to Be Happy About the Outcome of COP26

        GLASGOW, SCOTLAND—COP26 president Alok Sharma held back tears as he accepted India’s last-minute motion to weaken the summit’s pledge to “phase out” coal. Sharma had been saying for months that he wanted COP26 to “consign coal to history.” And until India insisted otherwise at the eleventh hour, it looked like the summit might achieve that scientifically imperative task. 

      • Opinion | COP26: ‘Walking Inches When We Must Move Miles’
      • Opinion | Ending Global Conflict: We Need Far More Than COP26 to Save the Planet

        Three issues arise directly from COP26. Firstly, the architects of the COP21 Paris agreement, Christiana Figueres and Laurence Tubiana, believe that yet more negotiations will have to follow COP26 next year. Secondly, the respected Climate Action Tracker put the consequences of what had so far been agreed, both before and during the summit, at a 2.4°C rise in temperature. Thirdly, and perhaps most daunting of all, even if a firm agreement is reached to keep the increase to 1.5°C, we are already experiencing the severity of climate change at the present 1.2° level.

      • European Green Deal: a Step Forward, Backward or Sideways?

        These commitments are all the more serious because European countries have some of the worst carbon footprints in the world. In terms of per-capita emissions, Germany is number seven at 10.4 metric tons per person while France clocks in at number 14 with 6.6 tons (which is also roughly the EU average). As a whole, the European Union is the third largest emitter of carbon dioxide after China and the United States.

        The carbon neutrality pledges are also within the realm of the possible. After all, the EU has been fairly successful at cutting emissions, having reduced levels by nearly 20 percent from 1990 to 2017.  The United States, by contrast, increased emissions over that time by 0.4 percent while China’s ballooned by over 350 percent.

      • Energy

        • The [Cryptocurrency] Capital of the World

          “In this country, you can kill a person and you will not go to jail, if you have enough money and you’re connected,” he said, sipping tea on a plush leather sofa. “If you are not connected, it will cost you more.”

          The anything-goes ethos has dogged Ukraine for years, and now the government is hoping to bury it, with an assist from cryptocurrency. In early September, the Parliament here passed a law legalizing and regulating Bitcoin, step one in an ambitious campaign to both mainstream the nation’s thriving trade in crypto and to rebrand the entire country.

        • Money Man Receives His Entire $1 Million Advance In Bitcoin Ahead of ‘Blockchain’ Album Release

          San Francisco-headquartered Empire just recently took to social media to announce the all-Bitcoin advance that it had forwarded to Money Man. The “100% independent” label, distributor, and publisher included with the message a 45-second-long clip that appears to show the advance being sent to Money Man via Cash App.

          As an aside, this isn’t the first time that the latter platform has spearheaded promotional initiatives and advertising campaigns in the music industry. To be sure, Cash App yesterday unveiled a contest for two floor tickets (as well as flights and accommodations) to BTS’s November 27th concert in Los Angeles. At the time of this piece’s publishing, north of 52,000 BTS ARMY diehards had responded to the corresponding tweet.

        • Europe must ban Bitcoin mining to hit the 1.5C Paris climate goal, say Swedish regulators

          Between April and August this year, the energy consumption of Bitcoin mining in the Nordic country rose “several hundred per cent,” and now consumes the equivalent electricity of 200,000 households, Thedéen and Risinger said.

          In an open letter, the directors of Sweden’s top financial and environmental regulators called for an EU-wide ban on “proof of work” cryptocurrency mining, for Sweden to “halt the establishment” of new crypto mining operations and for companies that trade and invest in crypto assets to be prohibited from describing their business activities as environmentally sustainable.

        • [Cryptocurrency] boom strains Kazakhstan’s coal-powered energy grid

          Kazakhstan is struggling to meet the energy needs of its booming cryptocurrency mining industry, which is flourishing thanks to cheap power and an exodus of [cryptocurrency] miners from neighbouring China.

          The Central Asian nation of 19 million has become the world’s second-biggest bitcoin mining location after the United States in recent months, according to the Cambridge Centre for Alternative Finance.

        • Florida City Announces [Cryptocurrency] Giveaway To All Residents: Miami and NYC Are Betting Big On [Cryptocurrency]. But Should They?

          Miami mayor Francis Suarez has announced on Twitter that he plans to give out cryptocurrency funds to city residents. The funds are earnings the city has made through MiamiCoin, a “CityCoin.” In simple terms, the return came from the city investing some of its funds in MiamiCoin, earning over $21 million in the past three months, CoinDesk reports. That’s on track to earn roughly one fifth of what Miami makes through taxes in a year.

          “We’re going to be the first city in America to give a bitcoin yield as a dividend directly to its residents,” Suarez told CoinDesk on Thursday. Residents are also able to mine or buy the coin directly from the city — a simple way for cities to make an extra buck using blockchain technology. But critics see it as a needless cash grab and an investment in highly volatile assets that could end up leaving a big hole in the city’s budget.

        • The weekend read: Crypto’s energy conundrum

          The cryptocurrency Bitcoin is close to using around 0.5% of all the electricity consumed in the world. Bitcoin was estimated to have consumed around 67 TWh in 2020, with nearly 60% of that total supplied by fossil fuels. Bitcoin’s current annualized energy production in 2021 is as high as 170 TWh, although the exact figures are rubbery, given its decentralized operation. Bitcoin is sometimes called “electric money,” due to the continuous use of energy to maintain its network.

          By comparison, the country of Argentina’s total electricity consumption in 2019 was 125 TWh, according to the U.S. Energy Information Administration, with 26.5% coming from renewables. Aluminum, known as solid electricity, used as much as 846 TWh in primary smelting in 2020, with nearly 60% of that total from coal sources.

      • Wildlife/Nature

        • The Woody Biomass Blunder

          The term carbon neutral (which is not the same as zero carbon and not a scientific term) when used to distinguish a plan to reduce greenhouse gas emissions really means this: “Someone else, at some other time, removes carbon, so I can emit more.” (Quote by Dr. William Moomaw, IPCC co-author of several reports)

          Wood pellet manufacturing listed as carbon neutral has become a huge growth business throughout the world. Yet, it qualifies as one of the stupidest moments in human history. Chopping down trees, burning trees for “carbon neutral” status is like draining the swimming pool and refilling it each time you swim.

    • Finance

      • New Report on ‘Grocery Cartels’ Details Exploitive Retailer Monopolies

        “Grocery cartels” comprised of corporate monopolies controlling most of what Americans eat and drink—and the supermarkets in which they shop—have created a false illusion of consumer choice in a system that’s also draining local communities and enriching corporate executives, according to a new report published Monday by Food & Water Watch, which offers steps to rebuild the broken U.S. food system.

        “The Covid-19 pandemic pulled back the curtain on the idea that the current food system offers abundance, efficiency, and resilience.”

      • New Book Shines Ways to Rebound Our Historic Postal Service

        While DeJoy triggered a crisis that threatened the presidential election process, attacks on the Postal Service have been ongoing for decades. The anti-postal campaigns by corporate interests have remained a continuing source of frustration to those of us who have observed the Postal Service’s decline due to unimaginative management, a deck stacked to favor for-profit rivals such as FedEx and UPS, and unfair financial obligations and delivery prohibitions (for example, on wine and beer) imposed by Congress.

        The Postal Service is facing a manufactured financial crisis that is primarily the result of a congressional mandate dating back to 2006 that required the agency to pre-fund the next seventy-five years of retiree health benefits in one decade. This pre-payment requirement is something that no other federal government agency or private corporation attempts to do—not to mention that there is no actuarial justification for such an accelerated payment schedule. The pre-funding requirement effectively forces the Postal Service to finance a $72 billion retiree health benefits fund for future employees who have not even been born yet. Despite these facts, Congress has refused to correct the host of problems resulting from its requirements.

      • The Media Discovers Real Wages

        While that is unfortunate, it is also the case that this is not unusual. Here’s the picture over the last four decades.

        As can be seen, there are many periods in which wage growth has not kept with inflation. Starting in the 1980s, wages lagged inflation through most of the decade. This is the period that was known in the media as the “Reagan Boom,” or “morning in America.” Wages did exceed inflation from the mid-1990s to the early 2000s. They then fell behind inflation just before President Bush’s reelection campaign, although the media generally didn’t prominently highlight falling real wages in that election.

      • Chaos and Uncertainty as Developer Plans to Demolish Motel That Serves as Housing Lifeline

        Life at the Castaway Inn had never been quiet, exactly. Sitting among dive bars and liquor stores on the western edge of downtown Reno, the 46-room motel that rented by the week had become a permanent home for dozens of residents who had nowhere else to go.

        But on a hot afternoon in September, a different kind of bustle had taken over the parking lot. Tenants carried trash and old furniture out of their rooms. Their belongings were stacked in the walkways: a broken refrigerator, old mattresses, a toaster oven, a curio cabinet.

      • Wall Street Is Not Only Rigging Markets, It’s Also Rigging the Outcome of its Private Trials

        Wall Street’s private justice system effectively locks the nation’s courthouse doors to both its workers and customers, sending the claims before conflicted arbitrators who do not have to follow legal precedent, case law or write legally-reasoned decisions.

        One of Wall Street’s serial toadies, the U.S. Chamber of Commerce, was quick to release a statement on March 8 when it learned that the House of Representatives was likely to vote on and pass H.R. 963, the “Forced Arbitration Injustice Repeal (FAIR) Act.” (Last week the House Judiciary Committee voted favorably to move the bill out of Committee and on to the full House for a vote. The bill currently has 201 co-sponsors.)

      • The Politics of Crypto

        Let’s dispense with the latter charge first: There’s no merit to it whatsoever.

        Cryptocurrency came into existence years before Trumpism was so much as a gleam in the Republican Party’s eye, and was conceived in large part as a method of separating money and state.

      • House Democrats Plan to Pass $1.75 Trillion Reconciliation Bill This Week
      • After Biden Signs Bipartisan Bill, Progressives Demand Swift Passage of Build Back Better

        “In partnership, the Build Back Better Act and the Infrastructure Investment and Jobs Act will make critical investments we need to boost our economy and rebuild our communities.”

    • AstroTurf/Lobbying/Politics

      • Progressive International Launches Global Observatory to Defend Democracy

        Stressing that the institutions designed to ensure fair elections are failing—and have even been complicit in right-wing coups—Progressive International on Monday launched a new global observatory with the goal of protecting democracy amid a worldwide assault on popular rule by authoritarian forces.

        “Around the world, democratic institutions are under attack,” David Adler, Progressive International (PI) secretariat, said in a video promoting the coalition’s new effort. “From Narendra Modi in India, to Jair Bolsonaro in Brazil, authoritarian leaders are getting organized to rig the rules, capture the courts, and criminalize dissent.”

      • Revealed: Documents Show Bill Gates Has Given $319 Million to Media Outlets

        Up until his recent messy divorce, Bill Gates enjoyed something of a free pass in corporate media. Generally presented as a kindly nerd who wants to save the world, the Microsoft co-founder was even unironically christened “Saint Bill” by The Guardian.

      • Opinion | The GOP’s Next Coordinated Attempt to Steal an Election Won’t Be So Amateurish
      • Ning-Nong Diplomacy, China and Paul Keating

        The Labor side of politics has Paul Keating, the last, dare one use the word, visionary, in the prime ministerial pack. With his electoral defeat in 1996 at the hands of the undistinguished, anti-Asian John Howard, Australia returned, in large measure, to the reassuring protections of the US military alliance.  The Asia-Pacific region was less one to accommodate than seek armour against.  Ever risky, ever dangerous, they remained the swarthy barbarians of alien tongues and troublesome ambition.  There were threats nearby and everywhere, and it would require a lengthy alliance without qualifications to protect Canberra.

        This sort of foolishness is yielding its grim results.  Not a day goes by that does not see Australian politicians sign themselves up to the next suicidal conflict that might take place over Taiwan or over the South China Sea.  On November 10, Keating, at the Australian National Press Club, was bursting to speak to the audience about his taking of the geopolitical temperature.  It was his modest effort to try to arrest this seemingly imminent move.

      • Opinion | Joe Biden and Illusions of ‘Normalcy’

        In a provocative recent essay in the New York Times, the political historian Jon Grinspan places the distemper currently afflicting American politics in a broader context. In essence, he contends that we’ve been here before.

      • ‘Inexcusable’: Manchin Leads Charge Against Biden’s Pro-Union Electric Vehicle Tax Credit

        “Our climate is running out of time—yet Manchin wants to stand in the way of affordable and sustainable solutions.”

      • Stuck in the Middle

        George Packer is one of the most successful long-form journalists of his generation. For more than two decades, he has been among this country’s leading liberal commentators. Offering a political and often personal chronicle of the vicissitudes of American liberalism over the past century, he has sought at once to reclaim and repurpose a political tradition he knows is in crisis.1

      • How Saudi State Media Feeds Fake News to Israeli, Western Audiences

        Saudi state media outlets have been found to repeatedly report information, lacking sources or supporting evidence, in order to attack their political opposition in the Middle East. This can range from stories about deserters from Hamas to the utterly absurd fictions regarding alleged assassinations of high-ranking Iranian officials, which, taken together, constitute a pro-Israel, pro-Washington psyop.

      • Ukraine: The Most Dangerous Problem in the World

        Amid the public storm in America over the fall of Kabul, it is important not to lose sight of other looming crises around the world—some of them potentially much more dangerous than Afghanistan. For if the US political elites were so surprised by the speed of the Afghan state’s collapse, that was largely because the US media stopped paying attention to developments on the ground in Afghanistan once most US forces withdrew and Americans stopped dying there in large numbers.1A version of this essay appeared as a report for the Quincy Institute in June 2021.

      • Corporate Media Harms Not Only Through Omission, But Also by Distortion
      • Manchin Lashes Out Against Biden’s Pro-Union Electric Vehicle Tax Credit
      • Steve Bannon Surrenders to FBI, But Maintains He’s “Taking Down” Biden
      • Beto O’Rourke Officially Announces Run to Unseat Gov. Greg Abbott
      • International Round-Up: Danish artist launches legal action to safeguard statue

        Every student at Hong Kong University knows ‘Pillar of Shame’, Danish artist Jens Galschiøt’s imposing eight-metre-high, two-tonne orange sculpture of bodies deformed by pain and despair.

        And now Galschiøt – who sculpted it in 1997 in memory of the victims of the massacre of 4 June 1989, when the Chinese army repressed pro-democracy student demonstrations in a bloodbath in Beijing’s Tiananmen Square – has reacted angrily to plans to move it from its current home outside the university.

      • America’s Real ‘Wokeness’ Divide

        For the poll, Leger surveyed a representative sample of 1,002 American adults from October 22 to October 24. We asked for respondents’ agreements with various statements, shown in the chart below, that are often invoked by conservatives and moderates as being associated with people who are “woke.” The results showed that there was no significant difference between people with college degrees and those without them on the question of whether America is becoming too politically correct (slight majorities of both groups agreed somewhat or strongly). The same was true for believing “cancel culture is a big problem in society”—51 percent of degree holders agreed, as did 45 percent of those without degrees.

      • Experts call for ‘Geneva Convention’ for cybersecurity at Abu Dhabi Strategic Debate

        “Data is the next oil, and private companies own a lot of the infrastructure and they play with this data, therefore rules need to be laid down. No one nation can deal with cybersecurity ambiguity, it needs collaboration.”

      • Ecofriendly biking comes to Ixtapa-Zihuatanejo

        Over the last few years, Zihuatanejo has spent considerable time and effort creating a phenomenal bicycle and walking path that connects Zihuatanejo to Ixtapa, two tourist destinations. At nearly 65 kilometers of trails, fitness enthusiasts can enjoy the ease of use on its paved deep red asphalt.

        Luis Pelayo (Poto) and his partner Julita Trzaska, the owners of Zihuatanejo Dive Center for the last 11 years, saw this as a business opportunity to expand into the rental of electric bikes, or e-bikes, and bring them to Ixtapa-Zihuatanejo.

    • Censorship/Free Speech

      • Brazil’s Fake News Legislation Moves Forward, Gets Slightly Better And Way Worse

        Taking a cue from the then Demagogue-in-Chief of the United States, Brazil’s government decided something must be done to control the spread of “fake news” to give the government more control of the narrative. “Fake news” continues to be a handy concept to abuse by governments seeking to limit their constituents’ ability to consume or create content. That was Donald Trump’s rationale as well, even if it was never articulated with any clarity or cohesiveness.

      • Trudeau must hit reset on censorship

        Rather than consulting Canadians and taking time to thoughtfully listen to the responses, former heritage minister Steven Guilbeault ignored critics and tried to rush through legislation that ultimately died on the order paper when Parliament dissolved for an election.

        Now, newly appointed Heritage Minister Pablo Rodriguez has a fresh Parliament and the government has an opportunity to change course. Rodriguez needs to listen to Canadians and rethink the government’s heavy-handed approach to internet regulation.

      • France: Municipality hides statues of the famous sculptor Volti, which stand near a mosque, because they depict naked women

        We researched and interviewed local residents who come into daily contact with this statue given to the town of Montereau by the great sculptor Volti. The work has been installed in Surville for a long time and symbolises the Seine and the Yonne.The testimonies collected are surprising, to say the least: “The statue has been covered for more than a month. We saw workers who were busy with it. They were just at work. We asked and they explained that some children had thrown stones at the artwork and it had been damaged, which is why it is now being restored,” says a resident who walks along the esplanade every day.

      • Creative Palestinian Arab terror – now into stifling free speech

        This latest outrage against Ambassador Hotovely was hardly the first time that a mob prevented an Israeli diplomat from speaking. In 2002, in Montreal, at Concordia University, former Prime Minister Bibi Netanyahu was similarly unable to speak; even with 100 police officers, the anti-Israeli, pro-Palestinian mob could not be contained or dispersed. (I wrote about this way back in 2003, in The New Anti-Semitism.) A good friend, a Talmudic scholar, and her rabbi-husband were caught up in the melee and beaten.

        Yes, beaten. Pummeled. Bruised.

      • Bangladesh: 17-year-old Hindu Girl in Jail for Over a Year for Allegedly Hurting Muslim Sentiments

        A 17-year-old Hindu girl, Dipti Rani Das, a resident of Dinajpur’s Parbatipur Upazila, has been in a jail in Bangladesh for over a year for allegedly insulting the Quran in a Facebook post. She has been denied bail 4 times.

        It is the same old story that has been done to death in the South Asian Islamic nation: a rumor begins spreading about a Hindu committing “blasphemy” and “hurting the Muslim feelings,” and the Hindu quickly finds himself or herself in hot water. The story of Dipti Rani Das is just one among hundreds of such cases, but it needs to be told and widely known, because a minor girl’s future is at stake. What’s worse? No one is talking about this.

    • Freedom of Information/Freedom of the Press

      • Justice For Julian Assange Is Justice For All

        Following the final High Court hearing to decide whether or not Julian Assange is to be extradited to the United States – for the ‘crime’ of revealing a landscape of government crimes and lies — John Pilger looks back on the decade Assange has been fighting for his freedom, and the implications for independent journalists and the very notion of justice.

      • Germany’s PEN Centre nominates Julian Assange as honorary member

        “We call upon the relevant authorities in England not to extradite our honorary member Julian Assange to the United States of America, where he faces up to 175 years in prison, but instead release him from prison immediately and unconditionally.”

        These words are part of a statement issued by the international writers group PEN Centre Germany on November 2, in which the organisation announced it had appointed the founder and spokesperson of WikiLeaks, Julian Assange, as an honorary member.

      • Assange, the movie: his father and brother expose the human behind public enemy No. 1

        Ithaka is a new film currently premiering at the Sydney Film Festival. Because Assange has been held incommunicado for almost two years, his father John Shipton and his brother Gabriel Shipton are compelled to speak for him. John talks, rather shyly, to camera while Gabriel produces. The film is their story; their Julian story, a very personal tale of a very public figure.

      • Last throw of the dice for Julian Assange

        During the extradition trial, the U.S. Government lawyers won all the legal arguments, save one, itself not strictly a matter of law — the threat of suicide.

      • Out of Sight, Out of Mind: Why All People Who Wish to Live Free Should Care About Julian Assange’s Plight

        And for a brief period, the establishment press devoured and leveraged the troves of data Wikileaks provided. Along the way they lauded themselves for their temporary virtue of speaking truth to power with industry awards and accolades. A decade later, these same organizations are no where to be found in coming to Assange’s rescue. They’ve been absorbed like the Borg by a predator class of technocratic billionaire oligarchs. If the U.S. Government succeeds at extraditing Assange (who is not even a U.S. citizen) under the guise of the Espionage Act of 1917, then the censorship and suppression of the free press worldwide will be a permanent fixture in our lifetime.

        The River Cities’ Reader has been publishing stories about Wikileaks and Julian Assange’s subsequent persecution for more than ten years. These include debunking Assange smears, summaries of the Afghanistan and Iraq War Logs and coverage proving no Wikileaks disclosures have ever put any U.S. government or personnel in harm’s way. See all the articles at RCReader.com/tags/assange.

        Yet as long as Assange remains imprisoned inside the maximum-security Belmarsh prison in London, his and the free press’ plight continues to be “out of sight, out of mind” for most Americans.

      • Car bomb targets two married journalists in Aden

        Reporters Without Borders (RSF) deplores the decline in the environment for media personnel in Aden, in southern Yemen, where a targeted car bomb attack this week killed a journalist and badly injured her husband, also a journalist. Yemen’s provisional capital, Aden is controlled by the Southern Transitional Council (STC).

      • His Reasons for Opposing Trump Were Biblical. Now a Top Christian Editor Is Out.

        At one level, Mr. Olasky’s departure is just another example of the American news media sinking deeper into polarization, as one more conservative news outlet, which had almost miraculously retained its independence, is conquered by Mr. Trump.

        It also marks the end of a remarkable era at a publication that has shaken evangelical churches and related institutions with its deeply reported articles. The far-right writer Dinesh D’Souza resigned in 2012 as president of the King’s College after World reported that he had attended a Christian conference with “a woman not his wife.” In 2020, World reported that several young women had complained that a North Carolina Republican running for Congress, Madison Cawthorn, had exhibited “sexually or verbally aggressive behavior toward them when they were teenagers.” At a time when hot takes get the clicks, these articles offered something old-fashioned and hard for any community to take: accountability reporting.

      • Kabul Bomb Blast Wounds Two As Islamic State Claims Responsibility For Earlier Explosion

        The Afghan Journalists’ Center said a well-known television journalist, Hamid Seighani, was killed in the November 13 blast in Dasht-e Barchi district. Seighani worked for the Ariana television network.

    • Civil Rights/Policing

      • Lawsuit Claims A Zoom Call Was Unlawful Imprisonment

        We’ve all spent more than our fair share of time on excessively long Zoom calls over the past two years of pandemic land. However, it’s difficult to believe that any Zoom call can reach the level of “unlawful imprisonment,” as is alleged in a recent lawsuit. Now, it should be noted that there is a tragic story behind this lawsuit — a man killed himself in front of his wife and children, after having a self-admitted breakdown following what he felt were accusations of criminal activity from his long-term employer. That said, the actual complaint from the grieving widow… seems unlikely to succeed in court.

      • Indigenous Leaders Hail Biden’s Proposed Chaco Canyon Drilling Ban as ‘Important First Step’

        A coalition of Southwestern Indigenous leaders on Monday applauded President Joe Biden and Interior Secretary Deb Haaland following the announcement of a proposed 20-year fossil fuel drilling ban around the sacred Chaco Canyon in northwestern New Mexico—even as the administration prepares to auction off tens of millions of acres in the Gulf of Mexico for oil and gas extraction later this week.

        “While there is still work to be done, these efforts to safeguard tribes and communities will be essential to protect the region from the disastrous effects of oil and gas development.”

      • Build Bikes, Not Walls: a Reflection on Open Borders

        On the sand, about 20 feet from the border wall, William had questions. Why couldn’t we talk to the people waving at us from the other side of the wall? Why was the wall even there? After I explained, he told me with decisively, “We’re going to smash the border wall.” Then, after a celebratory pause: “And after we smash the wall, we are going to turn it into bikes.”

        A few months later, I would think about what William had said and realize that his questions and defiance would become the soul of my next book, Build Bridges, Not Walls: A Journey to a World without Borders, published earlier this year.

      • Setting the Record Straight About Citizens’ Rights

        Our Constitution’s First Amendment not only guarantees freedom of speech but also guarantees citizens the right to sue the federal government for very good reasons. If someone throws a brick through a window, the police enforce the law. But when the federal government breaks the law, citizens are often the only “enforcers,” and they have to hire attorneys to represent them in court.

        When logging proposals fail to protect our land, water quality, and native wildlife as required by law, the Alliance for the Wild Rockies goes to court to force the federal agencies to follow the law. And because the Forest Service is a serial lawbreaker and our claims are valid, we win those court challenges about 80 percent of the time.

      • Homer Plessy, of Plessy v. Ferguson, Receives Posthumous Pardon From State Board
      • The Face of the New French Right

        “What progressives fail to understand is that the future is not ruled by economic curves but by demographic curves,” Éric Zemmour postulated, visibly nervous before the audience of conservative activists assembled at the September 2019 Convention of the Right in Paris.

      • “Blackness Itself Is the Crime”: Bishop William Barber on Racism in the Ahmaud Arbery Murder Trial

        We speak with Bishop William Barber of the Poor People’s Campaign, who was one of the Black pastors who visited the trial of the three white men who hunted down and shot dead Ahmaud Arbery, where last week a defense attorney claimed Black pastors sitting with the Arbery family in the courtroom could be “intimidating” for the jury, which is almost all white. Barber says Arbery’s killing and the trial proceedings expose that for many, “Blackness itself is the crime.” This Thursday, more than 100 Black pastors plan to march in front of the Glynn County Superior Courthouse. Barber joins us from Washington, D.C., where he is planning a protest call for Congress to pass the $2 trillion social spending and climate package known as the Build Back Better plan.

      • The Elders Rebuke ‘Historically Shameful Dereliction of Duty’ by World Leaders at Climate Summit

        An independent group of former leaders and human rights champions known as The Elders expressed concern Monday that humanity could be “on course for a 2.4°C world” in response to the paltry agreement reached by nearly 200 countries over the weekend at the COP26 climate summit.

        “While millions around the world are already in crisis, not enough leaders were in crisis mode.”

      • White People Explain Racism to Me

        Most days, I turn on my computer and ask the country if today is the day that white people will feel like holding a white man accountable for violence. Most days, the answer is “no.” We live in an age when the ubiquity of white violence is plain for all to see, thanks to the camera phone. When I’m not covering white domestic threats directed at people of color, I’m often covering state-sponsored terrorism against those same targets. When I’m not covering agents of the state behaving violently, I’m covering appellate and Supreme Court rulings, many of which will lead to more violence against people of color, women, or the LGBTQ community. And the whole time, I’m asking if anybody will be held accountable for the killings or beatings or the permissiveness that enables those killings and beatings.

      • Equity Concerns Lead to a Mass-Firing of Museum Volunteers

        Notwithstanding the ostensible beneficence of Stein’s bureaucratic jargon, its brutal meaning in plain English was that the existing docents, some of whom had worked at the museum for decades, were too white and too affluent to deserve continued employment. “Staff,” Stein enthused, “will design models for educator recruitment, training, and assessment, identifying and dismantling barriers that have historically limited participation.” The outgoing employees would therefore be replaced by a smaller but more diverse staff of professionals who would be paid $25 an hour. “All current volunteer educators,” Stein wrote, adding insult to injury as she ushered them through the exit, “are invited to apply for the paid museum educator positions” and would be provided with “complimentary memberships through 2023” as well as “exclusive access to two annual lectures presented at the museum.”

      • Group of women to sue Qatari authorities over invasive airport searches

        Women on 10 Qatar Airways flights from Doha, including 13 Australians, were subjected to the examinations late last year as authorities searched for the mother of a newborn found abandoned in an airport bathroom.

        The incident caused outrage, and fuelled concerns about Qatar’s treatment of women as the Gulf state prepares to receive thousands of foreign visitors for the 2022 football World Cup.

      • Man Bursts Into Flames After Being Tased by Police

        A New York man is in critical condition after dousing himself with hand sanitizer and being set ablaze when a police officer used a Taser on him, Albany’s Times-Union newspaper reports — a grisly incident that raises deep questions about law enforcement’s wielding of high tech weaponry against the public.

      • Twitter Vigilantes Are Hunting Down [Cryptocurrency] Scammers

        Gabagool is among an emerging breed of sleuths bent on spotting, tracking down, and exposing questionable practices in the budding DeFi world. Cryptocurrency is intended as electronic money that users can exchange anonymously and without intermediaries. But that anonymity comes with transparency: Cryptocurrency transactions are inscribed in an open digital ledger, the blockchain, which provides a record of how assets flow through the system. Companies such as Chainalysis and Elliptic have created software to aid law enforcement investigations into illicit activities involving cryptocurrency. In contrast, these new amateur detectives rely on their hunches and tips from others, use free tools to examine blockchain activity, and broadcast their findings from pseudonymous Twitter accounts like Gabagool, Zach, and Sisyphus. Gabagool says he noticed the questionable Ribbon activity while poring over Etherscan, a tool to keep track of blockchain transactions. He and other sleuths say they are animated by a penchant for investigative work, resentment, or frustration with the brazenness of some people in the space. They say they are trying to save DeFi from itself—by becoming its sheriffs.

    • Internet Policy/Net Neutrality

      • The Law Bytes Podcast, Episode 108: Scott Benzie on How Bill C-10 Ignored Canada’s Thriving Digital First Creators

        Pokimane Too, Watching PewDiePie’s Rewind

      • Federal Agencies Need to Be Staffed to Advance Broadband and Tech Competition

        The new infrastructure package gives the FCC and the NTIA a lot of new work to do, including deciding how to allocate a large amount of funds to update our lagging internet infrastructure. In the meantime, we are relying on the FTC to police bad acts on the part of technology companies of all levels. When the FCC under Ajit Pai repealed net neutrality protections, they and the ISPs claimed that the FTC could police any abuse—even though the FTC already has big jobs, like safeguarding user privacy and advancing tech sector competition.

        However, none of these agencies can do their jobs unless they are fully staffed. And that means that the Senate must confirm President Biden’s nominees. The consequences of sitting back are significant. These agencies have been given once-in-a-generation responsibilities. Senate leadership should commit itself to fully staffing each of these agencies before they leave for the holidays this December, so that the work on behalf of the public can begin. 

        Congress must act on four critical nominations at these agencies, by the end of the year, or the agenda for better internet will fall by the wayside. Jessica Rosenworcel should be confirmed to another term on the FCC, as its chair. Gigi Sohn should be nominated to a term on the FCC, as well. At the FTC, the Senate should confirm Prof. Alvaro Bedoya. And the NTIA’s work should be supported by confirming Biden’s nominee Alan Davidson. 

    • Monopolies

      • Patents

      • Trademarks

        • Hey North Face! Our Story About You Flipping Out Over ‘Hey Fuck Face’ Is Not Trademark Infringement

          The “brand protection” industry is endlessly fascinating to me, in that it seems to be a near total scam that preys on gullible big company execs who believe that if anyone uses their brand or logos in a way they don’t approve of, it’ll mean the end of the world. That’s not to say there aren’t legitimate “brand protection” steps that large companies need to take, but so much of it is overblown fluff and nonsense, and all of the various “brand protection” companies out there feel the need to justify whatever bizarrely lucrative contracts these giant companies hand out. So they completely overreact to the smallest of things — and the end result is not brand protection, so much as brand destruction for demonstrating just how over aggressive you are as a company.

        • Universal Music Sues Investment Platform Over Alleged Republic Records Trademark Infringement

          DMN obtained an exclusive copy of the straightforward action, which Universal Music Group just recently submitted to a New York federal court. According to the clear-cut filing, the Republic defendant formally announced (via a release) in early October that it would add a selection of music investments to its existing offerings.

      • Copyrights

        • The Hidden Costs of Requiring Accounts

          In a new paper published in Communication Research, I worked with Aaron Shaw provide an answer. We analyze data from “natural experiments” that occurred when 136 wikis on Fandom.com started requiring user accounts. Although we find strong evidence that the account requirements deterred low quality contributions, this came at a substantial (and usually hidden) cost: a much larger decrease in high quality contributions. Surprisingly, the cost includes “lost” contributions from community members who had accounts already, but whose activity appears to have been catalyzed by the (often low quality) contributions from those without accounts.

        • Why Songwriter Royalty Rates Won’t Be Changing Much — No Matter How Many Copyright Hearings Take Place

          The rate hearings for “streaming mechanicals” are in progress right now. As always, the proposals proffered by the streaming services and the National Music Publishers’ Association (NMPA), on behalf of publishers, are incomprehensible to anyone other than the lawyers and economists who are paid to prepare the lengthy filings that contain “expert” opinions about justifiable new rates.

          Achieving equitable streaming rates for recordings and songs is not a complex mathematical conundrum. It does not require convoluted price modeling. It is purely a business fight among private stakeholders. Yet, every five years, due to legacy US copyright laws that have not kept pace with technology, certain stakeholders are locked in rooms with copyright tribunals and forced to become gladiators on a royalty hamster wheel.

        • Copying is not theft

          Unauthorized copying is forbidden by copyright law in many circumstances (not all!), but being forbidden doesn’t make it wrong. In general, laws don’t define right and wrong. Laws, at their best, attempt to implement justice. If the laws (the implementation) don’t fit our ideas of right and wrong (the spec), the laws are what should change.

          People should have right to copy and share what they own. When you purchase something you should be able to do whatever you want with it and that means you should be able to copy it, share it, keep it secret, use it as you wish, burn or destroy it, or even throw it away without using it. If it’s yours, it should work as you wish, not as someone else says.

        • I Confess To Right-Clicker-Mentality

          Both Cory Doctorow and Matthew Gault and Jordan Pearson have fun with the latest meme about NFTs, “Right-Clicker-Mentality”. (Tip of the hat to Barry Ritholtz)

          Gault and Pearson explain the meme:

          what is the “right-clicker mentality”? Quite literally, it is referring to one’s ability to right-click on any image they see online to bring up a menu and select the “save” option in order to save a copy of the image to their device. In this term we have a microcosm of the entire philosophical debate surrounding NFTs.

        • What the Hell Is ‘Right-Clicker Mentality’?

          So, what is the “right-clicker mentality”? Quite literally, it is referring to one’s ability to right-click on any image they see online to bring up a menu and select the “save” option in order to save a copy of the image to their device. In this term we have a microcosm of the entire philosophical debate surrounding NFTs. NFTs, or non-fungible tokens, are unique tokens on the blockchain ostensibly representing a receipt of ownership pointing to some (usually) digital thing, like a JPEG hosted on a server somewhere. To be an NFT collector is to philosophically buy into the idea that owning this string of numbers means you “own” a JPEG that lesser people simply right-click to save on their machines at any time.

          Indeed, right-clicking initially emerged as trolling praxis as the NFT market took off in 2021, and the term “right-clicker” went viral in September: the comments under a post of someone showing off their new multimillion-dollar ape cartoon JPEG are reliably filled with people saving and reposting the image and claiming that, hey, they own it now too!

        • [Old] NFTs and Web Archiving

          One might have thought that academic journals were a relatively stable part of the Web, but research showed that their references decayed too, just somewhat less rapidly. A 2013 study found a half-life of 9.3 years. See my 2015 post The Evanescent Web.

          I expect you have noticed the latest outbreak of blockchain-enabled insanity, Non-Fungible Tokens (NFTs). Someone “paying $69M for a JPEG” or $560K for a New York Times column attracted a lot of attention. Follow me below the fold for the connection between NFTs, “link rot” and Web archiving.

        • UK Court Hands Down Suspended Jail Sentence to eBay Seller of Pirate IPTV Boxes

          A 57-year-old man who sold hundreds of pirate IPTV boxes through eBay in the UK has received a two-year suspended prison sentence. The prosecution, brought by Westminster City Council’s Trading Standards team with help from FACT, revealed that the Westminster resident generated more than £82,000 in proceeds over the years.

        • Applinked: Cyber Threat Researcher Reveals What’s Inside The Latest Update

          Applinked had a reputation as a trusted app but after being transferred to a third party, now finds itself labeled as a malicious tool after inexplicably growing in size. To find out once and for all what is going here, we asked an expert in cyber security threats to conduct a detailed analysis. In common with other vendors, he agrees that the app has the potential to conduct malicious activities.

        • Open Minds Podcast: Yana Buhrer Tavanier and Pavel Kounchev of Fine Acts

          On this episode, we’re joined by two guests, Yana Buhrer Tavanier and Pavel Kounchev, two of three co-founders of Fine Acts, a global creative studio that encourages experimentation and collaboration across disciplines to inspire social change. Fine Acts brings together multidisciplinary teams of artists, activists and technologists to prototype compelling works of art aligned with specific human rights campaigns. They publish all completed works on TheGreats.co, their free platform filled with socially engaged visual content, open to anyone to use or adapt non-commercially under CC licenses. 

        • Does Copyright Give Companies The Right To Search Your Home And Computer?

          One reason why copyright has become so important in the digital age is that it applies to the software that many of us use routinely on our smartphones, tablets and computers. In order to run those programs, you must have a license of some kind (unless the software is in the public domain, which rarely applies to modern code). The need for a license is why we must agree to terms and conditions when we install new software. On Twitter, Alvar C.H. Freude noticed something interesting in the software licence agreement for Capture One: “world-class tools for editing, organizing and working with photos” according to the Danish company that makes it (found via Wolfie Christl). The license begins by warning:

Brave Browser is Not a Platform for Extremists. The Southern Poverty Law Center is Way Off Base.

Posted in Deception, Free/Libre Software, FUD at 3:23 am by Guest Editorial Team

Guest post by Ryan, reprinted with permission from the original

Southern Poverty Law Center propaganda

Brave Browser is not a platform for extremists. The Southern Poverty Law Center is way off base.

When the SPLC listed the Brave Browser on its list of “applications that are used by extremists”, I nearly spit out my coffee.

It’s just a Web browser. It’s open source. (MPL 2 license, like Firefox, along with various others.) It does not promote a political ideology.

If anything, I think most of the people I’ve seen using it have a strong Libertarian bent.

Libertarians are not extremists, unless you mean extreme case of non-aggression.

Libertarians tend to view the world in a lens of non-interference and not manipulating others to go along with things by way of threats and perverse incentives.

Since the Republican and Democrat parties in the United States prefer to launch drone strikes all over the world and kill people, including our own citizens, and haven’t met a threat or free market manipulation/perversion they don’t like, it seems like they have to hurl accusations of “extremism” at Libertarians.

Nobody knows what the price of milk really is.

It’s subsidized, by you, no matter how much you actually consume.

Nobody knows what a Pfizer COVID shot really costs because the government negotiated to give several times as much of your money away to Pfizer as you would have paid if it was optional.

If you don’t take it, Biden wants you to lose your job. That’s a manipulation.

Few people know what the wars we enter into are about or how much it really costs their family, or how many Americans die pointlessly. The news is censored, and essentially an organ of state propaganda.

Libertarians don’t want the wars. Libertarians are “extreme”.

Libertarians generally don’t want there to be no government at all. We would like the government to have a low and flat rate of taxation that is fair, and less than what the average person pays now. We would like a system of policing, laws, and courts that protect people from violent crimes, rape, property damage, and uphold contracts. “Extreme!”

The whole point of big media and GAFAM/Big Tech is to spy on people and to mentally corrupt them and dumb them down so much that they are governable by the shitheads we have in DC and our state capitals and city halls. They operate by buying you off or clunking you over the head. That’s a “great” system. Anyone who opposes it must be “extreme”.

Libertarians don’t have to be “Climate Deniers”. There are market solutions to lower emissions. Quit subsidizing oil and stop making millions of people around Chicago get in their cars and drive for 20-30 minutes with the engine running to get their emissions sticker being just a couple. “Extreme!”

The far-left paints Libertarians as “far-right” to try to lump it in with the Republicans, who are also vicious psychopaths like the far-left, but Libertarians were the first party to support marriage equality in the United States, said all along that the drug war was ridiculous and the government was paying massive incarceration fees and losing tax revenue and destroying lives with little impact on crime, and says that people should be able to get all of the abortions they want with their own money. And we like immigrants who obey our laws and want to reduce the barriers to legal immigration, and protect them from violence. Clearly racist and horrible and extreme. In fact, I married one.

If people with an agenda want to attack Libertarians as extreme, don’t buy it! There’s nothing “extreme” about being a rational person. Well, I guess you could be extremely rational.

Anyway, I think that they get the idea that people who want to be left alone, and who say “to each their own” (the horrors), are very interested in Free and Open Source Software, encrypted messengers, Tor, and VPNs. They’re probably right.

The reason the fascist left and SJWs twitch so much about the idea of personal freedom is because it’s the last thing they want. To not be able to push you around and steal from you anymore. As such, anything that gives you personal freedom must be wiped off the face of the earth, like Free and Open Source Software and strong encryption.

Encryption is cheap (computationally).

I use several layers of it routinely (VPN, Tor, HTTPS, tox, E2E in Matrix, Secure IRC, etc…) on my Internet traffic just because I can. If it can confound even just some creepy ISP like Comcast or T-Mobile that wants to sell my browsing history, it’s worth something to me. If it prevents a security breach, it’s nice.

Who I talk to or what I talk about is only the business of me and my audience who I am speaking to.

I also think that SPLC may have an ax to grind with Brendan Eich personally over some money he donated to Prop 8 in California, which ultimately got struck down. That happened 13 years ago. People who live in the past and support Cancel Culture don’t impress me. Also, I’m gay. Not “extremely” gay. Just gay.

Let us also pay no mind to the fact that there are gay people working at Brave Software.

There may be some technical reasons to criticize Brave, but that’s outside the scope of this post.

And for the most part, I agree with what they’re trying to do. They’re taking a very bad platform, Chromium, and trying to defang it of APIs dumped in by Big Tech companies in order to spy on you, and they’re trying to put in features that protect you from surveillance capitalism.

Mozilla, on the other hand, is a party styling itself as “Social Justice Warriors” who have done nothing for your freedoms and online safety lately. They fell so hard, so far, and so fast in the last 7 years, that they’re all but unrecognizable at this point in those terms.

Free and Open Source Software should appeal to Libertarians. It’s not Communism, as Microsoft tried to frame it.

If anything, Microsoft is a Communist company. They get state bailouts and Five Year Government Plans to buy failed products like HoloLens. They bribe elected officials, and then Microsoft gets government contracts. The FBI got “hacked” the other day, and their email system was used to send scam emails out.

The US government is incompetent with cybersecurity, yet issues directives, even as the FBI can’t even protect its own networks because the government buys Microsoft products.

Free and Open Source Software is something that people are paid what they think is a fair amount of money to work on, and so they do it. Or they might be a hobbyist. Most are paid though.

Their employer makes money selling products or services based on it, and then we can benefit from it too. Debian is an organization that people voluntarily fund which produces a coherent GNU/Linux operating system based on FOSS.

Proprietary software tends to be unloved software. People who produce it keep it proprietary to avoid having to compete with others. They have a right to attempt this, it’s not illegal, but people should know that it almost always does something wrong to them.

Being proprietary by itself hides how the program works, and that helps obscure the further wrongs and harm it commits. For example, Windows Telemetry only gives you a vague idea of what it transmits to Microsoft. They use strong encryption to prevent you from seeing what’s really in those compressed archives. What’s in there?

Without even being able to know, people jump in and defend it. Think it’s sketchy? “EXTREMIST!” “PARANOID!”

What Microsoft _admits_ their Edge browser sends back to them is enough reason not to use it. What people have found it doing by digging a little deeper is even worse, but it too can hide the true extent of the snooping.

Aside from backdoors that proprietary software hides, the software also tends to be incredibly bloated. Windows has dozens of GB of crap in it that is mostly legacy junk, where security holes can lurk. The US government (among others) finds them and hoards them and then weaponizes them.

The Flame and Stuxnet malware were pieces of art. They evaded all antivirus solutions on the market for years, infested lots of systems, and then when Iran chose to run Windows in their uranium enrichment center, President Obama ordered a strike.

The United States didn’t need to send bombers. It just needed to push a button, and state malware for Windows, laying dormant, sleeping, for years, woke up, and spun the centrifuges too fast, and broke 94% of them beyond repair.

Many faults in the underlying OS end up propagating into the programs that run on it. Web browsers deal with Web sites. Web sites can run anything you’re not blocking. Almost every release of Firefox mentions some CVEs that only affect Windows. These are inherited from the OS, and since nobody but Microsoft can fix the OS, or sometimes it was designed wrong and can’t be fixed, the solution is usually a hack to hopefully block the exploit, but it only protects the program that was patched to avoid triggering the OS bug.

Content Blocking lists have to be updated frequently to keep up with new threats. It turns out that the US Intelligence Agencies run ad blockers to lower attack surface. Not just “malvertising”. Companies can gather data just by placing bids.

During the COVID lockdown, various government agencies in the United States monitored whether people were complying with it or not by bidding on and/or buying data collected by advertisers through Web sites and mobile ad networks.

I use Tracker Control on my Android phone. I went through disabling or uninstalling most of the crap I found from Samsung. They even include a Facebook “Service” you can’t remove which monitors the apps you sign into, even if you don’t have Facebook on your phone, and associates it with your Facebook profile. I deleted the data and disabled that. But that’s what lurks in your Android phone. Not all of the crapware can be turned off, but Tracker Control can block tracker libraries from phoning home, and I pulled the plug on Internet access from all apps I don’t use, and most apps I use are also from the F-Droid store.

The situation on iPhones is worse, because you can’t run Free and Open Source Software, and very nearly all apps in the App Store have Apple and Google trackers in them.

On top of this, Apple plans to add a scanner that goes looking through your phone and reporting in. They claim anyone who objects is probably a “pedophile”. Such a system can and will be used for other things. China will use it to hunt people down for having pro-democracy protests. Muslim states will behead gay people who Apple turned over for the right to keep selling products there.

The government also paid Facebook to help them locate undocumented immigrants. It has geolocation data. They collect it every time they damned well please if you have it on your phone. You’re walking around telling Facebook everywhere you are, even when it’s not open.

The government may or may not have legal grounds to get a warrant, but it hardly needs to. It’s spending your money to buy your data so you can help get yourself arrested, deported, ratted out for being outside during COVID “emergency” powers that Illinois Governor Pritzker keeps giving to himself.

If you want to avoid this, or even limit the harm, you’re an “extremist”.

So, really, the Southern Poverty Law Center needs to shut the hell up. They aren’t helping. There’s really not much of a way that “software” and platforms usually have an extremist agenda. Extremists might _use_ software and platforms. But extremists/terrorists, whatever those are, use Windows, Macs, Android Phones, iPhones….

Almost all of the government’s criminal cases involving January 6th rioters involved Facebook and Twitter somehow. We know that now. But at the time, they told us it was Parler’s fault for not taking the posts down, when actually it was almost all being coordinated on Facebook, which left the posts up.

The far-left pushed to have Parler taken down. They got it booted out of Big Tech app stores, Amazon Web Services deplatformed it… They had to end up being hosted by some company that hardly takes anything down, and then the agitators made hay about that!

And Parler was actually not even close to being the source of the problem, of course narratives get changed around and people are easy to mislead with Big Media on the side of the state and the billionaires.

To clarify, I am not on Parler and I am not planning to be. I don’t accept their Terms of Use. But this example shows what Big Tech and their state allies will go through to maintain hegemony for PRISM companies.

The Southern Poverty Law Center is very obviously some sort of Democrat think tank that would love for you to police your kids for them, unwittingly.

I’m not against parents trying to protect their children, but there are other dangers out there than Internet perverts. Proprietary software is an injustice and Social Control Media platforms that turn people into the product are big problems, indeed.

If you want to block something at the firewall level, block Facebook because FACEBOOK the company is evil.

Quit using Google search. Quit using Skype and Zoom. Replace applications and operating system software with Free and Open Source software.

Use social platforms that are really social, not open sewers.

Encryption, VPNs, and Tor are your friend. They’re tools to block surveillance.

There’s a saying that it’s a poor craftsman who blames his tools. I would go further and say it’s probably a poor parent who blames Brave, the Web browser.

Children are human beings too, and I think that what horrifies parents is that they won’t turn out carbon copies of themselves if their kids are exposed to a marketplace of ideas.

Most parents unfortunately succeed, and turn out children who are narcissistic, self-centered, one-dimensional, and materialistic mindless consumers. That serves….the state. It really does. They’re happy with things exactly like they are right now.

I think it’s pretty extreme to destroy the human experience to create more wards of the state, who keep toiling away in the fields, and get to enjoy very little in the way of reward for their own labors.

Paying taxes to a central government that’s thousands of miles away and does almost nothing to help them.

Most people under 50 barely know it, but those taxes include a Social Security program that’s got about 10 years left, maybe, before everyone on it gets a 23% benefit cut, and the folks who draw it in retirement now can’t even live off of it.

I think that they should be allowed to save and invest for themselves. They could even leave it to someone if they pass away. My Aunt paid into it for decades, died in a car accident, and they paid nothing.

The program’s “trust funds” which are actually imaginary promissory notes, earn 2-3% interest on “special” government bonds.

The stock market’s average return is over 10% per year.

Am I an “extremist”?

Maybe to some. I mean, the state, the rich, they want people broke all the time. They want people distracted with porn, booze, drugs, and fights with the neighbors. We live in a country that entertains itself by watching the police invade the wrong house and attack people.

I think that’s extreme.

And again, all the fault of the Brave Web browser. After all, the Southern Poverty Law Center produced a white-paper and briefed a bunch of Congress Critters who are all rich and don’t have to live in the world they create for us. Very compelling.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts