In Picture: In December, Microsoft’s Windows Market Share Continues to Decrease in Spite of Paid-For Vista 11 Hype

Posted in Deception, Microsoft, Windows at 9:04 pm by Dr. Roy Schestowitz

October: In Picture: After Billions Spent on Marketing, With Vista 11 Hype and Vapourware, No Real Gains for Windows | November: Must be Terrifying to Microsoft: After the Release of Vista 11 the Market Share of Windows Still Goes Down

Windows decline

Summary: Contrary to what Microsoft’s paid-for lies say, Windows saw no rebound after Microsoft had spent billions on mindless marketing and Windows doesn’t have anywhere near 90% or more of the market (not even in desktops/laptops alone; it’s an outdated myth Microsoft pays the media to perpetuate)

[Meme] [Teaser] Can’t Say “No” to Munich’s Battistelli

Posted in Deception, Europe, Patents at 7:27 pm by Dr. Roy Schestowitz

Jérôme Debrulle and Battistelli

Jérôme Debrulle: Sir, the EPO has tanked

BELGIUM IS NEUTRAL; Jérôme Debrulle: Go for it!

Summary: Jérôme Debrulle, an instrumental liar in Team UPC, was unable or unwilling to resist his master, Benoît Battistelli, who allegedly wanted to be “king” of UPC (a project designed to economically destory Europe for the benefit of law firms which had crafted UPC behind closed doors)

The EPO’s Overseer/Overseen Collusion — Part XXXI: The Abstentionists

Posted in Europe, Patents at 6:53 pm by Dr. Roy Schestowitz

Series parts:

  1. The EPO’s Overseer/Overseen Collusion — Part I: Let the Sunshine In!
  2. The EPO’s Overseer/Overseen Collusion — Part II: A “Unanimous” Endorsement?
  3. The EPO’s Overseer/Overseen Collusion — Part III: Three Missing Votes
  4. The EPO’s Overseer/Overseen Collusion — Part IV: The Founding States
  5. The EPO’s Overseer/Overseen Collusion — Part V: Germany Says “Ja”
  6. The EPO’s Overseer/Overseen Collusion — Part VI: A Distinct Lack of Dutch Courage
  7. The EPO’s Overseer/Overseen Collusion — Part VII: Luxembourgish Laxity
  8. The EPO’s Overseer/Overseen Collusion — Part VIII: Perfidious Albion and Pusillanimous Hibernia
  9. The EPO’s Overseer/Overseen Collusion — Part IX: More Holes Than Swiss Cheese
  10. The EPO’s Overseer/Overseen Collusion — Part X: Introducing the Controversial Christian Bock
  11. The EPO’s Overseer/Overseen Collusion — Part XI: “General Bock” – Battistelli’s Swiss Apprentice?
  12. The EPO’s Overseer/Overseen Collusion — Part XII: The French Connection
  13. The EPO’s Overseer/Overseen Collusion — Part XIII: Battistelli’s Iberian Facilitators – Spain
  14. The EPO’s Overseer/Overseen Collusion — Part XIV: Battistelli’s Iberian Facilitators – Portugal
  15. The EPO’s Overseer/Overseen Collusion — Part XV: Et Tu Felix Austria…
  16. The EPO’s Overseer/Overseen Collusion — Part XVI: The Demise of the Austrian Double-Dipper
  17. The EPO’s Overseer/Overseen Collusion — Part XVII: The Non-Monolithic Nordic Bloc
  18. The EPO’s Overseer/Overseen Collusion — Part XVIII: Helsinki’s Accord
  19. The EPO’s Overseer/Overseen Collusion — Part IXX: The Baltic States
  20. The EPO’s Overseer/Overseen Collusion — Part XX: The Visegrád Group
  21. The EPO’s Overseer/Overseen Collusion — Part XXI: The Balkan League – The Doyen and His “Protégée”
  22. The EPO’s Overseer/Overseen Collusion — Part XXII: The Balkan League – North Macedonia and Albania
  23. The EPO’s Overseer/Overseen Collusion — Part XXIII: The Balkan League – Bulgaria
  24. The EPO’s Overseer/Overseen Collusion — Part XXIV: The Balkan League – Romania
  25. The EPO’s Overseer/Overseen Collusion — Part XXV: The Balkan League – Fresh Blood or Same Old, Same Old?
  26. The EPO’s Overseer/Overseen Collusion — Part XXVI: A Trojan Horse on the Budget and Finance Committee
  27. The EPO’s Overseer/Overseen Collusion — Part XXVII: Cypriot Complicity
  28. The EPO’s Overseer/Overseen Collusion — Part XXVIII: Benoît and António’s Loyal “Habibi”
  29. The EPO’s Overseer/Overseen Collusion — Part IXXX: The EPOnian Micro-States – Monaco and Malta
  30. The EPO’s Overseer/Overseen Collusion — Part XXX: San Marino and the Perfidious Betrayal of Liberty
  31. YOU ARE HERE ☞ The Abstentionists

EPO Abstentionists
Record of the Administrative Council vote on the adoption of Battistelli‘s “Strike Regulations”.

Summary: Today — or tonight — we finally resume our long series which investigates National Patent Offices (NPOs) that voted on illegal proposals over the past decade or so

In the earlier parts of this series the focus was on the 28 delegations that voted in favour of Battistelli’s “Strike Regulations”.

In this part, we turn our attention to the small number of delegations that withheld their support from the manifestly unlawful proposal submitted to the Administrative Council by the EPO President for adoption in June 2013.

“It does happen on occasions that votes are cast against a proposal from the Office President but it’s a relatively rare occurrence. The more usual course of action for delegates who have reservations about a proposal is to abstain.”In the “Bizarro” world of EPOnia, the national delegates on the organisation’s governing body are remarkably slow to vote against measures proposed by the EPO President, no matter how flawed and misguided these may be. This is apparently due to the obscure unwritten rules of “diplomatic protocol” which determine how business is conducted in international intergovernmental organisations like the EPO.

“…not a single delegation actually had sufficient integrity and moral courage to vote against Battistelli’s “Strike Regulations”.”It does happen on occasions that votes are cast against a proposal from the Office President but it’s a relatively rare occurrence. The more usual course of action for delegates who have reservations about a proposal is to abstain.

An abstention is a mild expression of disapproval. Basically, it’s intended to signal that a delegation is unhappy with a proposal but doesn’t want to rock the boat too much.

As we already noted, not a single delegation actually had sufficient integrity and moral courage to vote against Battistelli’s “Strike Regulations”.

However, a total of seven delegations withheld their support by abstaining, namely: Belgium, Italy, Norway, Serbia, Slovakia, Slovenia and Sweden.

“In the next part we will begin with the delegation representing Belgium, the only one of the Benelux states that refrained from endorsing Battistelli’s liberticidal proposal.”Because Article 35 (4) of the European Patent Convention specifies that abstentions “shall not be considered as votes”, Battistelli could claim quite truthfully that his patently unlawful “Strike Regulations” had been endorsed "unanimously" by the Administrative Council.

In the upcoming parts we will take a closer look at the delegations that withheld their support from Battistelli’s “Strike Regulations”. In the next part we will begin with the delegation representing Belgium, the only one of the Benelux states that refrained from endorsing Battistelli’s liberticidal proposal.

Links 10/12/2021: Wine 7.0 RC1 and PHP 7.3 ‘Dead’

Posted in News Roundup at 5:51 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Kubernetes 1.23: Kubernetes In-Tree to CSI Volume Migration Status Update

        The Kubernetes in-tree storage plugin to Container Storage Interface (CSI) migration infrastructure has already been beta since v1.17. CSI migration was introduced as alpha in Kubernetes v1.14.

        Since then, SIG Storage and other Kubernetes special interest groups are working to ensure feature stability and compatibility in preparation for GA. This article is intended to give a status update to the feature as well as changes between Kubernetes 1.17 and 1.23. In addition, I will also cover the future roadmap for the CSI migration feature GA for each storage plugin.

    • Audiocasts/Shows

    • Kernel Space

      • Developers Call On Intel To Open-Source PSE Firmware As Their Newest Binary Headache – Phoronix

        With Intel’s Atom x6000E “Elkhart Lake” SoCs there is a new block called the Programmable Services Engine (PSE) that is an Arm Cortex-M7 companion core that handles various tasks. Unfortunately, with the PSE it means a new binary-only firmware module. With the Programmable Services Engine likely to come with future Intel platforms too, Coreboot developers and open-source enthusiasts are calling on Intel to now open-source this firmware to avoid having this extra binary blob and further complicating future open-source firmware efforts.

        The Programmable Services Engine can be used for embedded controller (EC) functionality, sensor handling, network proxy, remote management, and other in-band and out-of-band device management tasks. Elkhart Lake is the first generation featuring the PSE.

      • Linux 5.17 Intel Graphics Driver Update Fixes Hangs, More Discrete vRAM Preparations – Phoronix

        Sent to DRM-Next this week for queuing until the Linux 5.17 merge window in January is the latest batch of drm-intel-gt-next updates, which has hang fixes and more preparations for Intel discrete graphics.

        There is already some Intel kernel graphics driver code that is queued for Linux 5.17, most notably including VRR support for Ice Lake. This week’s drm-intel-gt-next has more notable changes for Intel’s open-source driver that continues growing a lot for supporting their discrete graphics plans.

      • Graphics Stack

        • AMD Adds Further Zen 4 CPU Support In Linux Patches, Enables RDDR5 & LRDDR5 For EPYC CPU With Up To 12-Channels

          AMD is rolling out the first enablement patches of their next-generation EPYC Zen 4 CPUs and the new features incorporated within them for the Linux OS.

        • AMDVLK 2021.Q4.2 Released With Dynamic Rendering, Other New Extensions – Phoronix

          It’s been over one month since the release of AMDVLK 2021.Q4.1 as the latest open-source AMD Vulkan driver update, which is off the wagon compared to the prior weekly/bi-weekly release cadence. But today thankfully it’s been succeeded by AMDVLK 2021.Q4.2 as the newest driver release.

          Since early November when the last AMDVLK open-source driver release occurred, AMDVLK has been seeing new activity to primarily keep up with the new Vulkan API extensions being introduced upstream. Most notable with AMDVLK 2021.Q4.2 is supporting Vulkan’s new dynamic rendering support. Mesa’s RADV (and Intel’s ANV) have already been working on their dynamic rendering support too and NVIDIA has offered VK_KHR_dynamic_rendering in their beta driver since last month.

        • Linux Community Updates 20 Year Old AMD GPU Driver

          Back in 2002, if you were a hip PC gamer you were probably playing Grand Theft Auto Vice City on your brand new ATI Radeon R300 graphics card and listening to Avril Lavigne’s “Sk8r Boi.” Now that sk8r boi is probably a sk8r grandpa, the R300 is getting a new driver with a long-awaited bug fix.

          According to Phoronix, the ATI Radeon R300, R400, and R500 graphics cards are getting a new open-source graphics driver under Linux that will breathe extra life into these near 20-year-old GPUs. The new open-source driver is made by developer Emma Anholt, and is designed to give these GPUs the ability to request NIR shaders from the Mesa 3D graphics library’s state tracker and use the NIR to TGSI path.

          NIR is an optimizing compiler stack that sits at the core of driver shader compilers from Mesa. Basically, it’s an optimization layer that tries to reduce the amount of work a GPU has to do when running 3D applications.

    • Benchmarks

      • Benchmarks: FreeBSD 13 vs. NetBSD 9.2 vs. OpenBSD 7 vs. DragonFlyBSD 6 vs. Linux

        It’s been a while since last having a hearty BSD benchmark comparison on Phoronix in part due to the latest hardware platforms generally lagging behind with how well supported they are by the various BSDs. But stemming from a Phoronix Premium supporter recently requesting some fresh BSD benchmarks, here is a look at how DragonFlyBSD 6.0.1, FreeBSD 13.0, NetBSD 9.2, and OpenBSD 7.0 are competing against various Linux distributions like CentOS, Clear Linux, and Ubuntu.

        To make this large BSD vs. Linux benchmark comparison possible, an Intel Core i9 10980XE “Cascade Lake X” workstation was used for testing as it is mature and worked well across all of the BSDs tested. There were not any issues with any of the BSDs tested from the onboard networking to storage and all other key functionality being in place. Intel hardware generally leads when it comes to newer platforms working well on the major BSDs while the AMD hardware support has been improving and AArch64 servers are also making progress on the major BSDs.

    • Applications

      • Liferea Feed Reader Can Now Convert TinyTinyRSS Sources to Local Subscriptions | UbuntuHandbook

        Liferea feed reader and news aggregator released version 1.13.7 a few days ago as the latest development release.

        Liferea is a GTK+3 news reader with an embedded web browser. It supports for reading articles offline, force fetch full article text using HTML5 extraction, and subscribing to HTML5 websites that do not even have a feed.

        It may also permanently save headlines in news bins, and supports for synchronizing with “TinyTinyRSS”, “TheOldReader”, and “Reedah”.

        The 1.13.7 release continues working on the ‘Reader mode’. User now can toggle on/off Reader mode by right-clicking on lower right HTML view area via context menu option. And, it now allows to convert TinyTinyRSS subscriptions to local scriptions.

    • Instructionals/Technical

      • How to migrate from CentOS 8 to Rocky Linux (conversion) – nixCraft

        I already wrote about migrating from CentOS 8 to CentOS Stream. Now, I am migrating Linode VM from CentOS 8 to Rocky Linux 8. The server runs a very simple workload that includes PHP 8.1, MariaDB server and Nginx, and SELinux and firewalld.

      • How to install Apache NetBeans 12.6 on Ubuntu 21.10 –

        In this tutorial, we are going to explore how to install Apache Netbeans 12.6 on Ubuntu 20.04.

        NetBeans is an integrated development environment for java. Netbeans allows the development of applications from a set of modular software components called modules. NetBeans is part of the wider Apache family license that is why it is called Apache NetBeans.

      • How to create an RDS Instance using Python Boto3 on AWS

        In this article, we will see how to create an RDS MySql Instance using the Boto3 Library. We will use “create_db_instance” method to create an Instance.

        Before we proceed, I assume that you are familiar with AWS RDS Service. If you are not familiar with it and what to first learn to create an RDS MySql Instance from the AWS Console, search for “How to setup an RDS MySql (Relation Database MySql ) instance on AWS?”.

      • How to Install Vivaldi on Linux

        Vivaldi is a cross-platform web browser that’s become increasingly popular among users who liked Opera before its Chromification.

        Although it, too, is based on Chromium, its minimalistic user interface and features such as tab stacking and tiling, built-in ad blocker and trackers, custom themes, quick commands, etc., give it an edge over the likes of Chrome, Edge, and Brave.

        If you’re on Linux and keen to try out Vivaldi to see what the hype is about, here’s a guide with instructions to help you out in the process.

      • How to Install LibreNMS Monitoring Tool on Debian 11

        LibreNMS is a free, open-source, web-based, and auto-discovering network monitoring tool written in PHP. It uses MySQL or MariaDB as a database backend and uses SNMP to discover the remote clients. It supports a wide range of network devices including, Linux, Cisco, Juniper, FreeBSD, HP, Windows, and more. It supports multiple authentication methods including, Radius, Active Directory, LDAP, MySQL, and more. It is simple, user-friendly, and easy for anyone to understand and use.

        In this tutorial, I will explain how to install LibreNMS with Nginx on Debian 11.

      • How To Install Nmap on Debian 11 – idroot

        In this tutorial, we will show you how to install Nmap on Debian 11. For those of you who didn’t know, Network Mapper (Nmap) is a free, open-source network security scanning tool. Nmap works by sending data packets on a specific target (by IP) and the incoming packets will be interpreted to determine what ports are open/closed, what services are running on the scanned system, whether firewalls or filters are set up and enabled, and finally what operating system is running.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Nmap network discovery and security auditing on a Debian 11 (Bullseye).

      • Kubernetes Architecture – NextGenTips

        In this tutorial, I will walk you through Kubernetes architecture, control plane, and worker node components.

        Control plane makes global decisions i.e scheduling tasks and also maintains cluster details in an etcd component.

      • How to Find and Create Git .gitignore File Templates – buildVirtual

        This is a quick article to share a couple of ways in which you can quickly find and create .gitignore files for which ever technology or language you are working with.

      • How to Install VMware on Linux and Create Your First Virtual Machine

        A virtual machine allows you to run a second, fully functional system within your existing environment. Your computer becomes what is known as a host system. Then, any virtual machine you set up will be a guest system.

        One of the best software solutions for creating virtual machines on Linux is VMware. It is free for non-commercial use and surprisingly easy to install and set up. Following is a quick walkthrough that will show you how to install VMware Player on your Linux workstation and create your first virtual machine.

      • How to install Blender 3.0 on a Chromebook

        Today we are looking at how to install Blender 3.0 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

        This tutorial will only work on Chromebooks with an Intel or AMD CPU (with Linux Apps Support) and not those with an ARM64 architecture CPU.

      • How To Install Docker on Fedora 35 – idroot

        In this tutorial, we will show you how to install Docker on Fedora 35. For those of you who didn’t know, Docker is a container-based application framework, which wraps up a specific application with all its dependencies in a container. Containers are usually isolated from one another and bundled their own software libraries and configuration files, they can communicate with each other through well-defined channels.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Docker Community Edition (CE) on a Fedora 35.

      • Bash Select Command (Create Menu in Shell Scripts) – TecAdmin

        Bash Select construct is used to create a numbered menu from the list of items.

      • How to install PipeWire on Ubuntu Linux

        The purpose of this tutorial is to install PipeWire on Ubuntu Linux. PipeWire is a sound server that can handle playback and capturing of audio and video streams. It is a worthy replacement to other multimedia frameworks such as PulseAudio, which is the default on Ubuntu, and others.

        PipeWire was developed by Wim Taymans at Red Hat, and aims to provide better handling of audio and video for Linux systems. It does so by providing lower lantency than other sound servers and also has a superior processing engine. The official site is pipewire.org. Another use case for installing PipeWire is if you are having audio compatibility problems on Ubuntu, such as your Bluetooth device not working.

        In this tutorial, we will cover the step by step instructions to install PipeWire on Ubuntu Linux. You will also see how to use PipeWire as your main sound server on Ubuntu, which replaces PulseAudio. We will also show how to revert the changes, in case you decide that PipeWire is not for you and you want to restore to system defaults.

      • Install VNC Server on Ubuntu 20.04 | 18.04 LTS to access GNOME

        In this tutorial, we will learn the commands to install a VNC server on Ubuntu 20.04 LTS Focal or Ubuntu 18.04 Bionic using the terminal to access Gnome Linux graphic user interface, remotely.

      • How to install KDE Plasma on Debian 11 Bullseye Linux – Linux Shout

        KDE is currently available in version 5.20 while doing this tutorial. The main focus of this Linux desktop environment is on providing wide range of customization options. Here we will see the commands to install KDE Plasma’s latest and testing desktop version on Debian 11 Bullseye server or desktop using the terminal.

        Users who have used Windows will defnatley find KDE desktop environment on their Linux quite familiar. KDE is popular becuase of its beautiful interface, sleek icons and lots of tools and apps developed by KDE community. Further, if one doesn’t like the arrangements of elements then he or she can position the Widgets, Taskbar and almost every element to get the look and feel he/she wants. However, the variety of options can make inexperienced users quickly overwhelmed. Hence, you might have to invest time to become aware and comfortable with it.

      • » GNU Linux Debian 11 (bullseye) – example for https enabled /etc/apt/sources.list (including contrib and non-free) | dwaves.de

        this is a sample-example apt sources.list, because the perfect sources.list it is science for itself

        (this is not an perfect sources.list but one that was tested and works)

        right now not including non-free would mean lenovo laptop users can use LAN but not WIFI.

      • How To Install Docker on Fedora 35 – idroot

        In this tutorial, we will show you how to install Docker on Fedora 35. For those of you who didn’t know, Docker is a container-based application framework, which wraps up a specific application with all its dependencies in a container. Containers are usually isolated from one another and bundled their own software libraries and configuration files, they can communicate with each other through well-defined channels.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Docker Community Edition (CE) on a Fedora 35.

      • How to Install / Enable RPM Fusion on AlmaLinux 8 – LinuxCapable

        RPM Fusion is a repository of add-on packages for Rhel-type distributions and EL+EPEL that a group of community volunteers maintains. RPM Fusion is not a standalone repository but an extension of Almalinux’s default packages that could not be included due to AlmaLinux being bound by the same legal restrictions as Red Hat.

        The RPM Fusion repository comes in two flavors, Free and Non-Free. The free repository contains a free version of the software that is open source and non-free, which have mostly almost all free software but are closed source and mainly proprietary.

        In the following tutorial, you will learn how to install RPM Fusion on your AlmaLinux 8 distribution.

      • How to Install balenaEtcher on Fedora 35 – LinuxCapable

        balenaEtcher is a free and open-source flashing utility tool famous for writing image files such as .iso and .img files and zipped folders onto storage media to create live SD cards and USB flash drives. balenaEtcher has cross-platform support on Linux, BSD, macOS, and Windows and is developed by balena and licensed under Apache License 2.0.

        In the following tutorial, you will learn how to install baelnaEtcher on Fedora 35 and create a Linux distribution boot disk.

      • Getting Started With DataStax Astra DB – OSTechNix

        In this tutorial, we are going to learn about DataStax Astra DB, how to create a database with Astra DB, how to load sample data to the database and finally how to connect the databases.

        Before getting started with Astra DB, let me give you a brief introduction to Astra DB.

      • Ubuntu 22.04 kernel version

        Ubuntu 22.04 Jammy Jellyfish Linux, the latest long term support release from Canonical, is due to come out on April 21, 2022. As with all new LTS versions of Ubuntu, it will have a newer kernel version from other past releases of Ubuntu.

        In this tutorial, we will discuss the kernel of Ubuntu 22.04, and show you how to check the kernel version on your own system. You will also see how to upgrade or downgrade the kernel version in Ubuntu.

      • Ubuntu 22.04 network configuration

        Canonical prides itself on making their Ubuntu 22.04 Jammy Jellyfish Linux operating system very simple to use, even if you do not have a lot of technical knowledge. Despite its simplicity, Ubuntu has a lot going on under the hood to make things work, including networking configuration that allows you to connect to local devices or servers across the world.

        Although Ubuntu and its networking settings should normally, and ideally, work without a hitch, there may come a time where you need to roll up your sleeves and do some tinkering to get things sorted out. Or, maybe you’re just curious about various network configuration on the system.

        In this tutorial, we will show you how to get started with network configuration on Ubuntu 22.04 Jammy Jellyfish. This can include simple tasks like viewing your system’s IP address, to more complex things like restarting your networking service, which may come in handy when troubleshooting network issues. Read on to start learning about network configuration on Ubuntu 22.04.

      • Film compositing on Linux with Natron | Opensource.com

        In film post-production, there’s a phase called compositing, which puts the actual footage in a camera with footage generated purely by software. What that actually means to the compositing artist depends on the movie. Sometimes there are just a few overlays, other times there’s some minor special effect like laser beams or explosions, sometimes it’s a green screen, and still other times it’s a little bit of everything. Most video editing applications can do basic compositing. Still, when your entire job is to bring different components together and make it look like they were in front of the camera in real life at the time of the shooting, you need a dedicated application with some very specific tooling. Happily, the film industry does a lot more with open source and cross-studio collaboration than you might expect, and so some of the best tools to process digital images (including OpenColorIO, OpenEXR, OpenFX, and more) have become ubiquitous. The compositing application Natron takes advantage of this open technology, plus the time-honored interface models of “noodles and nodes,” to bring professional compositing to open source software users.

        Compositing is a big and complex job, but this article introduces you to the basics of what you need to know about the interface of Natron and some basic principles of compositing. After reading this, you won’t be a pro, but you’ll know where to begin.

    • Wine or Emulation

      • WineHQ – Wine Announcement – The Wine development release 7.0-rc1 is now available.
        The Wine development release 7.0-rc1 is now available.
        This is the first release candidate for the upcoming Wine 7.0. It
        marks the beginning of the yearly code freeze period. Please give this
        release a good testing and report any issue that you find, to help us
        make 7.0 as good as possible.
        What's new in this release (see below for details):
          - Reimplementation of the WinMM joystick driver.
          - All Unix libraries converted to the syscall-based interface.
          - Various bug fixes.
        The source is available from the following locations:
        Binary packages for various distributions will be available from:
        You will find documentation on https://www.winehq.org/documentation
        You can also get the current source directly from the git
        repository. Check https://www.winehq.org/git for details.
        Wine is available thanks to the work of many people. See the file
        AUTHORS in the distribution for the complete list.
      • Wine 7.0-rc1 Released With Last Minute Changes – Phoronix

        Following last week’s Wine 6.23 development release, Wine 7.0-rc1 was just declared in marking the end of feature development and beginning preparations for issuing Wine 7.0.0 stable in January.

        Per the Wine 7.0 release planning, Wine 7.0-rc1 was issued today to mark the feature freeze and begin what will be weekly release candidates. Those weekly release candidates will continue until Wine 7.0 is determined to be ready to officially released. Current plans and what has happened in prior years with the same annual release cadence means that stable release should be out sometime in January.

      • Wayland driver development – December 2021 update and next steps
        Hi everyone!
        Since the last Wayland driver update [1] a lot of work has been done to
        improve the functionality and stability of the Wine Wayland driver, and
        to provide a cleaner and more reviewable/upstreamable patchset. The
        driver has now reached a point where it would benefit from wider
        community testing.
        In the mailing list discussions earlier this year it was recommended
        that we go through wine-staging as a stepping stone towards upstream. To
        this end, I have prepared a patchset and attached it to the existing bug
        for a Wayland driver, as per the wine-staging guidelines, at:
        This is intended to be an active patchset, meaning that it will receive
        updates regularly, as feedback is received and issues are fixed.
        Development will continue in the development branch (currently at [2])
        which will be used as the canonical source for any updated patchsets for
        The vast majority (but not all) of the commits in the series affect only
        the driver itself. However, there is still a lot of surface area, mostly
        in terms of interfaces used to interact with Wine core, that could lead
        to broken code when upstream is updated. This has been more pronounced
        the last few weeks with the various changes in the driver interface.
        I will be tracking upstream and providing updated patchsets as needed
        and as timely as I can. I want to make sure that this patchset will not
        cause undue burden on the wine-staging maintainers. However, if the
        maintainers feel that this patchset will make life difficult for them, I
        am open to different ideas about how to move this driver towards upstream.
        A related question now that holiday season is approaching: what happens
        if a wine-staging patch breaks due to an upstream change, such that it
        requires intervention from the original author, but this is not provided
        in time for the next release? Is the patchset disabled for that
        wine-staging release and re-enabled when fixed? Let me stress again that
        my aim is to track upstream and respond in a timely manner, but
        sometimes this is not possible, and I want to be clear about how the
        situation is handled.
      • Wine’s Wayland Driver Continues Maturing, Aims To Go Through Wine-Staging – Phoronix

        While it won’t make it for the upcoming Wine 7.0, the Wayland driver for natively supporting this X11 successor continues maturing and in the not too distant future will hopefully begin receiving more widespread testing via Wine-Staging.

        Alexandros Frantzis has been leading the effort on the Wayland Wine driver to allow for Windows games/applications to run on Wayland compositors without having to go through XWayland. Much progress has been made and now Vulkan and other features are working.

    • Desktop Environments/WMs

      • xfce4-terminal 0.9.1 development release

          Welcome back! For the last two months, I’ve been working on fixing regressions introduced by 0.9.0 (thanks to all the people who use try the development releases) and a few new features and enhancements that the community has been asking for.

      • GNOME Desktop/GTK

    • Distributions

      • Is EndeavourOS the Easiest Way to Use Arch Linux?

        Arch Linux is famous for being its own thing, done in its own way. Most distributions are built on other distributions. Ubuntu is based on Debian, Manjaro is based on Arch, and Fedora is based on RedHat Linux.

        Arch Linux isn’t based on anything. It was built from the ground up using the Linux kernel, the GNU utilities, its own package manager, and so on. Arch Linux lets the user decide exactly what they want to include or leave out of their operating system and applications. It’s the polar opposite of bloat. It’s just about the skinniest Linux you can get.

      • Easier To Respin Makulu Shift – MakuluLinux

        We just made it a WHOLE lot easier to Respin your Own distro from Makulu Shift, watch the video for details…

      • New Releases

        • Kali Linux 2021.4 released with 9 new tools, further Apple M1 support

          ​Kali Linux 2021.4 was released today by Offensive Security and includes further Apple M1 support, increased Samba compatibility, nine new tools, and an update for all three main desktop.

          Kali Linux is a Linux distribution allowing cybersecurity professionals and ethical hackers to perform penetration testing and security audits against internal and remote networks.

        • Kali Linux 2021.4 Comes with Updated Desktop Environments

          Kali Linux 2021.4 has just been released by Offensive Security. The latest version includes a new set of tools as well a desktop and theme enhancements.

          Kali Linux is a Debian-based Linux distribution designed for cybersecurity professionals and ethical hackers to perform penetration testing and security audits. It is sponsored by a US company called Offensive Security, who do information security training and penetration testing.

          Kali Linux is a rolling release, which means that updates are released constantly, including feature updates. Nevertheless, there is also a quarterly release, which are a good moment to catch up on what is new in Kali.

          The latest 2021.4 release brings some significant feature additions and improvements onboard. Let us check them out.

        • Kali Linux 2021.4 released – screenshots

          The developers of Kali Linux have announced the release of Kali Linux 2021.4, the last in the 2021 release cycle. Kali Linux is a Debian-based distribution targeted at security professionals, so all the best security tools for hacking and penetration testing (pentesting) are nicely packaged for easy access and use. This release comes exactly 7 days after I installed Kali Linux 2021.3 alongside Ubuntu 20.04.3 on a MacBook Air in dual-boot fashion.

          Given that Kali Linux is a rolling release distribution, the difference between that up to date installation on my MacBook Air and this 2021.4 release is very minor, so all I had to do to match what you’ll get by downloading and installing it afresh is a simple sudo apt update && sudo apt upgrade -y.

          Life with Linux is good!

          Here are a few screenshots from my installation of Kali Linux 2021.4. You may read all the new and updated features in the release notes and download a copy for installation from here, if you do not have Kali Linux installed on your computer already.

      • BSD

      • SUSE/OpenSUSE

        • Ritchie-CLI Becomes Official, Mesa, bind Update in Tumbleweed – openSUSE News

          While the rolling release snapped its streak of continuous daily snapshots, Tumbleweed persists releasing numerous snapshots; in total, five have been released so far this week.

          The last snapshot, 20211207, updated one package that gamers will appreciate. The computer opponent for the board game Blokus was updated with the release of pentobi 19.1. The bug fixing update provided a work around for a crash that happened during an exit in some situations. The package also avoids a warning with Qt 6 caused by a deprecated signal-handler syntax.

          Snapshot 20211206 updated the 3D graphics package Mesa to version 21.3.1. The updated provided mostly AMD, Intel and Zink fixes. The package also added a work around to fix a segfault with the first-person shooter video game Metro Exodus, which announced availability with Linux in April 2021. The highly portable implementation of the Domain Name System protocol bind 9.16.23 fixed CVE-2021-25219 by disabling the lame server cache that would have allowed an attacker to significantly degrade resolver performance. There were some patches removed in the blog 2.26 update. Font rendering package freetype2 2.11.1 improved cmake support and updated the latest experimental COLRv1 Application Programming Interface to OpenType standard 1.9. Another rendering package poppler, which is for pdfs, updated to version 21.12.0 and added a few APIs; one to read/save to file descriptor; one to add images; and one to validate signatures. Many incremental improvements and bug fixes were made in the libvirt 7.10.0 update and a new feature is a binary that helps users figure out the format of Distinguished Name from a certificate file the way it expects in the tls_allowed_dn_list option of the libvirtd.conf configuration file. The userspace components for the Linux Kernel’s drivers and infiniband subsystem package rdma-core 38.0 was the only major version update in the snapshot; it updated kernel headers stddef.h. Other packages to update in the snapshot were gc 8.2.0, kImageAnnotator 0.5.3, strace 5.15 and more.

        • openSUSE Tumbleweed – Review of the week 2021/49 – Dominique a.k.a. DimStar (Dim*)

          Unfortunately, we could not keep up the daily streak of snapshots during this week. We ‘only’ managed to push out 6 snapshots. Over the last weekend, we had an openQA-worker causing some troubles, which resulted in not sufficient throughput to get anything ready to publish. But 6 snapshots is still acceptable, isn’t it? Anyway, we had the following releases: 1202, 1203, 1205, 1206, 1207, and 1208.

      • IBM/Red Hat/Fedora

        • Tracing hardware offload in Open vSwitch

          Open vSwitch (OVS) is an open source framework for software-defined networking (SDN) and is useful in virtualized environments. Just like conventional network stacks, OVS can offload tasks to the hardware running on the network interface card (NIC) to speed up the processing of network packets.

          However, dozens of functions are invoked in a chain to achieve hardware offload. This article takes you through the chain of functions to help you debug networking problems with OVS.

          This article assumes that you understand the basics of OVS and hardware offload. To accompany your study of this article, you should be familiar with network commands, particularly Linux’s tc (traffic control) command, in order to dump traffic flows and see whether they are offloaded.

          For the flow illustrated in this article, I used a Mellanox NIC.

        • Cockpit Project: Cockpit 259
        • Absolute Zero Touch – because you can’t reach all the way to the edge

          When pushing compute and cloud technologies to the edge of the network, the logistical approach to infrastructure provisioning needs to be hands-off. Is Zero Touch Provisioning (ZTP) a possibility? Are things ever really “zero?”

          This post will provide an overview of ZTP, why it’s important when working with thousands of edge nodes, and how GitOps practices and Red Hat solutions are enabling more rapid deployment of mobile infrastructure—helping you manage your infrastructure at the edge.

        • Sysadmins in 2022: 3 ways to advance your career | Enable Sysadmin

          As digital transformation and automation change the sysadmin role, make sure you’re doing what’s necessary to thrive through the transition.

        • IT careers: 5 secrets to making a successful change | The Enterprisers Project

          If you’ve been daydreaming about making a career change, you’re not alone. But while it’s enticing to imagine yourself in the career of your dreams, getting there can be scary. Whether you’re jumping into a brand-new career path or leaving the industry you’ve been in for years, you need to prepare.

          Here are five secrets to help you make your career jump as an IT professional.

        • Remi Collet: PHP 7.3 is dead

          After PHP 7.2, and as announced, PHP version 7.3.33 was the last official release of PHP 7.3


          However, given the very important number of downloads by the users of my repository the version is still available in remi repository for Enterprise Linux (RHEL, CentOS…) and Fedora (Software Collections) and will include the latest security fix.

        • Irving Wladawsky-Berger: Is the Metaverse the Next Major Phase of the Internet?

          “Don’t mock the metaverse,” said The Economist in a November 20 article. “There are good reasons to take the metaverse seriously. One is historical: as computers have become more capable, the experiences which they generate have become richer. The internet began its life displaying nothing more exciting than white text on a black background. Flat images were added in the 1990s. Video came to dominate in the 2010s. On that reading, a move into three dimensions is a logical consequence of the steady growth in computing power.”

          “The metaverse is already here. It’s just not evenly distributed,” the article added. “The video-game industry – the only type of entertainment fully exposed to the compounding power of Moore’s law – has been selling virtual worlds for years.” Online games like World of Warcraft, Fortnite, and Roblox have hundreds of millions of users, and their gaming companies have valuations in the tens of billions, – evidence that immersive virtual worlds can be popular and profitable. “It is hard to argue that an idea will never catch on when, for millions of people, it already has.”

          3-D virtual environments have had limited success beyond the video-game industry. But this could change. Leading technology companies have announced plans to expand their use in business, education, social media, and other so-called serious applications. On October 28, Mark Zuckerberg announced his commitment to a metaverse strategy by rebranding Facebook as Meta Platforms. A week or so later, Satya Nadella shared Microsoft’s metaverse plans, starting with enabling users of Mesh for Microsoft Teams to interact and collaborate in 3-D immersive workspaces.

        • Red Hat Brings Ansible Automation Platform To Microsoft’s Azure Cloud Platform

          Red Hat is bringing Red Hat Ansible Automation Platform to Microsoft’s Azure cloud platform. The collaboration between Red Hat and Microsoft delivers a powerful solution that provides customers flexibility in how they adopt automation to deliver any application, anywhere, without additional overhead or complexity.

          Red Hat and Microsoft customers now don’t have to worry about deploying and configuring a solution that can address enterprise-class use cases. Instead, they can start working immediately on complex scenarios like automated OS configuration, application provisioning, network automation, infrastructure as code (IaC) and security orchestration.

        • The Red Hat Satellite 6.10 Performance Tuning Guide has been released

          We are pleased to announce that Red Hat Satellite 6.10 Tuning Guide has been released.

          This guide has been prepared to provide guidance on how to optimize Red Hat Satellite 6.10 performance with respect to hardware and software configuration. As well, information is provided on how to use the Installer-based auto-tuning function to provide greater simplicity.

        • Fedora Community Blog: Friday’s Fedora Facts: 2021-49

          Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)!

          I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.

      • Canonical/Ubuntu Family

        • Linux Mint 20.3 Beta Is Now Available for Download

          Linux Mint 20.3 was unveiled in early October 2021 and it’s scheduled for release near the Christmas holidays. The Linux Mint team already shared some of the new features coming to this update in the Linux Mint 20 series, which is based on the Ubuntu 20.04 LTS (Focal Fossa) operating system series and supported for 5 years.

          Based on the Ubuntu 20.04.3 LTS release, Linux Mint 20.3 beta sticks to the Linux 5.4 LTS kernel to minimize any failures that may occur during upgrades from Linux Mint 20.2 “Uma” or a previous version.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Mozilla

          • How to customize Firefox UI – step-by-step tutorial

            That was fairly complicated, I admit. I wish there was a simpler way to edit the Firefox UI, but unfortunately, if you’re not happy with Firefox’s default looks, and you want to alter them beyond the basic customization available, you will need CSS knowledge, CSS files, and a bunch of rules. This guide outlines how you can achieve that, without going into every specific detail of the browser’s interface.

            I am fully aware that this isn’t a trivial task. CSS looks “easy” to those who know how to use it, but it also creates aversion, justifiably, with ordinary people seeking simple ergonomic solutions. I believe the right way is to actually invest a little bit of time and master this lingo, as it gives you the freedom to make the necessary adjustments to the UI, without relying on arbitrary decisions out there somewhere. I wish Mozilla was making better choices, but hey, even with all this nonsense piled into Firefox, it’s still the best browser, it allows you to change the interface, and it’s the one browser you should use on your desktop and mobile. It’s the only thing that makes the Internet still barely usable, and you will not like the future without Firefox. So grab the CSS, get rid of the annoyances, and continue using Firefox. We’re done here.

          • Another Debian dust-up with Firefox dependencies – but there is an annoying and awkward workaround

            Debian is having problems with a current version of Firefox that leaves users with a dangerously outdated browser.

            One of the grey-bearded elders of the Linux distro world, Debian has had issues with Mozilla before. For years, it built its own forks of the Mozilla apps – Iceweasel, Icedove, Iceape, and Iceowl – because of a disagreement over trademark use. But this time the issues are technical rather than legal.

            As a conservative, stable distro, Debian includes the Extended Support Release (ESR) version of Firefox – ideal for those who find Mozilla’s four-weekly release cycle a bit too rapid.

          • Firefox 95 on POWER

            The big new feature, besides speculative AOT JIT which doesn’t apply to us yet, is RLBox, which compiles certain third-party libraries into safe WebAssembly, and then compiles them back into C, so they can be compiled a third time into pre-sanitized native code. This has obvious security benefits and the performance impact shouldn’t be especially large, but it adds yet another build-time prerequisite: the WASI SDK. This kind of really sucks because now you have to have a third toolchain (it builds one whether you like it or not) besides clang and our preferred compiler, gcc. Pending internal package support, some distros have chosen simply to disable this for the immediate future, even including Fedora.

      • Productivity Software/LibreOffice/Calligra

      • Programming/Development

        • Restartable Sequences “RSEQ” Support Returning To GNU C Library – Phoronix

          Back in 2018 for the Linux 4.18 kernel was introducing the Restartable Sequences system call for allowing faster user-space operations on per-CPU data. By avoiding atomic operations in cases like incrementing per-CPU counters, modifying per-CPU spinlocks, reading/writing to per-CPU ring buffers, and similar, Restartable Sequences can provide a performance advantage. The GNU C Library is landing its revised support for making use of this system call.

          Restartable Sequences has shown nice performance potential and generated interest among developers. Glibc has been working on utilizing Restartable Sequences and the initial code was merged in 2020. More background information on RSEQ can be learned at Efficios.com from their work over the years on this support.

        • Reveal your source code with Jinja2 and Git | Opensource.com

          One of the little ways I’ve supported the cause is by keeping my personal blog site open from the very beginning. I do this partly to let people see the history of changes behind each page. But I also do it because, when I started using Jekyll, I didn’t find many open source Jekyll blogs to learn from. My hope is that keeping my website open and exposing my trials and errors will save someone else a lot of time.

        • Python

          • Mourning Fredrik “Effbot” Lundh

            Guido van Rossum has posted the sad news that longtime Python contributor Fredrik Lundh has died.

          • drgn: How the Linux Kernel Team at Meta Debugs the Kernel at Scale

            drgn (pronounced “dragon”) is a debugger that exposes the types and variables in a program for easy, expressive scripting in Python. The Linux kernel team at Meta originally built drgn to make it easier to investigate the kinds of difficult Linux kernel bugs that the team encounters at Meta. The team has since added further use cases for it, like monitoring and userspace memory profiling. This blog discusses why we built drgn, how drgn works, how to use it, and what the team would like to do with drgn next.

        • Java

          • Critical RCE Zero-Day Exploit Found in Popular Java Logging Library log4j, Affects Much Of The Internet – CloudSavvy IT

            The bug, tracked by CVE-2021-44228, likely affects almost any Java application using log4j, which is quite a few considering how ubiquitous it is. If your application ever logs a string sent in by a user, it’s probably vulnerable. As far as exploits go, it’s one of the worst ones this year, as it can target basically any server running Java in some fashion (though the primary attack vector may be harder on modern JDK versions, more on that below).

            Essentially, the exploit allows an attacker to send your server any string like the following, and if it logs it somewhere in your app, your server will execute code hosted at that address.

  • Leftovers

    • Science

      • 3D Printing Delivers “Glass” Eyes In Record Time | Hackaday

        Obviously, losing an eye would be bad for your vision. But if you think about it, it is also a detriment to your appearance. You might not need a prosthetic eye, and you can certainly rock an eye patch, but a lot of people with this problem get an artificial or “glass” eye. These glass eyes are hand-painted disks that fit into the eye socket. However, a British man now has a new kind of eye prosthesis that is 3D printed, a technology that can potentially cut waiting time for patients in half.

        The existing process is lengthy because it requires taking a mold of the eye socket and manually matching the remaining eye with the new artificial eye. With the 3D printed technology, scans of the eye socket and the other eye make this process much simpler.

      • Lasers Make PCBs The Old Fashioned Way | Hackaday

        There are many ways to create printed circuit boards, but one of the more traditional ways involves using boards coated with photoresist and exposing the desired artwork on the board, usually with UV light. Then you develop the board like a photograph and etch it in acid. Where the photoresist stays, you’ll wind up with copper traces. Hackers have used lots of methods to get that artwork ranging from pen plotters to laser printers, but commercially a machine called a photoplotter created the artwork using a light and a piece of film. [JGJMatt] sort of rediscovered this idea by realizing that a cheap laser engraver could directly draw on the photoresist.

    • Hardware

      • BEAM Bird Pendant Really Chirps | Hackaday

        [NanoRobotGeek] had a single glorious weekend between the end of the term and the start of exams. Did they buy a keg and party it up? No, in fact, quite the opposite — they probably gained a few brain cells by free-form soldering this beautiful chirping bird pendant at 0603 instead.

      • DIY Analog Synth Looks Like Fun | Hackaday

        The relative ease of building the individual components that make up an analog synth make it very tempting to DIY your own. That’s what [Albert Nyström] did and the result is this great looking, and great sounding, analog synth.

        The VCOs in his monosynth are based around the AS3340 VCO chip, which is a clone of the Curtis Electromusic Specialties‘ CEM3340 chip (used in machines such as the Oberheim OB-Xa, the Roland Jupiter-6, and the Sequential Circuits Prophet-5 among others.) The voltage controlled filters are based on Moritz Klein’s VACTROL based VCF circuits, and the envelopes based on Thomas Henry’s 555 envelope circuits (Google searches will dig those up pretty quickly, as well as schematics for builds using the CEM chip.) Finally, the keyboard is a donor from an Arturia Keystep. While there are no step-by-step build instructions, or a schematic, we do have some info about the instrument. As you can see from some of the gut shots, it should be fairly easy to figure how [Albert] has put everything together. Or not.

      • An NFC Antenna Ring With A Chip As Its Jewel | Hackaday

        Contactless payment by means of NFC-enabled bank cards has made our everyday transactions far more convenient over the last decade, but there still remains the tedious task of finding the card and waving it over the reader. Maybe embedded chips are a step too far for many of us, but how about a bank card in a wearable such as a ring? [Jonathan Limén] shows us how, by taking the NFC chip module from a bank card and mounting it on a ring with a wire coil antenna embedded within it.

    • Integrity/Availability

      • Proprietary

        • Microsoft, You’re Making It Hard to Recommend Edge [Ed: It also steals passwords]

          It’s no secret that Microsoft frequently uses Windows to push its own products. The latest tactic is pop-ups that appear when you visit the Chrome download page. Google does something similar, but it can only use web prompts. On Windows 11, Microsoft is using native prompts and notifications that are not available to developers.

        • Some Windows 11 Users Claim Microsoft’s New OS Is Seriously Gimping SSD Speeds

          Have you made the jump to Windows 11? While there aren’t yet any “killer apps” for Microsoft’s new OS, it’s easy to understand (as a fellow enthusiast) the desire to try out the latest thing. Windows 11 brings along some important under-the-hood refinements for new and upcoming hardware, so in the near future it may be a good move, but for now, most folks are probably better-served by the more-familiar and understood Windows 10.

          Then again, perhaps some of those aforementioned under-the-hood refinements are responsible for the technical issues that Microsoft’s new baby has been facing. There were multiple issues on launch with AMD CPUs, a problem where the “chkdsk” tool could damage SSDs, and many users have reported general performance issues, including an overall “laggy” or “sloppy” feeling to the new OS.

        • Security

          • Security updates for Friday

            Security updates have been issued by Debian (python-babel), Fedora (golang-github-opencontainers-image-spec and libmysofa), openSUSE (hiredis), Oracle (firefox and thunderbird), Red Hat (thunderbird and virt:8.2 and virt-devel:8.2), Scientific Linux (thunderbird), SUSE (kernel-rt and xen), and Ubuntu (firefox).

          • Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation | CISA

            The Apache Software Foundation has released a security advisory to address a remote code execution vulnerability (CVE-2021-44228) affecting Log4j versions 2.0-beta9 to 2.14.1. A remote attacker could exploit this vulnerability to take control of an affected system. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services.

          • Reproducible Builds (diffoscope): diffoscope 196 released

            The diffoscope maintainers are pleased to announce the release of diffoscope version 196. This version includes the following changes:

            [ Roland Clobus ]
            * Add a comment/annotation when the GNU_BUILD_ID field has been modified.
            [ Brent Spillner ]
            * Fix the "Black" version detection.
            [ Chris Lamb ]
            * Replace "token" with anonymous variable "x" in order to remove extra lines.

          • This Week In Security: Printing Shellz, Ms-officecmd, And AI Security | Hackaday

            Researchers at f-secure have developed an impressive new attack, leveraging HP printers as an unexpected attack surface. Printing Shellz (PDF) is a one-click attack, where simply visiting a malicious webpage is enough to get a shell and reverse proxy installed to a printer on the same network. The demo below uses a cross-site printing (XSP) attack to send the malicious print job to the printer without any further interactions.

          • Privacy/Surveillance

            • Law Enforcement Access to Chat Data and Metadata – Schneier on Security

              A January 2021 FBI document outlines what types of data and metadata can be lawfully obtained by the FBI from messaging apps. Rolling Stone broke the story and it’s been written about elsewhere.

              I don’t see a lot of surprises in the document. Lots of apps leak all sorts of metadata: iMessage and WhatsApp seem to be the worst. Signal protects the most metadata. End-to-end encrypted message content can be available if the user uploads it to an unencrypted backup server.

    • Digital Restrictions (DRM)

      • Activists around the world protest Disney+’s unethical streaming platform for International Day Against DRM

        Friday, December 10th, 2021 — A global community of activists is taking part today in the Defective by Design campaign’s 15th annual International Day Against DRM (IDAD) to protest use of Digital Restrictions Management, a widespread technology that places unethical restrictions on how people access digital media. Though from different backgrounds, countries, and perspectives, participants in the campaign share the common cause of opposing DRM in all of its forms. This year’s target is Disney+’s streaming platform.

        Led by the Free Software Foundation (FSF), the Defective by Design campaign is mobilizing activists to spread awareness on Disney+’s use of DRM by leaving negative reviews on its app store listings. This is joined by a general call to unsubscribe from streaming platforms that restrict their offerings with DRM, and a challenge to go a “day without DRM” as a way to raise awareness of publishers and storefronts that intentionally refrain from using it, such as those cataloged by the campaign’s Guide to DRM-free Living.

    • Monopolies

      • Patents

        • ‘Unitary Patent system is an arbitrary and ailing hybrid monster mix’ [Ed: More here]

          Due to recent developments in Germany, Slovenia and Austria, where parliaments gave their support to the Protocol for Provisional Application of the Unified Patent Court Agreement, it is likely that after many years of delay the new Court will open its doors in 2022 and also the Unitary Patent will finally see the light of day. According to the architects of the Unitary Patent package, it will make the Europe-wide enforcement of patents easier, offer greater legal certainty and reduce litigation costs. But not everybody is convinced. Prof. Dr. Thomas Jaeger, European law expert of the University of Vienna, is an outspoken opponent of the Unitary Patent system, which he calls “a recipe for disaster”. Kluwer IP Law interviewed him.

        • Regulatory flux, patent law issues negatively impacting IVD market

          Makers of vitro diagnostics (IVDs) are facing several significant challenges in the next few years, thanks to existing and impending revisions to a number of regulatory frameworks. There are other considerations that are adding to the headwinds, such as a poor patent protection environment in the U.S., the net effect of which is to make life unusually miserable for developers of these tests.

Video: Animation in the Command Line With IPFS

Posted in Free/Libre Software at 12:51 pm by Dr. Roy Schestowitz

Video download link

Summary: The above video’s framerate is too low for the animation to be fully appreciated, but handling of animated GIFs within text files (made with Chafa) is like a nice ‘Easter egg’ in the Go(Lang) IPFS implementation

IN IPFS, which is file type-agnostic, a lot of things are possible, including exchange of large videos. It’s like P2P but without centralisation of any kind (even hashes or similar file identifiers).

As a matter of fact, even in the command line animated IPFS objects are sort of feasible, as demonstrated above (this is a recent daily bulletin of ours, retrieved over IPFS with the command ipfs cat QmQPL4aU5VkHzGprihFtysZx7tMGqLPQa11SU2s4ao6H6r using the Go(Lang) IPFS implementation).

Recently, however, we’ve had issued. The availability of our IPFS objects, given their hashes, hasn't been great to say the least. Lately we’ve been struggling to meet the growingly unreasonable bandwidth demands associated with the software, which appears to scale poorly (we’re made almost 4,000 objects already, so that’s many hashes to keep abreast of and send upstream). Then again, IPFS is still not a fully mature piece of software, so there’s hope it’ll improve a lot over time. Becoming more easy to use (accessible etc.) is another truly important need.

Our Growing Embrace of Gemini Protocol

Posted in Site News at 12:10 pm by Dr. Roy Schestowitz

Video download link | md5sum 41c918f4546e50feaea39e19b9259135

A US astronautSummary: The excitement associated with Gemini (as in the lighter alternative to the bloated and monopolies-dominated Web) is very much justified; we continue to invest a lot of time and effort in Gemini

Gemini Protocol isn’t old and isn’t so new either. It tackles some of the biggest issues with the World Wide Web, including bloat, security, suitability for residential connections, and centralisation/monopolisation (further exacerbated by the certificates/CA treadmill, which seems more like a pyramid scheme of “trust”).

Last night we put the final touches, concluding a 5-day effort to convert all the IRC logs in gemini:// from plain text to GemText [1, 2, 3]. This task is now complete. Over the coming 10 days or so we’ll significantly increase publication pace and deliver some important exclusives, with focus on the EPO.

“In the first 10 days of December we served close to a quarter million pages over gemini:// and each month the numbers go higher.”The video above demonstrates and explains some of the many benefits of embracing Gemini, either as a reader or author. With the growing levels of disinformation on the Web (or decreased signal/spam ratio) it’s important to build a true alternative, both to HTTP/S and to HTML (which nowadays mostly incorporates a bunch of CSS files and bloated JavaScript frameworks, sometimes even proprietary fonts).

Everything starts small. Gemini space is no longer small. It’s a fast-growing ‘cyber-space’ in terms of the number of pages, number of authors, number of software projects, and amount of traffic. In the first 10 days of December we served close to a quarter million pages over gemini:// and each month the numbers go higher.

Links 10/12/2021: ArcaOS 5.0.7 and Cambalache 0.8.0; Assange Appeal

Posted in News Roundup at 11:49 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • What desktop Linux needs to succeed in the mainstream

        You might be aware of the recent Linus Tech Tips videos about switching to Linux, including one with some complaints about KDE software. For those of you who are following along, I want to let you know that we’re working on fixing the issues Linus brought up, and you can track our progress here. Thankfully most of the issues are fairly minor and should be easy to fix.

        This blog post is my version of Sway developer Drew DeVault’s post about the videos, regarding the question of what desktop Linux needs to go mainstream. Drew emphasizes accessibility, and I agree, but with a slightly different conclusion:

        Desktop Linux needs to be pre-installed on retail hardware to succeed in the mainstream.

        That’s it.

        Allow me to explain.

    • Audiocasts/Shows

    • Kernel Space

      • Linux Kernel Patches Allow Booting Higher Core Count Systems Much Faster – Phoronix

        Patches started earlier this year for allowing the parallel bring-up of secondary CPU cores for x86_64 processors have gotten back to being worked on and were sent out on Thursday for review.

        The focus on the set of patches affecting a few hundred lines of code is about being able to bring-up secondary (x86_64) CPU cores in parallel.

        This is just the beginning and there is the opportunity for even greater parallelization to happen in the Linux kernel boot process. But as Amazon’s David Woodhouse noted in the patch series, “But I’ll take a mere factor of 15 for the time being.” Yes, on his test Intel Xeon server was a nearly 15x improvement with the patches as they stand today.

      • systemd 250 Is Coming For Christmas With A Boat Load Of New Features – Phoronix

        Systemd 250 is gearing up for release this month and today marked the availability of the first release candidate (and RC2 as a brown paper bag update). Systemd 250 is packing a rather large number of new features and changes across the board for this dominant Linux init system and service manager.

        It’s been a half-year since systemd 249 and now systemd 250 is preparing to set sail for powering 2022 Linux distributions. Systemd 250 has many notable changes from systemd-homed defaulting to Btrfs with Zstd compression to UID mapped mounts to ease home directory migration among systems. There is also support for encrypted and authenticated credentials, many new settings for unit files, and much more.

      • Radeon Linux Driver Has A Huge Optimization Two Decades Later For ATI R300~R500 GPUs – Phoronix

        While earlier this year AMD dropped pre-Polaris support from their mainline Radeon Software Windows driver, under Linux with open-source software older GPUs can live on much longer with superior driver support… Pending for Mesa 22.0 and as a surprise Christmas gift for those with nearly two decade old GPUs, a big optimization is pending for those with ATI Radeon R300/R400/R500 series graphics cards still in operation.

        The change by longtime open-source graphics driver developer Emma Anholt is for the ATI R300 Gallium3D drivers to request NIR shaders from the Mesa state tracker and to use the NIR-to-TGSI path.

      • Kernel Karnage – Part 6 (Last Call)

        This blogpost concludes patching the kernel callbacks. While there is more functionality to add and more problems to address from kernel space, such as ETW or minifilters, the main goal of sufficiently crippling an EDR/AV product using a kernel driver has been met. Using Interceptor, we can deploy a meterpreter shell or Cobalt Strike Beacon and even run Mimikatz undetected. The next challenge will be to deploy the driver on a target and bypass protections such as Driver Signature Enforcement.

    • Applications

      • OBS Studio and Fedora Linux: An Interview with Georges Basile Stavracas Neto

        OBS Studio is the industry standard for streaming software. This is an interview with Georges Basile Stavracas Neto who has been working on porting OBS Studio to use PipeWire and improve how this important software tool works on Fedora Linux. Georges will answer questions about the way forward and how to improve Fedora Linux as a platform for streamers overall. This interview also turned out somewhat extra timely due to the Linus Tech Tips Linux challenge where he specifically tried to set up his system for the purpose of streaming.

      • radio-active – listen to radio from the terminal

        Internet radio (also known as web radio, net radio, streaming radio, and online radio) is a digital audio service transmitted via the Internet.

        Why do we like internet radio? There are no sign-up or subscription charges. There are a huge range of stations available from around the world. If you like classical music, pop music, folk music, news, talk radio, and much more, internet radio has something for everyone wherever you live (providing you have a net connection). Internet radio offers every format that is available on traditional broadcast radio stations.

        We’ve written a few reviews of command-line internet radio software including PyRadio and curseradio, both tools written in Python. radio-active is also written in Python and terminal-based. Let’s see how it fares.

    • Instructionals/Technical

      • 2021-12-05 singing wires

        I have probably described before the concept of the telephone network forming a single, continuous pair of wires from your telephone to the telephone of the person you are calling. This is the origin of “circuit switching” and the source of the term: the notion that a circuit-switched system literally forms an electrical circuit between two endpoints.

      • NVMe drives and the case of opaque bandwidth limits

        However, I’m not sure I see an obvious place with the bandwidth limit in my PCIe topology, at least with Linux’s tools for PCIe topology. Both NVMe drives are connected to ‘Intel Corporation 200 Series PCH PCI Express Root Port’ PCIe devices that are listed as part of what I think of as the PCI root bus. Since this is an Intel thing, PCH probably stands for Intel’s Platform Controller Hub, which has a DMI link between the Intel CPU and the Z370 chipset. Looking at various things, this DMI link is about the speed of PCIe 3.0 x4, which could explain how I’m running into bandwidth limits. If neither NVMe drive is directly connected to any CPU PCIe lanes, the combined bandwidth of both of them together would be limited by the PCH to CPU bandwidth of roughly PCIe 3.0 x4.

      • DNS “propagation” is actually caches expiring

        First – I’m very tired of posts that complain about how people are “wrong” about how a given piece of technology works without explaining why it’s helpful to be “right”. So here’s why I like knowing how DNS works.

      • My Backup Plan

        Over the past year, since I got more serious about my growing YouTube channel’s success, I decided to document and automate as much of my backups as possible, following a 3-2-1 backup plan: [...]

      • [Updated] 8 Linux Nslookup Commands to Troubleshoot DNS Lookup

        nslookup is a command-line administrative tool for testing and troubleshooting DNS servers (Domain Name Server). It is used to query specific DNS resource records (RR) as well. Most operating systems come with a built-in nslookup feature.

      • Using GPG to Encrypt and Decrypt Files on Linux [Hands-on for Beginners]

        GnuPG, popularly known as GPG, is an extremely versatile tool, being widely used as the industry standard for encryption of things like emails, messages, files, or just anything you need to send to someone securely.

        It’s easy to get started with GPG, and you can be on your way with using it in a matter of minutes.

        You’ve now gone over everything you need to start using GPG, including encrypting files for yourself and for others. As I mentioned earlier, this is just for understanding how GPG encryption and decryption process works. The basic GPG knowledge you just acquired can be taken to the next level when applied in real-world scenarios.

      • How to Search for Text within Files and Folders in Linux

        If you are a developer, a web programmer, or someone who works with many files and you need to find a single piece of text, you should know and memorize a single command you can use on any Linux-based system.

        For example, let’s say you have a directory containing 30 folders and 20,000 files. It doesn’t matter the extension of the files contained in these folders as they can be whatever crosses your mind, e.g. .txt, .php, .css, .js, etc.

      • How to set a Grub root password on Ubuntu 20.04 – Unixcop the Unix / Linux the admins deams

        Hello friends. In this post, I will explain to you How to set a Grub root password on Ubuntu 20.04. So you can protect even the system boot. Ideal for shared computers or where we want to increase the security of it.

      • How to Install PyCharm IDE on Fedora 35 – LinuxCapable

        PyCharm is a dedicated Python graphical IDE (Integrated Development Environment) popular amongst Python developers with its wide range of essential tools such as analyzing code, debugging, and integration. The IDE also comes with the command line, connects to a database, creates a virtual environment, and manages your version control system (Git).

        In the following tutorial, you will learn how to install PyCharm Community, Professional or Educational using the third-party repository by phracek/PyCharm or Flatpak.

      • Hardening a CentOS 7 / RHEL 7 Server: Best practices and recommendation. – Unixcop the Unix / Linux the admins deams

        Securing Linux server is very important to protect your data, intellectual property from the hands of crackers (hackers). The system administrator is responsible for security of the Linux box. In this blog we will go through important tips for hardening a CentOS / RHEL server.

      • How to Run Graphical X Apps Over SSH in Linux

        While X11 remains the foundation for most Linux desktops, its network transparency, or ability to display output across the network, is one of its unsung features. SSH makes it easy and secure to run Linux GUI apps on a remote machine and display them on your machine.

      • How to restrict server users to a specific directory in Linux – TechRepublic

        When you have a server with SSH access, unless you’ve configured it otherwise, any user with an account on that system can log in and, if they have the permissions and skill, wreak havoc on your server.

      • Should you shred or rm a file in Linux? – LinuxBSDos.com

        The go-to command for deleting or removing files in Linux and other UNIX-like operating systems is the rm command, and experienced users who know how dangerous that command can be usually call it with the -i option, just to be sure they don’t delete something by error.

    • Games

      • Masayuki Uemura, Creator Of The NES And SNES, Dies At 78

        Originally, Uemura worked at Sharp, selling photocell tech to various companies, including his future employer Nintendo. Once joinging the company, he worked with Gunpei Yokoi to integrate the photocell technology into electronic light gun games. He would go on to work on plug-and-play consoles like Nintendo’s Color TV-Game.

        But everything changed in 1981 with a single phone call.

        “President Yamauchi told me to make a video game system, one that could play games on cartridges,” Uemura told Matt Alt in an interview published last year on Kotaku. “He always liked to call me after he’d had a few drinks, so I didn’t think much of it. I just said, “Sure thing, boss,” and hung up. It wasn’t until the next morning when he came up to me, sober, and said, “That thing we talked about—you’re on it?” that it hit me: He was serious.”

    • Desktop Environments/WMs

    • Distributions

      • ArcaOS 5.0.7 now available

        ArcaOS 5.0.7 includes refreshed driver content, updated kernel and included software, as well as installation boot fixes since 5.0.6 was released in 2020. If you have experienced difficulty installing previous releases of ArcaOS on your hardware, 5.0.7 may address your issue(s). If installing from USB stick, the image may be created using any major operating system at hand (Windows, Linux, MacOS, and of course, OS/2, eComStation, and ArcaOS). Once built, the USB stick can be inserted into any USB port in the target system to boot into the ArcaOS installer/updater.

      • New Releases

        • Kali Linux 2021.4 released: Wider Samba compatibility, The Social-Engineer Toolkit, new tools, and more! – Help Net Security

          Offensive Security released Kali Linux 2021.4, which comes with a number of improvements: wider Samba compatibility, switching package manager mirrors, enhanced Apple M1 support, Kaboxer theming, updates to Xfce, GNOME and KDE, Raspberry Pi Zero 2 W + USBArmory MkII ARM images, as well as new tools.


          With the latest update of Kaboxer tools no longer look out of place, as it brings support for window themes and icon themes. This allows the program to properly integrate with the rest of the desktop and avoids the usage of ugly fallback themes.

          Here is a comparison of how zenmap looks with the default Kali Dark theme, compared to the old appearance:

      • IBM/Red Hat/Fedora

        • Fedora Linux 35 election results – Fedora Community Blog

          The Fedora Linux 35 election cycle has concluded. Here are the results for each election. Congratulations to the winning candidates, and thank you all candidates for running in this election! I am out of the office on Friday, so I’ll make the appropriate documentation and permissions updates on Monday.

        • Service Mesh – Mark Chesire, Red Hat

          Mark Chesire, director of product for application services at Red Hat, explains why IT organizations will need a service mesh to manage APIs.

        • Why culture matters when implementing new technology

          Red Hat’s Michael Browne discusses the importance of a digital-first culture when it comes to bringing new technology into a business.

          Digital transformation has become somewhat of a buzzword phrase that can cover a whole host of technology implementation across all industries and sectors. Because it’s so broad, the advice around adopting it is often incredibly vague.

          However, there is one element of digital transformation that is important to all industries and lends itself to a slightly more specific type of advice for leaders: making digital transformation part of a company’s culture.

        • Red Hat Brings Industry-Leading Ansible Automation Platform to Microsoft Azure [Ed: IBM/Red Hat’s love letters to Microsoft with Microsoft logos here]

          Red Hat, Inc., the world’s leading provider of open source solutions, today announced Red Hat Ansible Automation Platform on Microsoft Azure. It builds on Red Hat’s standard for hybrid cloud automation that has been refined for the evolving realities of computing at hybrid cloud scale. The collaboration between Red Hat and Microsoft delivers a powerful solution that provides customers flexibility in how they adopt automation to deliver any application, anywhere, without additional overhead or complexity.

      • Debian Family

        • First Look at Armbian Linux on Raspberry Pi 4

          Every time I write an article about Armbian, people ask: when will Raspberry Pi support be available? Well, the wait is (almost) over as the Armbian community has finally added build framework support for the Raspberry Pi 4 single-board computer.

          So of course I had to see Armbian Linux in action on my Raspberry Pi 4 Model B SBC with 8GB RAM. Armbian is currently providing builds based on the upcoming Ubuntu 22.04 LTS (Jammy Jellyfish) operating system series with the Xfce and Cinnamon desktop environments pre-installed, as well as a text-based (CLI) variant.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Programming/Development

        • Lightwood

          I don’t usually write about my professional work, this is an exception. I’ve been working on automatic machine learning for almost 3 years.

          A small amount of that was focused on what I’d call the core of the problem, most of it was focused on platform building. This changed in the last 5 months when I decided to quit management duties and focus solely on “research”. The first thing to come out of this is the version 1 redesign of an automatic ml library called Lightwood.

        • Perl/Raku

    • Standards/Consortia

      • HL7 Celebrates 10 Years of FHIR Health IT Data Standard

        The open-source data standard aims to support healthcare interoperability for real-time access to health information across the care continuum.

        FHIR is widely used across the healthcare industry in mobile applications, cloud communications, EHR-based data sharing, and server communications.

  • Leftovers

    • Science

      • Notes on Metadata

        When it comes down to it, this mentality that we can express all forms of information into a sensible set of data is seems quite haughty. There are, and will always be, a variety of ways to describe things. Things in the world are multifaceted and any way of expressing them via a schema is inherently biased.

    • Education

      • To Reduce Inequality in Our Education System, Reduce Class Sizes

        New York City public schools are often as crushed as the subway during rush hour, with literally thousands of students forced to learn in overstuffed classrooms—sitting side by side, elbows knocking into each other, or sometimes leaning against the wall or resting on a radiator. Even in the age of Covid-19, hallways are so jam-packed it can be hard for students to get to their next class.

    • Health/Nutrition/Agriculture

      • Natural Resources Necessary to Feed World Are at a ‘Breaking Point,’ Warns FAO

        A United Nations report released Thursday detailing humanity’s degradation of natural resources warns swift and sweeping reforms are needed to keep feeding the growing global population.

        “The pressures on land and water ecosystems are now intense, and many are stressed to a critical point.”

      • Holiday Giving: Second Pandemic Winter Edition

        It’s the holiday season, and you know what that means: latkes with mistletoe sprinkles, the great debate over “Baby, It’s Cold Outside,” and this column’s traditional recommendations for donations. Republicans are on the move, and so are Covid and climate change—give now, before things get even worse!

      • Opinion | The Very Strong Economic Case for Universal Pre-K

        During World War II, the federal government provided child care around the clock to enable more women to work in the war industries. In 1971, we came close to having a national child care program when President Richard Nixon vetoed legislation that had strong bi-partisan support. Now, as Congress prepares to vote on President Biden’s key legislation, the nation is presented with another opportunity to make a historic investment in our future.

      • Two Democrats Back ‘Dangerous’ GOP Ploy to Kill Biden’s Vaccine-or-Test Rule

        Two right-wing Democrats—Sens. Jon Tester of Montana and Joe Manchin of West Virginia—joined every Senate Republican on Wednesday in voting to repeal the Biden administration’s vaccine-or-test requirement for large businesses, despite warnings that the move could undercut the nation’s pandemic response.

        The Senate GOP used a filibuster-proof vehicle known as the Congressional Review Act (CRA) to fast-track a resolution of disapproval against the rule, which was set to take full effect next month but has been held up in the courts by right-wing judges.

      • Senate Votes Against Biden Vaccine-or-Test Mandate, Thanks to Manchin and Tester
      • Opinion | Covid-19 Proves We Need a Global Public Health System Built on Shared Technology and Public Goods

        Despite multiple technological breakthroughs in the fight to control COVID-19, twice as many people died from it in 2021 compared to 2020. The Omicron variant is a stark reminder that effective vaccines are merely the first step toward ending the pandemic. Until we establish a process to manufacture vaccines at scale and distribute them where they are needed, we will lack the collective capacity to curb this or any future pandemic.

      • Mapped: The Network of Powerful Agribusiness Groups Lobbying to Water Down the EU’s Sustainable Farming Targets

        In February 2021, German agribusiness giant BASF hosted a virtual wine tasting, a seemingly cozy affair swirling glasses of Portugal’s finest in front of a webcam debating the future of EU agricultural policies. Invited to the event was a small group of Members of the European Parliament (MEPs). 

        The MEPs invited were spoiled for choice, as BASF generously delivered six small bottles of fine wines for their enjoyment. Like many corporations, the global COVID-19 pandemic and lack of usual in-person events meant they had to get creative about how to shape the political debate and find new allies to support their agendas.

      • Fuel-Contaminated Water From Aging Navy Facility Sickens Pearl Harbor Families
      • As More Info Emerges on Omicron, Trump’s Old COVID Lies Continue to Kill People
      • Early data on Omicron show surging cases but milder symptoms

        The Delta variant became dominant mainly because of its transmissibility. In contrast, Omicron seems to have advantages in both areas. Anecdotal evidence for its greater contagiousness is mounting: super-spreader events after which 35-78% of people tested positive have occurred in Norway, Denmark, Spain and Britain.

        Moreover, Omicron has unprecedented capacity for reinfection. A recent study led by Juliet Pulliam of Stellenbosch University showed that the number of South Africans who test positive at least 90 days after their last positive test is more than you would expect based on earlier waves. And antibodies generated by Pfizer’s vaccine are less effective against Omicron than against earlier variants. However, they still achieved solid neutralisation in people with booster jabs or prior infections. Current vaccines may offer good protection against severe disease caused by Omicron.

      • New Zealand’s plan to end smoking: A lifetime ban for youth

        New Zealand’s government believes it has come up with a unique plan to end tobacco smoking — a lifetime ban for those aged 14 or younger.

        Under a new law the government announced Thursday and plans to pass next year, the minimum age to buy cigarettes would keep rising year after year.

      • New Zealand Plans to Eventually Ban All Cigarette Sales

        Starting in 2023, anyone under age 15 would be barred for life from buying cigarettes. So, for instance, in 2050 people 42 and older would still be able to buy tobacco products — but anyone younger would not.

      • New Zealand to ban cigarette sales for future generations

        New Zealand plans to ban young people from ever buying cigarettes in their lifetime in one of the world’s toughest crackdowns on the tobacco industry, arguing that other efforts to extinguish smoking were taking too long.

        People aged 14 and under in 2027 will never be allowed to purchase cigarettes in the Pacific country of 5 million, part of proposals unveiled on Thursday that will also curb the number of retailers authorised to sell tobacco and cut nicotine levels in all products.

      • New Zealand to ban cigarettes for future generations

        The move is part of a sweeping crackdown on smoking announced by New Zealand’s health ministry on Thursday.

        Doctors and other health experts in the country have welcomed the “world-leading” reforms, which will reduce access to tobacco and restrict nicotine levels in cigarettes.

    • Integrity/Availability

      • Proprietary

        • Software updates could boost your car’s resale value

          That’s just the beginning of the software-defined dream car, however. It’s also about personalization.

          Unlike their boomer parents or grandparents, who customized their ride with souped-up engines and aftermarket accessories, younger buyers seek to personalize their cars with individual apps and conveniences.

        • Cyber Command Publicly Joins Fight Against Ransomware Groups [iophk: Windows TCO]

          Cybercriminals who launch attacks on critical U.S. companies are going to be targeted by the branch of the military known as Cyber Command, and everyone has been put on notice.

          Gen. Paul Nakasone, who heads up Cyber Command, told the New York Times this weekend that his team isn’t just going after state actors, but that they’re taking on any cybercriminals who attack American infrastructure.

        • 17 Discord malware packages found in NPM repository

          In a blog post published Wednesday, JFrog security researchers Andrey Polkovnychenko and Shachar Menashe detailed how the malicious NPM packages took aim at the popular communications platform with malware and infostealers, including Discord token grabbers; stealing a user’s token would give a threat actor complete control over a user’s account.

          JFrog hypothesized in its blog post that threat actors could use Discord tokens — and by extension, the attached account — for botnets, spreading malware and to resell stolen accounts if the users have Discord’s premium Nitro service.

          Menashe told SearchSecurity the packages were found during routine scanning of the NPM repository.

        • Pseudo-Open Source

        • Security

          • Chrome Users Beware: Manifest V3 is Deceitful and Threatening

            Manifest V3, or Mv3 for short, is outright harmful to privacy efforts. It will restrict the capabilities of web extensions—especially those that are designed to monitor, modify, and compute alongside the conversation your browser has with the websites you visit. Under the new specifications, extensions like these– like some privacy-protective tracker blockers– will have greatly reduced capabilities. Google’s efforts to limit that access is concerning, especially considering that Google has trackers installed on 75% of the top one million websites.

            It’s also doubtful Mv3 will do much for security. Firefox maintains the largest extension market that’s not based on Chrome, and the company has said it will adopt Mv3 in the interest of cross-browser compatibility. Yet, at the 2020 AdBlocker Dev Summit, Firefox’s Add-On Operations Manager said about the extensions security review process: “For malicious add-ons, we feel that for Firefox it has been at a manageable level….since the add-ons are mostly interested in grabbing bad data, they can still do that with the current webRequest API that is not blocking.” In plain English, this means that when a malicious extension sneaks through the security review process, it is usually interested in simply observing the conversation between your browser and whatever websites you visit. The malicious activity happens elsewhere, after the data has already been read. A more thorough review process could improve security, but Chrome hasn’t said they’ll do that. Instead, their solution is to restrict capabilities for all extensions.

            As for Chrome’s other justification for Mv3– performance– a 2020 study by researchers at Princeton and the University of Chicago revealed that privacy extensions, the very ones that will be hindered by Mv3, actually improve browser performance.

          • Over to you MeitY: IFF’s representation on CERT-In’s Responsible Vulnerability Disclosure and Coordination Policy

            CERT-In responded to our representation about the issues with their Responsible Vulnerability Disclosure and Coordination Policy, explaining that the Policy is an executive decision and so must follow the existing provisions of the law. In light of this, we have written to MeitY, asking them to amend the Information Technology Act, 2000 to provide a safe harbour for genuine security researchers.


            On 3rd September 2021, the Indian Computer Emergency Response Team (CERT-In) released its new ‘Responsible Vulnerability Disclosure and Coordination Policy’ with the aim of strengthening trust in the ‘Digital India’ and ‘Make in India’ campaigns, and encouraging responsible vulnerability research. The Policy provides information about where cybersecurity vulnerabilities in products and services can be reported, the details expected in vulnerability reporting, the procedure by which CERT-In will examine and act upon such reports, and the timelines for resolving issues.

            However, the Policy effectively discourages the reporting of vulnerabilities! Clause 7 of the Policy states that: “The reporting party must ensure to comply with all the extant laws and regulations while discovering the vulnerabilities. Reporting a vulnerability to CERT-In does not imply being exempt from compliance. Discloser shall be responsible for any action performed by her/him for discovering the vulnerability whatsoever”.

            In response to this, we wrote to CERT-In on 13th October 2021 indicating our concerns about this provision. In our representation, we highlighted that such a policy may lead to a regulatory regime in which genuine security researchers may be penalised for disclosures. We also stated that Clause 7 of the Policy may also be in conflict with the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013 which adopt a more cooperative and collaborative approach to vulnerability disclosures.

          • Saudi Human Rights Activist, Represented by EFF, Sues Spyware Maker DarkMatter For Violating U.S. Anti-Hacking and International Human Rights Laws

            Loujain Alhathloul Lawsuit Statement“Never have I envisioned myself being recognized for standing up for what I believed was right. My early realization of my privilege to speak up and out for women and myself drove me to engage in the sphere of human rights defenders.“In a 2018 article titled Kidnapped Freedoms, I expressed my understanding of freedom to be safety and peace:

            ‘safety to express, to feel protected, to live and to love.[And] peace to reveal the purest and most sincere humanity implanted deep within our souls and minds without experiencing unforgivable consequences.Deprived of safety and peace, I have lost my freedom. Forever?’“Previously, I had limited consideration of all aspects of harm a human rights defender, or any individual for that matter, could face, especially in the online world. Today, I incorporate online safety as well as protection from misuse of power by cyber companies to my understanding of safety. The latter should be considered a basic and natural right in our digital reality.“No government or individual should tolerate the misuse of spy malware to deter human rights or endanger the voice of the human conscious. This is why I have chosen to stand up for our collective right to remain safe online and limit government-backed cyber abuses of power. I continue to realize my privilege to possibly act upon my beliefs.“I hope this case inspires others to confront all sorts of cybercrimes while creating a safer space for all of us to grow, share, and learn from one another without the threat of power abuses.”For the complaint:https://www.eff.org/document/alhathloul-v-darkmatter

            For more on state-sponsored malware:https://www.eff.org/issues/state-sponsored-malware

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • Trend Micro Incorporated : The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs | MarketScreener

              In this blog entry, we share the findings of an investigation on theinternet of things (IoT)Linux malware and analyzed how these malware families have been evolving. We relied on the tactics, techniques, and procedures (TTPs) of MITRE ATT&CKto define the malware capabilities and characteristics that we saw.

              Our study showed that IoT Linux malware has been steadily evolving, particularly those that are used to createIoT botnets. Capabilities were both added and removed over time. Notably, neither data exfiltration nor lateral movement has been successful for the authors, and they have pivoted instead to centralized infection.

          • Privacy/Surveillance

            • Disrupting Spycraft: Always-On Surveillance Is Prompting Massive Changes In Covert Operations

              The spies are back to complaining that the always-on digital world and the omnipresence of surveillance devices (both public and private) is making it difficult to do spy stuff.

            • Interview With Franco De Bonis – VISUA

              Franco De Bonis: VISUA develops computer vision solutions, which we call Visual-AI. If you feed data into AI, artificial intelligence systems, it looks at all the data points, and it can make logical, human-like conclusions based on how it’s been programmed.

            • Interview With Ziv Cohen – Paygilant

              Ziv Cohen: I’ve been in cybersecurity for about 24 years now, even before it was called cybersecurity. I was actually quite fascinated, because when I started, it was still mostly about networking and the very beginning of securing networks. It really attracted me as, first of all, security is vital; it’s something that every organization needs to have in place. Otherwise, the business simply cannot run because there are always attackers looking to either penetrate and cause havoc, whether for financial gain or information. Security is definitely one of the areas which is changing dynamically, with good and bad guys always trying to challenge the system. This cat and mouse game and the need to be constantly creative, is what pulled me into cybersecurity, and later on, financial fraud and financial crime. Cybersecurity has always been and will always be relevant.

            • Sienna Miller says Sun illegally sought medical records of pregnancy

              The size of the payout is confidential – but it may be one of the largest settlements by Rupert Murdoch’s organisation to victims of phone [cracking].

              In a statement read on Ms Miller’s behalf at the High Court, she described how she felt the Sun “brutally took away her choice” when it allegedly leaked that she was pregnant.

            • Digital Services Act: IMCO report is a missed opportunity in the fight against surveillance capitalism on the Internet

              Breyer sees a new threat to digital privacy and security in a separate vote scheduled for Monday on making publications of pictures and text on adult entertainment portals dependent on providing the operator with the uploader‘s personal mobile phone number. “Because of the foreseeable hacking [sic] and leaks of these porn uploader databases, this identification requirement virtually invites stalking and threats against sex workers, LGBTQI persons, and politically exposed and vulnerable persons. Victims of unwanted intimate recordings are harmed by the displacement of such material to non-EU portals, which simply ignore notifications of illegal material and requests from law enforcement. Accepting the elimination of anonymous publishing as an acceptable deterrent against objectionable content threatens to set a precedent far beyond adult entertainment.”

              In detail, Breyer assesses the result of negotiations with respect to civil liberties as follows: [...]

            • UK Government Says Clearview Owes It $23 Million For Violating Privacy Laws

              Well, it couldn’t happen to a more deserving shitheel. Clearview, the tech company with 10 billion facial recognition images and zero shame, has now been uninvited from the largest portions of the British Empire.

            • The ICO’s announcement about Clearview AI is a lot more than just a £17 million fine

              Following PI’s submissions before the UK Information Commissioner’s Office (ICO), as well as other European regulators, the ICO has announced its provisional intent to fine facial recognition company Clearview AI. But this is more than just a regulatory action.

    • Defence/Aggression

      • Nuns Against Nuclear Weapons: Plowshares Protesters have Fought for Disarmament for Over 40 Years, Going to Prison for Peace

        Rice, who died in October 2021, was part of a protest tradition called Plowshares. Since 1980, there have been over 100 Plowshares actions in the U.S., the U.K. and Europe. The name comes from the books of Isaiah and Micah in the Bible: “They shall beat their swords into plowshares, and their spears into pruning hooks: nation shall not lift up sword against nation, neither shall they learn war any more.” Isaiah and Micah are accepted as Scripture by Christians, Jews and Muslims.

        As a historian studying faith-based calls for nuclear disarmament, I focus on nuns at the forefront of this significant movement. My upcoming book, “Transform Now Plowshares,” shows how they use existing international law and their own creative courtroom strategies to guide U.S. courts and even Congress to include pacifist principles in court records and congressional documents.

      • New Interactive Map Gives Ground-Level Look at High Civilian Toll of Israel’s Gaza War

        A new report and interactive map published Thursday by a leading airstrike monitoring organization offer detailed insight into incidents of civilian harm caused by Israel Defense Forces’ aerial bombardment of Gaza during the May 2021 Operation Guardian of the Walls assault on the Palestinian territory, as well as casualties resulting from militant rocket attacks on Israel.

        “Despite repeated assurances to the contrary, it’s clear that ‘precision warfare’ cannot sufficiently mitigate civilian harm.”

      • Who Killed Malcolm X?

        The exoneration last month of Muhammad Abdul Aziz and Khalil Islam 55 years after their conviction is a major correction of the record on the assassination of Malcolm X. The 22-month investigation conducted by the Manhattan District Attorney’s Office and lawyers for the two men—with additional support from the Innocence Project—culminated in the filing of a joint motion to vacate the two men’s convictions, and accompanying legal analysis. It confirmed what historians, journalists, and scholars have known for years: that the Federal Bureau of Investigation and the New York Police Department withheld key evidence that could have led to the men’s acquittal.

      • Opinion | The Imperialist Agenda of the Organization of American States (OAS)

        After being sanctioned by 25 of its 35 member countries, on November 19, 2021 the government of Nicaragua announced that it was withdrawing from the Organization of American States (OAS). In explaining the decision to leave the OAS, Nicaragua’s Foreign Minister Denis Moncada said, “The OAS continues to be an instrument created by the US to project its meddling and hegemonic policy of intervention, of threat and of aggression against the countries of Latin America and the Caribbean.”

      • Biden’s $650 Million Arms Sale to Saudi Arabia

        On December 7, the US Senate voted 30-67 against a joint resolution (S.J. Res. 31) which would have blocked a $650 million US arms sale to Saudi Arabia.  Only two Republicans voted in favor of the resolution:  Senator Rand Paul of Kentucky and Senator Mike Lee of Utah who had co-sponsored the resolution together with Senator Bernie Sanders (I-VT).  Twenty Senate Democrats voted for the sale to go ahead.

        The $650 million arms sale which the Biden Administration announced on November 4 is for 280 advanced medium-range air-to-air missiles (“AMRAAMs”) and 596 missile launchers.  Raytheon Technologies is the principal contractor in the deal.

      • My Conversation With a Coup Plotter

        The occasion back then was a proposal from candidate Donald Trump to end birthright citizenship. The current requirement that children born here be recognized as U.S. citizens was “the biggest magnet for illegal immigration,” he argued.

        Many conservatives opposed Trump’s claim. It was dismissed in an August 20 Wall Street Journal editorial, and even Berkeley law professor John Yoo, a co-author of the notorious 2002 “torture memos,” differed in an August 22 National Review opinion piece. But John Eastman backed Trump’s fringe position, and he was given two opportunities to defend it on August 24, one in the National Review and one in the Times. (The current online version of the Times op-ed was somewhat updated in December.).

      • Former Trump Aide Mark Meadows Sues to Block Jan. 6 Committee Subpoenas
      • House Passes Largest Military Budget Since WWII Despite Afghanistan War’s End
      • Museum to Melt Down Lee Statue That Inspired “Unite the Right” Violence in 2017
      • On ‘Gassing the Arabs’ and Other Diseases: Is Israel a ‘Sick Society’?

        For whatever reason, some mistakenly perceive the Israeli newspaper, Haaretz, as liberal, progressive and even ‘pro-Palestinian’. Of course, none of this is true. This misconstrued depiction of an essentially Zionist and anti-Palestinian newspaper tells of a much bigger story of how confusing Israeli politics is, and how equally confused many of us are in understanding the Israeli political discourse.

      • US Shouldn’t Be Invited to Summit for Democracy, Let Alone Be Its Host

        This week, the United States is convening a virtual “Summit for Democracy,” the first of its kind in what the State Department hopes to make an annual event.

      • Opinion | 10 Contradictions That Plague Biden’s Democracy Summit

        President Biden’s virtual Summit for Democracy on December 9-10 is part of a campaign to restore the United States’ standing in the world, which took such a beating under President Trump’s erratic foreign policies. Biden hopes to secure his place at the head of the “Free World” table by coming out as a champion for human rights and democratic practices worldwide.

      • EU, US Start To Realize Letting Elon Musk Dictate Global Space Rules Might Not Be The Brightest Idea

        As previously noted, Space X, Amazon, and others are pushing harder than ever into the low-orbit satellite broadband game. The industry, pockmarked by a long road of failures, involves firing thousands of smaller, cheaper, lower orbit satellite constellations into space to help supplement existing broadband services. The lower orbit means that LO satellite service will offer lower-latency broadband than traditional satellite offerings, which for 15 years or so have been widely maligned as expensive, slow, and “laggy,” with annoying monthly caps.

      • US to tighten restrictions on exports of malicious cyber tools

        The Biden administration is expected to announce on Friday an initiative to tighten rules surrounding the exports of certain technologies that have been used by authoritarian governments and bad actors for repression.

        The move comes on the heels of the administration’s sanctioning of the private Israeli spy-ware company NSO Group in November for “malicious cyber activities.”

        The initiative is being announced during the president’s “Summit for Democracy,” a first-ever virtual conference bringing together more than 100 democratic countries in an effort to address rising authoritarianism and efforts to strengthen democracy.

      • Will Pakistan Be the Next Country to Fall to a Taliban-Style Takeover?

        The Pakistani Taliban, responsible for the deaths of 70,000 Pakistanis, are once again at the negotiating table with the governing hybrid regime. Now, with the emergence of the TLP, who come from the other major strain of religious extremism, the stage is set for an eventual confrontation with either or both of these pernicious forces. In the long run, a Taliban-style takeover of the country cannot be ruled out.

      • If the United States pulls back, the world will become more dangerous

        More adaptation to a world with less America will be required. Democracies, especially in Europe, should spend more on defence. Those, such as Taiwan and Ukraine, at risk of being attacked should make themselves indigestible, for example by beefing up their capacity for asymmetric warfare. The better prepared they are, the less likely their foes are to attack them.

      • Terrorism: The Sahel-5 are turning to Russia

        With renewed interest to uproot French domination, Russia has ultimately began its inroads into the Sahel region, an elongated landlocked territory located between north Africa (Maghreb) and west Africa region, and also stretches from the Atlantic Ocean to the Red Sea. While it remains largely underdeveloped and greater part of the population impoverished, terrorist organizations including Boko Haram and Al-Qaeda in the Islamic Maghreb (AQIM) are operating and have contributed to the frequent violence, extremism and instability in this vast region.

        As usually referred to as the G5 Sahel, it consists of Burkina Faso, Chad, Mali, Mauritania and Niger. Besides the instability, these countries are engulfed with various socio-economic problems primarily due to the system of governance and poor policies toward sustainable development. There are, in addition, rights abuse and cultural practices that affect development.

      • Burkina Faso PM resigns following protests over jihadist violence

        President Roch Marc Christian Kabore, who had already changed his military leadership over the security crisis, accepted Prime Minister Christophe Joseph Marie Dabire’s resignation, according to a presidential decree.

        The resignation of a prime minister requires the resignation of the entire government, according to Burkina Faso law.

    • Environment

      • California’s Water Supplies are in Trouble as Climate Change Worsens Natural Dry Spells

        Especially worrying is the outlook for the Sierra Nevada, the long mountain chain that runs through the eastern part of the state. California’s cities and its farms – which grow over a third of the nation’s vegetables and two-thirds of its fruit and nuts – rely on runoff from the mountains’ snowpack for water.

        As an engineer, I have studied California’s water and climate for over 30 years. A closer look at California’s water resources shows the challenge ahead and how climate change is putting the state’s water supply and agriculture at greater risk.

      • How Activism Can Counter the False Solutions to Climate Change

        The many loopholes in the COP26 agreement allow fossil fuel corporations to focus even more on carbon offsetting by rich countries, rather than real zero emissions targets.  These carbon offsetting schemes have been pursued for some time now without adequate environmental and human rights protection measures, thus further endangering Indigenous peoples and communities who risk being evicted from their lands and livelihoods to make way for these harmful schemes.  The failure of COP26 raises the question of who can a beleaguered humanity—especially in the global south—turn to for meaningful action toward mitigation and regeneration of human and non-human communities.

        Movements such as the Sunrise Movement and Extinction Rebellion, as well as alternative grassroots international meetings, will doubtless continue to play an important role.  But there are many efforts that have been engaged in concrete and prefigurative resistance and reconstructive actions well outside of the sphere of petitioning governments for change, actions oriented toward expanding the values and aims of climate justice.  These actions have generally received little acknowledgment or notice, even in alternative media.

      • Storm Drains Keep Swallowing People During Floods

        On the night of Sept. 1, Dhanush Reddy and his fiancee, Kavya Mandli, were returning home from a North Jersey mall when the remains of Hurricane Ida turned their drive perilous.

        Rain pounded down, soaking the streets with so much water that cars stalled and police shut down traffic. They felt their own car rattling, and they abandoned it in a nearby lot. Deciding they’d walk to safer ground where Mandli’s brother could pick them up, they waded hand-in-hand into murky water “until we reached the middle point of the road,” Mandli recalled, “where it just sucked us both inside.”

      • Let’s be Honest About Cattle, Wild Horses, and Climate Solutions

        Despite the Biden Administration’s pledge to cut methane emissions 30 percent by 2030, during the Glasgow Summit Agriculture Secretary Tom Vilsack voiced categorical opposition to reducing livestock. Sen. Grassley (R-IA) conceded that cattle are a significant source of methane emissions and raised concerns that livestock producers could be asked to be part of the climate solution. In response, Secretary Vilsack told the Iowa Capital Dispatch, “With due respect to the Senator, this administration is not going after animal agriculture.” He repeatedly insisted that the administration has no plans to shrink livestock populations.

        But on western public lands, the administration is on a mission to slash wild horse populations, and is not afraid to use climate change as an excuse, despite the fact that cattle and sheep are the ones strongly linked to climate impacts.

      • The Puzzle of Eco-Fiction

        One of the foremost difficulties in confronting the dire reality of climate change remains that of conceptualizing climate itself, of thinking climatologically. This mode of comprehension requires radical reorientations of scale, positioning discrete occurrences as part of immensely larger patterns across vast swaths of time and space. It requires one to look beyond the boundaries of national borders and isolated events. Climatological thinking necessitates a vantage that must at least aspire toward both totality and synthesis without losing sight of the fine-grained details of the local and the particular. To take this mode of thought and translate it into narrative form is key to communicating what is happening on our ever-warming planet. Weaving together the fragmented intricacies of the individual, human experience of climate without losing sight of its vastness is a tall order, but a profoundly necessary one: Telling a story of climate change requires a narrative ambition of planetary scope.

      • ‘Huge Step Forward’: Steven Donziger Transferred From Federal Prison to House Arrest

        Steven Donziger, the U.S. human rights attorney sentenced in October to six months’ incarceration for refusing to hand over privileged client information to fossil fuel giant Chevron, said Thursday that he was released from a federal prison in Connecticut to complete his sentence under house arrest.

        “Prison officials released me this morning to serve the rest of my sentence (136 days) at home,” Donziger tweeted following his release from the Danbury Federal Correctional Institution. Prior to his incarceration, he had spent over 800 days under house arrest.

      • Energy

        • Opinion | Here’s the Fracking Truth About America’s Last Fossil-Fueled Hurrah

          As global leaders struggle to tackle the climate crisis, and as ordinary people worldwide are increasingly whiplashed by high fuel costs, the US government is promising policymakers, industrialists, and investors that there will be decades of growing supplies of fracked oil and natural gas. However, an independent earth scientist with 32 years of experience with the Geological Service of Canada is using the industry’s and government’s own data to show why that’s a dangerous fallacy.

        • Opinion | The Future of Fossil Fuels Hinges on Two Huge Midwestern Pipeline Fights

          The future of the fossil fuel industry depends on an expensive Rube Goldberg technology called carbon capture and storage (CCS), intended to capture billions of tons of hazardous waste carbon dioxide (CO2) from smokestacks and bury it deep underground where optimistic experts say it will remain forever. Pessimistic experts say it won’t work. 

        • Billionaire Used Massive Oil Spill to Avoid Paying Income Tax for 14 Years
        • A Massive Oil Spill Helped One Billionaire Avoid Paying Income Tax for 14 Years

          After the Deepwater Horizon offshore drilling rig exploded in 2010, environmentalists surveying the damage in the Gulf of Mexico came upon a mystery. The water had oil slicks that, because of the currents, couldn’t have originated from the site of the notorious accident.

        • Talk at TTI/Vanguard Conference

          Bitcoin is notorious for consuming as much electricity as the Netherlands, but there are around 10,000 other cryptocurrencies, most using similar infrastructure and thus also in aggregate consuming unsustainable amounts of electricity. This is far from the only externality the cryptocurrency mania imposes upon the world. Among the others are that Bitcoin alone generates as much e-waste as the Netherlands, that cryptocurrencies enable a $5.2B/year ransomware industry, that they have disrupted supply chains for GPUs, hard disks, SSDs and other chips, that they have made it impossible for web services to offer free tiers, and that they are responsible for a massive crime wave including fraud, theft, tax evasion, funding of rogue states such as North Korea, drug smuggling, and even armed robbery. In return they offer no social benefit beyond speculation. Is it possible to mitigate these societal harms?

        • Bitcoin surge was a windfall for white supremacists, research finds

          The cryptocurrency world has grown swiftly in recent years, moving far beyond bitcoin to include a wide variety of alternative digital currencies and blockchain-based systems. Blockchain is a concept in which computer networks work together to create distributed systems that can be used to keep track of everything from digital currencies to ownership of digital art.

      • Wildlife/Nature

    • Finance

      • ‘Total Hypocrisy’: Elon Musk Rebuked for Hit on EV Subsidies After Building Empire With Billions in Taxpayer Funds

        Critics quickly noted the $4.9 billion in government subsidies that helped build Elon Musk’s fortune, after he criticized proposed U.S. federal funding for electric vehicles in an interview this week with The Wall Street Journal.

        “Honestly, I would just can this whole bill, don’t pass it,” said Musk when asked about President Joe Biden’s proposed infrastructure spending.

      • What Should the Democrats Do About Rising Inflation?

        Inflation is a serious problem for the first time in decades. Starting in the late 1960s, the rate of inflation began increasing; 1965’s 1.6 percent rose to a peak of 14.8 percent in 1980. Paul Volcker, then chair of the Federal Reserve, reversed that trajectory in the early ’80s by driving interest rates into the high teens. He created what was then the deepest recession since the 1930s. Unemployment spiked, unions were busted, social spending was cut, and by 1986, inflation was back below 2 percent. The working class, restive throughout the ’70s, was rendered passive and scared. But inflation stayed low, averaging under 2.7 percent from 1983 through 2020 (when it was just 1.2 percent).

      • “Your Debt Is Someone Else’s Asset”: Calls Mount to Cancel Debt & Halt Wealth Transfer to the Rich

        As calls grow for Biden to extend the moratorium on student debt, we speak with the Debt Collective’s Astra Taylor and feature her new film for The Intercept, “Your Debt Is Someone Else’s Asset,” animated by artist Molly Crabapple. The $15 trillion in U.S. household debt is “a form of wealth transfer” from the poor to the rich, Taylor says. “People are in debt by design.”

      • “An Outrage”: House Passes Largest Military Budget in Generations Despite End of Afghanistan War

        President Biden may soon approve the largest military spending bill since World War II, which ramps up spending to counter China and Russia. Separately, the Senate voted down a bipartisan bid by Senators Bernie Sanders, Rand Paul and Mike Lee to halt $650 million in U.S. arms sales to Saudi Arabia amid the devastating ongoing war in Yemen. “The last thing we need to do is be throwing more money at the Pentagon,” says William Hartung, director of the Arms and Security Project at the Center for International Policy. “This whole idea that China and Russia are military threats to the United States has primarily been manufactured to jump up the military budget.”

      • ACTION ALERT: CNN Asks Sinema No Questions About Conflicts

        Sen. Kyrsten Sinema (D.–Arizona) is notorious for being inaccessible to the press—and to constituents—while threatening to tank the Democratic Party’s key social spending bill. As Mother Jones (10/7/21) reported, Sinema has not held a single town hall since her election, doesn’t hold press conferences, and refuses to speak to reporters and constituents alike when approached. So when CNN‘s Lauren Fox (12/2/21) landed a sit-down interview with Sinema, it presented a rare opportunity to do what journalists are supposed to do: hold power to account.

      • Calls for Boycott Grow After Kellogg Says It’s Permanently Replacing Strikers
      • Finally, Speaking Truth to Power

        Taming animal spirits? Domesticating the Wolf of Wall Street? These words prompted recollections of Joseph N. Welch putting to rest the McCarthy era witch hunt for Communists by gently asking the firebrand senator from Wisconsin: “Have you no sense of decency, sir?” on television. Taming bankers in Geneva and asking Joe McCarthy for decency, two sides of an ethical whole.

        Guy Ryder, a former union leader and current ILO chief, pulled no punches in speaking at the second meeting of the Building Bridges Summit. The room was filled with big money honchos and Ryder seized the moment to provoke them.

      • Why Poorer Nations Aren’t Falling for Green-Washed Imperialism

        Discussions on these issues, which are pertinent to resolving the climate crisis, were completely absent from the COP26 agenda, which concluded on November 13. The financing of a low carbon emission path was conveniently delinked from commitments toward cutting down carbon emissions and now faces an uncertain future, with developed countries failing to live up to their earlier “pledge” of providing finance to developing nations to “help them adapt to climate change and mitigate further rises in temperature.”

        Some numbers are important here to understand the extent to which developing nations have contributed to the present climate crisis and to greenhouse gas emissions. The European Union plus the UK (EU-UK) produce more than twice the carbon emissions of the entire continent of Africa, with less than half of Africa’s population. With less than a quarter of India’s population, the United States emits significantly more carbon than India does—almost twice as much.

    • AstroTurf/Lobbying/Politics

      • The State, Friend and Foe

        At the time, the stress of looking for new work, of applying for a doctorate, of maintaining a “budget” so I could occasionally leave the house and grab dinner with friends at places that didn’t have menus smeared with marinara sauce or honey mustard, was contributing to my asthma. For a while, my asthma had been under control but I was feeling also sluggish and not working out as much as I needed to. Consequently, there were nights when I’d be gripping my teeth, gasping for air, feeling as if my chest was caving in.

        Medicaid made it possible for me to go see a doctor for basically nothing and to receive a new prescription for inhalers, something I otherwise would’ve been unable to. When at the doctor’s office, all around me were other downwardly mobile millennials, senior citizens and people who also looked worn out by the magic of the “free market”, where getting what one needs has to be attached to a price-tag. Medicaid was a brief reprieve from that unyielding world, a world that pretty much exists everywhere else, immediately when one’s doctor visit is over.

      • ‘Pass BBB Now,’ Jayapal Demands as Senate Hold-Up Threatens to Delay Key Child Benefits

        Rep. Pramila Jayapal on Wednesday pressured her Democratic colleagues in the Senate to urgently pick up the pace of Build Back Better negotiations amid warnings that key child benefits could be delayed if talks spill over into the new year.

        “Delays to passing Build Back Better have real consequences on families,” Jayapal, chair of the Congressional Progressive Caucus, wrote on Twitter, pointing to a HuffPost report noting that expanded Child Tax Credit (CTC) payments for the month of January could be held up if Democrats don’t complete work on their $1.75 trillion reconciliation package in the coming days.

      • ‘Big Step for Democracy’: NC Supreme Court Delays Primaries Over Gerrymandered Maps

        Voting rights advocates on Wednesday hailed a state Supreme Court order in North Carolina as a victory for democracy as the court cited the state’s gerrymandered district map as its reason for delaying the 2022 primaries by two months—but noted that the fight for a fair map is not over yet.

        Following the court’s preliminary injunction, voters in North Carolina will go to the polls on May 17 instead of March 8 due to ongoing litigation over the new district map, which was drawn by Republican state lawmakers and was expected to give the GOP at least 10 safe seats in the U.S. House out of the state’s 14 seats.

      • How Europe’s “Shadow Immigration System” Pays Libyan Militias to Jail Migrants in Brutal Conditions

        An explosive new investigation details how the European Union has created a shadow immigration system that captures migrants arriving from Africa before they reach Europe and sends them to brutal militia-run detention centers in Libya. “This is a climate migration story,” says Ian Urbina, investigative journalist and director of The Outlaw Ocean Project, who authored the report for The New Yorker magazine. “The policy of the EU of outsourcing migration control to a failed state in Libya … is a really doomed strategy, and it’s only going to get more perilous as more waves of people start trying to reach safer places.” Urbina’s piece is titled “The Invisible Wall: Inside the Secretive Libyan Prisons That Keep Migrants Out of Europe.”

      • ‘An Escalation We’ve Been Expecting’: New York AG Seeks Donald Trump’s Testimony in Civil Fraud Probe

        This is a breaking story… Please check back for possible updates…

        New York Attorney General Letitia James seeks to question former President Donald Trump under oath for her investigation into possible fraud within the Trump Organization, multiple media outlets revealed Thursday.

      • Opinion | Why We Urgently Need Media Outlets for the Common Good

        Donald Trump—the most corrupt president in our history—is getting better press right now (and has for 6 years) than Joe Biden, who is working to restore democracy and sanity to our country. Where the hell did this come from?

      • Biden Commerce Secretary Panned for Remarks ‘In Defense of Big Tech Monopolies’

        Comments made Wednesday by the Biden administration’s Secretary of Commerce Gina Raimondo expressing concern about legislative proposals in the European Union tackling Big Tech’s power elicited a chorus of criticism from monopoly opponents.

        In video remarks flagged by technology company coalition Chamber of Progress, Raimondo addresses the Digital Markets Act (DMA) and Digital Services Act (DSA), which she said she understands to be “moving quickly through the E.U.’s legislative process.”

      • Defend Socialism in One Demographic!

        Established in 1936 as a pillar of the hugely popular President Franklin D. Roosevelt’s New Deal, it sought to establish a floor benefit for elder workers and the disabled that would at least keep a roof over their heads, whether their own or a relative’s, and allow them to buy the food they’d need to survive.

        That program, astonishingly, has proven so successful that despite generations of Republican — and some conservative corporatist Democratic politicians’ efforts to undermining it — has endured largely intact for almost 86 years.

      • How the Age of Trump Has Changed Fandom

        And don’t think this was purely a baseball phenomenon. I can’t wait to see who will be competing in next February’s Super Bowl, although the most obvious early contenders are homophobia, sexism, and vaccination misinformation. As for the basketball, hockey, and Olympic seasons, I’m putting my money on the likelihood that predatory sexuality, financial inequality, and transgender discrimination will be right up there alongside the commercials for Nike and gambling.

        I consider all this the upshot of what appears to be a shift in the very nature of fandom, a moral drift. Fandom has traditionally been mostly regional. In recent years, however, it has begun to take on the worst of the corrupted tribalism that has dominated so much of life outside the arena, the ballpark, and the stadium ever since Donald Trump became America’s coach. Before that, sports was generally considered a crucible for character, a place to define righteous principles, or at least to pay lip service to the high road, whether anyone was on it or not.

      • Despite Trump Abuses, 208 House Republicans Vote Against Bill to Ensure ‘No President Is Above the Law’

        As the Democrat-led U.S. House of Representatives voted Thursday almost entirely along party lines in favor of proposed legislation to curb executive power and bolster transparency, proponents of the bill urged the Senate to pass the measure to help “restore the balance of powers and fix our democracy.” 

        “It’s time for lawmakers of both parties in the Senate to take up the mantle and swiftly pass the Protecting Our Democracy Act. The integrity of our country’s most powerful office is at stake.”

      • Big Business Lobby Taps Trump’s ‘Chief Union-Buster to Kneecap’ Worker Rights

        The public interest organization Revolving Door Project on Thursday accused two big business groups of “kneecapping workers’ rights” with the hiring of Philip Miscimarra, former chair of the National Labor Relations Board, to lead their campaign in favor of a Trump-era anti-union rule.

        The U.S. Chamber of Commerce and the International Franchise Association (IFA) support the 2020 joint employer rule that was finalized by the NLRB in 2020 during Miscimarra’s tenure.

      • China courts global capital, on its own terms

        Asymmetric decoupling raises two questions. One is whether America’s approach is effective. The more it punishes Chinese firms, whether those listed in America or those that buy American high-tech components, the more China develops its own capabilities, undermining American pre-eminence and creating alternatives for third countries to use. That could leave America with less global influence, not more.

        The other question is where else China will apply its asymmetric strategy. It can already be seen in the commodities industry, with more trading happening on the mainland, and in tech, where China is trying to develop home-grown semiconductors. But the most glaring dependence of all that China has is on America’s currency, which is used for most cross-border payments and which exposes it to sanctions and the threat of exclusion. If Mr Xi cannot tolerate a ride-hailing firm being listed in New York, it is a good bet that he is even less keen on China being subordinate to the greenback. He is surely doing everything within his powers to develop an alternative.

      • Why Don’t We Call Corporate Handouts “Corruption”?

        Definitionally speaking, preserving, and propping up a health care system based around private health insurance — instead of establishing a universal, single-payer program — means allowing for different tiers of coverage. It also allows for the continued existence of a significant and durable health care under-class: 28 million Americans were uninsured last year.

        If the Biden administration was concerned about everyone having quality health care — or about disparities in care — they would not be working to put more people on private insurance. But that’s exactly what they and Democrats have done.

      • YouTuber sends AirTags to North Korea to put DHL shipping claims to the test

        After receiving identical letters about the packages (of which he had the current location) being lost despite an investigation, and with the packages later being found, he speculated that this could be because DHL finds it more cost-effective to just pay off customers rather than actually searching for missing items. Check out his video below.

      • Apple AirTags Sent to North Korea Exposes DHL Tracking ‘Fraud’

        The AirTag that was mailed to North Korea, however, never even got there. Even though the YouTuber could see its location pinging from one of DHL’s logistics facilities in Frankfurt, Germany, DHL insisted the package was lost despite the company’s best efforts to locate it and offered to reimburse him for its contents.

        MegaLag refused the refund and sent another AirTag to North Korea in the meantime. The very next day after refusing the refund, DHL magically located the original package and sent it on its way to North Korea via Beijing, China.

      • New German Government is Pro-Encryption and Anti-Backdoors

        I hope this is true: [...]

      • Bugs in our Pockets: The Risks of Client-Side Scanning

        Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS). Instead of weakening encryption or providing law enforcement with backdoor keys to decrypt communications, CSS would enable on-device analysis of data in the clear. If targeted information were detected, its existence and, potentially, its source, would be revealed to the agencies; otherwise, little or no information would leave the client device. Its proponents claim that CSS is a solution to the encryption versus public safety debate: it offers privacy — in the sense of unimpeded end-to-end encryption — and the ability to successfully investigate serious crime. In this report, we argue that CSS neither guarantees efficacious crime prevention nor prevents surveillance. Indeed, the effect is the opposite. CSS by its nature creates serious security and privacy risks for all society while the assistance it can provide for law enforcement is at best problematic. There are multiple ways in which client-side scanning can fail, can be evaded, and can be abused.

    • Misinformation/Disinformation

      • Yet Another Study Shows Mainstream Media Is A Key Vector In Spreading Misinformation

        The common “accepted knowledge” these days among many is that the rise of disinformation and conspiracy theories must be driven by social media, and Facebook in particular (with Twitter and YouTube right behind). This theory has always seemed a bit bonkers, and we’ve pointed to multiple detailed, data-driven studies that showed that cable news was a much bigger driver of misinformation than social media. Specifically, it found that conspiracy theories and misinformation and the like didn’t actually “go viral” until after it appeared on cable news.

      • Tackling COVID disinformation with empathy and conversation

        For example, a centre in the state of Baden-Württemberg provides telephone counselling. According to its annual report many people ask questions such as: “How can we deal with those who believe in conspiracy theories?” or “Are there conversation strategies to convince the other person that he is wrong?”

        Baden-Württemberg centre staff handled more than 300 requests for advice and information in 2020. The largest category was inquiries about conspiracy theories. Similar centres to counter the negative impact of conspiracy theories are in Berlin and North Rhine-Westphalia.

        Studies repeatedly reveal an association between the belief in conspiracy theories and the rejection of sometimes life-saving preventive measures such as vaccinations. In Germany research has linked a higher acceptance of misinformation to support for the far-right AFD party as well as a reliance on social media for news. And even before the pandemic, studies found that exposure to conspiracy theories can lead to people making decisions that are hazardous to their health.

    • Censorship/Free Speech

      • Social Media Companies Want to Co-opt the First Amendment. Courts Shouldn’t Let Them.

        In two cases that could have sweeping implications for free speech online, social media companies including Facebook, YouTube and Twitter are challenging new laws in Florida and Texas that limit their ability to decide which content appears on their platforms.

        The companies are right that the laws violate the First Amendment, but some of the arguments they are making are deeply flawed. If these arguments get traction in the courts, it will be difficult for legislatures to pass sensible and free-speech-friendly laws meant to protect democratic values in the digital public sphere.

      • Is Self-Censorship a Problem for Writers?

        Anyone who came to PEN America’s town hall discussion on writers and self-censorship on Wednesday night expecting the romanticized literary fisticuffs of yore — let alone the total war of modern social media combat — would have come away disappointed.

        No one shouted “cancel culture!” in the semi-crowded theater on Manhattan’s Upper West Side. But what the 100 or so live spectators (and those who tuned in online) did get was a sprawling, impassioned but overwhelmingly civil conversation among four prominent writers about art, identity, appropriation and the state of free expression.

      • Russia Doubles Down On Censorship With Expanded Block On Tor

        The Russian government has fully blocked the web anonymity service Tor, after days of blocks by individual internet service providers (ISPs).

        Russia accounts for 15 per cent of all Tor users, with some 300,000 daily users – second only to the US. The service allows users to evade network surveillance or traffic analysis by routing internet traffic through a relay network, disguising users’ IP addresses.

    • Freedom of Information/Freedom of the Press

      • Incarceration of Journalists Hits All-Time High Amid ‘Growing Intolerance of Independent Reporting’

        Nearly 300 journalists are currently languishing behind bars around the globe—an all-time high in recorded history—according to a new report published Thursday by the Committee to Protect Journalists, which described 2021 as “an especially bleak year for defenders of press freedom.”

        The U.S.-based nonprofit’s annual prison census found that 293 reporters were incarcerated worldwide as of December 1, up from the previous record-high of 280 last year.

      • Demands to ‘Free Assange Now’ Surge Ahead of Ruling on US Extradition

        A U.K. court is set to rule Friday on whether WikiLeaks publisher and journalist Julian Assange can be extradited to the United States, an impending decision that led press freedom advocates and human rights campaigners to redouble their calls for his immediate release.

        “We fully believe that Assange has been targeted for his contributions to journalism.”

      • Assange judge is 40-year ‘good friend’ of minister who orchestrated his arrest

        Lord Chief Justice Ian Burnett, the judge that will soon decide Julian Assange’s fate, is a close personal friend of Sir Alan Duncan, who as foreign minister arranged Assange’s eviction from the Ecuadorian embassy.

        The two have known each other since their student days at Oxford in the 1970s, when Duncan called Burnett “the Judge”. Burnett and his wife attended Duncan’s birthday dinner at a members-only London club in 2017, when Burnett was a judge at the court of appeal.

        Now the most powerful judge in England and Wales, Burnett will soon rule on Assange’s extradition case. The founder of WikiLeaks faces life imprisonment in the US.

      • Number of jailed journalists reached global high in 2021, at least 24 killed for their coverage – CPJ report

        The number of journalists worldwide who are behind bars reached a global high in 2021, according to a new report from the nonprofit Committee to Protect Journalists, which says that 293 reporters were imprisoned as of 1 December this year.

        At least 24 journalists were killed because of their coverage, and 18 others died in circumstances that make it too difficult to determine whether they were targeted because of their work, the CPJ said on Thursday in its annual survey on press freedom and attacks on the media.

      • D.C. council renames the street in front of the Saudi embassy after Jamal Khashoggi

        Local officials in Washington, D.C., have passed a bill that will name a portion of the street outside the Saudi embassy after slain Washington Post journalist Jamal Khashoggi.

        The ‘Jamal Khashoggi Way Designation Act,’ which passed unanimously on Tuesday, will serve as a reminder of the dangers faced by journalists across the world, noting that a free press is “fundamental to our democracy,” said D.C. councilmember Brooke Pinto in a statement.

      • Julian Assange to find out whether High Court will overturn extradition decision

        However, he said four “binding” diplomatic assurances had been made, including that it would consent to him being transferred to Australia to serve any prison sentence he may be given, which “fundamentally change the factual basis” of her judgment.

    • Civil Rights/Policing

      • What Will It Take to Build a Mass Movement for Abortion Rights?

        On December 1, the Supreme Court’s conservative justices sat down to consider how, exactly, they might overturn Roe v. Wade. During arguments over Mississippi’s ban on abortion after 15 weeks of pregnancy, Justice Amy Coney Barrett seemed to suggest that being forced to give birth is no big deal, because you can drop the baby off at a designated “safe haven” for adoption. Justice Brett Kavanaugh rattled off a list of times the court has overturned precedent, suggesting he is considering doing just that when it comes to abortion.

      • ‘History Made!’ Buffalo Starbucks Workers Vote to Form Chain’s First Union in US

        Progressive media organization More Perfect Union reported that the votes at a third Buffalo-area store were in, with 15 people voting to unionize and nine people opposing unionization.

      • Protect Human Rights Day, Every Day
      • Student Worker Strike at Columbia University Hits Boiling Point

        The graduate student worker strike that began in early November at Columbia University in New York City has reached a breaking point, as administrators have threatened to fire researchers and instructors who continue to withhold their labor in an effort to win better pay, comprehensive healthcare, and protection from discrimination and harassment.

        Over the past six weeks, roughly 3,000 student workers at Columbia have made clear that the Ivy League school depends on poorly paid research and teaching assistants to function. University human resources vice president Dave Driscoll admitted as much last week when he sent an email informing workers that they would be replaced if they remain on strike beyond Friday.

      • Opinion | With Billions in Profit, Amazon Can’t Mistreat Their Workers Forever

        The National Labor Relations Board, or NLRB, just ruled that a historic union vote among Amazon warehouse workers in Bessemer, Alabama was not valid.

      • Buffalo Workers Overwhelmingly Vote to Form First-Ever Starbucks Union
      • People in Prison Organize Collectively for Survival. We All Need to Learn How.
      • Law & Order Taught Americans to Root for the Police

        This is why Law & Order has run for over 30 years, showing all manner of police violence, coerced confessions, and blatant violations of the law and a suspect’s rights. People not only watch faithfully, but root for the police and the prosecutor. Many episodes tell you a story about an evil person doing evil things for evil’s sake, the morally bankrupt defense attorney representing them, and the heroic police and prosecutor who must stop them. So when a detective does happen to beat someone to a pulp or coerce a confession, viewers see it as a necessary evil, or at least justified.

        Until our most basic intuitions about the criminal legal system change, the system itself will never change. We need to move away from the Law & Order mindset, which taught us to root for the prosecutors and despise defendants, to assume anyone accused of a crime is guilty, to see those who break the law as evil or cruel, rather than victims of circumstances created by a society that accepts poverty and inequality.

      • Man who filmed trooper sleeping in cruiser was pulled over moments later by Massachusetts State Police

        The man who filmed a Massachusetts State Trooper sleeping in his cruiser on the side of the highway has told MassLive he was pulled over by a state trooper just moments after filming the video.

        Nick Ford of Marlborough said he was pulled over by a state trooper roughly three minutes after he confronted the trooper who appeared to be sleeping in his cruiser.

        The trooper who pulled him over informed Ford he was pulled over for using an electronic device. Ford disputes this claim. He was pulled over while heading west on Interstate 290 before rerouting back east to his original direction.

      • Schrems vs. DPC Battle Heats Up, as New Document Suggests Irish Privacy Body Tried to Weaken GDPR

        The privacy campaigner Max Schrems has been doggedly fighting to force Facebook to respect EU users’ privacy for nearly a decade now. As this blog has reported, there have been many twists and turns in the saga. Earlier this year, it seemed that the key player responsible for enforcing the protection of Facebook users in the EU, the Irish Data Protection Commission (DPC), was finally about to deliver its decision on Facebook’s EU-US data flows. But there was another major plot twist in October, when Schrems’ organization NOYB (“none of your business”) published a draft version of the DPC’s decision.

        It contained a bombshell: according to NOYB, “In the DPC’s view Facebook can simply choose to include the agreement on data processing in a “contract”, which would make the GDPR requirements for “consent” not apply anymore.” Although that sounds innocuous enough, it effectively guts one of the key features of the GDPR. The Norwegian data protection authority has said that the right to privacy and data protection would cease to exist if the DPC draft decision is allowed to stand. Schrems explains: [...]

      • Jussie Smollett found guilty for filing false police report in hoax attack

        Smollett, 39, received widespread support in the wake of the attack and made an emotional appearance at a concert in early February 2019, but then word emerged after authorities spoke to the Osundario brothers’ return from overseas that the attack was allegedly a hoax. Smollett was charged on Feb. 20, 2019, with Chicago Police Superintendent Eddie Johnson saying the attack was orchestrated because he was unhappy with his salary on the Fox hit show.

      • Actor Jussie Smollett found guilty of falsely reporting a hate crime against him in 2019

        “For the next three weeks, these 26 Chicago officers spent 3,000 hours of time costing the city well over $100,000 for a fake crime that never occurred,” Webb said. “And by the way, a fake crime that denigrates what a real-hate crime is and to use these meanings and symbols that are so important in our society. It’s clear why the police would take it seriously.”

      • Virtual Worlds, Real People: Human Rights in the Metaverse

        Extended Reality (XR) technologies, including virtual and augmented reality, are the foundations of emerging digital environments, including the so-called metaverse. They are still at an early stage of development and adoption, but Big Tech is investing heavily in these technologies, and there is a scramble to assert dominance and cement monopolies in what tech investors and executives claim will be the next generation of computing and social media.

        Like any other technology, XR can have many positive impacts on our daily lives. It can be a useful tool in areas like medicine, science, and education. Artists are using XR creatively to make virtual worlds their canvas and create new forms of expression. Protests and social movements have also used these technologies to raise awareness on collective issues, or to make their voice heard when it is physically impossible or dangerous.

        Yet XR also poses substantial risks to human rights. VR headsets and AR glasses, coupled with other wearables, could continue the march towards ever-more-invasive data collection and ubiquitous surveillance. This data harvesting, sometimes done by companies with a history of putting profit before protections, sets the stage for unprecedented invasions into our lives, our homes, and even our thoughts, as data collected by XR devices is used for targeted advertising and to enable new forms of “biometric psychography” to make inferences about our deepest desires and inclinations. Once collected, there is little users can do to mitigate the harms done by leaks of data or data being monetized by third parties. These devices will also collect huge amounts of data about our homes and private spaces, and could allow governments, companies, and law enforcement illegitimate access to our lives, exacerbating already severe intrusions on our privacy. 

      • Virtual worlds, real people: human rights in the metaverse

        December 10 is International Human Rights Day. On this day in 1948, the U.N. General Assembly adopted the Universal Declaration of Human Rights, the document that lays out the principles and building blocks of current and future human rights instruments. In honor of this anniversary, Access Now and the Electronic Frontier Foundation (EFF) are calling upon governments and companies to address human rights in the context of virtual and augmented reality (VR and AR) and ensure that these rights are respected and enforced.

        Extended Reality (XR) technologies, including virtual and augmented reality, are the foundations of emerging digital environments, including the so-called metaverse. They are still at an early stage of development and adoption, but Big Tech is investing heavily in these technologies, and there is a scramble to assert dominance and cement monopolies in what tech investors and executives claim will be the next generation of computing and social media.

        Like any other technology, XR can have many positive impacts on our daily lives. It can be a useful tool in areas like medicine, science, and education. Artists are using XR creatively to make virtual worlds their canvas and create new forms of expression. Protests and social movements have also used these technologies to raise awareness on collective issues, or to make their voice heard when it is physically impossible or dangerous.

    • Internet Policy/Net Neutrality

      • FCC Gets Its First Permanent Female FCC Boss Ever

        The US Senate this week approved a new five-year term for Federal Communications Commission Chairwoman Jessica Rosenworcel, making her the first permanent FCC chair in agency history. Technically the first female chair was Mignon Clyburn, who temporarily served as interim chair before Tom Wheeler was appointed boss back in 2013. Rosenworcel’s term was set to expire at the end of the year, raising some concerns that her re-nomination would stall, leaving the GOP with a 2-1 FCC majority at Biden’s FCC.

      • Why we will win the war for general-purpose computing

        Recent online articles have sounded the alarm over an escalating “war” on General Purpose Computing (GPC). Tech Giants have consolidated more power during the pandemic and are flexing their muscles, locking down systems more tightly, and becoming audacious in their open disrespect for digital rights and privacy. Much of this occurs under the pretext of security or compliance. Personal computers, once tools of choice, are being recklessly pushed aside in some societies in favour of “necessary” always-on, permanently connected mobile appliances.

        Here I hope to offer a different perspective and explain why, as a technological optimist 1, I don’t think this will work out. In this essay we will examine why there’s a problem, and make the case that advanced technological societies must always retain open, general purpose personal computers, strictly under the control of their users, and that the market for these is set to grow.

    • Monopolies

      • Copyrights

        • YouTuber Has 150 Anime Reviews And ‘Let’s Draws’ Hit With Copyright Claims All At Once

          As has been a hot topic of discussion of late, YouTube has a copyright enforcement problem on its hands. To be fair, this problem has existed for some time, but due to some recent transparency from YouTube itself over how often it receives claims and enforces them, the scale of this problem is becoming more widely known. In YouTube’s minor defense: this is difficult challenge to overcome. The platform operates internationally, which means that it often finds itself attempting to navigate the nuances of copyright laws throughout the world. Still, to say it’s not a problem would be silly. And, frankly, YouTube’s creative community is becoming more and more vocal about it.

        • The Canadian Government’s Groundhog Day Copyright Consultations: The Never-Ending Lobbying Battle for Website Blocking and Weakened User Rights Continues

          Instead, the departments – pressured by lobby groups – launch new consultations seemingly designed to wear down the thousands of Canadians that have actively participated in past consultations and processes, only to find the government asking the same questions yet again. The failure to act on past reviews alongside these new consultations suggests a marked departure from the government’s prior commitment to a balanced copyright policy approach, jeopardizing the confidence of Canadians in copyright policy development. Indeed, if that weren’t enough cause for concern, another consultation may be just around the corner as the next statutorily mandated review of the Copyright Act is presumably set to start next year.

        • Sharing in the presence of computers and corporations

          Things changed gradually, but this is one of the milestones that I remember: when IBM mined Creative Commons-licensed photos for machine learning. The initial news reports said Flickr “handed over” the photos, then the correction was that they didn’t have to, because the license permitted the usage. What IBM did wasn’t nefarious, it was perfectly within the letter of the law. Was it in the spirit of the law? In one sense, it was IBM creating a product with unpaid labor. But also, their intent was to make more equitable algorithms. It’s a mixed bag.

          But anyway, things got worse. A culture emerged from re-uploading Creative Commons videos on YouTube and profiting from the ads. I stopped licensing anything as Creative Commons, because it would inevitably be used on some content farm or sold in some fashion. My art would end up on a print-to-order site like RedBubble on a mug somewhere. My writing would be copied for SEO spam. It was easier to picture nefarious uses than creative ones.

          On the code side, those companies that were brave enough to keep their products open source had their products whitelabeled by mega-cloud vendors, which pushed the open source companies to make their products less open. I saw this first-hand at a company that built foundational open source technology and decided to do the same.

        • Toei YouTube Blitz Shows That ‘Law of Content ID’ Can Trample Fair Use

          Manga fans are responding with anger and disbelief after Toei Animation filed 150+ copyright takedowns against Totally Not Mark, decimating his YouTube channel and putting the popular reviewer’s livelihood in jeopardy. As cries of ‘fair use’ echo around the internet, it’s worth highlighting how YouTubers sit on a knife-edge when it comes to Content ID.

        • Screener of Japan’s Oscar Contender “Drive My Car” Leaks Online

          Pirated copies of Japan’s Oscar contender “Drive my Car” appeared online over the past few hours. The critically acclaimed film may very well be the first Oscar screener to leak after physical copies were banned by the Academy. At the same time, the pirate release group “OSCAR” comes with an interesting angle too.

        • Public Domain 2022: Join us 20 January for a Celebration of Sound

          Every year, on 1 January, advocates of free and open content celebrate the works of art that have entered the public domain around the world. Why New Year’s Day? Copyrighted works such as books, artworks or music are only protected for a certain number of years, and this protection ends on 1 January.

        • Newspapers vs Big Tech: Antitrust Tackles the Problems That Copyright Just Can’t Fix

          Strip away all the ornamental complexity and it’s obvious that the surveillance advertising industry is designed to shift value from advertisers and publishers to Big Tech

          The evidence that Google and Facebook rigged this market is strong. Strip away all the ornamental complexity and it’s obvious that the foundations of the surveillance advertising industry are designed to shift value from advertisers and publishers to the tech companies that operate the “real time bidding” exchanges that process hundreds of billions in ad dollars.

          The UK Competition and Markets Authority’s wide-ranging and comprehensive study of the ad-tech marketplace found many ways in which these markets were rigged to the detriment of publishers, and unsealed documents from antitrust prosecutions in the USA revealed explicit, undeniable collusion between the tech giants.

Linux Besieged

Posted in GNU/Linux, Kernel at 9:11 am by Dr. Roy Schestowitz

Video download link | md5sum f2474190dbfcec4aba4f2d4e6c28f46a

Summary: Linux as a project and as a brand is being undermined by monopolies, whose so-called ‘Linux’ Foundation is more like an openwashing incubator

THE past few days we saw loads of fluff from Zemlin’s PAC and from Mr. Zemlin himself. Was it a distraction? A countermeasure? It’s hard to know for certain, but surely Linux is besieged by people who don’t care about Linux and never use Linux, causing severe branding issues.

As noted in the video above, there are trademark violations by a trans artist (made apparent again last night) and even worse things, e.g. a legal case where a “Linux partition” was brought up in news sites like a dozen times this past week, sort of connecting it to child pornography (links omitted intentionally). Are we actually advancing Linux as a project and as a brand?

“Are we actually advancing Linux as a project and as a brand?”With the Southern Poverty Law Center associating/connecting Free software to extremism (it’s doing the same thing to Bitcoin this week) we need to be carefully watching to avert severe brand erosion. The brand “Linux” took more than 30 years to build (millions of people promoted this brand), but over the past 3 years Zemlin’s PAC has done severe damage to the brand, associating it with some of the very things Linux is against. This is how Zemlin and his friends make a lot of money — essentially killing the brand and sending its owner (trademark holder) to see therapists as if he was mentally sick, admitting culpability in a forced public ‘apology’. The Communist regime in China and the Soviets, sometimes even Iran’s merciless autocracy, are renowned or notorious for yielding false confessions of this kind. It’s blackmail.

Anyway, given what we wrote about the IRS status, Zemlin going into ‘hiding’, and Microsoft domestic violence being covered by the heads of the board (at the Linux Foundation) we thought it would be worth expressing or putting into words the dire situation, which is getting worse before it gets any better.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts