Links 19/2/2022: Libinput 1.20.0 and Fedora Woes

Posted in News Roundup at 5:16 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • 5 Reasons Why Linux Uses the Command Line So Much

      Have you ever wondered why the command line is such an important part of the Linux ecosystem? Here’s the answer.

      When you start using Linux, you’ll find that the system relies on the command line much more than other operating systems despite the presence of numerous desktop environments. Why is this?

      There are a lot of reasons for the command line being an essential part of the Linux ecosystem.

    • Visually Transform Your Arch Linux with Stunning XMonad WM Setup

      This article gives you a step-by-step installation guide for the xmonad setup in Arch Linux with a custom pre-configured script.

    • Chromebook (Desktop/Laptop)

      • Friday Night Funkin Chromebook installation guide

        In this Friday Night Funkin Chromebook guide, we will explain what the game is, where you can play it online in your web browser, and finally how to install Friday night Funkin on your Chromebook device if you wish to play it offline.

        Friday Night Funkin is not available in the Google Playstore, so the method to install it on your Chromebook requires downloading the Linux version of the game and a bit of tinkering in the Crosh Shell terminal to be able to run it, but worry not – as long as you follow the steps of this guide exactly the process is not difficult. You might also learn a thing or two about your Chromebook device along the way! Read on to find out more.

      • If Windows 11 Isn’t Your Flex, This New Chrome OS Offers An Alternative – PC Perspective

        For systems lacking TPM 2.0 and those simply not interested in moving to Windows 11, the new Chrome OS Flex offers an alternative for now, and perhaps past Oct. 14th, 2025 when Windows 10 hits it’s EOL; at least that’s the date as of now. This is not an OS for the technically inclined, such as those reading this, for a Linux distro will be more powerful and adroit at running the various emulators and applications we use. Instead Chrome OS Flex is a watered down Linux OS designed for the non-technically inclined that just want a computer that works.

        The hardware requirements are light, you need is a computer which can boot from USB and has a 64bit x86 processor, as well as 4GB of RAM and 16GB of local storage; sorry no ARM support at this time. The interface is similar to Chrome OS’s Gentoo heritage using the Aura Shell, but taking advantage of Google’s purchase of NeverWare. Prior to being absorbed into Google, NeverWare streamlined the arcane process of installing Chrome OS on a non-Chromebook with their CloudReady product and that is where Chrome OS Flex came from.

      • Chrome OS Flex is an ideal off-ramp for millions of PCs that can’t run Windows 11

        Viewed from early 2022, that date is still comfortably far off. Many Windows 10 PCs will break over the next three and a half years, and plenty of people who want to upgrade to nicer or faster hardware will have opportunities to do so. But those who enjoy repairing, maintaining, and upgrading older hardware to keep it useful will be peering over the edge of that Windows 10 update cliff before they know it.

        So what happens to that hardware when Windows 10 goes away? Running Windows 11 on unsupported hardware is one possible solution, but we have no idea how long Microsoft will allow users to install, run, and update Windows 11 on older PCs. The company could cut off these computers’ security updates tomorrow, or it could allow them to run the new OS indefinitely. That uncertainty is hard to plan around.

        Switching to a Linux distribution—particularly the more user-friendly distributions like Ubuntu, Mint, or Elementary OS—is another option. But “user-friendly” is relative, and any Linux distribution can have parts that are obtuse and difficult for newcomers to learn. And let’s face it, if a Linux distribution was going to truly compete with and succeed against Windows on consumer desktops and laptops, it probably would have by now.

      • Google’s Chrome OS Flex could revive old PCs, Macs

        Google has announced early access to a new version of Chrome OS called Flex, which runs on ordinary x86 hardware, offering the chance to revive older PCs or even out-of-support Macs.

        The year of Linux on the desktop actually arrived a few years back, but the world didn’t notice. Chromebook sales did great early last year, although they did tail off later. Sure, the numbers are dropping this year – but some 50 million customers now have quite new ones.

        Chrome OS is a specialised Linux distro, originally based on Gentoo, with the Aura Shell (“ash”). It has a fancy partitioning system with duplicate root partitions which update one another, allowing rollback of unsuccessful updates.

        Chrome OS is much more like a normal Linux distro than Android, but Chromebooks have their own special firmware based on coreboot. Both Chrome and Chrome OS have open-source upstreams called Chromium, meaning there is a free ChromiumOS, but despite multiple different efforts, it wasn’t easy to install on an ordinary PC.

        Before its acquisition, NeverWare turned this arcane process into a freemium product called CloudReady. Google acquired NeverWare in 2020, and Chrome OS Flex is the result.

      • Chrome OS Flex isn’t the solution for Chromebooks past their software support date [Ed: Wipe ChromeOS off these laptops and install a 'proper' GNU/Linux distro instead]

        If you thought Chrome OS Flex was going to be the official method to get additional software support on an old Chromebook, think again. According to a Google support page, it’s not recommended to install Chrome OS Flex on your Chrome OS device. For now, Chrome OS Flex isn’t the solution for Chromebooks past their software support date.

    • Server

      • Against The Cloud

        One of our writers is working on an article about hosting your own (project) website on your own iron, instead of doing it the modern, cloudy-servicey way. Already, this has caused quite a bit of hubbub in the Hackaday Headquarters. Who would run their own server in 2022, and why?


        If you just want a service, you can be served. But if you want to be a server, a first-class Internet citizen, with your own cloud in the sky, nothing’s stopping you either. And in contrast to using someone else’s computers, running your own is an invitation to play. It’s a big, Internet-connected sandbox. There are an infinity of funny ideas out there that you can implement on your own box, and a lot to learn. If you hack on someone else’s box, it’s a crime. If you hack on your own, it’s a pleasure.

      • Spot the irony: India’s Reserve Bank says outsourcing and offshoring are risky

        The Reserve Bank of India (RBI) has warned the nation’s finance sector that outsourcing information technology jobs could “expose them to significant financial, operational and reputational risks.”

        The RBI offered that opinion last week in a Statement on Developmental and Regulatory Policies that, after considering issues such as emergency lending for healthcare infrastructure and reform of default credit swaps, wends its way to a “Master Direction on IT Outsourcing and Master Direction on Information Technology Governance, Risk, Controls and Assurance Practices.”

        That section opens with the observation: “The financial system is seeing extensive leveraging and outsourcing of critical IT services by Regulated Entities to get easier access to newer technologies through financial technology players to improve efficiencies.”

    • Audiocasts/Shows

      • These Are The Best 3 Terminals On Linux – Invidious

        Default terminals are good enough but if you’re looking for something a bit better than all 3 of these linux terminals will offer you a better or more interesting experience in there own ways.

      • Hackaday Podcast 156: 3D-Printing Rainbows, Split-Flap Clocks, Swapping EV Car Batteries, And Floppy Time | Hackaday

        This week, Hackaday Editor-in-Chief Elliot Williams and Assignments Editor Kristina Panos fawn over a beautiful Italian split-flap clock that doesn’t come cheap, and another clock made of floppies that could be re-created for next to nothing. We’ll also sing the praises of solderless circuitry for prototyping and marvel over a filament dry box with enough sensors to control an entire house. The finer points of the ooh, sparkly-ness of diffraction gratings will be discussed, and by the end of the show, you’ll know what we each like in a microscope.

    • Kernel Space

      • Libinput 1.20.0
        Important notice for package maintainers: This is the first stable
        release that has been made available on GitLab. Make sure to update
        your scripts to point to the new URLs [1].
        This is what's new:
         - High-resolution scroll is more reliable thanks to the inclusion of new
         - Better handling of BTN_TOOL_PEN on top of BTN_TOOL_RUBBER on graphics
           tablets that trigger a kernel bug
         - libinput doesn't handle joysticks and gamepads. The detection algorithm
           has been improved to avoid tagging some of those devices as keyboards
         - Improved clickpad detection
         - New quirks and bug fixing
        The list of changes included since 1.20.rc1 [2] are included below.
        A big thank you to all contributors!
        [1] https://gitlab.freedesktop.org/libinput/libinput/-/releases
        [2] https://gitlab.freedesktop.org/libinput/libinput/-/releases/1.19.901
        Alberto Fanjul (1):
              pad: load libwacom device by path, not by usbid
        José Expósito (2):
              doc/user: clarify fork visibility
              libinput 1.20.0
        Markus Wall (2):
              Add quirks for Lenovo Legion Y740
              quirks: add lenovo legion slim 7
        Peter Hutterer (1):
              doc: correct the documentation for reporting trackpoint bugs
      • AMD rolls out Linux update for Zen 3 processors with the newest CPU Microcode

        The AMD open-source team has recently published an update to the Family 19h / Zen 3 CPU microcode to the Linux firmware tree on the git.kernel.org site, which is the “repository of firmware blobs for use with the Linux kernel.” The firmware update is under the linux-firmware.git tree. The new update is for AMD Zen 3 CPU users operating in Linux.

    • Applications

      • Mini review – Frog is a simple but powerful text extraction tool for Linux – Real Linux User

        Some applications just need to be big and have to offer an extensive array of functionality to be of the right value for specific use cases, like LibreOffice, Krita. darktable and GIMP. But there are many situations that only require the right amount of functionality and nothing more. In Swedish they have a word for that, “Lagom”, which means “not too little and not too much”. There are many very powerful mini apps available for Linux that only focus on a specific task and do that perfectly well. In this article you find a mini review for the application Frog, a simple but powerful text extraction tool for Linux.

    • Instructionals/Technical

      • How To Install HandBrake on Linux Mint 20 – idroot

        In this tutorial, we will show you how to install HandBrake on Linux Mint 20. For those of you who didn’t know, HandBrake is a open-source tool for converting video from nearly any format to a selection of modern, widely supported codecs. HandBrake easy-to-use tool for converting DVDs and other videos into H.264, XViD, or Ogg formatted media.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a HandBrake open-source multiplatform video transcoder on a Linux Mint 20 (Ulyana).

      • Installing Raspberry Pi OS on a Zero 2 W — Virtualization Review

        In this article, I will install the de facto OS for this device: Raspberry OS. Since I will be following the official instructions, and because the official documentation is very good, I will only be giving an overview of the process and highlighting salient points from the documentation. The Raspberry OS comes with many useful tools, and APT can be used to install additional packages and tools if needed or desired. Installing an OS on Raspberry Pi is a little bit different then on other systems being that you install it directly onto an SD card and then insert the SD card into the RPi.

      • 2 ways to install LAMP server on Ubuntu 22.04 | 20.04 – Linux Shout

        Learn the easy possible way to install LAMP (Linux, Apache, MySQL & PHP) server on Ubuntu 22.04 LTS Jammy Jelly Fish or Ubuntu 20.04 Focal Fossa Linux using command terminal.

        Whenever it comes to having a web server for commercial purposes, the first name that comes forward is Apache. It is one of the best open-source web servers, easily available to install on any Linux system. However, there are many web applications that require few other things apart from the Apache web servers to work properly such as WordPress – it is a PHP-based CMS. Hence, to use it on our Linux, we need a bunch of server applications. For example to serve dynamic web pages – PHP language; for storing data MySQL/MariaDB. So, the stack of all these platforms is known as the LAMP server.

        The software components are usually installed on physical or virtual servers. Static or dynamic web content can be provided with a LAMP system. Typical areas of application for LAMP-based servers are websites or online shops created with the help of content management systems (CMS).

        The software components are freely available and minimize costs for the realization of the server environment. Since the software’s code is open-source, programmers can develop their own extensions or make changes. LAMP servers offer a high degree of flexibility.

      • Install AngularJS in Ubuntu 22.04 | 20.04 Linux – Linux Shout

        AngularJS is a framework for development, here we learn the commands to install AngularJS on Ubuntu 22.04 Jammy JellyFish or Ubuntu 20.04 LTS Focal Fossa using Terminal.

      • Piece Together a Repeatable Frontend Dev Environ on Linux – The New Stack

        Development environments are very personal in that every developer and every project has its own specific tools they either require or prefer. Once you get the perfect environment built, you’ll want to be able to make it such that it can be easily repeatable.

      • Re-Enable Tab/Arrow Key Navigation in Overview & App Grid in GNOME 40/41 | UbuntuHandbook

        Can not navigate in Activities overview and app grid screen using Tab or arrow keys? Here’s how to re-enable the feature via extension in GNOME 40 & 41.

        In GNOME 3.x, user may press Tab or down arrow and then left/right keys to navigate between app windows in the overview screen. Also, the keys can be used to navigate in ‘Show Applications’ app grid.

      • Install/Upgrade HandBrake on Linux Mint 20 LTS – LinuxCapable

        HandBrake is an open-source video transcoder that can be downloaded for free and supports Mac, Windows, or Linux to convert videos in many different formats into more commonly used ones like MP4 with minimal file size reduction – making it efficient at reducing the amount of data consumed on your hard drive while also helping save time!

        In the following tutorial, you will learn how to install Handbrake on Linux Mint 20 LTS.

      • Install Joplin Note-Taking App on Linux Mint 20 LTS – LinuxCapable

        Joplin is a free and open-source note-taking application that can be used on any computer, tablet, or smartphone. It’s been designed with both professionals in mind and consumers looking for an easy way to capture ideas anytime, anywhere without having to worry about running out of space again!

        The product has many features similar to those found within Evernote. Still, it offers more flexibility when editing your data – everything from font style choices down to color schemes is at the user’s disposal, meaning there isn’t one “perfect” option amongst them, which makes finding exactly what you’re after easier than ever before.

      • sudo rm -rf /: The Command You Should Never Run

        You’ve probably seen it everywhere, in all the Linux groups, communities, forums, even in real life on shirts. If you’re a beginner and wondering what “sudo rm -rf /” does and why you shouldn’t run it, read this post.

        In short, the sudo rm -rf / command deletes everything in the root directory, which basically breaks your whole system. We’ll explain the command in detail below. If you don’t know what it means or what it does – you should not run it.

      • Easy Way To Clean Up Snap Package Versions in Ubuntu

        Snap is a software packaging and deployment system developed by Canonical for operating systems that use the Linux kernel. The packages, called snaps, and the tool for using them, snapd, work across a range of Linux distributions and allow upstream software developers to distribute their applications directly to users. Snaps are self-contained applications running in a sandbox with mediated access to the host system. Snap was originally released for cloud applications but was later ported to work for Internet of Things devices and desktop applications too.

      • How To Install Oracle VirtualBox on Debian 11 – TecAdmin

        The VirtualBox is a powerful tool for virtualization developed by Oracle Corporation. It is a widely used commercial by large enterprises as well as home users. VirtualBox 6.1 is the latest major release by the Oracle team. This version is released with various performance improvements over the previous major releases.

      • How To Install Joplin on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install Joplin on Ubuntu 20.04 LTS. For those of you who didn’t know, Joplin is an open-source application popularly considered as an Evernote alternative. Its interface is intuitive that allows users to create notes and to-do lists with just a few clicks and organize them in different notebooks. Joplin supports a cross-platform application available for Microsoft Windows, Linux, macOS, Android, and iOS.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Joplin Note-taking app on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • Install/Enable & Connect to SSH on Ubuntu 20.04 LTS – LinuxCapable

        SSH or known by its full name Secure Shell Protocol is a cryptographic network communication protocol that enables two computers to communicate securely over an unsecured network. SSH is highly used for remote login applications and command-line executables such as terminal applications.

        For users wishing to connect to servers or other computers with SSH, the client and the remote connection need to both have SSH installed and enabled for this to be possible.

        In the following tutorial, you will learn how to install and enable SSH on Ubuntu 20.04 LTS Focal Fossa or Server and connect to a remote PC.

      • Install Qoobar Tag Editor on Ubuntu 20.04 LTS – LinuxCapable

        Qoobar is a free and open-source tag editor for Linux, Windows, or macOS. It can create/edit music tags in files using the following features: Batch edit any tag; copy & paste between groups of files with auto-completion that Remembers everything you type (even while typing another word); add Cover Art Pictures from Discogs as well as GnuDB GD3 Integration, so they are easily accessible through one interface – this also includes ReplayGain info if applicable! Finally, there’s Import functionality allowing users to bring their own cover images into designated spots on each page.

        In the following tutorial, you will learn how to install Qoobar Tag Editor on Ubuntu 20.04 LTS Focal Fossa.

      • Install RPM Packages on Debian 11 Bullseye – LinuxCapable

        The Debian repositories contain thousands of deb packages that can be installed from the Software Center or by using the apt command line. Deb is an installation package format used in all Debian-based distributions, but some aren’t available through these methods; alternative sources such as existing RPM repositories may contain these.

        RPM package format is used by Red Hat and its forks such as Almalinux, CentOS Stream, and Rocky Linux, to name a few. For Debian users, an application called alien allows you to install RPM packages on Debian or convert an RPM package into a Debian (.deb) file.

        In the following tutorial, you will learn how to install RPM packages and convert a Debian package into an RPM package on Debian 11 Bullseye desktop or server.

      • Install/Upgrade MariaDB 10.8 on Rocky Linux 8 – LinuxCapable

        MariaDB is one of the most popular open-source databases next to its originator MySQL. The original creators of MySQL developed MariaDB in response to fears that MySQL would suddenly become a paid service due to Oracle acquiring it in 2010. With its history of doing similar tactics, the developers behind MariaDB have promised to keep it open source and free from such fears as what has happened to MySQL.

        MariaDB has become just as popular as MySQL with developers, with advanced clustering with Galera Cluster 4, faster cache/indexes, storage engines, and features/extensions that you won’t find in MySQL.

        In the following tutorial, you will learn how to install MariaDB 10.8 on Rocky Linux 8.

      • Install Cinnamon Desktop Environment on Rocky Linux 8 server

        Do you want to install the Cinnamon Desktop environment on Rocky Linux 8 CLI server or desktop? Then here are the commands to follow.

        Cinnamon Desktop environment is one of the popular UIs because of its mid-weight and familiar Windows-like User Interface. Cinnamon is visually more complex than Mate. There are more effects and animations at the expense of performance. But as long as you have a moderately up-to-date computer, it will run smoothly. Cinnamon offers a much more modern look while remaining subtle and simple.

        It is a further development of Gnome 3. Therefore newer and more extensive features can be supported. This includes entire themes that you can activate in Cinnamon.

        Applets in the taskbar of Cinnamon are also made more efficient. In principle, you can even integrate your own extensions into the taskbar. However, this requires advanced programming knowledge.

        By default, this desktop GUI with Linux Mint as desktop environment however, we can install it on Rocky Linux 8 as well.

      • Install & Connect PuTTY SSH Client on Debian 11 Bullseye – LinuxCapable

        PuTTy is an open-source, lightweight program that you can use to login into your remote machine with a terminal emulator that has been around since 2002. It supports protocols such as SSH and SCP for secure communication over networks or even from one device directly onto another without account restrictions!

        In the following tutorial, you will learn how to install the PuTTY SSH Client on Debian 11 Bullseye.

      • Install Cinnamon Desktop Environment on Rocky Linux 8 – LinuxCapable

        Cinnamon Desktop Environment is a free, open-source desktop environment based on X Window System created from GNOME 3 by the Linux Community that was frustrated and disappointed with GNOME 3. Cinnamon offers a bright, clean look that is less bloated than alternative desktop environments and focuses on speed and flexibility.

        Cinnamon is the default desktop environment choice for Linux Mint, as many veteran Linux distro hoppers would know and are actively maintained by them.

        In the following tutorial, you will learn how to install this alternative desktop environment on Rocky Linux 8 Workstation as an option choice to switch from GNOME.

      • Install Budgie Desktop Environment on Rocky Linux 8 – LinuxCapable

        Budgie is a desktop environment that is free and open-source that uses GNOME technologies such as GTK (> 3.x) and is developed by the Solus project, which also contributes to its design through contributors from numerous communities, including Arch Linux; Manjaro; openSUSE Tumbleweed – among others.

        For users seeking an alternative to GNOME that is lightweight and sleek with a simple UI instead of focusing on eye candy, then Budgie is worth checking out.

        In the following tutorial, you will learn how to install Budgie Desktop Environment on Rocky Linux 8 Workstation.

      • Install MATE Desktop Environment on Rocky Linux 8 – LinuxCapable

        For those not familiar with MATE Desktop Environment, it is the continuation of GNOME 2. It is famous for being lightweight, fast, and stable that runs on Linux and most BSD operating systems. MATE is also an excellent choice for a lower-end system or those looking to remain efficient on system resources.

        In the following tutorial, you learn how to install the MATE Desktop environment on Rocky Linux 8 Workstation.

      • pdfcpu in Fedora

        pdfcpu is a command-line tool to perform actions on PDF files. It allows to perform all the standard operations, such as merge, split, and rotate pages. It also allows less common operations such as changing the user and owner passwords, encrypting/decrypting, optimizing, etc.

        The project started back in 2017, but I discovered it only last year. I like pdfcpu due to the high focus on allowing and making it easy to perform those kinds of operations in batch.

        Until now, I’ve used pre-compiled versions of pdfcpu, but I would have preferred it to be shipped directly in the distro, and that’s why I’ve packaged it for Fedora!

      • Virtuozzo Linux has a handy trick up its sleeves many admins might need | TechRepublic

        Since CentOS kind of went off the rails over a year ago, some admins and companies have been searching for a replacement. Many hopped onto the AlmaLinux train, while others opted to go with Rocky Linux. Both are absolutely outstanding distributions that should be worth your attention and time.

        But there are other alternatives, one of which has actually been around for some time. That alternative is Virtuozzo Linux (also known as VzLinux), which is free to download and use. It’s 1:1 binary compatible with Red Hat Enterprise Linux (RHEL), and offers three different versions that are optimized for running containers, virtual environments or bare metal. VzLinux behaves very much like the CentOS you’ve known and loved (only without the GUI).

        But VzLinux also includes a handy trick that could possibly make the lives of admins and companies a bit easier. This trick makes VzLinux a sort of chameleon.

      • How to Use Rsync to Make a Remote Linux Backup – JumpCloud

        We cannot emphasize enough the importance of having a backup. Natural disasters, cyberattacks, or other devastating events can happen when you least expect them. To be on the safe side, it is always recommended to have round-the-clock system backups to ensure business continuity in case of service interruption.

      • How to Enable SSH server on Ubuntu 22.04 Jammy Linux – Linux Shout

        SSH doesn’t need any introduction, its abbreviation stands for Secure Shell. With the help of Secure Shell, the users can secure network connections to access remote devices. It is a protocol that uses port 22 by default, which allows access to a remote computer in the IP network via an encrypted connection. It can be used as a secure alternative to unencrypted protocols such as Telnet or Rlogin. For example- you want to access your web server running on Amazon Cloud, to do this securely we can use an SSH server on the remote system. After that using a local SSH client the secure connection is possible. SSH enables mutual authentication and encrypted data transmission so that sensitive data such as passwords or user names cannot be spied out by unauthorized persons. Secure Shell offers a high level of security.

        Well, SSH is not just limited to Linux systems, even Microsoft has implemented OpenSSH server in Windows 10 carried in Windows 11 as well. Hence, we can connect Windows over this protocol without installing any extra software. SSH works in server-client architecture.

        Secure Shell works on the application layer (according to the ISO/OSI layer model on layers 5 to layer 7 ) and is based on TCP in the transport layer.

      • Crop and resize photos on Linux with Gwenview | Opensource.com

        A good photo can be a powerful thing. It expresses what you saw in a very literal sense, but it also speaks to what you experienced. Little things say a lot: the angle you choose when taking the photo, how large something looms in the frame, and by contrast the absence of those conscious choices.

        Photos are often not meant as documentation of what really happened, and instead they become insights into how you, the photographer, perceived what happened.

        This is one of the reasons photo editing is so commonplace. When you’re posting pictures to your online image gallery or social network, you shouldn’t have to post a photo that doesn’t accurately represent the feelings the photo encapsulates. But by the same token, you also shouldn’t have to become a professional photo compositer just to crop out the random photo bomber who poked their head into your family snapshot at the last moment. If you’re using KDE, you have a casual photo editor available in the form of Gwenview.

      • How To Install DBeaver on AlmaLinux 8 – idroot

        In this tutorial, we will show you how to install DBeaver on AlmaLinux 8. For those of you who didn’t know, DBeaver is a free and open-source universal database tool for developers and database administrators. DBeaver supports any database that uses JDBC driver for relational databases i.e PostgreSQL, MySQL/MariaDB, Oracle, BigQuery, Google, Exasol, SQLite, DB2, Teradata, LUW, Firebird, Vertica, Informix, Netezza, H2, and many more.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the DBeaver free universal database tool on an AlmaLinux 8. You can follow the same instructions for CentOS and Rocky Linux.

      • How to delete all files from Directory except specific files. – TREND OCEANS

        I want to remove all the files from a directory except one or more files. We usually use rm -rf command to remove all the files, but the problem is that it will remove all the files, which we don’t want to do.

        You may say it’s simple just move the file to a specific location or make a zip of a particular file and delete the rest of the file. Yes, we can do it, but we have to run multiple commands, which I don’t want, and it is not optimal.

        So, how do I remove all the files from a directory except one? Well, in this article, you will see multiple ways to remove all files while protecting the important files.

      • Use mainline to easily upgrade your kernel — Sean Davis

        When I installed Xubuntu 22.04 I was shocked to see that Bluetooth wasn’t working. I’ve got a pretty standard and well-supported Bluetooth chipset, Intel Wireless-AC 3168 Bluetooth, so this threw me for a loop.

        After blaming and then apologizing to Blueman, I found a hint on the Arch Linux forum. The kernel version on 22.04,, is currently broken with several Intel Bluetooth chipsets. There were reports in that same thread that the issue was resolved in 5.15.4, so I set out to upgrade my kernel… something I haven’t had to do in a really long time.

    • Games

      • Inspired by Cube World, the free Veloren 0.12 release is out | GamingOnLinux

        Fully free and open source, Veloren continues to expand their inspiration from Cube World and Legend of Zelda: Breath of the Wild with version 0.12 out now.

        It’s still very far from a properly released game but it’s coming together, with new content available in this release. Some of what’s new includes: a sailing bot, sneaking with weapons drawn, a system for spawning smaller tree-like plants into the world, the ability to toggle always showing health and energy bars, waterfalls, wearable headgear (hood, crown, bandanas), you can mount and ride pets now, arthropods added in, wallrunning and much more.

      • Cyberpunk 2077 seemingly getting a free trial version | KitGuru

        Ahead of CDPR’s stream later today, Reddit user ‘Blarzek’ stumbled upon a new Spanish Cyberpunk 2077 advert on the sidebar of a website, with the text roughly translating to “Free Trial version available now” – which redirects to CDPR’s official website (though the site itself does not acknowledge a trial.)

        It has been heavily speculated and rumoured that today’s stream will focus on the new-gen releases of Cyberpunk 2077 – versions which have taken over a year to arrive – as well as a patch 1.5. With how long it has taken, there is hope that this update is significant.

      • Dolphin Emulator Steam Deck Release Teased by Devs | TechRaptor

        A Dolphin Emulator Steam Deck release has been teased by the developers of the popular emulation software for Nintendo Wii and GameCube.

        Valve’s Steam Deck is an upcoming handheld gaming PC that is looking more interesting by the day. First revealed in July 2021, the Steam Deck will work with a wide library of games on Steam thanks to Valve’s custom implementation of Proton as the foundation of Steam OS; one of the most recent compatibility announcements was No Man’s Sky.

        There will be more than just games on the Steam Deck, though. A number of third-party software devs are aiming to make their programs compatible with the Steam Deck and it looks like the Dolphin Emulator is one of them. That should come as no surprise to longtime fans of the emulator — heck, someone even managed to get it working on a Honda. As in the car.

      • Steam Deck will run native Linux games where it makes sense | TechRadar

        Valve has clarified that when it comes to which version of a game to run on the Steam Deck, the native Linux incarnation will be used – rather than the Windows game via Proton – if it makes sense to do so. In other words, if the native Linux port runs fine.

        There was some confusion around this because some eagle-eyed folks had spotted that Portal 2, one of Valve’s own games that has been ported to Linux, was down in SteamDB as being recommended to run on the Steam Deck via Proton (meaning the Windows version, facilitated by the compatibility layer, Proton, to run on SteamOS which is, of course, a Linux-based operating system).

        As Gaming on Linux pointed out, though, in fact this was only the case because of the way Valve implemented the testing of these different versions in the early days of working on software compatibility for the Steam Deck.

      • Gamebuntu | Linux.org

        Ubuntu can make for a very nice gaming system if you have all the apps to run the games you want. What if you could install a lot of the apps all at once?

        Gamebuntu is a script that installs a lot of different apps to give you a very nice gaming system. As I’ve mentioned in other apps, there is a shortage of gaming systems. I can tell you from experience that nearly all retailers are out of gaming consoles. People must rely on their computers to provide for their gaming needs.

    • Desktop Environments/WMs

      • KDE vs. XFCE: Comparing the Two Linux Desktop Environments

        XFCE and KDE are neck and neck in terms of customizability, resource consumption, and user experience. So which Linux desktop should you go for?

        Being an open-source community-driven OS, Linux offers numerous desktops that appeal to your various computing tastes and priorities. Through this guide, the idea is to compare the two famous desktop environments: XFCE and KDE.

        Both KDE and XFCE come loaded with features that distinguish them from the rest of the desktops within the Linux gamut. Nonetheless, you will notice some stark similarities and dissimilarities between the two desktops, as well.

      • GNOME Desktop/GTK

        • GNOME Project retires OpenGL rendering library Clutter

          The GNOME Project has announced that it’s retiring the Clutter library, the tool that bought OpenGL-based hardware rendering to Linux in 2006.

          Clutter was originally written by now-Intel subsidiary OpenedHand and in its day was a widely used library, enabling GObject-based C code to draw user interfaces using OpenGL.

          It brought hardware-accelerated 3D to a lot of Linux programs, including the Mutter window manager (Metacity + Clutter) used by GNOME Shell, System76′s COSMIC desktop and Raspberry Pi’s PIXEL. The Cinnamon desktop uses a fork of Mutter called Muffin.

          These days GNOME’s version of Mutter “uses a fork of Cogl, a hardware acceleration abstraction library used to simplify usage of OpenGL pipelines, as well as a fork of Clutter, a scene graph and user interface toolkit.”

          Clutter is indirectly the reason that lots of people found that GNOME 3 and Ubuntu’s Unity ran poorly under VirtualBox.

    • Distributions

      • Slackware Family

        • Chromium security update remedies actively used exploit

          New chromium and chromium-ungoogled packages for Slackware!
          The recent Google Chromium update aims to plug a security hole which is already exploited out there, allowing attackers to take control of your computer.

        • Challenges with TigerVNC in Slackware 15.0 | Alien Pastures

          The 1.12.0 version of TigerVNC which is present in Slackware 15.0, is quite different from earlier versions such as the 1.6.0 version in Slackware 14.2 and even the previous iterations of this software in Slackware-current ( up to 1.11). It has ‘evolved‘ in a way that it has become dependent on systemd, or so the developers claim.

          And indeed, the most prominent change is that the old ‘vncserver‘ script has been rewritten and should not be run directly any longer. In previous versions, as a user you could run ‘vncserver :1‘ to start a VNC server on port “5900 + 1” aka TCP Port 5901, and if needed you could kill that VNC server session with ‘vncserver -kill :1‘.
          Fast forward to current-day. You are now expected to start the VNC server via the new command ‘vncsession‘ which will look in a couple of places to find out who you are and what desktop session you want to start. No longer will it install a “${HOME}/.vnc/xstartup” script for you to customize, instead it will look first in ‘/usr/share/xsessions‘ for *.desktop files like graphical login managers also do (SDDM, LightDM). Slackware applied a patch here for convenience, so that the names of sessions to look for also include “/etc/X11/xinit/Xsession”, “/etc/X11/Xsession”, “${HOME}/.vnc/xstartup”, “${HOME}/.xinitrc”, “/etc/X11/xinit/xinitrc” in that order.

      • IBM/Red Hat/Fedora

        • Fedora vs My Hardware

          Below is an evolving list of my hardware, it’s problems with various releases of Fedora, and my attempts to fix and/or workaround.

        • Cheating on Fedora After 15 Years

          After 24 years of Linux on the desktop, 15 of them with Fedora, I recently had a bit of a mid-life crisis that led to a brief and unfortunate indiscretion.

          The cracks in my relationship with Fedora have been developing for some time. I work from home and have for a very long time. I have room for one desk in my house, and I need to work with a very finely tuned ergonomic desk setup. Red Hat provides me with Lenovo hardware and a docking station which typically runs Linux pretty good. My solution then was to get myself a Lenovo laptop that would work well with that thunderbolt dock so I can easily switch between work and personal and still use my same setup.

          This docking and suspend/resume has been the bane of my existence. Every new Fedora release seems to break suspend/resume/dock/sound in some combination, over and over and over, year after year. At times it’s been rock solid, but it feels like that was quite some time ago and now every day when I sit down to get to work, it’s a gamble as to whether or not I can pick up with where I left off, or I’m rebooting and getting everything decrypted and opened again.

        • Nebulon gets Ansible collection for datacentre deployment

          Nebulon has continued its efforts to evolve to being a wider provider of infrastructure by announcing a Red Hat Ansible collection that builds its capabilities into the provisioning software supplier’s frameworks.

          That capability will allow IT departments to roll out and reconfigure Nebulon storage and server capacity via an Ansible collection, which provides configuration settings for so-called playbooks that automate provisioning across IT estates.

          Nebulon will also launch support for Terraform, another widely deployed infrastructure management product, later in 2022.

        • UK government’s chief digital officer departs • The Register

          Former IBM and Home Office tech supremo Joanna Davinson is set to stand down as the UK government’s chief digital officer, leaving the Cabinet Office with no one to wrangle its unmanaged legacy estate.

          Departing after an 18-month term to set up Whitehall’s tech team, Davinson was responsible for leading the government’s 20,000-strong Digital, data and technology (DDaT) community after her appointment in January last year.

          An ad for her replacement confirms the Cabinet Office is now looking for an individual to lead a “transformation” which includes “digitising end to end services, overhauling Government’s legacy IT systems, establishing cross-government enterprise architecture, updating our approach to data and analytics, strengthening our cyber security, and upgrading our [Digital Data and Technology] talent and skills.”

      • Canonical/Ubuntu Family

        • Ubuntu Blog: Design and Web team summary – 11 February 2022

          The Web team develops and maintains most of Canonical’s sites like ubuntu.com, canonical.com and more.

          This iteration we have continued our work on the new ubuntu.com site navigation. We have completed a design and mapped out an architecture ready to be built. We further explored how we can best represent all of our product offerings to give visitors to canonical.com a quick overview of what we produce and how it can fit together.

          We also added more Engage pages to ubuntu.com, and did some early exploratory work on improving the search functionality on the CVE status page.


          The Commercial team maintains and develops all commercial service User Interfaces (UI) provided by Canonical. Including the Ubuntu Advantage Store.

          This iteration we’ve been working on a new “tip” feature to let our customers know about features like “Account users” – the ability to add Technical or Billing contacts to Ubuntu Advantage, this feature is still in the wireframe stage…

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Cardinal: Open source VCV Rack as a free VST plugin – gearnews.com

        The developers say that Cardinal exists as a way to have VCV Rack as a proper “open-source audio plugin.” By this they mean one that works with multiple platforms and operates more efficiently than the current VCV Rack V2. They claim that as it’s a self-contained plugin it suffers from none of the conflicts or crashes that people have experienced with v2 of VCV Rack Pro running inside a DAW. There’s also talk of jitter issues and MIDI problems that Cardinal has gotten around.

      • Mirror, Mirror On The Wall, Do My Eyes Deceive Me After All | Hackaday

        Say what you will about illusions, [Create Inc] has some 3D prints that appear to change shape when viewed in a mirror. For example, circles transform into stars and vice versa. A similar trick was performed by [Kokichi Sugihara] in 2016, where he showed circles that appear as squares in the mirror. For the trick to work, the camera’s position (or your eye) is important as the shapes look different from different angles. The illusion comes in when your brain ignores any extra information and concludes that a much more complex shape is a simpler one. [Create Inc] walks you through the process of how the illusion works and how it was created in Blender.

      • 2022 State of Open Source Report Details Challenges, Opportunities [Ed: Microsoft-connected firm now claims to be authority on the subject of “Open Source”]
      • Web Browsers

        • Three major browsers are about to hit version 100. Will websites cope?

          This February Google put out Chrome 98, closely followed by Mozilla releasing Firefox 97. Soon both will hit version 100.

          The memory of the web industry is short. This has happened before: when Opera reached version 10 in 2009, it caused problems, and just three years later, Firefox 10 faced similar issues.

          And it will happen again. Google is planning to release Chrome 100 at the beginning of April, and Firefox 100 should follow in May.

          Google anticipates that there will be some issues, so ever since Chrome 96 it has offered a facility to force the version number to 100: just go to chrome://flags and set #force-major-version-to-100.

        • Chromium-adjacent Otter browser targets OS/2 • The Register

          The free open source web browser Otter – which uses the Chromium browser engine at the heart of Google’s Chrome and Microsoft’s Edge – is being ported to OS/2.

          For the uninitiated, OS/2 was an operating system that was created by IBM and Microsoft in the mid to late 1980s. The OS was compatible with some Windows drivers, but Windows 3.x did so well that the IBM/Microsoft partnership dissolved in unhappy circumstances in 1992. IBM kept OS/2 alive, and its fourth release was widely regarded as superior to Windows 95 and Windows NT. By the time Big Blue brought it to market, though, Microsoft’s dominance had been entrenched.

        • Mozilla

      • Productivity Software/LibreOffice/Calligra

        • Experimental WebAssembly port of LibreOffice released

          Almost exactly a year after we last covered it, an experimental version of LibreOffice compiled to WebAssembly (nicknamed LOWA) has appeared.

          Be warned, it’s about 300MB, so it takes a while to load, but you can try it here in your browser.

          It’s based on the still-prototype LibreOffice 7.4 codebase and is not yet ready for production use. Given that LibreOffice is a large codebase, parts of which are decades old, this is a significant vindication of WebAssembly. There’s more info on the port here, from a presentation by Thorsten Behrens at FOSDEM 2022, which took place this month.

          The Register has covered WASM since it was new, including examining how it works. Although it’s not without some criticism, it has ambitious goals and an increasing number of supporters. The LOWA developers use Emscripten to compile LibreOffice’s predominantly C++ code into WASM. Emscripten originally targeted Asm.js, which was one of WASM’s ancestors, alongside Google Native Client or NaCl.


          Inferno is still around, and is now free and open source. It runs on native hardware, including smartphones, and can be embedded inside other apps. Its Limbo programming language is one of the ancestors of Go.

          We’re definitely not saying that WASM is doomed to failure. It’s already doing great, and will surely thrive. All we’re saying is that there’s still much to be learned, especially from Inferno, notably in terms of compactness, speed, and integration into the OS – just not commercial success.

        • How to Set Up LibreOffice for School

          Your office software needs to do more than just keep up with your schoolwork. It needs to see you through your post-graduate career, as well. If you use a free trial like the student version of Microsoft Office, you will get cut off when you graduate.

          When that happens, you face a choice. Start learning new software while looking for work, or start paying a subscription at the same time as your student loans enter repayment. Wouldn’t it be nicer if you could keep using familiar software for free?

          LibreOffice is free office software that meets all your student needs. Check out five ways to use LibreOffice in school.

      • Programming/Development

        • SoK’22 Week 4: Functioning of the Animal Cards

          In my previous blog, I described my activity (left and right click training) for contributing it to GCompris and its implementation details.

          Over Since past 4 weeks, I’ve finalized the layout and of the activity, added the animation for animal cards to move to their houses, and improved communication with my mentors.

        • What Is The Factorial Of Hundred : Mathematics Formula, C Program, Python Program | Itsubuntu.com

          The factorial of hundred is 9.3326215443944E+157

          Factorial in mathematics is defined as the product of all the positive numbers less than or equal to that number. Factorial is also denoted by the word bang or shriek. If you want to calculate the factorial of 6 then the result will be the product of 6x5x4x3x2x1.

    • Standards/Consortia

      • Dennis Ritchie: Biography of a Pioneer Programmer Who Shaped the Computing History

        Ritchie was born on September 9, 1941, in Bronx-ville, New York. He was born to Alistair Ritchie, a switching systems engineer for Bell Laboratories, and Jean McGee Ritchie, a homemaker. Ritchie grew up in New Jersey, and after a childhood in which he did very well academically, he went on to attend Harvard University. There he studied science and graduated with a bachelor’s degree in physics. While he was still going to school, Ritchie happened to go to a lecture about how Harvard’s computer system, a Univac I, worked. He was fascinated by what he heard and wanted to find out more. Outside of his Harvard studies, Ritchie began to explore computers more thoroughly and was especially interested in how they were programmed.

        While still at Harvard, Ritchie got a job working at the Massachusetts Institute of Technology (MIT). At that time computer programming was not a degree, and computer labs were looking for anyone with the potential to help on their computers. Ritchie, with his unflagging curiosity, seemed perfect for the job. Ritchie worked at MIT for many years helping develop, alongside other scientists, more advanced computer systems and software.

      • Why the digital enterprise needs modular open standards

        It would be hard to find many people in the world of technology who don’t appreciate the power of a standard. We live amongst diverse systems, following different design decisions, being used in endless different ways – often even within an organization, never mind across organizations. Standards, in this context, are what enables technology to do almost everything we expect it to do, whether that’s accurately pass a message from one machine to another or be comprehensible to a newly hired engineer.

  • Leftovers

    • Science

      • Homemade Toy Wind Tunnel Blows (Really Well) | Hackaday

        The real story here starts about a week before Christmas, when [SparksAndCode]’s son was enthralled by a similar device at a science museum. At his wife’s suggestion, [SparksAndCode] got to work designing a and building a wind tunnel with hardware-store parts, his deadline looming ahead. The basic structure of the tunnel is three rods which support plywood collars. The walls are formed by plastic sheets rolled inside the collars to make a tube. Underneath, a Harbor Freight fan supplies a nice, steady stream of air for endless entertainment.

      • RC Snowmobile Makes Tracks On Ice | Hackaday

        With all the futuristic technology currently at our disposal, it seems a little bizarre that most passenger vehicles are essentially the same thing that they were a century ago. Four wheels, a motor, and some seats would appear to be a difficult formula to beat. But in the 3D printing world where rapid prototyping is the name of the game, some unique vehicle designs have been pushed out especially in the RC world. One of the latest comes to us from [RCLifeOn] in the form of a single-wheeled RC snowmobile.

      • Fusion Breakthrough Once Thought Impossible Brings Energy Device Closer to Realization

        Scientists have achieved a remarkable breakthrough in the conceptual design of twisty stellarators, experimental magnetic facilities that could reproduce on Earth the fusion energy that powers the sun and stars. The breakthrough shows how to more precisely shape the enclosing magnetic fields in stellarators to create an unprecedented ability to hold the fusion fuel together.

        “The key thing was developing a piece of software that allows you to rapidly try out new design methods,” said Elizabeth Paul, a Princeton University Presidential Postdoctoral Fellow at the U.S. Department of Energy’s Princeton Plasma Physics Laboratory (PPPL) and co-author of a paper that details the finding in Physical Review Letters. The results produced by Paul and lead author Matt Landreman of the University of Maryland could boost the capability of stellarators to harvest fusion to generate safe and carbon-free electrical power for mankind.

    • Hardware

      • Retro Future Nixie Corvair Instrument Panel | Hackaday

        All the essential info is there: engine temperature, tachometer, speed, battery voltage, and even odometer. You might have noticed that there isn’t a clock. The justification that [nixiebunny] gives is that he’s always wearing his Nixie watch, so a clock in his car seems redundant. There is also a gap in the panel to allow an oil pressure display. Corvairs are known for throwing belts next to the oil sender, so any attached sensor needs to be designed well and thought through. A Teensy receives engine telemetry data (no OBDII port to hook into — GM didn’t come out with the first OBD port until the 80s) from the engine bay. The data is transformed into SPI data sent to the 74HC595 shift register chain via a CAT5 cable. Details are a little sparse, but we can see a custom PCB to fit the shape of the hole in the dash with the different Nixie tube footprints silkscreened on.

      • Sound And Light Play Off Acrylic And Wire In This Engaging Circuit Sculpture | Hackaday

        It’s no secret that we really like circuit sculptures around here, and we never tire of seeing what creative ways people come up with to celebrate the components used to make a project, rather than locking them away in an enclosure. And a circuit sculpture that incorporates sound and light in its design is always a real treat to discover.

        Called “cwymriad” by its designer, [Eirik Brandal], this sound sculpture incorporates all kinds of beautiful elements. The framework is made from thick pieces of acrylic, set at interesting angles to each other and in contrasting colors. The sound-generating circuit, which uses square wave outputs from an ESP32 to provide carrier and modulation signals for a dual ring modulator, is built on a framework of tinned wires. The sounds the sculpture makes have a lovely resonance to them, like random bells and chimes that fade and mix together. There’s also a matrix of white LEDs that form a sort of digital oscilloscope that displays shifting waveforms in time with the music.

      • Nvidia CEO on failed Arm deal: ‘We gave it our best shot’ • The Register

        If Nvidia is a little glum about its failed Arm merger, it has nearly 10 billion reasons to be cheerful: the GPU giant’s profit from the past 12 months reached $9.75bn, up 125 per cent on the year-before period.

        The chip goliath also disclosed in its fourth-quarter financial results on Wednesday that it will write off $1.36bn as a result walking away from the acquisition. This operating expense will be accounted for in the first quarter of Nvidia’s fiscal 2023, which began on February 1.

      • FTC welcomes the collapse of Nvidia-Arm deal • The Register

        America’s Federal Trade Commission has taken a victory lap of sorts, welcoming Nvidia’s termination of its proposed $66bn acquisition of chip design house Arm.

        In a Monday statement, the watchdog opined that combining the companies would result in the largest semiconductor chip merger to date – before claiming its demise would “preserve competition for key technologies and safeguard future innovation.”

        The FTC then gloated a little.

        “This result is particularly significant because it represents the first abandonment of a litigated vertical merger in many years,” the regulator added, before praising global efforts by fellow competition watchdogs who also probed the proposed, and ultimately doomed, deal.

        The agencies listed as providing cooperation included those in the European Union, United Kingdom, Japan and South Korea – suggesting that opposition to the deal was widespread and significant.

    • Integrity/Availability

      • Proprietary

        • Use Zoom on a Mac? You might want to check your microphone usage

          Apple Mac users running the Zoom meetings app are reporting that it’s seemingly keeping their computer’s microphone on when they aren’t using it.

          The issue appears to affect the native app running on the latest macOS release, Monterey, in which Apple has implemented a visual cue to alert users that an application or device is accessing their microphone or camera — via an orange or green dot in the Menu Bar, respectively.

          Users began complaining that the mic seems to be left active after Monterey was released late last year, and on December 27, Zoom put out an update that was meant to address the bug, stating that version 5.9.1 (3506) “resolved an issue regarding the microphone light indicator being triggered when not in a meeting.”

        • Users report trouble with Azure DevOps services

          Azure DevOps services in Europe have slowed and in some cases are unavailable, resulting in a number of the platform’s offerings being broken for local users.

        • Microsoft Teams unable to send and receive calls for some after update [Ed: And months ago they made it impossible for Android users to make emergency calls]

          Microsoft Teams was updated last week to version and its most notable feature, for at least some users, is not being able to send or receive calls.

          This is perhaps less than ideal given that Teams is intended as a collaboration and meetings tool.

          The Teams desktop app, according to several users, has been reporting a vague “Something went wrong” error after update installation. And thereafter it cannot access device speakers or microphone.

        • Cyberattack takes Ukraine military, bank websites offline • The Register

          “Oshchadbank also suffered a DDoS attack. Work is currently underway to restore the system. It is already working in stable mode. There is only a slow entry to the Oshchad24/7 system due to an additional load on the communication channels.”

        • Russia ‘stole US defense data’ from IT systems [Ed: Microsoft Windows TCO]

          The attackers prioritized efforts to target Microsoft 365 – the Windows giant’s suite of productivity apps and complementary cloud services, we’re told.

        • San Francisco 49ers catch ransomware, sample files leaked online [Ed: Microsoft Windows TCO]

          “The BlackByte executable leaves a ransom note in all directories where encryption occurs,” continued the Feds’ advisory [PDF ]. “The ransom note includes the .onion site that contains instructions for paying the ransom and receiving a decryption key. Some victims reported the actors used a known Microsoft Exchange Server vulnerability as a means of gaining access to their networks.”

        • SonicWall CEO on ransomware: Every good vendor was hit in past 2 years [Ed: Describing a Microsoft Windows (for the most part) issue]

          SonicWall’s annual cyber-threat report shows ransomware-spreading miscreants are making hay and getting quicker at doing so.

          “I think we’re in an arms race,” CEO Bill Conner told The Register. “It’s the good guys versus the bad guys. And as good as the good guys are, over the last two years, every good vendor … has been hit.”

          Conner would know – just last month exploitation notes were published for a critical (9.8) remote-code-execution vulnerability in its own SMA 100 series VPN appliances. Multiple other vulnerabilities, including the low-privileges bug, were patched in the appliances in December, although none of them appeared to have been exploited in the wild.

          SonicWall’s report makes for grim reading. The company’s researchers noted 623.3 million ransomware attacks globally last year, up 105 per cent on 2020 and more than triple 2019′s figure. Cryptojacking in 2021 rose 19 per cent to 97.1 million globally and while malware might have dropped by 4 per cent in 2021 (a paltry 5.4 billion hits, according to SonicWall Capture Labs threat data), it looked very much like things picked up in the latter part of the year, indicating an upward trend on the cards for 2022.

        • Security

          • Plaid is an evil nightmare product from Security Hell

            Plaid is a business that has built a widget that can be embedded in any of their customer’s websites which allows their customers to configure integrations with a list of third-party service providers. To facilitate this, Plaid pops up a widget on their customer’s domain which asks the end-user to type in their username and password for the third-party service provider. If necessary, they will ask for a 2FA code. This is done without the third party’s permission, presumably through a browser emulator and a provider-specific munging shim, and collects the user’s credentials on a domain which is operated by neither the third party nor by Plaid.

            The third-party service provider in question is the end-user’s bank.

            What the actual fuck!

            Plaid has weighed on my mind for a while, though I might have just ignored them if they hadn’t been enjoying a sharp rise in adoption across the industry. For decades, we have stressed the importance of double-checking the domain name and the little TLS “lock” icon before entering your account details for anything. It is perhaps the single most important piece of advice the digital security community has tried to bring into the public conciousness. Plaid wants to throw out all of those years of hard work and ask users to enter their freaking bank credentials into a third-party form.

          • Adobe, Chrome patch security bugs under active attack • The Register

            Adobe has released an out-of-band security update for Adobe Commerce and Magento Open Source to address active exploitation of a known vulnerability, and Google has an emergency issue, too.

            Security Bulletin APSB22-12 fixes CVE-2022-24086, rated 9.8 (critical) out of 10 on the CVSS scale. Adobe has not released details about the issue beyond noting that it involves improper input validation (CWE-20). The software maker says exploitation does not require any special privileges and allows arbitrary code execution.

          • VMware patches released for vulnerabilities found during China’s Tianfu Cup
          • Ex IT tech jailed for wiping school network during lockdown • The Register

            A former school IT technician who wiped his ex-employer’s network but also the devices of children connected to it at the time has been sentenced – after telling a judge he was seeking a new career in cybersecurity.

            Adam Georgeson, 29, went on the digital rampage after being dismissed by Welland Park Academy in Leicestershire, England, last January. He wiped 125 devices “including those belonging to 39 families”, according to the Leicester Mercury.

            The IT professional, of Robin Lane, Wellingborough, Northamptonshire, pleaded guilty to two crimes under the Computer Misuse Act 1990 last year.

            Sentencing him to 21 months in prison late last week, His Honour Judge Mark Watson said: “You made deliberate efforts to sabotage the networks of your victims. Your actions, towards both sets of victims, were committed out of spite and revenge.”

          • VMware Issues Security Patches for High-Severity Flaws Affecting Multiple Products

            VMware on Tuesday patched several high-severity vulnerabilities impacting ESXi, Workstation, Fusion, Cloud Foundation, and NSX Data Center for vSphere that could be exploited to execute arbitrary code and cause a denial-of-service (DoS) condition.

          • Ubuntu Privilege Escalation Security Flaw Puts Millions Of Linux Users At Risk | HotHardware [Ed: You can use Ubuntu without snaps, many people do, and it’s not a severe problem]

            Though there is no exploit or proof-of-concept out there, the information surrounding this vulnerability is, and it is quite likely a threat actor is working on it. As such, it is recommended that security teams and end-users running Linux distros with snap-confine apply patches for these vulnerabilities as soon as possible. However, it should be noted that as long as a threat actor cannot get onto your system as a low-privileged user, there is nothing to worry about. In any event, it is always good to stay up to date with operating systems, as you never know what could be lurking out there in older unpatched versions.

          • Privacy/Surveillance

            • EU watchdog to probe public sector’s love affair with cloud • The Register

              The European Data Protection Board (EDPB) has kicked off its first coordinated enforcement action, taking a long, hard look at the use of cloud-based services by the public sector.

              It’s going to be a big one, involving the launch of investigations by 22 national authorities across the European Economic Area (EEA) and encompass more than 75 public bodies including EU institutions. A wide range of services are to be examined including health, finance, tax, and central buyers or providers of IT services.

              As for how it will work, at national level a questionnaire will be handed out. A formal investigation might then begin depending on the answers.

              The action comes amid expansion by the cloud giants over the last few years and the jump in cloud uptake by both the private and public sector during the COVID-19 pandemic. The outbreak, according to the EDPB, “has sparked a digital transformation of organisations, with many public sector organisations turning to cloud technology.”

            • Facebook is one Chrome extension away from a privacy scandal • The Register

              Multiple Chrome browser extensions make use of a session token for Meta’s Facebook that grants access to signed-in users’ social network data in a way that violates the company’s policies and leaves users open to potential privacy violations.

              Security researcher Zach Edwards last week noted that Brave had blocked a Chrome extension called L.O.C. out of concern it exposed the user’s Facebook data to a third-party server without any notice or permission prompt.

              L.O.C. utilized an access token that can be easily obtained from Facebook’s Creator Studio web app. After extracting this token – a text string composed of 192 letters and numbers – from the app, the browser extension is able to use it with Facebook’s Graph API without being an approved third-party Facebook app to fetch data about the signed-in user.

            • The end of free Google storage for education

              In 2014, Google made a remarkable offer: anyone with a Google Apps for Education account in the US got unlimited storage for free. The logic was sound at the time.

              Three years earlier, the tech giant had launched the Chromebook – cheap, robust and secure, the web-browser-based kit was a natural fit for education. The cloud was its primary storage, so what could be better than making that bigger than any hard disk in a Mac or Windows PC could ever swallow?

              The idea was that if you catch users when they are young, they’re yours for life. The axiom had already been tested by both Apple and Microsoft, with creative types and workers in jobs with sensible shoes respectively. Google played on its own strengths as the first cloud-native platform for everyone. And lo, it was good.

              Seven years later, Google has killed the deal. The tech giant announced the end of infinity in a blog post named, with magnificent chutzpah:, “More options for learning with Google Workspace for Education.”

            • Apple to Update AirTag Safety Features After Stalking Complaints – The New York Times

              Apple said on Thursday that it would make improvements to its AirTag devices to make it more difficult for people to use them to track others without their knowledge.

              AirTags, tiny discs that Apple started selling for $29 last year to help people keep track of items like keys, wallets and phones, have become a headache for the company. People have said on social media and in interviews that they have found the devices hidden on their cars and belongings, leading them to fear they were being stalked.

            • Google will stop cross-app tracking on Android phones

              Google is following Apple in stopping cross-app tracking on Android phones, the company said Wednesday. The change potentially creates another challenge for platforms that rely on app-tracking to understand consumer behavior and bolster their ads businesses.

              “We don’t think there should be a forced choice between privacy and developers building their business,” Anthony Chavez, VP of product management for Android security and privacy, told the Wall Street Journal.

            • Field Notes: Why We Let Our Privacy Bill of Rights Die | by M.M. Leddon | Feb, 2022 | Immerse

              Starting at the end of 2019, I was the creative director, writer and producer on a project called Privy To, with the help of producers Julia Scott-Stevenson and Liz Steininger.

              We called ourselves the Assembly of Privacy Doxographers — Doxographers from the Greek word meaning “those who are concerned with the assembling of histories.” Our project was an attempt to get people thinking about privacy as a living concept with a human history and evolution. We planned three prongs for our project, each exploring different ways in which privacy has been defined in law since the middle ages. These laws were not called “privacy rights’’ at the time they came into being, but they established the conceptual foundations that ultimately led to our modern definitions of privacy and privacy rights. The concept of privacy includes the right to be let alone, the right to the integrity of private communications, the right to be forgotten, among others. There are many associated rights and perceived freedoms that can be swept up into the concept of privacy — freedom of inquiry and copyright, for example.

    • Defence/Aggression

      • A Child’s TikTok Stardom Opens Doors. Then a Gunman Arrives.

        Ava Majury downloaded TikTok when she was 13, and at the height of the pandemic lockdowns a year later had more than a million followers. Her fans, nearly three-quarters of them male, watched her lip-sync and dance to trending music on an account with the profile message, “Hey, I love you!!”

        In early 2020 Ava noticed that one fan, EricJustin111, was trying to get her attention in comments on TikTok. He messaged her in Snapchat and on Instagram, and turned up in online games she played with her brothers. Ava responded to him a few times at first, she said, “because I used to reply to my fans, like ‘Hey, how was your day?’’’

    • Environment

      • Shut off 3G by 2033? How about 2023, asks Vodafone UK [Ed: How to cause a lot of pollution and produce endless digital waste]

        Vodafone is to begin retirement of its 3G network next year, saying this will free up frequencies to improve 4G and 5G services.

        The move follows proposals by the UK government late last year to see 2G and 3G networks phased out by 2033. Other networks have already confirmed plans to start early, with BT phasing out 3G services for EE, Plusnet and BT Mobile subscribers from 2023.

        Vodafone said it will begin retiring its 3G network in 2023 as part of a network modernisation programme.

    • Finance

      • Preparing for the Financial System of the Future [Ed: They just want more financial surveillance and financial censorship (sanctions) on their own terms]
      • How American cash for Canada protests could sway US politics [Ed: Media trying hard to associate opposition to problematic mandates with the far right]

        The Canadians who have disrupted travel and trade with the U.S. and occupied downtown Ottawa for nearly three weeks have been cheered and funded by conservative American activists and politicians who also oppose vaccine mandates and the country’s liberal leader.

      • New Leak Suggests Most Users Funding Canada’s ‘Freedom Convoy’ Reside in U.S.
      • India’s tax inspectors raid Huawei offices • The Register

        The Indian Government’s Income Tax Department has raided the local offices of Chinese telecoms giant Huawei as part of an investigation into whether or not the controversial company has met its local taxation obligations.

        Huawei’s Indian outpost has acknowledged the visit from tax authorities and verified Indian media reports that stated several local staff were interviewed. It also asserted that it does its very best to comply with Indian laws.

        In India, Huawei sells consumer electronics and Wi-Fi routers, and tries to sell telecoms gear – but was last year excluded from 5G rollouts.

      • ‘Keep Your Coins’ crypto asset forfeiture bill introduced in Congress to curb the government’s digital wallet seizure powers

        Prompted by the cryptocurrency wallet forfeiture possibility opened by the Canadian government’s Emergencies Act against the so-called Freedom Convoy financing, a U.S. congressman is introducing a new “Keep Your Coins” bill. It aims to prevent digital asset forfeitures by the government without a court order and stop unsanctioned crypto transactions monitoring.

      • A former Goldman Sachs banker says the plot to loot a Malaysian sovereign wealth fund was laid out in 2012.

        A key witness in the bribery and money-laundering trial of a former Goldman Sachs executive said the scheme to loot billions of dollars from a Malaysian sovereign wealth fund was laid out a decade ago inside the apartment of a flamboyant Asian businessman who remains on the run.

        Tim Leissner, a former Goldman partner who has pleaded guilty in the scheme, testified in Brooklyn federal court on Wednesday that the businessman, Jho Low, had told him and the defendant, his former colleague Roger Ng, about the plan to pay up to $1 billion in bribes to foreign officials.

      • A Dark Moment for Goldman Sachs Goes to Trial

        Opening arguments in a case tied to the 1MDB bribery scandal will begin today.


        Today, the onetime banker Roger Ng is set to stand trial in a Brooklyn courtroom over allegations that he abetted the looting of the huge Malaysian state fund known as 1MDB. The legal proceedings will resurrect a scandal that saw $4 billion stolen from the Malaysian government and tarnished the reputation of Ng’s former employer, Goldman Sachs.

        Ng is said to have introduced Goldman colleagues to Jho Low, the businessman accused of masterminding what Ng’s own lawyers called “perhaps the single largest heist in the history of the world.” According to prosecutors, Low, Ng and the onetime star banker Tim Leissner conspired to pay $1 billion in bribes to government officials, in order to win Goldman mandates for $6.5 billion in bond offerings for 1MDB. Money meant for the fund was then spent on a Beverly Hills hotel, a mega-yacht, a transparent grand piano, financing for “The Wolf of Wall Street” and more.

        His former Goldman colleague is expected to be a key witness. Testimony from Leissner, who pleaded guilty in 2018 and agreed to forfeit up to $43.7 million in assets, is seen as crucial for the prosecution. He could begin testifying as soon as this week. (Low is still at large and denies wrongdoing.)

      • Trial of Ex-Goldman Banker Involved in 1MDB Scandal Set to Begin

        The global scandal over the looting of a big Malaysian infrastructure fund nearly a decade ago — a crime that tarnished the reputation of one of Wall Street’s premier banks — is about to play out once again in a federal courthouse in Brooklyn.

        The criminal money laundering and bribery trial of Roger Ng, a former Goldman Sachs banker, will begin Monday, with opening arguments and federal prosecutors calling their first witnesses.

        The trial comes nearly four years after Mr. Ng, 49, a Malaysian resident, was indicted by federal prosecutors in Brooklyn. And it comes 16 months after Goldman pleaded guilty to a criminal charge and paid $5 billion in fines for its role in the far-reaching foreign corruption bribery scheme.

    • AstroTurf/Lobbying/Politics

      • In a first, FTC extracts millions of dollars from online store accused of blocking bad reviews on its website

        Internet garment slinger Fashion Nova will cough up $4.2m to shut down accusations that it censored negative reviews left by customers on its website.

        The flash clobber biz allegedly used third-party software to screen product reviews before they appeared on its site. Product ratings of four and five stars were automatically published on the e-tailer’s website, while lower-starred, negative reviews were withheld, according to the US Federal Trade Commission [PDF]. Hundreds of thousands of bad reviews were concealed between 2015 and 2019, it was claimed.

        As part of its settlement with the FTC, Fashion Nova will cough up millions of dollars, and must allow all customer reviews to be posted online unless they contain obscene or unlawful content. It’s the first time the American watchdog has extracted dosh from a company for suppressing online negative product reviews.

      • Ryan Zinke Broke Ethics Rules as Interior Secretary, Inquiry Finds

        Mr. Zinke, who left the department in 2019 amid multiple inquiries, misused his office and lied to investigators about his involvement in a Montana land deal, a government watchdog found.

    • Freedom of Information/Freedom of the Press

      • Missouri ends effort to prosecute ‘view source’ journalist • The Register

        A reporter who faced potential hacking charges for viewing website source code in his browser can rest easier now that Missouri officials have decided not to prosecute him.

        This month, Cole County Prosecutor Locke Thompson announced no charges would be filed in conjunction with the revelation that Missouri’s Department of Elementary and Secondary Education’s (DESE) website exposed the Social Security details of educators.

      • Effort to Weaken Press Protections Isn’t Likely to End With Palin Case

        Sarah Palin’s loss of her defamation lawsuit against The New York Times has reaffirmed, for now, more than a half-century of legal precedent that protects journalists when they make inadvertent — even sloppy — mistakes.

        But her case still may have achieved another aim that she and her lawyers said they had all along: to shine an unflattering light on the process of producing daily journalism, and to nudge the courts to reconsider why the law sets an extremely high bar to prove defamation cases against media outlets.

    • Civil Rights/Policing

      • Neurorights and Neuromarkets

        Whitney discusses the ulterior motives and background of the individuals behind the push for “neurorights” at the national and international level and why it’s more about making new markets than protecting our rights.

      • Govt Reaction to CJEU Decision: “It’s about the Child Protection Act, not the Rule of Law”

        After the Court of Justice of the European Union rejected Hungary and Poland’s complaint that the EU may cut funds to member states that violate the rule of law, Justice Minister Judit Varga called the decision “politically motivated,” while Hungary’s ruling Fidesz party reacted by saying Hungary was being “stigmatized” over its child protection law.

      • The Senate’s big online safety bill for kids is finally here [Ed: It is neither about kids nor safety, it's about power]

        After months of hearings and debates, Sens. Richard Blumenthal and Marsha Blackburn have introduced their long-promised legislation to require tech platforms to implement new controls for minors and their parents and make changes to mitigate harms to kids online.

        The Kids Online Safety Act applies to any app or online service that could be used by kids 16 and younger. Under the bill, those platforms would have a duty to prevent the promotion of certain harmful behaviors, including suicide and self-harm, eating disorders, substance abuse and more. They would also have to give parents and users under 16 the ability to opt out of algorithmic recommendations, prevent third parties from viewing a minor’s data and limit the time kids spend on the platform, among other things. Those controls would have to be turned on by default. The bill also includes provisions regarding platforms’ disclosure policies and advertising systems.

        “Big Tech has brazenly failed children and betrayed its trust, putting profits above safety. Seared in my memory — and motivating my passion — are countless harrowing stories from Connecticut and across the country about heartbreaking loss, destructive emotional rabbit holes, and addictive dark places rampant on social media,” Blumenthal said in a statement. “The Kids Online Safety Act would finally give kids and their parents the tools and safeguards they need to protect against toxic content — and hold Big Tech accountable for deeply dangerous algorithms. Algorithms driven by eyeballs and dollars will no longer hold sway.”

        Momentum for this kind of legislation has been growing since whistleblower Frances Haugen came forward with internal research on Instagram’s impact on teens’ mental health. Congress has since called Instagram head Adam Mosseri and Facebook head of Safety Antigone Davis to testify on those findings. Leaders from TikTok, Snap and YouTube have also testified about the well-being of kids on their apps.

      • Do Today’s Unions Have a Fighting Chance Against Corporate America? – The New York Times

        In 1996, Manuel Miranda, a second-generation Filipino American from Kent, Wash., graduated from Evergreen State College. He had majored in literature and got a job in Seattle, taking care of people with cerebral palsy for $9 an hour. The city was “post-grunge” but being transformed by tech, Miranda told me. There was a lot of excitement about Amazon, the online bookseller.

        Miranda applied to work there and started out in the warehouse, packing books and CDs. He then went into customer service, where he responded to questions and complaints. Some people saw the call-center job as a way to fund arty outside ambitions, Miranda said; others wanted an inroad into tech. Miranda earned just a dollar more per hour than he had in caregiving but got stock options, health insurance and the pride of working for a cool, homegrown company.

      • Election laws should keep voting free and fair

        Election legislation in Missouri and across the nation should be reviewed with healthy skepticism, with two key questions asked: 1) Are there credible issues to address? and 2) Does the legislation create obstacles to certain groups of people?

        As the former Missouri Ethics Commission executive director and Missouri elections director in the secretary of state’s office — both nonpartisan positions — I know how our elections work and I understand the necessary components to maintain and improve them. I’m not writing from the viewpoint of one party or ideology. I’ve worked for Republicans and Democrats and have seen both parties’ positions on elections and voting.

    • Internet Policy/Net Neutrality

      • Mon Dieu! French Parent Kills Cell Service For An Entire Town To Stop Kids Surfing | Hackaday

        It used to be that having technical skills meant that fixing the computer problems of elderly relatives was a regular occurrence. Over the last few years this has been joined by another request on our time; friends with teenage children requesting help configuring their routers such that Internet access is curtailed when the kids should sleeping. In France a desperate parent took more extreme measures, buying a wideband frequency jammer to ensure les petits anges can’t waste the night away on social media sites through their cellular connections. It had the intended effect, but sadly it also interrupted cellular coverage over a wide area The French spectrum regulator ANFR sent in their investigators (French, Google Translate link), and now the unfortunate parent faces the prospect of up to 6 months imprisonment and €30,000 fine for owning and using a device that’s illegal in France.

    • Monopolies

      • World’s top chipmaking equipment maker claims Chinese rival may infringe IP [Ed: Trade secrets are trade secrets, not Internet Protocol (IP); the "IP" they allude to is fiction]

        The world’s top manufacturer of lithography equipment, Dutch company Advanced Semiconductor Materials International (ASML), has warned that it believes a Chinese company may be selling chipmaking equipment that infringes its intellectual property rights.

      • Twelve years after Intel was fined $1.2bn for unfairly running over rivals, an EU court says: No need to pay [Ed: Crime pays off more than obeying the law?]

        Intel Corporation no longer has to pay a €1.06bn ($1.2bn, £890m) fine imposed by the European Commission (EC) in 2009 for abusing its dominance of the chip market.

        On Wednesday, the General Court of the European Union annulled the EC antitrust penalty [PDF] after previously upholding it in 2014 [PDF].

        After rival AMD complained in 2000 and again in 2003 that Intel was engaging in anti-competitive conduct by offering its hardware partners rebates for using Intel’s x86 chips, an EC antitrust investigation that got underway in 2004 and concluded in 2009 with a €1.06 billion penalty against Chipzilla.

      • Trademarks

        • Elasticsearch says trademark dispute with AWS ‘resolved’ • The Register

          The dispute between AWS and Elastic looks to be over, with Elastic saying the trademark infringement lawsuit is “resolved.”

          “Now the only Elasticsearch service on AWS and the AWS Marketplace is Elastic Cloud,” said Elastic.

          For its part, Amazon Web Services has begun stripping the term “Elasticsearch” from its website, services, and project names.

          “We view this as a significant step in removing the confusion in the marketplace because there is only one Elasticsearch, and it’s only from Elastic,” said Shay Banon, founder and chief technology officer of Elastic.

        • Node.js Trademarks Transferred to OpenJS Foundation [Ed: Trademark passed to Microsoft mole.]

          The OpenJS Foundation, providing vendor-neutral support for sustained growth within the open source JavaScript community, is announcing acquisition of ownership of the Node.js logo trademarks.

      • Copyrights

        • Digital Rights Groups Ask 11th Circ. To Nix Apple’s IP Appeal [Ed: Quit calling copyrights "IP"]

          Electronic Frontier Foundation, a group of law professors and others on Wednesday urged the Eleventh Circuit to reject Apple’s appeal of a lower court’s decision that Corellium LLC’s “virtual” version of the iPhone to detect potential bugs was protected by copyright’s fair use doctrine.

        • Video Game History Foundation says Nintendo “actively destructive” to game history | KitGuru

          After Nintendo announced it plans shut down the eShop for Wii U and 3DS consoles, the Video Game History Foundation made its objections known, accusing Nintendo of being “actively destructive” to video game history.

          In a tweet posted by the Video Game History Foundation (VGHF), the association accuses Nintendo of funding lobbyists that prevent anyone from providing access to older games. The association understands that blocking commercial access is understandable, but stopping institutions like libraries from preserving antique titles is an act of destruction of video game history.

        • Google Drive flags single-digit files over copyright • The Register

          Google last month announced plans to prevent customer files stored in Google Drive from being shared when the web giant’s automated scanning system finds files that violate its abuse prevention rules.

          “When [a file is] restricted, you may see a flag next to the filename, you won’t be able to share it, and your file will no longer be publicly accessible, even to people who have the link,” Google explained at the time.

          That system is now up and running, just not very well: Google Drive’s scanning system has been finding copyright violations where they do not exist and flagging innocuous files.

[Meme] António Campinos Does to Europe What His Country Did to Africa

Posted in Courtroom, Deception, Europe, Law, Patents at 9:55 am by Dr. Roy Schestowitz

The courts won't like this

Unitary? Unified? Guess it's time Togo to CJEU

Summary: “The Slave Coast” of France (birthplace of António Campinos, just like Benoît Battistelli in spite of the Portuguese- and Italian-sounding surnames) can possibly relate to what Team UPC is trying to do through the Francophonie/Germanic/Anglo-Saxon EPO, imposing European software patents on EU member states by bypassing their national courts (illegally!) and turning software developers into serfs, with sharecropping [1, 2, 3] like in Microsoft GitHub

There’s a Pie in the Face (on Its Way to EPOnia)

Posted in Courtroom, Europe, Law, Patents at 9:43 am by Dr. Roy Schestowitz

Video download link | md5sum 1a2669a9a1962fcc8476e8c4d3f66852
UPC Trouble Ahead
Creative Commons Attribution-No Derivative Works 4.0

Summary: Just like Benoît Battistelli before him, António Campinos keeps ‘defacing’ the EPO‘s Web site [1, 2] with calls to violate constitutions and break the law; patent zealots (they profit from lawsuits) who push for European software patents don’t seem to mind this as long as the EPO’s leadership suits the financial agenda of parasitic elements, even at the expense of science and technology (or so-called ‘innovation’, to use a buzzword) in Europe

THE latest statement from the FFII was reposted here last night, roughly a couple of days after it had first been published. It adds context and news (caselaw) to FFII’s "Unified Patent Court is a Fake Common Court and Violates CJEU’s Jurisprudence of the Last 10 Years" (citing a paper from Prof. Thomas Jaeger) and explains the basis upon which UPC as a system will be legally challenged well before it can even formally launch.

“Those of us who actually care about unity or community (as in “Community Patent”) or the EU (as in “EU Patent”) should strongly oppose the UPC and openly condemn those who incite politicians to break the law.”In the video above I express my thoughts on the matter and some time tomorrow I’ll do a much longer video that confronts the latest disinformation from Team UPC. These litigation fanatics (profiteers) are living in their own fantasy-land and they know that it helps sales (“legal” (dis)services) when they give false hopes to prospective clients, as they've been doing for nearly a decade already. What saddens me about this whole thing is that it tarnishes the image or the reputation of the European Union (EU). The ‘Eurosceptics’ (sometimes code word for nationalists) occasionally say that the EU serves the goals of multinational corporations and/or “America”; if the likes of Breton (European Commission) persist in inciting member states to flagrantly violate their own constitution (using shaming or blackmail tactics — more so while protecting criminal friends of his), who are we to dispute such allegations?

Those of us who actually care about unity or community (as in “Community Patent”) or the EU (as in “EU Patent”) should strongly oppose the UPC and openly condemn those who incite politicians to break the law.

UPC in 2007

2007: UPC coming in 2012!

with egg on one's face

Snap is Not Linux and the Sky is Not Falling

Posted in Deception, FUD, GNU/Linux, Ubuntu at 7:54 am by Dr. Roy Schestowitz

Video download link | md5sum 62f1c79af618526e0d69680bb8117366
Snappy FUD
Creative Commons Attribution-No Derivative Works 4.0

I smell FUDSummary: Fear, Uncertainty, and Doubt (FUD) attacks on “Linux” persist; now there’s some not-too-alarming flaw in snap-confine and we’re meant to think it’s a very serious problem; in the real world, however, it’s not used much on multi-user systems

THIS year started with exceptionally vicious Fear, Uncertainty, and Doubt (FUD) attacks on "Linux" — mostly recycled from last year (trying to float or keep afloat something about a package of Apache). We perceived that to be a form of distraction from what had happened to VMware and Microsoft Windows. The White House was (mis)led to look at the wrong culprit, being advised by the actual culprits.

“The White House was (mis)led to look at the wrong culprit, being advised by the actual culprits.”The general tactic seems to be information warfare. They want us to think or at least ‘feel’ like “everything is broken” or “Linux” is just as unsafe as Windows or other proprietary software. Since the Linux Foundation is nowadays a front for proprietary software companies we ought not expect it to say anything in Linux’s defense. The same is true for media that it bribes for puff pieces. SJVN seems to have become a part-time FUD peddler. Follow the money… (salaries)

Blame 'Linux'The video above is about this not-so-critical flaw in snap-confine. Typically you’d expect some advisory, a fix, and everyone to just move on, carrying on with patched systems. But not this time…

Last night we saw the headline “Multiple vulnerabilities put 40 million Ubuntu users at risk” from clickbait site TechRadar [1, 2], joined by a bunch of other scary-sounding “reports” from Microsoft-connected publishers. Of course they keep blaming “Linux” or insinuating it’s an issue with Linux.

“Of course they keep blaming “Linux” or insinuating it’s an issue with Linux.”What is this really about? It’s about snap-confine, which not so many GNU/Linux systems even have. About a month ago the media did something similar with polkit (part of systemd), wrongly attributing a similar bug to “Linux”.

Running out of FUDWell, in my personal experience, e.g. at work, Snap isn’t widely used. It’s especially ignored in multi-user server systems. It’s used a lot to shoehorn proprietary software and even as a ramp for client-side DRM (things like Steam), not to mention pervasive eavesdropping (e.g. Skype, Microsoft Teams). In other words, if you install things using Snap, then it’s the stuff you install that’s by far greater a threat than Snap itself. Trojan horses with back doors, “telemetry” and even rootkits (“anti-cheat”) are literally “malware”, but we’re meant to think those are honourable because there are large companies behind them.

Snap is “Linux” as much as Photoshop is “Windows”. There are many other package management systems, even better ones and more widely used ones [1, 2, 3], not limited to Linux as a kernel [1, 2].

“So all this commotion in the media (over the past few days) might be motivated by an agenda other than a will to inform readers.”From a technical point of view, Snap offers very bloated packages that are far too big and slow to install. Canonical has been trying to tackle this problem, which is very legitimate a complaint by the way, and meanwhile key staff from Snap has left. Snap/Snapcraft has not been going as well as initially hoped by Canonical, partly because IBM/Red Hat is pushing back with Flatpak and Linux Mint is trying to block what it rightly perceives/views as a potential vendor lock-in of little practical benefit to actual end users.

So all this commotion in the media (over the past few days) might be motivated by an agenda other than a will to inform readers.

Links 19/2/2022: Alternatives to Adobe InCopy and Alternatives to Firefox

Posted in News Roundup at 5:15 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Applications

      • Best Free and Open Source Alternatives to Adobe InCopy

        Adobe is a large multinational computer software company with over 22,000 employees. Its flagship products include Photoshop, Illustrator, InDesign, Premiere Pro, XD, Acrobat DC, and the Portable Document Format (PDF). The products are wrapped up and marketed as the Creative Cloud, a subscription-only way of accessing more than 20 desktop and mobile apps and services for photography, design, video, web, UX, and more.

        We are long-standing admirers of Adobe’s products. They develop many high quality proprietary programs. It’s true there are security and privacy concerns in relation to some of their products. And there’s considerable criticism attached to their pricing practices. But the real issue is Adobe Creative Cloud does not support Linux. And there’s no prospect of support forthcoming.

    • Instructionals/Technical

    • Games

      • Gaming at 1080p and 120 Hz on a Raspberry Pi 4

        For an upcoming project, I was able to acquire an MSI Optix G241 ‘Esports gaming monitor’ that can run up to 144 Hz. Since the monitor runs at 120 Hz too, I decided to see how it worked with the Pi.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • This week in KDE: Oh so many things

          While we work on Plasma 5.24 bugs (and you can see many of them fixed below), we’ve also started to work on many improvements for Plasma 5.25 and KDE apps! Check it out…

          You can once again launch apps from the Application Launcher’s “History” and “Frequently Used” pages (Oleg Solovyov, Plasma 5.24.1)

          In the Plasma Wayland session, moving a window to another virtual desktop or activity using a keyboard shortcut or the relevant Pager applet no longer leaves a semi-transparent non-interactive ghost version of it visible in its former location (Vlad Zahorodnii, Plasma 5.24.1)

    • Distributions

      • SerenityOS: Building an Operating System from Scratch – The New Stack

        In early February the programming podcast “CoRecursive” explored a unique project to build an operating system entirely from scratch — and how that project grew out of a very personal journey.

        The podcast’s host, developer Adam Gordon Bell, began by sharing estimates that building Windows XP took more than 2,000 developers. And yet, Swedish developer Andreas Kling launched a project to build one on his own, coding what Bell describes as resembling an “alternate-world version of the Windows 95 that I grew up using.”

        The operating system’s official website even describes SerenityOS as “a love letter to ’90s user interfaces,” but “with a custom Unix-like core.”

      • BSD

        • The FreeBSD Boot Process

          Throughout this article we will study the FreeBSD boot process. FreeBSD’s boot process is very robust and well thought out, but it differs slightly depending on your system architecture, filesystem (UFS2 or ZFS), partitioning scheme (GPT or MBR), and whether the system boots under UEFI or legacy BIOS (also known as CSM).

      • Slackware Family

        • My “daily drivers”, and what happened to Slackware here

          In yesterday’s post, I mentioned taking my old Mac Mini out of the OS X/macos ecosystem and bringing it into Debian, and then what kind of hilarity followed when I attempted to install a Javascript linter (and it tried to drag in 180+ node-related packages).

          This and some other mentions have prompted some questions, mostly along the lines of “Debian? What happened to Slackware and green-on-black?”… and I guess I can answer some of those.

    • Devices/Embedded

      • Open Hardware/Modding

        • Raspberry Pi Zero 2 W Detects Heat Anomalies with Machine Learning

          In a nutshell, the Pi monitors a boiler in Lauer’s basement using a thermal camera module. A custom machine learning model was created by Lauer to train the Pi to recognize familiar/safe thermal readouts from the system. The data acquired by the Pi is transmitted to a cloud service using a wireless cellular module for the Pi.

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Mozilla

          • What’s the Alternative to Firefox?

            Urgh, Mozilla. What are you doing to me? You, me and Firefox have been good pals since 2005 – not long after your 1.0 release. That’s 17 years…probably older than some of the people reading this post!

            During that time you have become my bastion for the web. As smartphones entered the market, I was quick to install you on there too. But you’re ruining it. Please stop.

      • Programming/Development

        • [Old] What Is The 2038 Problem?

          The 2038 problem refers to the time encoding error that will occur in the year 2038 in 32-bit systems. This may cause havoc in machines and services that use time to encode instructions and licenses. The effects will primarily be seen in devices that are not connected to the [Internet].

        • What is Dog Fooding, Fish Fooding a Product?

          Of course, there’s some things to watch out for when dogfooding. You might get used to workarounds or have a different installation or upgrade path than end users. As a developer, you might have a faster computer or be more technically saavy than your end user.

        • Humble Chronicles: Decomposition

          Now feels like a good time to make this blog an actual log, documenting my findings as I develop Clojure UI library, Humble UI.

          This is an introductory post, describing the overall shape of the project.

          None of the decisions are final and might change at any time. In fact, my expectation is that talking about them in public might help either solidify or replace them, rubber duck-style.

        • Dirk Eddelbuettel: RcppSimdJson 0.1.7 on CRAN: Maintenance

          The RcppSimdJson package was updated to release 0.1.7 today. CRAN had sent a note overnight that it triggered ‘LENGTH_1’ error (where boolean comparisons happen with longer vectors). That may be debatable in the two cases flagged if one looks at the commit but life being too short to debate this so we just fixed it. The email came in at 04:50h-ish when I was sound asleep, but four hours later the fixed version was on CRAN thanks to the automated processing:

  • Leftovers

    • Science

      • Classic Chat: Preserving Computer History | Hackaday

        To answer that most pressing question, what’s worth saving from the landfill, Dag says the CHM often follows what they call the “Ten Year Rule” before making a decision. That is to say, at least a decade should have gone by before a decision can be made about a particular artifact. They reason that’s long enough for hindsight to determine if the piece in question made a lasting impression on the computing world or not. Note that such impression doesn’t always have to be positive; pieces that the CHM deem “Interesting Failures” also find their way into the collection, as well as hardware which became important due to patent litigation.

        Of course, there are times when this rule is sidestepped. Dag points to the release of the iPod and iPhone as a prime example. It was clear that one way or another Apple’s bold gambit was going to get recorded in the annals of computing history, so these gadgets were fast-tracked into the collection. Looking back on this decision in 2022, it’s clear they made the right call. When asked in the Chat if Dag had any thoughts on contemporary hardware that could have similar impact on the computing world, he pointed to Artificial Intelligence accelerators like Google’s Tensor Processing Unit.

        In addition to the hardware itself, the CHM also maintains a collection of ephemera that serves to capture some of the institutional memory of the era. Notebooks from the R&D labs of Fairchild Semiconductor, or handwritten documents from Intel luminary Andrew Grove bring a human touch to a collection of big iron and beige boxes. These primary sources are especially valuable for those looking to research early semiconductor or computer development, a task that several in the Chat said staff from the Computer History Museum had personally assisted them with.

    • Education

    • Hardware

      • Apple-1 Mystery Is Finally Solved 45 Years Later

        You can read the full story over at the Apple-1 Registry, where you’ll find letters of authentication documents signed by PSA. Here is a link to one of the certified boards, which notes: “Steve Jobs did not sign the circuit board, however, all writing was written in his hand.”

      • Buying a new graphics card

        I’ve been looking to buy a new graphics card for the last year or so. Already you can probably tell where this is going.

        My Asus GTX 970 OC edition has served me well over the years playing Minecraft with shaders, and games like X-Plane and Train Simulator. The Nvidia binary blob drivers work great on FreeBSD, and Debian for Steam games. Alas, it doesn’t fit in my smaller sleeper PC case rebuild, so I’ve sold it and am using the integrated Intel silicon while I decide what to do.

    • Health/Nutrition/Agriculture

      • Dangerously Awash in Chemicals

        “We have overwhelming evidence of negative impacts on Earth systems, including biodiversity and biogeochemical cycles,” according to Bethanie Carney Almroth, University of Gothenburg. (Source: Marc Préel, Plastic, Chemical Pollution beyond Planet’s Safe Limit: Study, Phys.org, February 15, 2022, Stockholm Resilience Centre, Stockholm University)

        According to Bethanie Carney Almroth: “The impacts that we’re starting to see today are large enough to be impacting crucial functions of planet Earth and its systems,” Ibid.

      • Religion, magic, and slavery: Rhetoric about masks and vaccines

        Since the pandemic hit two years ago, I’ve been documenting increasing commonalities between antivaxxers of your (i.e., before and during the pandemic) and antimaskers, admittedly, a catch-all term that describes those opposed to masks and mask mandates, as well as pretty much every other nonpharmacological intervention (NPI) to slow the spread of COVID-19, particularly in terms of rhetoric. A while back, I was perusing the website of the Brownstone Institute, the right wing libertarian “free market” institute that its founder Jeffery Tucker described as the “spiritual child of the Great Barrington Declaration (GBD), that famous document from fall 2020 that, in essence, advocated a “let ‘er rip” strategy for COVID-19 among “low risk” young and healthy people, all in order to achieve what it viewed as the “inevitable”—”natural herd immunity”—more rapidly, while advocating a vaguely defined “focused protection” to prevent mass death among the elderly and those vulnerable to severe disease and death. Given that the GBD was published before there were safe and effective vaccines available and that as a practical matter it’s impossible to protect such a large portion of the population from a respiratory virus that’s spreading unchecked through the rest of the population, it was a dangerous proposition.

      • Official New Covid Policy: Pretend It Isn’t Happening

        The geniuses calling for us to get back to normal never mention that this virus can make you ill for a long time, namely years. Or that it can easily kill anyone in the majority of Americans with co-morbidities, from obesity and diabetes to old age. Or that once you get covid, you can get it again and again and again. There appears to be no such thing as acquired, natural immunity. How are you supposed to live normally with that? Something’s gotta give, and from my perch in the peanut gallery, that something is the whole concept of normal.

        If the choice is wearing an N95 mask in public or almost certainly risking death or disability, any sane person wears the mask. If someone’s so fanatical about their “freedom” to get sick, die and kill other people, well sorry, those beliefs make that person an imbecile. For the rest of us, wearing the mask is the new normal. It doesn’t go away till covid does. Not when it subsides between peaks, not when it becomes endemic. When it’s gone. Then we take off our masks.

    • Integrity/Availability

      • Proprietary

        • Why Coinbase admitted Apple calls the shots

          One of Web3’s benefits, according to boosters such as Jack Dorsey, is that it’s censorship-resistant. Because it is decentralized, this argument goes, it is impossible to censor anyone. But it isn’t true that cryptocurrency is decentralized. Right now, Web3 has a choke point: Big Tech.

          Cryptocurrency has relied on points of centralization since the days of Mt. Gox. (That hack wouldn’t have mattered nearly as much if Mt. Gox hadn’t been processing 80 percent of all transaction volume in Bitcoin at times). As the ecosystem has expanded, so have the points of centralization, such as AWS and Google Cloud.

        • Microsoft Teams Targeted With Takeover Trojans

          Threat actors are targeting Microsoft Teams users by planting malicious documents in chat threads that execute Trojans that ultimately can take over end-user machines, researchers have found.

          In January, researchers at Avanan, a Check Point Company, began tracking the campaign, which drops malicious executable files in Teams conversations that, when clicked on, eventually take over the user’s computer, according to a report published Thursday.

        • Are You Prepared for 2022′s More Destructive Ransomware? [iophk: Windows TCO]

          We’re barely into 2022, and already we’re seeing ransomware proliferate. What we saw last year is that while most attacks continue to exploit known vulnerabilities, cybercriminals have also redoubled efforts to target new ones – such as what we saw with Hafnium and new Microsoft Exchange vulnerabilities.

          We expect that this year, as a result of the high-profile attacks of 2021, many organizations are finally dedicating time to basic cyber hygiene. And as they continue efforts to patch the one- to three-year-old Common Vulnerabilities and Exposures (CVEs) that most cybercriminals seek to exploit, 2022 will most likely be a record year for the number of CVEs reported – in excess of 22,000, we expect. This will likely raise the high-water mark even further as the attack surface continues to expand. And attackers will start to use those fresh or zero-day vulnerabilities to target unprepared organizations with speed.

        • Their Bionic Eyes Are Now Obsolete and Unsupported

          Ross Doerr, another Second Sight patient, doesn’t mince words: “It is fantastic technology and a lousy company,” he says. He received an implant in one eye in 2019 and remembers seeing the shining lights of Christmas trees that holiday season. He was thrilled to learn in early 2020 that he was eligible for software upgrades that could further improve his vision. Yet in the early months of the COVID-19 pandemic, he heard troubling rumors about the company and called his Second Sight vision-rehab therapist. “She said, ‘Well, funny you should call. We all just got laid off,’ ” he remembers. “She said, ‘By the way, you’re not getting your upgrades.’ ”

        • Bionic eye recipients left in the dark with obsolete tech

          Why it matters: Entrepreneurs are rushing to cash in on recent advances in brain technology with such hopes as reversing depression, treating Alzheimer’s disease or restoring mobility.

          But not all companies will succeed and the risk for early adopters is that their high-tech implants turn into just another obsolete gadget.

          The fallout of Second Sight’s saga is a reminder of the perils of relying on private companies for essential health devices.

        • SquirrelWaffle Adds a Twist of Fraud to Exchange Server Malspamming [iophk: Windows TCO]

          SquirrelWaffle – the newish malware loader that first showed up in September – once again got its scrabbly little claws into an unpatched Microsoft Exchange server to spread malspam with its tried-and-true trick of hijacking email threads.

          That’s the same-old, same-old, as in, a SquirrelWaffle campaign will hijack an email thread to increase the chances that a victim will click on malicious links. Those rigged links are tucked into an email reply, similar to how the virulent Emotet malware – typically spread via malicious emails or text messages – has operated.

        • Security

          • Privacy/Surveillance

            • Mainstream Brain-Computer Interfaces Are Coming — Just Ask Synchron, Neuralink, Paradromics, and HackerBCI

              Last November, a small company called Synchron was granted regulatory approval by the FDA to conduct tests on human volunteers using its brain implant, Stentrode. It’s a neural implant that is inserted via the jugular vein into the blood vessels that sit on top of the brain. Once in position, small electrodes are deployed inside the vessel, close to the brain’s surface, that are able to send signals via an infrared transmitter surgically inserted into the chest. Machine-learning algorithms can be used to parse those signals, allowing paralyzed subjects to carry out simple tasks like moving a cursor on-screen.

            • Digital cash: EU Parliament attacks anonymous payments in cryptocurrencies

              A draft EU Parliament report published today would ban anonymous payments and donations in cryptocurrencies. The €1000 limit for anonymous transactions proposed by the EU Commission would be abolished. Only peer-to-peer payments between local wallets without the involvement of service providers would remain possible without identification.

              For the Pirates in the EU Parliament, the stated aim to tackle money laundering and terrorism is only a pretext to gain more control over personal data of EU citizens.

            • Social Media Giants Face Uncertain Future

              Macroeconomic factors usually impact major social media companies in similar ways. But in Q4, the three social giants — Meta, Snap and Twitter — all outlined different narratives and mixed messaging for the future of their businesses.

              Meta kicked things off Feb. 2, and it was dismal to say the least. The stock hemorrhaged 26% in the following trading session after reporting disappointing user growth, earnings and weak revenue guidance for Q1. That decline in Meta stock erased $230 billion in market value from the broader market and was the single largest drop ever by a U.S. company.

    • Defence/Aggression

      • Opinion | Could Western Media Hysteria Lead to War With Russia?

        Thursday was roiling with headlines—thanks to remarks from U.S. government officials, including President Biden, Secretary of State Antony Blinken and US Ambassador to the UN Linda Greenfield—that a Russian invasion of Ukraine was “imminent.” As a result, social media was crackling with the speculation that war might break out any moment. 

      • California Bill Would Allow Citizens to Enforce Assault Weapon Ban

        California Democratic Gov. Gavin Newsom on Friday endorsed legislation that would allow private citizens to enforce the state’s ban on assault weapons.

        California’s new bill mimics a Texas law empowering private citizens to enforce the state’s draconian abortion ban by suing anyone who “aids or abets” an abortion after six weeks of pregnancy.

      • The Western Allied Nations Bully the World While Warning of Threats From China and Russia

        The next day, on January 22, Ukraine’s Foreign Minister Dmytro Kuleba summoned Germany’s ambassador to Ukraine, Anka Feldhusen, to Kyiv and “expressed deep disappointment” regarding the lack of German weapons provided to Ukraine and also about Schönbach’s comments in New Delhi. Vice Admiral Schönbach released a statement soon after, saying, “I have just asked the Federal Minister of Defense [Christine Lambrecht] to release me from my duties and responsibilities as inspector of the navy with immediate effect.” Lambrecht did not wait long to accept the resignation.

        Why was Vice Admiral Schönbach sacked? Because he said two things that are unacceptable in the West: first, that “the Crimean Peninsula is gone and never [coming] back” to Ukraine and, second, that Putin should be treated with respect. The Schönbach affair is a vivid illustration of the problem that confronts the West currently, where Russian behavior is routinely described as “aggression” and where the idea of giving “respect” to Russia is disparaged.

      • Russia Announces Nuclear Drills Amid Tensions Over Ukraine

        Amid ongoing calls for a diplomatic resolution to tensions over Ukraine, Russia’s military announced Friday that it would hold nuclear drills this weekend.

        Scheduled for Saturday, the drills will be overseen by Russian President Vladimir Putin and will involve the launching of ballistic and cruise missiles, Russia’s Defense Ministry said, according to state news agency TASS.

      • A Call for Peace: Russian & U.S. Women Push for Diplomacy, Not Military Action, to Resolve Crisis

        U.S. Secretary of State Tony Blinken and Russian Foreign Minister Sergey Lavrov have agreed to meet next week as tension remains high over Ukraine. Meanwhile, Russia has announced plans to stage massive drills on Saturday of its nuclear forces, including multiple practice missile launches. We speak with Russian journalist Nadezhda Azhgikhina, one of a group of two dozen independent Russian and American women who released an open letter this week calling for peace. The letter reads, “We are united in the belief that diplomacy, dialogue, engagement and exchange are urgently needed to end the current crisis and avert a catastrophic military conflict that could spiral out of control — even push the world to the precipice of nuclear war.”

      • Opinion | We Need to Talk About the Jewish National Fund

        The world took little notice last month when over 100 Bedouin, a third of them minors, were arrested in the Negev/Naqab desert in Southern Israel. They were protesting the Jewish National Fund’s planting trees on 300 dunams as part of a 5,000 dunam (1,236 acre) afforestation project on land where 300,000 Palestinian citizens of Israel live and farm. 

      • Africa Must Not Abandon Palestine by Granting Israel Observer Status

        Africa is currently facing one of its most crucial decisions regarding Palestine and Israel. The repercussions of this decision could be as significant as the 1975 Resolution 77 (XII) by the Organization of African Unity – the precursor to the African Union – which recognized Zionism, Israel’s founding ideology, as a form of racism. This time around, however, it is Palestine, not Israel, that stands to lose.

        Israel’s attempt to gain observer status at the AU began years ago. For many years, most African countries have severed all ties with Israel in solidarity with Palestine and other Arab countries. The African boycott, which began in earnest in 1973, faltered soon after the Palestinian leadership itself signed a series of agreements with Israel, starting with the Oslo Accords of 1993. Seeing Palestinians and other Arab countries ‘doing business’ with Israel, some African countries felt that their solidarity was no longer serving a particular purpose, thus the revival of diplomatic ties with Tel Aviv.

      • Israeli Reactions to Amnesty’s Apartheid Report

        The evidence all points in one direction: Israel constitutes an apartheid state as defined under international law. As Paul O’Brien, Executive Director of Amnesty International USA put it, “the Israeli government’s system of apartheid violated international law, and serious human rights violations committed to maintain the system constitute crimes against humanity.” He goes on to point out that “This system does not exist in a vacuum—foreign governments, including that of the United States, facilitate apartheid by supplying the Israelis with arms and failing to hold Israeli authorities accountable for their systemic human rights violations.”

        The Amnesty International report does not stand alone. It follows similar investigations by Human Rights Watch, the Israeli human rights organization B’Tselem, and Palestinian organizations as well. Indeed, the collective documentation proving that Israel is an apartheid state is so overwhelming that Israel and its allies no longer bother to address the evidence. Instead they summarily dismiss it with three formulaic responses:

      • Bomb Threats Menace Historically Black Colleges During Black History Month
      • Raising the stakes Meduza uncovers why the Russian State Duma asked Putin to recognize the breakaway ‘republics’ in eastern Ukraine

        The tensions surrounding the Russia-Ukraine crisis have continued to escalate with no end in sight. On Thursday, February 17, U.S. President Joe Biden said that there’s still a “very high” threat of a Russian invasion of Ukraine, warning that this could happen “in the next several days.” The Kremlin, meanwhile, underscored that it has no plans of backtracking on its demands for comprehensive security guarantees from Washington and NATO. Moscow raised the stakes again earlier this week when the State Duma adopted an official resolution urging President Vladimir Putin to recognize the self-proclaimed “republics” in eastern Ukraine. Meduza special correspondent Andrey Pertsev uncovers why this step was taken and how it was orchestrated.

      • Something Evil in the Air: US F-22s Deploy to the UAE

        In 2015, the Kingdom of Saudi Arabia and the United Arab Emirates led a coalition of Arab states in an unprovoked attack on Yemen. Their objective was to restore President Abdrabbuh Mansur Hadi who had been overthrown the year before by the country’s Iran-backed Houthi rebels. The US has participated indirectly in the war. The US has supported the Saudi-led coalition (“SLC”) with intelligence sharing, targeting assistance, logistics assistance, arms sales, transfer of spare parts for SLC warplanes, and (until November 2018) in-flight refueling of coalition warplanes. US assistance to the coalition has continued even after President Joe Biden’s announcement on February 4, 2021 that the US was ending support for “offensive operations” in Yemen.

        The recent flexing of US muscle comes in response to drone and missile attacks on the UAE in January by Yemen’s Houthi rebels (formally known as Ansar Allah: “Party of God”). Houthi cross-border drone and missile attacks have become relatively commonplace in Saudi Arabia, but not in the UAE. Before January 17, the last Houthi drone attack on the UAE occurred on July 26, 2018 when a Houthi drone struck Abu Dhabi International Airport.

      • Gestapu: How the US Used an Indonesian Massacre to Deepen the Sino-Soviet Split

        Kissinger’s aide, Winston Lord, was not so reticent.[1] He explained that the visit had become possible only when the ‘Sino-Soviet bloc was no longer a bloc’ and praised the State Department whose China-expert, Marshall Green, was one of the thirteen persons in Nixon’s delegation to Beijing. The nitty-gritty of splitting the Sino-Soviet bloc had long been the work of Green before he was an aide to Secretary of State William Rogers.

        By the late ‘60s, Moscow and Beijing, once Cold War allies, were deadly enemies. Beijing feared nuclear attack, large tank battles had occurred in north-east China and the Uyghur people in the south-west had received Soviet support. Along parts of the Chinese border, forty divisions of Soviet troops (half a million men) were threatening.

      • Wave of Bomb Threats Terrorizing Historically Black Colleges Continues During Black History Month

        The House Subcommittee on Crime, Terrorism and Homeland Security heard testimony Thursday about a wave of bomb threats against historically Black colleges and universities, including more than a dozen this month alone. February is Black History Month. More than 60 educational groups called on Congress this week to take immediate steps to support and protect HBCUs. We speak with legendary filmmaker Stanley Nelson, whose 2017 PBS film, “Tell Them We Are Rising: The Story of Black Colleges and Universities,” documents the pivotal role HBCUs played in dismantling segregation after the Civil War and creating a Black middle class.

      • Lessons from January 6th: an Inside Job

        Over a year after the harum-scarum storming of the U.S. Capitol, there is ample evidence that it was an inside job. Not only was the security detail intentionally minimized to the extreme, but decisions were made at the highest levels of the chain of command to allow a right-wing mob to rampage through the building. At the forefront of this antidemocratic horde, as we shall see, there were fascist or semi-fascist organizations whose leadership has multiple direct ties to the military and intelligence agencies. All of this raises fundamental questions regarding the true nature of the U.S. government and its relationship to fascism.

        Unfortunately, two false narratives concerning January 6th dominate the corporate media. On the one hand, the Democratic Party and its press allies have run a mawkish faith-in-government campaign, presenting themselves as the last great guardians of ‘our sacred democracy,’ while refusing to aggressively combat the fascist threat and back-peddling on all of Biden’s more progressive campaign promises. On the other hand, the Trump camp and its media have concocted a self-serving narrative according to which the storming of the Capitol was a false flag operation that lured ‘patriots’ into a trap, leading to the prosecution of innocent, freedom-loving MAGAs in the ‘second war on terror.’ Through an incredible act of ideological transubstantiation, which is unfortunately a common feature of white supremacy, the rioting antidemocratic mob is thereby transformed into victims rather than perpetrators of violence.

      • US Is Effectively Stealing Billions From a Nation Ravaged by a US-Initiated War
      • Biden’s $7 Billion Afghan Heist

        Of the country’s reserves, $7 billion were “parked” in U.S. financial institutions. This is normal procedure for developing countries, with the, now in retrospect, very ironic purpose of keeping funds in a secure place. Watching this latest Biden debacle, Central Banks of multiple countries are now surely contemplating pulling their monies out of U.S. financial institutions to protect them against arbitrary dictatorial disposal.

        After the Executive Order was issued, Da Afghanistan Bank — Afghanistan’s U.S.-built Central Bank — issued a statement that was both judicious and, to an American reader, embarrassing. It offered a measured, dumbed down 101 on what a monetary reserve is and what a Central Bank does. One might have hoped that a U.S. president, or at least his advisers, would know this, but evidently not.

      • The Biden Administration Must Immediately Unfreeze Afghanistan’s Assets and End the Devastating Sanctions

        This man-made humanitarian catastrophe is a direct result of American policies, namely freezing Afghanistan’s foreign assets and implementing strict sanctions. Prior to the American withdrawal, nearly 80% of Afghanistan’s budget came from the international community. That money has been cut off, causing a total economic collapse and imminent mass starvation. Human rights organizations working in Afghanistan have expressed the dire need for the United States to unfreeze Afghanistan’s assets and end the sanctions in order to mitigate the enormous—and unnecessary—suffering of the Afghan people and prevent Afghanistan from becoming a failed state.

        On February 11th, the Biden Administration announced that the United States will unfreeze seven billion dollars of Afghanistan’s currently frozen assets and reserve half of that money for legal claims brought by the families of American 9/11 victims, with the other half going to humanitarian aid. This outrageous policy all but guarantees the collapse of Afghanistan’s central bank, and an increase in instability and starvation. In response to this announcement, Afghan-American activist Bilal Askaryar stated: “The people of Afghanistan had nothing to do with 9/11; that is an undeniable fact. What Biden is proposing is not justice for 9/11 families, it is theft of public funds from an impoverished nation already on the brink of famine and starvation…”

      • Afghanistan on the Brink of Disaster

        And you don’t need bombs to play. All you need is the will to dominate and the ability to dehumanize “the enemy,” so that their lives can be trashed if (and when) necessary.

        I have to confess a stunned speechlessness as I learn about the looming fate of Afghanistan, if President Biden refuses to release $9.4 billion of its assets to the country’s central bank, which it had deposited abroad, primarily at the U.S. Federal Reserve, during the 20-year war. With the Taliban reclaiming power after the U.S. withdrawal last August, the president seized control of these assets, potentially plunging Afghanistan into economic freefall, and . . . oh God . . .

      • When the Taliban Came to Geneva

        The positive side was that during a weeklong stay, representatives of the Islamic Emirate of Afghanistan (IEA) signed a document vowing to “facilitate principled humanitarian action in Afghanistan and to ensure the protection of humanitarian workers and aid,” according to the hosting NGO. The delegation also committed to “promote the full respect and protection of health care facilities, transports and staff, including female workers,” the NGO said.

        But questions were raised about the visit. Should they have been invited by the Swiss NGO? Should officials have met with them? Although a similar delegation (with women) had been received in Oslo in late January, sitting down at the table with such well documented human rights violators is a strong leap, even in neutral Switzerland, which bills itself as the human rights/humanitarian capital of the world.

      • What Is Going to Happen in Ukraine?

        There are three possible scenarios:

        The first is that Russia will suddenly launch an unprovoked invasion of Ukraine.

      • Mass evacuations raise fears of a major event looming in eastern Ukraine

        Eastern Ukraine’s Russia-backed separatists have announced mass evacuations, urging women, children, and the elderly to relocate to Russia. Denis Pushilin, the head of the so-called Donetsk People’s Republic (DNR), explained that refugees would receive all the basic necessities at shelters ready and waiting in Russia’s Rostov region (though the governor there later revealed that he had no knowledge of an incoming wave of evacuees). After Pushilin’s public address, sirens sounded in Donetsk, and residents formed long lines at ATMs throughout the city.

      • Self-declared separatist republics in eastern Ukraine announce mass evacuations, alleging imminent offensive by Kyiv

        In a video address shared on February 18, the head of the self-declared Donetsk People’s Republic (DNR) in eastern Ukraine announced the start of “a mass, centralized departure of the population to the Russian Federation” due to growing tensions in the region and a supposedly imminent attack from Ukrainian government troops:

      • Documents Reveal US Gov’t Spent $22M Promoting Anti-Russia Narrative in Ukraine and Abroad

        Amid soaring tensions with Russia, the United States is spending a fortune on foreign interference campaigns in Ukraine. Washington’s regime-change arm, the National Endowment for Democracy (NED), has spent $22.4 million on operations inside the country since 2014, when democratically-elected President Viktor Yanukovych was overthrown and replaced by a successor government handpicked by the U.S. Those operations included propping up and training pro-Western political parties, funding pliant media organizations, and subsidizing massive privatization drives that benefit foreign multinational corporations, all in an effort to secure U.S. control over the country that NED President Carl Gershman called “the biggest prize” in Europe.

      • Biden ‘Convinced’ Putin Will Invade as Peace Movement ‘Opposes Any War Over Ukraine’

        With U.S. President Joe Biden “convinced” that Russian President Vladimir Putin is planning not only confirmed nuclear drills but also an invasion of Ukraine that Moscow has repeatedly denied, the global peace movement on Friday reiterated calls for de-escalation.

        “Stop the War opposes any war over Ukraine, and believes the crisis should be settled on a basis which recognizes the right of the Ukrainian people to self-determination and addresses Russia’s security concerns,” declares a statement from the U.K.-based coalition signed by thousands of people.

      • An Unwinnable War in Ukraine has No Upside for Putin, But Threats have the West Lining up to Listen

        “When I sat down at my desk every morning for years,” a retired British diplomat told me, “the first thing I would read were reports of Soviet, and later Russian, military manoeuvres on their borders.” He added that these could cause alarm, but they never turned out to mean very much.

        Suddenly, American and British politicians and diplomats are speaking of a faint glimmer of hope of peace, illuminating the dark scene they had been painting only 24 hours earlier when a Russian invasion was being described as imminent. Russian officials are crowing about dispelling the dark cloud of war hysteria and stressing that no invasion had ever been planned.

      • Metadata reveals that DNR and LNR leaders recorded evacuation announcements two days in advance

        The video addresses announcing mass evacuations shared on February 18 by the leaders of the self-proclaimed Donetsk and Luhansk “people’s republics” were actually recorded on February 16. This was reported by Bellingcat’s training and research director Aric Toler, who verified video metadata from the clips. 

      • Judge rules Oath Keepers leader must remain in jail ahead of seditious conspiracy trial

        A federal judge on Friday ruled that Stewart Rhodes, the Oath Keepers leader charged with seditious conspiracy over the Jan. 6, 2021, attack on the U.S. Capitol, must remain in jail while awaiting trial.

        U.S. District Judge Amit Mehta denied Rhodes’s renewed request to be released, concurring with a federal magistrate judge’s order that he be denied bail because he would pose a danger to the community if allowed out of jail.

      • Ukrainian DDoS Attacks Should Put US on Notice–Researchers

        On Tuesday, institutions central to Ukraine’s military and economy were hit with a wave of denial-of-service (DoS) attacks, which sparked an avalanche of headlines around the world. The strike itself had limited impact — but the larger implications for critical infrastructure beyond the Ukraine are worth noting, researchers said.

        The targets were core entities to Ukraine: the Armed Forces of Ukraine, the Ministry of Defense, Oschadbank (the State Savings Bank) and Privatbank, the country’s largest commercial bank, servicing nearly 20 million customers. Oschadbank and Privatbank are considered “systemically important” to Ukraine’s financial markets.

      • Erik Prince and an Army of Spies Keep Meddling in US Politics

        The news that Blackwater founder Erik Prince was working with former spies to go after Trump opponents is just the tip of the iceberg. Former intelligence officers and other denizens of the national security state are increasingly meddling in domestic US politics.

      • Mobile internet disrupted in Luhansk, Ukraine amid heightened tensions with Russia

        Network data from NetBlocks confirm a significant disruption to internet service in Luhansk, Eastern Ukraine on Thursday 17 February 2022. Metrics show a multi-hour loss of connectivity on infrastructure used by the Vodafone mobile network, corroborating user reports of loss of cellular service in Luhansk and Donetsk.

      • Islamic State collaborators received Turkish citizenship, official report shows

        Shortly after the Islamic State’s (IS’s) leader was killed in a Syrian hideout near the Turkish border, a leaked report by Turkey’s Financial Crimes Investigation Board (MASAK) revealed details about how the jihadi group used the country to traffic money and obtain supplies, including drone parts.

      • Niger to accept foreign troops fighting insurgents in Sahel

        Niger will host French and European special forces after their withdrawal from neighboring Mali, President Mohamed Bazoum confirmed on Friday.

      • The Politics of Hijab in India

        To make an objective assessment of the ongoing hijab controversy, some pertinent observations are needed. The said government college in Udupi (Karnataka) is a government college with more than 100 Muslim students, both boys and girls. Out of them, the eight girls who started the hijab issue started wearing it only since 31st December. Before that day, they used to come and attend classes in usual college uniform.

      • CISA Insights: Foreign Influence Operations Targeting Critical Infrastructure | CISA

        CISA has released CISA Insights: Preparing for and Mitigating Foreign Influence Operations Targeting Critical Infrastructure, which provides proactive steps organizations can take to assess and mitigate risks from information manipulation. Malicious actors may use tactics—such as misinformation, disinformation, and malinformation—to shape public opinion, undermine trust, and amplify division, which can lead to impacts to critical functions and services across multiple sectors.

      • NCSC-NZ Releases Advisory on Cyber Threats Related to Russia-Ukraine Tensions

        The New Zealand National Cyber Security Centre (NCSC-NZ) has released a General Security Advisory (GSA) on preparing for cyber threats relating to tensions between Russia and Ukraine. The advisory recommends organizations review their security posture and monitor for cyber incidents and provides additional resources to help protect against potential threats.

    • Environment

      • What Drives Sea Level Rise?

        A new report led by scientists at the National Oceanic and Atmospheric Administration warns that the U.S. should prepare for 10-12 inches of relative sea level rise on average in the next 30 years. The rise is due to both sinking land and global warming. And given the greenhouse emissions released so far, the country is unlikely to be able to avoid it.

        That much sea level rise means cities like Miami that see nuisance flooding during high tides today will experience more damaging floods by midcentury. Nationally, the report expects moderate coastal flooding will occur 10 times as often by 2050. Without significant adaptations, high tides will more frequently pour into streets and disrupt coastal infrastructure, including ports that are essential for supply chains and the economy.

      • Facebook Misled Investors About Battling Climate, Covid Lies: SEC Filings

        In complaints to the U.S. government, Facebook whistleblower Frances Haugen accused the tech giant of misleading investors about combating climate and Covid-19 misinformation, The Washington Post revealed Friday.

        “Congress must now step in and require the type of safety reporting that is found in industries from car manufacturers to agriculture.”

      • ‘Cancel This Project’: Price Tag of Trans Mountain Expansion Nearly Doubles

        Climate activists on Friday renewed calls for canceling the expansion of the Trans Mountain oil pipeline after the Canadian government responded to the project’s soaring cost by pledging not to put any more public money into it.

        “Trans Mountain is an absolute dumpster fire and it’s outrageous that it’s been allowed to carry on on the public dime all this time.”

      • Worth More Standing
      • Energy

        • US Reactors Dangerously Operating Using Counterfeit Parts

          This hair-raising news is just one of the shocking findings in a set of seven reports released February 10 by the US Nuclear Regulatory Commission’s (NRC) Office of Inspector General (OIG), now headed by Robert J. Feitel.

          Among the findings of the first of the seven reports were: 1. “Counterfeit, fraudulent, and suspect items (CFSI) are present in operating plants”; 2. “The extent of CFSI in operating plants is unknown because the NRC does not usually require licensees to track CFSI” … “if done at all, tracking is voluntary and methods and data quality vary among licensees”; 3. The questionable “termination of [some] rulemaking in 2016 that addressed CFSI oversight concerns”; and 4. “Department of Energy staff identified more than 100 incidents involving CFSI in FY 2021 alone, including 5 incidents involving safety-significant components.”

        • Court Approves Surrey Oil Development But Campaigners Hail ‘Important Legal Victory’

          Judges in the Court of Appeal have ruled that Surrey County Council acted lawfully in its approval of an onshore oil development, despite ignoring emissions produced when the fuel is eventually used.

          Campaigners welcomed a decision on Thursday from one of the three judges, however, who said the council had failed to consider the full impacts of the project in its environmental assessment.

        • Inadequate OpSec

          By far the most interesting source is the 20-page Statement of Facts filed by Christopher Janczewski, a Special Agent assigned to the Internal Revenue Service, Criminal Investigation (IRS-CI). It provides a detailed timeline of the important transactions, which in summary is:

          In August 2016 someone compromised Bitfinex, and made over 2000 unauthorized transfers totalling 119,754 BTC from Bitfinex wallets to a wallet the IRS names 1CGA4s.

        • Melania Trump Calls the Media ‘Dream Killers’ for Scrutinizing Her Sketchy Fundraisers

          The New York Times reported last week that Melania is under investigation in Florida for hosting an event to raise money for a charity that may not actually exist. Trump’s “Fostering the Future” program, which is part of her Be Best initiative that began while in the White House, is not registered with the Florida Consumer Services Division, according to the Times. A spokesperson for the state agency told the paper that it was “currently investigating whether this event involves an entity operating in violation of” state law.

      • Wildlife/Nature

    • Finance

      • Child Poverty Increased by 41 Percent After Monthly Tax Credits Expired
      • Fetterman Calls for Permanent Expansion of Enhanced Child Tax Credit

        Pennsylvania Lt. Governor John Fetterman, a progressive U.S. Senate candidate, voiced support Friday for permanently boosting the Child Tax Credit after research showed that Congress’ failure to extend the enhanced benefit caused child poverty to spike in January.

        “Washington needs to be helping working families across the country, making their lives easier,” Fetterman said in a statement. “The Child Tax Credit did just that, and it’s an embarrassment that we allowed this program to expire.”

      • ‘Morally Obscene’: Sanders Blasts GOP, Manchin Over 41% Spike in Child Poverty

        Sen. Bernie Sanders on Thursday castigated the GOP and Democratic Sen. Joe Manchin for killing the boosted Child Tax Credit after new research showed that child poverty spiked by 41% in January—the first month since July 2021 that eligible families didn’t receive the popular benefit.

        “In January, the child poverty rate increased by 40% in just one month—jumping from 12.1% to 17% as 3.7 million children slipped into poverty,” Sanders (I-Vt.) wrote in a Twitter post. “How did this happen? Fifty Republicans and one corporate Democrat allowed the $300-a-month Child Tax Credit to expire. That is morally obscene.”

      • AOC Denounces NYPD for Bragging About Arrests Over Stolen Diapers

        Congresswoman Alexandria Ocasio-Cortez on Thursday criticized New York City police officers for boasting about arresting a dozen people over stolen necessities, including diapers, baby formula, and medicine.

        “This is not public safety. This is cruelty on display.”

      • How the Left Should Think About Inflation

        In stating recently that “inflation is the Fed’s job,” President Biden gave compact expression to three radically false and politically suicidal propositions: 1. The past year’s price increases are part of a process that must be suppressed. 2. Anti-inflation policies are the preserve of the central bank. 3. The Federal Reserve can suppress inflation without also wrecking the economy, the president’s own program, his party, and his political prospects.

      • China’s Economy Not as Strong as Beijing Proclaims or the West Fears

        The temptation to be flippantly Wildean and evoke the spirit of Oscar is sometimes too tempting for the mortal flesh. For the United States to lose China once is unfortunate; to lose it twice smacks of carelessness. The second time round, it is important not to over exaggerate. China is a powerful country and its transformation over the last four decades has been astonishing. And of course, flippancy aside, China was never anyone’s to lose. But the country is not as powerful as those in power portray it or as those in the West, desperately seeking a new bogey man to boost defense spending, would suggest. Debt is the iceberg waiting to shred any over-confidently navigated economy’s hull. China is no longer going full steam ahead but it is in treacherous, icy waters. Evergrande? Let’s put this in perspective. The construction conglomerate has a debt of about $300 billion.

        Local government debt in China at the start of November was about $4.7 trillion, approx $3,300 for every Chinese citizen.

      • Sanders Calls to Cancel All Student Debt After Biden Axes $415 Millions’ Worth
      • Elon Musk Accuses The SEC Of Trying To Keep Him From Posting Dumb Tweets

        Let’s be honest. It’s laughable to think that one of the world’s most powerful and wealthy men, who also wields a massive platform with millions of followers, is being “silenced” in any particular way. And if history is any indication, nothing’s going to stop Elon from tweeting every silly thing that pops into his head — no matter how dumb and harmful.

      • Elon Musk, Tesla attack SEC for ‘unrelenting’ harassment

        Thursday’s letter escalates Musk’s battle with regulators as they scrutinize his social media posts and Tesla’s treatment of workers, including accusations of discrimination.

        It followed Tesla’s disclosure on Feb. 7 that it had received a subpoena from the SEC about its compliance with the 2018 settlement.

      • Was the hacking of Ottawa trucker convoy donors a US-Canadian intelligence operation?
      • Hundreds of Police Make Arrests in Ottawa to End Anti-Government Siege

        Police in Ottawa, Canada were deployed Friday to arrest dozens of people opposed to public health measures and remove vehicles clogging city streets as part of an anti-government blockade which has led to supply chain shortages, threatened public safety, and disrupted daily life in the city for more than three weeks.

      • Opinion | The Suicide Trucker Convoy

        Once upon a time there were three people in a boat, out in the middle of the sea. It was a beautiful day, and the sea was calm. Two of the people were fishing contentedly.

      • Guarimbas in Canada

        The demonstrations in Canada since late January have in effect taken over its capital city, Ottawa, and one of the most important bridges for trade between the Province of Ontario, the industrial center of this country and the USA. Other Canadian cities and border crossings have also been occupied and blocked. It is a futile blockade that undermines Canada’s own economic fibre from the Atlantic to the Pacific.

        The undersigned have lived in Canada for decades; we are writing you – our compatriots and colleagues in justice – to give you a first-hand account of what has happened and the geopolitical gravity of the matter.

      • Oh, Canada

        Canadians mostly live up to their worldwide reputation as civilized people despite their more than two weeks of protests in their capital of Ottawa, at the Ambassador Bridge across the Detroit River from Windsor, Ontario, to the Motor City and in the rural western provinces.

        Truckers illegally parked hundreds of their huge “Freedom Convoy” rigs by the grounds of Parliament, blocking traffic and blowing their blaring horns for days, to protest pandemic restrictions requiring vaccines and other means of combatting COVID-19.

      • Trudeau’s Money Heist: Emergencies Act Allows Seizure of Bank Accounts, Securities, Crypto of Those Suspected of “Links” to Convoy Members w/o Court Order
    • AstroTurf/Lobbying/Politics

      • Birth of a Nation?

        Unlike most U.S. Americans, I don’t revere the Founding Fathers the way we are supposed to. I see them as mostly a collection of the Mitch McConnells, Ted Cruzes, Tucker Carlsons, Joe Manchins, Elon Musks, Andrew Cuomos, J.D. Vances, Mike Pences and Bret Kavanaghs of their time. Admittedly, a Jamie Raskin or three was in there too.

        Still, I’ll give the white and male and property-owning Founders this.  Their successful campaign to violently transfer power away from the English monarchy and the East India Trading Company to themselves compelled them to boost an idea called democracy.  A seed was planted.

      • To Fight Attacks on “Critical Race Theory,” Look to Black History

        This week, South Dakota’s House of Representatives passed two bills, one targeting the teaching of “divisive concepts” and the other aimed at “protecting” kids from “political indoctrination.” While neither bill mentioned the words “critical race theory,” it was clear what they meant. They followed just a few weeks after the Mississippi Senate passed Senate Bill 2113—another “critical race theory” bill authored by Michael McLendon (R-Hernando)—over the objection of Black lawmakers, who walked out of the chamber in protest. Both of these efforts, along with many others, are part of a nationwide campaign led by conservatives to supposedly rid classrooms of “critical race theory”—a term for a high-level legal discipline that has been used as a cover to ban books by Black and brown authors.

      • State Constitutions Could Stymie Right-Wing Strategies for a Post-“Roe” World
      • Arizona Prosecutor Who Brought Bogus Gang Charges Against Protesters Files Ridiculous Defamation Suit Against Her Boss

        Protests against police violence erupted around the country following the killing of an unarmed black man, George Floyd, by Minneapolis (MN) police officer Derek Chauvin. Chauvin ended Floyd’s life by placing his knee on his neck for nearly nine minutes… and for more than three minutes after another officer informed Chauvin he could no longer detect Floyd’s pulse.

      • Roaming Charges: Of Fathers and Their Countries

        + While Chernow’s text is rather elliptical on these decisive episodes in Washington’s life (there’s little risk of it being pulled from libraries in most of the states, at this point), the book is generously foot-noted with primary sources, many of them in Washington’s own hand (he was a prolific self-promoter of his own exalted life), which fill-in the more tenebrous aspects of his character.

        + The first member of the Washington clan to step foot in Virginia was John, who came ashore in the Tidewater area in 1676. George’s great-grandfather wasn’t much of a farmer (after all, he only owned three slaves and some Irish “servants”), but he did amass thousands of acres of land along the Potomac and received a military commission to kill Indians in Maryland, where he earned a reputation for treachery and slaughter. In one notorious incident, Washington murdered five Indian leaders who had come to negotiate a treaty, then claimed their land. He was known by the Potomac tribes as Conotocarious, “destroyer of villages, devourer of homes.”

      • Opinion | Like a Bizarre Johnny Appleseed, Trump Has Planted the Seeds of Extreme Antisocial Behavior—And It Cannot Be Ignored

        Violent behavior on airplanes has reached such epidemic proportions that the President of Delta Airlines last week asked the Department of Homeland security to allow the airlines to submit passengers who have terrified or otherwise abused flight crews for placement on the government’s no-fly list.

      • Failure in Moscow: Liz Truss loses Britannia’s Way

        Truss, former international trade secretary known for her “goofy public persona”, took over from the less goofy and somewhat severe Dominic Raab as foreign secretary in Johnson’s ministerial shake-up last year. Her time at the Department of International Trade had been dubbed the “Department for Instagramming Truss”, given her insatiable appetite for social media platforms.

        Ideology, not facts, interest her. As she explained to Politico, “I’m probably one of the more ideological among my colleagues, in that that’s what motivates me.” Her rapid immaturing has seen her moving ever more towards economic libertarianism, founding the Free Enterprise Group of Conservative MPs keen to savage and prune employment laws and regulations.

      • Overhauling the Human Rights Apparatus: a New Paradigm for the 21st Century

        Politicians. NGOs and UN secretariat members master the jargon of human rights, to which they only give lip service, but most of them are only going through the motions and falling into a human rights “routine” that fails to see the faces of the victims. At the UN Human Rights Council we witness mostly diplomatic rituals, and an effort not to shake the boat too much. Admittedly, there have been successes, which the apparatchiks and a compliant corporate media effusively hail.  But they hide the root causes of human rights violations, the economic imbalances and continuing exploitation.  They propose the wrong treatment for most ailments, applying band-aids here and there, without developing a coherent preventative plan encompassing early detention of disease, effective curative measures and the rehabilitation of the disabled.

        We know that the UN Division of Human Rights evolved into the Centre for Human Rights and then the Office of the High Commissioner for Human Rights (General Assembly Resolution 48/141).  As it turned out, the HR directors are more “managers” than committed human rights leaders, inspired by a genuine belief in the fraternity of human beings and the equal dignity of all.  The UN Secretariat is more politicized than ever, and many have forgotten the sources of the UDHR and the enthusiasm of the creative days of Eleanor Roosevelt, René Cassin, Charles Malik and P.C.Chang.

      • Opinion | GOP Attacks on Voting Already Impacting 2022 Primaries

        The attacks on our democracy are moving into the 2022 primary elections. New state voter suppression laws that restrict access to absentee ballots, eliminate ballot drop boxes, drop registered voters from the rolls, and reduce polling places, among other provisions, are about to directly impact voters in this year’s primaries. Leading the way in these new Jim Crow voter suppression laws is Texas, which has reportedly rejected an unprecedented number of absentee ballots, and Georgia. Enacted last year by GOP-controlled state legislatures, these laws would not apply to federal elections if Senate Republicans—joined by Democratic Senators Joe Manchin (D-WV) and Kyrsten Sinema (D-AZ)—hadn’t used the filibuster last month to preserve and protect these anti-democracy laws. At the same time, unprecedented amounts of money are being poured into the usually quiet Secretary of State races this year. That’s because these offices oversee the administration of elections in their states and the winners of these jobs will oversee the 2024 presidential and congressional elections. According to the Brennan Center, contributions are three times higher for these offices in key battleground states than they were at this point in the 2018 election cycle and eight times higher than 2014. According to the Brennan Center’s findings, contributions are particularly high in Arizona, Georgia, and Michigan, key 2024 battleground states that Biden won in 2020. According to The New York Times, nearly two dozen Republicans who have publicly questioned or disputed the results of the 2020 presidential election are running for Secretary of State positions across the country. In Arizona, for example, two of the four Republican candidates running in the Secretary of State primary tried to overturn the 2020 election results. The candidate viewed as currently leading in the primary attended the Stop the Steal rally in Washington on January 6, 2021 and is affiliated with the far-right militia group the Oath Keepers, The New York Times reported. Tina Peters, a backer of the Big Lie that Trump’s 2020 election was stolen, announced she is running for Secretary of State in Colorado. Peters, who made her announcement on the podcast of the notorious Trump follower Steve Bannon, is currently under investigation in Colorado for allegations of tampering with the election equipment used in the 2020 presidential election. Meanwhile, election officials are warning that there is not enough money available for states to safely and securely administer the upcoming elections. A tough battle lies ahead in 2022 to protect the integrity of our elections and to preserve the right of every eligible citizen to vote. All possible resources must be marshaled in the cause of fair, safe, and secure elections.

      • Opinion | American Social Democracy Is Possible

        Many Americans have a difficult time imagining what it would be like to live in a social democratic society. Some think that the nations of Northern Europe are good enough places, but their systems could never work in the United States. This, I think, is a common fallacy that can be corrected by looking at life on an American military base (full disclosure: my father was a career Air Force officer and I grew up on military bases around the world).

      • Nevada Dems Sound Alarm Over ‘Single Most Vicious Suppression Attempt’ Yet by GOP

        The Nevada Democratic Party and voting rights advocates sounded the alarm Thursday over a local Republican’s proposal to station National Guard members at every polling place in the state’s second-largest county, purge voting records, and impose new restrictions on mail-in ballots.

        “This travesty is not an independent event—it is part of a concerted effort by right-wing extremists.”

      • Progressives Slam Corporate Dem PAC’s First Slate of Endorsements

        A slate of endorsements for corporate Democratic incumbents was met with indignation from progressives on Thursday, with critics accusing a political action committee started by the fifth-ranked House Democrat, Rep. Hakeem Jeffries, as prioritizing a defense against challengers from the left rather than fighting to retain seats in swing districts.

        Team Blue PAC, started last year by Jeffries and Reps. Josh Gottheimer (D-N.J.) and Terri Sewell (D-Ala.), announced on Wednesday its first endorsements in the 2022 Democratic primary elections. The PAC offered support and $5,000 campaign contributions to Reps. Shontel Brown (D-Ohio), Danny Davis (D-Ill.), Carolyn Maloney (D-N.Y.), Donald Payne Jr. (D-N.J.), and Dina Titus (D-Nev.), all of whom face challenges from progressives who are campaigning on broadly popular economic justice and climate policy proposals.

      • The Right Is Exploiting People’s Fears With Surgical Precision

        As Republicans ramp up their straw man attacks on the purported invasion of K-12 classrooms by critical race theory, a just-released report from the D.C.-based watchdog organization Accountable US explores the connections these groups and their funders have with organizations pushing anti–civil rights and anti–voting rights policies.

      • Number of Competitive Seats in House Decreases Following Drawing of New Maps
      • Five reasons why the opposition will win in Hungary, and five why it will not

        Campaign vibes from turbo-folk mode to a sleeper that must awaken

      • Just 13 of 143 Texas GOP Candidates Will Admit Trump’s Loss Was “Legitimate”
      • Five questions ahead of Trump’s social media launch

        Former President Trump’s new social media platform is expected to be released to the public on Monday.

        There are still many unknowns about how Truth Social will work and whether it will successfully compete with the major platforms or their conservative alternatives.

        More than a year after Trump was suspended from Facebook and Twitter, the platform may play a key role in outreach to his base as he considers a 2024 presidential run.

    • Misinformation/Disinformation

      • War in Europe and the Rise of Raw Propaganda

        But is this new? It is more than a century since Edward Bernays, the father of spin, invented “public relations” as a cover for war propaganda. What is new is the virtual elimination of dissent in the mainstream.

        The great editor David Bowman, author of The Captive Press, called this “a defenestration of all who refuse to follow a line and to swallow the unpalatable and are brave”. He was referring to independent journalists and whistle blowers, the honest mavericks to whom media organisations once gave space, often with pride. The space has been abolished.

      • How Bots and Fake Accounts Push China’s Vision of Winter Olympic Wonderland

        Inside the Potemkin village of China’s propaganda, the Winter Olympics have unfolded as an unalloyed success, a celebration of sports and political harmony that has obscured — critics say whitewashed — the country’s flaws and rights abuses.

        At Beijing 2022, the hills are snowy, not brown as usual this time of year. A Uyghur skier is the symbol of national unity, the tennis player Peng Shuai just a curious spectator. Athletes and foreign journalists praise the polite volunteers and marvel at the high-speed trains and the robots that boil dumplings and mix drinks.

      • Twitter and Google blocked ads from a medical journal about health and racism

        The medical journal Health Affairs spent years planning its special issue on health and racism, which it published at the beginning of February. The journal wanted to reach new readers by promoting the issue through targeted advertisements on Twitter and YouTube.

        That’s why it was so frustrating when Twitter and Google blocked its ads before they could go up, says Patti Sweet, the director of digital strategy at Health Affairs. The journal’s Google ads account was also suspended. Sweet wrote a blog post outlining that frustration last week, saying she thought the use of the word “racism” was the trigger for the rejections.

      • Facebook whistleblower alleges company misled investors on climate, COVID-19 misinformation: report

        Facebook whistleblower Frances Haugen reportedly filed two new complaints with the Securities and Exchange Commission (SEC) arguing the tech giant misled investors about its efforts to mitigate the spread of misinformation on climate change and COVID-19.

        The allegations build on Haugen’s broader efforts to raise the alarm about her former employer through SEC complaints. The first round of complaints against Facebook were filed in October.

        The new complaints were filed by Whistleblower Aid, a nonprofit representing Haugen, this month, The Washington Post reported.

      • Wikipedia’s new boss sees it as a misinformation-age model

        Catch up quick: Iskander, who replaces Katherine Maher as Wikimedia’s leader in January, was previously CEO of the Harambee Youth Employment Accelerator in South Africa and before that was chief operating officer of the Planned Parenthood Federation of America in New York.

      • Bryce Greene on Ukraine
      • Russia’s hybrid war against Ukraine

        In the past week alone, Ukraine has seen unprecedented cyber-attacks against both the defense ministry and two large Ukrainian banks: PrivatBank and JSC Oschadbank. Individual customers and the whole online banking system were affected. This coincided with reports from the frontline in eastern Ukraine of intensified clashes between Russian-trained rebels from Luhansk and Donetsk and Ukrainian army forces. There have also been reports that the Russian parliament is on the verge of recognizing these self-pronounced people’s republics.

    • Censorship/Free Speech

      • My Life With Maus

        For months, I’ve been reading about the growing Trumpist-Republican movement to ban whatever books its members consider politically unpalatable, lest the lives of America’s children be sullied by, say, a novel of Toni Morrison’s like The Bluest Eye or Margaret Atwood’s The Handmaid’s Tale or a history book like They Called Themselves the K.K.K. It’s an urge that just rubs me the wrong way. After all, as a boy growing up in New York City in the 1950s, when children’s post-school lives were much less organized than they are today, I would often wander into the local branch of the public library, hoping the librarian would allow me into the adult section. There — having little idea what I was doing — I would pull interesting-looking grown-up books off the shelves and head for home.

        Years later, exchanging childhood memories with a friend and publishing colleague, Sara Bershtel, I discovered that, on arriving in this country, she, too, had found a sympathetic librarian and headed for those adult shelves. At perhaps 12 or 13, just about the age of those Tennessee schoolkids, we had both — miracle of miracles! — not faintly knowing what we were doing, pulled Annmarie Selinko’s bestselling novelDésirée off the shelves. It was about Napoleon Bonaparte and his youthful fiancé and we each remember being riveted by it. Maybe my own fascination with history, and hers with French literature, began there. Neither of us, I suspect, were harmed by reading the sort of racy bestseller that Republicans would today undoubtedly loathe.

      • Thankfully, Jay Inslee’s Unconstitutional Bill To Criminalize Political Speech Dies In The Washington Senate

        Over the last few years, it’s been depressing to see politicians from both major political parties attacking free speech. As we noted last month, Washington state governor Jay Inslee last month started pushing a bill that would criminalize political speech. He kept insisting that it was okay under the 1st Amendment because he got a heavily biased constitutional lawyer, Larry Tribe, to basically shrug and say “maybe it could be constitutional?” But the bill was clearly problematic — and would lead to nonstop nonsense lawsuits against political candidates.

    • Freedom of Information/Freedom of the Press

      • ‘Psychological torture’ of WikiLeaks’ Julian Assange not addressed, says expert

        Accusations of the psychological torture of Julian Assange have not been addressed, with no legal basis for leaving the WikiLeaks founder locked up in solitary confinement in a high security prison, a human rights expert has claimed.

        Nils Melzer, United Nations special rapporteur on torture, said Mr Assange’s health is being “destroyed” as he remains in Belmarsh prison in London as the United States continues to try to extradite him.

        Mr Assange does not have access to his lawyers and is prevented from preparing his legal case, said Mr Melzer.

      • No legal basis for leaving Assange in high security prison – human rights expert

        Accusations of the psychological torture of Julian Assange have not been addressed, with no legal basis for leaving the WikiLeaks founder locked up in solitary confinement in a high security prison, a human rights expert has claimed.

    • Civil Rights/Policing

      • Filmmaker Stanley Nelson on Police Brutality, Black History & His First Oscar Nomination for “Attica”

        Legendary filmmaker Stanley Nelson’s new documentary “Attica” has been nominated for the first Oscar in his three-decades-long career documenting the Black American experience. The film tells the story of the deadliest prison uprising in U.S. history, when men at the Attica Correctional Facility in upstate New York rebelled on September 9, 1971, overpowering guards and taking over much of the prison to protest conditions, before New York Governor Nelson Rockefeller called out state troopers, who opened fire and killed at least 39 men, including 10 guards. Attica is one of the most “important American events that happened over the last 50 years,” says Nelson. He also has an upcoming film focusing on the racist origins of police and discusses the hate crimes trial of Ahmaud Arbery’s murderers and the condemnation of police in New Jersey who broke up a fight by violently arresting a Black teen while allowing an older white teen to remain free. “These things are not just happening for the first time. These things are being filmed for the first time,” says Nelson.

      • Weaponizing the Other: Why Black Power Still Matters to All Marginalized Outlaws

        I remember being treated by adults as if I were somehow a dangerous child. Teachers at my little Catholic school would periodically hold meetings to discuss what should be done with me. Parents stared and whispered when I got anywhere near their children, especially the ones younger than me, as if they could somehow catch whatever it was that made me so unsettling. My skin may have been the same color as theirs, but they made it very clear that whatever I was, was something else. I was something dangerously other. These confusing experiences with childhood alienation and felt stigma made it very hard to maintain anything resembling self-esteem well into adulthood. Uncoincidentally, my heroes during this frightening time in my life were predominately Black.

        The nineties seemed to be a profoundly surreal and downright unsettling time for Blackness as well. During the era of gangsta rap, rural white communities like mine generally saw Black people as being dangerous, but this danger seemed to somehow make them cool. Black pop cultural figures of that era from Eazy-E to Chris Rock seemed to embrace this aura of danger thrust upon them by mainstream white society and threw it back in their faces flamboyantly with middle fingers blazing.

      • Letter From High-Ranking FBI Lawyer Tells Prosecutors How To Avoid Court Scrutiny Of Firearms Analysis Junk Science

        Law enforcement — including the FBI — like to claim they’re heavily invested in science. The use of forensic “science” has been with us for years, but nowhere is it more sketchy than in law enforcement labs, where zero accountability rubs elbows with zero outside review of methods.

      • New Schengen Council: Frontex as „spearhead“ of new border policy

        With a new steering group, the French EU Presidency wants to monitor the coordinates of asylum and migration policy in Europe. The basis is a new measuring instrument for „migratory pressure“.

      • The Woman Who Lost Her Fear

        I enter the Barcelona Center of Contemporary Culture to attend a discussion with Alyokhina. The debate accompanies the exhibition “The Mask Never Lies”, which can be seen there until May. The first question for Masha, as Maria is called by her fans and friends, is about the mask: the Pussy Riot were notorious for their multicolored balaclavas. “Our clothing has acquired symbolic meaning of protest against the regime,” Masha explains. “Today, Russians wearing balaclavas identify themselves as dissidents of the Kremlin.”

        Alyokhina was unable to travel to Barcelona because she is banned from traveling. After the trial that followed Pussy Riot’s performance in the Moscow cathedral, and in which the artist had to answer from a cage, she was sent to what she defines as post-gulag: a labor camp less harsh than the Stalinist ones: “Instead of fourteen hours a day they made us work twelve.” Now Masha is on probation: she is forced to return home at nine o’clock at night and must wear an electronic bracelet through which the police can constantly track her. “I’m not complaining,” she says. “Compared to those dissidents who have been killed or are in the gulag, like Navalny, I’m not doing too bad.”

      • Conical Race Theory
      • A Persecuted Father Deported to Haiti Fights to Reunite With His Family in US
      • We’ll Keep Fighting to Protect Our Bodily Autonomy

        As the conservative Supreme Court considers new anti-Roe cases and state legislatures rush to pass harsh new restrictions, Roe may not make it to its 50th anniversary. So we wanted to advocate for continued access to reproductive health care.

        What followed was an intense interaction with Capitol Police, who accused us of “defacing” federal property simply for putting posters on lamp posts. They forced us to retrace our steps and scrape down each poster — including some we hadn’t even put up. It was humiliating, but we cooperated to avoid arrest.

      • Iran: Wife killer’s ‘walk of fame’ highlights horror of ‘honour killings’

        The video is unbearable: For 30 seconds it shows a grinning man parading in the streets of Ahvaz, in the Iranian province of Khuzestan, holding a knife in one hand. In the other hand: his wife’s head. He has just decapitated her after she ran away from their forced marriage. The incident has received international attention since February 5, and is rare visual proof of the persistence of “honour killings” in Iran, as detailed by our Observer.

      • Unions Can Prevent Workplace Disasters

        Federal officials are investigating possible health and safety violations at the facility in Edwardsville, Illinois, a suburb of St. Louis. Illinois lawmakers are considering raising statewide standards for warehouse construction to prevent future tragedies. And family members of one of the employees, Austin McEwen, recently filed a wrongful death suit against the giant retailer.

        “My daughter was not expendable,” said Jeffrey Hebb at a January rally in front of the Edwardsville facility. Hebb’s daughter, 34-year-old Etheria Hebb, died in the warehouse collapse, leaving behind a one-year-old daughter.

      • Leaked audio exposes Amazon’s anti-union scare tactics
      • Apple Store Employees Are Reportedly Unionizing
      • Apple Store employees want to unionize
      • McDonald’s Hasn’t Taken Promised Action on Sexual Harassment

        Angelica Hernandez has worked at a corporate-owned McDonald’s in California for nearly two decades. In all that time, she’s never received any substantial sexual harassment training. Once, two years ago, she said, she and her coworkers were instructed to watch a video about harassment on tablets, but she found it “ridiculoso.” The situations depicted had no bearing on what things are really like inside a McDonald’s restaurant; instead, the video mostly consisted of blanket statements that employees shouldn’t be harassed.

    • Internet Policy/Net Neutrality

      • FTC Promises To Play Hardball With Robocall-Enabling VOIP Providers

        Every year or so, the FCC unveils a new plan to combat robocalls it claims will finally tackle the annoying menace. Granted, year after year, the problem either gets worse or stays relatively the same. We’ve already noted that this is generally due to few things: one, a steady erosion by the courts (and lobbyists) of what the FCC can or can’t actually do when it comes to various annoyances like automated spam texts or live robocalls.

      • Dial Into The Internet Like It’s 1999 | Hackaday

        Restoring classic hardware of any sort is a great hobby to have, whether it’s restoring vintage cars, tools, or even antique Apple or Commodore computers. Understanding older equipment can help improve one’s understanding of the typically more complicated modern equivalents, plus it’s just plain fun to get something old up and running again. Certainly we see more retro computing restorations around here, but one thing that we don’t typically see much of is the networking equipment that would have gotten those older computers onto the early Internet. [Retrocet] has a strong interest in that area, and his latest dial-up server really makes us feel like we’re back in the 90s.

    • Digital Restrictions (DRM)

    • Monopolies

      • Read exactly how Microsoft’s $68.7 billion deal for Activision Blizzard came together

        Microsoft shocked the tech and gaming world on January 18th when it announced it would acquire Activision Blizzard in a $68.7 billion deal, by far the biggest ever in gaming. Activision Blizzard, one of the most storied developers on the planet, had been reeling for months from multiple scandals, including California’s lawsuit accusing the company of creating a culture of “constant sexual harassment,” an explosive Wall Street Journal report suggesting CEO Bobby Kotick was both aware of that harassment and sexually harassed employees himself, and labor protests from Call of Duty workers.

      • Patents

      • Trademarks

        • ‘Coca’ pits indigenous Colombians against soft drink giant

          Indigenous Colombians are going head to head with the world’s biggest soft drink company over the commercial use of the word “coca” — the name of an indigenous South American plant.

          Representatives of the Nasa and Embera Chami tribes are threatening to ban the sale of Coca-Cola in their territories after the Coca-Cola Company incurred their ire by taking issue with the name of a locally-produced beer, Coca Pola.

          They sent a letter to the multinational corporation, a copy of which AFP has seen, giving it 10 days to explain its “non-consensual use” of the word “Coca” in Coca-Cola — the world’s most popular fizzy drink.

      • Copyrights

        • Copyright is Not a Shortcut Around the Constitution’s Anonymous Speech Protections, EFF Tells Court

          Unfortunately, courts do not always apply the correct tests to protect anonymous speakers, particularly when they use other’s copyrighted material to engage in commentary and criticism. That’s why EFF and the ACLU Foundation of Northern California filed an amicus brief today in the United States District Court for the Northern District of California arguing that a magistrate’s decision sidestepped the appropriate constitutional test for maintaining anonymity. The flawed ruling results in speakers who use copyrighted material receiving less anonymity protections than those who don’t. 

          The case is an effort to unmask an anonymous Twitter user (@CallMeMoneyBags) who posted photos and content that implied a private equity billionaire was romantically involved with the  woman who appeared in the photographs. Bayside Advisory LLC holds the copyright on those images, and used the DMCA to demand that Twitter take down the photos, which it did. That should have been the end of it.

          Instead, Bayside Advisory sent a subpoena to Twitter to unmask its anonymous user. Twitter refused and asked a federal magistrate judge to quash the subpoena. The magistrate incorrectly ruled that Twitter must disclose the identity of the user because the user failed to show up in court to argue that they were engaged in fair use when they tweeted Bayside’s photos. Twitter has asked a federal district court judge to reverse the magistrate’s decision.

        • MPA, Amazon & Apple Win Injunction To Shut Down Two Pirate IPTV Services

          A coalition of Hollywood studios plus Amazon, Netflix, Apple, and other content owners, have won a preliminary injunction to shut down two pirate IPTV services accused of infringing their movie and TV show rights. Claims from the alleged pirate operator that the case is deficient and relies on biased and inaccurate evidence made little difference to the outcome.

        • US Govt Identifies Top Pirate Sites and Other ‘Notorious Markets’

          The US Government has published its annual list of problematic piracy websites and other “notorious markets.” This year’s overview includes usual suspects such as The Pirate Bay, FMovies, and Rapidgator, but hosting companies and an advertising service are mentioned as well. The USTR hopes that by highlighting the threats, platform operators or foreign authorities will take action.

        • Nintendo Is Beginning To Look Like The Disney Of The Video Game Industry

          Techdirt, and myself specifically, have had an awful lot to say about Nintendo. To be fair to me, not every post I write about the company is negative. But to be fair to anyone with a pair of eyeballs, much of it certainly has been negative. I find that the company prioritizes control of every last ounce of its IP over its own customers and fans, that the company behaves in a manner so aloof as to be almost comical, and that the company seems perfectly willing to break the entire concept of the American copyright system incentives by combatting all forms of “piracy” or use of its IP while also being perfectly willing to silo that IP in places where the public simply cannot legitimately access it.

        • How Our Convoluted Copyright Regime Explains Why Spotify Chose Joe Rogan Over Neil Young

          Spotify’s decision to hitch its star to podcaster and font-of-COVID-misinformation Joe Rogan has sparked a wave of pushback from musicians, some of whom–among them Neil Young, India Arie, and Joni Mitchell–have pulled their music from Spotify in protest. Spotify, for its part, has stood firmly by Rogan. 

IRC Proceedings: Friday, February 18, 2022

Posted in IRC Logs at 2:17 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmXqYVVdMc6SycikuFRaeaNXbUacVqDL6LSjUsLHFM3M4A IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmY3UF269wc67PLNTWa1rsPuzKWjCDNCYrN1tLh7BqsNZp IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmP9KwkZPZutku5WdBcgJaPDwK9ME7hHcrDqu4cpB7Upww IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmdWPY5AR2nPHXstmPG1vGDJtFCrugieDb1Qax55GS8Q6F IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmUgCKL9gBxnY4uJiJYBSoMd62RBY6yYUm5GcQhxTFpkXQ IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmePTaMq5tX7UatFtw52yLeJZE2Riymiwg2BJBvuu1WWef IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmNu7EwEvTqjQKhBzXePvBXFg9H2dygArNEHXa3drimFFX IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmduNeEue8Nhr7LSbpagGAho39oZEZM6mqmY6gShSKBjLQ IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmXBF3kDxFdmKcnVa7vYpbU6MyXrd1r3Y1NNrKZ3hrTTFa

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts