Links 06/05/2022: FreeBSD 13.1 RC6, GCC 12.1, RIP Alain Baudrez/Wamukota

Posted in News Roundup at 5:57 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Digital TrendsI uninstalled Windows on my gaming PC, and I don’t want to go back | Digital Trends

      In the vast catalog of articles and videos that attempt to install a Linux distro on a gaming PC, there’s a central question missing: Why? Why would you go with Linux instead of Windows when Microsoft’s OS has clearly better driver and game support, as well as more prompt responses to issues and access to better utilities?

      There are a few reasons, even if the scales generally fall in favor of Windows. For one, Linux is free from any central authority. You don’t have to worry about advertising IDs, features you don’t want or disagree with, or updates that may change the way you interact with your PC.

    • Linux Magazine

    • Server

      • Kubernetes 1.24 Released, Isolated Container Cluster Management System

        Kubernetes container orchestration platform is Kubernetes 1.24 Released, which allows you to manage a cluster of isolated containers as a single entity and provides mechanisms for deploying, maintaining and scaling applications running in containers. The project was originally created by Google, but then transferred to an independent site curated by the Linux Foundation. The platform is positioned as a universal solution developed by the community, not tied to individual systems and able to work with any application in any cloud environment. The Kubernetes code is written in Go and distributed under the Apache 2.0 license.

        Features are provided for infrastructure deployment and management, such as DNS database maintenance, load balancing, distribution of containers across cluster nodes (migration of containers depending on changes in load and service needs), health checks at the application level, account management, updating and dynamic scaling of a running cluster, without stopping it. It is possible to deploy container groups with update and undo operations for the entire group at once, as well as logical splitting of the cluster into parts with resource sharing. There is support for live migration of applications that can be stored on both local storage and network storage systems.

      • Kubernetes 1.24 Is The First Release To Officially Use sigstore

        The Kubernetes and sigstore communities have announced that Kubernetes is adopting sigstore in production for signing artifacts and verifying signatures, enabling Kubernetes users for the first time to verify that the distribution they are using is exactly what it claims to be. Kubernetes 1.24 and all future releases will include cryptographically signed sigstore certificates, giving users the ability to verify signatures and have greater confidence in the origin of each and every deployed Kubernetes binary, source code bundle and container image.

      • Capacity Tracking reaches GA in Kubernetes 1.24

        The v1.24 release of Kubernetes brings storage capacity tracking as a generally available feature.

    • Audiocasts/Shows

      • Tux DigitalHardware Addicts 60: Diamonds Are A Computers Best Friend!

        Welcome to Hardware Addicts, a proud member of the TuxDigital Network. Hardware Addicts is the podcast that focuses on the physical components that powers our technology world.

        In this episode, we’re going to be discussing a new storage technology that could change everything for quantum computing.

      • Tux DigitalLinux Out Loud 11: Surprise Purchase

        This week, Linux Out Loud chats about a community opinion piece by Profetik.

        Welcome to episode 11 of Linux Out Loud. We fired up our mics, connected those headphones as we searched the community for themes to expound upon. We kept the banter friendly, the conversation somewhat on topic, and had fun doing it.

      • Tux DigitalLinux Out Loud 12: SteamDeck in Hand

        This week, Linux Out Loud chats about the Steam Deck and Valve’s Linux gaming foray.

        Welcome to episode 12 of Linux Out Loud. We fired up our mics, connected those headphones as we searched the community for themes to expound upon. We kept the banter friendly, the conversation somewhat on topic, and had fun doing it.

      • Jupiter BroadcastingLinux Action News 239

        New firmware superpowers are coming to a future Linux kernel, why Google is working on encrypted hibernation support, and a sneak peek at SteamOS 3.

      • Going Linux May 05 #423 · Welcome to Linux! Starting your adventure! Pt 1

        We go back to our roots and begin with part one of how to get started with Linux. We discuss some basic terms and definitions, talk about installing software applications and even suggest a few distributions geared to new users.

      • VideoWhat’s new in Nextcloud 24: more freedom, speed, collaboration, and better search! – Invidious
      • Jupiter BroadcastingPlausible Deniability | Self-Hosted 70

        Alex replaces another Google service; we point the community spotlight at FuzzyMistborn plus your feedback!

    • Kernel Space

      • LWNAn introduction to Linux audio plugin APIs

        The world of music and audio production is largely dominated by proprietary software vendors. Among them, Steinberg stands out as a company that created some of the most-used software, including the Cubase and Nuendo digital audio workstations. Steinberg is also known as the creator of the VST plugin API that, largely due to its licensing policy, has irritated developers enough to inspire multiple attempts at creating an open-source alternative. Even now, when the VST3 SDK is available under the GPLv3 license, the way the company exercises its control over the SDK keeps pushing developers away toward other open-source solutions.

        This is an introduction to open-source plugin APIs for musicians and sound engineers alike. It focuses on the options in the larger ecosystem and how their shortcomings led to the creation of new alternatives with liberal licensing.

      • LWNExtending in-kernel TLS support

        The kernel gained support for the TLS protocol in the 4.13 release, which came out in September 2017. That support is incomplete, though, in that it does not provide the kernel with a way to initiate a TLS connection on its own. Instead, user space creates a socket and performs the TLS handshake before handing the socket to the kernel, which can then transfer data using TLS. The situation may be about to change as a result of this patch series from Chuck Lever — though user space will still need to remain in the picture.

        TLS, of course, allows for the transfer of encrypted data over the network; it is the protocol that lurks behind HTTPS links, among other things. At this point, a significant fraction of the data transferred over the net is encrypted in this fashion. Once a connection has been established, encrypting data to send to the other end is relatively straightforward, as is decrypting received data. Establishing the connection, though, is a more complex affair, involving, among other things, algorithm negotiation and the provision and verification of public keys for one or both ends.

      • LWNHandling messy pull-request diffstats

        Subsystem maintainers routinely use git request-pull as part of the process of sending work upstream. Normally, the result includes a list of commits included in the request and a nice diffstat that shows which files will be touched and how much of each will be changed; examples abound on the kernel mailing lists. Occasionally, though, a repository with a relatively complicated development history will yield a massive diffstat containing a great deal of unrelated work. The result looks ugly and obscures what the pull request is actually doing. This document describes what is happening and how to fix things up; it is derived from The Wisdom of Linus Torvalds, which has been posted numerous times over the years (example 1, example 2).

    • Applications

      • OpenSource.comMy favorite open source tool for using crontab

        Automation is a hot topic right now. In my day job as a site reliability engineer (SRE), part of my remit is to automate as many repeating tasks as possible. But how many of do that in our daily, not-work, lives? This year, I am focused on automating away the toil so that we can focus on the things that are important.

        One of the earliest things I learned about as a fledgling systems administrator was cron. Cron is used far and wide to do things like rotate logs, start and stop services, run utility jobs, and more. It is available on almost all Unix and Linux systems, and is something every sysadmin I know uses to help manage services and servers. Cron can run any console application or script automatically, which makes it very, very flexible.

      • Linux LinksAmberol – small and simple music player

        You might be wondering whether Linux really needs another music player. If it’s just a fork of an existing project, we’d agree that this wouldn’t be an enticing prospect. After all, in this field audiophiles are granted a huge array of fine music players. We covered our favorites in this roundup.

        Amberol offers a different tack to some music players. It’s definitely not innovative in any shape or form. It doesn’t offer any functionality that a whole raft of open source players already offer. Instead it seeks to be a small and simple music player built using modern technologies.

        When we read of modern technologies we instantly think of Electron. Heavily bloated apps often follow. But Amberol is not Electron-based. Instead, Amberol relies on the GTK4 widget toolkit and the Rust programming language. It seeks inspiration from Muine, a GNOME-based music player that saw its last release back in 2009.

      • The AnarcatWallabako 1.4.0 released – anarcat

        I don’t particularly like it when people announce their personal projects on their blog, but I’m making an exception for this one, because it’s a little special for me.

        You see, I have just released Wallabako 1.4.0 (and a quick, mostly irrelevant 1.4.1 hotfix) today. It’s the first release of that project in almost 3 years (the previous was 1.3.1, before the pandemic).

        The other reason I figured I would mention it is that I have almost never talked about Wallabako on this blog at all, so many of my readers probably don’t even know I sometimes meddle with in Golang which surprises even me sometimes.

      • Istio / Announcing Istio 1.12.7

        This release contains bug fixes to improve robustness. This release note describes what’s different between Istio 1.12.6 and Istio 1.12.7

    • Instructionals/Technical

      • Drupal Introductory Guide with Installation

        On this site, we’ve gone over WordPress in great detail. Despite the fact that WordPress is the most popular and actively developed CMS, it is not the only good one on the market. In this article, we will go through Drupal in depth, determining who it may be used for and how to install Drupal on litespeed web server.

      • TecAdmin(Resolved) Please install all available updates for your release before upgrading
      • Make Use Of[Older] 15 Linux Terms, Jargons, and Lingo You Should Know About

        GNU, a recursive acronym for “GNU’s Not Unix,” is a collection of open-source tools that anyone can use for free to develop their own apps and operating systems. The GNU Project, founded by Richard Stallman, aims at developing and distributing software for free and provides every developer with open-source tools to do the same.

        The Linux kernel is licensed under GNU’s GPL (General Public License) and is thus known as GNU/Linux. Any operating system developed using the open-source GNU tools and the Linux kernel falls under the category of Linux distributions. But what are distributions, you might ask?

      • Keystone LDAP with Bifrost | Adam Young’s Web Log

        I got keystone in my Bifrost install to talk via LDAP to our Freeipa server. Here’s what I had to do.

        I started with a new install of bifrost, using Keystone and TLS.

      • Basic authentication with Traefik on kubernetes

        Basic access authentication dates back to 1993 and it’s still heavily used today. The server provides a WWW-Authenticate header to the client and the client responds with an Authorization header and a base64-encoded (not encrypted) string to authenticate. When done over a secure TLS connection, this method of authentication works well.

      • Build a custom CentOS Stream 9 cloud image

        This is my third post about Image Builder, so I guess you could say that I enjoy using it1. It’s a great way to define a custom cloud image, build it, and (optionally) ship it to a supported cloud provider.

        This post covers how to build a customized CentOS Stream 9 image along with a custom repository for additional packages. In this case, that’s Extra Packages for Enterprise Linux (EPEL).

      • ByteXDBash Append to File – ByteXD

        There are various ways to append text to a file in bash. In computing, append means to add something to the end of the file.

        In this tutorial, you will learn to append text or content to a file using the redirection operator >> and the tee command.

      • Red Hat OfficialWriting Ansible inventory files, troubleshooting Linux, and more sysadmin tips
      • PC LinuxGIMP Tutorial: Create A Bokeh Effect
      • PC LinuxMP3 Files: Creating Order From A Jumbled Mess
      • PC LinuxEsperanto Characters On PCLinuxOS
      • PC LinuxAdjusting Firefox Settings To Enhance Your Online Privacy

        Firefox provides you with several mechanisms to protect your privacy. However, some of them are not enabled by default. In this guide you’ll learn how to configure your Firefox browser settings to strengthen your online privacy.

      • VideoHow to install Lubuntu 22.04 LTS – Invidious

        In this video, I am going to show how to install Lubuntu 22.04 LTS.

      • Linux Made SimpleHow to install Friday Night Funkin’ – OS Engine on a Chromebook

        Today we are looking at how to install Friday Night Funkin’ – OS Engine on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • nixCraftHow to fix “bash: add-apt-repository: command not found” error on Ubuntu/Debian Linux
      • How to install Docker Compose V2 on Ubuntu 22.04 – NextGenTips

        Docker is a set of platform-as-a-service product that uses OS-level virtualization to deliver software in packages called containers. Containers are usually isolated from one another and bundled with their own software libraries and configuration files, they can communicate with each other through well-defined channels.

        Docker makes it possible to get more apps running on the same old servers and also makes it easy to package and ship programs.

        Docker-compose is a tool for defining and running multi-container Docker application. It uses YAML files to configure its application services.

      • nixCraftHow to create temporary random file name in bash scripting
      • How to Install gLabels Publisher on Ubuntu 20.04 LTS

        Publications and presentations are important in the reputation of many companies and individuals. That’s why it pays to have tools that help with the design and management of labels and business cards that serve as an introduction to the service offered. So, today, you will learn how to install gLabels Publisher on Ubuntu 20.04.

      • ByteXDHow to Set Up Passwordless SSH Login With SSH Keys

        Many novice users to Linux are surprised to learn that the most secure method to connect to another server with SSH is using keys.

        We computer users have been conditioned to use passwords for everything.

        It’s surprising to learn that there are methods other than passwords, but there is something better: cryptographic keys.

        In this tutorial we will learn what SSH keys are and why they are better than passwords. You will learn how to set them up on your computer and how to use them to login with SSH without a password.

      • Help Net SecurityHow to identify vulnerabilities with NMAP – Help Net Security

        In this video for Help Net Security, Shani Dodge Reiner, Development Team Leader at Vicarius, explains how to identify vulnerabilities using the NMAP tool.

        NMAP is a very powerful and popular tool for network mapping. It can be used to learn about the architecture of an organization’s network by both defenders and attackers.

        Using the NMAP scan output, we can get visibility of the devices that are connected to the network. For each device, NMAP can extract a variety of information, including the device’s DNS name, MAC address, and operating system, as well as a list of ports that are open to the network, which services are accessible, etc.

      • Make Use OfHow to Install DEB Packages in Arch Linux

        Many popular programs are available on Linux exclusively as a DEB package. This could concern you if you have recently migrated to Arch Linux and are unsure how to install your favorite programs.

        DEB files are intrinsic to Debian or Ubuntu-based derivatives. However, you can still install them on your Arch-based system in a few ways. Let’s step through the ways to install DEB files in Arch Linux.

      • UNIX CopHow To Install Java on CentOS 9 Stream

        We all know that Java is a very popular programming language and a mainstay of today’s technology. This language is used for many things, from desktop applications to applications like Jenkins that are used to deploy other applications. In other words, Java is very important and for many it is the gateway to programming.

      • How to Add Swap Space on Ubuntu 22.04 – Cloudbooklet

        How to Add Swap Space on Ubuntu 22.04. Swap Space is a space in Linux is used when the amount of physical memory (RAM) is full. If the system needs more memory resources and the RAM is full, swap space let you store additional information.

        Swap space can help machines with a small amount of RAM. In case you have a server with 1GB RAM, then your memory will get exhausted and you will get an error because your server cannot allocate sufficient memory.

        In this guide you are going to learn how to add swap space and also remove the swap space that is created already.

      • linuxium.com.au: Adding a 32-bit GRUB bootloader to boot and install ISOs

        Many distros no longer include both 32-bit and 64-bit bootloader support. Unfortunately some hardware including most based on the relatively recent Intel Atom processor architecture won’t boot ‘OOTB’. Whilst I wrote ‘isorespin.sh’ and ‘isorespinner.sh’ in part to address this issue I restricted their functionality to the Ubuntu ‘family’ of ISOs for support purposes. One of the most frequest questions I have been asked is ‘can you add support for <insert distro> ISOs?’. Unfortunately distros, even those based on or derived from Ubuntu, are often built with different directory structures and packages. As a result writing a script that caters for multiple distros becomes complex and cumbersome. However with Ubuntu looking to move to a new snap-based installer I’ve revisited the 32-bit boot issue.

        Initially I created a simple script ‘treetoobitiso.sh’ to just add the 32-bit GRUB bootloader to the Ubuntu ‘family’ of ISOs. But if a different distro uses a similar file system layout then essentialy there is no reason why it also wouldn’t work so I’ve extended this script to include an ‘–unsupported’ option to allow running, or at least attempt running, with any ISO.

      • PHP MySQL Logical Operators – OSTechNix

        packages. As a result writing a script that caters for multiple distros becomes complex and cumbersome. However with Ubuntu looking to move to a new snap-based installer I’ve revisited the 32-bit boot issue.

      • nixCraftUbuntu 22.04 LTS Set Up OpenVPN Server In 5 Minutes

        I am a new Ubuntu Linux 22.04 LTS server user. How do I set up an OpenVPN Server on Ubuntu Linux version 22.04 server to shield my browsing activity from bad guys on public Wi-Fi, set protective parameter vpn for developers and more?

    • Wine or Emulation

      • Wine-Wayland 7.7 Released – LinuxStoney

        Wine-wayland 7.7 Released, which develops a set of patches and the winewayland.drv driver, allowing you to use Wine in environments based on the Wayland protocol, without using XWayland and X11 components. Provides the ability to run games and applications that use the Vulkan graphics API and Direct3D 9/11/12. Direct3D support is implemented using the DXVK , which translates calls to the Vulkan API. The kit also includes patches and ” fsync ” to increase the performance of multi-threaded games, and code to support AMD’s FSR (FidelityFX Super Resolution) technology to reduce image quality loss when upscaling on high resolution screens. The new release is notable for syncing with the Wine 7.7 codebase and updating DXVK and VKD3D-Proton versions.

    • Games

      • Take a deep breath and submerge yourself in Wetlands

        Wetlands, the newest supported game of the Hypno engine, is ready for public testing!

        This sci-fi rail shooter was created by Hypnotix and published by New World Computing in 1995. The game includes 20 action-packed levels, cinematic cutscenes, attractive hand-drawn characters, and stunning 3D backgrounds.

      • Windows games crashing on Linux? Try these tricks & tips – LinuxStoney

        Although they are not as common on Linux-based computers as they are on Windows, little by little games are coming to these open source systems . In fact, the titles available here are becoming more and more common, but at the same time they are not exempt from certain problems that can arise. For example, we can experience the always unpleasant crashes when we are playing with one.

        Whether natively using certain applications such as Wine or PlayOnLinux , the truth is that the number of players who use a Linux computer for their favorite video games is increasing. This is something that we have been doing on a regular basis and over the last few years on a Windows-based PC. However, thanks to the fact that Linux is gradually spreading to a greater number of users, they also want to play here.

      • GamingOnLinuxTactical roguelike with deck-management ‘Oaken’ added a Linux build

        Oaken, a brand new Early Access turn-based tactical roguelike from Laki Studios and Goblinz Publishing, just added an experimental Linux build ready for testing. The Linux build is not yet advertised on the Steam page but it’s there and mentioned in their latest news post.

      • GamingOnLinuxThe Humble Kalypso Hits Bundle looks like a good deal

        Want to continue building up that collection of games? Another good chance has arrived with the Humble Kalypso Hits Bundle.

      • GamingOnLinuxCannibal Crossing seeing plenty of tweaks for the Steam Deck

        Cannibal Crossing, an action-survival game for 1-4 players from development teams at Rocketcat Games (Death Road to Canada) / Everplay Interactive / Blow and Try Again, continues evolving and gets some nice Steam Deck improvements.

      • GamingOnLinuxComedy adventure Catie in MeowmeowLand now on Linux

        In need of a fresh point and click comedy adventure? Catie in MeowmeowLand from developer ARTillery is now supported on Linux with a new Native build. Must admit I hadn’t heard of this one before but the screenshots instantly make it look worth playing.

      • GamingOnLinuxController support for Path of Exile leaving Beta, should work great on Steam Deck

        Path of Exile, the free to play ARPG from Grinding Gear Games, is getting close to releasing the Sentinel update and along with masses of gameplay additions — controller support will leave Beta.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • PC LinuxShort Topix: Okular First Ever Eco-Certified Computer Program

          Okular, KDE’s popular multi-platform PDF reader and universal document viewer, has officially been recognized for sustainable software design as reflected in the recent award criteria for software eco-certification. In February 2022 Okular was awarded the Blue Angel ecolabel, the official environmental label awarded by the German government. Introduced in 1978, Blue Angel is the world’s earliest established environmental label, and Okular is the first software product to be certified with its seal. What is more, Okular is the first ️ever eco-certified computer program within the 30 organizations of the Global Ecolabelling Network! This network, of which Blue Angel is a member, represents over 50 countries.

    • Distributions

      • New Releases

        • LinuxiacOpenMediaVault 6 NAS Solution Released Based on Debian 11

          After a long development phase, OpenMediaVault 6 has been released with a completely new user interface written from scratch.

          OpenMediaVault (OMV) is a Network Attached Storage (NAS) system based on Debian. It includes SSH, (S)FTP, SMB/CIFS, RSync, BitTorrent client, etc. In addition, the framework’s modular design allows it to be expanded via plugins.

      • BSD

        • FreeBSDFreeBSD 13.1-RC6 Now Available
          The sixth RC build of the 13.1-RELEASE release cycle is now available.
          Installation images are available for:
          o 13.1-RC6 amd64 GENERIC
          o 13.1-RC6 i386 GENERIC
          o 13.1-RC6 powerpc GENERIC
          o 13.1-RC6 powerpc64 GENERIC64
          o 13.1-RC6 powerpc64le GENERIC64LE
          o 13.1-RC6 powerpcspe MPC85XXSPE
          o 13.1-RC6 armv6 RPI-B
          o 13.1-RC6 armv7 GENERICSD
          o 13.1-RC6 aarch64 GENERIC
          o 13.1-RC6 aarch64 RPI
          o 13.1-RC6 aarch64 PINE64
          o 13.1-RC6 aarch64 PINE64-LTS
          o 13.1-RC6 aarch64 PINEBOOK
          o 13.1-RC6 aarch64 ROCK64
          o 13.1-RC6 aarch64 ROCKPRO64
          o 13.1-RC6 riscv64 GENERIC
          o 13.1-RC6 riscv64 GENERICSD
          Note regarding arm SD card images: For convenience for those without
          console access to the system, a freebsd user with a password of
          freebsd is available by default for ssh(1) access.  Additionally,
          the root user password is set to root.  It is strongly recommended
          to change the password for both users after gaining access to the
          Installer images and memory stick images are available here:
          The image checksums follow at the end of this e-mail.
          If you notice problems you can report them through the Bugzilla PR
          system or on the -stable mailing list.
          If you would like to use Git to do a source based update of an existing
          system, use the "releng/13.1" branch.
          A summary of changes since 13.1-RC5 includes:
          o OpenSSL 1.1.1o has been merged.
          o An issue with the xhci(4) driver not attaching devices has been
          A list of changes since 13.0-RELEASE is available in the releng/13.1
          release notes:
          Please note, the release notes page is not yet complete, and will be
          updated on an ongoing basis as the 13.1-RELEASE cycle progresses.
          === Virtual Machine Disk Images ===
          VM disk images are available for the amd64, i386, and aarch64
          architectures.  Disk images may be downloaded from the following URL
          (or any of the FreeBSD download mirrors):
          BASIC-CI images can be found at:
          The partition layout is:
              ~ 16 kB - freebsd-boot GPT partition type (bootfs GPT label)
              ~ 1 GB  - freebsd-swap GPT partition type (swapfs GPT label)
              ~ 20 GB - freebsd-ufs GPT partition type (rootfs GPT label)
          The disk images are available in QCOW2, VHD, VMDK, and raw disk image
          formats.  The image download size is approximately 135 MB and 165 MB
          respectively (amd64/i386), decompressing to a 21 GB sparse image.
          Note regarding arm64/aarch64 virtual machine images: a modified QEMU EFI
          loader file is needed for qemu-system-aarch64 to be able to boot the
          virtual machine images.  See this page for more information:
          To boot the VM image, run:
              % qemu-system-aarch64 -m 4096M -cpu cortex-a57 -M virt  \
          	-bios QEMU_EFI.fd -serial telnet::4444,server -nographic \
          	-drive if=none,file=VMDISK,id=hd0 \
          	-device virtio-blk-device,drive=hd0 \
          	-device virtio-net-device,netdev=net0 \
          	-netdev user,id=net0
          Be sure to replace "VMDISK" with the path to the virtual machine image.
      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • PC LinuxAlain Baudrez/Wamukota: In Remembrance

          On April 20, 2022, we lost one of our longtime PCLinuxOS forum users. Alain Baudrez, who often went by the nickname Wamukota, chose euthanasia to end his suffering from ALS, or Amyotrophic Lateral Sclerosis.

        • PC LinuxLinux IS Ready For The Desktop

          I’ve read many postings and rants about Linux not being ready for the desktop, while my experience tends to state the opposite. Linux is — and has been for the last couple of years — ready for the desktop.

          It all boils down to the type of audience you speak to.

          Windows has been developed with the industry in mind. That implies that you have a group of well-trained IT guys who do the Windows laundry while you, at your desk, can work without bothering whether the latest patches are applied, the AV is up to date, Anti-malware filters are in place, …

        • PC LinuxWWW Collapse

          On April 17, 2010, Alain Baudrez (a.k.a. Wamukota) sent me a short story he had written, and asked me if I would be interested in running it in The PCLinuxOS Magazine. Set in the not too distant future, it’s a story depicting the collapse of the World Wide Web.

          Liked it? I loved it! I read it through three times upon receiving the story, and each and every time, my mind envisioned this story being told via a comic strip. I definitely wanted to do this story justice, so I started “shopping around” for someone with some graphic skills who might be able to tackle such a project. This was no small task.

        • PC LinuxPCLinuxOS Dutch Community:: PCLinuxOS.nl

          Most of you will know the Netherlands as the country where Dutch is the native tongue, but Dutch is also spoken in the northern part of Belgium (Flanders). A total of 20 million people speak Dutch, so our community is an international community of 550 members with Dutch and Belgian admins, mods and users.

        • PC LinuxBehind The Scenes: Wamukota & PCLinuxOS.nl

          In 2001 I was diagnosed with ESRD (End Stage Renal Disease) which resulted in both my kidneys shutting down in March 2002. I had to go to the hospital three times a week to have my blood filtered using dialysis. Luckily I got a donor kidney on April 23, 2003. I can not express how grateful I am towards the unknown donor who saved my life.

        • PC Linux[PCLinuxOS] Screenshot Showcase
        • PC Linux[PCLinuxOS] From The Chief Editor’s Desk…
      • SUSE/OpenSUSE

        • GNOME, curl, Fetchmail update in Tumbleweed, WSL Image Published – openSUSE News [Ed: So disappointing that they dance to Microsoft's tune, helping Microsoft to attack GNU/Linux]

          The latest snapshot, 20220504, included the second LLVM update this week. The updated 14.0.3 version includes Application Programming Interface and Application Binary Interface changes for the new major LLVM 14 version. An update of libpipeline 1.5.6 fixed the handling of leading whitespaces for the C library used for manipulating pipelines of subprocesses in a flexible and convenient way. An update of sqlite3 3.38.3 pushed a fix that had effected missing rows in the output due to overly aggressive optimizing the automatic-index and Bloom-filter construction that used an inappropriate ON clause term. An update of yast2-trans had multiple Japanese, Polish, Slovak, Catalan and Brazilian Portuguese translations. The GPS daemon and library that supports USB and serial GPS devices, gpsd, updated to version 3.24. The new version now works with the open-source implementation of Networked Transport of RTCM via Internet Protocol 2.0. Other packages to update in the snapshot were swtpm 0.7.3 and unixODBC 2.3.10.

          The 20220502 snapshot featured changes to the English dictionary package words; it updated from version 2015.02.15 to 2020.12.07 and had various new words added from previous version updates included in the five year jump. Several RubyGems packages were updated in the snapshot. One of those was the update of rubygem-gyoku 1.4.0, which translates Ruby Hashes to XML; the update removed Rubinius support and added options to allow for prettified XML outputs. The dpdk update in the snapshot had a Peripheral Component Interconnect change that assigns a driver pointer before mapping. Other packages to update in the snapshot were fribidi 1.0.12, power-profiles-daemon 0.11 and libX11 1.8, which is supposed to resolve a number of long-standing bugs with the libxcb integration.

        • openSUSE Tumbleweed – Review of the week 2022/18

          This week we ‘only’ managed to get out 5 snapshots. Over the weekend, we had a dracut submission in the mix that happened to break in a few scenarios, resulting in an incomplete initrd. Of course, we caught this in openQA and did not release those snapshots. In the end, we release snapshots 0428, 0501, 0502, 0503, and 0504.

      • IBM/Red Hat/Fedora

        • FMW is finished – egasta Blog

          As all good things have to come to an end, my bachelor thesis has to end someday also. But I’m still looking forward to contributing to FMW, when are any updates or fixes needed. Official FMW 5.0.0 will be released soon. This was my first experience with an open source project and I liked it very much. I’m looking forward to start working on new open source projects in the future.

          This project gave me a lot of experience such as learning how to deploy Qt applications on various operating systems, and how the structure of applications looks. I have learned the new programming language QML and how to use CMake in open source project. Another big experience for me is understanding how GitHub CI works. This was used to automatically create builds for various systems. I have practiced many options and advantages of Git (from the beginning I have been using only “git pull” with “git push”).

        • AlmaLinux 8.6 “Sky Tiger” Beta – Now Available

          Hello World! We proudly present to you AlmaLinux 8.6 Beta “Sky Tiger” for x86_64, ARM and ppc64le architectures.

          Installation ISOs are available on mirrors now. Cloud and container images are in progress, so stay tuned for these in the next few days.

          As usual, a simple reminder, this is a BETA release. It should not be used for production installations. The provided upgrade instructions should not be used on production machines unless you don’t mind if something breaks. Now if you wanna test this somehow, somewhere to see how things will work in 8.6 stable, you’re on the right track.

        • TechRepublicHow to install Podman support in Cockpit on AlmaLinux 8 | TechRepublic

          AlmaLinux is an outstanding option for companies looking for a server-based operating system that can host a never-ending stream of services and applications. But for those who want to use AlmaLinux as a container deployment platform, you’ll have to migrate from Docker to Podman, as the container runtime supported by RHEL-based operating systems has switched, and getting Docker up and running on the OS is a serious challenge.

        • Fedora ProjectFriday’s Fedora Facts: 2022-18 – Fedora Community Blog

          Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)!

          Fedora Linux 36 will be released on Tuesday 10 May.

          I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.

        • The Register UKFedora U-turns on removing BIOS support, for now • The Register

          The Fedora Project has changed its collective mind, and Fedora 37 won’t require UEFI – it will still install and run on BIOS-only systems.

          Last month we reported on some simplifications planned for Fedora 36 and 37. Aside from the changes to console graphics support, there was a proposal to require UEFI firmware, as a step towards removing support for booting using the old-style legacy BIOS boot process.

          Apparently, this generated more discussion than several previous wildly contentious changes, including, in the words of project lead Matthew Miller, “systemd-resolved, btrfs-by-default, and even switching the default editor to nano.”

        • Fedora ProjectFedora Community Blog: CPE Weekly Update – Week 18 2022

          F36 RC-1.4 is out
          1 proposed blocker, GO/NOGO is tomorrow

        • Red Hat OfficialRHEL at 20: How enterprise Linux has evolved from server closet to cloud

          Today there’s no question that Linux, and open source, belongs at the heart of enterprise IT. 20 years ago, though, Linux was the underdog and it took a lot of faith to bet big workloads on Linux. Red Hat had the confidence that it could bring Linux into the enterprise, and delivered on it with Red Hat Enterprise Linux (RHEL).

        • Enterprisers Project4 tips to nail a remote interview

          The way we work keeps changing, but one thing is for certain: Remote work is here to stay.

          Many large companies are implementing a hybrid model in which employees go to a physical office three days a week. HR and recruiting teams are revamping their hiring processes accordingly, with interviewing and onboarding remotely via Zoom and other virtual collaboration tools becoming the norm.

          Interviews – whether remote or in-person – can be nerve-wracking. If you are someone who relies on reading body language and more nuanced expressions and cues for optimal communication, an interview on a screen might be your worst nightmare.

          Relax – you can do this. Here are four tips to nail your next remote interview.

        • Red Hat OfficialRuthless Ransomers [Ed: This is primarily a Microsoft Windows issue]

          It’s a strange situation when someone can hold something hostage from halfway around the world. It’s tragic when your own pictures and files are remotely encrypted. But when it’s a hospital’s system? Ransomware becomes a problem about life or death.

        • The Fast ModeRed Hat Integrates its OpenShift with Kaloom’s Unified Edge Fabric

          Kaloom and Red Hat Deliver on Unified Edge Vision

      • Debian Family

      • Canonical/Ubuntu Family

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • MedevelPaperwork is an open-source OCR and Scanner

        Paperwork is a personal document manager. It manages scanned documents and PDFs.

        It’s designed to be easy and fast to use. The idea behind Paperwork is “scan & forget”: You can just scan a new document and forget about it until the day you need it again.

        In other words, let the machine do most of the work for you.

      • MedeveleSpeak is an awesome text-to-speech TTS open-source software

        eSpeak is a compact open source software speech synthesizer for English and other languages, for Linux and Windows.

        It is a reliable Text to Speech engine for English and many other languages. Compact size with clear but artificial pronunciation. Available as a command-line program with many options, a shared library for Linux, and a Windows SAPI5 version.

        eSpeak uses a “formant synthesis” method. This allows many languages to be provided in a small size. The speech is clear, and can be used at high speeds, but is not as natural or smooth as larger synthesizers which are based on human speech recordings.

      • Barry KaulerEasyShare now supports Android screen sharing

        EasyShare, invoked via the “share” icon on the desktop, is now a GUI frontend to ‘scrcpy’…

      • DedoimedoMeld diff software – So good I’m melting

        Comparing files, not a difficult task, easy peasy. Comparing files visually, not so much. Now and then, almost everyone will have a need to look at two versions of the same document and try to find the subtle differences between them. Sometimes, the application you’re working with will have a built-in comparison feature, which makes things simpler. Sometimes, you will have to figure it out on your own, or use a dedicated program.

        In Linux, there is a wealth of file comparison tools and utilities available, most of them built on top of the command-line diff program. They all follow the same basic principle of showing you two versions of the same file, side by side, and highlighting the changes and differences (hence the name). But one program stands out in this domain, and it’s meld. To wit, we shall review.

      • Daniel AleksandersenSyncthing: The data deduplication master

        Syncthing is an open-source encrypted peer-to-peer folder synchronization program. It uses deduplication techniques to reduce the amount of data it needs to transfer over the network; saving you bandwidth costs, energy, and time. You can now optionally also let it deduplicate data storage to reduce your storage costs.


        Syncthing chunks large files into blocks, similar to how a file system works. It compares which blocks have changed and will only send changed blocks over the network. The blocks can be reused between files and even between different synced folders. This saves transfer time, network bandwidth, and energy.

      • MedevelTaskJuggler an open-source Project Management solution

        TaskJuggler is a modern and powerful, Free and Open Source Software project management tool. Its new approach to project planning and tracking is more flexible and superior to the commonly used Gantt chart editing tools.

        TaskJuggler is project management software for serious project managers. It covers the complete spectrum of project management tasks from the first idea to the completion of the project. It assists you during project scoping, resource assignment, cost and revenue planning, risk and communication management.

      • MedevelKavita is an open-source reading server

        Kavita is a fast, feature rich, cross-platform reading server. Built with a focus on manga and the goal of being a full solution for all your reading needs. Setup your own server and share your reading collection with your friends and family.

      • Events

        • UbuntuLinux Application Summit 2022 – And there we were all in one place …

          In the last two days of April, the small, picturesque town of Rovereto in northern Italy was the location of this year’s Linux Application Summit (LAS). After a virtual-only experience during the pandemic, the LAS returned with a physical presence, and so did we.

          Canonical has long recognized the value and importance of LAS as a cornerstone of open-source cooperation and collaboration. And never before was this more evident than in the 2022’s event, organized by both KDE and GNOME in unison. We’d like to tell you a bit more about LAS, and give our spin to the story.

      • SaaS/Back End/Databases

        • PostgreSQLPostgreSQL: Announcing general availability of pg_stat_monitor

          Percona is happy to announce the general availability of pg_stat_monitor.

          Pg_stat_monitor provides a deeper and richer set of query analytics than has been available before. In addition to several additional metrics on previously run queries pg_stat_monitor introduces the ability to store query metrics in time series buckets as well as store metadata like explain plans from previous iterations of the queries.

        • PostgreSQLPostgreSQL: PostgreSQL JDBC 42.3.5 Released

          The PGJDBC team is proud to announce release 42.3.5 of the JDBC driver for PostgreSQL

          A number of issues have been addressed. A performance regression was found in the 42.3.x branch and was fixed

      • Productivity Software/LibreOffice/Calligra

        • Eric HameleersSlackware: LibreOffice 7.3.3 and an update for Chromium 101

          LibreOffice Community Edition is now at version 7.3.3. Read yesterday’s announcement on the Document Foundation blog to get the details of this incremental (bug-fix) update.

          The 7.3.x releases are the bleeding edge of this popular office suite but nevertheless really stable software.

      • Funding

        • Creating an OpenPGP Web-of-Trust Implementation – A Series – vanitasvitae’s blog

          The Web-of-Trust (WoT) serves as an example of a decentralized authentication mechanism for OpenPGP. While there are some existing implementations of the WoT in applications such as GnuPG, their algorithms are often poorly documented. As a result, WoT support in client applications is often missing or inadequate.

          This is where the aforementioned specification comes into play. This document strives to provide a well-documented description of how to implement the WoT in an interoperable and comprehensible way. There is already an existing implementation by the Sequoia-PGP project (Neal, the author of the specification is also heavily involved with Sequoia) which can serve as a reference implementation.

          Since I imagine implementing the Web-of-Trust isn’t a straight-forward task (even though there is now a specification document), I decided to dedicate a series of blog posts to go along with my efforts. Maybe this helps others implementing it in the future.

      • FSF

        • GNU Projects

          • GCCGCC 12.1 Released
            The GCC developers are proud to announce another major GCC release, 12.1.
            This year we celebrated the 35th anniversary of the first GCC beta release
            and this month we will celebrate 35 years since the GCC 1.0 release!
            This release deprecates support for the STABS debugging format and
            introduces support for the CTF debugging format [1].  The C and C++
            frontends continue to advance with extending support for features
            in the upcoming C2X and C++23 standards and the C++ standard library
            improves support for the experimental C++20 and C++23 parts.
            The Fortran frontend now fully supports TS 29113 for interoperability with C.
            GCC now understands clangs __builtin_shufflevector extension making
            it easier to share generic vector code.  Starting with GCC 12
            vectorization is enabled at the -O2 optimization level using the
            very-cheap cost model which puts extra constraints on code size expansion.
            On the security side GCC can now initialize stack variables implicitly
            using -ftrivial-auto-var-init to help tracking down and mitigating
            uninitialized stack variable flaws.  The C and C++ frontends now support
            __builtin_dynamic_object_size compatible with the clang extension.
            The x86 backend gained mitigations against straight line speculation
            with -mharden-sls.  The experimental Static Analyzer gained uninitialized
            variable use detection and many other improvements.
            The x86 backend gained support for AVX512-FP16 via _Float16.
            The BPF backend now supports CO-RE, the RISC-V backend gained support
            for many new ISA extensions.
            Some code that compiled successfully with older GCC versions might require
            source changes, see http://gcc.gnu.org/gcc-12/porting_to.html for
      • Programming/Development

        • InfoWorldWill JavaScript containers overtake Linux containers?

          JavaScript’s universality is prompting the emergence of a new container-like abstraction, he said. Linux containers are not going way, but thinking in terms of JavaScript containers could simplify many web services. Dahl also noted that Docker popularized the use of Linux containers, with operating system-level virtualization for distributing server software. Each container image is a dependency-free, ready-to-run software package. But browser JavaScript offers a similar hermetic environment at a higher level of abstraction, he sai

        • I don’t know how to build software

          There are a lot of ways of building software, there are many languages you could choose to build it with, many libraries to rely on, many frameworks to leverage, many architectural approaches, many platforms to choose, many paradigms of daily operations to follow.

        • LibreOffice QA/Dev Report: April 2022
        • Dirk EddelbuettelDirk Eddelbuettel: RQuantLib 0.4.16 on CRAN: Small Updates

          A new release 0.4.16 of RQuantLib arrived at CRAN earlier today, and has been uploaded to Debian as well.

          QuantLib is a very comprehensice free/open-source library for quantitative finance; RQuantLib connects it to the R environment and language.

          The release of RQuantLib comes agaain about four months after the previous release, and brings a a few small updates for daycounters, all thanks to Kai Lin, plus a small parameter change to avoid an error in an example, and small updates to the Docker files.

        • Python

          • LWNSuper Python (part 2)

            Python’s super() built-in function can be somewhat confusing, as highlighted by a huge python-ideas thread that we started looking at last week. It is used by methods in class hierarchies to access methods and attributes in a parent class, but exactly which class that super() resolves to is perhaps a bit unclear in multiple-inheritance hierarchies. The discussion in the second “half” of the thread further highlighted some lesser-known parts of the language.

  • Leftovers

    • Masquerades and re-attribution of man’s accomplishments

      This convention is not without consequences, however. One of those consequences is that the mean “goodness” of humanity is less, because its accomplishments have been appropriated away while its crimes stayed.

    • Science

      • Blockchain is Dangerous Nonsense
      • NatureSquid adjust their body color according to substrate | Scientific Reports

        Coleoid cephalopods camouflage on timescales of seconds to match their visual surroundings. To date, studies of cephalopod camouflage-to-substrate have been focused primarily on benthic cuttlefish and octopus, because they are readily found sitting on the substrate. In contrast to benthic cephalopods, oval squid (Sepioteuthis lessoniana species complex) are semi-pelagic animals that spend most of their time in the water column. In this study, we demonstrate that in captivity, S. lessoniana Sp.2 (Shiro-ika, white-squid) from the Okinawa archipelago, Japan, adapts the coloration of their skin using their chromatophores according to the background substrate. We show that if the animal moves between substrates of different reflectivity, the body patterning is changed to match. Chromatophore matching to substrate has not been reported in any loliginid cephalopod under laboratory conditions. Adaptation of the chromatophore system to the bottom substrate in the laboratory is a novel experimental finding that establishes oval squid as laboratory model animals for further research on camouflage.

    • Hardware

    • Health/Nutrition/Agriculture

      • I had an abortion…

        It’s not possible to ban abortions. It’s only possible to ban safe abortions.

    • Integrity/Availability

      • Proprietary

        • TechRadarMicrosoft warns people to uninstall Windows 11 update that’s killing apps

          Microsoft has been forced to warn users to uninstall the Windows 11 update KB5012643, as it appears to be causing some apps to crash, especially if they rely on the .NET 3.5 framework.

          As WindowsLatest explains, KB5012643 – which is an optional update for Windows 11 – brings several fixes to the operating system, but some people are reporting that apps that rely on the .NET 3.5 framework – which is quite a few – have been crashing since installing the update.

          While not every user has been affected, and not all apps using .NET have been crashing, the issue is widespread enough for Microsoft to issue a rather humiliating message to users, telling them to uninstall the update.

        • Security

          • Bruce SchneierCorporate Involvement in International Cybersecurity Treaties [Ed: Microsoft, which routinely puts back doors inside things, has managed to sneak its way into "security" panels]

            The Paris Call for Trust and Stability in Cyberspace is an initiative launched by French President Emmanuel Macron during the 2018 UNESCO’s Internet Governance Forum. It’s an attempt by the world’s governments to come together and create a set of international norms and standards for a reliable, trustworthy, safe, and secure Internet. It’s not an international treaty, but it does impose obligations on the signatories. It’s a major milestone for global Internet security and safety.

          • Reproducible Builds: Reproducible Builds in April 2022

            Cory Doctorow published an interesting article this month about the possibility of Undetectable backdoors for machine learning models. Given that machine learning models can provide unpredictably incorrect results, Doctorow recounts that there exists another category of “adversarial examples” that comprise “a gimmicked machine-learning input that, to the human eye, seems totally normal — but which causes the ML system to misfire dramatically” that permit the possibility of planting “undetectable back doors into any machine learning system at training time”.

          • LWNSecurity updates for Friday [LWN.net]

            Security updates have been issued by Debian (dpdk, mruby, openjdk-11, and smarty3), Oracle (thunderbird), Red Hat (thunderbird), SUSE (chromium, libvirt, python-Twisted, and tar), and Ubuntu (cron and jbig2dec).

          • Bleeping ComputerGoogle fixes actively exploited Android kernel vulnerability

            Google’s researchers disclosed the Linux vulnerability in January and also introduced a fix that was responsibly disclosed to Linux vendors. However, it has taken a few months to fix this vulnerability in Google’s own Android operating system.

          • LWNThe risks of embedded bare repositories in Git

            Running code from inside a cloned Git repository is potentially risky, but normally just inspecting such a repository is considered to be safe. As a recent posting to the Git mailing list shows, however, there are still risks lurking inside these repositories; code that lives in them can be triggered in unexpected ways. In particular, malicious “bare” repositories can be added as a subdirectory of a repository; they can be configured to run code whenever Git commands are executed there, which is something that can happen in surprising ways. There is now an effort underway to try to address the problem in Git, without breaking the legitimate need for including bare repositories into a Git tree.

            In early April, Glen Choo posted to the list about the security risk of bare repositories in Git working tree. He linked to an admirably detailed advisory from Justin Steven that documents the problem and how it can be triggered by a wide variety of tools, including shells, integrated development environments (IDEs), editors, and more. The advisory has proof-of-concept (PoC) code for a whole slew of different scenarios, including ones that can be used to reproduce the problem locally, if desired.

          • Privacy/Surveillance

            • WiredVPN Providers Threaten to Quit India Over New Data Law | WIRED UK

              The country has ordered companies operating VPNs to collect user data and hand it over to officials—but they’re refusing to do so.

              VPN companies are squaring up for a fight with the Indian government over new rules designed to change how they operate in the country. On April 28, officials announced that virtual private network companies will be required to collect swathes of customer data—and maintain it for five years or more—under a new national directive. VPN providers have two months to accede to the rules and start collecting data.

              The justification from the country’s Computer Emergency Response Team (CERT-In) is that it needs to be able to investigate potential cybercrime. But that doesn’t wash with VPN providers, some of whom have said they may ignore the demands. “This latest move by the Indian government to require VPN companies to hand over user personal data represents a worrying attempt to infringe on the digital rights of its citizens,” says Harold Li, vice president of ExpressVPN. He adds that the company would never log user information or activity and that it will adjust its “operations and infrastructure to preserve this principle if and when necessary.”

    • Defence/Aggression

      • Daily MaverickIn a global village, SA’s spineless stance on Ukraine lacks courage, morality and ubuntu

        Instead of regarding the people of Russia and Ukraine as equally precious members of the human family, we have bent over backwards not to condemn the killing of citizens of one country by those of the other.

      • Florida Governor Ron DeSantis banned from New York Museum of Jewish Heritage.

        Said a press release from the DeSantis regime, “We hope that this is a misunderstanding…The Holocaust should never be politicized.”

        The Nazi Party killed over 60,000 LGBT Germans in the concentration camps with the same Zyklon B gas and bullets that they used on the Jews (among others), they tossed the bodies into the same furnaces, they took the gold fillings out of their teeth and smelted them.

        Their first step was to marginalize them, as Governor DeSantis has done in Florida.

        With regards to the Holocaust being politicized, it was the Nazi Party, a far-right populist party, that brought about the Holocaust and selected its victims.

        So it is entirely appropriate that they don’t want far-right populist politicians to use them as a background for their lip service about the rights of humanity.

    • Finance

      • IBM Old TimerIrving Wladawsky-Berger: Beyond GDP: A Framework for Measuring Economic Progress

        “What is meant by economic progress, and how should it be measured?,” asked economists Diane Coyle and Leonard Nakamura in a recent paper, Time Use and Household-Centric Measurement of Welfare in the Digital Economy. “The conventional answer is growth in real GDP over time or compared across countries, a monetary measure adjusted for the general rate of increase in prices. However, there is increasing interest in developing an alternative understanding of economic progress, particularly in the context of digitalization of the economy and the consequent significant changes Internet use is bringing about in production and household activity.”

        Gross Domestic Product (GDP) became the accepted international measure of economic progress in the 1940s. It was a good measure for an industrial economy dominated by the production of physical goods, but GDP doesn’t reflect important economic activity beyond production, such as income, consumption and quality of life, nor does it capture measures of economic welfare or utility, that is, the extent to which a service or good satisfies an individual’s wants and needs. In addition, GDP doesn’t include the value of the increasing amounts of free information goods now available in the Internet-based digital economy, including email, texts, social media, maps, apps and videos.

        In their paper, Coyle and Nakamura propose an alternative approach for measuring economic progress based on how much time people spend on different daily activities – e.g., paid work, household tasks, leisure, and consumption – combined with measures of well-being while engaged in these different activities. “In an economy that is four-fifths services rather than goods, with time to consume therefore inherent in the majority of economic activity, the utility of the different uses of time seems key to understanding economic welfare as well as productivity.”

      • ReutersAsda owners set to buy McColl’s, saving 16,000 jobs

        The deal will keep on all McColl’s stores and staff with higher pay for many, but will not include its pension scheme, they said.

        EG Group declined to comment. The Issa brothers and TDR also own Asda. EG and Asda are run as separate businesses.

        McColl’s runs 1,100 stores, including convenience outlets under its own name and Morrisons Daily, as well as Martin’s newsagents. Around 6,000 of its staff are full-time.

        The company earlier announced it was going into administration, a form of protection from creditors, appointing PriceWaterhouseCoopers (PWC) as administrators.

    • Censorship/Free Speech

      • Digital Transparency: A Right to Information Report for April 2022

        For the month of April 2022, IFF has filed 40 RTI applications. In response to our application seeking information on compliance with the directions of Anuradha Bhasin vs Union of India with the state of Arunachal Pradesh, we found that 7 orders regarding the suspension of telecom services have been issued by the state home department, while Sikkim responded that no internet shutdown orders were issued since 10.01.2020 by the state.

    • Monopolies

      • PC LinuxDo You Trust Technology?

        Mike Wacker, a former Google engineer, has repeatedly claimed that Google engages in manual manipulation of search results. Not only that, Mike Wacker called out CEO Sundar Pichai for lying to Congress about the matter.

        This was in addition to then-anonymous claims that he himself had been advised to reorder search results. Google has been repeatedly criticized for manipulating search results, especially by burying and censoring conservative content while raising positive results for left-wing content.

        In testimony before the House Judiciary Committee in December 2018, CEO Sundar Pichai was asked directly by Representative Zoe Lofgren (Democrats-CA) if “there wasn’t a little man sitting behind the curtain figuring out what we [Google] are going to show the user.”

        Sundar Pichai said, “We don’t manually intervene in any particular search result.”

        Mike Wacker explained in a post on Medium that he was able to find where Google had actually altered search results regarding abortion. Google had a special file regarding blacklisted topics, and if searches were performed regarding these topics, an alternative algorithm would trigger alternative search results.

        Another former Google engineer, Zack Voorhies in a recent interview with The Epoch Times, said that Google tweaked its algorithm to ensure that the negative stories in the mainstream media about former President Trump were what people saw when they used its search engine, the world’s most popular search engine. Zach Vorhies said that the tech giant specifically changed its news algorithm to harm the former president.

        “As a Google whistleblower, Vorhies turned over 950 pages of internal Google documents to the Justice Department’s antitrust division detailing Google’s extensive censorship project. This project is called “Machine Learning Fairness,” which has already corrupted Google Search, YouTube, and News products. This, along with various blacklists and secret page rankings, is being used by Google to manipulate public opinion according to a hidden agenda.”


        Developer Jamie Kyle wrote (in a removed post, but still on the wayback machine), “I think it’s time to publicly share how Microsoft stole my code and then spit on it.”

        Kyle – whose formidable open source pedigree includes contributing to Babel, Flow, Yarn, and serving on the TC39 steering committee – created Lernajs, a lightweight tool for organizing and managing JavaScript packages across projects. The result is that a team at Microsoft apparently mirrored the Lernajs codebase and renamed it Rushjs. They didn’t fork it, which would be a totally legal open source thing to do. Instead, it appears – according to Kyle’s very convincing and publicly documented timeline of events on GitHub – that Microsoft employees essentially copy/pasted Lernajs.

        As an adult, Kyle tried to find out what happened, approach the other party, and collaborate on a resolution to the problem. Basically, Kyle just wanted public recognition of Rushjs’ origins. “So I reached out to the people I knew at Microsoft. This was probably a year ago. They were shocked and apologized. But since then, nothing has happened,” Kyle wrote. “Oh wait, yes, something did happen. Rushjs history was messed with and a lot of the code was moved, functions renamed, rewritten…. Instead of just updating a license or even adding a footnote, they went through all this work, to not give credit to the real author of the program.”

        This is just one of the cases where Microsoft has appropriated other people’s code without giving anything in return, not even credit to the original author. Let’s not forget Keivan Beigi, who created AppGet, a software that copies the features of the Linux model of apt-get software installation and maintenance. At that time, the product manager of Microsoft’s Applications Division expressed interest in the AppGet project with Keivan, and on the premise of inviting him to join the Microsoft team, they had many in-depth exchanges about the design ideas of the AppGet project, with a 5-moon time frame. But in the end, Microsoft suddenly lost touch with Keivan and launched the WinGet project whose design ideas and code structure were highly similar to AppGet after half a year.

Gemini Community is Growing, Geminispace is Expanding, and We Try to Make it Simpler to Keep Abreast of New/Active Capsules and Gemlogs

Posted in Debian, Free/Libre Software at 2:09 pm by Dr. Roy Schestowitz

Video download link | md5sum 0b017584d1b9b9bc4955d94a0b895198
Tracking Geminispace Throughout the Day
Creative Commons Attribution-No Derivative Works 4.0

Summary: Gemlogs, or the Gemini equivalent of Web logs (“blogs” for short), sometimes have RSS/XML/atom feeds, which thankfully enable a sort of ‘alta vista’ (view from above) across the growing space

THE gemlogs in Geminispace are already hundreds in number, but not all of them have daily updates. Moreover, traditional RSS readers do not (yet) support Gemini Protocol — perhaps a potential Free software project for someone to start (or an area where existing RSS readers can be extended/improved).

This morning we decided to make a combined page for all known capsules (which we can syndicate), with new posts shown for today and yesterday. As expected, it took a longer than initially expected, mostly because I added more things that I had intended at first. The new pages (or improved pages), as shown in the video above, are:

We’ve meanwhile learned some good things (likely news) about Gemini and GNU/Linux. An associate said that “amfora and elpa-elpher are both in Debian now!!”

“That’s based on Devuan 5 (daedalus) [...] it’s based on Bookworm (Debian 12).”

Devuan and Debian impact many other distros, operating systems other than themselves. “elpa-elpher is in Raspberry Pi OS so far,” the associate noted. Yes, Debian 11 has it now. Debian 10 does not have Gemini clients in the official repositories, but then again it was released when Gemini was very young, barely even a baby.

Links 06/05/2022: Nextcloud Hub 24

Posted in News Roundup at 4:58 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Instructionals/Technical

      • uni TorontoThe temptation of smartctl’s JSON output format given NVMe SSDs

        We believe in putting data from SMART into our metrics system so that we have it captured and can do various things with it, now and in the future. Today, this is done by processing the normal output of ‘smartctl -i’ and ‘smartctl -A’ for our SATA and SAS drives using a mix of awk and other Unix programs in a shell script. The fly in the ointment on a few machines today (and more machines in the future) is NVMe SSDs, because NVMe SSDs have health information but not SMART attributes, so while ‘smartctl -A’ works on them it produces output in a completely different format that my script has no idea how to deal with.

      • uni TorontoNVMe disk drives and SMART attributes (and data)

        SMART is a standard, originally for ATA hard drives, for reporting various information about the drive. When we talk about ‘SMART’ or ‘SMART data’, we often specifically mean SMART ‘attributes’, which tell you various things about the drive’s state, health, wear over time, and so on; sometimes this information is even useful. SMART attributes have an ID number and some values associated with them, but what the attributes mean (and thus how you should interpret their values) is mostly vendor specific.

      • Popular Science4 smart reasons to keep an old USB drive around

        We’ve mentioned portable apps, but you can also carry an entire computer with you on a USB drive—operating system, applications, files, and all. The open-source Linux OS is perfect for this, and several distributions of Linux can be run in a portable mode, including Linux Lite, Puppy Linux, and MX Linux. Have a look around to see which distro might suit you best.

        Instructions for installing your chosen version of Linux on a USB stick should be available on the distro’s official site (if not, you can pick a different one). For example, here are the instructions for running Ubuntu from a USB drive. In brief, you’ll need to download and run a small tool called Etcher, which will take the Ubuntu OS and convert it into a suitable format that can run entirely from a USB drive.

    • Games

      • ABCMs. Pac-Man clears path to World Video Game Hall of Fame

        More than 40 years after blazing a trail for female video game characters, Ms. Pac-Man was inducted Thursday into the World Video Game Hall of Fame, along with Dance Dance Revolution, The Legend of Zelda: Ocarina of Time and Sid Meier’s Civilization.

        The Hall of Fame considers electronic games of all types each year — arcade, console, computer, handheld and mobile. Inductees are recognized for their popularity and influence on the video game industry or pop culture over time.

    • Distributions

      • [Old] GNU10 years of stories behind Guix

        It’s been ten years today since the very first commit to what was already called Guix—the unimaginative name is a homage to Guile and Nix, which Guix started by blending together. On April 18th, 2012, there was very little to see and no actual “project”. The project formed in the following months and became a collective adventure around a shared vision.

        Ten years later, it’s amazing to see what more than 600 people achieved, with 94K commits, countless hours of translation, system administration, web design work, and no less than 175 blog posts to share our enthusiasm at each major milestone. It’s been quite a ride!

        What follows is a series of personal accounts by some of the contributors who offered their time and energy and made it all possible. Read their stories and perhaps you too will be inspired to join all the nice folks on this journey?

      • BSD

        • Using a game engine to write a graphical interface to the OpenBSD package manager

          One thing I often mumbled about on OpenBSD was the lack of a user interface to browse packages and install them, there was a console program named pkg_mgr, but I never got it to work. Of course, I’m totally able to install packages using the command line, but I like to stroll looking for packages I wouldn’t know about, a GUI is perfect for doing so, and is also useful for people less comfortable with the command line.

        • Ted Unangstwhere’s all the code?

          I already had a pretty good idea where all the code in the OpenBSD kernel was hiding but for the sake of comparison I wanted precise numbers. This would be easy enough to get using some scripts and builtin tools like wc and du, but I wanted a tool that would give me something like this.

      • Canonical/Ubuntu Family

    • Free, Libre, and Open Source Software

      • Next CloudNextcloud Hub 24 is here

        Since the Swedish Government marked Nextcloud as the key solution for digital collaboration, the Nextcloud user and customer base continues to grow quickly. We recently shared customer success stories with the City of Geneva, the local bank in Munich, 15K teachers in Luxembourg, over 35K middle school students and teachers in France and 750K students and researchers in Sweden.

      • Web Browsers

        • Manuel MatuzovicPlease, stop disabling zoom

          I know that you’re not supposed to tell people what to do, but in this particular case I’m really tempted because recently I’ve noticed that a lot of websites are preventing users on mobile to zoom.

        • Global CodeUser-Agent URI

          The Web should be based on open standards. The sites should be written according to a specification – not for a particular browser. The server do not have to know, what client software is used, in order to send you properly formatted page. You can configure your web browser to not send User-Agent HTTP header at all – it is not mandatory.

      • Programming/Development

        • Fortran LangFortran newsletter: May 2022

          Welcome to the May edition of the monthly Fortran newsletter. The newsletter comes out at the beginning of every month and details Fortran news from the previous month.

  • Leftovers

    • Common DreamsOpinion | A Promise to Our Kids: We Won’t Kill You

      At a certain point, as I was reading the book I’d recently been sent, a strange transformation began occurring: Gradually, as I moved ever deeper into it, I wasn’t so much reading as quietly singing a hymn . . . participating in a chant.

    • The NationThe Ground Beneath Us: On the Photographs of An-My Lê

      Just off the main road, a blue pickup truck kicks up dust from behind a cluster of shrubs, momentarily perfectly camouflaged. The car is in Ojinaga, Mexico, and on its way to the banks of the Rio Grande, where people are standing around their parked cars and either looking across to the United States, waiting, or simply passing the time. Consider a different view. Twenty-three years earlier in But Thap, Vietnam, several men in straw hats carry bricks across a landscape of tripod tomato stands, dried-out berms, and crumbled edifices. Sunlight dapples piles of bricks and earth, and the moment is lucid and still.1

    • HackadayAutomate The Freight: Autonomous Buses To Start Operation In UK

      The UK will get its first full-size autonomous bus service this summer, if final road testing that begins in the next two weeks goes according to plan.

    • HackadayMaze Bolt Toy By Lost PLA Casting

      Maze bolts, a bolt which has a maze along its shaft traversed by a pin on its nut, are great fun. Here’s a really beautiful metal version by [Robinson Foundry], made by a process more makers should know about – lost PLA casting.

    • Rolling Stone‘It’s a Hot Mess’: Why Influencers Are Ditching Bella Thorne’s OnlyFans Company

      But while joining the firm might seem to influencers like a lucrative opportunity to replicate Thorne’s success, several former models who were managed by or worked directly with Content X are now offering a warning to potential clients. As one model who worked with the company succinctly put it: “It was just a hot mess.”

      Some of Content X’s former clients allege that the studio overpromised and underdelivered, and there’s been a steady exit of nearly a dozen celebs and influencers like Francesca Farago with millions of followers each. Former Content X clients listed a barrage of concerns to Rolling Stone, including chaotic photoshoots, sloppy managing of their OnlyFans pages and a significant dip in their earnings, while Content X still took a hefty chunk of their profits.

    • Science

      • HackadayAbout As Cold As It Gets: The Webb Telescope’s Cryocooler

        If you were asked to name the coldest spot in the solar system, chances are pretty good you’d think it would be somewhere as far as possible from the ultimate source of all the system’s energy — the Sun. It stands to reason that the further away you get from something hot, the more the heat spreads out. And so Pluto, planet or not, might be a good guess for the record low temperature.

    • Education

      • Common DreamsTexas GOP Governor Considers Challenging 1982 Ruling Requiring Free Public Education

        Days after rights advocates warned that the U.S. Supreme Court’s expected overruling of Roe v. Wade portends rollbacks of numerous rights for people in the U.S., Republican Gov. Greg Abbott of Texas said he wants to challenge a 40-year-old ruling that affirmed states must offer free public education to all children.

        “I can’t believe this has to be said, but ALL children deserve access to a quality public education.”

    • Hardware

      • [Old] Tom’s GuideThe ThinkPad X13s could be the first ARM laptop worth buying — here’s why

        The Lenovo ThinkPad X13s will launch in May of this year. Expect a full review from us where we’ll put the laptop through its paces. If it’s all Lenovo touts it to be, the ThinkPad X13s may earn a spot on our best laptops list.

      • [Old] SlantWhat are the best Notebooks based on ARM processors?
      • HackadayToast Keyboard Raises A Glass To Short Index Fingers

        Custom keyboards? They’re totally great. And we can keep telling you this, but you really won’t feel it until you try a few and find one or two that are right for you. If you’re already on board, we wonder: is there any limit to what custom keyboards can provide in terms of a good, comfortable time for your fingers, wrists, arms, shoulders, and neck? We think not, and as time goes on, there is more and more evidence to support this.

      • HackadayA Minimal Motoring Manifesto

        A couple of years ago, Hackaday published an article, “Electric Vehicles Continue the Same Wasteful Mistakes That Limit Longevity“, in which we took a look at the way the car industry, instead of taking the move to electric traction as an opportunity to simplify their products, was instead making their electric offerings far more complex. It touched a nerve and received a very large comment volume, such that now it is our 19th most commented story of all time.

    • Health/Nutrition/Agriculture

      • Eesti RahvusringhäälingPrice of salmon up 80 percent on year

        He said that the price has been driven up by modest supply as several fish farms dialed back production in the coronavirus pandemic.

        “Why is demand so high for Norwegian fish – farms in Scotland and Chile are producing less fish than is needed. Norwegian companies are exporting to the Americas and Asia, which is why the price has spiked,” Vetevool said.

      • TruthOutAs Over a Million Have Died to COVID, US Billionaires Have Gained $1.7 Trillion
      • TruthOutUS Surpasses 1 Million COVID Deaths Since Pandemic’s Start
      • Common DreamsWHO Says Pandemic Has Killed 15 Million People—Nearly 3 Times More Than Reported

        The World Health Organization on Thursday announced that nearly 15 million people died as a direct or indirect result of the coronavirus pandemic in 2020 and 2021—almost three times as many as officially reported.

        Data submitted by governments to the WHO indicated that Covid-19 had killed roughly 5.4 million people around the globe by the end of last year. But according to the WHO’s new 2020 and 2021 estimate of “excess mortality”—how many more people died worldwide than would be expected in the absence of the pandemic—the first two years of the ongoing public health emergency led to approximately 14.9 million excess deaths.

      • Common DreamsOpinion | While 1 Million Americans Died From Covid-19, US Billionaire Wealth Shot Up by $1.7 Trillion

        As the U.S. crosses the grim milestone of 1 million deaths from COVID-19, U.S. billionaires have seen their combined wealth rise over $1.7 trillion, a gain of over 58 percent.

      • Counter PunchWhy the War in Ukraine is a Disaster for the Poor of This Planet

        Not surprisingly, following Russia’s February 24th invasion, coverage has focused mainly on the day-to-day fighting; the destruction of Ukrainian economic assets, ranging from buildings and bridges to factories and whole cities; the plight of both Ukrainian refugees and internally displaced people, or IDPs; and the mounting evidence of atrocities. The war’s potential long-term economic effects in and beyond Ukraine haven’t attracted nearly as much attention, for understandable reasons. They’re less visceral and, by definition, less immediate. Yet the war will take a huge economic toll, not just on Ukraine but on desperately poor people living thousands of miles away. Wealthier countries will experience the ill effects of the war, too, but be better able to cope with them.

      • Democracy NowHunger Crisis Looms in Africa as Ukraine War Cuts Off Wheat Imports Amid Climate Crisis & Pandemic

        This week U.N. Secretary-General António Guterres is in Nigeria, where he warned Russia’s invasion of Ukraine is leading to a growing hunger crisis in Africa. A new report by Human Rights Watch finds the Russian invasion of Ukraine has worsened food insecurity, particularly for African countries that were already experiencing a hunger crisis. Russia and Ukraine are leading exporters of wheat and other grains, while countries such as Cameroon, Nigeria and Uganda are among the largest importers. With climate change and trade stalled by the coronavirus pandemic, “all these changes within the availability of food has sent the food prices to new levels,” says Lena Simet, senior researcher at Human Rights Watch. Advocates are calling on exporting countries such as the United States and Canada to “open their markets, to not introduce export restrictions, and provide essential grains at an affordable price to humanitarian organizations,” she adds.

      • Counter PunchCost of the Ukraine War Felt in Africa, Global South

        The horrific scenario, however, awaits countries in the Global South which, unlike Germany, will not be able to eventually substitute Russian raw material from elsewhere. Countries like Tunisia, Sri Lanka and Ghana and numerous others, are facing serious food shortages in the short, medium and long term.

        The World Bank is warning of a “human catastrophe” as a result of a burgeoning food crisis, itself resulting from the Russia-Ukraine war. The World Bank President, David Malpass, told the BBC that his institution estimates a “huge” jump in food prices, reaching as high as 37%, which would mean that the poorest of people would be forced to “eat less and have less money for anything else such as schooling.”

      • HungaryPlasma therapy: the Covid success story that wasn’t
      • TruthOutDid Blinken Get COVID at the “Nation’s Most Distinguished Superspreader Event”?
      • Democracy NowDid Blinken Get COVID at What Trevor Noah Called “Nation’s Most Distinguished Superspreader Event”?

        Secretary of State Antony Blinken has tested positive for the coronavirus. State Department spokesperson Ned Price said Wednesday Blinken would isolate at home according to CDC guidelines. Blinken met Wednesday with Swedish Foreign Minister Ann Linde shortly before his positive test result. A day earlier, he met with Mexican Foreign Secretary Marcelo Ebrard. On Saturday, he joined a crowd of 2,600 celebrities, journalists and Washington elites who packed the White House Correspondents’ Association Dinner, where few in attendance wore masks. “You guys spent the last two years telling everyone the importance of wearing masks and avoiding large indoor gatherings. Then, the second someone offers you a free dinner, you all turn into Joe Rogan,” said comedian Trevor Noah in his address at the event, which has since been linked to a growing number of COVID-19 cases. Meanwhile, the World Health Organization estimates the COVID-19 pandemic has caused the deaths of nearly 15 million people around the world.

    • Integrity/Availability

      • Proprietary

        • The HillHillicon Valley — Cyber officials warn about Russian threat [iophk: Windows TCO]

          Nakasone said his agency has observed a series of destructive attacks in Ukraine, on top of those that targeted the country’s satellite communications system in March. “This idea that nothing has happened is not right,” Nakasone said on Wednesday during a summit hosted by Vanderbilt University on modern conflict and emerging threats.

        • The HillTop US cyber officials warn against underestimating Russia’s cyber capability [iophk: Windows TCO]

          challenged the prevailing narrative that Russia hasn’t launched destructive cyberattacks against Ukraine amid its military invasion.

          Nakasone said his agency has observed a series of destructive attacks in Ukraine, on top of those that targeted the country’s satellite communications system in March.

        • Security

          • Privacy/Surveillance

            • The VergeHow to secure your phone before attending a protest

              Back in June of 2020, when this article was first written, people were taking to the streets to organize for justice and protest against systemic racism and police brutality. Now, nearly two years later, people are again taking to the streets, this time to protest the possibility that the Supreme Court may overturn Roe v. Wade, the 1973 decision that guaranteed people the right to terminate their pregnancies. There were protests across the country on Tuesday, May 3rd, 2022, when the news hit; there are bound to be more in the coming weeks.

              As a result, we thought it would be a good idea to revisit this examination of how you can protect your phone data when attending a protest. Here goes: [...]

            • TechRadarYouTube Go is going away

              After six years and 500 million downloads, the YouTube team has announced that it will be discontinuing its YouTube Go app this August.

              The reason for this discontinuation is that YouTube doesn’t see the app as necessary anymore. YouTube Go was originally created as a stripped version of the base YouTube app designed specifically for places with poor data infrastructure or expensive connectivity.

            • The VergeApple, Google, and Microsoft will soon implement passwordless sign-in on all major platforms

              In a joint effort, tech giants Apple, Google, and Microsoft announced Thursday morning that they have committed to building support for passwordless sign-in across all of the mobile, desktop, and browser platforms that they control in the coming year. Effectively, this means that passwordless authentication will come to all major device platforms in the not too distant future: Android and iOS mobile operating systems; Chrome, Edge, and Safari browsers; and the Windows and macOS desktop environments.

            • IT WireApple, Google and Microsoft back new passwordless sign-in standard

              A statement issued by the Alliance claimed such a standard would make the Internet more secure and usable.

              The platforms sold by these three companies support the FIDO standards, though not the latest implementations.

              The new capabilities envisioned are to allow users to automatically access their FIDO sign-in credentials (referred to by some as a “passkey”) on many of their devices, even new ones, without having to re-enrol every account;

            • FIDO AllianceApple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins

              The expanded standards-based capabilities will give websites and apps the ability to offer an end-to-end passwordless option. Users will sign in through the same action that they take multiple times each day to unlock their devices, such as a simple verification of their fingerprint or face, or a device PIN. This new approach protects against phishing and sign-in will be radically more secure when compared to passwords and legacy multi-factor technologies such as one-time passcodes sent over SMS.

            • Apple IncApple, Google, and Microsoft commit to expanded support for FIDO standard to accelerate availability of passwordless sign‑ins

              These companies’ platforms already support FIDO Alliance standards to enable passwordless sign-in on billions of industry-leading devices, but previous implementations require users to sign in to each website or app with each device before they can use passwordless functionality. Today’s announcement extends these platform implementations to give users two new capabilities for more seamless and secure passwordless sign-ins: [...]

            • 9to5MacApple, Google, and Microsoft to extend support for FIDO ‘passwordless’ sign-in

              In early 2020, Apple joined the FIDO Alliance, an open industry association created to increase the interoperability of authentication methods and reduce reliance on traditional passwords. Now Apple, Google, and Microsoft have committed to expanding support for the FIDO Standard, moving toward a universal “passwordless” sign-in method.

              The new standard, which was created by FIDO and the World Wide Web Consortium, aims to allow apps and websites to offer a unified and secure login option across different devices and platforms. As the alliance pointed out, authentication that relies solely on passwords is more susceptible to security breaches, as many people have easy passwords or reuse them across services.

            • The RecordGoogle, Apple and Microsoft to expand support for passwordless sign-in standard

              Google will implement passwordless support in Android and Chrome while Apple will do the same for iOS, MacOS and Safari. Microsoft announced plans to join them in providing the same support in Windows and Edge.

              The platforms will now use verification fingerprints or faces, or a device PIN as a way to sign in. The companies said the approach will be more secure than passwords and “legacy multi-factor technologies such as one-time passcodes sent over SMS.”

            • PC WorldApple, Google, Microsoft commit to killing passwords entirely

              The way they’re going to do it should already be familiar: The three tech giants will lean more heavily on using smartphones as two-factor authentication via a PIN or fingerprint, and using that authentication to verify yourself on an operating system or website. Essentially, they say, you’ll have the option for an “end-to-end” passwordless solution.

              In theory, according to passwordless standards advocate the FIDO Alliance, the platforms used by the three companies already support passwordless authentication, but not in its entirety. One problem today’s agreement solves is the current necessity to sign up for passwordless authentication on one device, but then re-enroll yourself on a second device, such as an additional PC or new phone. FIDO says today’s agreement goes further, allowing users to automatically access their FIDO credentials on their devices without having to re-enroll. The agreement also allows you to sign in on a mobile device, and then access the site on a nearby PC or Mac, regardless of the OS or browser.

            • EFFThe Movement to Ban Government Use of Face Recognition

              Fortunately, communities across the country are fighting back. In the three years since San Francisco passed its first-of-a-kind ban on government use of facial recognition, at least 16 more municipalities, from Oakland to Boston, have followed their lead. These local bans are necessary to protect residents from harms that are inseparable from municipal use of this dangerous technology.

              The most effective of the existing bans on government face surveillance have crucial elements in common. They broadly define the technology, provide effective mechanisms for any community member to take legal enforcement action should the ordinance be violated, and limit the use of any information acquired in an inadvertent breach of the prohibition.

              There are, however, important nuances in how each ordinance accomplishes these goals. Here we will identify the best features of 17 local bans on government use of face recognition. We hope this will help show authors of the next round how best to protect their communities.

            • TechdirtSafeGraph Stops Selling Location Data Of Abortion Clinic Visitors, But…

              A few days ago, Motherboard revealed they were able to purchase the location data of visitors to Planned Parenthood clinics for just $160 from a company named SafeGraph. While SafeGraph refused to comment at the time, they’ve since written a blot post announcing they’ll be ending the practice. But not without spending much of the blog downplaying obvious potential harm:

    • Defence/Aggression

      • Teen VogueJanuary 6 Insurrection: One Year Later, Families Are Still Divided

        As the insurrection unfolded on television, Jackson says he got a phone call from the FBI asking him to confirm that his father was at the Capitol, which Jackson did. As he struggled with the idea that his father was part of an attempted coup of the United States government, Jackson says his father texted news reports to the family group chat with photos of himself at the Capitol. Friends texted, too, asking Jackson if the images they were seeing on television were really of his father.

      • Scoop News GroupHow the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities

        “The cables were cut on both sides to complicate the repairs,” an ‘operator’ told newspaper Le Parisien. “The urgency is to re-solder everything, this represents tens of thousands of small, fibre-optic cables.”

      • Jerusalem PostControversy in Canada over resident’s alleged Palestinian terrorism ties

        “Khalid Barakat has been barred from the United States, he has been barred from Germany, yet the Trudeau government still allows this individual to remain in Canada, despite a Canadian law that forbids any individual with connections to terrorist organizations from entering our country or receiving Canadian Citizenship,” said Senator Leo Housakos in a debate with Senator Marc Gold, the representative of the Government in the Senate. “Why does your government allow him to remain in the country?”

      • Frontpage MagazineModerate Muslim Criticizes Jihadis

        Raheel Raza might dismiss all these as jihadis who are twisting and hijacking her peaceful Islam, and that’s fine by me. The more Muslims she manages to convince of that, if she convinces any at all, the better. But the reason why she likely has trouble convincing Muslims that “conflict” is forbidden during Ramadan is because these four sources are not ignorant of Islam and what it teaches. Habbash is a Sharia judge. Khaki is a maulana, a scholar of Islam. They didn’t draw their views about Ramadan out of thin air. They drew them from Islamic sources such as the hadith I quoted. And other Muslims do as well, which is one reason why there has been not just the abhorrent Al-Quds Day rally this Ramadan, but also 138 jihad attacks with 782 people killed.

      • The NationThe Deadly Illusion of “Victory”

        “America stands with Ukraine until victory is won,” House Speaker Nancy Pelosi declared on May 1, after traveling to Kyiv for a meeting with Ukrainian President Volodymyr Zelensky. Victory? What exactly does Pelosi mean by “victory”? Does that entail the total defeat of Russian forces and their expulsion from all of Ukraine? That can only be accomplished through the participation of US and NATO forces—a scenario that would almost certainly result in a Europe-wide war, with an attendant risk of nuclear escalation. Or does she mean a meat-grinder war aimed at weakening Russia to the point where it is no longer able to fight NATO, as suggested by Secretary of Defense Lloyd Austin after visiting Kyiv a few days earlier? That might, conceivably, avert a nuclear war, but would surely result in hundreds of thousands of dead Ukrainian and Russian soldiers and civilians, and leave Ukraine itself in ruins. Nowhere, in her comments or those by other high-ranking US officials, is there any talk of a negotiated settlement in Ukraine, only of scenarios leading to Russia’s defeat, at whatever cost in human lives.

      • Meduza‘Everything here smells like the dead now’: In Russia’s Buryatia, soldiers killed in Ukraine are buried daily. Has this changed how locals feel about the war?

        As Russia’s military casualties in Ukraine continue to mount, Buryatia has emerged as the country’s second-hardest hit region in terms of losses. The only place losing more men is Dagestan. Nevertheless, the speeches at the near daily funerals in Ulan-Ude and other Buryatian cities still resound with support for Russia’s war against “Nazis” and gratitude for the fallen soldiers not being “left behind,” but shipped home for burial. At the end of April, the local magazine People of the Baikal published a report about how Buryatia is burying their dead soldiers, and what their loved ones and the regional authorities think about these losses. With their permission, Meduza has translated their article in full.

      • Meduza‘She’s still lying in her bed’: Snapshots of how Russia’s war turned the lives of elderly Ukrainians upside down

        According to the Ukrainian Prosecutor General’s Office, at least 221 children have been killed and 408 have been injured during Russia’s all-out war against Ukraine. These statistics are updated regularly. But data on how Russia’s war has affected elderly people in Ukraine doesn’t feature in the authorities’ daily reports. Meduza has compiled photographs that tell the stories of Ukraine’s elderly — including those who are still awaiting evacuation, and those who are unable or unwilling to leave their homes, despite the threat of bombing and shelling. This photo report also includes the text of a letter from Viktoria — a reader from the Luhansk region who wrote to Meduza about her grandparents.

      • Democracy NowHistorian Timothy Snyder: Russia’s Invasion of Ukraine Is a Colonial War

        We speak to Yale University historian Timothy Snyder about his latest article for The New Yorker, “The War in Ukraine Is a Colonial War.” Snyder writes about the colonial history that laid the foundations for the Russian war in Ukraine, such as Russia’s imperial vision and how leaders including Hitler and Stalin have aimed to conquer Ukrainian soil on different premises. “The whole history of colonialism … involves denying that another people is real. It involves denying that another state is real,” says Snyder. “That is, of course, the premise of Russia’s invasion of Ukraine.”

      • Meduza‘It’s a reference to the USSR — to its return’: Why is the Kremlin incorporating Soviet symbols into its war propaganda?

        Russia’s war propaganda has begun co-opting Soviet symbols with increasing frequency. Monuments to the “grandmother with the Soviet flag,” for example, have popped up across the country. And both Kremlin officials and propaganda narratives continue to frame Russia’s full-scale invasion of Ukraine as an extension of the “Great Patriotic War.” Meduza special correspondent Andrey Pertsev looked into the Kremlin’s “Soviet” agitprop and learned how it’s connected to Moscow’s drive to annex new territories.

      • TruthOutAntiwar Groups Protest Defense Industry Profiteering in Ukraine
      • Common DreamsLula Criticizes World Leaders for Not Doing Enough to ‘Help Create Peace’ in Ukraine

        Brazilian presidential frontrunner Luiz Inácio Lula da Silva argued in an interview published Wednesday that world leaders, including U.S. President Joe Biden, are not doing nearly enough to help secure a peaceful resolution to Russia’s deadly war on Ukraine, which has dragged on for more than two months with no end in sight.

        “I don’t think anyone is trying to help create peace,” Lula, a globally popular leftist running to unseat far-right President Jair Bolsonaro and return to the post he held from 2003 to 2010, told TIME magazine in an interview conducted in late March.

      • Counter PunchCan US Progressives Work With the European Left on Ukraine?

        American imperialism always deserves condemnation. I write this also as a Pole because my country took an active part in the Anglo-Saxon-Slavonic aggression against Iraq. And the day the Western bombs started falling on Baghdad, I felt shame for my country, just as I felt anger at seeing a smiling George W. Bush declaring military victory. But Russian imperialism, even if it’s anti-American, is still imperialism, and an ominous one at that, bringing death and destruction across the Dnieper River.

        Putin’s Russia embodies everything that progressives and social democrats are against. An authoritarian and oligarchic system that kills its political opponents at home is characterized by homophobia, nationalism, and a close relationship between state and church. In the international sphere, Russia refers to the former Soviet states as “near abroad” and considers everyone who speaks Russian to belong to the “Russian world.” In Putin’s view, this gives it the right to invade militarily: first in Georgia in 2008, then by illegally annexing Crimea and starting a war in eastern Ukraine in 2014, and finally by attacking all of Ukraine this year.

      • Site36Hensoldt: New German platform to be able to jam Russian air defense radars

        The Bundeswehr is modernizing its electronic warfare capabilities. A new system is to be fitted to Eurofighters once it has been developed

      • Counter PunchNgorongoro Nazi

        Bernhard Grzimek had another face. His life between the ages of 24 and 36 was carefully rewritten by him, and it’s largely his version which is known and reproduced by the FZS and more widely. In his revised version, he joined the German army – but never the Nazi Party – in the 1930s. In 1945, after the Germans had lost the war, he claimed to have been questioned by the Gestapo because he’d given Jews some food.

        The real history is different; understanding by just how much needs some context. Grzimek didn’t in fact join the army in 1933, but the armed wing of the Nazi Party, the Sturmabteilung (SA). He did so when he was 24, a mere five months after Hitler came to power. At the time the SA comprised about a million members, mostly Bavarians from southern Germany where the Nazis had their genesis and most support. When Grzimek joined, the SA was comprised of only a small minority (some 1.5%) of the population. Grzimek wasn’t from Bavaria like most of his SA comrades, but from German-speaking Silesia in the north (now in Poland).

      • Common DreamsIran Nuclear Deal Advocates Say GOP Senate Measure Should Be ‘Wake-Up Call’ for Biden

        Advocates of resurrecting the Iran nuclear deal responded with alarm after the U.S. Senate late Wednesday approved a nonbinding measure to block President Joe Biden from lifting his predecessor’s designation of the Islamic Revolutionary Guard Corps as a terrorist organization.

        “Unless and until he steps up, he is on the same disastrous course that Trump set.”

      • Common DreamsOpinion | Russia’s ‘Victory Day’ and the Trump-Putin Alliance Against Ukraine

        Vladimir Putin planned to conquer Ukraine by May 9—Russia’s annual “Victory Day” celebrating the defeat of Nazi Germany. Instead, he failed miserably and is a global pariah. NATO and U.S. support for Ukraine made all the difference.

    • Transparency/Investigative Reporting

      • Counter PunchThis is Happening Here and Now: Fight Back

        One school says that the leaker was a liberal who wants to give the citizenry time to mobilize against a horrific decision backed by just a quarter of the populace. The idea here would be to spark backlash before the final decision so as to make one of the right-wing justices (most likely Kavanaugh or Gorsuch) waver before his vote is locked in.

        A different take holds that the right leaked the draft decision to “test the waters” of popular response and/or to prematurely lock justices Gorsuch and Kavanaugh into a final anti-abortion ruling and/or to spark protests sooner rather than later so as to increase the time between popular resistance and the mid-term U.S, elections next fall.

    • Environment

      • Common DreamsBiden DOJ Applauded for ‘Long Overdue’ Environmental Justice Plan

        Environmental justice advocates on Thursday cautiously welcomed the federal government’s new plan to deliver on some of U.S. President Joe Biden’s campaign promises to hold polluters accountable and better serve disproportionately impacted communities.

        “This addition is a vital step toward eliminating environmental racism.”

      • TruthOutManchin, Kelly Join GOP to Pass Motion Against Biden Declaring Climate Emergency
      • Common DreamsManchin, Kelly Join GOP in Passing Motion to Bar Biden From Declaring Climate Emergency

        Two right-wing Democrats, Sens. Joe Manchin of West Virginia and Mark Kelly of Arizona, crossed the aisle Wednesday to help Republicans approve a motion aimed at barring President Joe Biden from declaring a climate emergency, a step that green groups have been pressuring him to take since his first day in office.

        The nonbinding motion, sponsored by Sen. Shelley Capito (R-W.Va.) and approved by a vote of 49-47, states that Biden “cannot use climate change as the basis to declare a national emergency.” House and Senate lawmakers will consider the motion as part of their efforts to finalize legislation packed with subsidies to profitable microchip corporations.

      • Counter PunchInflating Hopes and Dreams in Manchin Country?

        In 2011 Gayle Manchin invited Randi Weingarten, the president of the AFT, to convene a big alliance of residents, non-profits, businesses, and government to address McDowell’s pressing problems of which there were many, the most fundamental being loss of population. From a population of over 122,000 in the 1960s, McDowell was down to around 20,000 in the 2020 Census. Welch, the county seat, had just 3,590 survivors, and they were aging. Remaining residents were disproportionately elders, grandparents raising kids, thanks to Medicare and Medicaid.

        Without people, there can be no development. Employers, big box stores – they may come, but they won’t stay, Mayor Harold McBride told us. McDowell had a Walmart. It closed after just 10 years. Welch attracted a new prison, but its 600 workers live elsewhere. Schools face a chronic lack of teachers for lack of housing.

      • Common DreamsOpinion | I’m a West Virginian Farmer. My Brothers Work in Oil and Coal. And We Need Manchin to Act on Climate

        I’m a West Virginia farmer, and I know something about timing and deadlines. If my spring broccoli isn’t planted in the greenhouse by February—and growing uncovered by May—forget it. It’ll be a long summer, fall and cold winter before I can try again.

      • Common Dreams$50.5 Billion and Counting: Climate Groups Launch ‘Cost of Inaction’ Ticker

        A coalition of advocacy organizations demanding bold steps by the U.S. government to combat the climate emergency launched an online ticker Thursday that shows “the cost of inaction.”

        “CAC’s Cost of Inaction Ticker is an effective way to show people and quickly make the case about the need to urgently act on climate.”

      • Energy

        • Democracy NowEuropean Union Proposes a Total Ban on Russian Oil as Sanctions Grow over Ukraine War

          The European Union has announced a plan for a total ban on Russian oil by 2023. The move is backed by Germany, one of the countries most dependent on Russian fuel. World leaders hope that stricter sanctions on Russia will cut off financing for the war in Ukraine. We go to Ukraine to speak with economist Tymofiy Mylovanov about what the European oil ban would mean for the conflict; possible alternative buyers for Russia’s oil surplus, such as China and India; military escalations Russia might be planning for its Victory Day on May 9; and more.

      • Wildlife/Nature

        • Common DreamsUK Survey Finds ‘Terrifying’ 60% Plunge in Flying Insect Population

          A survey published this week analyzing bug splat on U.K. motorists’ license plates found that the nation’s flying insect population has declined by nearly 60% over the past 17 years, indicating a “terrifying” loss of biodiversity among the planet’s most numerous class of species.

          “Declines are happening at an alarming rate and without concerted action to address them we face a stark future.”

      • Overpopulation

        • Counter PunchWhy Nonalignment Is an Urgent Imperative for the Global South

          There is seldom any acknowledgment that nonalignment, in this case refusing to be aligned with the United States and its allies or with Russia, can be a principled position, as well as an astute tactical engagement with geopolitical realities. As two founding figures in the Non-Aligned Movement (NAM), Yugoslavia’s then-President Josip Broz Tito and India’s then-Prime Minister Jawaharlal Nehru, said in a joint statementsigned on December 22, 1954, “the policy of non-alignment with blocs… does not represent ‘neutrality’ or ‘neutralism’; neither does it represent passivity as is sometimes alleged. It represents the positive, active and constructive policy that, as its goal, has collective peace as the foundation of collective security.”

          The Global South houses more than 80 percent of the world’s people, yet its countries are systematically excluded from any decision-making in the international organizations that make decisions in the name of the “international community.” For decades, countries of the Global South have been advocating for the United Nations to be reformed so that it moves away from the zero-sum game of the cold war mentality that continues to drive it. Gabriel Valdés, Chile’s then-foreign minister, said that in June 1969, Henry Kissinger told him, “Nothing important can come from the South. History has never been produced in the South. The axis of history starts in Moscow, goes to Bonn, crosses over to Washington, and then goes to Tokyo. What happens in the South is of no importance.”

    • Finance

    • AstroTurf/Lobbying/Politics

      • National LawReview USNorth Carolina Becomes First State to Prohibit Public Entities from Paying Ransoms [iophk: Windows TCO]

        North Carolina’s new law, which was passed as part of the state’s 2021-2022 budget appropriations, prohibits government entities from paying a ransom to an attacker who has encrypted their IT systems and subsequently offers to decrypt that data in exchange for payment. The law prohibits government entities from even communicating with the attacker, instead directing them to report the ransomware attack to the North Carolina Department of Information Technology in accordance with G.S. 143B‑1379.

        The law applies to any “agency, department, institution, board, commission, committee, division, bureau, officer, official, or other entity of the executive, judicial, or legislative branches of State government” as well as to the University of North Carolina and “any other entity for which the State has oversight responsibility.” Private sector entities are encouraged, but not required, to report cybersecurity incidents to the Department of Information Technology.

      • MedforthFrance: Left-wing politicians refuse to participate in Christian events for reasons of secularism, but do not shy away from participating in the Muslim feast of breaking the fast

        The month of Ramadan ended on Sunday, May 1st. On Monday, Muslims will celebrate the festival of Eid-el-Fitr. There were a number of disputes during this period. These were about the presence of MPs at fast-breaking ceremonies, as reported in detail by La Croix. One question in particular arose: Does an MP violate secularism by attending such an event? The mayor of Lyon, Grégory Doucet, attended such a dinner on April 27 at the Institut français de civilisation musulmane. The Green city councillor was accompanied on this occasion by the prefect and the corps constitués (“constitutional bodies”).

      • MedforthEurabia: In its ”Inspirational Guide to Celebrate the European Diversity Month”, the European Commission depicts a woman with a prominent religious sign, an Islamic veil

        European Diversity Month is taking place across the EU in May. We are calling on businesses and organisations across Europe to join us, the European Commission, in highlighting the importance of diversity and inclusion in the workplace and society through events and activities throughout the month of May.

      • Common DreamsSanders Blasts Senate’s ‘Strange Priorities’ as It Advances Corporate Welfare

        Sen. Bernie Sanders of Vermont blasted the warped priorities of the U.S. Senate on Wednesday as the Democratic-controlled chamber moved to advance legislation that he warned would provide a $53 billion “blank check” to the profitable microchip industry under the guise of promoting innovation, domestic manufacturing, and job creation.

        “We have strange priorities here in the Senate,” Sanders, the chair of the Senate Budget Committee, said in floor remarks. “We can’t extend the child tax credit to combat child poverty. We can’t deal with the crisis in child care. We can’t provide dental care to seniors on Medicare. We can’t deal with climate change.”

      • Counter PunchCentury-Old Racist US Supreme Court Cases Still Rule Over Millions of Americans

        A call from Supreme Court Justice Neil Gorsuch to overturn more than a century of precedent has been joined by advocates for equal citizenship for everyone born in those U.S. territories. If the court decides to take up the question, it would review a long-standing status quo.

        Now, no U.S. citizen living in any of those places can vote for president. They don’t have a voting representative in Congress, either.

      • Counter PunchPanic in Kooyong: The Threat to the Australian Liberal Party

        But Josh Frydenberg is nervous.  There is also reason to suggest that he might even be panicking.  The electorate he represents – that of Kooyong – is not quite so warm towards the sitting member as it has been in the past.  The sitting MP has resorted to his home party base for comfort.  “Incredible sea of Liberal blue at our Kooyong Campaign Launch, with more than 1,000 people present,” he tweeted on May 1.  “So much energy in the room.”

        The sitting member was certainly correct about the energy, in so far as it went to the head of one of his supporters in attendance.  After voicing public approval for Frydenberg (“Liberals will win because of Josh”), volunteer Phil Elwood proceeded to become an impromptu “birdman”, imitating the sound of a Kookaburra and Sulphur-crested Cockatoo with gusto.  Many political candidates have feared the distractions of the eccentric, dedicated supporter.

      • HungaryHungary to host start of Giro d’Italia ’22 this weekend
      • Common DreamsOnce ‘Unthinkable,’ French Left Forms Coalition to Challenge Macron in Parliament

        Less than two weeks after France’s neoliberal president, Emmanuel Macron, defeated the far-right’s Marine Le Pen to win a second five-year term, the country’s four major left parties have agreed in principle to form an electoral coalition that aims to deny Macron a parliamentary majority.

        “No one on the left can win on their own.”

      • Counter PunchTaking Aim at Ukraine: How John Mearsheimer and Stephen Cohen Challenged the Dominant Narrative

        Interfering in another state is tricky business – so says the gutsy University of Chicago international relations scholar John Mearsheimer (The great delusion: liberal dreams and international realities [2018]. It is tricky – and dangerous – and the exceptional nation, the US, may think pushing NATO (with its missile sites and troop placement) to Russia’s borders is benign. But another state – Russia – thinks it is threatening. Mearsheimer admits that great powers may follow “balance of power” logic, but they can also embrace “liberal hegemony.” When they do, “they may cause a lot of trouble for themselves and other states. The ongoing crisis over Ukraine is a case in point” (p. 171).

        It sure is—and very few citizens in Canada and the US have a clue about what this crisis is about: they just assume, saturated in decades of various forms of anti-Russian propaganda, that the military operation launched by Russia on February 24th was, pure and simple, the logical extension of an evil leader, Vladimer Putin. In other words, Ukraine is mere “worthy victim” – and the propaganda machine in the West don’t miss a chance to display images (often false) of the destruction of buildings and people by evil Putin and his military. Evidence is not necessary to substantiate any claims fed to us by the mass media. Images will do because they arouse emotions.  Putin is to blame; Zelensky is the noble defender of Ukrainian nationality.

    • Misinformation/Disinformation

      • Scoop News GroupBacklash to DHS Disinformation Governance Board grows, fueled in part by misinformation

        It’s a view several disinformation experts agreed with, saying that the vagueness around what the board will do combined with its tone-deaf name raises important questions about whether it is an appropriate tool for DHS to use to fight disinformation.

        “If the government intends to expose disinformation, one of the most important counters to that is providing legitimate information,” said David Maxwell, a senior fellow at the Foundation for Defense of Democracies and a retired Army colonel who oversaw psychological operations as a special operations commander. “The announcement, without complete transparency about the organization and its activities and authorities and intent … really undermines their [DHS’s] own credibility and legitimacy.”

    • Censorship/Free Speech

      • ANI NewsChina intensifies censorship of Hollywood movies

        As per the report, industry observers say censors are also asking that versions of movies for audiences outside China follow Beijing’s script.

      • The PrintChina intensifies censorship of Hollywood movies

        Amid a rising trend of curbs on rights in China, the country is intensifying its censorship of Hollywood movies to make them ‘conform’ to the Chinese Communist Party (CCP) ideals, a media report said.

        The practice, which is almost 25-years old, has expanded in recent times even as producers make movies with an eye toward pleasing Beijing yet without isolating the global audience, Voice of America reported citing industry insiders.

      • Indian ExpressKerala: Malappuram man who renounced Islam attacked, police file case

        According to Ali’s complaint, a group of people from Malappuram tried to abduct him to ensure that he did not address the event. “They took me to Kollam beach, where I was manhandled. They destroyed my mobile phone and tore my clothes. They forcibly took me to a vehicle and tried to lock me inside. When locals raised an alarm, the police saved me,” he said.

        According to Essense Global, Ali then delivered his address in the presence of police. In a video, Ali spoke about his experience as a student of Islamic studies, alleged sexual harassment during his studies and his journey towards “the path of humanism”.

      • New Zealand‘I don’t feel it’s done me lasting damage’: David Shanks on five years as chief censor

        A surfeit of headlines in recent months have laid bare the depth and breadth of online harassment, threat and incitement, disinformation and conspiracy theory in Aotearoa – a constellation of toxicity, presenting dots that can be joined from the Christchurch atrocity to the most extreme fringes of the parliamentary occupation. It has prompted some to suggest that the regulatory and enforcement apparatus for responding to such material – which spans a range of organisations including police, Netsafe, Internal Affairs and the Classifications Office that Shanks leads – is not “fit for purpose”.

        What does Shanks say to that, after five years at the sharp end? He takes a long breath. “Our regulatory framework is outdated. And in practical terms, I think I’d struggle to say it is fit for purpose in the current environment.”

    • Freedom of Information/Freedom of the Press

      • VOA NewsNinth Journalist Killed in Mexico This Year as Foreign Criticism Mounts

        United States Senators Tim Kaine and Marco Rubio called on the U.S. to urge Mexico to do more to protect journalists in February, criticizing Lopez Obrador for lashing out against his critics in the media.

      • VOA News‘We Are Not Going to Censor Ourselves,’ Say El Salvador Journalists

        In conversations with VOA, journalists who cover gangs and public security spoke about how the new law could affect their reporting and how they plan to continue.

        “We are not going to censor ourselves,” said Jessica Ávalos, an editor and corruption investigator at Revista Factum.

        “We have published an editorial in which we say that silence is not an option, that we are not going to stop investigating. But we are going to be careful that they do not use each publication as a pretext or excuse to attempt a visceral persecution against our journalists and against the media.”

        Ávalos said that the Law for the Prohibition of Gangs seeks only to “criminalize the journalistic profession.”

    • Civil Rights/Policing

      • Teen VogueBookstore Workers Are Forming Unions Over Low Pay and Lack of Benefits

        “The biggest issues facing bookstore workers are the same issues facing most retail/warehouse/customer service/service industry workers: low wages, lack of benefits, and bosses constantly pushing for more work from fewer people,” Tove Holmberg, an 18-year veteran of Powell’s Books and an active union member, tells me via email. “We’re seen as expendable and replaceable; our work isn’t considered ‘a career,’ and so it’s a constant struggle to get our employers to offer us anything more than the bare minimum.”

      • European ParliamentParliament backs giving more powers to Europol, but with supervision

        Under the new rules, Europol will be able to pursue research and innovation projects, process large datasets, and help national authorities screen foreign direct investment in security-related cases. When dealing with terrorist content or child sexual abuse material, Europol will be able to receive data from private companies, for example communication services.

      • Fair Trials InternationalEuropol’s ever-increasing mandate: European Parliament fails to stand up for fundamental rights

        Today, 4 May, Members of the European Parliament (MEPs) approved the revision of Europol’s mandate and the Schengen Information System. This will support a massive, unchecked expansion of Europol’s powers, posing a threat to people’s rights through over-policing, mass surveillance and discrimination. In full contradiction of the previous European Parliament position on AI and criminal law, and of the EDPS recommendations, the just-approved reform legitimises a data-driven policing model that fails to protect our most basic rights. Instead of addressing the root causes of security issues, the European Parliament has approved to give even more power to an institution that already has the upper hand over people.

        That’s why Fair Trials, EDRi and 16 other civil society organisations contentiously urged the MEPs to vote down the text. However, the MEPs failed to fulfil their responsibility and commitment to society by accepting the proposals to extend Europol’s mandate.

      • Saudi ArabiaSwedish-Iranian to be executed on spying charges by May 21: Report

        Ahmadreza Djalali, a disaster medicine doctor and researcher, was arrested in 2016 on an academic visit to Iran and is to be executed by May 21, the semi-official ISNA said, citing sources.

        Iran’s judiciary has yet to comment on the report. The Swedish foreign ministry did not immediately comment, but Sweden has in the past condemned Djalali’s death sentence.

      • Frontpage MagazineEgypt: Muslim Pharmacist Berates, Slaps Christian Woman

        A Muslim man berated and beat a Coptic Christian woman because she entered his establishment with her head uncovered during Ramadan in Egypt.

        According to the Apr. 27, 2022 Arabic language report, Nevin Sobhi, a 30-year-old married mother, went to her local drugstore to pick up some medication for her young son, who accompanied her. On entering, she noticed that the head pharmacist, Dr. Ali Abu Sa‘da, was giving her “the evil eye.” Before long, what was in his eyes reached his tongue: he launched into a loud and “hate-filled tirade” against her for daring to enter his store during Ramadan without any head covering and while wearing a short-sleeved T-shirt.

      • NexstarTinley Park 17-year-old killed days after father says he ‘did not trust her’ to go to school prom, court docs show

        Grisly details released surrounding the murder of a 17-year-old Tinley Park girl reveal the teen’s father revoked permission for her to attend prom because he didn’t trust her. Documents also show she feared he may “kill her” just days before she was found dead in her home.

        Mohammed Almaru, 42, is accused of killing his daughter, Mia Maro, 17, before police responded to their home Sunday evening in the 7800 block of West 167th Place. He faces first-degree murder charges.

      • CBSMohammed Almaru, of Tinley Park, charged with murder of 17-year-old daughter, Mia Maro

        On the day of the homicide, Almaru texted his son – Mia’s brother – saying that “Mia was hiding things from him and he had to beat the information out of her,” charging documents said.

      • NDTVOn Camera, Hindu Man In Hyderabad Killed After Marrying Muslim

        Around 8.45 pm on Wednesday, the couple had just left home on their bike when two men stopped them, dragged Nagaraju off and attacked him with iron rods and knives. Security footage showed a crowd rapidly collecting at the spot but no one trying to stop the attack. Many had their mobile phones out, recording the crime.

      • The NationStrippers Seize the Moment, Turning a Lockout Into a Picket Line

        On a rainy night in March, a picket line of cat ears, purple wigs, and neon-yellow ski masks paraded in front of Star Garden, a dinky topless dive bar in North Hollywood. A masked protester broke into a chicken dance under the cheap red club lights. Another held a bright sign reading “We Feel Unsafe” in loopy letters. Drivers honked as they rolled by, sending cheers through the crowd. As magical as the night seemed, there’s nothing whimsical about what the Star Garden Strippers were protesting: sexual harassment and unsafe working conditions.

      • Pro PublicaWrongly Convicted Man Receives $7.5 Million Settlement in Indiana

        A man who spent more than eight years in prison after being wrongfully convicted of an armed robbery in Elkhart, Indiana, will receive $7.5 million in a settlement with the city and with former police officers involved in the investigation, his attorney has announced.

        The city’s settlement with Keith Cooper is the largest amount paid to a plaintiff in a wrongful conviction lawsuit in Indiana, according to the University of Michigan’s Exoneration Registry, and marks the end of his legal saga, which was chronicled by the South Bend Tribune and ProPublica.

      • Common DreamsOpinion | The Border-Industrial Complex in the Biden Era

        First, it was the Customs and Border Protection (CBP) vehicles speeding along on the road in front of our campsite. Then it was the Border Patrol’s all-terrain vehicles moving swiftly on a ridge above us. I was about 10 miles north of the border with Mexico, near Peña Blanca Lake in southern Arizona, camping with my six-year-old son and some other families. Like fire trucks racing to a blaze, the Border Patrol mobilization around me was growing so large I could only imagine an emergency situation developing.

      • TruthOutAfter “Roe,” Abbott May “Resurrect” Fight Against K-12 Education for Immigrants
      • TruthOutLouisiana Republican’s Bill Opens Door to Homicide Charges for Abortion Patients
      • TruthOutCompanies Like Amazon and CVS Have Donated Millions to Anti-Abortion Politicians
      • Common Dreams‘We Can’t Let the Filibuster Stand in Our Way,’ Says Warren as Schumer Sets Up Vote to Codify Roe

        Sen. Elizabeth Warren said Thursday that Democrats can’t allow the archaic legislative filibuster to obstruct urgently needed action on abortion rights as Senate Majority Leader Chuck Schumer announced that the upper chamber will vote next week on a modified version of the Women’s Health Protection Act.

        “It’s long past time,” Warren (D-Mass.) tweeted. “And we can’t let the filibuster stand in our way.”

      • TruthOutWill Demise of “Roe” Be a Death Knell for Contraception, Marriage Rights?
      • The NationWhatever It Takes, Democrats Must Defend Abortion Rights

        With the unprecedented leak of the US Supreme Court’s draft opinion affirmatively revoking abortion rights, the theoretical discussion of what the end of Roe v. Wade could look like became real for more people Monday. Though it’s only a draft, it is clear that after decades of legislative and court battles, marches, rallies, and vigils, the legal right to have an abortion in the United States is likely to end this summer.

      • The Nation3 Test Cases Progressives Should Bring in a Post-Roe World

        In an ideal world, the Supreme Court’s upcoming ruling nullifying Roe v. Wade and freeing the states to force people to give birth against their will would simply be ignored by a just executive. In an ideal world, President Joe Biden would make federal facilities available for abortion and family planning services. He would then provide physical protection for both the health care providers and the pregnant people seeking health care. For its part, an ideal-world Congress would immediately pass federal legislation protecting reproductive rights, while in the upcoming midterm elections the people would vote in leaders who stand opposed to the Christo-fascist takeover of American government.

      • The NationSupreme Nightmare
      • Counter PunchWomen Set to Experience a Degree of Dred Scott

        Last night, for the first time in history that anyone can recall, a leaked preliminary Supreme Court decision with respect to completely overturning the 50-year-old precedent of choice for women in Roe v. Wade, if not changed before being issued, will take affect in about two months. Similar to Dred Scott it will say, in essence, women have no rights that a man or the law must respect. It will make no difference if you are the victim of rape or incest you will be forced to give birth. There is even a question among some in the so-called pro-life movement as to even whether the life of the mother should be spared if death is a possibility to save the life of the child.

        Americans expect to add human rights, not have them taken away. This is really an attack on the human rights of women period! It says we don’t trust women to make a decision about their bodies and their health. It’s as simple as Republicans don’t believe in equal rights for women. Republicans oppose equal justice under law for women – it’s why a 1976 Hyde Amendment could exist alongside Roe v. Wade. If abortion is legal for everyone and it is then no woman should have been denied equal protection under the law simply because she is poor and must use tax dollars or she is in the military.

      • Common DreamsOpinion | The ‘Raw Judicial Power’ of Samuel Alito Is an Attack on Dignity, Autonomy, and Progress

        The leak of the U.S. Supreme Court’s draft opinion in the Mississippi abortion ban case has put into authenticated form an announcement that abortion advocates on both sides of the aisle have been predicting for years: stack the Court with Republican-appointed justices and Roe v. Wade will be overturned. The Court’s leaked opinion does just that, holding that both Roe and Casey are now bad law because there is no longer any constitutional right to abortion.

      • Common DreamsLouisiana GOP Advances Bill to Make Abortion a Homicide by Patient and Provider

        Louisiana Republicans on Wednesday advanced legislation that criminalizes abortion as homicide, allowing for the prosecution of both the pregnant person and those who assist them.

        Introduced in March by Rep. Danny McCormick (R-Oil City), House Bill 813 advanced out of committee in a 7-2 vote Wednesday, just days after a leaked U.S. Supreme Court draft opinion revealed the court’s right-wing majority is on the cusp of striking down Roe v. Wade. 

      • Common DreamsOpinion | Those Who Love and Respect Women in This Country Will Rise Up

        The impending doom of overturning Roe v Wade has sent shock waves through our society. For those of us old enough to remember when abortion was illegal (I am barely in that age group) a heavy sense of dread immediately settled across our backs.

      • Common DreamsGillibrand Goes Off: ‘I Don’t Think a Man in America Could Actually Imagine Not Having Control of His Body’

        U.S. Sen. Kirsten Gillibrand on Thursday delivered an impassioned appeal to men who might oppose reproductive rights and a barbed blow to the five right-wing Supreme Court justices who she said lied about their jurisprudential stance on Roe v. Wade.

        “It is an outrage that we have five justices on the Supreme Court who lied.”

      • Common DreamsWith Roe on the Ropes, Students Stage Nationwide Walkouts

        College and high school students from coast to coast walked out of classrooms and off campuses on Thursday to defend reproductive freedom in the wake of this week’s revelation that the U.S. Supreme Court is set to overturn Roe v. Wade in what would arguably be the biggest rights rollback in American history.

        “We call on all working-class, oppressed, and progressive people to take to the streets and fight for our lives.”

    • Internet Policy/Net Neutrality

      • Broadband BreakfastTrade Groups Drop Net Neutrality Suit, Ericsson Builds Wireless Testbed for Utilities, Think Tank’s Antitrust Approach

        Internet trade groups that held on to a legal challenge of California’s net neutrality law have dropped their case Wednesday after a federal appeals court upheld the law earlier this year.

        The industry trade groups, including US Telecom, the cable industry groups NCTA and ACA Connects, and the wireless association CTIA were the hold out against the law, after the Department of Justice dropped their own challenge to the law.

      • Benton InstituteISPs Drop Challenge to California Net Neutrality Law

        Lobbying groups representing broadband internet access service providers—including ACA Connects, NCTA, CTIA and USTelecom—dropped their challenge of a federal district court’s ruling upholding California’s net neutrality law. The ISPs had already lost a federal district court challenge to the law and two appeals court efforts to block enforcement. The suit was dismissed without prejudice, which means ISPs could refile it if they chose. California adopted the prohibitions on blocking, throttling and paid prioritization after the Federal Communications Commission eliminated its similar net neutrality rules and reclassified internet access as a Title I information service under Chairman Ajit Pai.

      • Common DreamsOpen Internet Victory as Telecom Giants Give Up Net Neutrality Fight in California

        Associations representing the telecommunications industry on Wednesday dropped their legal fight to block California’s “gold standard” net neutrality law following a string of losses in federal courts.

        “With this victory, we’ve secured a free and open internet for California’s 40 million residents once and for all.”

      • TechdirtDish’s 5G Network, The Trump DOJ ‘Fix’ For Harmful Wireless Consolidation, May Miss A Major Deadline

        Two years ago the Trump DOJ and FCC rubber stamped the Sprint T-Mobile merger without heeding experts warnings that the reduced competition would likely degrade service, kill jobs, and slowly raise rates. Working closely with T-Mobile and Dish, the FCC and DOJ “antitrust enforcers” unveiled what they claimed was a “fix” for the problematic nature of the deal: they’d cobble together a fourth major replacement wireless carrier in Dish Network.

    • Digital Restrictions (DRM)

      • [Old] TechTargetLenovo unveils an Arm laptop with Microsoft Pluton security

        The X13s is the first laptop to use Qualcomm’s Arm-based Snapdragon 8cx Gen 3 chipset, which includes Pluton. The Microsoft processor, available on x86 PCs, prevents attackers from obtaining credentials and other critical data, even if they have possession of the system.

      • [Old] Windows CentralWhy Dell and Lenovo aren’t using Microsoft Pluton for security

        Using something other than Pluton doesn’t mean laptops from Dell are insecure. It just means that Dell has chosen to go a different route when it comes to securing devices. “As with all new technologies, we will continue to evaluate Pluton to see how it compares against existing TPM implementations in the future,” said a Dell spokesperson to The Register. “Dell also provides its own additional security, implemented at the hardware and software level, to defend customers against attacks.”

      • TechdirtNo, Software-Bricked Tractors Thwarting Russian Looters Is Not A Sign That Either John Deere Or Copyright Is Good

        There are not enough words to describe the horrors of what Russian troops have been doing to their Ukrainian neighbors. But it should go without saying that stealing their stuff is, on its own, not ok.

      • TechdirtMedical Device Makers Sue Library Of Congress For Allowing People To Fix Their Own Medical Devices

        For many years we’ve discussed the sheer ridiculousness of the “triennial review” process of Section 1201 of the DMCA. If you’re lucky, and don’t spend that much time deep in the weeds of semi-obscure copyright law, Section 1201 of the DMCA is the “anti-circumvention” part of the law, that was initially designed to outlaw breaking digital rights management (DRM) tools. Of course, 1201 was written broadly, saying that basically any attempt to “circumvent a technological measure” (even just talking about ways to circumvent a technological measure) would itself be considered copyright infringement even if the underlying purpose for which you were circumventing the technological measure had nothing whatsoever to do with copyright.

    • Monopolies

      • Copyrights

        • TechdirtTop EU Court Hands Down Judgment On Upload Filters That Is As Clear As Mud

          We had just written about the great difficulty national governments are having in transposing the EU Copyright Directive into local law. That’s largely because of the badly drafted and contradictory Article 17. It effectively calls for upload filters, which have obvious problems for freedom of expression because of the impossibility of crafting algorithms that encapsulate the subtleties of copyright law. For this reason, the Polish government brought a legal challenge to Article 17 before the EU’s top court, on the grounds that it infringes on the freedom of expression and information guaranteed in Article 11 of the Charter of Fundamental Rights of the EU. The Court of Justice of the European Union (CJEU) has handed down its judgement, dismissing Poland’s action:

        • TechdirtJosh Hawley Threatens Disney’s ‘Special Copyright Protections’ For Being ‘Woke’

          You will recall that Lauren Boebert was unsuprisingly confused about what lawmaking power she has as a lawmaker, having threatened to not “extend Micky (sic) Mouse’s trademark”, which is not a power Congress has. Josh Hawley, who has never been shy about threatening private companies over protected speech, at least has straight which law to threaten Disney with.

        • Torrent FreakFilmmakers Target Thousands of Alleged BitTorrent ‘Pirates’ in Canada

          The companies behind the movies “Ava” and “Hitman’s Wife’s Bodyguard” are targeting thousands of alleged BitTorrent pirates in Canada. The defendants, who are targeted through the Toronto federal court, can look forward to hefty settlement demands. While these types of cases are not new, they often remain under the radar.

        • Torrent FreakDoes YouTube’s Autoplay Feature Hurt Its DMCA Safe Harbor Protection?

          A long-running class action lawsuit against YouTube alleging mass copyright infringement and failures in YouTube’s enforcement system has raised an interesting question. Does YouTube’s ‘Autoplay’ feature, which effectively sees the platform take control of what content is shown, undermine YouTube’s safe harbor protections under the DMCA?

IRC Proceedings: Thursday, May 05, 2022

Posted in IRC Logs at 2:04 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmUy4Jjh2jNiBF9SQmt4Ut5aFhAq9QN58EHFMpnCxwhcMj IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmNeMEFf7aqpNNCs7F7NdKBaFpYSErCgbLjSeTG19Kw4Ht IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmchMs5mqk7SVRLK8N3di7su2ZcxMFXuMPmDRc6pem5v9n IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmeoujXwwaMvSvcdkbBokSy3osHEHorYiAEXYUQzkMdfiF IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmaGQDXstBPoXn8Nr6zrbkgAje3QvRifSRFS92MyKSLAyT IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmSfTFtSnkouxbt1RXn2mGwaT1oLjrNGhesPPrpgoc81uj IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmfE5QXJnFcH3MoNgumwz4h6V5kVRtvMjw3WrEXyAJwJei IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmQ9N8C2mE8s8F2gcPmNLX23gxvTbTYdPyX1Cec2y8YXye IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmV7FAs2sr4jaf6G5j1H1iXz4NWKvsn6vaLidkmk6yE6cH

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts