Links 24/05/2022: nginx-1.22.0 and WordPress 6.0

Posted in News Roundup at 5:26 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Unix MenLinux in Education and the Automated space

        Linux is a family of operating systems (OS) based on the kernel of the same name. There is no single Linux operating system like Windows or MacOS. There are many distributions (a set of files needed to install software) that perform specific tasks.

        The following system can be successfully implemented in diverse areas starting from education and aviation and finishing with home automation. This article is concentrated on the topic of home automation and the use of Linux in it. Just imagine that your https://www.progressivedesk.com/pages/gaming-desk system for TV or window shades can be easily managed remotely simply through any convenient for you gadget. And Linux appears here as an advanced operating system for smart controllers.

      • Linux MagazineSystem76 Teams up with HP to Create the Dev One Laptop

        HP and System76 have come together to develop a new laptop, powered by Pop!_OS and aimed toward developers.

        The HP Dev One is a new laptop that is developer-focused and was created with the help of System76. This new laptop (which is yet to even go on pre-order), will start at $1099.00 and has a spec sheet that includes the likes of 16GB of DDR4 (@ 3200 MHz) RAM (upgradeable to 64GB), AMD Radeon graphics, a 1TB NVMe M.2 SSD, an AMD Ryzen 7 PRO CPU, and a 14″ FHD anti-glare display. This is all powered by System76’s own Pop!_OS Linux distribution.

    • Audiocasts/Shows

    • Kernel Space

      • Make Use OfLinux 5.18 Release Could Be Bad News for Overclockers

        The Linux kernel developers have announced version 5.18 of the stable Linux kernel, with a feature that could affect future Intel processors by limiting CPUs unless users pay for upgrades to unlock features that already exist on the silicon.

      • TechRadarThe latest Linux kernel release is actually really boring, Torvalds says | TechRadar

        Linus Torvalds has released the 5.18 version of the Linux kernel on schedule, but he hardly sounds happy about it

        Torvalds said “nothing really odd stands out” for users of Linux distros from the latest 5.18 update, dubbing the kernel “plain old boring 5.18”.

        The news means that the merge window for the soon to land 5.19 kernel will open within hours, hopefully providing loyal users with a bit more excitement.

    • Applications

      • nginx-1.22.0

        nginx-1.22.0 stable version has been released, incorporating new features and bug fixes from the 1.21.x mainline branch — including hardening against potential requests smuggling and cross-protocol attacks, ALPN support in the stream module, better distribution of connections among worker processes on Linux, support for the PCRE2 library, support for OpenSSL 3.0 and SSL_sendfile(), improved sendfile handling on FreeBSD, the mp4_start_key_frame directive, and more.

      • MedevelWorkspaces is a useful app to manage your development workspace

        Developers often work with several apps and windows at the same time, he requires the IDE or text editor top be open, a file manager, a web browser on certain pages, and a terminal, or more than one terminal.

      • OSNotedog – Alternative to dig command in Ubuntu Linux for DNS lookup – OSNote

        You must have heard and used the dig command in Linux for DNS lookup. Alternative to that, there is a dog command which is an open-source tool with a beautiful interface used for DNS lookup. Its output is very attractive with different colors provided in Json format. It supports the DNS-over-TLS and DNS-over-HTTPS protocols.

      • Its FOSSpdfgrep: Use Grep Like Search on PDF Files in Linux Command Line – It’s FOSS

        Even if you use the Linux command line moderately, you must have come across the grep command.

        Grep is used to search for a pattern in a text file. It can do crazy powerful things, like search for new lines, search for lines where there are no uppercase characters, search for lines where the initial character is a number, and much, much more. Check out some common grep command examples if you are interested.

        But grep works only on plain text files. It won’t work on PDF files because they are binary files.

        This is where pdfgrep comes into the picture. It works like grep for PDF files. Let us have a look at that.

      • MedevelMini Diary: the stylish cool journaling app is no longer maintained

        Mini Diary is a beautiful open-source journaling app that comes with a dozen of handy features for anyone who takes daily journals.

        Although, the app gains a momentum, due to its usability and fancy look, the developers stopped to maintain and develop it.

        Today we will go through its features, and how does it look like, to help anyone who is interested in creating a similar experience.

    • Instructionals/Technical

      • Barry KaulerFix detect HDDs and thinking about the elephant in the room

        I searched online and found that this “bug” has always been there. In the initrd, the kernel correctly identifies the NMVE PCIe internal drive on my PC as not-rotational, and the internal HDD as rotational — but, reports the external USB flash stick as rotational.

        In most Linux distributions, there is a udev rule to post-process this, and report correctly. I say “most”, but don’t really know what distributions have an appropriate udev rule. I think that some distributions have a udev rule that just sees if it is a USB drive and assumes non-rotational.

      • nixCraftHow to upgrade Alpine Linux 3.15 to 3.16

        Alpine Linux 3.16.0 has been released. Here is how to upgrade from version 3.15.xx to 3.16.0.The post How to upgrade Alpine Linux 3.15 to 3.16 appeared first on nixCraft.

      • nixCraftHow to Set Up WireGuard VPN on Amazon Linux 2

        WireGuard is an open-source, free, modern, and fast VPN with state-of-the-art cryptography. It is like OpenSSH in simplicity and uses private and public keys. Hence, it is more straightforward as compared to IPSec and OpenVPN. Initially released for the Linux kernel, it works with other operating systems. This page explains how to install and set up WireGuard VPN on Amazon Linux EC2 or Lightsail server.

      • ByteXDHow to Check or Set/Change the Timezone in Linux – ByteXD

        You can check the time zone using the timedatectl and date commands or trace the path to the file containing time zone information. You can then change the time zone using the terminal, time zone selection menu or a graphical user interface.

        This tutorial helps you change the time zone in Linux using straightforward steps. Read on to learn more.

      • PC MagHow to Play Games on Your Chromebook | PCMag

        Chromebooks are far less powerful than traditional gaming PCs, but there are ways to game on Chrome OS machines. Here are some of your options.

      • Make Use OfHow to Easily Upgrade Ubuntu to a New Beta Release

        Upgrading to the latest beta (development) release of Ubuntu is easier than you might think. By default, Ubuntu won’t tell you when there is a new development version available. You can, however, check for one and upgrade to it with just a few quick commands at the terminal.

      • Install TensorFlow on Ubuntu 22.04 – kifarunix.com

        This tutorial will show you how to install TensorFlow on Ubuntu 22.04. According to their site, TensorFlow is an end-to-end open source platform for machine learning. It has a comprehensive, flexible ecosystem of tools, libraries and community resources that lets researchers push the state-of-the-art in ML and developers easily build and deploy ML powered applications.

      • How to create a Django project using Templates – NextGenTips

        In this tutorial, we will learn how to create Django models. We are going to use Django 4.0. In the previous tutorial, we saw how to create your first project. We displayed hello world in our browser.

        As a recap of what we saw in the previous lesson, let’s create a new project once more.

      • Install TensorFlow on Debian 11 – kifarunix.com

        This tutorial will show you how to install TensorFlow on Debian 11. According to their site, TensorFlow is an end-to-end open source platform for machine learning. It has a comprehensive, flexible ecosystem of tools, libraries and community resources that lets researchers push the state-of-the-art in ML and developers easily build and deploy ML powered applications.

      • Install TensorFlow on Rocky Linux – kifarunix.com

        This tutorial will show you how to install TensorFlow on Rocky Linux. According to their site, TensorFlow is an end-to-end open source platform for machine learning. It has a comprehensive, flexible ecosystem of tools, libraries and community resources that lets researchers push the state-of-the-art in ML and developers easily build and deploy ML powered applications.

      • Duckling Proxy Quick Setup Guide

        This is a quick guide to help anyone who might want to set up a local duckling proxy. I was initially confused as to how to get it working or how to make a server certificate/key and puzzled things out

      • FAQForgeHow to Build and Install OpenSSL from Source on Ubuntu Linux

        OpenSSL Cryptography and SSL/TLS Toolkit is an open-source, full-featured package used in Transport Layer Security (TLS) and Secure Socket Layer (SSL) protocols to provide secure communication between client and server. This commercial-grade and robust toolkit is widely used by various programs like PHP, Internet servers, comprising the majority of HTTPS websites.

        Most Linux distributions come pre-installed with the OpenSSL library. However, in some cases, the OpenSSL library is not there so you have to install it yourself.

      • VideoHow to install Kali Linux 2022.2 – Invidious

        In this video, I am going to show how to install Kali Linux 2022.2.

      • VideoLinux Crash Course – Understanding Memory and Swap Usage – Invidious

        The Linux Crash Course series goes over all the key concepts you’ll need to know in order to master Linux, one video at a time. In this episode, we’ll take a look at understanding memory and swap usage.

      • How to Install KVM on Ubuntu 22.04 (Jammy Jellyfish)

        KVM, an acronym for Kernel-based Virtual Machine is an opensource virtualization technology integrated into the Linux kernel. It’s a type 1 (bare metal ) hypervisor that enables the kernel to act as a bare-metal hypervisor.

        KVM allows users to create and run multiple guest machines which can be either Windows or Linux. Each guest machine runs independently of other virtual machines and the underlying OS ( host system ) and has its own computing resources such as CPU, RAM, network interfaces, and storage to mention a few.

        This guide shows you how to install KVM on Ubuntu 22.04 LTS (Jammy Jellyfish). At the tail end of this guide, we will demonstrate how you can create a virtual machine once the installation of KVM is complete.

      • Make Use OfHow to Fix Static Noise Issue in Linux

        For those who have recently installed Linux and constantly hear a static noise from their audio devices, here’s a quick fix to this problem.

        Speakers emitting unwanted static noise can be a huge annoyance when trying to focus and can significantly hamper your productivity. It is not a pleasant sound to the ears as well. If you have recently switched to Linux and find your audio devices malfunctioning, this guide can help you troubleshoot your issues and fix static noise on Linux.

      • Make Use OfHow to Play Music From the Linux Terminal With cmus

        Advanced Linux users prefer command-line apps for almost everything. Here’s how to install cmus, a terminal-based music player for Linux.

        When you want to listen to some music, you’ll most likely turn to the GUI audio file or streaming player that came with your distro, but what if you could play music from the command line? It’s easy with Linux and a little program called cmus.

      • VituxHow to Start, Stop or Restart Network Services on Rocky Linux 8 – VITUX

        You may need to restart or stop network services on your Rocky Linux system occasionally. This article shows you step-by-step how to start, stop, or restart network services on Rocky Linux 8. The same commands also work on other RHEL clones such as AlmaLinux 8 and CentOS 8.

      • OSNoteHow to Install Apache Cassandra NoSQL Database on Rocky Linux 8 – OSNote

        Apache Cassandra is an open-source NoSQL database management system. It is designed to handle large amounts of data across many servers and to survive the loss of any server.

        Cassandra’s architectural model is quite different from relational database systems. Cassandra stores non-relational data in row key-value pairs in a distributed set of nodes so that no single point of failure exists and scales linearly by adding more nodes as necessary to meet the demands on capacity, request throughput, and storage capacity for an increasing number of users or client applications.

      • H2S MediaHow to Install PlayOnLinux on Ubuntu 22.04 LTS Jammy – Linux Shout

        Learn the steps to install PlayOnLinux on Ubuntu 22.04 LTS Jammy JellyFish using command terminal and graphical user interface software app.

        PlayOnLinux is a graphical frontend for Wine. It helps in installing, configuring and uninstalling Windows applications on Linux. In addition, it allows each Windows program to be installed in a separate Wine prefix, with which a program can be assigned a different Version of Wine or individual programs can be configured independently of each other. For example, it is possible to run games that no longer run under current Wine versions with an older Wine version.

      • ID RootHow To Install Webmin on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Webmin on Ubuntu 22.04 LTS. For those of you who didn’t know, Webmin is an open-source web-based Linux system administration control panel. It is based on Perl and uses port number 10000 to let users access the web GUI dashboard for managing various server services, configuration files, disk quotas, and many more.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Webmin web-based interface systems administration on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

      • GNOME Desktop/GTK

        • OMG UbuntuNew GNOME Extension Measures How Long Apps Take to Open – OMG! Ubuntu!

          Ever wondered how long your favourite apps take to open on Ubuntu?

          Maybe you’re keen to see if Snap app startup times are as notoriously un-nimble as claimed. And maybe you want to see if any of the ‘speed improvements’ Canonical often hypes up have a tangible effect on your system versus whatever their chosen benchmark is.

          If so, Ubuntu developer Marco ‘3v1n0‘ Trevisan is on hand to help with his Applications Startup Time Measure extension for GNOME Shell. This software stopwatch does exactly what it claims: it tells you how long an app takes to open, from when you click its shortcut to when it appears on your screen, ready to use.

          When the extension is installed and enabled it’s good to go; no further configuration is required. Next time you open a (compatible, see below) app the extension will measure it and tell you how long it took to launch.

  • Distributions and Operating Systems

    • distro-hopping hell

      Anyway, yesterday I decided I had too many issues with void linux on my desktop and that it was time to hop again. For the past 3 or so years I have primarily ran Artix linux, an arch derivitive without systemd. I personally do not have extreme opinions on systemd other than as an end user it is more frustrating to use than openrc or runnit, so I prefer to use those. After these 3 years I have come to the conclusion that systemdless versions of systemd distros are just a pain. Sure they work fine 99% of the time but then for whatever reason their version of a package has an issue, but the original distro’s version relies on a part of systemd so you have to find some workaround or spin up a vm just to do one task. For this reason I wanted to pick a distro that is systemdless by design and not a systemdless respin of an already existing distro.

    • Jonathan Saul Cohen & Debian: West London mansion exposed

      Jonathan Saul Cohen, of Charles Fussell (parody site) is a cyberbully first and lawyer second. He is attacking a Debian volunteer who resigned at a time when he lost two family members.

      Fortunately, the UK Law Society has one of the weakest ethical codes we ever heard of.

      How is Debian paying for this vampire?

      Debian volunteers work long shifts, unpaid, selling t-shirts at tech conferences like FOSDEM

    • New Releases

      • Stable Clonezilla live 3.0.0-26 Released

        The underlying GNU/Linux operating system was upgraded. This release is based on the Debian Sid repository (as of 2022/May/22).

      • 9to5LinuxClonezilla Live 3.0 Adds APFS and LUKS Support, Powered by Linux Kernel 5.17

        Powered by Linux kernel 5.17 and based on the Debian Sid repository as of May 22nd, 2022, the Clonezilla Live 3.0 release is here to introduce support for Apple’s APFS file system, which means that you can now use Clonezilla Live to clone APFS partitions, as well as support for LUKS (Linux Unified Key Setup) encrypted disks.

        Clonezilla Live 3.0 also adds a better mechanism to check the GPT/MBR format of a disk as a workaround to handle ChromeOS Flex partition tables, adds the “memtester” option in the UEFI boot menu for memory stress-testing, and adds a new mechanism to skip using devices list cache, which can be disabled with the use_dev_list_cache=no boot parameter.

      • LinuxiacAlpine Linux 3.16 Brings Updated Package Base, Security Changes

        Alpine Linux 3.16 is now available for this widespread container-oriented distribution and other situations that require a tiny footprint.

        If you’re a typical desktop Linux user, you probably wonder how Alpine Linux has remained hidden from you. Don’t be concerned; this is entirely normal.

        Although Alpine Linux can be used as a fully working desktop system, this is not its primary goal.

        The distribution is strongly focused on the container world because of its exceptional lightweight and different approach to the software providing its functionality. So, for example, you won’t find systemd here; instead, the boot initialization system is handled by OpenRC.

    • Fedora Family / IBM

      • TechTargetKey takeaways from Red Hat Summit 2022

        The 2022 Red Hat Summit was held on May 10-11 and covered a number of customer, partner and industry expert approaches in open source technology delivery.

        Red Hat has seen a lot of growth and market share when it comes to enterprise Linux. The innovation demonstrated at Red Hat Summit 2022 shows continued growth, not just when it comes to the OS, but also in ways that address organizational challenges such as skills gaps, edge growth and modernization across the ecosystem.

        The shift in Red Hat’s CentOS strategy caused disruption in the market for those using CentOS in production. However, Red Hat’s advancements and forward-thinking direction seem to be addressing customers’ biggest challenges. Market adoption will ultimately dictate the success of their strategy.

      • The Register UKVersion 251 of systemd coming soon to a Linux distro near you

        Version 251 of the controversial systemd Linux init system is here, and you can expect it to feature in the next version of your preferred distro.

        The unified system and service manager for Linux continues to grow and develop, as does Linux itself. There is a comprehensive changelog on Github, so we will just try to pick out a few of the highlights.

        New releases of systemd appear roughly twice a year, so the chances are that this will appear in the fall releases of Ubuntu and Fedora.

        The new version now uses the GCC compiler’s C11-with-GNU-extensions standard, nicknamed gnu11.

        This brings it into line with the Linux kernel itself, which uses the same standard as of version 5.18 – in turn facilitated by kernel 5.15 moving the minimum required GCC version to 5.1.

      • Red Hat OfficialHow intelligent applications can benefit from streams processing technology (Apache Kafka)

        The creation and delivery of intelligent and stream-based applications requires having a robust streaming platform that can support ingesting and transforming large amounts of data at a fast pace.

        Red Hat OpenShift Streams for Apache Kafka can support enterprise organizations in solving digital experiences challenges. This article is part of a series that offers technical solutions to commonly known use cases, such as replacing batch data with real-time streams processing, streamlining application modernization and managing event-driven architectures.

    • GSOC

    • Open Hardware/Modding

      • ArduinoThis sun tracker uses an Arduino to increase solar panel efficiency | Arduino Blog

        With the rapid pace of solar panel installations over the course of the previous decade, there has been an ongoing challenge of trying to improve their efficiency. Apart from the typical silicon crystal photovoltaic cells, there are also more efficient/expensive cells known as concentration photovoltaics (CPV), which rely on a set of mirrors to focus sunlight into a small multijunction cell. Although this technology reduces the size and material requirements, it also requires precise sun tracking for peak performance.

        Ruediger Loechenhoff has been able to create a far cheaper solar tracker controller, which relies on an Arduino Uno to drive a set of two motors that position the panel. To achieve this, the Uno was connected to a 9-axis MPU-9250 compass module for internal positioning, a DS3231 real-time clock for accurate timing, and a DIY shading beam sunlight sensor to detect optimal angles. Operating the tracker is also quite simple since the firmware only requires an occasional calibration step after a set number of days.

      • ArduinoThis Arduino device can anticipate power outages with tinyML | Arduino Blog

        Our reliance on electronic devices and appliances has never been higher, so when the power goes out, it can quickly become an unpleasant and inconvenient situation, especially for those who are unable to prepare in time. To help combat this problem, Roni Bandini has devised a device he calls “EdenOff,” which is placed inside an electrical outlet and utilizes machine learning at the edge to intelligently predict when an outage might occur.

        Developed with the use of Edge Impulse, Bandini began by creating a realistic dataset that consisted of three columns that pertain to different aspects of an outlet: its voltage, the ambient temperature, and how long the service has been working correctly. After training a model based on one dataset for regular service and the other for a failure, his model achieved an excellent F-1 score of .96, indicating that the model can forecast when an outage might take place with a high degree of accuracy.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Chromium

        • Stable Channel Update for Desktop

          The Chrome team is delighted to announce the promotion of Chrome 102 to the stable channel for Windows (102.0.5005.61/62/63), 102.0.5005.61 for Mac and Linux.Chrome 102 is also promoted to our new extended stable channel for Windows and Mac. This will roll out over the coming days/weeks.

      • Mozilla

        • Mozilla Thunderbird

          Mozilla Thunderbird email client has been updated to 91.9.1 and shipped to the software repository.

        • Mozilla Firefox

          The Mozilla Firefox browser has been updated to 100.0.2 and shipped to the software repository.

        • Librewolf 100.0.2

          LibreWolf is designed to minimize data collection and telemetry as much as possible. This is achieved through hundreds of privacy/security/performance settings and patches. Intrusive integrated addons including updater, crashreporter, and pocket are removed too. LibreWolf is NOT associated with Mozilla or its products.

        • Sway reload causes a Firefox crash

          My workday takes me from email to terminals to browsers to documents. I love tiling window managers because they keep me organized and less distracted. Many are less resource-intensive as well.

          Although i3 has graced my displays for years now (and I’ve written many posts about it), I recently picked up an AMD graphics card and made my way to sway.

    • Productivity Software/LibreOffice/Calligra

      • Document FoundationLibreOffice at the Univention Summit 2022

        After two years of pandemic restrictions, more and more in-person events are now taking place. Members of the LibreOffice community attended the recent Univention Summit 2022 in Bremen, northern Germany. They had a stand with LibreOffice merchandise, talked to visitors and answered questions.

      • Document FoundationMay 2022, Month of LibreOffice Awards

        In May 2022, LibreOffice has received two Awards: SourceForge’s Open Source Project of the Month, and Software Informer’s Editor’s Pick.

    • Content Management Systems (CMS)

      • WordPress 6.0 “Arturo” – WordPress News

        Say hello to “Arturo” and WordPress 6.0, inspired by Grammy-winning jazz musician, Arturo O’Farrill. Known for his influence on contemporary Latin jazz, Arturo has pressed more than 15 albums spanning a body of work across five decades.

        Take some time to explore WordPress 6.0, built to help you unlock your creative aspirations and make your site-building experience more intuitive. And check out some of Arturo’s inspirational sounds that span Afro Cuban jazz, contemporary Latin jazz, and so much more.

    • Programming/Development

      • Traditional vs. Non-traditional Interview Processes

        There is of course the issue of “if they’re using text-based communication during an interview, how do we know they’re not looking up the answers online?” In a traditional interview, this could open up the possibility of cheating or being dishonest about how you came to the answer.

      • Code smells

        When you have to maintain other people’s code, little things can give you a bad feeling. They aren’t disasters, but they don’t give you confidence in your predecessors.

      • Python

        • Do While – Loop Example in Python | Mark Ai Code

          Loops are an important and widely utilized element in all current programming languages.

          A loop is the finest solution for automating a certain repeated operation or preventing yourself from writing repetitive code in your projects.

          Loops are sequences of instructions that are executed repeatedly until a condition is fulfilled. Let’s take a closer look at how Python loops function.

  • Leftovers

    • Building with cob

      Cob is an ancient construction material composed primarily of subsoil or clay; it is similar to rammed earth, but with organic material (usually straw) added to increase strength. Its use has seen a resurgence in recent decades because it is sustainable and inexpensive (though labor intensive). Due to its high thermal density, buildings made of cob can maintain comfortable internal temperatures using passive means (depending on local climate).

    • Science

      • The Case for Slow-Mo Driving

        The EU law defines a certain type of vehicle as a moped that can be driven from the age of 15 with an AM type driver’s license. These mopeds have two to four wheels, no more than 50 cc engine capacity (4.0 kW in case of electric engine), can drive no faster than 45 km/h (28 mph). I believe they may not exceed 450 kg of weight, fuel excluded, but a fast search hasn’t confirmed that right now. The four wheel variety usually looks much like a Smart Car, which is very cute in a way.

      • degrowther: Re: The Case for Slow-Mo Driving
    • Hardware

      • The Register UKToyota cuts vehicle production over global chip shortage

        Toyota is to slash global production of motor vehicles due to the semiconductor shortage. The news comes as Samsung pledges to invest about $360 billion over the next five years to bolster chip production, along with other strategic sectors.

        In a statement, Toyota said it has had to lower the production schedule by tens of thousands of units globally from the numbers it provided to suppliers at the beginning of the year.

        “The shortage of semiconductors, spread of COVID-19 and other factors are making it difficult to look ahead, but we will continue to make every effort possible to deliver as many vehicles to our customers at the earliest date,” the company said.

      • The Register UKRobotics and 5G to spur growth of SoC industry – report

        The system-on-chip (SoC) side of the semiconductor industry is poised for growth between now and 2026, when it’s predicted to be worth $6.85 billion, according to an analyst’s report.

        Chances are good that there’s an SoC-powered device within arm’s reach of you: the tiny integrated circuits contain everything needed for a basic computer, leading to their proliferation in mobile, IoT and smart devices.

        The report predicting the growth comes from advisory biz Technavio, which looked at a long list of companies in the SoC market. Vendors it analyzed include Apple, Broadcom, Intel, Nvidia, TSMC, Toshiba, and more. The company predicts that much of the growth between now and 2026 will stem primarily from robotics and 5G.

        Robots are being deployed in increasingly diverse situations, Technavio says, and small, purpose-built SoCs are ideal for such applications in the automotive, electronics, healthcare and defense industries.

    • Proprietary

      • The Register UKPatch now: Zoom chat messages can infect PCs, Macs, phones with malware

        Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim’s device.

        The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

        The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

      • The Register UKSAP attracts further criticism for Russia presence, despite promise to leave

        A Ukrainian minister has accused software giant SAP of continuing to operate in Russia despite the German vendor previously vowing to withdraw from the aggressor nation.

        In the months following Russia’s invasion of Ukraine, SAP attracted criticism as it continued to support installations of its software in Russia and cloud services used by Russian businesses, including state-owned bank Sberbank.

    • Security

      • LWNSecurity updates for Tuesday [LWN.net]

        Security updates have been issued by Debian (firefox-esr and openldap), Fedora (curl), Oracle (kernel and kernel-container), Red Hat (maven:3.5), SUSE (cacti, cacti-spine, firefox, go1.18, openldap2, python-requests, rsyslog, and slurm_20_11), and Ubuntu (firefox, htmldoc, libpng, libxfixes, libxrender, thunderbird, and vim).

      • USCERTCISA Adds 20 Known Exploited Vulnerabilities to Catalog [Ed: About half these are Microsoft, for the second day in a row, but the corrupt media lets Microsoft badmouth "Linux" over admins who choose lousy passwords. These are actively-exploited Microsoft holes!]

        CISA has added 20 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow on the of the “Date Added to Catalog” column, which will sort by descending dates.

      • FOSSLifeGitLab 15 Improves Editing and Container Scanning

        The GitLab team has released GitLab 15, which features a new WYSIWYG editor, container scanning in all tiers, improved management of iteration cadences, and more.

        The WYSIWYG editor for wikis allows for easier editing of code blocks, links, and media. According to the announcement, you can choose from more than 100 different programming languages, so that “your CSS, YAML, and Python code are distinct from each other with accurate syntax highlighting.”

      • GitLabContainer Scanning available in all tiers

        Container Scanning helps developers to easily find known security vulnerabilities in dependencies that are installed in their container images. With GitLab 15.0, we are making the basic Container Scanning features available in every GitLab tier.

      • LWNGoogle: Protecting Android users from 0-Day attacks

        This Google blog entry looks at some zero-day Android exploits that were detected and makes it clear what the stakes are.

      • Privacy/Surveillance

        • Your period tracking app is tracking you #PrivacyofthePeople

          In the last #PrivacyofthePeople post we looked at whether there are any safeguards to protect a person from random phone checking by the Police. In this post, we look at how the information collected by period tracking applications may be misused and to what extent the Data Protection Bill, 2021 will address any of these issues.

        • DuckDuckGo Isn’t as Private as You Thought
        • PoliticoPegasus’ complex structure hinders EU spyware probe
        • InnovationAusEra of ‘tech exceptionalism’ must end: eSafety Commissioner

          Australian eSafety Commissioner Julie Inman Grant has called on global regulators to end the “era of technological exceptionalism” and to recalibrate the “range of human rights” that play out online.

          Ms Inman Grant spoke on a panel at the World Economic Forum on Monday, alongside Deputy Prime Minister of Belgium Petra De Sutter, Finland’s Minister for Communications Timo Harakka, and Brett Solomon, the co-founder and executive director of international digital rights group Access Now.

        • WiredHow GDPR Is Failing

          One thousand four hundred and fifty-nine days have passed since data rights nonprofit NOYB fired off its first complaints under Europe’s flagship data regulation, GDPR. The complaints allege Google, WhatsApp, Facebook, and Instagram forced people into giving up their data without obtaining proper consent, says Romain Robert, a program director at the nonprofit. The complaints landed on May 25, 2018, the day GDPR came into force and bolstered the privacy rights of 740 million Europeans. Four years later, NOYB is still waiting for final decisions to be made. And it’s not the only one.

          Since the General Data Protection Regulation went into effect, data regulators tasked with enforcing the law have struggled to act quickly on complaints against Big Tech firms and the murky online advertising industry, with scores of cases still outstanding. While GDPR has immeasurably improved the privacy rights of millions inside and outside of Europe, it hasn’t stamped out the worst problems: Data brokers are still stockpiling your information and selling it, and the online advertising industry remains littered with potential abuses.

          Now, civil society groups have grown frustrated with GDPR’s limitations, while some countries’ regulators complain the system to handle international complaints is bloated and slows down enforcement. By comparison, the information economy moves at breakneck speed. “To say that GDPR is well enforced, I think it’s a mistake. It’s not enforced as quickly as we thought,” Robert says. NOYB has just settled a legal case against the delays in its consent complaints. “There’s still what we call an enforcement gap and problems with cross-border enforcement and enforcement against the big players,” adds David Martin Ruiz, a senior legal officer at the European Consumer Organization, which filed a complaint about Google’s location tracking four years ago.

        • The Register UKUK authorities fine Clearview AI £7.5m • The Register

          The UK’s data protection body today made good on its threat to fine controversial facial recognition company Clearview AI, ordering it to stop scraping the personal data of residents from the internet, delete what it already has, and pay a £7.5 million ($9.43 million) fine.

          The company, which is headquartered in New York, claims to have over 20 billion facial images on its databases, mostly culled from YouTube, Facebook, and Twitter. Clearview AI has developed a facial recognition tool – which it is attempting to patent – that is trained on these images. The tool attempts to match faces fed into its machine learning software with results from its enormous image database, which it claims is the largest of its kind “in the world” and which it sells (to law enforcement bodies, among other clientele) across the globe.

          The move from the Information Commissioner’s Office (ICO) comes after an investigation launched in 2020 in conjunction with the Australian Information Commissioner to see if Clearview had breached the Australian Privacy Act or the UK Data Protection Act 2018.

        • Scoop News GroupAdvocates urge Amazon to drop controversial DHS surveillance program

          Digital and human rights activists are demanding that Amazon Web Services drop out of a contract to host the Department of Homeland Security’s next-generation biometric data-hosting system.

          “This mass biometric data collection by DHS is a deep invasion of privacy, an assault on human rights, and places hundreds of millions of people at risk of raids, detentions, deportations, and family separation,” write nonprofits led by Access Now, Immigration Defense Project and Just Futures Law. “By hosting DHS’ HART [Homeland Advanced Recognition Technology] database, AWS is directly facilitating the creation of an invasive biometrics database that will supercharge surveillance and deportation, risking human rights violations.”

    • Defence/Aggression

      • The Register UKSouth Korean and US presidents gang up on North Korea’s cyber-offensives

        US president Biden and South Korea’s new president Yoon Suk Yeol have pledged further co-operation in many technologies, including joint efforts to combat North Korea.

        While the US agreed to deploy physical weapons and hold military drills if necessary to defend the South against the North, the pair together vowed to “significantly expand cooperation to confront a range of cyber threats from the DPRK, including but not limited to, state-sponsored cyber-attacks.”

        This cooperation will include working groups attended by law enforcement and homeland security agencies from both nations.

        North Korea stands accused of running many offensive operations online. Last month, the US government offered a reward of up to $5 million for information to disrupt North Korea’s cryptocurrency theft, cyber-espionage, and other illicit state-backed activities. That bounty came one day after the FBI blamed Lazarus Group – a cybercrime gang that executes on behalf of North Korea’s Reconnaissance General Bureau – for the theft of $620 million from video game Axie Infinity’s Ronin Network.

    • Environment

      • Wildlife/Nature

        • World Turtle Day

          Celebrate by helping a turtle cross the street, visiting your local zoo, or just watching a documentary about turtles.

    • Finance

      • Asset Poverty

        Asset poverty is the lack of assets that can be used to support oneself for three months. Such assets to do not be to be liquid, such as cash: a house or other real estate, a spare car, stocks, and possessions that hold value such a jewelry or furniture are also included.

        When discussing wealth disparity and other human development issues, poverty is almost exclusively defined in terms of raw income. The international extreme poverty live is defined as a daily income of less than $1.90, and even the United States defines national poverty as a yearly income of less than $12880 for one person

      • Capital One and MasterCard make final ruling in my favor against Batteries Plus Bulbs, but where did Chargebacks come from?

        Capital One and MasterCard made a final ruling in my favor against Batteries Plus Bulbs after the merchant chose to go ahead and accept it, but where did Chargebacks come from?

        I wrote yesterday that Capital One and MasterCard ruled in my favor in my dispute against Batteries Plus Bulbs for “service not rendered”, but where did Chargebacks come from?

        Before the mid-1970s in the United States, credit cards existed, but they were not widely used or accepted.

        Practically anyone who got your card or just the number could charge anything they wanted to it, and you wouldn’t know they did until you got the bill at the end of the month, and there was no way to object to any of it.

    • AstroTurf/Lobbying/Politics

    • Civil Rights/Policing

      • AccessNowMeta, Alphabet, Amazon: A shareholder’s guide to supporting human rights

        Over the next week, shareholders at three of the most powerful tech platforms in the world will have their chance to make their voices heard on pressing issues of human rights and corporate governance. As Meta, Alphabet, and Amazon hold their annual general meetings (AGMs), we are calling on shareholders at those companies to use their vote to ensure that the companies adopt and implement meaningful human rights practices. We urge shareholders to support the following proposals that push these tech platforms toward greater accountability for their human rights impacts.


        Meta is advising its shareholders to turn all these proposals down, but the company’s record demonstrates just how necessary these measures are. For example, Meta’s failure to implement effective content moderation in Ethiopia, a nation with an estimated 10 million Facebook users, has exacerbated violence in the country in the midst of ongoing civil unrest and conflict. Furthermore, it appears clear that the company knew exactly what was going on, but did little to mitigate the situation.

        Apart from the documented repeated harms to societies and its users, Meta’s financial performance should raise flags for shareholders. The company holds the dubious distinction of having had the single largest one-day drop in share price in stock market history, signaling serious instability regarding its value.

      • AccessNowAccess Now Grants: How we support the activists who defend our rights during conflict and crisis

        In 2021, grassroots, frontline, and feminist digital rights organizations and human rights defenders continued to face mounting challenges — but they also rose to confront, and overcome those challenges. As civil society defended digital rights during multiple crises — from the ongoing COVID-19 pandemic, to internet shutdowns during military coups and armed conflict, to the Pegasus spyware attacks —the Access Now Grants Program delivered support to bulwark their vital and important work.


        In 2021, Access Now awarded $1,410,071 in direct financial support across 51 grants to 46 separate local and grassroots organizations and individuals working in 29 countries.

    • Monopolies

      • Hal Varian on the Flawed Reasoning Behind Proposals to Regulate Tech – Disruptive Competition Project

        n a recent fireside chat, Google’s Chief Economist Hal Varian discussed the flawed reasoning behind current legislative proposals to regulate tech, like S. 2992, H.R. 3825, and H.R. 3826. The measures in these bills would regulate targeted companies with an extremely heavy and bureaucratic hand, subjecting them to common carrier-style “non-discrimination” requirements, structural separation, and prohibitions on mergers and acquisitions. Varian found the origins of each of these measures in the 2020 House Antitrust Report, often underpinned by arguments divorced from economic reality.

        Varian explained how the measures would impact consumers. Common carrier-style “non-discrimination” provisions would effectively break integrated user experiences, requiring users to make many additional clicks rather than allowing user-friendly one-click navigation within an online platform or ecosystem. Likewise, structural separation and line of business regulations would force many integrated online platforms and ecosystems to split into distinct services, degrading user experience and reducing the ability of tech firms to compete with incumbent firms outside of each tech firm’s core market. Prohibitions on mergers and acquisitions would effectively prevent tech firms from acquiring startups. A supermajority of successful startup founders seek acquisition by larger firms, in many cases expecting acquisition from the outset. In the absence of acquisitions, startups would find it much harder to exit successfully and return cash to their investors, and consequently funding from venture capital funds would be much harder to come by, reducing funding for future innovative startups and reducing startup formation.

      • Copyrights

        • KONPEITO

          KONPEITO was quarterly Lo-fi hip hop & chill bootleg mixtapes, distributed exclusively through the Gemini protocol. Each tape was a half-hour mix, clean on side A and repeated on side B with an added ambient background noise layer for atmosphere.

[Meme] Divine Protection

Posted in Europe, Patents at 12:32 pm by Dr. Roy Schestowitz

Mask? No need. I'm the f***ing president.

Summary: You won’t find Monopoly Tony (António Campinos) wearing a mask at the EPO because the rules of the Office do not apply to him

António Campinos and the Alicante Clique (EPO Management, Appointed Based on Nepotism Despite Lack of Qualifications) Nowadays Exploiting Kids for PR Charades

Posted in Deception, Europe, Marketing, Patents at 11:27 am by Dr. Roy Schestowitz

Video download link | md5sum d4bf9bfb9a51470afb466c2c5991c77e
Campinos Wooing the Children
Creative Commons Attribution-No Derivative Works 4.0

Summary: The sick old habit of exploiting kids for Public Relations (PR) and marketing purposes is all too common at the EPO (they’re constantly exploiting “the children” [1, 2, 3, 4] to associate criticism of the EPO with demeaning the young and innocent), but the management — which enjoys nepotism and immunity rather than relevant skills — carries on today and it’s being called “inaugural”

“Young Inventors”. What does that even mean? When I was a teenager I saw that word being used to describe me and my friends (who were also my classmates). 20 years later I saw newspaper articles about it, mis-portraying what we did as “inventing patents” though we never bothered with patents at all*. Maybe we were used for propaganda in the media. But at age 15 or 16 I did not quite understand what was going on*.

Fast-forward to 2022 and we now see the EPO doing this too. Benoît Battistelli and António Campinos have been increasingly using the children or “girls” (young and also gender aspect; the EPO likes talking about schoolgirls) for marketing fluff, much like the pinkwashing and greenwashing [1, 2] stunts. This latest one (warning: epo.org link) is a marketing stunt and it’s currently plastered all over the front page of epo.org, nowadays a propaganda front of Team Campinos and Team UPC.

“He has no idea what he’s doing and sometimes he sounds drunk, though he casually blames “jet lag”.”Regarding Campinos (or Monopoly Tony), we previously showed how he advocated indoctrinating children for so-called “IP”. We shared two videos about that; he also did this 2 months ago in this recorded session (it’s as shallow as a desert creek) and he loves hanging out with patent maximalists and lobbyists, not scientists, as he did months ago with CIPA, the Team UPC’s biggest fanatics in the UK. He calls himself “nomad” and says he has not settled in at EPO (in 2021), though he still seeks reappointment. He has no idea what he’s doing and sometimes he sounds drunk, though he casually blames “jet lag”. This nonchalant attitude has been passed to his son.

And now, on top of the “Inventor” PR charade (waste of money and very risky, more so during COVID-19), he’s looking to leverage youngesters, not just the work of actual scientists for reputation laundering of dictators, a.k.a. techwashing [1, 2]. Sometimes there’s even posthumous exploitation. We gave examples in past years. So in other words, the EPO also exploits the dead for techwashing.
* This is a bit personal. I vaguely recall my duty as the financial manager of my Junior Achievement team (Young Enterprise equivalent), which won the national final, surpassing 210 rival teams. We consequently competed in the international final in Copenhagen. I was selected for the voiceover job used for this national Junior Achievement representation (explanation of our project). I later met the mayor. He likely used us all for political gain. Sure, we received recogniton (and gifts); but he likely sought to benefit from that politically.

[Meme] Snake on a Plane

Posted in Europe, Patents at 10:43 am by Dr. Roy Schestowitz

Antimasker on plane: I'm the f***ing president

Summary: The EPO‘s President ‘Monopoly Tony’ (António Campinos), whom you never see wearing a mask (none of the photo ops; he does not even socially distance himself from peers, he wears sneakers instead of masks) during the height of a pandemic, is the "f***ing president"; don’t tell him to wear one…

Microsoft GitHub Exposé — Part XX — Entering Phase II

Posted in Deception, Microsoft, Mono at 8:57 am by Dr. Roy Schestowitz

Series parts:

  1. Microsoft GitHub Exposé — Part I — Inside a Den of Corruption and Misogynists
  2. Microsoft GitHub Exposé — Part II — The Campaign Against GPL Compliance and War on Copyleft Enforcement
  3. Microsoft GitHub Exposé — Part III — A Story of Plagiarism and Likely Securities Fraud
  4. Microsoft GitHub Exposé — Part IV — Mr. MobileCoin: From Mono to Plagiarism… and to Unprecedented GPL Violations at GitHub (Microsoft)
  5. Microsoft GitHub Exposé — Part V — Why Nat Friedman is Leaving GitHub
  6. Microsoft GitHub Exposé — Part VI — The Media Has Mischaracterised Nat Friedman’s Departure (Effective Now)
  7. Microsoft GitHub Exposé — Part VII — Nat Friedman, as GitHub CEO, Had a Plan of Defrauding Microsoft Shareholders
  8. Microsoft GitHub Exposé — Part VIII — Mr. Graveley’s Long Career Serving Microsoft’s Agenda (Before Hiring by Microsoft to Work on GitHub’s GPL Violations Machine)
  9. Microsoft GitHub Exposé — Part IX — Microsoft’s Chief Architect of GitHub Copilot Sought to be Arrested One Day After Techrights Article About Him
  10. Microsoft GitHub Exposé — Part X — Connections to the Mass Surveillance Industry (and the Surveillance State)
  11. Microsoft GitHub Exposé — Part XI — Violence Against Women
  12. Microsoft GitHub Exposé — Part XII — Life of Disorderly Conduct and Lust
  13. Microsoft GitHub Exposé — Part XIII — Nihilistic Death Cults With Substance Abuse and Sick Kinks
  14. Microsoft GitHub Exposé — Part XIV — Gaslighting Victims of Sexual Abuse and Violence
  15. Microsoft GitHub Exposé — Part XV — Cover-Up and Defamation
  16. Microsoft GitHub Exposé — Part XVI — The Attack on the Autonomy of Free Software Carries on
  17. Microsoft GitHub Exposé — Part XVII — Backsliding Into 1990s-Style Digital Slavery by Microsoft
  18. Microsoft GitHub Exposé — Part XVIII — The Story of NPM
  19. Microsoft GitHub Exposé — Part XIX — The Collapse of Team Mono
  20. YOU ARE HERE ☞ Entering Phase II

GitHub: Where everything comes to die

Summary: We’re about to resume the long-running series about the sick clique which ran GitHub until the assault on women became too much of a liability (among other wrongdoings and PR blunders)

LAST year when we started this series (in wintertime) we said it would go on well into spring. Later we said summertime. We still have a lot of material, but we’re waiting for the strategic time prior to publication. Months ago we published the arrest record of Balabhadra (Alex) Graveley and soon afterwards we saw Miguel de Icaza leaving Microsoft, though Nat Friedman had left also. So a lot has changed since we started and we probably won’t comment on Friedman’s wife (nepotism). Privacy aspects outweigh public interest at this point.

“Months ago we published the arrest record of Balabhadra (Alex) Graveley and soon afterwards we saw Miguel de Icaza leaving Microsoft, though Nat Friedman had left also.”That series, however, will resume shortly. The Friedmans are still doing things and de Icaza isn’t really retired. It’s just scandals piling up, rendering them liabilities, even in Microsoft’s books.

So expect a lot more to come, many more parts (there might be over 30 in total) although bear in mind these will likely be published at a more strategic time. Team Mono has been ejected from Microsoft (Friedman, de Icaza, Graveley) and there’s a lot more to come regarding the overall strategy of GitHub. If you’re still using GitHub at any capacity, stop now. It’s never “too late” to leave.

“If you’re still using GitHub at any capacity, stop now. It’s never “too late” to leave.”Friedman’s departure spared him and his wife lot of public embarrassment. “This is Nat Friedman’s high school,” a source recently told us. “Boarding school outside of DC; his father was not always a stockbroker…”

Further, the source told me: “I have noticed there is a pattern of switching back-and-forth between the intelligence community and finance…”

Nat Friedman has some ‘spooky’ — as in surveillance — patents, as noted much earlier in our series (yes, those were software patents), but that’s not the important point. As noted in Part 18, there’s a lot of overlap between GitHub and the NSA. This, in turn, relates to a lot of FUD we’ve seen in the media lately, seeking to portray the “Open Source” so-called “supply chain” as the real issue, not the back doors found in the most commonly used proprietary software. And a lot of this “supply chain” is Microsoft (NPM, GitHub etc.) so the finger should be pointing not at victims or attackers but the party transmitting the malware. Microsoft facilitates the security breaches. It’s the essential bridge.

“This, in turn, relates to a lot of FUD we’ve seen in the media lately, seeking to portray the “Open Source” so-called “supply chain” as the real issue, not the back doors found in the most commonly used proprietary software.”A source has further suggested that we “should consider looking into the Stripe mafia bolt thing.”

Incidentally, Stripe provides similar services to those offered by Sheela Zemlin (Bakkt, ‘first lady’ of Linux Foundation, a GitHub outsourcer), also sponsored by Microsoft.

“All comes back to Nat Friedman,” the sourced noted, naming the culpability of YCombinator (so-called ‘Hacker’ so-called ‘News’), which Graveley too was involved with, not to mention Gab’s founder Andrew Torba and the disgraced chief. Graveley is very likely going to spend some very long time in prison, not corporate life, so his dad would be spared the embarrassment (albeit he too is connected to the military).

Links 24/05/2022: Fedora 37 Test Days and Tor Browser 11.0.13

Posted in News Roundup at 7:45 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Applications

      • Collision: Linux App to Verify Checksum of Files [Tutorial and Guide]

        A review and usage guide of the Linux App Collision which helps you to verify integrity of files (such as ISO, etc.) via hashes.

      • MedevelVirtue-Vice is an open-source web-based Habit Tracker

        Virtue-Vice is a web application that allows users to track their habits. Users can specify how many times each day, on which days, upload a personal image, and also indicate whether or not the app should send out push notifications at certain times for a habit.

      • Medeveldijo is an open-source Habit tracker for hackers

        dijo is an open-source lightweight habit tracker package written in the Rust programming language. It features a unique terminal-based interface (Curses).

        dijo is a habit tracker. It is curses-based, it runs in your terminal. dijo is scriptable, hook it up with external programs to track events without moving a finger. dijo is modal, much like a certain text editor.

      • MedevelXODA is a Web-based DMS file manager

        XODA is a free web-based self-hosted file manager that helps you store, organize and manage your files on your own server.

        The app is built using PHP, HTML5 and JavaScript. Although, it published since 2007, it has dozens of devoted users who are still using it.

        Unlike other solutions which make a use of extensive database, XODA uses a flat-file to store its data, so it does not require any external database like MySQL or PostgreSQL.

      • MedevelJarvis is your open-source personal assistant

        Jarvis is a free, open-source personal voice assistant that takes your commands and turn them into actions. It also allows you to create and train new skills.

        Jarvis package is written using Python, and it comes with developer-friendly API and documentation.

        Unlike its competitors, Jarvis does not have a complex setup or configuration. You can get it up and running in no time.

    • Instructionals/Technical

      • Deploying Node.js Apps to a Kubernetes Cluster – Container Journal

        Node.js is a popular, open source development platform that lets you run JavaScript code on the server side. Node is useful for developing applications that require a persistent connection from the browser to the server and is often used for real-time applications and single-page applications.

        Node.js runs on a dedicated HTTP server and is designed to use a single thread in one process at a time. Node.js applications are event-driven and calls are asynchronous by default. Node.js applications do not follow the traditional process of receiving a request, processing it and returning a response. Instead, Node uses an event stack to handle incoming requests, pooling requests and dispatching them one after the other without waiting for a response.

      • Red Hat OfficialHow to switch between the CLI and GUI on a Linux server | Enable Sysadmin

        What do you do if your server boots to a graphical user interface (GUI), but you need it to boot to the command-line interface (CLI) for security and performance reasons? In days past, you would have edited the /etc/fstab file so that, instead of booting to runlevel 5 (the GUI), it booted to runlevel 3 (the CLI). However, with the advent of the systemd system manager, you must do something a bit different.

      • H2S MediaHow to Install Ghost CMS on Ubuntu 22.04 LTS Jammy – Linux Shout

        Learn the commands to install Ghost CMS on Ubuntu 22.04 LTS Jammy JellyFish using the command terminal for hosting your blog.

        Ghost is an open-source content management system that has evolved from a pure blog system to a professional publishing software with a built-in subscription and membership portal. Ghost’s technology stack was new and sensational at the time of its creation: With Node.js as the server-side language, Ember.js for the admin interface, and handlebars.js as a template language, Ghost relies entirely on JavaScript, while the storage of data with a MySQL database follows comparatively traditional patterns. Meanwhile, server-side JavaScript is widely used in the developer scene, but even today it is still true that most mainstream hosters do not offer node.js in their standard offers.

      • How to install GTKMM 4 on Ubuntu 22.04

        gtkmm-4.0 has several new improvements and features.

      • H2S MediaHow to Install WordPress on Ubuntu 22.04 LTS Server – Linux Shout

        Learn the steps to install WordPress CMS on Ubuntu 22.04 LTS Jammy JellyFish using LAMP server- Apache, MariaDB, and PHP.

        If you want to run your blog, you will quickly come across WordPress software. What WordPress is and what possibilities it offers, we will tell you in this practical tip.

        WordPress is the world’s most popular software that allows you to create a website. The special thing about it is that you have an innovative interface at your disposal.

      • Red HatCreate AWS resources with Kubernetes and Operators | Red Hat Developer

        This second article in a series shows how to create AWS services and interact with them via Operators. See how it works.

      • How To Install Linux Kernel 5.18 On Rocky Linux 8 / AlmaLinux 8 / Fedora 36 | Tips On UNIX

        Linus Torvalds announced the Linux Kernel 5.18 after a few weeks of development and it is available for general usage. Linux Kernel 5.18 was released with new features and support.

        This tutorial will be helpful for beginners to install Linux kernel 5.18 on Rocky Linux 8, AlmaLinux 8, and Fedora 36.

      • Linux Shell TipsHow to Split Large Text File into Multiple *.txt Files

        As we have mentioned numerous times in the earlier article covered; whether directly or indirectly, it remains a valid statement that the computing depth of a Linux operating system cannot be matched with the strides of other operating systems.

        Its open-source nature creates an unseen level of transparency for the end-users. While other operating systems provide the start button for baking a cake, Linux allows us to play with the cake ingredients as we move towards the final product.

        This article will seek to explore the visible Linux-oriented steps for splitting a large text file into multiple smaller text files. This tutorial falls under the Linux file management segment.

    • Games

      • Godot EngineGodot Engine – Release candidate: 3.5 RC 2

        The upcoming Godot 3.5 is now considered feature complete, and has received a lot of bugfixes and improvements over the past weeks thanks to all the testers and developers who reported and fixed issues. It’s now time to move to the Release Candidate stage so that we can release 3.5-stable for all users.

        At this stage we need people to test this release (and potential follow-up RCs) on as many codebases as possible, to make sure that we catch non-obvious regressions that might have gone unnoticed until now. If you run into any issue, please make sure to report it on GitHub so that we can know about it and fix it!

  • Distributions and Operating Systems

    • Fedora Family / IBM

      • Fedora ProjectCall for F37 Test Days – Fedora Community Blog

        It’s time to start thinking about Test Days for Fedora Linux 37. A Test Day is an event aimed getting together interested users and developers to test a specific feature or area of the distribution. You can run a Test Day on just about anything for which it would be useful to do some fairly focused testing in ‘real time’ with a group of testers; it doesn’t have to be code. For instance, we often run Test Days for l10n/i18n topics. For more information on Test Days, see the wiki.

      • Enterprisers ProjectManaged cloud services: 4 things IT leaders should know

        The first thing to know about managed cloud services? It would certainly help to define the term as a starting point.

        “In today’s environment, cloud managed services is a broad topic,” says Kaushik De, VP, cloud center of excellence, Capgemini Americas.

        At some point in the not-so-distant past, a “cloud managed service” probably referred to something straightforward like paying a cloud provider to manage some VMs for you instead of running them yourself in your own datacenter. Buying compute or storage from a cloud provider is still a core use case, but it has been joined by a much broader set of tools and services.

        “Previously, cloud managed services were mostly centered around infrastructure services,” De says. “This has shifted to include new complexities, meaning that the enterprises must now consider first what they need out of their cloud services.”

        A managed cloud service today could be anything from a fully managed service for building and training machine-learning models to a fully managed container platform.

      • Enterprisers ProjectIT decision-makers are prioritizing digital transformation

        That was one of the topics we probed in interviews conducted by Frost and Sullivan with IT business executives from organizations with more than 1,000 employees globally. They represented companies in manufacturing, energy, and utilities split between North America, Germany, China, and India.

        The executives used a variety of words to describe their top priorities: automation, Internet of Things (IoT), edge computing, and cloud infrastructure. They called out digital transformation by name as well. But all of these top initiatives are associated with technologies that companies often adopt when they say they’re digitally transforming (although it’s important to note that digital transformation isn’t just about implementing new technologies; process and even culture change matter too).

      • Red HatManaged Kafka services: Which is right for you? | Red Hat Developer

        This article is the second in a two-part series describing the many ways to run Apache Kafka and the benefits of each. The first article covered distributions for local development and self-managed Kafka. This article talks about Kafka as a Service and “serverless-like” Kafka. We’ll conclude with guidance on when you should use each type of distribution.

      • OpenSource.comBuild a Quarkus reactive application using Kubernetes Secrets | Opensource.com

        Many organizations have security policies in place that dictate how to store sensitive information. When you’re developing applications for the cloud, you’re probably expected to follow those policies, and to do that you often have to externalize your data storage. Kubernetes has a built-in system to access external secrets, and learning to use that is key to a safe cloud-native app.

        In this article, I’m going to demonstrate how to build a Quarkus reactive application with externalized sensitive information—for instance, a password or token—using Kubernetes Secrets. A secret is a good example of how cloud platforms can secure applications by removing sensitive data from your static code. Note that you can find a solution to this tutorial in this GitHub repository.

    • Debian Family

      • [Older] Kali Linux 2022.2 Released With 10 New Tools and Other Enhancements

        Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security. The developers of Kali Linux have released the latest version of the penetration-testing-and-security focused distribution, Kali Linux 2022.2.

        According to their official blog post, this release has various impressive updates.

      • Sven Luther, Lucy Wayland & Debian’s toxic culture

        The key thing to note is that Sven Luther announced he was going to resign. For fifteen years now the fascists have been telling the world that Sven Luther was the first person expelled from Debian but the truth is he resigned.

        Debianism is a horrible smear on the reputation of Sven Luther.

        This is why independent sites like the Debian Community News are so vital. We stand with Sven Luther and Lucy Wayland, do you?

        In their legal dossier, Debian admits that Lucy Wayland had expressed suicidal thoughts. Imagine how Lucy would feel reading through the emails savaging Sven’s reputation. Would it give Lucy confidence or would it give her more anxiety? Who wouldn’t reach for a very stiff drink after reading through these lynchings?

    • Devices/Embedded

      • CNX SoftwareDongShanPi One – A SigmaStar SSD202D system-on-module with a mini PCIe edge connector for GPIO, Ethernet… – CNX Software

        DongShanPi One system-on-module features SigmaStar SSD202D Arm Cortex-A7 processor with 128MB on-chip RAM, a 128MB NAND SPI flash and a microSD card slot, an LCD interface, two USB Type-C ports, and a mini PCIe edge connector that exposes interfaces like Ethernet, USB, and GPIOs when connected to a baseboard.

        I noticed the module in Linux 5.18 changelog yesterday together with the Miyoo game console, with support being added by dgp (Daniel Palmer), a frequent commenter on CNX Software, who also happen to maintain the linux-chenxing community. The DongShanPi One is optionally offered with a baseboard equipped with an RJ45 port, four USB ports, an IR receiver, and plenty of GPIO headers for expansion.

    • Open Hardware/Modding

      • HackadayVintage Pro Audio Hack Chat

        Join us on Wednesday, May 25 at noon Pacific for the Vintage Audio Hack Chat with Frank Olson!

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Mozilla

        • TorNew Release: Tor Browser 11.0.13

          Tor Browser 11.0.13 is now available from the Tor Browser download page and also from our distribution directory.

          This version includes important security updates to Firefox.

    • Programming/Development

      • Trend OceansTop 5 Laptops for Programmers in 2022 [Ed: No, Apple MacBook is not for programmers but for fools who love wasting money on brands without substance]

        As a programmer, choosing a laptop is an important decision to make. With the rise of the gig economy, many programmers are now working on their laptops remotely. This means that your laptop should handle all of your needs as a programmer.

      • QtCompiling QML to C++: Making types visible

        This is the third installment in the series of blog posts on how to adjust your QML application to take the maximum advantage of qmlsc. In the first post we’ve set up the environment. You should read that post first in order to understand the others. In the second post I’ve shown how to add type annotations to JavaScript functions. Now we need to make sure that all types we want to use in QML are visible at compile time.

      • QtQt Creator 7.0.2 released

        We are happy to announce the release of Qt Creator 7.0.2!

      • I ProgrammerC++20 for Programmers 3rd Ed (Pearson)

        Subtitled “An Objects-Natural Approach”, this book has been written for programmers with a background in another high-level language. Paul and Harvey Deitel look at modern C++ development hands on using C++20 and its “Big Four” features – Ranges, Concepts, Modules and Coroutines.

  • Leftovers

    • Science

      • HackadayEuropean Roads See First Zero-Occupancy Autonomous Journey

        We write a lot about self-driving vehicles here at Hackaday, but it’s fair to say that most of the limelight has fallen upon large and well-known technology companies on the west coast of the USA. It’s worth drawing attention to other parts of the world where just as much research has gone into autonomous transport, and on that note there’s an interesting milestone from Europe. The British company Oxbotica has successfully made the first zero-occupancy on-road journey in Europe, on a public road in Oxford, UK.

    • Hardware

      • HackadayFighting Back Against Dodgy Dyson Batteries

        If you’ve ever worked with multi-cell rechargeable battery packs, you know that the individual cells will eventually become imbalanced. To keep the pack working optimally, each cell needs to be analyzed and charged individually — which is why RC style battery packs have a dedicated balance connector. So if you know it, and we know it, why doesn’t Dyson know it?

      • HackadayHackaday Prize 2022: Glue-Hindered Smart Tweezer Repair Involves A Rebuild

        [Dan Julio] owns a pair of Miniware multimeter tweezers, a nifty helper tool for all things SMD exploration. One day, he found them broken – unable to recognize any component between the two probes. He thought it could be a broken connection problem, and decided to take them apart. Presence of some screws on their case fooled him – in the end, it turned out that the case was glued together, and could only be opened destructively. For an entry in the “Reuse, Recycle, Revamp” round of 2022 Hackaday Prize, he tells us how he brought these tweezers back from the dead.

      • The Register UKLeica and Huawei terminate trading agreement amid US sanctions

        Huawei’s long established trading relationship with Leica to integrate the German camera maker’s technology into its phones is over, the companies have confirmed.

        From February 2016, all Huawei flagships were slated [PDF] to have Leica-developed lenses and branding.

        The Reg was generally quite impressed by the combined products over the years.

        But alas, Huawei’s smartphone sales started to tumble thanks to US sanctions on the company starting in 2019, and the relationship with Leica was itself brought to a halt on March 31, 2022, the pair confirmed.

    • Health/Nutrition/Agriculture

      • Common DreamsWHO Chief Warns Humanity Lowers Guard Against Covid-19 ‘At Our Peril’

        The head of the World Health Organization said Sunday that the Covid-19 pandemic is “most certainly not over” as he urged continued vigilance against the virus blamed for as many as 15 million excess deaths worldwide.

        WHO Director-General Tedros Adhanom Ghebreyesus’ remarks were delivered in Geneva where global delegates gathered for the annual meeting of the World Health Assembly—the health agency’s decision-making body.

      • ShadowproofDespite Worsening Opioid Crisis, Many Jails And Prisons Remain Opposed To Treatment Medications

        When a 51-year-old man entered New York’s Jefferson County Jail in December 2021, he brought his medication with him. R.G., as he is referred to in court documents, knew that without his medicine, he would quickly enter into an excruciating withdrawal. 

        His doctor had prescribed him Suboxone, which is a medication for treating opioid use disorder that is approved by the Food and Drug Administration (FDA). But R.G. said jail staff refused to let him take it.

      • Common DreamsCampaign Launches ‘Summer of Action’ to Protect Medicare From Stealth Privatization

        Senior citizens, doctors, progressive lawmakers, and activists gathered virtually on Monday to launch a “summer of action” to prevent the back-door privatization of traditional Medicare.

        “If Wall Street firms are allowed to make decisions about your healthcare, their profits will always come first.”

    • Proprietary

      • The Register UKBroadcom to buy VMware on Thursday for ‘$60 billion’ • The Register

        Broadcom is to acquire VMware for $60 billion in a deal that will be announced on Thursday.

        That’s according to the Wall Street Journal. VMware is scheduled to report its Q1 2023 results on the same day, so the Thursday announcement theory is not entirely unrealistic.

      • Its FOSSWoah! Broadcom Could Acquire VMware for $60 Billion

        Broadcom, a semiconductor chip company, is infamous among desktop Linux users for the incompatibility issues with its wireless adapter/card and drivers.

        And, it is now planning to get into the cloud computing market by acquiring one of the biggest players in the industry, i.e., VMware.

      • The Register UKSafari is crippling the mobile market, and we never noticed • The Register

        You’d be forgiven for remembering a much earlier monopoly browser decision, that of Microsoft’s bundling of Internet Explorer with Windows. The courts alleged that was (US v Microsoft Corp) that illegal and Microsoft finally settled in 2001, nine years after antitrust investigations had started into the company. Not that it made much difference, with only one update to Internet Explorer in the next four years due to lack of competition. As the web went wild, browser innovation stalled.

    • Security

      • The Register UK381,000-plus Kubernetes API servers exposed to the internet • The Register

        Nonprofit security organization The Shadowserver Foundation recently scanned 454,729 systems hosting the popular open-source platform for managing and orchestrating containers, finding that more than 381,645 – or about 84 percent – are accessible via the internet to varying degrees thus providing a cracked door into a corporate network.

      • The Register UKIt’s 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017 [Ed: "Microsoft" and "Windows" conspicuously absent from the headline]

        HP’s cybersecurity folks have uncovered an email campaign that ticks all the boxes: messages with a PDF attached that embeds a Word document that upon opening infects the victim’s Windows PC with malware by exploiting a four-year-old code-execution vulnerability in Microsoft Office.

        Booby-trapping a PDF with a malicious Word document goes against the norm of the past 10 years, according to the HP Wolf Security researchers. For a decade, miscreants have preferred Office file formats, such as Word and Excel, to deliver malicious code rather than PDFs, as users are more used to getting and opening .docx and .xlsx files. About 45 percent of malware stopped by HP’s threat intelligence team in the first quarter of the year leveraged Office formats.

      • MedevelSelfPrivacy: Get your own private secure [server]

        Selfprivacy is a free, open-source user-hosted cloud that helps you manage all of your sensitive data in one platform.

        The project is initiated by Kirill Zholnay, a software engineer and a security expert, who manages to create a strong community to pack it and keep it maintained and secure.

        With the Selfprivacy you can manage your emails, chat messages, passwords, files, video conversations, git, and a built-in VPN.

        SelfPrivacy is developed on the “zero trust” principle, even in relation to SelfPrivacy developers. That means you’re the sole owner of your data.

      • Privacy/Surveillance

        • EFFData Brokers and True the Vote are the Real Villains of “2000 Mules” Movie

          In its attempt to demonstrate widespread fraud in the 2020 presidential election, 2000 Mules presents the research of True the Vote (TTV). TTV reportedly purchased 10 trillion geolocation data points from an unnamed data broker with the goal of finding a pattern of so-called “mules” that stuffed ballot boxes. The researchers claim that of the hundreds of thousands of people described in the location data, they found thousands of people who were physically present near two kinds of places – ballot boxes and unnamed nonprofits – and that this shows they were “mules.” (The actual number of people whose data was purchased may be much larger—a report by TTV claims the organization collected data from over 500,000 phones near ballot boxes in Atlanta, which is just a fraction of the total data they acquired.)

          This business model of making extremely sensitive location data about the general public readily available for purchase must stop

          Putting aside the logical flaws of TTV’s voter fraud claims, the very fact that they were able to buy this much personal location data on hundreds of thousands of people’s lives, over a span of many months leading to election day, is appalling. But this is the data broker business model working as intended: by vacuuming up geolocation data from thousands of smartphone apps, data brokers package and sell huge quantities of highly revealing location data to anyone willing to buy it. And TTV is hardly the only customer: the U.S. military, federal agencies, and federal law enforcement are all customers to geolocation data brokers. Recently, one data broker was even found selling the location data of people seeking reproductive healthcare, which soon could provide states with draconian anti-abortion legislation new digital evidence to identify and prosecute people who seek or provide abortion.

        • PIAHow to Password Protect ZIP Files (Fast & Safe)

          Regardless of how you use ZIP files, you should be aware of the risks. The format is convenient, but it’s not immune to the issues any shared file faces (especially on communal computers or cloud accounts). Cybercriminals and general snoops can still manipulate archived files, so it’s a good idea to add an extra layer of security. 

        • The Register UKNow Amazon puts ‘creepy’ AI cameras in UK delivery vans

          Amazon is reportedly installing AI-powered cameras in delivery vans to keep tabs on its drivers in the UK.

          The technology was first deployed, with numerous errors that reportedly denied drivers’ bonuses after malfunctions, in the US. Last year, the internet giant produced a corporate video detailing how the cameras monitor drivers’ driving behavior for safety reasons. The same system is now apparently being rolled out to vehicles in the UK.

          Multiple camera lenses are placed under the front mirror. One is directed at the person behind the wheel, one is facing the road, and two are located on either side to provide a wider view. The cameras are monitored by software built by Netradyne, a computer-vision startup focused on driver safety. This code uses machine-learning algorithms to figure out what’s going on in and around the vehicle.

        • The Register UKGoogle picks business chiefs for European Advisory Board • The Register

          Google has established a European Advisory Board for Google Cloud made up of executives drawn from across industry in the region.

          The move comes just weeks after the internet giant announced data sovereignty controls for its Google Workspace service to address the concerns of EU organizations.

          According to Google, the European Advisory Board has been set up to help Google Cloud improve the value and experience it can deliver for customers in Europe. As the board is made up of “accomplished leaders” from across industry, it will serve as an important feedback channel for ensuring Google’s cloud-based products and services meet European requirements.

    • Defence/Aggression

      • ScheerpostWomen of the World Call for Peace

        These women are all leading in a new way, showing us a pathway forward to peace and disarmament. They are calling on us to awaken and join together to eliminate nuclear weapons from the face of the Earth.

      • TruthOutThe Drug War Drives Exploitation. We Need Drug Regulation, Not Criminalization.
      • Common Dreams‘Truly Dangerous’: Biden Vows US Military Response If China Invades Taiwan

        Critics of U.S. imperialism sounded the alarm Monday after President Joe Biden said that he would use military force in response to a Chinese invasion of Taiwan.

        “That’s the commitment we made,” Biden said at a press conference held jointly with Japanese Prime Minister Fumio Kishida during a visit to Tokyo, abandoning the “strategic ambiguity” that U.S. presidents have long maintained to obscure how far Washington would go to protect Taiwan, which China considers part of its territory.

      • Common DreamsOpinion | George W. Bush Is Not Even a Little Bit Funny

        Everyone has by now heard about the latest gaffe by former United States president and unconvicted war criminal George W Bush, father of the 2003 US invasion of Iraq and other fantastically bloody escapades.

      • Common DreamsOpinion | The Permanent War Economy

        The United States, as the near unanimous vote to provide nearly $40 billion in aid to Ukraine illustrates, is trapped in the death spiral of unchecked militarism. No high speed trains. No universal health care. No viable Covid relief program. No respite from 8.3 percent inflation. No infrastructure programs to repair decaying roads and bridges, which require $41.8 billion to fix the 43,586 structurally deficient bridges, on average 68 years old. No forgiveness of $1.7 trillion in student debt. No addressing income inequality. No program to feed the 17 million children who go to bed each night hungry. No rational gun control or curbing of the epidemic of nihilistic violence and mass shootings. No help for the 100,000 Americans who die each year of drug overdoses. No minimum wage of $15 an hour to counter 44 years of wage stagnation. No respite from gas prices that are projected to hit $6 a gallon.

      • Project CensoredSwedish “Neutrality,” Issues With NATO, and Oil Politics Featuring Farida al-Abani and Charlotte Dennett – The Project Censored Show

        Notes: Born in Libya, Farida al-Abani was brought to Sweden at an early age, grew up there, and became a leader in the Feminist Initiative party. Charlotte Dennett is an attorney and author, and the daughter of a US intelligence official who died while on assignment in the Middle East just after WWII. Her previous books include The People vs. Bush and Thy Will be Done. The Conquest of the Amazon: Nelson Rockefeller and Evangelism in the Age of Oil with Gerard Colby.

      • TruthOutNew Laws Make It Hard for Some Educators to Discuss Buffalo Shooting in Class
      • Death Wish

        Ever since Columbine, there have been copycats and school shooter wannabes. On the other hand, there are surely those who fantasize about springing into action in such a tragedy by making the ultimate sacrifice, covering the line of fire to others with their bodies and hopefully taking the killers with them.


        You are not really American if you do not own a gun and the fundamental acknowledgement gun ownership implicitly entails. This is not even the higher bar of owning a gun and knowing how to work it much less being able to defend yourself with it. The police cannot be relied upon. Despite all the denial, a state of acceptance regarding the concept of gun violence is an American thing. It’s just that people prefer to choose willful ignorance and naivete rather than confrontation of uncomfortable topics like the fact a gun is necessary for self-defense until the 2020 summer of love made for a rude awakening.

    • Environment

      • TruthOutClimate-Conscious Voters Have Toppled Australia’s Right-Wing Prime Minister
      • Democracy NowGreenslide: Climate Crisis Spurs Green-Labor Win in Australian Election Over Pro-Coal, Right-Wing PM

        In what is being described as a “greenslide,” voters in Australia topple the prime minister, ending nearly a decade of conservative rule. The main issue? Climate change. Voters elected Anthony Albanese of the center-left Labor Party as their new prime minister on Saturday, ousting the right-wing, pro-coal Scott Morrison, who had served as Australia’s prime minister since 2018. The Labor Party won the most seats in Parliament, and voters overwhelmingly backed candidates pushing for stronger climate action. “We have lived through the most catastrophic climate in Australia since the last election,” says Australian climate scientist and activist Tim Flannery, who describes a wave of climate-fueled fires, floods and drought under the rule of right-wing, pro-coal Morrison. “Climate is the most important issue this last election,” in part “because of the catastrophic impacts we’ve seen in Australia since the previous election just three years ago,” says Flannery.

      • The NationAmerica’s Largest, Most Neglected Machine Could Be the Key to Radical Climate Activism

        The planet’s largest yet most overlooked machine, astounding, complex, and neglected as it is, doesn’t usually present as a particularly captivating subject, let alone as a site of revolutionary change.

      • Common DreamsGreenhouse Gases Trapped Nearly 50% More Heat Last Year Than in 1990: NOAA

        An annual assessment released Monday by a U.S. agency underscored the need to dramatically cut planet-warming pollution with a notable revelation about heat-trapping gases over the past three decades.

        “Eliminating CO2 pollution has to be front and center in any efforts to deal with climate change.”

      • Energy

        • Common DreamsOil Giant Consultant Resigns, Citing Operations Beyond ‘Limits of Our Planetary Systems’

          A long-time Shell consultant based in the United Kingdom quit with a bang on Monday, condemning the fossil fuel giant for its dangerous efforts to expand oil and gas production despite numerous scientific warnings about the need for swift decarbonization to avert climate disaster.

          “Shell’s stated safety ambition is to ‘do no harm,’” Caroline Dennett, who worked with the company for 11 years as a senior safety consultant, said in a video shared on LinkedIn, which echoed points made in a resignation letter she emailed to CEO Ben Van Beurden and 1,400 employees.

        • TruthOutElectric Cars and Lithium Extraction Threaten to Drive Even More Climate Harm
        • The NationWhat if the Wind and Sunshine Really Belonged to All of Us?

          There are old and new ways of promoting renewable energy. The difference does not center on the speed or scale of technological shifts. Certainly, we need—in Alexandria Ocasio-Cortez’s felicitous phrase—“a solution at the scale of the crisis.” We also need solutions at the scale of the resources. That is the difference: Free-flowing wind and sunlight allow for a far more democratic energy system than fossil fuels ever have. Let’s not miss that opportunity.

    • Finance

      • ScheerpostHedges: No Way Out but War

        The permanent war economy, implanted since the end of World War II, has destroyed the private economy, bankrupted the nation, and squandered trillions of dollars of taxpayer money. The monopolization of capital by the military has driven the US debt to $30 trillion.

      • Common DreamsTax Billionaire Wealth and Pandemic Profits, Says Oxfam, to End ‘Inequality That Literally Kills’

        In the shadow of the Davos summit of global elites taking place this week, a new report from Oxfam International details how skyrocketing inequality during two years of the global Covid-19 pandemic surged to a point where a new billionaire was created in the world nearly every day while over one million people are now being pushed into poverty at almost the same daily rate.

        “The extremely rich and powerful are profiting from pain and suffering. This is unconscionable.”

      • The NationVivek Chibber on the Future of Marxist Thought

        The fundamental aim of Vivek Chibber’s latest book, The Class Matrix: Social Theory After the Cultural Turn, is to restore the central role that economic and structural forces play in studying the hierarchies of power and privilege in modern capitalism. This class-based understanding of social relations—one principally influenced by Marx, and which dominated leftist thought until the 1970s—gives pride of place to the material conditions that impose real constraints on people’s economic choices. Marx, Chibber explains, believed that such economic constraints would produce a working-class consciousness in which people engage in collective action centered on their economic interests, leading ultimately to revolution.

      • TruthOutOne Billionaire Has Been Created Every 30 Hours During Pandemic, Oxfam Says
      • TruthOutChild Hunger Has Skyrocketed Since Manchin, GOP Killed Expanded Child Tax Credit
      • The Register UKChina to promote platforms listing in overseas markets • The Register

        The Chinese government has announced that it will again allow “platform companies” – Beijing’s term for tech giants – to list on overseas stock markets, marking a loosening of restrictions on the sector.

        “Platform companies will be encouraged to list on domestic and overseas markets in accordance with laws and regulations,” announced premier Li Keqiang at an executive meeting of China’s State Council – a body akin to cabinet in the USA or parliamentary democracies.

    • AstroTurf/Lobbying/Politics

      • The NationIs Every Sentence a Life Sentence?

        A legal system capable of delivering justice fairly and equally is a cornerstone of a functioning democracy. But in the United States, some racial groups are more likely to run afoul of that system than others. Approximately 1.3 million Americans are currently incarcerated, a higher per capita rate than any other country. And while one in every 17 white men in the United States will be jailed at some point in their life, one in three Black men will suffer the same fate. Black and Hispanic men are also sentenced to longer jail terms than their white counterparts. For these reasons, Black people comprise the majority of prisoners in the United States despite being a minority in the population at large. This racial disparity is reflected in data from the National Longitudinal Survey of Youth (NLSY), a survey following almost 9,000 young Americans throughout their lives starting in 1997. Survey respondents are chosen so that the sample matches the demographic characteristics of the US population. Figure 1 shows NLSY respondents and their incarceration status as of the start of the year 2017; Black people are considerably overrepresented among those who had spent time in jail.1

      • Democracy Now“His Name Is George Floyd”: Two Years After Police Murder, His Life & the Struggle for Racial Justice

        This week marks the second anniversary of the police murder of George Floyd. We speak with Washington Post reporters Robert Samuels and Toluse Olorunnipa, who have just published an in-depth new book, “His Name Is George Floyd: One Man’s Life and the Struggle for Racial Justice,” that tells the story of structural racism in the U.S. through Floyd’s own story. “This is an American story. It shows how American poverty works, how American wealth works, and George Floyd was on the wrong side of the line because of the color of his skin,” says Olorunnipa. “He was living in a world where he was trying to get better, but there weren’t a lot of supports to do it,” says Samuels. “It’s important for us not to leave behind the millions of other George Floyds that are operating in silence, not getting the same attention, and who are experiencing some of the same struggles and troubles that he did during his life.”

      • TechdirtJudge Sanctions MyPillow CEO Mike Lindell For Wasting The Court’s Time

        Mike Lindell just used to be a guy selling overpriced pillows to people who liked to buy overpriced pillows. But when Donald Trump was elected, he threw his entire company under the Trump campaign bus, making it clear Lindell was willing to ride The Donald’s coat tails into relevance. What used to be just a pillow manufacturer was now The Preferred Pillow of the Far RightTM, a social cause tied to sleep — the ultimate form of slacktivism.

      • TruthOutTrumpist Perdue Seems Poised to Lose Georgia to Brian Kemp
      • The NationInsurrectionist Doug Mastriano Should Be Barred From the Pennsylvania Ballot

        Donald Trump’s choice for governor of Pennsylvania, state Senator Doug Mastriano, was affirmed last week by Republican primary voters who followed the former president’s order to nominate a candidate who actively sought to overturn the results of the 2020 presidential election.

      • Scheerpost‘Perverse’ Supreme Court Ruling ‘Effectively Ensures That Innocent People Will Remain Imprisoned’

        Legal experts responded with alarm Monday to a ruling from the U.S. Supreme Court’s right-wing majority that could lead to the indefinite imprisonment and even execution of people who argue their lawyers didn’t provide adequate representation after convictions in state court.

      • Common Dreams‘Perverse’ Supreme Court Ruling ‘Effectively Ensures That Innocent People Will Remain Imprisoned’

        Legal experts responded with alarm Monday to a ruling from the U.S. Supreme Court’s right-wing majority that could lead to the indefinite imprisonment and even execution of people who argue their lawyers didn’t provide adequate representation after convictions in state court.

        “The conservative majority is very much in the midst of a revolution. And it is a brutal one.”

      • TruthOutGinni Thomas Told Arizona Republican Lawmakers to Overturn 2020 Election Outcome
      • Common DreamsArizona, West Virginia Residents Risk Arrest to Demand End to Filibuster

        Pro-democracy campaigners in West Virginia and Arizona on Monday risked arrest at sit-ins in downtown Charleston and Tucson, demanding that Democratic Sens. Joe Manchin and Kyrsten Sinema end obstruction of their party’s agenda and allow the Senate to pass reproductive rights, climate action, and voting rights measures.

        Campaigners representing a coalition of groups including West Virginia Rising, For All, Democracy Initiative, and Progress Arizona blocked traffic in central areas of the two cities, accusing the two senators of “laying waste to our future.”

      • Common DreamsOpinion | How the FCC Can Protect Consumers From Unwanted Political Text Message Spam

        Have you been getting bombarded with unwanted political text messages on your personal cell phone? Have you noticed that opting out of these annoying messages leads to an endless game of whack-a-mole, such that replying “STOP” or “UNSUBSCRIBE” only causes you to receive similar messages from different phone numbers? It’s frustrating and unnerving and these messages are clogging a once spam-free gateway. It’s time for the Federal Communications Commission’s (FCC) new leadership to step in and put an end to the billions of unwanted political text message spam. 

      • Common DreamsOn Eve of Cisneros-Cuellar Showdown, Progressives Feel ‘Sense of Hope’

        Supporters of Jessica Cisneros’ bid to represent Texas’ 28th District are making their final pitches for the progressive challenger on Monday as they hope to prevent anti-choice Democrat Henry Cuellar from holding a 10th term.

        Cisneros and Cuellar will face off Tuesday in a runoff since neither candidate crossed the 50% threshold in March. It’s the second time Cisneros is up against Cuellar for the South Texas seat after her narrow loss in 2020.

      • EFFPodcast Episode: Securing the Vote

        Technology can provide answers – but that doesn’t mean moving elections online. As president and CEO of the nonpartisan nonprofit Verified Voting, Pamela Smith helps lead the national fight to balance ballot accessibility with ballot security by advocating for paper trails, audits, and transparency wherever and however Americans cast votes.

        On this episode of How to Fix the Internet, Pamela Smith joins EFF’s Cindy Cohn and Danny O’Brien to discuss hope for the future of democracy and the technology and best practices that will get us there.

      • Common DreamsOpinion | Constantly on the Verge of Collapse: How Palestinians Became a Factor in Israeli Politics

        Israel’s coalition government of right-wing Prime Minister Naftali Bennett is on the verge of collapse, which is unsurprising. Israeli politics, after all, is among the most fractious in the world, and this particular coalition was born out of the obsessive desire to dethrone Israel’s former leader, Benjamin Netanyahu.

      • Common DreamsIn ‘Staggering Milestone,’ Over 100 Million People Displaced Worldwide

        The number of people who have been forced to flee their homes has crossed 100 million for the first time in recorded history, the United Nations reported Monday, with the crisis driven largely by violent conflicts including the war in Ukraine.

        The U.N. Refugee Agency (UNHCR) said the world has reached a “staggering milestone” and called on global policymakers to alleviate the crisis by stopping its root causes, including political, religious, gender, and racial persecution; hunger; the climate crisis; and war.

      • The VergeJustice Department pledges not to charge security researchers with hacking crimes – The Verge

        The US Department of Justice says it won’t subject “good-faith security research” to charges under anti-hacking laws, acknowledging long-standing concerns around the Computer Fraud and Abuse Act (CFAA). Prosecutors must also avoid charging people for simply violating a website’s terms of service — including minor rule-breaking like embellishing a dating profile — or using a work-related computer for personal tasks.

      • Bruce SchneierThe Justice Department Will No Longer Charge Security Researchers with Criminal Hacking – Schneier on Security
      • The Register UKZuckerberg sued for alleged role in Cambridge Analytica data-slurp scandal

        Cambridge Analytica is back to haunt Mark Zuckerberg: Washington DC’s Attorney General filed a lawsuit today directly accusing the Meta CEO of personal involvement in the abuses that led to the data-slurping scandal.

        DC AG Karl Racine filed [PDF] the civil suit on Monday morning, saying his office’s investigations found ample evidence Zuck could be held responsible for that 2018 cluster-fsck. For those who’ve put it out of mind, UK-based Cambridge Analytica harvested tens of millions of people’s info via a third-party Facebook app, revealing a – at best – somewhat slipshod handling of netizens’ privacy by the US tech giant.

        That year, Racine sued Facebook, claiming the social network was well aware of the analytics firm’s antics yet failed to do anything meaningful until the data harvesting was covered by mainstream media. Facebook repeatedly stymied document production attempts, Racine claimed, and the paperwork it eventually handed over painted a trail he said led directly to Zuck.

    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

    • Internet Policy/Net Neutrality

      • HFNP: Details on the quasidomain system

        The previous post was rather a kind of an announcement, so while I mentioned the quasidomain system in the Hafnium Paging Protocol, I didn’t really get descriptive. I was asked for a complete explanation, so I decided that I should hurry up and write one down today.

        I will simply copy the relevant part of the previous port here and then go into the details.

    • Monopolies

      • AccessNowCivil society to Amazon: Terminate your contract to host dangerous U.S. DHS biometric database

        Today, Access Now, Immigrant Defense Project, Just Futures Law, and over 35 human rights organizations sent a letter to Amazon Web Services calling on the company to end its agreement to host the United States Department of Homeland Security’s (DHS) Homeland Advanced Recognition Technology (HART) database. The letter was sent in coordination with a protest to be held today outside Amazon’s annual Amazon Web Services (AWS) Summit against the corporation’s growing surveillance network, led by For Us Not Amazon, La ColectiVA, MediaJustice, and the Athena Coalition.

        According to a new report from Mijente, Just Futures Law, and the Immigrant Defense Project, HART Attack: How DHS’s Massive Biometric Database Will Supercharge Surveillance and Threaten Rights, DHS intends to use HART to collect vast amounts of biometric data within the U.S. and abroad, including facial recognition, DNA, iris scans, fingerprints, and voice prints. Anyone who seeks entry into the U.S., applies for immigration benefits, or is stopped by U.S. immigration authorities could have their biometric data stored in HART once it comes online.

      • Software Patents

        • Patentability of computer simulations concerning clean energy and energy management solutions [Ed: The mobsters who run the EPO have created loopholes for pursuing fake, invalid, bogus software patents; the courts there are deliberately rigged]

          Rising energy prices and a global climate crisis have led to an ever-increasing demand for lower cost clean energy solutions (such as solar energy, wind energy, tidal energy or the like). As a consequence, home energy storage solutions have become more widespread as they enable consumers to capitalise on lower energy tariffs whilst addressing problems related to the inherent supply variability of some forms of clean energy (for example, solar energy). For example, home energy storage solutions enable a consumer to store excess energy when it is produced (such as by solar panels during the day) for use at a later time (for example, at night). Alternatively, a consumer can sell surplus energy back to the electricity transmission network at times of peak network demand.

      • Trademarks

        • TechdirtFlying Dog Brewery Wins Against North Carolina On ‘Vulgar’ Beer Label Art

          Back in September we wrote about a lawsuit between Flying Dog Brewery and the state of North Carolina over the latter’s Alcohol Beverage Control Board (ABC Board) denying a beer label for use within the state. The ABC Board refused to certify the label for use on the grounds that it was vulgar and offensive, especially to minors. With that, Flying Dog couldn’t use the label at all, anywhere in North Carolina. Notably, every other state had allowed the label to be used. So what was so offensive that North Carolina had to take this stand? See for yourself.

      • Copyrights

Microsoft Vidal, as USPTO Director, Already Plays ‘Political Cards’ to Disguise and Deflect Away From the Corporate Agenda

Posted in America, Microsoft, Patents at 3:37 am by Dr. Roy Schestowitz

The diversity card is used heavily, but the large corporations get their way

USPTO PR image

Summary: Microsoft Vidal, another corporate pawn in charge of the world’s most dangerous patent system, is using soft-spoken deflection and PR tactics to disguise or distract from the real agenda of the Office

“Just got the e-mail from the U.S. Patent and Trademark Office (USPTO) wanting to include everybody,” told us a reader, “except if you use Linux or the postal service, of course.”

Here’s the mail:

USPTO spam

“The USPTO is absolutely rolling in money they get from inventors,” the reader added, “and they waste it by putting out this propaganda.”

“I took a look at the website (Inclusive innovation | USPTO), which doesn’t have a phone number, of course, but just an e-mail address for e-mails that will never be read. The website links to a Council for Inclusive Innovation page. Check out the members (Members of the Council for Inclusive Innovation | USPTO): IBM, Oracle, General Motors, etc.”

Links 24/05/2022: WAL-G 2.0

Posted in News Roundup at 3:12 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Hein-Pieter van BraamHP ZBook Fury 17.8 G8 As A Linux Workstation

        workstation. I go over my overall impressions, the Linux support, and the performance of the machine.

        As mentioned in a previous post, I bought this machine with the FreeDOS option. The OS I actually use day to day is Fedora Workstation and that is what this review is based on. When I initially got the machine I installed Fedora Workstation 35, in the meantime 36 has come out and that is what is currently installed on the laptop.

      • Andre Alves GarziaOn rants about laptops for developers

        The last couple decades we’ve gone from fighting to install Linux on a laptop to having multiple vendors focused on Linux laptops such as System76, Tuxedo Computers, Framework, and many others. Larger vendors have been offering Linux laptops for developers for a while as well. You can buy a Linux machine from Dell, Lenovo, and soon HP.

        This new announcement by HP should signal that the industry is kinda listening. That they’re accepting that at least the development audience wants good Linux machines, and are responding positively by launching specific SKUs. Still, what you see every time one of such laptops reach the news is a gazillion complaints. I’m not saying that the complaints are not valid, heck, one is free to complain about whatever they want. What bugs me is that there appears to be no winning scenario. There is no endgame for such complaints, I’m starting to believe that there is no way to make this audience truly happy. Or maybe rants get more engagement and people are ranting mostly to feel good.

    • Kernel Space

      • GamingOnLinuxLinux kernel 5.18 is out now

        Linus Torvalds has announced the release of the latest Linux kernel version 5.18, bringing with it the usual masses of improvements and new hardware support. Seems like it was a quiet one when it comes to releasing, with Torvalds jokingly calling it “boring old plain 5.18″.

    • Graphics Stack

      • GamingOnLinuxNVIDIA reveal a list of issues with their driver and Wayland

        While the situation has improved a little for NVIDIA and Wayland, they’re not really there yet and so NVIDIA are now keeping a public list of the issues split between drivers and either protocol or compositor limitations. This follows on from the huge splash they made recently with their new open source Linux GPU kernel modules, which also improved Wayland support a little too with the 515.43.04 driver that went up at the same time.

    • Applications

      • PostgreSQLPostgreSQL: WAL-G 2.0 released

        This release contains a huge amount of new features, bug fixes, and performance improvements. It is worth noting that v2.0 Postgres delta backups are not backward-compatible with the pre-2.0 versions. It means that the v2.0 delta backup can’t be restored with the v1.1 or earlier versions. Also, this release introduces the initial support for Greenplum physical backups.

        WAL-G for MySQL now supports the parallel backup-push/backup-fetch and has an optimized binlog upload mechanism. WAL-G for SQLServer now supports the backup encryption and compression as well as the external storage backup import/export.

    • Instructionals/Technical

      • OpenSource.com12 essential Linux commands for beginners

        When operating on the Linux command line, it is easy to get disoriented, which can have disastrous consequences. I once issued a remove command before realizing that I’d moved the boot directory of my computer. I learned to use the pwd command to know exactly which part of the file system I was in (and these days, there are command projects, like trashy and trash-cli, that serve as intermediates when removing files).

        When I was new to Linux, I had a cheat sheet that hung over my desk to help me remember those commands as I managed my Linux servers. It was called the 101 commands for Linux cheat sheet. As I became more familiar with these commands, I became more proficient with server administration.

        Here are 12 Linux commands I find most useful.

      • Chen HuiJingCSS animation on button hover state

        Recently, I came across an animation prototype on a button hover state and wanted to see if I could build it with just CSS. To explain in words, when you hovered over the pill-shaped button, the background changed from a plain white background to a nice coloured gradient, and there was a light sweep effect across the button.

        I have a standard approach to building any design with CSS, and that is to break things down into smaller bits. First, there’s the button itself when nobody is interacting with it. Then, there’s that gradient transition, and the final flourish is the light sweep effect.

      • How to Open a Terminal in Linux Mint
      • Linux Shell TipsHow to Send HTML Email Using Linux Command Line

        It is highly probable that all users of the internet have or are still using mailing platforms to communicate with one another from electronic gadgets like laptops. With a stable internet connection, Linux users on different Linux distributions can instantaneously send and receive electronic messages.

      • Linux Shell TipsHow to Fix “No Space Left on Device” Error on Linux

        One of the primary reasons why most users resort to Linux as their primary operating system is how specific it is with its error messages. Whether you are running an installation command for an application package or trying to configure something on the operating system environment, computing errors are bound to occur. Using a Linux OS ensures that you will always be pointed to a fixable cause of such errors.

        However, not all errors are straightforward. Some require a bit of technical expertise in order to solve them. This article will walk us through the “no space left on device” error and also evaluate possible solutions to fix it in Linux. We are bound to run into this error even if we are certain our Linux system has plenty of disk space left.

      • How to Upgrade from RHEL 8 to RHEL 9 Release

        Finally, the stable release of RHEL 9 has been released which has brought some of the major changes for better security, and usability, and with the same stability which you can expect from any release of RHEL.

        This guide will show you how you can easily upgrade from RHEL 8 to RHEL 9 with minimum effort and complexity involved. So let’s start with what the new release has to offer in the first place.

    • Games

      • GamingOnLinuxAn interview with Ken VanDine, Ubuntu desktop lead at Canonical

        Another fresh interview for you today, this time with Ken VanDine who is responsible for leading the way for Ubuntu on the desktop at Canonical. This will form part of a mini-series — the first already up with Aaron Honeycutt from System76.

      • GamingOnLinuxSteam Racing Fest is now live until May 30th with a mini-trivia game

        Valve has put up their latest little festival to grab some more games with the Steam Racing Fest. It also comes with a new Steam feature with a mini-trivia game. If you play their racing trivia game you can end up with one of those cool looking profile badges.

      • Bryan LundukeRemembering MUD1 – The first multiplayer role playing game on the Internet

        A member of the Lunduke Journal Community recently discovered the joy of MUDs (Multi-User Dungeons) — the on-line, multiplayer, text-based role playing games (typically played via the Telnet protocol).

        Which made me realize: The Lunduke Journal simply has not spent enough time talking about the joy of MUDs.

        To help rectify that, let’s take a little stroll back to the 1970s… as we explore the history of the very first MUD — and, in fact, the very first multiplayer, online role playing game on the Internet: MUD1

      • GamingOnLinuxThe official iFixit launch for Steam Deck parts and repair guides is live

        After a bit of an accidental early start that was taken down, iFixit have now actually properly launched their Steam Deck replacements parts and various guides for each part to fix or replace yourself.

      • GamingOnLinuxMeg’s Monster has you help a lost girl get home before she causes the apocalypse

        Well, this is quite a story. Meg’s Monster is the next and biggest game so far from developer Odencat, where you need to help a lost little girl get home. The problem is, she has some awesome power and might just cause some kind of monster apocalypse.

      • GamingOnLinuxBonfire Peaks – Lost Memories announced, plus Photo Mode update out

        Bonfire Peaks, one of the nicest puzzle games released in 2021 is getting an expansion in Lost Memories plus an update is out now with new features.

      • Linux Links10 Fun Free and Open Source Puzzle Games

        Linux has a prodigious library of free games many of which are released under an open source license. A large proportion of these open source games are eye catching. Popular games often have full motion video, vector graphics, 3D graphics, realistic 3D rendering, animation, texturing, a physics engine, and much more. Early computer games did not have these graphic techniques. The earliest video games were text games or text-based games that used text characters rather than vector or bitmapped graphics.

        The idiom ‘don’t judge a book by its cover’ can be extended to ‘don’t judge a computer game by its graphics’. Whilst many of the games featured in this article have unremarkable graphics, they have many redeeming qualities, including challenging gameplay, and stretching the brain.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Lichen

        Lichen is the simplest possible CMS for the web that is friendly enough for non-technical users. It is extremely lightweight.

    • Education

      • TorSysadmin 101 for (new) relay operators – June 4th @ 1900 UTC

        Join us June 4th at 1900 UTC for new and prospective Tor relay and bridge operators on the basic “sysadmin foo” required to contribute to the network!

        ## Sysadmin 101 for new relay operators

        So you want to contribute to the open-source Tor network by running a relay or maybe a bridge?

        The Tor network is the most important tool for evading surveillance and bypassing internet censorship. And Tor relays and bridges are vital to the health and integrity of the Tor network. Millions of users rely on relays and bridges to stay safe, and how you configure and maintain that relay or bridge is critical.

    • Programming/Development

      • [Old] Giving QR Codes Superpowers

        Once we’ve got our document, we can process it through the schema to recover the true meaning of the data.

        So there you have it: Supercharged QR codes that can hold arbitrary structured data! Neat!

      • Escaping a git merge hell

        Some time ago a colleague left my team, so I inherited the project he was working on. He was working on two big features at the same time in that project that was the result of collaboration with two other teams. He had two branches, one per feature, that were branched out of the main branch months ago and have significant changes in each of them, many of those changes on the same files. The task that he left before leaving was to integrate all that code back to master. There were all types of conflicts: files moved and/or renamed, different versions of dependencies, different competing changes on the same lines… This is where the merge hell started.

      • Waiting to never happen

        It seems to me that when people discuss functional programming, they spend much time discussing side effects and how to avoid them. Sometimes, they almost forget that non-deterministic behaviour is also something to avoid.

        On the other hand, we’ve known for a long time that we should eradicate non-determinism in tests. Martin Fowler’s article, however, mostly discusses false positives: Tests that fail even when no defect is manifest.

        Unit tests may also exhibit false negatives. This can happen for a variety of reason. In my article Tautological assertion I describe one example.

        The passing of time, however, has a tendency to introduce decay. This may apply to test suites as well. If a test or the System Under Test depends on the current time, a test may over time transition from a proper test to one that still passes, but for the wrong reason.

      • Shell/Bash/Zsh/Ksh

        • uni TorontoSome things that make languages easy (or not) to embed in Unix shell scripts

          Part of Unix shell scripting is that Unix has a number of little languages (and interpreters for them) that are commonly embedded in shell scripts to do various things. Shell scripts aren’t just written in the Bourne shell; they’re effectively written in the Bourne shell plus things like sed and awk, and later more things like Perl (the little language used by jq may in time become routine). However, not all languages become used on Unix this way, even if they’re interpreted and otherwise used for shell script like things. Recently it occurred to me that one factor in this is how embeddable the language is in a shell script.

  • Leftovers

    • Ogden words by length.

      There’s this minimal English vocab list out there called “Ogden’s English”, or something. You can look it up. Anyways, it’s like less than 900 words, just the important ones.

    • Counter PunchGive Turtles a Brake !
    • The NationBig Dog
    • EFFEscape from Zoom: EFF’s 6th Annual Tech Trivia Night Returns to Meatspace!

      After over two years of virtual meetings, EFF’s Cooper “Cybertiger” Quintin returned to the stage, live and in-person! Friends reunited, suspicions that all our coworkers were actually holograms were assuaged (for now), and the tacos were delicious. So, so, delicious.

      After some much needed comradery, the competition was on! Five teams put their tech know-how to the test, all vying for the chance to win an EFF prize pack, the new championship trophies, and perhaps most importantly, the bragging rights.

    • Hardware

      • HackadayMotorcycle Regulator By Popular Demand

        A few weeks ago we posted a build of an avid motorcycle enthusiast named [fvfilippetti] who created a voltage regulator essentially from the ground up. While this was a popular build, the regulator only works for a small subset of motorcycles. This had a large number of readers clamoring for a more common three-phase regulator as well. Normally we wouldn’t expect someone to drop everything they’re doing and start working on a brand new project based on the comments here, but that’s exactly what he’s done.

      • HackadayDitch The Laptop For The Tabletop

        The idea of a cyberdeck is simple. A relatively portable case that is primarily a keyboard with some screen attached. Cyberdecks often try to hit a particular aesthetic or vibe rather than focusing on usability or practicality. [Carter Hurd] took a step back and asked himself what would be a cyberdeck-like system that he could practically use every day.

    • Health/Nutrition/Agriculture

    • Proprietary

      • IT Professionals NZ Inc$20 million for the software sector. Is that it for Budget 2022?

        A focus on the fast-growing software as a service (SaaS) sector looks to comprise the Government’s tech-related spending in Budget 2022, with $20 million allocated to boosting SaaS companies and marketing Kiwi tech to the world.

    • Security

      • Dark ReadingMalicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems [Ed: When you install malware from untrusted sources and then the media blames the OS]
      • Pro PublicaWhy It’s Hard to Sanction Ransomware Groups [Ed: Bill Gates-bribed Pro Publica on Microsoft Windows destroying Ukraine]

        On Feb. 25, the day after Russia invaded Ukraine, a prolific ransomware gang called Conti made a proclamation on its dark web site. It was an unusually political statement for a cybercrime organization: Conti pledged its “full support of Russian government” and said it would use “all possible resources to strike back at the critical infrastructures” of Russia’s opponents.

        Perhaps sensing that such a public alliance with the regime of Russian President Vladimir Putin could cause problems, Conti tempered its declaration later that day. “We do not ally with any government and we condemn the ongoing war,” it wrote in a follow-up statement that nonetheless vowed retaliation against the United States if it used cyberwarfare to target “any Russian-speaking region of the world.”

      • Privacy/Surveillance

        • ViceAnonymous Social Media App Yik Yak Exposed Users’ Precise Locations

          The anonymous message board app Yik Yak is designed in a way that it is possible to get the precise location of a user’s post, and see users’ unique IDs, potentially allowing someone to dox and stalk users, according to a researcher.

        • Site36New EU information system: EU member states push for police use of biometric repository

          If the European „Entry/Exit System“ (EES) goes into operation as planned in four months, all travellers will have to provide fingerprints and facial images when crossing an EU external border. This database is now to be used increasingly by security authorities. The EU interior ministers want to adopt conclusions on this in the Council. The British civil rights organisation Statewatch has published a draft of these conclusions.

          The coveted data will be stored in a „Common Identity Repository“ (CIR), which, according to current plans, will be launched in a year’s time. The planned conclusions call on member states to enact laws allowing biometric searches, „in particular for the purpose of facilitating the correct identification of persons“.

      • Confidentiality

        • uni TorontoModern (public) TLS has only a limited number of intermediate certificates

          TLS certificates for servers are not normally signed directly by the Certificate Authority’s root certificate (for various good reasons); instead, they’re signed by an intermediate certificate that chains up to the CA’s root certificate (in modern usage, there generally is only one intermediate certificate between the server certificate and the CA’s root certificate). In theory the server is supposed to send the intermediate certificate with its own certificate in a certificate chain, but in practice servers don’t always send intermediate certificates and this can cause mysterious problems.

    • Defence/Aggression

      • Meduza‘The monks’ prayers are an anti-aircraft defense system’ The story of four young Kharkiv residents who have been living in a monastery since the war began

        On February 23, four members of an Orthodox youth movement in Kharkiv set out on a four-day pilgrimage. Their plan was to return home on February 28. At 5:00 a.m on February 24, they got off their train in Kyiv and learned that Russia’s invasion had begun. Ever since then, they’ve been living in a Ukrainian Orthodox monastery in the Kyiv region. Some of them have nowhere else to go because their homes have been destroyed; others have made the decision not to leave for religious reasons. Meduza asked Iryna, a journalist from Kyiv who found herself living in the same monastery, to write about the new lives these young people are building in the monastery.

      • MeduzaRussian soldier Vadim Shishimarin sentenced to life in prison for killing a Ukrainian civilian

        A court in Kyiv has sentenced Russian soldier Vadim Shishimarin to life imprisonment for killing 62-year-old civilian Oleksandr Shelipov in Ukraine’s northeastern Sumy region.

      • Counter PunchRussia, NATO and the Future of Neutrality

        Switzerland made non-alignment look almost sexy, with its ski resorts, excellent chocolates, and secure banking system. Then there was Sweden, which refused to join NATO or subordinate its military policy to Moscow, offering instead to broker peaceful compromises between east and west as well as north and south. Austria, divided into four occupation zones after World War II just like Germany, embraced neutrality as the last foreign troops exited the country in 1955. It has sent peacekeepers around the world and offered Vienna as a neutral place for negotiations, like the ones that produced the Iran nuclear deal.

        During the Cold War, non-alignment emerged as a third path between Soviet-style communism and American-style capitalism, between two nuclear superpowers, between a poorly delineated East and West. So many countries were eager to go down this path that they formed a new bloc, the Non-Aligned Movement, at the Bandung Conference in 1955, with Yugoslav leader Tito as one of its prime movers.

      • Site36Ukraine war: NATO spy drones work overtime

        The Western military alliance is stationing five Global Hawks in Sicily. Germany is the main contributor, provides a quarter of the personnel and opens a flight corridor. The drones were even seen in a triple mission with US Global Hawks.

      • Counter PunchWhy Does Putin Make All the Soviet Dead of the Second World War… “Russians”?

        All this is just another huge lie. Or rather a huge macabre fraud which only serves the Great Russian propaganda of the present regime. And this is why. First of all, all these dead commemorated were not Russians but… first and foremost Soviet civilians and military. The difference is not insignificant and the first person who should agree with it is Mr. Putin himself, who knows something about the abyss that separates the cursed Soviet Union from his Russian Federation, since he usually loses his temper in public when he talks about the October Revolution, Lenin and his Bolsheviks.

        But let’s see if there is a grain of truth in Mr. Putin’s propaganda. Were the Soviet citizens and servicemen who died during and because of the Second World War only Russians? The answer is given by the following table borrowed from the relevant Wikipedia article (in French and English), which is based on Vadim Erlikman’s study: Poteri narodonaseleniia v XX veke: spravochnik, Moscow 2004 (ISBN 5-93165-107-1) pp. 23-35.

      • Counter PunchMass Shootings: It’s the Masculinity, People

        Let’s tighten restrictions on poisonous hate speech on social media. It’s imperative we conduct threat assessments. Absolutely, more gun control regulations. We must deconstruct racist, anti-Semitic, homophobic, misogynist, white supremacist manifestos. But if we do all that and continue to minimize or ignore how these murderous men were socialized as boys and men, mass shootings will continue to plague us.

        We have to start in preschool, carefully attending to how boys are socialized. We must cultivate their emotional intelligence. Who would deny the value of educating boys to examine their inner lives; to talk about their feelings?

      • CNAIndonesian preacher denied entry to Singapore says he will not give up trying to visit

        An Indonesian preacher who was denied entry to Singapore on Monday (May 16) said he will not give up trying to visit Singapore, describing the country as Malay land similar to Riau where he is from.

        In a YouTube video on Wednesday, Abdul Somad Batubara said people in Riau see Singapore as part of their land because Singapore was part of the Temasek Malay kingdom.

      • International Business TimesMan Shouting Allahu Akbar Kills Security Guard at Qatar Embassy in Paris

        The identity of the attacker is not revealed yet. According to local reports, the 40-year-old attacker was already known to the police and was taken into custody.

      • The Times Of IsraelIran will ‘avenge’ killing of Revolutionary Guards colonel, president vows

        Col. Hassan Sayad Khodayari was shot dead Sunday outside his home by assailants on motorcycles, in a killing Iran blamed on “elements linked to the global arrogance,” its term for the United States and its allies including Israel.

      • MedforthFrance: The mayor of Marignane to take the initiative to ban Islamic clothing in swimming pools

        In the same letter, Eric Le Dissès called on the other mayors of France “not to give in to the pressure of pro-burkini associations”, whom he accused of wanting to impose “the extreme Islamisation of France, which many French Muslims do not approve of”.

      • Counter PunchThe (American) Exception to the Rule?

        I’ve seldom found big US media terribly useful in understanding how the world works. Coming of age during the Vietnam “conflict” encouraged a certain skepticism of the dominant media “narrative.” There was a history if one looked and, perhaps more impressive to we —-the impressionable— were the stories told by vets returning from “The Nam.” Guys we knew.

        There was something else going on.

      • Common Dreams‘Ashamed’ of ‘Warmongering’ and ‘Lies,’ Veteran Russian Diplomat Resigns

        A Russian diplomat on Monday issued a rare public rebuke of President Vladimir Putin’s war in Ukraine, resigning in protest of the invasion which has killed more than 3,000 civilians, displaced more than six million, and garnered worldwide condemnation.

        Boris Bondarev, a longtime diplomat to the United Nations in Geneva who has worked on disarmament issues, confirmed in a letter to his colleagues that he had resigned from his position, writing that he “simply cannot any longer share in this bloody, witless, and absolutely needless ignominy.”

      • Common DreamsOpinion | The Greatest Casualty of the Ukraine War Could Be Planet Earth Itself

        The war in Ukraine has already caused massive death and destruction, with more undoubtedly to come as the fighting intensifies in the country’s east and south. Many thousands of soldiers and civilians have already been killed or wounded, some 13 million Ukrainians have been forced from their homes, and an estimated one-third of the country’s infrastructure has been destroyed. Worse yet, that war’s brutal consequences have in no way been limited to Ukraine and Russia: hunger and food insecurity are increasing across Africa, Asia, and the Middle East as grain deliveries from two of the world’s leading wheat producers have been severed. People are also suffering globally from another harsh consequence of that war: soaring fuel prices. And yet even those manifestations of the war’s “collateral damage” don’t come close to encompassing what could be the greatest casualty of all: planet Earth itself.

    • Environment

      • Energy

        • Helsinki TimesWorking group to coordinate distribution infrastructure for new alternative transport fuels

          The distribution of new alternative fuels to replace fossil fuels plays a key role in enabling the green transition in transport. In order for households and businesses across Finland to switch over to electric and gas-fuelled transport, there must be an easily accessible public charging and refuelling network that covers the entire country.

        • New York Times7 Great Biking Cities (and Which Trails to Ride)

          A bike is a game changer when exploring a new city: It’s cheap, speedy and a fun way get in some exercise while on vacation.

          From a 1,300-foot climb in Bogotá to a 22-mile, best-of-Paris loop (don’t worry, there’s wine and ice cream at the end), seven writers offer their favorite rides in cities known for their urban trails.

      • Wildlife/Nature

    • Finance

      • Counter PunchDebunking the Myth of the Fleeing Millionaire
      • Counter PunchThe Persistence of Childhood Poverty in the US

        In 2020, about 1 in 6 kids, 16% of all children, were living in families with incomes below the official poverty line – an income threshold the government set that year at about US$26,500 for a family of four. Only 10% of Americans ages 18 to 64 and 9% of those 65 and up were experiencing poverty, according to the most recent data available.

        The official child poverty rate ticks down when the economy grows and up during downturns. It stood at 17% in 1967 – just about the same as in 2020. In many recent years the rate hovered even higher – around 20%.

      • Meduza‘It would really suck to lose everyone’ Meduza spoke to five McDonald’s employees to find out what they think about the fast-food giant leaving Russia for good

        McDonalds has announced that it is leaving the Russian market after 32 years of doing business there. Since mid-March, operations have been suspended at McDonalds’ 850 restaurants across Russia. On May 16, the company confirmed that it will sell its Russian business. Existing locations will be rebranded, and the iconic Golden Arches will vanish. According to the state news agency TASS, the new restaurants could open as soon as mid-June. Before the invasion, McDonalds employed 62,000 people at its franchises. The company continued to pay these staff even after suspending business in Russia. Meduza spoke to a handful of McDonalds workers to learn their thoughts about the chain’s departure from Russia, and to find out what they plan to do next.

      • Counter PunchA Reset That Serves the People

        Our Forefathers Had Some Innovative Solutions

        Fortunately for the United States, our national debt is in U.S. dollars. As former Federal Reserve Chairman Alan Greenspan once observed, “The United States can pay any debt it has because we can always print money to do that. So there is zero probability of default.”

    • AstroTurf/Lobbying/Politics

      • US News And World ReportFacebook-Owner Meta to Share More Political Ad Targeting Data

        Facebook owner Meta Platforms Inc will share more data on targeting choices made by advertisers running political and social-issue ads in its public ad database, it said on Monday.

        Meta said it would also include detailed targeting information for these individual ads in its “Facebook Open Research and Transparency” database used by academic researchers, in an expansion of a pilot launched last year.

      • ViceDOJ Announces It Won’t Prosecute White Hat Security Researchers

        On Thursday the Department of Justice announced a policy shift in that it will no longer prosecute good-faith security research that would have violated the country’s federal hacking law the Computer Fraud and Abuse Act (CFAA).

        The move is significant in that the CFAA has often posed a threat to security researchers who may probe or hack systems in an effort to identify vulnerabilities so they can be fixed. The revision of the policy means that such research should not face charges.

      • TechdirtDOJ Changes CFAA Policy, Will No Longer Bring Criminal Charges Against Security Researchers

        The much-abused Computer Fraud and Abuse Act (passed in 1986) will no longer be abused quite as much… at least by the Department of Justice.

      • New York TimesThe C.E.O. of Condé Nast: ‘This Is No Longer a Magazine Company’

        Lynch discusses why he thinks Wintour is an agent of change, rather than the old guard. They talk about how management has handled negotiations with the company’s various unions. And they consider how publishing gatekeepers have been usurped by online ones like YouTube and TikTok. And Kara asks him to weigh in on the perennial media question: Is print dead?

      • The NationHungarian Rhapsody: The Right Dreams of an “American Orbánism”

        Three of the biggest news stories in the United States are the erosion of reproductive freedom (with the Supreme Court on the cusp of ending the constitutional right to abortion), the surge in racist violence (with the myth of a “great replacement” of white people by immigrants evidently fueling the alleged shooter in the massacre in Buffalo that left 10 people dead), and the increasing authoritarianism of the GOP (with Republican primaries elevating many candidates who echo former president Donald Trump’s election lies and are committed to thwarting future elections). These might seem like distinct issues, but they are in fact strands of the same rope, the cord that could strangle American democracy.

      • Pro PublicaWisconsin Voter Fraud: Inside One Man’s Role in an Enduring Conspiracy

        Jay Stone grew up in the rough-and-tumble world of Chicago ward politics, the son of a longtime city alderman. But his own forays into politics left him distrustful of Chicago Democrats.

        When he ran for alderman in 2003, he was crushed at the polls after party leaders sent city workers out to campaign against him. Even his own father didn’t endorse him.

      • HungaryHungary’s Chief Public Prosecutor explains why it’s good for Hungary not to join the EPPO
      • Counter PunchThe Great Teal Tsunami: Arise Australia’s Independents

        That reckoning was made in traditional inner-city seats that have never known anyone other than conservative members.  It was part of a “teal” electoral tsunami, comprising candidates who would not necessarily wish to vote for Labor or the Greens, but who had found the Liberal-National government of Scott Morrison impossible to stomach on matters ranging from gender equality to climate change.

        In the Melbourne seat of Goldstein, held by the Liberal Party’s Tim Wilson, former ABC journalist Zoe Daniels stormed through.  It was a showing most fitting: the electorate is named after Vera Goldstein, feminist and women’s rights campaigner who, in 1903, was the first woman to stand for election in a national parliament.  “She ran as an independent several times,” Wilson said in a telling reminder, “because she was so independent that she couldn’t bring herself to run for either of the major parties.”

      • Counter PunchWhy the Son of a Dictator Won the Philippine Presidential Election

        I am not referring to the malfunction, intended or unintended, of 1,000-plus voting machines. I am not alluding to the massive release of billions of pesos for vote buying that made the 2022 elections one of the dirtiest in recent years. Nor do I have in mind the decade-long online campaign of disinformation that transmogrified the nightmare years of martial law during the senior Marcos’s rule into a “golden age.”

        Undoubtedly, each of these factors played a role in the electoral result. But 31 million plus votes — 59 percent of the electorate — is simply too massive to attribute to them alone.

      • Counter PunchWill BoJo Become the Unwitting Hero of Irish Revolution?

        Ending the Troubles required compromises between Catholics and Protestants, nationalists and unionists, British and Irish governments – and ultimately between Britain and the EU. A rickety but potentially stable balance of power was created in Northern Ireland which is now unravelling thanks to the crass manoeuvres of the British Government.

        It is a depressing spectacle as Johnson and Foreign Secretary Liz Truss hack away at what was one of Britain’s greatest diplomatic achievements. Wallowing in hypocrisy, they claim to be riding to the rescue of the peace process while in fact undermining it by unilaterally revoking key parts of the Northern Ireland protocol designed to preserve the GFA in a post-Brexit world.

      • Misinformation/Disinformation

        • OracCoronaphobia: How COVID-19 minimizers shame the responsible

          I like to think that I’m plugged into social media, at least about the topics that I care about, such as medicine, quackery, vaccines, and, for the last couple of years, COVID-19. Occasionally, however, I realize that I’m not, which is what happened over a week ago, when I saw this Tweet from outspoken Yale epidemiologist Gregg Gonsalves Tweeted a link to an article by Dr. Lucy McBride:

    • Censorship/Free Speech

      • EFFEFF to Court: California Law Does Not Bar Content Moderation on Social Media

        In April, EFF told California’s Sixth Court of Appeals that the Santa Clara Superior Court was correct to dismiss a lawsuit by Prager University against YouTube and its parent company, Google. The lawsuit claimed that Google’s content moderation was illegal censorship. Prager University is an educational and media nonprofit with a conservative perspective, which sued under California state law after its arguments were rejected by the U.S. Court of Appeals for the Ninth Circuit in 2020. The Ninth Circuit correctly held that, contrary to Prager’s arguments, YouTube is not a government actor bound by First Amendment limits simply because it hosts a forum for public speech. 

        Under a California Supreme Court decision in Robins v. Pruneyard Shopping Center, there is a narrow public forum test for a privately-owned space’s ability to curate speech. In our brief, we emphasize that even if the law were applied to non-physical spaces, it does not transform YouTube’s curation of Prager’s videos into prohibited censorship. YouTube and other social media platforms that moderate content are primarily, if not exclusively, expressive venues. Unlike a shopping center or grocery store, an online platform’s editorial vision is often at the core of its business. Additionally, social media platforms are not functionally public forums: they are not open to the public to come and go as they please. YouTube’s action against Prager is one of millions of decisions it made and continues to make. Those decision are part of the editorial discretion that platforms have as to which users and what content they allow. Prager’s broad interpretation of the law would upend those legal protections—to everyone’s detriment.

      • Techdirt11th Circuit Disagrees With The 5th Circuit (But Actually Explains Its Work): Florida’s Social Media Bill Still (Mostly) Unconstitutional

        Well, well. As we still wait to see what the Supreme Court will do about the 5th Circuit’s somewhat bizarre, and reasonless reinstatement of Texas’ ridiculously bad social media content moderation bill, the 11th Circuit has come out with what might be a somewhat rushed decision going mostly in the other direction, and saying that most of Florida’s content moderation bill is, as the lower court said, unconstitutional. It’s worth reading the entire decision, which may take a bit longer than the 5th Circuit’s one sentence reinstatement of the law, as it makes a lot of good points. I still think that the court is missing some important points about the parts of the law that it has reinstated (around transparency), but we’ll have another post on that shortly (and I hope those mistakes may be fixed with more briefing).

      • ViceMicrosoft’s Chinese Bing Censorship Impacts United States Too, Researchers Say

        The research shows how censorship efforts in one country can bleed over and impact users in others. The findings come after Bing censored image searches for the infamous “tank man” even from the United States last June. At the time, Microsoft blamed that issue on an “accidental human error.” The new research indicates more widespread censorship of politically sensitive searches, and especially names of certain people.

      • Daily Dot‘The [Internet] is not safe for us’: Atheists are afraid online as Pakistan violently cracks down on digital blasphemy

        Noor Khan Baloch* is a digital rights activist and professional from Quetta, the capital of Pakistan’s volatile Balochistan province. As a Pashtun-Baloch woman, Noor personifies the intersection of many identities that are marginalized in the country, and she has actively sought to address the multipronged power imbalances in the digital sphere. However, there’s a major part of her identity that she can neither strive to safeguard, nor unveil: atheism.

        “As an atheist I fear that if I post something on Islam, someone will lodge a police complaint, or I’ll become the target of a mob,” Noor said to the Daily Dot. “I’ve stopped expressing my own views online because even condemnation of killings over blasphemy, or criticizing the law, can be fatal.”

      • Blasphemy: MURIC demands arrest of pastor in Osun

        The Osun State Chapter of the Muslim Rights Concern (MURIC) has urged the security agencies and well-meaning Nigerians to act on the alleged misdemeanours of one Pastor Akintaro Joshua Ojo, over his recent utterances, which are capable of plunging Osun State and the entire South West Nigeria into chaos and religious war.

      • Deborah: Soyinka wants National Mosque Imam sacked over blasphemy comment

        Reacting to the dastardly act, Imam Maqari claimed that there are some red lines in Islam which must not be crossed, adding that if issues of blasphemy against the prophet are not addressed by the authority, the Muslims would do so themselves.

        Soyinka has now accused the Islamic cleric of instigating his followers to take laws into their hands in the name of religion.

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • ViceCops Kill Man Over Stolen Pokemon Cards in Target Parking Lot

        On Wednesday evening, more than a dozen units allegedly responded to a Target in Kissimmee in response to a suspicious vehicle with covered or unmarked license plates. Officers watched two men get out of the car wearing “masks and hoodies” and enter the store, according to the affidavit written by Deputy Cole Miller. Miller talked to the store’s Loss Prevention Supervisor on the phone, who told him that the men were leaving the store without paying for a pizza and multiple packs of Pokemon cards.

      • The Express TribunePakistani-Spanish sisters killed for ‘honour’ in Gujrat

        “The family created a story to convince them to come to Pakistan for a couple of days,” said Gujrat police spokesperson Nauman Hassan.

        “Preliminary investigations show this is a case of honour killing, but it is still developing and the investigation is ongoing,” he added.

      • Dawn MediaPakistani family’s murder shocks small-town Texas

        In a tweet he posted on May 19, Harris County Sheriff Ed Conzalez reported: “It appears an estranged husband showed up at his wife’s apartment this morning. The male shot his wife, 4-yr-old daughter and his mother-in-law, then turned the gun on himself. All four were pronounced deceased at the scene. A pistol has been recovered. South Asian family, husband.”

      • The Spectator UKNigeria’s Christians are under attack, but does the West care?

        The scene is medieval in its horror: a woman stoned, beaten and set on fire by a mob shouting ‘Allahu Akbar’. But this didn’t happen hundreds of years ago: it took place a week ago in Nigeria.

    • Internet Policy/Net Neutrality

      • TechdirtAT&T Gets A Tiny Wrist Slap For Another Bullshit Wireless Fee

        At some point U.S. regulators effectively declared that it was okay to rip off consumers with a dizzying array of bogus fees, letting companies falsely advertise one rate, then sock you with a bunch of additional surcharges when the bill comes due. That’s particularly true of the cable and broadband industry, which has saddled consumers with billions in fees for decades, with little real penalty.

      • EFFEFF Opposes Anti-Fiber, Anti-Affordability Legislation in California That Will Raise Prices on Middle Income Users

        The bill would amend the newly created grant program for funding broadband access in unserved areas by prohibiting the California Public Utilities Commission from requiring providers to offer affordable services to all residents, as well as by forcing the state to treat AT&T’s inferior wireless offerings on equal terms as 21st-century-ready fiber infrastructure. Such provisions run contrary to established goals of the Biden Administration’s infrastructure effort that center on delivering affordable fiber broadband to rural Americans.

        “At a time when everyone is suffering from record inflation, legislation that will raise people’s prices for broadband infrastructure must be flatly rejected,” said Ernesto Falcon, EFF Senior Legislative Counsel. “California made a historic investment to deliver 21st-century fiber infrastructure to all residents with passage of the state’s infrastructure law last year. Local county governments have already started charting out their infrastructure plans to connect everyone to fiber while committing to affordable prices. AT&T, which opposed the law from the beginning, is now trying to convince legislators to unwind that promise while padding their profits with taxpayer dollars by setting monopoly prices in rural markets.”

    • Digital Restrictions (DRM)

      • Netflix “House of Cards” collapsing while they figure out when to go after password sharing.

        Netflix plans to deal with “password sharing”, perhaps next year.

        I guess first they need to:

        1. Finish figuring out how many employees to fire.

        2. Set how much the annual *f*** yourself” price hike for their customers is.

        3. Figure out how many subscribers they’re already hemorrhaging this year, and under-report their estimate to keep the stock fraud going a while longer.

        4. Sort out which good shows that cost some money to write and make effects for to cancel.

        It’s always good to set priorities because otherwise you’ll never get a thing done.

        It’s too bad that we didn’t have some sort of “digital disc” that was “versatile”, so that we could just own movies and TV shows, and borrow them from a place our tax money supports.

        If we had, then certainly this disaster of “streaming” wouldn’t have happened.

    • Monopolies

      • Counter PunchBaby Formula Industry was Primed for Disaster Long Before Key Factory Closed Down

        Retailers nationwide reported supplies of baby formula were out of stock at a rate of 43% during the week ended May 8, 2022, compared with less than 5% in the first half of 2021. In some states, such as Texas and Tennessee, shortages were over 50%, which has prompted parents to travel long distances and pay exorbitant sums of money to grab dwindling supplies of formula for their babies.

        News that the Food and Drug Administration and Similac-maker Abbott have reached a deal to reopen the formula factory in Sturgis, Michigan, is welcome news for desperate parents, but it will do little to alleviate the shortage anytime soon. This is in no small part because of the very nature of America’s baby formula industry.

      • Copyrights

        • Torrent FreakBungie Takes Another Shot at Cheat Seller AimJunkies in Court

          Game developer Bungie has refiled its lawsuit against cheat seller AimJunkies.com, which offered the popular ‘Destiny 2 Hacks’ suite for sale. The amended complaint, filed at a federal court in Seattle, includes more details on the alleged copyright infringements. AimJunkies, meanwhile, reports that it will be taken over by the Ukrainian company Blome Entertainment.

        • Torrent FreakSpanish Police & LaLiga Carry Out Nationwide Pirate IPTV Crackdown

          In response to a complaint filed by the leading Spanish football league LaLiga, the country’s National Police has carried out a large-scale operation against a supplier and end-users of pirated live sports broadcasts. Coordinated inspections targeted 166 commercial premises in 13 regions, leading to the dismantling of a piracy distribution network and the identification of its operators.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts