Bonum Certa Men Certa

Links 15/06/2022: OpenBGPD 7.4 and IBM/Red Hat Faking Shortages



  • GNU/Linux

    • Applications

      • Some Open Source Picks



        There are some great standalone RSS readers for Android but I got slightly tired of pulling out my phone when I was at my computer to catch up on news and blogs. I already had a VPS that wasn't seeing a ton of use and had heard people talking about FreshRSS so I figured why not give it a try.

        Setup was straightforward, though anyone who hasn't set up a web server before or isn't familiar with Docker will have to do a bit of learning (you could also totally use DDEV!).

        I'm not sure what there is to say about an RSS reader other than it works great and it's nice having access to all my articles on any device. It's plenty customizable, each user can configure addons and themes that have been installed on the server. And the default keyboard shortcuts are super nice.

      • Linux LinksBest Free and Open Source Alternatives to Corel VideoStudio MyDVD - LinuxLinks

        Corel Corporation is a Canadian software company specializing in graphics processing. They are best known for developing CorelDRAW, a vector graphics editor. They are also notable for purchasing and developing AfterShot Pro, PaintShop Pro, Painter, Video Studio, MindManager, and WordPerfect.

        Corel has dabbled with Linux over the years. For example they produced Corel Linux, a Debian-based distribution which bundled Corel WordPerfect Office for Linux. While Corel effectively abandoned its Linux business in 2001 they are not completely Linux-phobic. For example, AfterShot Pro has an up to date Linux version albeit its proprietary software.

        This series looks at the best free and open source alternatives to products offered by Corel.

    • Instructionals/Technical

      • Linux Shell TipsHow to Find and Limit File Name Length in Linux

        One fun aspect of using any Linux operating system distribution is its ability to transform us into computing wizards. With Linux, its open-source nature makes it possible to break and/or create any logical computing rule(s). Filenames’ length and limit fall under such computing rules.

        Since Linux is part of the Unix-based systems, the file name length associated with this operating system has a limit. The length limit of filenames under a Linux operating system depends on the filesystem in question.

      • Nolan LawsonDialogs and shadow DOM: can we make it accessible?

        Last year, I wrote about managing focus in the shadow DOM, and in particular about modal dialogs. Since the <dialog> element has now shipped in all browsers, and the inert attribute is starting to land too, I figured it would be a good time to take another look at getting dialogs to play nicely with shadow DOM.

        This post is going to get pretty technical, especially when it comes to the nitty-gritty details of accessibility and web standards. If you’re into that, then buckle up! The ride may be a bit bumpy.

      • Linux Shell TipsWhat’s the Difference Between Vi and Vim Editors

        Text editors are important tools in the life of a Linux user. As we get used to our preferred Linux operating system distribution, we slowly transition from beginners to expert users.

        In the course of this transition, we find ourselves leaning more and more towards this operating system’s non-graphical user interface. Reason? This Linux OS environment hosts numerous computing tools associated with it. This non-graphical user interface is none other than the Linux command-line environment.

        Linux application packages and utilities bound to the command-line environment are resource-friendly and faster in their executive power in comparison to the ones bound to the graphical user interface like the Linux Desktop environment.

      • HowTo ForgeHow to Setup a Centralized Log System with Graylog on Debian 11

        Graylog is a free and open-source log-management platform for capturing, storing and enabling real-time analysis of your data and logs. It's written in Java and built on top of other open-source software like MongoDB and Elasticsearch.

      • Trend OceansError resolved: 1698 (28000) Access denied for user ‘root’@’localhost’

         This error is very common when you try to log in to your MySQL for the first time.

        Personally, I too faced this issue multiple times, maybe because we were not following the right way to install MySQL, or we forgot to set a password, or else we didn’t get the options to set a password.

        Similarly, there may be many other reasons for the above error, but the solution to this error is pretty simple and easy. In this article, you will find a way to resolve 1698 (28000) Access denied for user ‘root’@’localhost’.

        There are two ways to resolve this error. First, you will see a simple and less time-consuming method. If the first method didn’t work in your case, then go to the second one.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • GamingOnLinuxKDE Plasma 5.25 is out now, here's some of what's new

          Ready to get the latest and greatest from the KDE team? The awesome Plasma 5.25 release is officially out now. This is the desktop environment used on the Steam Deck when in Desktop Mode! Hopefully Valve will update it at some point.

  • Distributions and Operating Systems

    • BSD

      • Mailing list ARChivesOpenBGPD 7.4 released

        We have released OpenBGPD 7.4, which will be arriving in the OpenBGPD directory of your local OpenBSD mirror soon.

    • Fedora Family / IBM

      • Red HatBest practices for successful DevSecOps | Red Hat Developer

        In a recent Red Hat survey, summarized by our 2022 State of Kubernetes security report, a broad majority of the more than 300 correspondents reported that they are incorporating security into DevOps processes and pipelines, a practice called DevSecOps.

        This article draws on the report as well as a Red Hat white paper, How to automate DevSecOps in Red Hat OpenShift, to show the rate of DevSecOps adoption and the factors that we believe make it work well.

      • Red HatOpenSSL 3.0: Dealing with a Turkish locale bug

        Changes in libraries have a risk of breaking things in unpredictable places. Debugging a crash is usually simple. But recently, in the late stages of working on the curl utility for Red Hat Enterprise Linux 9, I encountered a bug report that looked rather strange. In this article, I will discuss how this report led me to implement a localization bug fix during the late stages of RHEL 9 development.

      • Enterprisers ProjectUsing automation to improve employee experience [Ed: Here is Red Hat (IBM) promoting the "Great Resignation" mythology while sacking its workers and making life more miserable for people]

        Successful digital transformation hinges on the continuous improvement of people, processes, and technologies. We often treat these three components as independent silos: We’ll mutually exclusively upgrade our technologies, enhance our processes, or improve the work lives of our people.

        These are all important and necessary, but what if we linked all three together? What if we could automate our processes to integrate our technologies to enhance the efficiency and satisfaction of our people?

        Let me give you an easy example of how we’re doing this at Red Hat.

        We all know how the Great Resignation, physical isolation from coworkers, and return-to-office anxieties contribute to what many call the Great Reprioritization. Employees want to make a difference and a visible impact and are re-evaluating their place in the organization and looking for meaning and purpose in their work.

      • Enterprisers Project3 IT talent shortage challenges and how to solve them [Ed: IBM keeps laying off many of its most talented and skilled workers while advancing the same old lie about shortages. What some corporate press and corporations call "great resignation" is actually layoffs, followed by people panicking about further layoffs and checking safer options elsewhere. But what's really going on is mass layoffs.]

        In 2022, almost 50% of developer-focused recruiters testified to having difficulty finding qualified candidates.

      • Getting A Firm Handle On Power Systems And Storage Firmware
    • Devices/Embedded

      • CalyxOS, Rock Pi 4A, KOReader

        The pinephone has lost most of its appeal, mainly because the keyboard case doesn't charge (itself or the phone) consistently.

        This wouldn't be a problem if the phone could be in the keyboard case and be powered off. But since the keyboard case is a power supply, the phone will immediately boot up again.

      • Linux GizmosBeagleBone AI-64 comes with TDA4VM SoC from Texas Instruments

        The BeagleBoard community released a new BeagleBone board yesterday. The new model is called the BeagleBone AI-64 which builds on the BeagleBone AI SBC released a few years ago. The new Single Board Computer is equipped with the TDA4VM System on Chip (SoC) produced by Texas Instruments.

        The SoC implemented for the BeagleBone AI-64 consist of two ARM Cortex-A72, six ARM Cortex-R5, a PowerVR Rogue 3D GPU, 4GB LPDDR4, 16GB of eMMC storage, one MicroSD card socket, one GbE LAN port, and many other peripherals.

      • HackadayThe RP2040 Doth A Motor Controller Make

        When the Raspberry Pi people launched their RP2040 microcontroller, it seemed as though it might be destined as a niche product for those areas in which the Pi has traditionally been strong. But during the global semiconductor shortage, it has remained almost alone among microcontrollers in having plenty of fab capacity to keep the supplies rolling. That, and its very vanilla set of ARM peripherals alongside those programmable state machines have thus seen it find a home in many places it might not otherwise have seen. Take the dual RP2040 motor controller from [Twisted Fields] as an example, would it have been more likely to have sported an STM32 in previous years?

      • CNX SoftwareNordic Thingy:53 is a dual-core Arm Cortex-M33 platform for IoT prototyping - CNX Software

        As one should have expected after Nordic Thingy:52 and Thingy:91 IoT devkits were introduced in 2017 and 2019 respectively, the Norwegian company has now launched the Thingy:53 platform based on Nordic Semi nRF5340 dual-core Arm Cortex-M33 SoC for IoT prototyping with Bluetooth Low Energy, Thread, Matter, Zigbee, IEEE 802.15.4, NFC, and Bluetooth mesh RF protocols.

        The development kit also incorporates the nPM1100 PMIC and nRF21540 Front End Module (FEM), a power amplifier/low noise amplifier (PA/LNA) range extender, as well as multiple motion and environmental sensors, as well as a rechargeable 1350 mAh Li-Po battery for power.

    • Open Hardware/Modding

      • HackadayLMN-3: Putting The ‘OP’ In Open Source Synthesizers

        Some projects you come across simply leave you in awe when you look at the thought and the resulting amount of work that went into it, not only for the actual implementation, but everything around it. Even more so when it’s a single-developer open source project. [Stone Preston]’s synth / sampler / sequencer / DAW-in-a-box LMN-3 absolutely fits the description here, and it seems like he has set his heart on making sure everyone can built one for themselves, by providing all the design files from case down to the keycaps.

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Mozilla

        • The Register UKThunderbird is go for Android – in K-9 Mail form ● The Register

          The cross platform email client Thunderbird is to launch an Android version, which will be based on the existing K-9 app.

          A month after Thunderbird's product manager, Ryan Lee Sipes, tweeted that a mobile version of the email client was "coming soon", the project has announced how it will do it.

          It has acquired the FOSS Android email client and one-time Register app of the week K-9 Mail, which will become Thunderbird for Android.

          The Thunderbird Foundation has hired Christian Ketterer, known online as "cketti", developer of K-9.

          Thunderbird users have been asking for an Android version for years. This is an unexpected route to get there, but it's a viable one: K-9 is a well-regarded app, and one of the very few Android apps to handle traditional bottom-posted email.

        • PC WorldMozilla Firefox locks its browser’s cookie jar

          On Tuesday, Mozilla and its Firefox browser announced Total Cookie Protection, a powerful way for Firefox to preserve privacy while allowing websites to recognize you and provide customized experiences.

          Total Cookie Protection is rolling out to all Firefox users worldwide, the company announced on Tuesday. It will be on by default.

        • TorVolunteer as an alpha tester

          Tor Browser receives hundreds of changes a year: from updates to Firefox – the underlying browser on which Tor Browser is based – to entirely new features designed to help protect at-risk and censored users. However, each change made to Tor Browser has the potential to introduce new and sometimes elusive bugs.

          In order to find and fix these bugs before they reach the majority of our users, we apply updates to an early version of Tor Browser known as Tor Browser Alpha before releasing them more widely. Then, as a small nonprofit, we rely on a community of volunteer testers to try out our alphas before their general release in order to keep Tor Browser available on so many platforms.

    • Education

    • Programming/Development

      • HackadayLinux Fu: Up Your GDB Game! [Ed: GDB is GNU, not Linux]

        If you want to buy a car, there are plenty of choices. If you want to buy a jetliner, there are fewer choices. If you want to use the Large Hadron Collider, you have a choice of exactly one. The harder something is to create, the less likely there is to be many of them. If you are looking for a Linux debugger, there are only a few choices, but gdb is certainly the one you will find most often. There is lldb and a handful of non-open commercial offerings, but for the most part you will use gdb to debug software on Linux.

    • Standards/Consortia

      • Thoughts on the Spring '83 protocol draft

        Right this morning when I woke up, before I even had a glass of water, I started reading a blog post by Maya discussing a new protocol. I was immediately intrigued, and starting reading the original post, Specifying Spring '83. After reading through the blog post, I excitedly moved on to the actual spec draft. I was amazed. Possibly because it was the first thing my brain had processed all day, but still, I really loved the idea. What follows is some thoughts on the spec draft, to add to the ongoing discussion.

        [...]

        Please don't use YAML for the peer list. YAML is not great. A simple JSON list would be better. A separate Markdown file can provide human-readable metadata if needed.

  • Leftovers

    • HackadayRecreating A Camera Shot

      People rolling off shields and spears clashing against swords as the camera zooms in and out wildly makes the hallmark action sequences in the movie 300 so iconic. Unfortunately, achieving this effect wasn’t particularly easy. Three cameras were rolling, each with a different lens (100mm, 50mm, and 21mm) to capture a different view of the same scene. In post-production, you can dramatically switch between the three cameras since the shot is synchronized. The folks over at [Corridor Crew] wanted to recreate the effect, but rather than create a custom mount to hold three expensive cameras, they 3d printed a custom mount to hold three costly smartphones.

    • Mere painful history

      You can easily go stomping once your foot is through the door.

      It’s easy to throw love to someone who can trust in whom it’s for

      but not as easy being into those who don’t show what they feel.

      It’s been weeks since you last called me so I think I see the deal.

      You have a way with words to make us sound like such a thrill.

      You have this way of losing me when you feel you’ve had your fill.

      You shelter me from rainstorm when you want and when you care,

      then forget me in the downpour as if “li’l me” ‘s not there.

    • New Apartment

      My wife and I just received the keys of the apartment we bought back in late January. The (grumpy) tenant left in early May after she agreed to terminate the rental contract early, but the previous owner was on vacation (and then, on another vacation), so we received the keys only now.

    • What day is it today?

      So I was playing a game this evening. But then it started lagging. I decreased graphics quality from "high" to "med", from "med" to "low" - it didn't become much better - maybe even worse. I set game on pause and fired up task manager - it showed 100% CPU usage and 100% disk usage. I waited a few minutes with game on pause - numbers didn't change. I would assume that whatever game needs to load (like textures for a next level) - being paused, it should eventually load them and stop the disk activity?

    • The NationLove and Pride
    • ScheerpostA Mazing Grace
    • Science

      • The EconomistArtificial neural networks today are not conscious, according to Douglas Hofstadter

        Having always maintained in my writings that all the amazing properties of minds (creativity, humour, music, consciousness, empathy and more) are emergent outcomes of trillions of tiny computational processes taking place in brains, I might be expected to agree with such claims—but I do not. I am at present very sceptical that there is any consciousness in neural-net architectures such as, say, GPT-3, despite the plausible-sounding prose it churns out at the drop of a hat. Let me explain my viewpoint through a few examples.

    • Education

      • David RosenthalWhere Did The Number 3 Come From?

        All this is to say that there is no strong theoretical justification for the criterion for safety being three, or any other number. In theoretical computer science there is a very strong theoretical result dating from 1982, called Byzantine Fault Tolerance (BFT). This proves that 3f+1 replicas can in the worst case survive f simultaneous failures. This would lead to the idea that, to be safe against one failure, four replicas are needed. Or to be safe against two failures, seven replicas are needed.

      • The NationThe Growing Campus Gender Gap

        In the last week of her life, my mother extracted a promise from me. “Make sure,” she said, “that Orion goes to college.”

      • Project CensoredGoing Remote - The Project Censored Show

        Adam Bessie teaches literature, English composition, and critical thinking at a community college in Northern California.€  Peter Glanting is an illustrator and product designer based in Portland, Oregon. Their book is scheduled for release in early 2023, from The Censored Press and Seven Stories Press.

    • Hardware

      • HackadayBehold The Mighty Floppotron 3.0

        If anyone has been struggling to get hold of a 3.5″ floppy drive lately, we think we’ve got a clue as to why — behold, the mighty floppotron 3.0 by [PaweÅ‚ Zadrożniak.] With an utterly bonkers 512 floppy drives, four flatbed scanners and sixteen hard disks of various sizes, the floppotron 3.0 MIDI synthesiser is possibly the biggest such retro hardware synthesiser so far. Since every part of the system is motor-based, nobody is going to be surprised that to power the show is quite an undertaking, with nearly twenty switched-mode PSU modules needed to keep up with the demand, averaging 300W but rated at 1.2kW peak!

      • HackadayOdd Inputs And Peculiar Peripherals: The Morse Keyboard

        When it comes to rendering text input into an electronic form,the newest keyboards use USB for wired interfacing, while the oldest Morse keys use a single conductor. Shall the two ever meet? For [Matthew Sparks] the answer is yes, with his “The Gadget” Morse-to-USB HID interface which presents a Morse key to a computer as though it were a USB keyboard.

      • HackadayKved: An Embeddable Key/Value Datastore

        At some point when developing embedded applications, you’re going to want to store unique values in non-volatile memory, values that can’t be fixed at compilation time. Many microcontrollers have a small amount of EEPROM memory for this very purpose, but it’s usually rather limited if it’s provided at all. Even if you do have a bit of space on an EEPROM at your disposal, actually formatting your values into the memory and dealing with the pesky problem of wear leveling (necessary for parameters that need to change often) can be a bit of a hassle.

    • Health/Nutrition/Agriculture

      • Common DreamsIlhan Omar Says 49 Million Facing Famine 'Should Be the Biggest Story in the World Right Now'

        The combination of a worsening climate emergency and Russia's war on Ukraine has helped push the number of people at risk of famine globally to an all-time high of up to 49 million, according to a study by the Food and Agriculture Organization and the World Food Program.

        "This should be the biggest story in the world right now," U.S. Rep. Ilhan Omar (D-Minn.), a Somali refugee, tweeted Monday in response to The Washington Post's story on the United Nations study, which warns that tens of millions of people in 46 countries are in need of "immediate life and livelihoods-saving assistance."

      • Common DreamsMedicare for All Could Have Prevented More Than 338,000 US Covid Deaths: Study

        Covid-19 has killed more than one million people in the United States over the past two years, but more than 338,000 of those lives could have been saved if the country had a universal single-payer healthcare system such as Medicare for All.

        "Universal single-payer healthcare is both economically responsible and morally imperative."

      • DeSmogThe UK Government’s Food Strategy Lacks Teeth

        The UK government has finally published its long-awaited response to the independent National Food Strategy. Two years in the making, there were high hopes this would be a comprehensive plan of action. But when the document appeared on Monday, these hopes€ were dashed.

        The strategy falls short on a number of fronts. The first: climate. Food is responsible for over a third of the UK’s greenhouse gas emissions, and industrialised agriculture is the leading cause of wildlife decline, antibiotic resistance and pollution. But the strategy did not set out a plan to transform our food system in line with limiting global heating to 1.5C – and providing a liveable planet for current and future generations.

      • Common DreamsMexican Official Says Flawed WTO Proposal on Vaccine Patents 'Worse Than None at All'

        As a major World Trade Organization meeting continued on Tuesday, a top Mexican official called out rich governments for obstructing a pathway to waive patent protections for Covid-19 vaccines and treatments "in order to put the profits of Big Pharma over people's lives."

        "Global health is on its deathbed."

      • ScheerpostDealing With the Disease that Never Seems to Leave Town

        Nina Burleigh takes you behind the scenes of her own life to offer one of so many millions of Covid-19 dramas that played out in these years — and, of course, it hasn’t ended yet.

      • MeduzaRussia’s new drug problem Despite foreign companies continuing to supply drugs to Russian patients, the war is wreaking havoc on the country's pharmaceutical market

        For years, Russian patients have been suffering from a medication shortage. After the country invaded Ukraine in February, the situation only got worse as drug prices rose. At first, this was due to a surge in demand, and drugs that initially disappeared began to return to the shelves. But despite the authorities’ attempts not to allow essential drugs to run out, problems remain. Their sources include a supply chain broken by sanctions, the departure of raw materials necessary for production from the market, and many Western companies’ refusal to conduct clinical trials in Russia. And the things still aren’t looking up: the future likely holds more supply chain disruptions, a drop in quality, rising prices, and a market closed to new drugs. Meduza explains what’s going on with Russia’s healthcare industry.

    • Proprietary

      • Common DreamsCalls to 'Stop the Deal' as US Military Contractor Moves to Buy NSO Group

        Digital rights advocates sounded the alarm on Tuesday following reports that U.S. military contractor L3Harris Tech plans to acquire NSO Group, a private Israeli firm widely condemned for selling surveillance technology to repressive governments across the globe.

        "The spyware peddled by NSO Group is unsafe in any hands."

      • Krebs On SecurityMicrosoft Patch Tuesday, June 2022 Edition

        Microsoft on Tuesday released software updates to fix 60 security vulnerabilities in its Windows operating systems and other software, including a zero-day flaw in all supported Microsoft Office versions on all flavors of Windows that’s seen active exploitation for at least two months now. On a lighter note, Microsoft is officially retiring its Internet Explorer (IE) web browser, which turns 27 years old this year.

      • Krebs On SecurityRansomware Group Debuts Searchable Victim Data

        Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group, which has traditionally published any stolen victim data on the Dark Web. Today, however, the group began publishing individual victim websites on the public Internet, with the leaked data made available in an easily searchable form.

      • NBCInternet Explorer's run finally comes to an end

        Microsoft released the first version of Internet Explorer in 1995, the antediluvian era of web surfing dominated by the first widely popular browser, Netscape Navigator. Its launch signaled the beginning of the end of Navigator: Microsoft went on to tie IE and its ubiquitous Windows operating system together so tightly that many people simply used it by default instead of Navigator.

        The Justice Department sued Microsoft in 1997, saying it violated an earlier consent decree by requiring computer makers to use its browser as a condition of using Windows. It eventually agreed to settle the antitrust battle in 2002 over its use of its Windows monopoly to squash competitors. It also tangled with European regulators who said that tying Internet Explorer to Windows gave it an unfair advantage over rivals such as Mozilla’s Firefox, Opera and Google’s Chrome.

    • Security

      • Privacy/Surveillance

        • ViceWoman Allegedly Used Apple AirTag to Track and Kill Her Boyfriend

          When the cops arrived, Morris and Smith were still in the parking lot. He was declared dead just short of 1:00 a.m. Detectives took statements from multiple witnesses and asked Morris if she had placed an AirTag in Smith’s car. She initially denied it, but relented when detectives threatened to get a search warrant for Smith’s car. “Morris then admitted that she had a tracker on his car, and stated that she placed it in the backseat of his vehicle near the cup holder,” according to the affidavit.

        • ViceFacial Recognition Failures Are Locking People Out of Unemployment Systems

          On Twitter, there are dozens of complaints about ID.me per day, and local news articles all over the country have detailed the problem over the course of months. In California, 1.4 million unemployment beneficiary accounts were abruptly suspended on New Year’s Eve and the beneficiaries were required to re-verify their identity using ID.me, a process which many found difficult and resulted in them waiting for weeks to reactivate their accounts while they struggled to make ends meet.

        • India TimesA dark web version of the metaverse and the security risks associated with it

          We also foresee an evolution of a dark web version of the metaverse due to its very nature of interaction through avatars. The dark web is an anonymous world where people interact through unmapped virtual identities. Here nobody will be interested to know the real identity of anyone, but will still engage with each other commercially or personally. The metaverse DNA is very well suited to the dark web and that’s why I see it as a real security challenge. The dark web version of metaverse will also grow faster than the real world version of metaverse.

          Though Meta is the main company developing metaverse for users and players to be in the vast network of real-time 3D virtual worlds while maintaining their identity and payment history, the other top 10 companies that are integral to build this are NVIDIA. Epic Games, Microsoft, Apple, Decentraland, Roblox Corporation, Unity Software, Snapchat, and Amazon

        • EDRIBelgium’s data retention law must not undermine people's right to privacy - European Digital Rights (EDRi)

          The EDRi network welcomes the attempt by the Belgian lawmakers to set up a legal framework in conformity with the Court of Justice of the European Union’s (CJEU) case law for the retention of traffic and location data. Data retention regimes that are illegal under EU law must be abandoned and replaced as soon as possible with solutions that pass the strict necessity and proportionality test established by courts.

          It is therefore essential that the new draft law that Belgium’s Parliament is currently discussing does not introduce measures that would replicate the effects of the previous law on fundamental rights and that would be contrary to the Belgian Constitutional Court’s and the CJEU’s rulings.

          Unfortunately, this draft law, as it is and if adopted without adequate adjustments, would pose a threat to people’s rights, such as the right to privacy and data protection, freedom of expression and information, press freedoms and professional secrecy guarantees, and would potentially set a dangerous precedent for other Member States.

        • EFFSenator Declares Amazon Ring's Audio Surveillance Capabilities "Threaten the Public"

          This has disturbing implications for people who walk, bike, or even drive by dozens of these devices every day, not knowing that their conversations may have been captured and recorded. It may be even more problematic for people who live in an apartment building where neighbors have installed Ring cameras indoors, where echoey hallways might amplify conversations that could be recorded even beyond line of sight with the device. A surveillance doorbell owner may even have their own private conversations caught on tape if the device is triggered and captures voices drifting through open windows.

          In his letter to Amazon, the senator writes:€ 

          In the UK,€ a judge ruled€ in October 2021 that the audio capabilities of Ring cameras amounted to a violation of the Data Protection Act when a neighbor put up multiple cameras aimed at a communal parking lot.

        • EFFVictory! New York’s Vaccine Privacy Bill Heads to Governor’s Desk

          A.€ 7326/S. 6541 protects the confidentiality of medical immunity information by limiting what data can be collected or shared, who it can be shared with, and how long it can be stored. In New York, bills must have identical versions in each chamber in order to move forward; these passed the Senate and Assembly on June 2 and 3, respectively.

          New Yorkers are often required to present information about their immunity—like vaccination records or test results—to get in the door at restaurants, gyms and entertainment venues. This bill protects them from that information being misused by private companies, the government, or other entities that wish to track their movements or use their private medical information to punish or discriminate against them. Assuring people that their medical information will not be used in unauthorized ways increases much-needed trust in public health efforts.€ 

          This bill expressly prohibits immunity information from being shared with immigration or child services agencies seeking to deport someone or take away their children based on vaccination status. It also requires that those asking for immunity information must accept an analog credential, such as a paper record.

        • EFFEFF Urges Congress to Strengthen the American Data Privacy and Protection Act

          American consumers need a strong federal privacy law. EFF appreciates the Committee highlighting the national conversation over how the government should protect us from businesses that harvest and monetize our personal information, and address the racial and other bias that excludes consumers of color from opportunities. To achieve these goals, the discussion draft of the American Data Privacy and Protection Act needs to be strengthened in several areas listed in our letter.

          This draft might be a step in the right direction on many privacy concerns – assuming it is amended, as discussed in the letter, to ensure strong private enforcement in court, and to not undo other privacy laws at the federal and state levels.

          We look forward to working with the sponsors to improve this legislation and strengthen the necessary protections.€ 

    • Defence/Aggression

      • TruthOutPoll: Most Americans Think Trump Bears Responsibility for Jan. 6 Violence
      • TruthOutTrump's Site Truth Social Has Been Banning Users Over Posts on Jan. 6 Hearings
      • Common DreamsOpinion | Our Silence Is Complicity When It Comes to Palestinian Rights

        Watching live€ videos of young Israeli Jews in Jerusalem chanting, with unbridled venom and violence: "Death to the Arabs," "May your village burn," and other epithets (that belie a breath-taking inhumanity), is beyond heartbreaking.€ How can one not feel shaken to your core watching this?

      • TruthOutSCOTUS Is Violating the 10th Amendment by Not Letting States Enact Gun Control
      • Common DreamsOpinion | This 'Bipartisan' Gun Deal With Senate Republicans Is Worse Than Nothing

        In the wake of the horrors of Uvalde, it looks like Senate Democrats are about to make a "bipartisan" gun deal with Senate Republicans that will likely accomplish next to nothing except let Republicans off the hook for opposing even minimal gun safety laws.€ Here's what the deal does not include:

      • The NationThe Senate’s Gun “Deal” Won’t Stop Mass Shootings

        I don’t know who said “don’t let the perfect be the enemy of the good,” but I doubt if that person got a look at the Senate’s “framework” for gun safety in the wake of the Robb Elementary school shooting in Uvalde, Tex. The bipartisan agreement is as likely to stop the next school shooting as an AR-15 would be at stopping the 1st Armored Division. That’s because the framework feels more like a Republican attempt to avoid the issue of gun violence than a Democratic attempt to solve it.

      • Common Dreams'Pure Insanity': Ohio Gov. Signs Bill to Arm Teachers After 24 Hours of Training

        The Democratic candidate for governor in Ohio was among the critics condemning Gov. Mike DeWine's decision on Monday to sign a bill permitting teachers to carry a gun to class after just 24 hours of firearms training—pointing out that educators will need far more training to renew their teaching licenses than to bring a deadly weapon into their classrooms.

        "Teachers will need 180 hours to renew their teaching license so they can teach your kids, but only up to 24 hours of training to carry a gun around with them," Nan Whaley, who was the mayor of Dayton in August 2019 when a mass shooting there killed 10 people and injured 27, told the Cleveland Plain Dealer. "That is insane."

      • China Global Television NetworkRemote Killing: Former Google employee reveals U.S. plan to apply AI to drones

        In September 2017, Google won the Project MAVEN contract from the Pentagon. Under the plan, Google was to build a monitoring system based on footage taken by U.S. drones and help the U.S. military quickly evaluate the drone footage using artificial intelligence and machine learning. Pentagon analysts were to monitor images of vehicles, people, land features and large crowds of the "entire city."

      • Pro PublicaGoogle Says It Bans Gun Ads. It Actually Makes Money From Them.

        For roughly two decades, Google has boasted that it doesn’t accept gun ads, a reflection of its values and culture. But a ProPublica analysis shows that before and after mass shootings in May at a New York grocery store and a Texas elementary school, millions of ads from the some of the nation’s largest firearms makers flowed through Google’s ad systems and onto websites and apps — in some cases without the site or app owners’ knowledge and in violation of their policies.

        Ads from gunmaker Savage Arms, for example, popped up on the site Baby Games, amid brightly colored games for children, and on an article about “How to Handle Teen Drama” on the Parent Influence website. Ads for Glock pistols loaded on a recipe site’s list of the “50 Best Vegetarian Recipes!” as well as on the quiz site Playbuzz, on the online Merriam-Webster dictionary and alongside stories in The Denver Post, according to Adbeat, which aggregates data about web and mobile digital ads.

      • Hong Kong Free PressChina vows ‘fight to the end’ to stop Taiwan independence

        China will “fight to the very end” to stop Taiwanese independence, the country’s defence minister vowed Sunday, stoking already soaring tensions with the United States over the island.

        The superpowers are locked in a growing war of words over the self-ruled, democratic island, which Beijing views as part of its territory awaiting reunification.

      • RFAStatesman or shark bait? — Radio Free Asia

        After blanket denials that China is building a naval facility for its use at Cambodia's Ream Naval Base, Cambodia is now saying Chinese forces will not have exclusive use of the structure at the Gulf of Thailand base.

      • Defence WebUS Office of Security Cooperation in Zambia is not a military base [Ed: Misses the point that the US Army appropriates the military bases of some of those countries which is occupies, including the UK]

        In the last few weeks, defenceWeb has confirmed that the recently created United States’ Office of Security Cooperation in Zambia is not to be confused with a US military base, amid opposition from some quarters.

      • Atlantic CouncilVictory reimagined: Toward a more cohesive US cyber strategy [Ed: Until they remove the last Microsoft deployment they're just beating the bushes]

        A strategy to defeat US adversaries in cyberspace is not the same as, nor sufficient for, securing cyberspace. US policy is on two potentially divergent paths: one that prioritizes the protection of US infrastructure through the pursuit of US cyber superiority, and one that seeks an open, secure cyber ecosystem. Defend Forward was a compelling and necessary shift in thinking, but it is just one of many policy tools available to implement the US cyber strategy. In the new National Cyber Strategy, policymakers and practitioners should heed the costly lessons of a generation of counterinsurgency and ensure that efforts to defeat adversaries in cyberspace do not displace efforts to secure it. In an article published by Foreign Affairs, National Cyber Director Chris Inglis and Harry Krejsa, assistant national cyber director for strategy and research, emphasized, “security is a prerequisite for prosperity in the physical world, and cyberspace is no different.”1 A revised national cyber strategy should: (1) enhance security in the face of a wider range of threats than just the most strategic adversaries, (2) better coordinate efforts toward protection and security with allies and partners, and (3) focus on bolstering the resilience of the cyber ecosystem, rather than merely reducing harm.

      • MeduzaWhy is the Kremlin so committed to this war? Sociologist Alexey Levinson outlines the thinking behind Russia’s war in Ukraine

        In early June, the independent polling agency the Levada Center published survey data showing that three quarters of Russians believe the “special military operation” in Ukraine is “progressing successfully.” Almost 25 percent expect a Russian victory in “less than six months,” while about 20 percent expect it to come in about a year, and another 20 percent expect victory in over a year. In the 20 years that the Levada Center has been operating, experience has shown that there’s often a wide gulf between the expectations of the Russian public and the worldviews of those who lead the organization. In this essay for Meduza's “Ideas” section, Alexey Levinson, the Levada Center’s social research director, lays out his view of what Russia is hoping to achieve with this war.

      • Meduza‘Compromises won’t save you’: Zhanna Nemtsova on the degradation of freedoms in Russia and awarding Zelensky the Boris Nemtsov Prize

        On June 12, the Boris Nemtsov Foundation for Freedom awarded its annual prize to Ukrainian President Volodymyr Zelensky. All of the award’s past recipients have been Russian opposition politicians and activists. In 2021, for example, it was awarded to Kremlin critic Alexey Navalny shortly after the Russian authorities imprisoned him. To find out more about the decision to honor Zelensky, and how Russia’s war against Ukraine has impacted the Nemtsov Foundation’s work, Meduza sat down with the foundation’s co-founder, Zhanna Nemtsova.€ 

      • The NationThe January 6 Committee Investigates the Origins of the “Big Lie”

        Even before day two of the January 6 committee hearing began, it broke news: Donald Trump’s former campaign manager Bill Stepien canceled his planned testimony at the last moment. The news launched a thousand jokes invoking The Godfather movies and dark humor suggesting Stepien had been threatened, perhaps by Trump; it turned out his wife had unexpectedly gone into labor. The last-minute news forced the committee to scramble a bit, but the day’s agenda had always been clear: to showcase the sober white men around Trump who would testify that they told him the truth in real-time—that he’d lost the election. Stepien was one of many Trump aides and lawyers who came to be known as “Team Normal.”

      • Democracy Now“Detached from Reality”: Barr Says Trump Embraced Lies & Conspiracy Theories After His Election Loss

        One of the key witnesses who testified live at Monday’s hearing of the House Select Committee to Investigate the January 6th Attack on the U.S. Capitol was former Fox News political editor Chris Stirewalt, who led the the Fox News decision to become the first network to call Arizona for Joe Biden on election night in November 2020. Fox fired Stirewalt months later. Answering questions from Congressmember Zoe Lofgren, Stirewalt said Trump’s chance of winning was virtually zero. His comments were supported by Trump’s former Attorney General William Barr. The committee also heard testimony from Trump’s former campaign manager Bill Stepien, who said he had contradicted false election victory claims by Trump’s lawyer Rudy Giuliani, and was part of what he called “Team Normal.” Former Attorney General Barr told the committee about how he became “demoralized” after the 2020 election when he tried to counter allegations of voting fraud with then-President Trump.

      • Democracy NowTrump’s “Big Lie Was Also a Big Ripoff” as He Raised $250 Million from Supporters After 2020 Loss

        Monday’s January 6 committee hearing ended with closing statements from January 6 committee vice chair, Republican Liz Cheney and Democrat Zoe Lofgren describing how the Trump administration raised over $250 million from his supporters, off of the lie that the 2020 election results were fraudulent, for an election defense fund that didn’t exist.

      • TruthOutRudy Giuliani Was Drunk When He Urged Trump to Declare Victory, Aides Testify
      • Democracy NowA Drunk Rudy Giuliani Urged Trump to Declare Victory on Election Night, Trump Aides Testify

        We spend the hour featuring highlights from the second public hearing of the House Select Committee to Investigate the January 6th Attack on the United States Capitol. Main witnesses were ex-President Donald Trump’s former inner circle, including campaign manager Bill Stepien, Attorney General William Barr, campaign adviser Jason Miller and his own daughter Ivanka Trump, who all said Trump ignored them on election night in November 2020 when they argued against declaring victory. They described how Trump instead turned to his lawyer Rudy Giuliani, who they said was drunk when he urged Trump to claim he’d won and say the election was being stolen.

      • ScheerpostCaptain Zelensky and the War Crimes that Never Happened

        The corporate media landscape has saturated our feeds with images of NATO allies as superheroes, science fiction and fantasy protagonists, and pop culture icons.

      • ScheerpostAmerica’s Gun Fetish | Chris Hedges

        Author and Pulitzer Prize winning journalist, Chris Hedges, explains America's gun fetish, why people in America cling to its guns, and what we must do if we ever hope to change this culture.

      • TruthOutCovert US Operations in Africa Are Sowing the Seeds of Future Crises
      • TruthOutDemocrats Introduce Bill to Slash $100 Billion From Pentagon Budget
    • Environment

      • Common DreamsUN Climate Chief Warns Trump Win in 2024 Would Spell Disaster for Planet

        The outgoing United Nations climate chief warned Monday that a victory by Donald Trump—or any other Republican ally of the fossil fuel industry—in the 2024 U.S. presidential election would represent a fatal setback for efforts to limit global warming to 1.5€°C by the end of the century.

        "Well, yes," Patricia Espinosa, executive secretary of the United Nations Framework Convention on Climate Change (UNFCCC), told Politico when asked whether Trump or another Republican president similarly hostile to climate action would spell doom for the Paris Agreement's lower-end warming target.

      • Common DreamsHouse Swept Into Yellowstone River as Record Flooding Offers Yet Another Glimpse of Climate Crisis

        Footage circulating on social media Tuesday showed a home in Gardiner, Montana crashing into the flooded Yellowstone River after rushing water undermined the foundation and broke the house's stilts, offering what climate campaigners warn is a picture of the kind of catastrophe likely to become more common as the climate crisis worsens.

        "A hot world means more rain," said author and 350.org co-founder Bill McKibben in response to the video.

      • Common DreamsOpinion | How Fossil Fuel Executives Overheated US Public Classrooms

        As brutal heat waves creep further into the school year, cash-strapped school districts that previously didn't need cooling systems are struggling to afford the air conditioning they now need to keep students safe in the face of climate change.

      • Common Dreams'The New Normal': 100 Million+ People Across US Face Extreme Heat

        The climate crisis continues to bite in the U.S. this week with nearly one-third of people€ in the€ country living under€ heat advisories and warnings€ on Tuesday as high temperatures were reported from the Gulf Coast to the Upper Midwest and across the Southeast.

        More than 107 million people are being advised to stay indoors as possible to avoid record-setting heatwaves that have been reported across the country in recent days, moving eastward and expected to continue for at least the next two weeks.

    • Finance

    • AstroTurf/Lobbying/Politics

      • VOA NewsChina Wins Battle of Perception Among Young Africans

        By contrast, U.S. influence has dropped by 12% since 2020, according to the survey of more than 4,500 Africans 18 to 24 years old and living in 15 countries across Africa.

        Seventy-seven percent of young Africans said China was the “foreign actor” with the greatest impact on the continent, while giving the U.S. an influence rating of just 67%. In a follow-up question on whether that influence was positive or negative, 76% said China’s was positive, while 72% said the same of the U.S.

      • ScheerpostJohn Kiriakou: The Triumph of “Bloody Gina,” the CIA’s Torture Queen

        Described in the media as a “seasoned intelligence veteran,” Haspel had been at the CIA for more than 30 years, both at Headquarters and in senior positions overseas. And throughout that entire period, she tried hard to stay out of the public eye. Then-outgoing CIA director and Mike Pompeo at the time lauded her “uncanny ability to get things done” and said that she “inspires those around her.” I’m sure that was true for some, but many of the rest of us who knew and worked with Gina Haspel at the CIA called her “Bloody Gina.”

        The New York Times and Washington Post have written extensively about Haspel’s background, especially overseas. The CIA will not let me repeat her resume here, calling it “currently and properly classified.” I won’t go down that road. But I will say that it was Haspel who carried out her master’s instructions to destroy videotaped evidence of the torture of Abu Zubaydah, mistakenly thought to have been the third-ranking person al-Qaeda. And that was after the White House Counsel specifically told her to not destroy it. She made no apologies. I would call that “obstruction of justice,” a felony.

      • Common DreamsOpinion | Trump Isn't on Trial—All of Us Are

        The House Select Committee on Jan. 6 has detailed what at some level we already knew. Trump lost the election. He knew it. His advisers knew it. His Justice Department knew it. The courts confirmed it. There was no evidence of voter fraud. Trump lied—and continues lying to this day.

      • Common Dreams'Indefensible': White House Confirms Biden Expected to Meet With Saudi Crown Prince

        U.S. President Joe Biden faced a firestorm of criticism Tuesday after the White House confirmed he will visit Saudi Arabia next month and is expected to meet with Crown Prince Mohammed bin Salman.

        Concerns have mounted in recent weeks in response to reporting during the planning stage of Biden's mid-July trip, given the kingdom's human rights record and the 2018 assassination of journalist Jamal Khashoggi—which U.S. intelligence officials concluded was approved by the crown prince, or MBS.

      • Telex (Hungary)Fidesz group leader urges secret service to monitor NGOs and media platforms funded from abroad
      • The NationWhy Prosecutorial Reform Will Outlive Chesa Boudin’s Recall

        Dead on arrival.

      • Democracy NowPennsylvania GOP Election Official Tells Jan. 6 Comm. His Family Faced Death Threats Because of Trump

        The House Select Committee to Investigate the January 6th Attack heard live testimony Monday from Al Schmidt, the sole Republican on the Philadelphia County Board of Elections in Pennsylvania, a key battleground state in the 2020 election. He described how he found no evidence of voter fraud in 2020, and said he and his family received death threats after Trump lashed out at him on Twitter for not halting the vote count due to false claims of fraud.

      • TruthOutGarland Says DOJ Is Watching Jan. 6 Hearings, Could Decide on Charges Later
      • ScheerpostPatrick Lawrence: Biden’s Summit of No-Shows

        This could prove an historic shift, reversing more than a century of usually coercive influence in Latin America.

      • TruthOutRepublican Witnesses Are Making a Damning Case Against Trump… 17 Months Late
      • MeduzaAnatomy of a fake: Someone published a speech attributed to Putin’s ‘domestic policy czar,’ but was it to smear him or to test his vision for eastern Ukraine?

        On June 12, when Russians celebrated “Russia Day,” the pro-government newspaper Izvestia published an article signed by Sergey Kiriyenko, Vladimir Putin’s first deputy chief of staff and domestic policy czar. The text, titled “Sergey Kiriyenko’s Message on Russia Day,” said that “all Russia will rebuild the Donbas, which has been destroyed by the fascists” at the expense of trillions of taxpayers’ rubles, “even at the cost of a temporary decline in the nation’s living standards.” The article quickly disappeared, and the newspaper later attributed the text itself to hackers. Multiple sources told Meduza special correspondent Andrey Pertsev that they believe Kiriyenko’s rivals at home (including opponents of the invasion of Ukraine) could be responsible for hacking Izvestia (though some wonder if he didn’t engineer the incident himself to speak publicly with plausible deniability).

    • Censorship/Free Speech

      • The HillWikipedia appeals Russian court order to remove information about Ukraine invasion

        The court also found that the foundation operates inside Russian territory, which would require it to comply. However, Wikimedia asserts that the country does not have jurisdiction over the organization.

        The foundation also argues that the requests for the removal of information “constitutes a violation of human rights.”

    • Freedom of Information / Freedom of the Press

      • Deutsche WelleEuropean rights court rules against Russia's foreign agent law

        The European Court of Human Rights (ECHR) on Tuesday said a law that allows Russian authorities to crack down on NGOs, media outlets, and others — by designating them "foreign agents" — violates its human rights convention.

        Russia uses the term to label organizations that it claims are engaged in political activity with foreign support.

      • VOA NewsZimbabwe Court Convicts NY Times Freelancer of Flouting Country’s Immigration Laws

        A court in Zimbabwe has found a New York Times freelance journalist guilty of flouting immigration laws and sentenced him to a suspended two-year prison sentence and a $1,000 fine.

        A court in the city of Bulawayo convicted and sentenced 37-year-old Jeffrey Moyo to two years in prison, suspended for a fine of about $1,000, at the official rate. Beatrice Mtetwa, one of Moyo’s lawyers, spoke to VOA from Bulawayo, via WhatsApp.

    • Civil Rights/Policing

    • Internet Policy/Net Neutrality

      • EDRIThe European Commission threatens to undermine the core values of the free and open [Internet]

        The proposal will harm freedom of expression, freedom to access knowledge, and freedom to conduct business and innovation in the EU. It will hurt Europe’s [Internet] economy and create unprecedented bureaucratic barriers that will slow growth in a recovering economy. That’s why 34 civil society organisations urge Commissioner Vestager and Commissioner Breton to challenge the short-sighted and self-interested demands of the telecom industry and to ensure a free and open [Internet].

    • Monopolies

      • Trademarks

        • The Verschwörhaus is moving and needs your help!

          Since then we have had many exhausting, nerve-racking and sadly also personally draining negotiations with the administration - unfortunately not on equal footing. All our efforts have now failed. The city administration showed no understanding for voluntary commitment and even registered “Verschwörhaus” as a trademark behind our backs - against which we filed an objection.

          Now the city administration is also throwing us out of the space at the Weinhof. We decided not to sign the city’s “contract of use” at our last community meeting. The city wanted to force us to give up our name and our public channels (website, email address, etc.), and to give us hardly any room to shape the content of what happens under the label “Verschwörhaus” in future. We cannot agree to this.

      • Copyrights

        • Torrent FreakPublishers & Internet Archive Both Seek Piracy Lawsuit Win Without Full Trial

          In 2020, publishers Hachette, HarperCollins, John Wiley and Penguin Random House sued the Internet Archive claiming that its mass scanning and lending of print library books is straightforward piracy. With the defendants relying on a fair use defense, both sides are now asking the court to decide the case in their favor, without need for a full trial.



Recent Techrights' Posts

Sven Luther, Lucy Wayland & Debian's toxic culture
Reprinted with permission from disguised.work
 
Links 19/04/2024: Israel Fires Back at Iran and Many Layoffs in the US
Links for the day
Russell Coker & Debian: September 11 Islamist sympathy
Reprinted with permission from disguised.work
Sven Luther, Thomas Bushnell & Debian's September 11 discussion
Reprinted with permission from disguised.work
G.A.I./Hey Hi (AI) Bubble Bursting With More Mass Layoffs
it's happening already
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 18, 2024
IRC logs for Thursday, April 18, 2024
Coroner's Report: Lucy Wayland & Debian Abuse Culture
Reprinted with permission from disguised.work
Links 18/04/2024: Misuse of COVID Stimulus Money, Governments Buying Your Data
Links for the day
Gemini Links 18/04/2024: GemText Pain and Web 1.0
Links for the day
Gemini Links 18/04/2024: Google Layoffs Again, ByteDance Scandals Return
Links for the day
Gemini Links 18/04/2024: Trying OpenBSD and War on Links Continues
Links for the day
IRC Proceedings: Wednesday, April 17, 2024
IRC logs for Wednesday, April 17, 2024
Over at Tux Machines...
GNU/Linux news for the past day
North America, Home of Microsoft and of Windows, is Moving to GNU/Linux
Can it top 5% by year's end?
[Meme] The Heart of Staff Rep
Rowan heartily grateful
Management-Friendly Staff Representatives at the EPO Voted Out (or Simply Did Not Run Anymore)
The good news is that they're no longer in a position of authority
Microsofters in 'Linux Foundation' Clothing Continue to Shift Security Scrutiny to 'Linux'
Pay closer attention to the latest Microsoft breach and security catastrophes
Links 17/04/2024: Free-Market Policies Wane, China Marks Economic Recovery
Links for the day
Gemini Links 17/04/2024: "Failure Is An Option", Profectus Alpha 0.5 From a Microsofter Trying to Dethrone Gemini
Links for the day
How does unpaid Debian work impact our families?
Reprinted with permission from Daniel Pocock
Microsoft's Windows Falls to All-Time Low and Layoffs Reported by Managers in the Windows Division
One manager probably broke an NDA or two when he spoke about it in social control media
When you give money to Debian, where does it go?
Reprinted with permission from Daniel Pocock
How do teams work in Debian?
Reprinted with permission from Daniel Pocock
Joint Authors & Debian Family Legitimate Interests
Reprinted with permission from Daniel Pocock
Bad faith: Debian logo and theme use authorized
Reprinted with permission from Daniel Pocock
Links 17/04/2024: TikTok Killing Youth, More Layoff Rounds
Links for the day
Jack Wallen Has Been Assigned by ZDNet to Write Fake (Sponsored) 'Reviews'
Wallen is selling out. Shilling for the corporations, not the community.
Links 17/04/2024: SAP, Kwalee, and Take-Two Layoffs
Links for the day
IRC Proceedings: Tuesday, April 16, 2024
IRC logs for Tuesday, April 16, 2024
Over at Tux Machines...
GNU/Linux news for the past day