[FR] Richard Stallman’s Talk This Past Summer in France (There Were More Such Talks)

Posted in FSF, GNU/Linux at 9:53 pm by Dr. Roy Schestowitz

Summary: From this video’s description: “Conférence de M. Richard STALLMAN, portée sur le rapport logiciel libre et État, qui s’est tenue lors du 8ème Congrès de l’ADULLACT le mercredi 15 juin 2022.”

Linux Has ‘Won’ (Android, GNU/Linux, and ChromeOS Have Majority Market Share), But GNU and Software Freedom Still Have a Long Way to Go

Posted in Free/Libre Software, GNU/Linux at 9:36 pm by Dr. Roy Schestowitz

Last week: In World’s Largest Population, GNU/Linux Rises to 8% Market Share (Not Even Counting Android)

India Linux share
Windows is at its lowest point this year (for desktops/laptops) as GNU/Linux hovers at around 3% worldwide (not counting ChromeOS and Android, whose kernel is Linux) and in India at almost 9% right now (screenshot above)

Summary: Free Software Foundation (FSF) leadership needs to become more vocal and more visible; the world is, indeed, shifting towards Linux, but many Linux-based operating systems mean nothing to users’ freedom

THE FSF has been eerily quite so far this year. It mentions meetings in IRC, it publishes summaries of these, but apart from that not much has happened. Richard Stallman lists only 2 talks that he gave this year (there are probably a few more; not all are listed in that page), but that’s not enough. Some FSF supporters that we spoke to believe that the FSF should be more active and proactive. At the same time it’s hard to ignore the fact that the FSF has suffered financial losses in recent years. Here is a screenshot:


It seems absurd that while billions of machines run GNU, the organisation that’s its guardian barely raises a million bucks. Unlike the Linux Foundation, it doesn’t pick up bribes from Linux-hostile companies.

Software Freedom is one among many objectives we have here. To the FSF, Software Freedom is the principal objective. We hope that FSF will find its rhythm back. The latest two IRS forms list “JOHN SULLIVAN (EXECUTIVE DIRECTOR)” and “JOHN HSIEH (DEPUTY DIRECTOR)” as principal staff. From what we can gather, neither is fully involved anymore. John Sullivan is now listed as “Advisor, Clerk” instead of “Outgoing”. Zoë Kooyman, the new Executive Director, wrote less than a handful of blog posts this year.

Even if 100% of the world ran “Linux” (Android for instance), it would not mean that users enjoy freedom. In fact, it’s very important to convey the key concepts for users to be able to grasp that.

Links 04/09/2022: The GNU Hackers’ Meeting 2022 Coming

Posted in News Roundup at 3:30 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Instructionals/Technical

      • ID RootHow To Install Apache Tomcat on Rocky Linux 9 – idroot

        In this tutorial, we will show you how to install Apache Tomcat on Rocky Linux 9. For those of you who didn’t know, Apache Tomcat is an open-source web server that allows you to run web applications written in Java. Apache Tomcat software powers numerous large-scale, mission-critical web applications across a diverse range of industries and organizations.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the FApache Tomcat on Rocky Linux. 9.

      • DebugPointGNOME Extensions in Ubuntu and Other Linux: Install and Usage

        Here’s how you can install and use GNOME Extensions in Ubuntu and other Linux distros.

        GNOME Shell Extensions are the code written by third-party developers for extending the GNOME desktop user experience. The extensions are similar to Firefox, and Chrome’s “Add on” which you may already be aware of.

        There is a huge library of shell extensions available on the GNOME extension website. By installing those, you can extend your desktop experience to any level using the GNOME extensions in Ubuntu and other GNOME-based desktops such as Fedora workstations.

        Now, there are two ways you can install the GNOME Extensions. An easy and modern way. And the old and difficult way.

      • OMG UbuntuHow to Make Console Your Default Terminal App on Ubuntu – OMG! Ubuntu!

        Ubuntu developers have decided not to make GNOME’s Console the default terminal emulator in the upcoming Ubuntu 22.10 release, but that doesn’t meant you can’t.

        Console is billed as a “simple user-friendly terminal emulator for the GNOME desktop” and, by all accounts, that’s exactly what it is. Functionally speaking, it’s not as avanced as GNOME Terminal, which is the VTE Ubuntu and most Linux distros that ship the GNOME desktop environment use.

        But honestly? Speaking as a Linux user who uses the terminal daily for package management, system monitoring, and playing around with awesome command line tools like ncdu, mapscii, and musikcube, I’m yet to encounter anything Console can’t do.

      • url redirect tracer with curl
      • Ubuntu HandbookReplace ‘Activities’ with Current Workspace Name in Ubuntu 22.04 / Fedora 36 | UbuntuHandbook

        This simple tutorial shows how to set custom names for your desktop workspaces, and replace “Activities” in the top-left with the current workspace name you specified.

        Today’s desktop operating systems mostly have multiple desktops to group app windows in different screen. These virtual desktops in GNOME (default desktop environment in Ubuntu/Fedora Workstation) are called workspaces. And, each workspace can have its own name.

      • Data SwampNixOS specific feature: specialisations
      • Data SwampMy BTRFS cheatsheet

        I recently switched my home “NAS” (single disk!) to BTRFS, it’s a different ecosystem with many features and commands, so I had to write a bit about it to remember the various possibilities…

      • VideoE85: Tech Talk: Hugo Website Builder, I’ve Reach My YouTube Ceiling, Plex Breach – Invidious

        Tech Mentorship! Please enjoy the video and if you have any questions, leave a comment down below. My goal is to expand the Linux community.

      • VideoPlex Media Server | Install on Ubuntu 22.04 LTS – Invidious

        What’s up, guys!!! In this tutorial, we’ll walk you through installing Plex Media Server on Ubuntu 20.04 LTS. Plex is a streaming media server that lets you organize your video, music, and photo collections and stream them to all of your devices at any time and from anywhere.

    • Games

      • HowTo Geek15 Video Games to Try If You Don’t Play Games

        Some of the titles we’ve highlighted below are available on most modern smartphones, including both Android and iPhone. If you have a tablet like an iPad, there are often optimized versions available for that hardware too. Others are available to play on a computer running Windows, macOS, and Linux.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • OMG UbuntuEvolution Email Client Now Uses a Headerbar/CSD

          I checked in with the latest development builds of Evolution ahead of the GNOME 43 release just to make sure I wasn’t missing anything major and guess what? I was missing something major: the introduction of header-bars!

          I don’t feel like header bars are as controversial now as they were a few years back, but such is the path of progress: people don’t a change, get used to a change, adopt the change as a new baseline normal, and then kick when things change again — rinse, repeat, ad infinitum

        • Welcome to Pitivi GSoC Update 4

          Hey everyone, hope you are doing fine. This is my fourth update related to Pitivi GSoC, and this time I got a bit late at publishing, more details later on in this blog, so keep reading :)

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • GNU Projects

      • The GNU Hackers’ Meeting 2022 is less than one month away – 2022-09-04 20:21 (last update: 2022-09-04 20:37)

        The GNU Hackers’ Meetings are a venue to discuss technical topics related to GNU and free software. GNU Hackers’ Meetings have been taking place since 2007: you may want to look at the pages documenting most past editions which in many cases also include presentation slides and video recordings.

        The event atmosphere is always friendly and informal. Anybody is welcome to register and attend, including newcomers.

        The next GNU Hackers’ Meeting will take place in İzmir, Turkey on Saturday 1st and Sunday 2nd October 2022.

        We updated the GHM 2022 web page with information about the venue, accommodation and transportation.

    • Programming/Development

      • Matt RickardThe Commoditization of Large Language Models: Part 2

        Since I wrote Commoditization of Large Language Models almost two months ago, things have progressed much faster. There are now two serious competitors to DALL-E: Midjourney and Stable Diffusion. DALL-E pricing hasn’t changed, but GPT-3 is now cheaper.


        The cost moat is nearly gone – new models are trained cheaper, on non-proprietary data, on commodity hardware. Access to these models is trending open rather than closed.

      • GeshanThings tech recruiters look for in your resume and first interview part 3

        Have you applied to 10s of tech jobs and never heard back from anyone? Are you sure that your resume does its main job of getting that first call from the recruiter? Do you want to know what tech recruiters look for in the initial call? If any of your answers were yes, you must read this post.

        In this piece, you will hear from three amazing tech recruiters from Sydney’s popular companies reveal the secrets behind a great resume and acing that initial call with the recruiter. Stay tuned!

      • Lee Yingtong LiRobust Poisson regression in medical biostatistics

        Log-binomial and robust (modified) Poisson regression are common approaches to estimating risk ratios in medical biostatistics [1].

        I have discussed log-binomial regression in a previous post about generalised linear models. The conceptual basis for using log-binomial regression to estimate risk ratios is straightforward – it is natural to specify a binomial (Bernoulli) distribution for a binary outcome, and a log link puts the parameter estimates on the risk ratio scale.

        Robust Poisson regression, on the other hand, seems harder to justify. Under the usual parametric view of generalised linear models, it seems to assume a Poisson distribution for a binary outcome, which is incorrect, as a Poisson-distributed variable can take any non-negative integer value, but the outcome can only either happen or not.

      • RlangData Science Challenges in R Programming Language | R-bloggers

        Data Science Challenges in R Programming Language, Take-home challenges in data science will force you to step outside of your comfort zone.

        But guess what?

        That’s advantageous because it’s the one area where you’ll actually learn stuff. Both novice and expert R programmers must learn to master the take-home problems, but the challenges you’ll tackle will differ greatly depending on your degree of expertise.

      • RlangTraining and Testing Data in Machine Learning | R-bloggers

        If you are interested to learn more about data science, you can find more articles here finnstats.

        Training and Testing Data in Machine Learning, The quality of the outcomes depend on the data you use when developing a predictive model.

        Your model won’t be able to produce meaningful predictions and will point you on the wrong path if you are using insufficient or incorrect data.

      • RlangWhat are the algorithms used in machine learning? | R-bloggers

        If you are interested to learn more about data science, you can find more articles here finnstats.

        What are the algorithms used in machine learning?, In less than a minute, this article will explain some of the most popular machine learning algorithms, making them easier to understand for everyone.

      • Lawrence TrattLaurence Tratt: A Week of Bug Reporting

        If you use software regularly, and have your wits about you, you will often realise that you’ve encountered a bug — in other words, that the software has done (or not) something that it shouldn’t (or should have). When this happens, the vast majority of people moan to the nearest bystander about how incompetent the people behind the software are and then carry on with whatever they were doing — often stumbling into the same bug repeatedly. Only a minority of people think of reporting bugs and, if they do think of it, they often fail to do so either because they think it’s too time-consuming or that they might end up looking silly.

        It’s unfortunate that so few people report bugs. First, surprisingly few bugs affect a single person: by the time someone does report a bug, it can have affected hundreds or thousands of other people. We can’t all be freeloaders — someone has to take the plunge and report the bug. Second, bugs frequently appear in contexts unfamiliar to the software’s developers [1]. Most obviously, we all have slightly different software installations, and those variations can cause odd effects. Less obviously, users often use software in ways unimagined by its creators, such that some previously untested combinations of operations work incorrectly [2]. Either way, we cannot assume that the software’s developers will encounter the same bugs that we do: in many cases, if we don’t report bugs, the developers simply won’t know they exist.

      • ButtondownGiving Names to Things • Buttondown

        First of all, new post: Software Mimicry! It’s about a thing I’ve seen in a lot of software tools and products that I was trying to capture in a single term, so I could share it and explore what it actually means for things. It’s also a rewrite and expansion of one of my very first newsletters: on emulation.
        I find myself fascinating with terms. Mimicry is something I see in a lot of different places, and I’ve seen people identify particular instances of it, but not connect the dots and discuss the abstract concept of mimicry. Is “articulating” mimicry into a distinct term useful? I think so! By having a term for something you can discuss it as a thing instead of being forced to gesture vaguely at it through examples.

        Take, for example, “side effect”. A side effect is when a function changes the outside world in addition to computing a value. Changing a global value is a side effect. Allocating or freeing memory is a side effect. Updating the cache, advancing the RNG, and making a POST request are all side effects. Side effects are generally something that increases software complexity, so are often implicitly avoided, or explicitly embedded in software constructs like monads and algebraic effects.

      • Austin Z HenleyMeasuring demand for a feature: An economics approach

        How bad do users want a feature in your software?

        What if we could use good ole economics to answer the question? The supply of new features you can provide in your software is limited, so measuring the demand accurately is vital.

        Let’s think about how we could measure the demand for a feature…

        We could ask users what they want. Interview or survey them. Take a poll and give them a few options. Or scrape forums and social media to see what they’re already asking for. Maybe even show them a mockup and get their feedback. Do they say they can’t live without it? These are all standard methods in a user researcher’s toolbox.

        The economics term for this is stated preference, what someone says they want. The problem is that stated preference often does not align with revealed preference, that is, what someone’s actions reveal to be their preference. To put simply, just because a user says they want a feature doesn’t mean they will actually use it. I’ve even written about my own experience where these did not align: When users never use the features they asked for.

      • Python

        • Free Python Tutorial For Beginners: Learn Python – Python Land

          Are you looking to learn Python? Look no further. This free Python tutorial contains 100+ carefully crafted, free Python articles full of information, practical advice, and Python practice! We’ll dive into the basics and work our way up to advanced concepts. I’ll provide you with many examples to explain all the concepts clearly.

    • Standards/Consortia

  • Leftovers

    • Tim Brayongoing by Tim Bray – Long Links

      Matt Stoller is a full-time anti-monopoly activist and offers an interesting look at a proposed mega-merger in the big-publishing world, characterizing it as Free Speech on Trial. I think he’s 100% right.

    • Ruben SchadeRubenerd: Switching to black coffee/tea as we get older

      “Optimised”… I just made coffee sound like software.

    • RachelEcho reply (an incomplete update on things)

      For the record, I’m still here. I’m still pissed off at the state of affairs in my country, and I’m still taking my usual summer break, so there’s been no writing.

      I appreciate that several people have checked in, naturally.

    • Science

      • 3D artificial pneumatic muscles for future “makers” – iiTalk

        The research has been published in Science Robotics. One of the first demonstrations is that of a pneumatic hand made using a simple 3D printer

      • uni Rutgers3D Printing Process Created by Rutgers Researchers Is Faster and More Precise Than Conventional Methods | Rutgers University

        Known as Multiplexed Fused Filament Fabrication, the technique “could be a game changer for the 3D-printing industry,” says lead author of study

      • New York TimesThe Animal Translators – The New York Times

        The naked mole rat may not be much to look at, but it has much to say. The wrinkled, whiskered rodents, which live, like many ants do, in large, underground colonies, have an elaborate vocal repertoire. They whistle, trill and twitter; grunt, hiccup and hiss.

        And when two of the voluble rats meet in a dark tunnel, they exchange a standard salutation. “They’ll make a soft chirp, and then a repeating soft chirp,” said Alison Barker, a neuroscientist at the Max Planck Institute for Brain Research, in Germany. “They have a little conversation.”

        Hidden in this everyday exchange is a wealth of social information, Dr. Barker and her colleagues discovered when they used machine-learning algorithms to analyze 36,000 soft chirps recorded in seven mole rat colonies.

      • New algorithm uncovers the secrets of cell factories – Chalmers

        Drug molecules and biofuels can be made to order by living cell factories, where biological enzymes do the job. Now researchers at Chalmers University of Technology have developed a computer model that can predict how fast enzymes work, making it possible to find the most efficient living factories, as well as to study difficult diseases.

        Enzymes are proteins found in all living cells. Their job is to act as catalysts that increase the rate of specific chemical reactions that take place in the cells. The enzymes thus play a crucial role in making life on earth work and can be compared to nature’s small factories. They are also used in detergents, and to manufacture, among other things, sweeteners, dyes and medicines. The potential uses are almost endless, but are hindered by the fact that it is expensive and time consuming to study the enzymes.

        “To study every natural enzyme with experiments in a laboratory would be impossible, they are simply too many. But with our algorithm, we can predict which enzymes are most promising just by looking at the sequence of amino acids they are made up of”, says Eduard Kerkhoven, researcher in systems biology at Chalmers University of Technology and the study’s lead author.

    • Hardware

    • Health/Nutrition/Agriculture

      • Eating more ultra-processed foods associated with increased risk of dementia

        People who eat the highest amounts of ultra-processed foods like soft drinks, chips and cookies may have a higher risk of developing dementia than those who eat the lowest amounts, according to a new study published in the July 27, 2022, online issue of Neurology®, the medical journal of the American Academy of Neurology. Researchers also found that replacing ultra-processed foods in a person’s diet with unprocessed or minimally processed foods was associated with a lower risk. The study does not prove that ultra-processed foods cause dementia. It only shows an association.

      • Daily Exposure to ‘Forever Chemicals’ Costs United States Billions in Health Costs | NYU Langone News

        Daily exposure to a class of chemicals used in the production of many household items may lead to cancer, thyroid disease, and childhood obesity, a new study shows. The resulting economic burden is estimated to cost Americans a minimum of $5.5 billion and as much as $63 billion annually.

        The new work revolves around per- and polyfluoroalkyl substances (PFAS), a group of more than 4,700 manmade chemicals that experts have detected for decades in the blood of millions of people. The chemicals are used, for example, in the production of water- and oil-resistant clothing, electronics, and nonstick cookware, and people are thought to ingest them as food comes into contact with packaging. The substances are believed to disrupt the function of hormones, signaling compounds that influence many bodily processes.

    • Security

      • uni TorontoLarge scale Internet SSH brute force attacks seem to have stopped here

        The last time I paid attention to what happened when you exposed an SSH port on the Internet was years and years ago, when I gave up being annoyed by log messages and either stopped paying attention or firewalled of my SSH ports from the general Internet. Back then, it was received wisdom (and my general experience) that having an SSH port open drew a constant stream of SSH brute force attacks against a revolving cast of whatever logins the attackers could come up with.

        Recently I set up a Grafana Loki setup that captures our systemd logs. As part of getting some use out of it (beyond questions about how server clocks drift), I built a Grafana dashboard that reports on SSH authentication failures across our Ubuntu fleet (among other things). What I saw surprised me, because what our exposed SSH servers experience today seems to be nothing like it was in the past.

      • Ruben SchadeRailway interest in IoT devices growing

        Industrial IoT has amazing potential. But in the words of Mikko Hyppönen, anything smart is vulnerable. Implementation will be key.

      • Ransomware attacks: 75 percent spike in attacks on Linux OS users in first half of 2022 [Ed: Copy-pasting the FUD from a private firm that targets Windows and isn't interested in Linux success; in fact, this helps distract from the real target of ransomware, which is Windows (about 900-95% of the time)]
      • Privacy/Surveillance

        • The WirePegasus Row: Why Initial Global Outrage Didn’t Translate into Appetite for Accountability

          For years, there had been lingering concern about the use of NSO group’s Pegasus software. But, the controversy over the military-grade cyber weapon erupted a year ago with the publication of the collaborative global investigation known as the Pegasus Project, led by Forbidden Stories and 16 other media organisations.

          It led to an immediate reaction from most of the countries involved or were impacted through the use of Pegasus spyware. The NSO Group has denied the allegations of abuse of the spyware and asserted that it only licenses the powerful software to national governments.

          The Wire has tracked the twists and turns in the diplomatic consequences of the Pegasus project in the last year.

        • The WireOne Year After Pegasus Project Revelations, the State of Israel Continues to Evade Scrutiny

          In the 1980s, when the State of Israel was the main arms supplier to the apartheid regime in South Africa, no one believed Israel’s denials and attempts to remove responsibility from itself to private Israeli companies.

          Since September 1979, Israel’s representative to the United Nations repeatedly announced in written statements that the State of Israel was complying with the UN Security Council’s arms embargo on South Africa.

          For decades, Israel followed its policy of silence. For example, the deputy director of the Ministry of Foreign Affairs, Hanan Bar-On, wrote in his telegram to the ministry director, David Kimchi, on August 29, 1984, “The Israeli policy … is that we do not in any way admit [such sales] to an Israeli or to a foreign actor and certainly not to an American Congressman, even if he is considered a friend and the relationship with him is supposedly intimate.”

    • Defence/Aggression

      • CNNAn ‘imposter Christianity’ is threatening American democracy

        Three men, eyes closed and heads bowed, pray before a rough-hewn wooden cross. Another man wraps his arms around a massive Bible pressed against his chest like a shield. All throughout the crowd, people wave “Jesus Saves” banners and pump their fists toward the sky.

        At first glance, these snapshots look like scenes from an outdoor church rally. But this event wasn’t a revival; it was what some call a Christian revolt. These were photos of people who stormed the US Capitol on January 6, 2021, during an attempt to overturn the results of the 2020 presidential election.

    • Finance

      • Yanis VaroufakisInflation as a Political Power Play Gone Wrong – Project Syndicate op-e – Yanis Varoufakis
      • Ujjwala: Over 9 million beneficiaries did not refill cylinder last year, Centre admits

        Liquified Petroleum Gas (LPG) connections distributed to women under the Pradhan Mantri Ujjwala Yojana (PMUY) are gathering dust. Beneficiaries have not been able to fill cylinders due to high prices of LPG. The Centre has itself admitted this.
        Rameshwar Teli, minister of state for petroleum and natural gas told the Rajya Sabha August 1, 2022 that 9.2 million customers did not take any refill in 2021-22.
        He added that 10.8 million customers took only one refill (Refills being given with connections). Thus, 20 million of the 93.4 million beneficiaries of PMUY took a maximum of one refill.

      • The Wire88% of Over 9,000 Punjab Farmers Who Died by Suicide in 18 Years Were Debt-Ridden: Study

        The Panjab Agriculture University study examined deaths by suicide among farmers between 2000 and 2018 in six districts of the state.

      • Michael West MediaYou gotta pay the troll toll to get in! – Michael West

        With road tolls about to hike with inflation, Victorian and NSW governments face motorist anger heading into their respective state elections. Michael West reports on the upshot of privatisations which have left one company, Transurban, with a monopoly of monopolies.

      • Michael West MediaFor whom the toll bells: Transurban’s profits, motorists’ losses and looming toll hikes – Michael West

        With road tolls about to hike with inflation, Victorian and NSW governments face motorist anger heading into their respective state elections. Michael West reports on the upshot of privatisations which have left one company, Transurban, with a monopoly of monopolies.

        Over in the UK, they are calling it the “Poonami”. Rivers polluted beyond legal limits, holiday-makers told they can’t swim at beaches because of the sewage. And they are pointing the bone at the privatisation of Britain’s water companies. The profits are going to shareholders rather than things like fixing leaking pipes.
        The water bosses are making out like bandits, enjoying a 20% surge in pay last year while companies are busy charging as much as they can and slotting the excess cash to their shareholders rather than stopping human effluent draining into the waterways.

      • The Origin of Student Debt: The Danger of Educated Proles

        WITH THE vociferous debate over President Joe Biden’s announcement that the federal government will cancel a portion of outstanding student debt, it’s important to understand how Americans came to owe the current cumulative total of more than $1.6 trillion for higher education.

        In 1970, Ronald Reagan was running for reelection as governor of California. He had first won in 1966 with confrontational rhetoric toward the University of California public college system and executed confrontational policies when in office. In May 1970, Reagan had shut down all 28 UC and Cal State campuses in the midst of student protests against the Vietnam War and the U.S. bombing of Cambodia. On October 29, less than a week before the election, his education adviser Roger A. Freeman spoke at a press conference to defend him.

    • AstroTurf/Lobbying/Politics

      • Michael West MediaDrinks on Albo as he brings up his century on a tame wicket – Michael West

        Anthony Albanese celebrated 100 days as prime minister with an address to the National Press Club on Monday and perhaps a quick skull of a foaming frostie.

        In cricketing terms, his century means he gets to take fresh guard, assess the field settings, and strike out to greater things as the opposition wilts under the onslaught.

        The two-day Jobs and Skills Summit on Thursday and Friday is looking encouraging. The Better Off Overall Test will be a focus. Despite the lowest jobless figures in 48 years, there are massive challenges in the vital sectors of the workforce. But there are indications that employers and unions will try to make the government’s life easier as it grapples with the shortage of skilled workers in vital sectors.

      • Michael West MediaSlaughter on Batman Avenue: Victoria gets election result three months early – Michael West

        If the Victorian election were a boxing match, the ref would have stopped the fight. Except that the election isn’t until November 26.
        The fact that Melburnians suffered one of the world’s longest lockdowns under Covid won’t be enough to stop Premier Daniel Andrews gaining a third term.
        Last weekend Andrews basked in the favourable publicity generated by his announcement of free university places for nursing students. As feelgood stories go, this was a ripper. Meanwhile The Weekend Australian proclaimed on its front page: ”The Andrews era to live on”. The paper’s Newspoll gave Labor a lead of 56-44 (two-party preferred) over the Coalition led by Matthew Guy.
        The Liberals live in a world of pain caused by an internal scandal that has overshadowed Labor’s own internal scandals. Under Guy they ceded the plumb seat of Hawthorn in 2018, and now another stronghold, Kew, is likely to fall to a Teal independent.

    • Civil Rights/Policing

      • The ends of justice: a case of Bilkis Bano

        A lone woman’s painful struggle for justice, and the recent remission granted to 11 convicts who had assaulted her during the 2002 Gujarat riots, sits, disturbingly, at the centre of this poem

      • Role of Muslims in India’s Freedom Struggle | NewsClick

        For all patriotic Indians, it is the worst of times, it is the age of foolishness, it is the epoch of incredulity, it is the season of darkness, it is the winter of despair, we have nothing before us, to paraphrase an epic description of the revolutionary tumult of the French Revolution, by Charles Dickens in his novel The Tale of Two Cities. However, the current situation in India is not about a revolutionary tide. The torrents that India faces today are intensely counter-revolutionary.

        The forces of Hindutva and its allies are ensconced in power and are hell-bent on overturning the Indian constitution and its Preamble. Their chief picking is to undermine secularism. And to do so, they have chosen to demonise the Indian Muslims.

        As you read this article, hundreds and thousands of Indians are being fed the communal pie through WhatsApp University about the inherent ‘anti-nationalism’ of the Indian Muslims. However, even a cursory glance at history would reveal that Indian Muslims not only played a stellar role in the freedom struggle but happily laid down their lives at the altar of the anti-colonial national struggle.

  • Gemini* and Gopher

    • Personal

      • EGILMRY Wordo: UNCAP
      • The joy of not knowing

        Somewhere between seeing something for the first time and knowing everything about it lies a wonderful time of figuring things out, and gaining fluency.

        Not just technical things. I love finding myself getting lost in Central Park, even though I’ve been down every path many times. The occasional feeling of ‘oh-oh, where the **** am I’ is a true joy in my life.

    • Technical

      • Internet/Gemini

        • The Viability of Sneakernets

          ew0k pondered yesterday whether a sneakernet is useful in free, developed countries.^ It seems a modern sneakernet is a solution to a non-existent problem, assuming the activities it supports are not illegal or socially unacceptable.

          Is this actually the case? I think the issue is not so black and white. The degree to which a society is free and a nation is developed is a major factor in my opinion.

          First, a point of pedantry. The title of ew0k’s post refers to free and developed societies, but in the article, the phrase “democratic countries in the developed world” is used. I don’t see free countries and democratic countries as being synonymous. It’s certainly possible for democratic countries not to be free: the majority may choose to give up freedoms for the sake of safety or civil order, or may strip freedoms from the minority for profit or to enforce societal norms. Conversely, free societies may not be democratic: a hypothetical anarchist society has almost unlimited freedom at the level of the individual, but does not have a central government, democratic or otherwise.

        • limiting the connection

          Continuing on the theme of the ideal Internet experience*, I contemplated the possibility of periodically unplugging the Internet from the computer, perhaps using an offpunk browser**, but most importantly, experiencing that disconnection. The feeling of stepping away from the hustle and bustle, of hiding in a cave instead of staying non-stop in the center of a big city. I even wrote recently in my tinylog that I miss the limited access to the net from the days when every minute cost money.

        • Setting a Gopher hole

          As the beginning of the 2021 came through as setting a Gemini capsule, the beginning of the 2022 is coming through as setting a Gopher hole. I’ve decided to sign up for sdf.org account, because there is a big gopher community and I didn’t want to stuck in as some pioneer somewhere else. So it should be easy thing to set up Gopher hole there. No it wasn’t so obvious.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 04/09/2022: GNUnet 0.17.5 and KPhotoAlbum 5.9.0

Posted in News Roundup at 11:44 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Instructionals/Technical

      • Data SwampManaging a fleet of NixOS Part 2 – A KISS design

        Let’s continue my series trying to design a NixOS fleet management.

      • Data SwampLocal peer to peer binary cache with NixOS and Peerix

        There is a cool project related to NixOS, called Peerix. It’s a local daemon exposed as a local substituter (a server providing binary packages) that will discover other Peerix daemon on the local network, and use them as a source of binary packages.

        Peerix is a simple way to reuse package already installed somewhere on the network instead of downloading it again. Packages delivered by Peerix substituters are signed with a private key, so you need to import each computer public key before being able to download/use their packages. While this can be cumbersome, this also mandatory to prevent someone on the network to spoof packages.

        Perrix should be used wisely, because secrets in your store could be leaked to others.

      • Dan Langillensupdate – update failed: REFUSED – Dan Langille’s Other Diary

        A while back, the https://www.freebsddiary.org/topics.php#opteron – the colo facility was purchased and the new owners are not interested in donating services to open source projects.

        That host also acted as a DNS host for all my domain. I pressed a small VPS into service. It handled the query services fine, but updates were sluggish. It took a few hours for it to catch up to Let’s Encrypt renewals.

        To be fair, this $5 box does a decent job as an external monitoring host.

        Over the weekend, I configured another host as a name server.

        Monitoring proved it never lagged with updates.

      • Dan LangilleGetting Home Assistant running in a FreeBSD 13.1 jail – Dan Langille’s Other Diary

        Home Assistant is not friendly for plain installs. It seems designed for containers or running everything out of pip install. That, in itself, is a disturbing trend I’ve seen on several projects (what? you’re not running a git cloned image?).

        I’ve seen reports of people running containers etc. However, I want to run this on FreeBSD. I don’t want to muck about with installing containers etc. If containers are the only way for a project to run, you’re doing it wrong.

        I tried recently and eventually succeeded after several failures. Open source should not be this difficult. The devs seem unware of the problems. A previous attempt in June involved an Ansible playbook. After terrible install this past Tuesday night, I’m going to amend that playbook.

      • RoseHostingHow to Install OpenProject on Ubuntu 22.04 – RoseHosting

        OpenProject is an open-source and free project management software. It is designed to help individuals and businesses manage their project management, issue tracking, scheduling, and other entire project lifecycles. OpenProject is very helpful for team members to track their work and achieve their goals. With OpenProject, you can organize and prioritize your tasks and assign other tasks to other team members. In this tutorial, we will show you how to install OpenProject on Ubuntu 22.04.

      • ID RootHow To Install VeraCrypt on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install VeraCrypt on Linux Mint 21. For those of you who didn’t know, VeraCrypt is free open-source disk encryption software for Windows, macOS, and Linux. The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can also encrypt a partition or the entire storage device with pre-boot authentication.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a VeraCrypt encryption tool on Linux Mint 21 (Vanessa).

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

  • Distributions and Operating Systems

    • Bryan LundukeLinux, Alternative OS, & Retro Computing News – Aug 27, 2022
    • Bryan LundukeLinux, Alternative OS, – Retro Computing News – Sep 3, 2022

      I’m a big fan of AppImage’s — single .ISO images that contain a piece of software, and all of the necessary dependencies to run it on a reasonably modern Linux system. But a big issue is making them. While some tools exist to aid in the packaging of AppImage’s, the process hasn’t exactly been automatic.

      A new Python script entitled “arch2appimage” — gotta love on-the-nose naming — fixes this issue by taking an Arch package (such as from the AUR) and auto-magically turning it into an AppImage. Dependencies and all.

    • Mobile Systems/Mobile Applications

      • postmarketOS // v22.06 SP2: The One That Swipes

        Here it is, after a bit of delay to figure out why the new Phosh version didn’t boot on the Samsung Galaxy S III. Now that the reason is known and a workaround is in place, we also happened to hit the timeframe where fixup versions of these huge Phosh and Phoc releases were made. Enjoy the following changes on stable!

  • Free, Libre, and Open Source Software

    • GNU Projects

      • GNUnetGNUnet 0.17.5

        This is a bugfix release for gnunet 0.17.4..


        Note that due to mirror synchronization, not all links may be functional early after the release.

    • Programming/Development

      • Matt RickardThe Value is in the API

        Not the implementation.
        At my first job, I spent a lot of time digging into the fintech stack. I had become convinced that reverse engineering mobile banking APIs was the technically superior option to screen-scraping. I even took my unsolicited opinion to Hacker News, running into one of the Plaid founders (Plaid, like Yodlee before it, originally used screen-scraping). Plaid turned out to be wildly successful. I learned that the value is in the API, not the implementation. Sometimes a dirty implementation gets the job done.

      • Bozhidar BatsovnREPL 1.0

        Yesterday I released nREPL 1.0. I hadn’t really planned to have the release then, but after cutting CIDER 1.5 (“Strasbourg”) a bit earlier that day, I decided that this was The Day.


        This was quite the journey and I’m happy that we’ve made it to this massive milestone. If I knew how much work I’d need to put in to make nREPL 1.0 a reality back in 2018, I’d probably wouldn’t have volunteered for this task. But I’m very glad that I did! Working on nREPL was much trickier than working on CIDER in many ways and taught me a lot about patience2 and the value of maintaining backward compatibility. Outside of the initial namespace changes we didn’t break backward compatibility at all! Following in the footsteps of my one of my Clojure Heroes (Chas) wasn’t easy either, as I had quite the shoes to fill!

        I’m really glad that mine & Chas’s theory that moving nREPL out of Clojure Contrib would result in more contributions turned out to be correct. We got where we did through the work of many people and I am thankful to all of them! And recently we’ve celebrated the 12th million download of nREPL after it’s development was restarted and I became the project’s maintainer. I hope this means we’re doing something right.

      • Matt RickardHow to Increase Developer Velocity

        Developer velocity is something that every engineering organization wants, but the steps aren’t always clear on how to get it.

      • Xe’s Blogwaifud Progress Report #2 – Xe

        One of the biggest pain points in waifud for me has been the fact that I’ve needed to SSH into one of my development machines in order to do things with it. This is fine, most of the time I usually have an SSH session open to one of those machines and can easily do what I need while hacking away.

      • Rolisteam – Rolisteam Monthly update #3 – August 2022

        Short introduction, the RCSE allows you to create charactersheet for any TTRPG. It is based on a visual editor to draw fields directly upon an image of the charactersheet. The editor part is using: QGraphicsView/QGraphicsScene and a table view to edit each field. Then the final result can be generated to get the sheet in QML.

      • Jussi PakkanenJussi Pakkanen: Questions to ask a prospective employer during a job interview

        Question: Do developers in your organization have full admin rights on their own computer?

        Rationale: While blocking admin rights might make sense for regular office workers it is a massive hindrance for software developers. They do need admin access for many things and not giving it to them is a direct productivity hit. You might also note that Google does give all their developers root access to their own dev machines and see how they respond.

        Question: Are developers free to choose and install the operating system on their development machines? If yes, can you do all administrative and bureaucracy task from “non-official” operating systems?

        Rationale: Most software projects nowadays deal with Linux somehow and many people are thus more productive (and happier) if they can use a Linux desktop for their development. If the company mandates the use of “IT-approved” Windows install where 50% of all CPU time is spent on virus scanners and the like, productivity takes a big hit. There are also some web services that either just don’t work on Linux or are a massive pain to use if they do (the web UI of Outlook being a major guilty party here).

      • Perl / Raku

        • Assuming optionality | Playing Perl 6␛b6xA Raku

          PWC 180 Task 1 asks us to find the first unique character in a string. I wanted to have a nice interface where I would write:


          The idea was to curry postcircumfix:<{ }> so it will be bound to a BagHash and always ask for :!exists. Alas, .assuming doesn’t do the right thing if the proto contains optional positions. I found a workaround utilising once.

      • Shell/Bash/Zsh/Ksh

        • Getting USB TEMPer2 temperature sensor readings into Prometheus (on Linux)

          For reasons outside of the scope of this entry, we recently decided to get some inexpensive USB temperature sensors (we already have a number of old, industrial style temperature sensor boxes). What we wound up getting is the PCsensor TEMPer2; this model and PCsensor’s USB temperature sensors in general seem to be a quite common choice (often resold under some other name). Getting our model going on Linux and getting metrics into our Prometheus setup took some work and head scratching, which I’d like to save other people.

    • Standards/Consortia

      • Daniel AleksandersenTP-Link band-steers 2,4 to 5 GHz Wi-Fi even when the radio is off

        My TP-Link EAP653 (available on Amazon) Wi-Fi access point (AP) has some features that don’t work well together. Who would have thought that its proprietary extensions to the Wi-Fi standard would cause compatibility issues with clients?

        I’ve configured the AP to power down the fast 5 GHz radio at night to reduce its power consumption.
        The 5 GHz band uses less power than 2,4 GHz (faster means shorter transmission time). However, not all devices are compatible with the former. The power savings is about the same during off-peak hours anyway.
        Clients should fall back to the slower 2,4 GHz network and remain connected throughout the night.

      • Business WireUSB4 Version 2.0 Announced
  • Leftovers

    • Ruben SchadeRubenerd: The Mentour Pilot on responsibility

      Petter produces my favourite aviation videos on YouTube. He’s sincere, thorough, avoids sensationalism, and takes the time to explore human and procedural factors when discussing everything from incidents to aircraft design. He’s also just really engaging and fun to watch, and has been responsible for getting me back into playing flight sims again.

    • Security

      • Ruben SchadeRubenerd: Answering “yeah, but is the solution secure?”

        Secure from what? From whom? Where? And for how long?

        Moving from dev and ops to solution architecture has been an eye-opening experience. The first thing you notice is that prospective clients rarely know what they want, and those that do may be confused, have conflicting requirements, or are acting under dangerous misconceptions. I’m sure everyone from business analysts to support engineers know exactly what I’m talking about.

        The challenge with being the interface between sales and engineering is being able to speak to both groups. The former are motivated by KPIs and balance sheets to say “yes!” to everything, and the latter need to build something to a spec. But a sales person who commits to something infeasible is as useful as an engineer who implements an unworkable solution with bad data.

        Security is a perfect example of this struggle in practice. Nobody wants insecure systems, save for pen testers and bounty hunters! Yet ask a businessperson to quantify what they mean when they say a system “has to be secure”, and most can’t. You may get some vague references to encryption, firewalls, VPNs, keys, securing data in flight and at rest, and maybe a tender for flavour, but nothing about how it fits together, or what problems each component is attempting to solve atomically and in aggregate.

      • EarthlyKube-Bench

        CIS security is a community driven and non-profit organization that aims at improving security around the internet. It is the one that creates and updates CIS controls and CIS benchmarks. You can read more about the CIS

      • VideoEnterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery – Invidious

        Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good reason. Automating the compilation, testing, and other aspects of the development process increases efficiency and reliability. Security is another layer of a good CI/CD system, and in this episode, Jay and Joao discuss CI/CD and the security aspects of the popular deployment style.

    • Defence/Aggression

      • Ruben SchadeRubenerd: Latvia’s Soviet-era monument removed 🇱🇻

        I’ve talked about this many times, but I have tremendous affection for the Baltic states, and Latvia in particular. It’s had an oversized influence over my life, from family friends I grew up with and consider family, to schoolmates, colleagues, and their excellent contributions to my industry. I wrote most of my high school assignments on the country and their Lithuanian neighbours, much to the chagrin of one teacher who “had to do extra work” to grade it. 🎻

        I always smiled when I saw Latvia in the headlines, but recently those feelings have turned to concern. Their country, and their neighbours, border an increasingly hostile state, and their NATO allies are connected by a strip of land far too small for comfort, and incursions into their airspace and political sphere are all too common.

    • AstroTurf/Lobbying/Politics

      • Michael West MediaVale Mikhail Gorbachev – a true leader who gave us hope

        Mikhail Gorbachev was not a man of grand gestures, nor an orator who could move the masses. But he single-handedly changed the world to a more peaceful place, at least for a few short years. He was undone by the greed for power of those that didn’t understand him, nor appreciated the magnitude of what he wanted to achieve.

        Even his biographer, William Taubman, failed to adequately explain how it was possible for a man of pacifist leanings, a true believer in socialism (but not in Stalin or communist dogma) managed to survive and eventually thrive in the Soviet system of distrust and division. He survived the aggressions of Nikita Khrushchev and the oppressive ways of Leonid Brezhnev, and continued his slow ascendancy to the top job as general secretary in 1985.

      • Michael West MediaRex Patrick: will Timor-Leste become China’s latest aircraft carrier? – Michael West

        In the wake of Scott Morrison and Marise Payne’s disastrous foreign affairs stewardship, Penny Wong jets to Timor-Leste today in what may be another rescue mission to save a Pacific neighbour from China’s expansion in the region. Rex Patrick has long warned the young nation might spurn Australia in favour of Chinese investment.

        When Penny Wong arrives in Timor-Leste today, I’d like to think she’s had the good sense to refuse to allow the Department of Foreign Affairs and Trade to accompany her, because the problem she’s going there to solve, China taking a larger foothold in Timor, is a problem of DFAT’s exclusive making.

      • Michael West MediaPunishment by partiality: Lendlease white-collars stick to the right side of the law no matter what

        The law is meant to wear a blindfold, meting out equal treatment to rich, poor and everyone in between. And the taxman is supposed to make rulings without fear or favour. Does the handling of corporate high fliers show otherwise? Michael West reports on the big Lendlease tax scam.

        The Australian Tax Office published its latest Tax Crime Prosecution Studies just last month. It features a South Australian man receiving a criminal conviction for providing false documents, a swimming teacher going to jail for attempting to claim $250k of false GST refunds, a doctor sentenced to seven months jail for non-lodgements, a bank manager sentenced to three years’ jail for trying to defraud the Commonwealth of $390,000, a NSW man in for two years for defrauding $171,000, and so on.

    • Civil Rights/Policing

      • Peter Eckersley, may his memory be a blessing – Praise – Let’s Encrypt Community Support

        I’m devastated to report that Peter Eckersley (@pde), one of the original founders of Let’s Encrypt, died earlier this evening at CPMC Davies Hospital in San Francisco.

        Peter was the leader of EFF’s contributions to Let’s Encrypt and ACME over the course of several years during which these technologies turned from a wild idea into an important part of Internet infrastructure. He also took a lot of initiative in coalescing the EFF, Mozilla, and University of Michigan teams into a single team and a single project. He later served on the initial board of directors of the Internet Security Research Group.

        You can find a very abbreviated version of this history in the Let’s Encrypt paper, to which Peter and I both contributed.

      • LWNPeter Eckersley RIP [LWN.net]

        Peter Eckersley, one of the original founders of the Let’s Encrypt non-profit TLS certificate authority, has died suddenly, as reported by Seth Schoen

  • Gemini* and Gopher

    • Personal

      • Music over the years

        Long term music life: 1981 we moved to Portugal and my parents had a tape of Elvis and I loved him. There was also a tape with Icelandic folk songs. A friend of my sisters gave me a tape copy of Bruce Springsteen‘s Born in the USA and Live/1975–85. Back to Switzerland somewhere around 1987, then off to Thailand in 1991. Before we left we bought a CD player and I remember a disc or two of Vangelis and The Cure‘s Desintegration. Back in Switzerland in 1991 I remember getting into U2 with Achtung Baby and Zooropa, as well as discovering The Doors. My interest in Arab music came via Transglobal Underground with singer Natacha Atlas. My wife started oriental dancing around that time and we had a gazillion CDs with music from Morocco to Turkey as she started teaching.

    • Technical

      • —God damn, the Google Play Store is so frustrating…

        God damn, the Google Play Store is so frustrating at times. The other day I wrote about how fast our (Vivaldi browser’s) turn around was for getting out a new build with a critical security fix from upstream. Well to be clear we have a build out for desktop but not Android. Why? … because our build, which was ready at the same time as desktop, is stuck in “review” in the Play Store and hence cannot be made live. This is despite the fact that it has a single fix (for the security issue). A fix I might add that was written by a Google dev and is included in Chrome, which they immediately updated.

      • Managing a fleet of NixOS Part 3 – Welcome to Bento

        I finally wrote an implementation for the NixOS fleet management, it’s called Bento.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

It’s Over 900,000! (Jim Zemlin’s Salary Soared to $1.15 Million in 2019)

Posted in Deception, Finance at 8:52 am by Dr. Roy Schestowitz

Imposter rewards himself: Jim Zemlin’s Salary More Than Doubled in Just 5 Years (From $500,000 to $1,150,000 in Six Years), Unlike Linus Torvalds’ | The Linux Foundation Got Rid of 31 Employees in 2019 (When It Fired All the Editors and All the Contributors of Linux.com Despite Revenue Soaring) | Linux Foundation Revenue Plunges ($18,000,000 Decrease in One Year) and Jim Zemlin’s Wife Has Her Company Sued for Securities Fraud (Class Action) | The Linux Foundation Exceeds $100,000,000 in Revenue and Jim Zemlin Now Pays Himself About a Million Dollars a Year While ‘His’ Foundation Operates at a Loss of $732,261 | Linux Foundation Has Moved to More Expensive Offices, Based on IRS Papers


Source (of screenshots): IRS tax forms

Summary: The Linux Foundation‘s chief, who does not use Linux and does not meet the qualifications that ought to be required for this job, is 'pulling a Baker'


Zemlin and Gates
Jim Zemlin had this slide just months ago, even after Bill Gates had been exposed for the Jeffrey Epstein scandals.

Go away, Linux users
Jim knows his "true masters"

Journalism is Beyond Redemption When Politicians Serve Media Tycoons and Business Oligarchs Who Resist Journalists (Those Capable of Exposing Them)

Posted in Deception, Fraud at 8:19 am by Dr. Roy Schestowitz

Video download link | md5sum 8735e8e35b8fc08aca554a8384bdf02c
Journalism is Dying, Politicians Pour Gasoline
Creative Commons Attribution-No Derivative Works 4.0

Summary: In the name of “protecting” journalism, notorious politicians in fact pour out gasoline into the fire; the intricate agenda/goal might be to kill off inquisitive observers in the public interest

THIS video of the 'first' NSA whistleblower reminds us of the awful state of journalism. People cannot publish books (literature) that state facts, reporters are denied access to facts, and publishers are in general protecting plutocracy. This isn’t an entirely new issue, but it has been getting worse over time.

There’s great difficulty getting any of the media to cover blatant EPO crimes. The press is in effect complicit and it takes bribes to help cover up those crimes. Those who do speak about the crimes receive legal threats instead of praise. Aside from EPO corruption, there’s also Microsoft. We have a still-ongoing series (will last until next year) about how the media failed to hold Microsoft accountable for crimes against women.

“Real news has become increasingly scarce, which means not many outlets remain to call out cheaters and detail/present evidence of fraud.”What are politicians doing to save journalism? Well, as it turns out “Journalism Competition and Preservation Act of 2021″ does exactly the opposite of what it’s called (very common when it comes to US bills; they tend to be called/named as misleadingly as possible). Klobuchar’s very dumb idea [1, 2] doesn’t promise to protect journalism but to weed out journalism, for reasons I explain in the video above.

The World Wide Web has in general curtailed journalism, but investors too have move away from any efforts to expose facts. This is deliberate and well coordinated. We now have liars and frauds branding themselves “journalists” while real journalists get sacked. In the video I give the example of Spamnil [1, 2], twisting press releases as ‘articles’ that nobody even reads and then making videos that nobody watches. But Spamnil is getting truly intoxicated on clickfraud and upping the doses to keep getting a sense of relevance even when about 95% of the views are in fact bots he pays for, subsidised by the corrupt Linux Foundation. Fake journalism boosted by fake (bot) clicks. Thank Jim Zemlin and Sheela Microsoft for this. It’s a fraud and it killed Linux.com already (it used to actually publish good articles).

As someone who depends on finding links to stories online, I can tell the difference. Real news has become increasingly scarce, which means not many outlets remain to call out cheaters and detail/present evidence of fraud.

Linux Foundation: Our Board and Our Directors Are Up for Sale (Highest Corporate Bidder Decides)

Posted in Finance at 8:03 am by Dr. Roy Schestowitz

Linux Foundation rules

Summary: The latest available (only informally; it's still suppressed) IRS record on file says the above; This is how Microsoft became so dominant in Linux Foundation management and Board of Directors, just a few years after the Linux Foundation had kicked the community out of the Board

Microsoft in Linux Foundation management:

Microsoft in Linux Foundation management

Microsoft in Linux Foundation Board:

Microsoft in Linux Foundation board

NSA Whistleblower J. Kirk Wiebe on Neglect and Rejection of Facts

Posted in Deception, Videos at 6:19 am by Dr. Roy Schestowitz

Relevant: Raw: How Microsoft and/or the EPO Killed an Important EPO Story About Their SLAPP Against Techrights and Others | Did the EPO Spike a BBC Story Regarding Discriminatory Practices, Legal Bullying of Bloggers, and/or Microsoft Bias?

Video download link | md5sum 63a7bad05f5bbd5f263e45bd03cc0476
NSA whistleblower J. Kirk Wiebe
Credit: Original here

Summary: J. Kirk Wiebe is one among several NSA whistleblowers (he’s regarded by many to be the first one); we might soon write more about this subject

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts