09.14.22

Links 15/09/2022: Koozali SME Server 10.1, Krita 5.1.1, and EndeavourOS Artemis Nova

Posted in News Roundup at 8:41 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • The Register UKLinux kernel’s eBPF feature put to unexpected new uses • The Register

        The Linux Plumbers Conference in Dublin ends today and some of the talks have revealed interesting new uses for the eBPF functionality.

        Several different teams presented tools that all use a part of the kernel originally intended to control packet filtering for new and totally different purposes. Google’s ghOSt allows for adjusting process scheduling, while Red Hat’s HID-BPF will make it easier to accommodate new input devices.

        Both of these use the eBPF facility introduced in kernel 3.18. The Register talked about eBPF when Microsoft introduced its own version for Windows. eBPF gives the kernel an intentionally limited register-based virtual machine, which allows tiny, strictly limited programs to execute inside the kernel itself.

        It derives from the 30-year-old Berkeley Packet Filter tool, intended to provide flexible tools for filtering data flowing in and out of the Unix kernel. The Linux extended implementation is more general, and what’s interesting about these projects is that they’re not directly related to networking, firewalls or packet filtering at all.

      • NYPostWhy it’s worth investing in Linux’s successor [Ed: Murdoch's tabloid NYP running anti-Linux ads/spam]
    • Graphics Stack

      • OTOY • OTOY® and UX3D strengthen the position of glTF™

        OTOY and UX3D are proud to unveil a new partnership integrating the UX3D glTF Scene Toolkit into the OTOY marketplace, bringing 100% native glTF support to the OTOY ecosystem.

      • CollaboraOpen source machine learning for video compression

        Over the past few years, different video codecs have been successfully developed, including H.265 and VP9, to meet the needs of various applicationsranging from video conferencing platforms like Zoom to streaming services like YouTube and software like OBS to broadcast to different sites.

        The quality of the reconstructed video using these codecs is excellent at medium-to-low bitrates, but it degrades when operating at very low bitrates. While these codecs leverage expert knowledge of human perception and carefully engineered signal processing pipelines, there has been a massive interest in replacing these handcrafted methods with machine learning approaches that learn to encode video data.

        Using open source software, Collabora has developed an efficient compression pipeline that enables a face video broadcasting system that achieves the same visual quality as the H.264 standard while only using one-tenth of the bandwidth. In a nutshell, the face video compression algorithms rely on a source frame of the face, a pipeline to extract the important features from a face image, and a generator to reconstruct the face using the extracted and compressed features on the receiving side.

      • Mike Blumenkrantz: Spaghetti Recipes

        Today’s spaghetti comes from my new favorite brand of spaghetti feed, vkoverhead. It’s a simple brand, but it really gets the job done when it comes to growing great spaghetti. This particular spaghetti feed is vkoverhead -test 0, which is the most simple type. It grows the kind of spaghetti that everyone notices because it’s a staple of all graphics diets.

      • mesa/st: add software-fallback for S3TC (!18180)
    • Applications

      • Linux LinksStreaming with Linux: Spotify – LinuxLinks

        This is a series that surveys popular streaming services from a Linux perspective. We are not reviewing any of the streaming services themselves although we may make subjective comments along the way.

        First launched in 2008, Spotify is a digital music streaming service with a freemium business model. You can listen to a huge library of music and podcasts for no charge if you are prepared to have shuffle play (with limited skips), interrupted listening and lower audio bitrate. Alternatively, there’s the option of Spotify Premium. In the UK, a subscription costs £9.99 per month for an Individual account. This gives you streaming music at 320 kbps, the ability to download music, and full functionality.

        When we placed Amazon Music Unlimited under the spotlight we lamented that there is no desktop client available under Linux. Instead, Amazon confine users to use a web browser. Matters are made worse as only the lowest sound quality setting is available.

    • Instructionals/Technical

      • ZDNetHow Cockpit can help you more easily manage your Linux machines

        Linux isn’t nearly as hard as you think… especially on the desktop (where you really don’t have to take care of many admin tasks). But what about on the server? Given you might want to deploy a Linux server either in your home or your business data center, what’s it like to administer the open-source operating system in that capacity?

      • H2S MediaHow To Install Discourse on Ubuntu 22.04 LTS Jammy Linux

        Learn the commands to install and set up the Discourse forum on Ubuntu 22.04 Server Jamy JellyFish using the terminal stablish your own community.

        Discourse is open-source forum software that can also be used as a comment system for a website. The creators want to create the basis for modern Internet forums.

        Discourse relies on Ruby on Rails, Postgres, and Redis. On the client side, the makers rely on the JavaScript framework Ember.js. The software is licensed under the GPL 2.0 license and the source code can be found on GitHub. It was launched in 2014, hence has been around for 7 years now. In addition, the creators – including Stack Overflow co-founder Jeff Atwood – integrated various newer elements that we know from social networks or comment systems such as Disqus.

        In addition to the traditional login via email, Discourse users should also be able to log in with their existing accounts on Twitter, Facebook, Google, Yahoo, or GitHub.

      • Network WorldHow to work on Linux with filenames that contain blanks | Network World

        Filenames that contain blanks can add complexity to the commands you use to work with them. Fortunately, there are several handy ways to make that easier.

      • How To Fix The “No Installation Candidate” Error In Ubuntu 22.04 LTS | Itsubuntu.com

        How To Fix the “No Installation Candidate” Error in Ubuntu

        You will encounter this error when you are about to install something valid on Ubuntu. In this tutorial post, we will show you the reason behind it, and also we will provide you with the solution for the “No Installation Candidate” error in Ubuntu.

      • DebugPointChange the Default LibreOffice Toolbar Look and Feel [Tutorial]

        A quick tip on how to change the default toolbar look in LibreOffice.

        The default LibreOffice look/theme, a.k.a breeze theme, is quite dull and colourless.

        It is indeed straightforward, but the lack of colours sometimes makes finding the menu and toolbar options challenging. There are some more themes available – 7 themes to be exact which can be quickly installed in your system. This can make your LibreOffice look excellent and more professional, which may increase your productivity.

      • ID RootHow To Install Sublime Text on AlmaLinux 9

        In this tutorial, we will show you how to install Sublime Text on AlmaLinux 9. For those of you who didn’t know, Sublime Text Editor is a cross-platform, lightweight text editor for code, markup, and prose that automates repetitive tasks so you can focus on the important stuff. Users can expand its functionality with plugins, typically community-built and maintained under free-software licenses. Sublime is known for its speed, ease of use, cross-platform, and community contribution.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Sublime Text on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

      • Linux HandbookHow to Move Up and Down by Page in Vim

        When you want to have an overview of a file, you can get a good overview just moving down a few pages.

        To move a page down in Vim, press the Ctrl + f key combination, and to move a page up, press the Ctrl + b key combination.

      • MakeTech EasierHow to Encode/Decode Data Using Base64 and Why – Make Tech Easier

        Base64 is a popular binary to ASCII encoding scheme designed to reliably transfer binary data across channels that have limited support for various content types. This article goes over the basics of Base64 encoding, how it works and details different command line and graphical ways to encode your own data using Base64.

      • DebugPointHow to Install Java 17 in Ubuntu 22.04, 22.10, Linux Mint 21

        A quick guide on how to install the latest Java 17 in Ubuntu 22.04, 22.10 and Linux Mint 21.x.

        A while back, Oracle announced the release of Java 17, the LTS version of this widely used programming language. This release gets support for 8-years, which includes security and performance updates and, of course, bug fixes. Java 17 is officially supported until 2029.

        Although this guide tested for ongoing supported Ubuntu and Linux Mint releases, however, should be applicable for other Debian-based distributions in the coming days. Because the PPA that is used in this guide is periodically updated to meet the needs for past and future releases.

        Installing Java 17 is not that straightforward without a PPA. Because it’s a licensed product, you don’t get it in the Ubuntu official repo. There are other alternatives to Oracle Java, such as OpenJDK, which is easier to install. But they lack certain functionalities due to terms and conditions from Oracle and may not be suitable for your needs.

      • DebugPointInstall Linux Mint with Windows 11 Dual Boot [Complete Guide]

        A comprehensive guide to installing Linux Mint alongside Windows 11 (or Windows 10) and making a dual-boot system.

        If you are a new Linux user trying to install Linux Mint without removing the OEM-installed Windows, follow this guide. After you complete the steps described below, you should have a dual boot system where you can learn and do your work in a Linux system without booting Windows.

      • Linux CapableHow to Install Google Chrome on Fedora 37 Linux

        Chrome is a browser that is known for its speed and simplicity. It is the most used internet browser globally and continues to grow in popularity. Chrome is designed to be sleek and clean, focusing on loading website pages quickly. While it used to be the fastest browser, this is now a point of debate, as other browsers have begun to catch up in speed. However, Chrome remains a popular choice for many users due to its simple design and ease of use.

        In the following tutorial, you will learn how to install Google Chrome on Fedora 37 Linux in three ways in stable, beta, or unstable versions and how to maintain and remove using the command line terminal.

      • Jerusalem PostHow a better docker registry solution improves containerization

        Users may manage containers that are dispersed among their apps and networks using container registries. Users can arrange and manage individual containers’ visibility and accessibility using the registry, which manages privileges for specific containers. These registries might be on-premise solutions utilizing local infrastructure or hosted services. Container registries are used by businesses to control container settings, store container images, and utilize them for installation.

      • TechtownChrome Web Store – a Complete Guide (Themes, Extensions) How to

        Chrome Web Store is a central repository where all approved extensions and themes are available. It is like the Google Android App Play store. This repository lists all available apps, extensions, and themes. You can also apply filters based on Categories and Features.

        You can also search using the Search the store available on the left-hand side top corner. The front page also shows good extensions and themes as per categories like Extensions Starter Kit, Personalize Chrome, Writing Essentials, etc.

      • Linux HintHow do I Quit Nano?

        “Undoubtedly, the Nano editor is one of the most commonly used texts and source code editors for the Linux operating system. The most important reason behind its popularity is that it comes pre-installed with almost all the Linux distributions, because of which the users do not need to go through the hassle of manually installing them. In this article, we will be learning a crucial aspect of working with the Nano editor, i.e., the method of exiting the Nano editor while using a Linux Mint 20.3 system.”

      • Linux HintEnable Firefox Dark Mode in Ubuntu 20.04

        Enable Firefox Dark Mode in Ubuntu 20.04“Many personal computer owners are choosing dark themes, environments, and tones because of their many benefits. To captivate the people and keep users glued to the information on the display, the computer and numerous other apps typically use white, brilliant colors with strong contrast. Unfortunately, many people claim that staring at brilliant or white hues for an extended period affects their eyesight. Because of various vision problems, a large number of computer users avoid this. The primary cause of this problem is light shining, which is a component of the color white.

        In electromagnetic light, bright light has the maximum energy level, whereas orange, yellow, and red have the minimum. Since the color black doesn’t generate any illumination, it contains extremely little to no energy. Users may easily use computers for extended periods when there is less energy in the light.

        Themes and extensions could be obtained through a variety of third-party websites, such as GitHub, in addition to Mozilla’s authorized library. Websites like GitHub, on the other hand, don’t offer a built plugin; therefore, they must be individually generated. Non-technical visitors may have difficulties with this, and there is currently no option to subscribe to automated updates.

        So, this article proves to you how to make Firefox enable a dark theme. There are numerous ways to switch on Mozilla Firefox’s night mode.”

      • Linux HintHow to Check the sshd Logs in Linux?

        “The sshd stands for Secure Shell Daemon. It’s a silent process that listens to all the authentication and login attempts of Linux. As soon as you start your system, the process begins.

        Using sshd logs, you can monitor authorized and unauthorized login attempts on your system. This helps in keeping your system secure.

        Today, we will explore how to dive into sshd logs on Ubuntu 22.04. We have presented two ways to access the sshd logs. This tutorial uses easy-to-follow Linux commands to see sshd logs. By the end of this tutorial, you will be able to explore sshd logs on your own.”

        Without any further ado, let’s get started!

      • LinuxConfigHow to create permanent alias on Linux

        Creating an alias for use on the command line can save the user from typing long commands, common options, or typos. This will save you some time and repetitive keystrokes, and ultimately make your command line experience even more efficient. In this tutorial, we will take you through the step by step instructions to create a permanent alias on a Linux system.

      • LinuxConfigHow to create and share torrent on Linux

        Torrents are an excellent way to share data publicly. As you may already know as a Linux user, many Linux distro developers choose to share their operating system in the form of a torrent download. This allows someone to publish data and rely on the “swarm” (the users that are uploading or downloading the torrent’s contents) to continue hosting it.

        If a torrent has a healthy amount of seeders (users that are uploading the torrent’s data to the swarm), then downloaders can expect a very fast download, as their torrent client can connect to numerous uploaders in order to retrieve different portions of the torrent’s files simultaneously. If you have some files to share and you think this would be a good way to do it, you can learn how to create a torrent file.

        In this tutorial, you will see how to create and share a torrent on Linux. Creating a torrent file is done with a BitTorrent client – the same application which also seeds (uploads) and leeches (downloads) torrents. You can do this from either command line or GUI, depending on which BitTorrent client you choose to use. We will cover the step by step instructions for both methods below.

      • LinuxConfigHosts file example on Linux

        The /etc/hosts file can be found on all Linux systems. This is a plain text system file which can be used to map network names (like hostnames of computers on your local network, or URLs to online websites) to IP addresses. The hosts file has a higher priority than any DNS servers your system is configured to use.

        In other words, editing the hosts file allows you to override other DNS settings. If you have some entries in the hosts file, these names can be resolved even without access to a separate DNS server. System Administrators may be interested in editing the hosts file when they want to override external DNS resolution, or to simply tell a computer where it can expect to find (by IP address) another host.

        In this tutorial, we will show an example of an /etc/hosts file, so you can see how to properly format yours. This will also give you some ideas of what it can be used for, and how to ensure that your file abides by the required syntax in order to be recognized by your system for name resolution.

      • Linux HintHow do I Access Chrome Plugins

        “Browser plugins and extensions that are not normally created by Google give Chrome extra functionality and simplify use. Rich web-based material like Flash, Java, etc., is supported by them. In addition to the aforementioned features, you may also be required to enable or disable the Google Chrome extensions, especially if you wish to improve security or troubleshoot the browser. This is true even if downloading and installing these plugins is fairly easy. We’ll go over accessing and managing Chrome plugins and extensions in this article.”

      • LinuxConfigHow to create host alias on Linux

        If you frequently use your Linux system to connect to a specific host, it can be convenient to make an alias for the hostname or IP address. This is especially true if the host has a long name or URL, and you do not want to keep typing the whole thing out every time you need to connect. There are several ways to create a host alias on Linux, depending on how you ordinarily connect to the host.

        It is possible to create an SSH alias, a custom environment variable, or map an IP address to a hostname or URL in the /etc/hosts file. All will accomplish the same goal, which is to save you some keystrokes on the command line when connecting to the host. In this tutorial, you will learn various methods to crate a host alias on Linux.

      • Linux Shell TipsLinux: Bash Built-in Commands Cheat Sheet

        All Linux users acknowledge the contributive power of the command-line/terminal environment. It is a wild card when it comes to accomplishing almost 90% of computing tasks associated with any Linux operating system distribution.

        By default, any Linux distribution is prepackaged with numerous Inbuilt commands that are useful in meeting day-to-day computing objectives. This list of commands might seem endless and therefore intimidating to newcomers with a thirst for Linux.

        Also, expert Linux users might forget the usage syntax associated with such commands. This article guide provides a reference manual for inbuilt Linux commands which will be priceless during your Linux computing routines.

      • Its FOSSHow to Upgrade to Fedora 37 Beta Right Now – It’s FOSS

        Fedora 37 will be releasing next month. Fedora 37 beta is already released and it features the awesome new GNOME 43.

        If you are running Fedora 36 right now and want to enjoy GNOME 43 and all the other features that come with Fedora 37, you can easily do that.

        In this tutorial, I’ll show the steps for upgrading to Fedora 37 beta using terminal as well as the GUI method.

        Keep in mind that you cannot downgrade to Fedora 36 the same way you upgraded to Fedora 37. You’ll have to reinstall it.

      • LinuxConfigHow to remove alias on Linux

        The purpose of this tutorial is to show how to remove an alias on a Linux system. Aliases can be created to either be permanent or temporary, but it is possible to remove them either way. Check out the steps below to see how.

      • LinuxConfigHow to list all aliases on Linux

        An alias on Linux allows a user to reference one command (usually a longer or more cumbersome command) to another (usually a shorter version of the command which is easier to type). This saves users a few keystrokes on the command line, or can also compensate for common typos. In this tutorial, you will learn how to list all the aliases that have been configured on a Linux system.

      • Red Hat OfficialHow to onboard edge devices at scale with FDO and Linux | Enable Sysadmin

        Learn how to use the Linux Foundation-backed FIDO Device Onboard (FDO) specification to configure edge and IoT servers and devices.

      • HowTo ForgeHow to Add an Email Account in ISPConfig 3.2

        ISPConfig is a Hosting Control Panel that can be used to host websites, provide access by FTP and SSH, manage and provide email services, and run a DNS server. ISPConfig supports Debian, CentOS, and Ubuntu operating systems. We covered the steps to add a website in ISPConfig already in a separate guide. Now I will show you step-by-step how to add an email domain and email account in ISPConfig, how to configure spam filtering, and which login details to use in an email client like Thunderbird or Outlook.

      • AddictiveTipsHow to set up NextCloud via Docker on Linux

        Nextcloud is a drop-in replacement for proprietary online services such as Google Drive, Dropbox, Microsoft OneDrive, etc. In the past, on AddictiveTips, we’ve shown you how to deploy NextCloud as a Snap. However, that’s not the only way to host a Nextcloud server. You can also do it with Docker. Here’s how.

      • ID RootHow To Install Blender on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install Blender on Linux Mint 21. For those of you who didn’t know, Blender is the free and open-source 3D creation suite. It supports the entirety of the 3D pipeline, from modeling and rigging to animation and rendering. It’s available for Windows, Linux, and macOS. Thanks to OpenGL, Blender is capable of offering a consistent experience.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a Blender 3D computer graphics software tool on Linux Mint 21 (Vanessa).

    • Games

      • Trend OceansMazter Game: A Maze in Your Linux Terminal – TREND OCEANS

        The Linux system is full of fun and surprises for beginner users. However, there is also an obstacle that can be defined as a maze of Linux from which you need to find your way out.

        Climbing each stair (Maze) can lead you to the next level on your Linux journey. This cannot be easy or hard, but I can guarantee that you will enjoy every moment of this journey.

        Now enough of the chit-chat. Let’s move to today’s topic, about the amazing Mazter games that provide you with maze experiences within your terminal.

      • Trend Oceanssssnake: A Classic Snake Game to Play in Your Free Time – TREND OCEANS

        Linux is intriguing for a while, but after a certain period, you will have mental burnout while continuously staring at the terminal screen. To claim yourself, you usually take a break or have a sip of dark coffee and get back to work.

        What if I say that you have an additional option to chill out your brain from the terminal burnout with a classical snake game that you used to play on your Nokia devices?

      • Boiling Steam“Steam Pal” Reborn as a Mascot for the Steam Deck in Japan – Boiling Steam

        Remember the Steam Pal? It was the codename given by several outlets when the rumors of an upcoming device from Valve were leaking out. The name was quickly forgotten once the official name was unveiled, and the Steam Pal went down into obscurity forever. Or did it?

        Turns out that for the launch in Japan, Valve has prepared a mascot for the Steam Deck. And no one other than Lawrence Yang, who has been heavily involved into the design of the Steam Deck.

      • CubicleNatePETSCII Robots on TheC64 Maxi or Mini with a SNES Controller – CubicleNate’s Techpad

        I make it a point to buy new software for old computers at least annually. On particular game that I rather enjoy is called “PETSCII Robots” by The 8-Bit Guy, David Murry. Here is the first video published about the game. In short, this is a blast to play on the Commodore 64 or VIC-20. Probably the best puzzle game build for either platform. There is so much to it and because it is so good, it been ported to many other platforms. I very much enjoyed my experience on the actual hardware but I wanted to play this new game on a TheC64 with a SNES style controller. Unfortunately, it wasn’t as straight forward as one might think.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KritaKrita 5.1.1 Released | Krita

          Today we’re releasing Krita 5.1.1. This is strictly a bug fix release. Two serious problems are fixed in this release: a slowdown in start-up time experienced by some people, and a crash when copying a vector layer.

  • Distributions and Operating Systems

    • New Releases

      • Artemis Nova is here – EndeavourOS

        After our Artemis Neo 22.8 release that only addressed the Grub issue for the offline installer, we are proud to present, Artemis Nova, a release that next to the regular upstream refreshes also ships with some additional changes under the hood.

        The improvements and system refresh described in this announcement are for the benefit of the ISO live environment and the installation process, so existing EndeavourOS users don’t have to reinstall since we are a rolling distro. We do have some additional info for running installations in this announcement, so make sure you keep yourselves updated on this.

        But before I go on with the release announcement I want to give a big shout-out to the forum and Reddit moderators, the entire Telegram admin group and our entire community on all of our official and unofficial channels for helping each other during the recent Grub issue. You all put your shoulders together and did an incredible job. Thank you so much for this stellar achievement, we love you for giving EndeavourOS that extra special touch.

      • Koozali SME Server 10.1 – Release Announcement – the tradition continues
        The Koozali SME Server development team is pleased to announce the 
        release of SME Server 10.1
        which will be the next major release of SME Server. This release is 
        based on CentOS 7. CentOS 7.#
        has an EOL of 30 June 2024.
        
        Koozali SME Server users are encouraged to upgrade production servers to 
        this release.
        
        Please read details re Installing and Known issues updating from SME10.0 at:
        
        https://wiki.koozali.org/SME_Server:10.1
        
        Major changes in this release
        httpd access control using httpd 2.4 syntax, improve handling of logs 
        between journalctl and rsyslog, improve logrotate scripts, better 
        handling of pseudonyms, improve yum update without reboot, upgrade 
        bglibs and cvm-unix to latest version, Contribs data are now part of 
        core backup, Improved handling of SSL certificates, Increased level of 
        security in term of encryption for all services, FTP is only available 
        over TLS by default to avoid clear text exchanges on the network, PHP 
        module is not used anymore by apache server. We now use php-fpm 7.4 by 
        default, PHP-FPM available by default : 5.4, 5.5, 5.6, 7.0, 7.1, 7.2, 
        7.3, 7.4, 8.0 and 8.1. Supported versions are 5.4, 7.4 (up to 2022 Nov. 
        28), 8.0 and 8.1, no degraded RAID support on install, using protocol 
        SMB2 and SMB3 only for file share, CIFS/SMB1 is not available as 
        default, migration of most services to systemd, added specific events to 
        prevent the need of reboot on yum update / yum install, Switch from 
        mysql 5.1 to mariadb 5.5, Dovecot is now handling imap, imaps, pop3, pop3s
        
        
    • Arch Family

      • Linux MagazineA New Arch-Based Linux Distribution Has Arrived – Linux Magazine

        Crystal Linux is a new distribution with the goal of bringing the power of Arch Linux to the masses.

        Crystal Linux is a new operating system, based on Arch Linux that hopes to become the Fedora of Arch Linux by bringing new “stuff” to the Linux desktop while being user-friendly.

        Crystal Linux has been released on the GPLv3.0 and uses its own GUI installer to make getting the distribution installed a snap. This new Linux distribution features an easy-to-use package manager, Btrfs snapshots, zRAM support, and a choice between GNOME, KDE Plasma, Cinnamon, Mate, Budget, Onyx, XFCE, Sway, LXQt, i3-gaps, bspwm, AwesomeWM, and herbstlufwm.

        The installer the developers have created is nothing short of brilliant. Not only is it beautiful, it makes installing this Arch-based Linux distribution something anyone can do.

        Out of the box, Crystal Linux doesn’t include a large swath of installed applications, but it does include a well-designed app store, where you can install all of the necessary apps you need with the click of the mouse or trackpad. By default, you’ll only see the GNOME apps (Weather, Gedit, Terminal, System Monitor, Disks, and Calculator) as well as Firefox and Vim.

      • Linux HintLinux Mint vs. Manjaro: Which One is Better?

        Manjaro is based on Arch Linux and is more popular as it comes with much pre-installed software. You will get more updates, but they are mostly new features or bug fixes, and you will get the latest packages much sooner than many other distros.

    • Fedora Family / IBM

      • The Register UKBeta of Red Hat’s Fedora 37 arrives • The Register

        As usual, there will be multiple versions of the distro: there are already betas of all the respins too. As ever, the primary edition remains the GNOME one. This will feature the 25th anniversary version, GNOME 43. However, at this point, the final release version of GNOME 43 isn’t expected for another week or so, so the Fedora beta uses a release candidate version.

        Notably, Fedora 37 GNOME has a new replacement for a major GNOME app: the new Text Editor in place of the trusty GEdit. However, GNOME Terminal is still here, waiting its turn to be usurped by GNOME Console.

        GNOME Settings has a new device security panel, which will include information about firmware updates for supported hardware. For now, the beta uses kernel 5.19, but by the time the final version ships, it will probably use the new kernel 6.0.

        If you’re not a GNOME fan, then there are plenty of alternatives. Also available are respins featuring KDE Plasma 5.26, MATE 1.26, Xfce 4.16, LXQt 1.10, and Cinnamon 5.4, as well as LXDE, the i3 tiling window manager, and the Sugar educational environment from the OLPC project. As before, there are also Server and Internet-of-Things editions; new to version 37 are CoreOS and Cloud Base editions as well.

      • Its FOSSFedora 37 Beta is Now Available for Testing

        Fedora 37 is due for release next month (October 18, 2022)

        The beta version for Fedora 37 has been released for public testing.

        Here, let me mention the key highlights of this release.

        [...]

        GNOME 43 being the obvious upgrade for Fedora’s flagship edition brings in performance and usability improvements.

        You can get hands-on with the best GNOME 43 features with Fedora 37.

      • Enterprisers ProjectDigital transformation: 3 tips to minimize friction

        Even in 2022, digital transformation can be a daunting initiative. Whether your organization is transitioning from a comfortable legacy system or porting historical data and developing new processes, many barriers can challenge your digital transformation journey.

        These barriers can slow or even stop innovation. While your organization attempts to implement and onboard new systems, your transformation roadmap and plans for innovation may take a back seat.

      • Red Hat OfficialThe linker’s warnings about executable stacks and segments

        In this article I talk about some new warning messages that have been added to the BFD linker. What they mean, why they are important and what can be done to prevent or silence them.

        Note: These warnings are currently specific to the BFD linker (ld.bfd) but similar warnings may appear in the gold, lld and mold linkers in the future.

      • Red Hat OfficialAnsibleFest 2022: Keynotes, speakers and sponsors [Ed: Sponsored by Microsoft]

        There is so much to learn and to take away from AnsibleFest 2022! Join us and the Ansible community on October 18 and 19 in Chicago, Illinois to immerse yourself in the automation experience.

    • Canonical/Ubuntu Family

    • Devices/Embedded

    • Open Hardware/Modding

      • Tom’s HardwareHow To Use Picamera2 to Take Photos With Raspberry Pi | Tom’s Hardware

        When Raspberry Pi OS moved from being based on Debian Buster, to Bullseye, the transition wasn’t the smoothest. For many years Raspberry Pi OS used three tools to access the official Raspberry Pi camera. The first two were raspistill / raspivid, which offered control and access to the camera via the Linux terminal.

        It was a powerful and flexible means to work with the camera, both could produce video effects and stream video with no extra work. The other means was a community created project called PiCamera. Originally created by Dave Jones, Picamera grew from a community project into an essential tool. Picamera offered a purely Python means to interact with the camera, and being based on Python it also meant that we could mix the camera into our projects.

        With the move to Bullseye, we saw Picamera sadly break. Raspberry Pi LTD even went as far as to offer a “legacy” version of Buster with Picamera and security updates. This was a stop-gap measure while its developers worked on Picamera2. With the September 2022 release of Raspberry Pi OS we now have a working Picamera2 module that we can use in our projects.

      • Tom’s HardwareRaspberry Pi Pico Runs on Steam-Powered Engine | Tom’s Hardware

        We know how complicated it can be sorting out the power demands of your Raspberry Pi project but this creation from maker Mike Bell takes the idea to a whole new level. Using a small, steam-powered engine, he’s managed to power a Raspberry Pi Pico along with a few accessories. We’ve seen clever power solutions in the past but never anything quite like this.

      • Tom’s Hardware$60 DIY Raspberry Pi NAS Kit Offers SATA, Impressive Cooling | Tom’s Hardware

        Anyone kicking themselves that they missed out on the Argon EON (opens in new tab) while it was still in Kickstarter has another chance to jump aboard the DIY Raspberry Pi (opens in new tab) powered NAS train, as 52Pi has revealed a mini tower NAS kit, as reported by Liliputing (opens in new tab).

      • The DIY LifeAll Acrylic Pi Cases On The Gweike Cloud – Can It Compete With The Glowforge? – The DIY Life

        If you’ve seen some of my other projects, I often use my K40 laser cutter to cut and engrave acrylic and plywood sheets to make up components. I love how quickly I can make them up and having clear or semi-transparent panels on 3D printed enclosures really enhances the overall appeal. I bought my laser a couple of years ago as a tool that I thought I might use on occasion and it’s turned out to be my go-to favourite workshop tool.

      • ArduinoIt’s here: please welcome Arduino IDE 2.0 | Arduino Blog

        We’re pleased to announce that as of today Arduino IDE 2.0 has moved to stable and is available for download. Since the launch of the Beta version back in Spring 2021, the feedback received from the active Arduino community has enabled us to focus on what’s meaningful to the widest user-base. It carries a modern editor and provides a better overall user experience thanks to a responsive interface and faster compilation time.

        Over and above the core features (we’ll get into those in more details later) the IDE 2.0 benefits from a number of enhancements and additional support. The Serial Monitor and Plotter can be used together, enabling users to have two viewports onto their data output. Before you had to choose between text and graphs, whereas now you can have both.

      • CNX SoftwareArduino IDE 2.0 is now officially released – CNX Software

        The first stable release of Arduino IDE 2.0 is now out. Based on the Eclipse Theia framework, the new IDE provides a more modern and user-friendly user interface, faster compilation time, and more features we’ll discuss in this post. Arduino initially introduced the Arduino IDE 2.0 beta in March 2021 with a live debugger with breakpoints support, a revamped user interface with features such as autocompletion of variables and functions.

      • The New StackGoogle Inks Deal with NIST to Boost Open Source Chips [Ed: With NIST getting involved, back doors are a lot more likely, openwashing notwithstanding]

        The U.S. CHIPS Act has opened up a windfall for tech startups and academics to design and produce semiconductors, and Google is helping facilitate the development.

        Google has signed a partnership with the National Institute of Standards and Technology (NIST) to help academics and startups develop low-cost chips. The chips will be open source, which means that designs can be replicated by others for their own purposes.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • CSO8 notable open-source security initiatives of 2022 | CSO Online [Ed: They make it sound like security is only a problem when it comes to Free software; meanwhile, proprietary software puts back doors in the binaries (for states)]

      So why is it important to improve open-source security? The answer is, in part, “because it underpins everything,” Wheeler says. “Software really does now run the world. The latest studies have shown that, on average, 70% to 90% of applications are, once you look inside, open-source software (OSS) components. That’s not a problem per se – OSS enables an incredible number of goods and services – but it’s a problem if the OSS is vulnerable to attack.” To cause any change, organizations need resources, including people’s time and money, he adds. “Some actions won’t require much, but you still often need some as a catalyst. Some will require more resources because the software industry is large, and the amount of software is huge. For many developers, ‘make it secure’ is a new, unanticipated requirement.”

    • FSF

    • Programming/Development

      • I ProgrammerLinux And Android Waste Coding Effort

        For many years it has been standard practice to test that you get the memory you ask for, but it has all be a huge waste of time. Operating systems get in on the act before you have a chance to do anything about it.

        We try to write code that behaves well – or most of us do. One particular catastrophe that we have all been schooled in avoiding is running out of memory. A C/C++ programmer uses the malloc function to allocate memory. The function usually returns a pointer to the memory requested, but if there isn’t enough memory it returns a NULL.

      • Barry KaulerEasy creation of SFS from DEB packages with deb2sfs

        EasyOS has ‘dir2sfs’, that will convert a folder to a SFS file.

        [...]

        One thing I need to implement is updating. If you already have an older Chrome SFS installed, there should be an offer to update. That’s on the to-do list.

        Next up, plan to find some more packages available as DEB packages, and convert to SFS.

      • Request Page Redesign – Round Two – Open Build Service

        Previously we started the redesign of the request workflow as part of the beta program. We received a lot of feedback from you and still have a lot on our TODO list. This time we focused our attention on the support of multi-action submit requests and on creating more clarity in the conversations area by highlighting comments.

      • Rust

        • ZDNetLinus Torvalds talks Rust on Linux, his work schedule, and life with his M2 MacBook Air

          I’ve known Linus Torvalds for decades, but since Covid hit, we haven’t had a chance for a face-to-face interview in years. Finally, at 2022′s Linux Plumbers Conference, the annual get-together of the world’s top Linux developers, we had a chance to talk in person again.

        • Rust BlogThe Rust Programming Language Blog: Security advisories for Cargo (CVE-2022-36113, CVE-2022-36114)

          The Rust Security Response WG was notified that Cargo did not prevent extracting some malformed packages downloaded from alternate registries. An attacker able to upload packages to an alternate registry could fill the filesystem or corrupt arbitary files when Cargo downloaded the package.

          These issues have been assigned CVE-2022-36113 and CVE-2022-36114. The severity of these vulnerabilities is “low” for users of alternate registries. Users relying on crates.io are not affected.

          Note that by design Cargo allows code execution at build time, due to build scripts and procedural macros. The vulnerabilities in this advisory allow performing a subset of the possible damage in a harder to track down way. Your dependencies must still be trusted if you want to be protected from attacks, as it’s possible to perform the same attacks with build scripts and procedural macros.

    • Standards/Consortia

      • LWNUnicode 15 released [LWN.net]

        Version 15 of the Unicode standard has been released.

      • UnicodeThe Unicode Blog: Announcing The Unicode Standard, Version 15.0

        Version 15.0 of the Unicode Standard is now available, including the core specification, annexes, and data files. This version adds 4,489 characters, bringing the total to 149,186 characters. These additions include two new scripts, for a total of 161 scripts, along with 20 new emoji characters, and 4,193 CJK (Chinese, Japanese, and Korean) ideographs.

  • Leftovers

    • Peter ‘CzP’ CzanikPeter Czanik: Working Hybrid

      I worked from home all my life, or at least that’s what I thought. Recently I learned that what do is actually called “hybrid” work. I do most of my work from home, however I also regularly visit the office. I can work a lot more efficiently at home, so, I work from there.

      [...]

      The pandemic also taught me that meeting people in person regularly is important as well [...] Many people – including me – are (a lot) more efficient when working from home. That is where work can be done. In the office it is a lot less efficient.

    • TediumWhat I Learned About E-Bikes From Working Delivery in NYC

      Writing a certain type of nonfiction means spending a lot of time thinking about the systems that surround us. But when you live in New York City, you have to confront the fact these systems are niche to a unique city. From the water to the mass transit, the cultural diversity to the sports teams, New York City is its own place that, despite being massively influential, doesn’t really impact how the rest of America plans its cities. Americans, by and large, seem happy with their sprawling suburbs and hours commuting in their cars. There does seem to be a slight push for denser urban housing, especially in growing city centers popular with a younger, upwardly mobile demographic. And in these spaces, you’ll likely find a fairly new trend that may not have started in NYC but has been elevated to a higher art form by its practitioners: delivery bikes and the messengers/drivers that ride them. Today’s Tedium is talking specifically about the e-bike trend that has become the gold standard for how New Yorkers get their food delivered.

    • Hardware

      • CNX SoftwareSilicon Labs FG25 Arm Cortex-M33 SoC targets Wi-SUN FAN networks – CNX Software

        Silicon Labs announced various new products at its annual Works With Developer Conference including the FG25 Arm Cortex-M33 SoC designed for sub-GHz Wi-SUN FAN networks for Smart Cities and applications such as smart metering, street lighting, electricity distribution automation, municipal infrastructure, and more.

    • Linux Foundation

      • TechRadarThe Linux Foundation wants to tackle digital wallets next

        The Linux Foundation has announced plans to form a new entity, the OpenWallet Foundation (OWF), which will provide the basis for companies to create digital wallets on an open source platform.

        “The mission of the OWF is to develop a secure, multi-purpose open source engine anyone can use to build interoperable wallets,” the organization explained.

        “The OWF aims to set best practices for digital wallet technology through collaboration on open source code for use as a starting point for anyone who strives to build interoperable, secure, and privacy-protecting wallets.”

    • Security

      • Bleeping ComputerMicrosoft September 2022 Patch Tuesday fixes zero-day used in attacks, 63 flaws [Ed: How Microsoft media operatives like Lawrence Abrams react to tons of zero-day flaws from the NSA partner]

        Today is Microsoft’s September 2022 Patch Tuesday, and with it comes fixes for an actively exploited Windows vulnerability and a total of 63 flaws.

        Five of the 63 vulnerabilities fixed in today’s update are classified as ‘Critical’ as they allow remote code execution, one of the most severe types of vulnerabilities.

      • USCERTIranian Islamic Revolutionary Guard Corps Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations [Ed: Windows has back doors for that [1, 2]

        See Iranian Islamic Revolutionary Guard Corps Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations and joint CSA Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities for information on these Iranian government-sponsored APT actors’ tactics and techniques, indicators of compromise, and recommended mitigations.

      • CISACISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA [Ed: This is only about Apple and Microsoft; this headline is not informative at all, it's more like cover-up]

        CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.

      • LinuxSecurityWhy You Need a VPN – Which one to Choose | LinuxSecurity.com

        Ultimately, a VPN is an essential and valuable tool in 2022. VPNs are a crucial component of a comprehensive cybersecurity suite in a world riddled with inherently hazardous WiFi networks and data mining corporations vulnerable to breaches. It’s important that you consider the pros and cons of using a VPN on Linux, and understand what it can and cannot do for you before using one. It entirely safeguards your private and personal information and keeps it from falling into the hands of third parties who may use it against you. VPN providers such as SurfShark allow us to roam the internet at ease without us having to worry about our traffic being viewed. So, if at the end of all of this you’re wondering, “Should I purchase a VPN?”, the answer is clear. For more information on VPNs and how to install SurfShark on Linux, take a look at our Installing SurfShark VPN On Kali Linux: The Authoritative Guide article. We hope you found this article helpful and hope you stick along for future news!

      • LinuxSecurityWhat Are Checksums – Why Should You Be Using Them? | LinuxSecurity.com

        For this example, I will be verifying a Rocky Linux 9 download using the checksum that they have provided on their website.

      • InfoSecurity MagazineSparklingGoblin APT Targeted Hong Kong University With New Linux Backdoor> [Ed: Again….one should clarify. It’s malware, not a “backdoor”; unlike Windows, here one needs to actually install it]
      • Qubes Canary 032

        We have published Qubes Canary 032. The text of this canary is reproduced below.

        This canary and its accompanying signatures will always be available in the Qubes security pack (qubes-secpack).

      • Bleeping ComputerMicrosoft Teams stores auth tokens as cleartext in Windows, Linux, Macs

        Security analysts have found a severe security vulnerability in the desktop app for Microsoft Teams that gives threat actors access to authentication tokens and accounts with multi-factor authentication (MFA) turned on.

        Microsoft Teams is a communication platform, included in the 365 product family, used by more than 270 million people for exchanging text messages, videoconferencing, and storing files.

        The newly discovered security issue impacts versions of the application for Windows, Linux, and Mac and refers to Microsoft Teams storing user authentication tokens in clear text without protecting access to them.

      • eSecurity PlanetNew Linux Malware Shikitega Can Take Full Control of Devices | eSecurityPlanet [Ed: AT&T never bothered explaining how such malware makes it into "Linux" in the first place; but they blame "Linux" regardless]

        AT&T Alien Labs has discovered a new Linux malware that can be used for highly evasive attacks, as the infection has been designed for persistence and runs on practically all kinds of Linux devices.

    • Civil Rights/Policing

      • AccessNowUN roundup and delegate guide: digital rights at the United Nations – Access Now

        Over the last several months, including during the 50th session of the UN Human Rights Council (HRC50), delegates and stakeholders made multiple strides to protect human rights online. This includes the notable UN report on internet shutdowns that makes the intrinsic link between civil and political and economic, social, and cultural rights in the digital age. Our new brief, UN roundup and delegate guide: digital rights at the United Nations, aims to educate delegates on what took place and provide next steps for advancing international norms and standards to safeguard human rights online.

        We also hope to prepare stakeholders to advocate for digital rights in upcoming and ongoing UN processes, from the General Assembly’s 77th session to the UN Human Rights Council’s 51st session, and beyond. Our brief therefore centers on HRC50 but includes other relevant UN processes, such as the High Level Political Forum (HLPF), the Open Ended Working Group on Information and Communication Technologies II (OEWG on ICTs II), the Security Council, and the Ad Hoc Committee on Cybercrime (AHC on Cybercrime).

    • Monopolies

      • Copyrights

        • Public Domain ReviewColonizing the Cosmos: Astor’s Electrical Future – The Public Domain Review

          During America’s Gilded Age, the future seemed to pulse with electrical possibility. Iwan Rhys Morus follows the interplanetary safari that is John Jacob Astor’s A Journey in Other Worlds, a high-voltage scientific romance in which visions of imperialism haunt a supposedly “perfect” future.

  • Gemini* and Gopher

    • Technical

      • Hitchhiker Linux: an origin story

        Once upon a time, about 2011 to be a little more precise, live was not going my way. My marriage had blown up, my kids were strangers to me and I found myself rather on the far side of sanity. This is not in fact the worst thing that can happen to a man of course because I was still breathing. But I found myself at that time without a job, without a car, and without much in the way of motivation.

        One gets bored after a time and finds a way to pass the time. I had left the vast majority of my earthly possessions behind in a storage unit and had at that time no computer. I missed it, however, and found a discarded carcass that I deceided to bring back to life (as one does) with a hard drive but no operating system. Having been a full time Linux and FreeBSD user previously, I wanted a Linux installation. This might be a good time to point out that I also had no internet connection, which combined with not having and operating system to begin with puts a damper on installing Linux. Among what meager possessions I did have with me, however, was an old briefcase with a 512MB pendrive and a CD tucked into a pocket, upon which was written a version of Puppy Linux.

      • Python and Debian Packages

        I have used Debian-based GNU/Linux distros daily on my own computers for about a decade and a half. I find Debian packages very neat to use.

        [...]

        Debian packages are my preferred way of installing apps. I also write a lot of Python code both at work and on my spare time. I really like how easy it is to write installable command line utilities. (I should write about that some day.)

        Building Python packages has changed a lot over the years. I most often use some half old-fashioned half modern approach: I use the classic setuptools build tool, but use the “new” setup.cfg format. This works even in pretty old environments, for example Ubuntu 18.04 which has Python 3.6.

      • Internet/Gemini

        • Re: ROOPHLOCH 2022

          A few days back @solderpunk (of Gemini fame) announced ROOPHLOCH (Remote Outdoor Off-grid Phlogging Challenge) 2022.

          [...]

          My first (failed) attempt involved trying to compose a phlog post using a series text messages using a basic Nokia feature phone. Technology failures got the better of me however. If you want to know more, read § 2022-09-07 @21:20 +0200 of my Journal.

      • Announcements

        • Announcing the Collaborative Directory of Geminispace

          It can be tricky to find the good stuff in Geminispace. For glog posts we’re well served by Antenna et al, but Gemini isn’t just about feeds. There are many capsules with interesting static content not dribbled out in regular updates, as well as a variety of interactive services, mirrors, databases, and so forth. Search engines help, but you have to know what you’re looking for. The medusae.space directory of capsules is nice, but it’s incomplete and, since it catalogues capsules rather than individual resources, somewhat unfocused.

          So, I thought it might help to have a directory along the lines of 90′s Yahoo! — a simple categorised directory of links with brief titles/descriptions. Since I can’t hope to keep such a thing up-to-date myself, links are contributed by users.

      • Programming

        • Forth progress, deviations

          My Forth bender is moving along nicely. I can parse numbers (in any base, 16 or less), search for words, and do rudimentary output. In well under 2K of code.

          I fully expect to be defining words today. My assembly craving is being satisfied, and I am almost sorry to be so close to done with this part of the project.

          I am conidering doing something else in assembly, but a Forth-like assembly. That is, imposing the datastack paradigm for parameter passing, and maybe adding some macros for structuring. That will help me organize code and still enjoy the low-level fun of assembly, with no HLL shackles.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

The Openwashing Festival of ‘Linux’ Foundation

Posted in Deception, GNU/Linux, Kernel, Microsoft at 3:22 pm by Dr. Roy Schestowitz

Video download link | md5sum 3b4ae470689a1a20cd39f2fb1e4b1ff2
Openwashing Foundation in Linux Clothing
Creative Commons Attribution-No Derivative Works 4.0

Summary: The brand “Linux” is being ruined by people who misuse it to promote stuff that’s inherently incompatible or antithetical to Linux

THE video above concerns dozens of puff pieces tied to press releases from the Linux Foundation, starting this past Monday and still going on. It’s a paid-for PR charade, it is not journalism.

GAFAM and ZemlinI’ve chosen to explain what’s happening using Geminispace, where Tux machines is nowadays running and is being developed (Git log). There are about a couple dozen puff pieces and not a single person wrote an article from a critical/sceptical perspective. The openwashing of proprietary software and surveillance companies is itself bad enough; that the puff pieces moreover portray outsourcing to Microsoft GitHub (proprietary) as becoming vendor-neutral or “opening” is truly a tragedy. That’s also an attack on Git, not just on the Linux brand.

“At the moment Jim Zemlin and his cohorts, who don’t even use Linux themselves, are wiping the floor with “Linux”, reducing Linux to a shitty brand that means nothing at all.”Linus Torvalds would be wise to protect his brand from devaluation or dilution. At the moment Jim Zemlin and his cohorts, who don’t even use Linux themselves, are wiping the floor with “Linux”, reducing Linux to a shitty brand that means nothing at all. This is why more and more people start speaking of Free software instead of Open Source. It’s also why many geeks have started dabbling in BSDs.

Links 14/09/2022: Pixelbook Grounded

Posted in News Roundup at 9:33 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Hardware

        If you want a 100% repairable laptop, you can buy one from Framework, and build it yourself. It is mostly compatible with free software, and soon they are going to switch to coreboot.

        If you want a corebooted Linux laptop, you can buy one from System76, Purism, Novacustom or Starlabs. [...]

      • PC WorldGoogle is done making its own Chromebooks

        In short, it sure feels like Google’s Chrome OS and Chrome hardware teams aren’t on the same page. And if The Verge’s report is accurate, the latter doesn’t really exist anymore. The former isn’t doing so hot, either: after a phenomenal sales boom during the pandemic, global Chromebook shipments dropped by more than 60 percent in the first quarter of 2022. Previously outselling Mac hardware and posing a serious threat to Windows in the budget segment, Chrome OS powered just 6 percent of new laptops sold in the same period.

      • The VergeGoogle canceled its next Pixelbook and shut down the team building it

        Google has canceled the next version of its Pixelbook laptop and dissolved the team responsible for building it. The device was far along in development and expected to debut next year, according to a person familiar with the matter, but the project was cut as part of recent cost-cutting measures inside of Google. Members of the team have been transferred elsewhere inside the company.

      • Linux LinksLinux Around The World: Latvia – LinuxLinks

        We cover events and user groups that are running in Latvia. This article forms part of our Linux Around The World series.

    • Server

      • OpenSource.comPackaging Job scripts in Kubernetes operators

        When using a complex Kubernetes operator, you often have to orchestrate Jobs to perform workload tasks. Examples of Job implementations typically provide trivial scripts written directly in the manifest. In any reasonably-complex application, however, determining how to handle more-than-trivial scripts can be challenging.

        In the past, I’ve tackled this problem by including my scripts in an application image. This approach works well enough, but it does have a drawback. Anytime changes are required, I’m forced to rebuild the application image to include the revisions. This is a lot of time wasted, especially when my application image takes a significant amount of time to build. This also means that I’m maintaining both an application image and an operator image. If my operator repository doesn’t include the application image, then I’m making related changes across repositories. Ultimately, I’m multiplying the number of commits I make, and complicating my workflow. Every change means I have to manage and synchronize commits and image references between repositories.

        Given these challenges, I wanted to find a way to keep my Job scripts within my operator’s code base. This way, I could revise my scripts in tandem with my operator’s reconciliation logic. My goal was to devise a workflow that would only require me to rebuild the operator’s image when I needed to make revisions to my scripts. Fortunately, I use the Go programming language, which provides the immensely helpful go:embed feature. This allows developers to package text files in with their application’s binary. By leveraging this feature, I’ve found that I can maintain my Job scripts within my operator’s image.

      • Kubernetes BlogKubernetes 1.25: PodHasNetwork condition for pods | Kubernetes

        Kubernetes 1.25 introduces Alpha support for a new kubelet-managed pod condition in the status field of a pod: PodHasNetwork. The kubelet, for a worker node, will use the PodHasNetwork condition to accurately surface the initialization state of a pod from the perspective of pod sandbox creation and network configuration by a container runtime (typically in coordination with CNI plugins). The kubelet starts to pull container images and start individual containers (including init containers) after the status of the PodHasNetwork condition is set to True. Metrics collection services that report latency of pod initialization from a cluster infrastructural perspective (i.e. agnostic of per container characteristics like image size or payload) can utilize the PodHasNetwork condition to accurately generate Service Level Indicators (SLIs). Certain operators or controllers that manage underlying pods may utilize the PodHasNetwork condition to optimize the set of actions performed when pods repeatedly fail to come up.

    • Instructionals/Technical

      • 17+ Best Linux Books – For Different Target Groups and Use Cases

        This article will go through the best Linux books for all the different target groups and use cases.

      • LinuxiacHow to Install Oracle Linux 9: A Complete Step-by-Step Guide

        This guide will walk you through installing Oracle Linux 9, a high-performance, secure, and enterprise-ready RHEL fork.

        Oracle Linux has a history dating back more than 15 years of consistent stability and reliability, being a popular choice among the large enterprise segment.

        The distro is fully 1:1 binaries compatible with Red Hat Enterprise Linux (RHEL) and is entirely free (available under the GNU General Public License) to download and use.

      • Russell CokerStoring Local Secrets – etbe – Russell Coker

        In the operation of a normal Linux system there are many secrets stored on behalf of a user. Wifi passwords, passwords from web sites, etc. Ideally you want them to be quickly and conveniently accessible to the rightful user but also be as difficult as possible for hostile parties to access.

        The solution in GNOME and KDE is to have a wallet that is encrypted to store such passwords, the idea is that if a hostile party gets access to a PC that doesn’t use full disk encryption then the secrets will be protected. This is an OK feature. In early versions it required entering a password every time you logged in. The current default mode of operation is to have the login password used to decrypt the wallet which is very convenient.

        The problem is the case where the user login password has a scope larger than the local PC, EG a domain login password for Active Directory, Kerberos, or similar systems. In such a case if an attacker gets the encrypted wallet that could facilitate a brute force attack on the password used for domain logins.

        I think that a better option for this would be to store wallets in a directory that the user can’t access directly, EG a mode 1770 directory with group “wallet”. Then when logging in a PAM process running as root could open the wallet and pass a file handle to a process running in the context of the user. For access apart from login there could be SETGID programs to manage it which could require authenticating the user’s password before any operation that exports the data so that a vulnerability in a web browser or other Internet facing program can’t just grab the file contents.

      • UNIX CopHow to install WebTorrent Desktop on Ubuntu 22.04

        In this post, you will learn how to install WebTorrent Desktop on Ubuntu 22.04

    • WINE or Emulation

      • Its FOSSCrossOver Review: The ‘Premium Wine’ to Run Windows Software on Linux

        It is not an emulator program. Instead, it provides a compatibility layer on top of your host operating system to make it possible to run Windows software.

        In other words, it adds components that windows software needs to run on any supported OS.

        But how well does it work? Can you run all Windows software using it? Is it a viable solution for you to ditch Windows for good?

        Here, I shall share my experience with using CrossOver on Linux and sharing my experience with it.

    • Games

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • SaaS/Back End/Databases

      • UbuntuShould you use open-source databases?

        Several sources confirm the growing popularity of open-source databases. For example, the DB-Engines ranking shows that open-source databases have been overtaking commercial ones since early 2021 in terms of popularity.

        The top 4 most used databases are, indeed, all open source.

        The adoption of open-source databases is set to grow. According to this Percona survey, nearly half of IT companies are planning to increase their adoption of open-source solutions in the upcoming years…

    • Programming/Development

      • Linux HintArrays in C

        The array represents the collection of various items that have a similar data type and are stored in the physically adjacent memory addresses. The data type of the items in an array must be similar and it can be any data type as char, integers float and double, or even the structures. In an array, the sequence of the items is stored in the form of indices. The items in the array are stored from left to right. The left-most items are the initial items with zero (0th) index. The right-most items have the index (n-1). The “n” signifies the total number of items in the array. We may access any item or member of the array with its index which is the memory location of the item.

        In programming languages, we are required to make the arrays because we have to define more variables with the ordered values like 1-200. So, instead of separately defining and storing the values in 200 variables, we rather just make an array of size (200).

      • Linux HintArrow Operator in C

        “The use of the arrow operator is very common in all programming languages, e.g., C, C ++, etc. The arrow operator is used to point out the memory address of the different members of either the Union or the Structure. This operator is symbolically made by combining the symbolic representation of the ” greater than (>)” and the “subtraction operator (-)”. So as a whole, this operator looks like an arrow, e.g., ” ->”. We use this operator with the pointer variable so that we can access the element of the structure and modify its values that are already stored in the memory according to our requirements. The arrow operator, along with the pointer variable, is used since it provides fast access to the elements (improved execution) and it takes the lesser memory.”

      • HackadayC23 Programming For Everyone

        Here’s a history quiz: What architecture did the first C++ compiler target? Of course, it is a trick question. The original C++ — known then as C with classes — compiler wrote out standard C code that you then compiled for whatever your target was. This has a lot of advantages since C compilers are everywhere. Now we are seeing a similar approach to bring C23 to the world with Cake. Cake can translate C23 or other versions to C99 which you can then compile with normal compilers.

    • Standards/Consortia

      • No Yes/No, yes? | Attracted by virtual constructs

        Some time ago I ran into a variant of a self-service checkout system in a supermarket which, when asking for applying the data collection identity card, used a dialog with the button options “Yes” & “No”. Being privacy-positive, my thoughts were, yes, I want to keep my data private, and was about to press the “Yes” button. Only to check once more and find that the question actually was “Do you want to use our card?”. Which made me wonder why in the year 2022 new systems are developed that apply that old pattern of “Yes” & “No” replies. And reminded me that also in newer software made in the KDE community I had seen new appearances of that scheme. Had it not been found to be inferior, from what I had seen by-passing in the HMI field?

        [...]

        On a quick look I could not find related scientific research reports that could back up the guideline recommendations. But instead I came across research about the related field of designing questionnaires, on the topic of preventing errors in the given answers e.g. due to misunderstandings or lack of concentration. And that seemed to confirm that people gave more correct answers and also felt it simpler to do when the items representing the choice (e.g. a text next to a checkbox) themselves had clear unique references to the choice instead of being abstract items whose meaning only could be known by the assignment to a choice in the question itself. Abstract items being things like colors, shapes, positions, numbers or the very Yes & No.

        Not seen discussed or even researched, but my theory would be that things are worse even when there is a memory effect and something could mean the opposite in other similar choices.

        [...]

        With the upcoming KDE Frameworks 6 API series around the corner, it would be good to have some substitute API done before, so the HIG-conflicting API could be deprecated still for KF5. And KF6 would only hold API trapping developers into more HIG-conforming UIs.

        Some, sadly non-exciting proposals to address this should appear in the next days, both as further blog posts as well as MR with actual code.

      • IRC × OAuth 2.0 · emersion

        In the past few days I’ve been working on better integrating IRC with OAuth 2.0. In a nutshell, my goal is to make IRC clients obtain a token by interacting with an OAuth 2.0 server, and then use that token to authenticate with the IRC server. This effort has resulted in various patches for meta.sr.ht’s OAuth 2.0 server, for the soju IRC bouncer and for the gamja & goguma IRC clients.

  • Leftovers

    • The VergeWelcome to the new Verge

      So we’re back to basics with something we’re calling the Storystream news feed, right on our homepage. Our plan is to bring the best of old-school blogging to a modern news feed experience and to have our editors and senior reporters constantly updating the site with the best of tech and science news from around the entire internet. If that means linking out to Wired or Bloomberg or some other news source, that’s great — we’re happy to send people to excellent work elsewhere, and we trust that our feed will be useful enough to have you come back later. If that means we just need to embed the viral TikTok or wacky CEO tweet and move on, so be it — we can do that. We can embed anything, actually: I’m particularly excited that we can directly point people to interesting threads on Reddit and other forums. The internet is about conversations, and The Verge should be a place to find great conversations.

    • Telex (Hungary)Ryanair to reduce number of Budapest flights on seven routes this winter
    • The NationMichael Mann Returns to the Scene of the Crime

      It’s an old showbiz joke: Given half a chance, even the most glamorous actor or actress will tell you that what they really want to do is direct. In the last few years, though, it turns out that what the great directors really want to do is write novels.

    • Science

      • uni MichiganVisualizing nanoscale structures in real time | University of Michigan News

        Open-source software enables researchers to see materials in 3D while they’re still on the electron microscope

      • Exploring Reinforcement Learning To Control Nuclear Fusion Reactions – News – Carnegie Mellon University

        A student in Carnegie Mellon University’s School of Computer Science (SCS) has used reinforcement learning to help control nuclear fusion reactions, a significant step toward harnessing the immense power produced in nuclear fusion as a source of clean, abundant energy.

      • New York TimesThe Supply Chain Broke. Robots Are Supposed to Help Fix It. – The New York Times

        The people running companies that deliver all manner of products gathered in Philadelphia last week to sift through the lessons of the mayhem besieging the global supply chain. At the center of many proposed solutions: robots and other forms of automation.

        On the showroom floor, robot manufacturers demonstrated their latest models, offering them as efficiency-enhancing augments to warehouse workers. Driverless trucks and drones commanded display space, advertising an unfolding era in which machinery will occupy a central place in bringing products to our homes.

        The companies depicted their technology as a way to save money on workers and optimize scheduling, while breaking down resistance to a future centered on evolving forms of automation.

      • BBCRobot boat maps Pacific underwater volcano – BBC News

        A robot boat, controlled from the UK, has returned from an initial survey of the underwater Tongan volcano that erupted explosively back in January.

        The Uncrewed Surface Vessel (USV) Maxlimer is part-way through mapping the opening, or caldera, of the underwater Hunga-Tonga Hunga-Ha’apai (HTHH) volcano.

    • Education

    • Hardware

      • HackadayInexpensive Reading Glasses Become Stereoscope

        It’s an unfortunate consequence of growing older, that no longer are you able to read the print on a SOT-23 package or solder a QFN without magnification. Your eyes inexorably start to fail, and to have any hope of continuing a set of reading glasses is required. We have this in common with [Niklas Roy], who noticed while shopping for cheap reading glasses that their lenses were of surprisingly good quality. The result of this observation was a stereoscope made from card and a few euros worth of eyewear.

      • HackadayResin Cleanup: A Sticky Situation

        We’ll admit it. We like the results of resin 3D printing, but we don’t always care for the mess. We aren’t alone, and a common issue is to have drips of resin on your LCD screen — a potential disaster. You ought to have a screen protector, but yeah… you should back up hard drives, too. [Jessy] has the same problem and he has heard that you can easily clean cured resin from the screen using wood glue. Does it work? Check out the results of three glues in the video below.

    • Health/Nutrition/Agriculture

    • Proprietary

    • Linux Foundation

    • Security

      • The Global State of Cybersecurity Is Not Good – IT Jungle

        “It’s a jungle out there” may be the best way to summarize the state of cybersecurity at the moment, as recent global events coalesce into a melting pot of politically motivated hackers, the criminal underground, foreign scammers, and widespread domestic vulnerabilities.

        Let’s start with everybody’s favorite topic: scams. If you’re longing for the simple days of the Nigerian 419 scams, you’re not alone, as the playing field for scams has evolved considerably in recent years. That’s not to minimize the continued threat of the 419 scam, which sometimes resulted in a physical kidnapping, or worse. But the idea of getting ripped off via world travel sounds almost quaint by today’s rough-and-tumble digital standard.

      • OpenSource.com3 steps to protect your home network

        The typical setup for Internet connectivity today is for your home to have a router, usually a little physical box located somewhere in your house, that acts as a gateway to the rest of the world. The router creates a local network, and you connect your devices to it, including your computer, mobile, TV, game console, and anything else that needs to connect to the Internet or to each other. It’s deceptively easy to think of this setup as there being two “sides” of your router: On one side there’s the Internet, and on the other, your devices. That’s an awful colloquial, though, because in reality there’s an entire worldwide network of computers on one side of your router, and your digital life on the other. When you use the Internet directly, you’re logging onto a shared area of somebody else’s computer. When you’re not using the Internet, it doesn’t go away, and there are lots of scripts and programs out there designed to visit millions upon millions of routers in an attempt to find open ports or services. With the Internet of Things (IoT) commonplace, there are sometimes more services running on your home network than you realize. Here are three steps you can take to audit and protect your home network from unwanted traffic.

      • Krebs On SecurityWormable Flaw, 0days Lead Sept. 2022 Patch Tuesday

        This month’s Patch Tuesday offers a little something for everyone, including security updates for a zero-day flaw in Microsoft Windows that is under active attack, and another Windows weakness experts say could be used to power a fast-spreading computer worm. Also, Apple has also quashed a pair of zero-day bugs affecting certain macOS and iOS users, and released iOS 16, which offers a new privacy and security feature called “Lockdown Mode.” And Adobe axed 63 vulnerabilities in a range of products.

      • LWNSecurity updates for Wednesday [LWN.net]

        Security updates have been issued by CentOS (open-vm-tools), Debian (freecad and sqlite3), Fedora (qt5-qtwebengine and vim), SUSE (firefox, kernel, libzapojit, perl, postgresql14, and samba), and Ubuntu (dotnet6, dpdk, gdk-pixbuf, rust-regex, and systemd).

      • Hacker NewsSparklingGoblin APT Hackers Using New Linux Variant of SideWalk Backdoor [Ed: It's malware, not a "backdoor"; unlike Windows, here one needs to actually install it]

        A Linux variant of a backdoor known as SideWalk was used to target a Hong Kong university in February 2021, underscoring the cross-platform abilities of the implant.

    • Defence/Aggression

      • The HillTop election security official warns of election workforce problems: 1 in 3 have left posts

        “As these stories of threats and intimidation are shared, people who would normally be poll workers on Election Day or work at a voting center are taking a step back and saying, ‘I don’t know that it’s worth my life or worth my personal safety,’” she added.

        Wyman also said that state officials across the country are having trouble hiring poll workers ahead of the midterm elections.

      • Counter PunchColombian Intelligence Operations, with US Backing, Are Bad for Peace

        Colombian intelligence operations serve U.S. imperialist objectives as they target Cuba and Venezuela. Colombian governing authorities appear to have forgotten the legacy of independence hero Simón Bolívar who, up against Spanish rule and U.S. pretentions, fought for Latin American unity. In 1829 he remarked that, “The United States appear to be destined by Providence to plague America with misery in the name of liberty.” He was denouncing unencumbered U.S. license to control Spanish America, as proclaimed in the Monroe Doctrine of 1823 and still in force.

      • Counter PunchContractors Cash in as Congress Adds Billions to the Pentagon Budget

        It would be one thing if such added funding were at least crafted in line with a carefully considered defense strategy.  More often than not, though, much of it goes to multibillion dollar weapons projects being built in the districts or states of key lawmakers or for items on Pentagon wish lists (formally known as “unfunded priorities lists”). It’s unclear how such items can be “priorities” when they haven’t even made it into the Pentagon’s already enormous official budget request.

      • Meduza‘We’re going to shoot your child’: A woman from a village in Ukraine’s now-liberated Kharkiv region recounts life under Russian occupation — Meduza
      • TruthOutJan. 6 Committee Member Suggests Ending Electoral College
      • The Gray ZoneVIDEO: 13-year-old on Ukrainian gov’t kill list speaks out
      • MeduzaArmenia asks Russia for assistance after skirmishes with Azerbaijan — Meduza

        Armenian public television reports that the Armenian government has appealed to Russia, the member states of the Collective Security Treaty Organization (CSTO) and, the UN Security Council after skirmishes on the border with Azerbaijan took place on the night of September 13.

      • MeduzaUkraine produces draft agreement on security guarantees, urges allies to maintain sanctions against Russia — Meduza

        Andriy Yermak, head of the Office of the President of Ukraine, and Anders Fogh Rasmussen, former general secretary of NATO, have released recommendations for guaranteeing Ukraine’s security, reports the Ukrainian leader’s press office.

      • Meduza‘When you’re nearly 100, you can’t be too afraid’: A WWII vet explains why he still protests in the streets of Novosibirsk — Meduza
      • Democracy NowJulian Aguon: U.S. Militarization of Guam Is “Nothing Less Than Cataclysmic”

        The geopolitical rivalry between the United States and China is reshaping life in the U.S. territory of Guam, where the already-massive military presence is set to expand as the Pentagon builds up its capabilities in the Pacific. “We are directly in the line of fire,” says Julian Aguon, a CHamoru writer and human rights lawyer, who describes the build-up of U.S. troops and military infrastructure on Guam as “nothing less than cataclysmic” for the Indigenous people. Aguon also talks about the ongoing fight for independence in Guam, which he says the U.S. has thwarted for more than a century. “The U.S. is a country that prefers, routinely, power over strength and living over letting live.” Aguon is the author of several acclaimed books, including, “The Fire This Time: Stories of Life Under U.S. Occupation” and “What We Bury at Night: Disposable Humanity.” His most recent book, released Tuesday, is titled “No Country for Eight-Spot Butterflies.”

      • TruthOutFormer British Colonies in Caribbean Consider Cutting Ties to the Monarchy
      • Counter PunchCool Subjects: The Other Side of Elizabeth II’s Reign

        Negative commentary, notably of the brisk too-soon mould, caused sparks and retributive anger. When news of Elizabeth II’s deteriorating condition reached critical race theorist and Carnegie Mellon academic Uju Anya on September 8, she jumped on Twitter with menacing enthusiasm. “I heard the chief monarch of a thieving raping genocidal empire is finally dying. May her pain be excruciating.” In the room next door, grant applications for future funding were probably being written.

      • Democracy NowJamaica, Antigua & Barbuda May Cut Ties to British Monarch; Renew Call for Reparations for Slavery

        We look at how the death of Queen Elizabeth II is prompting former British colonies in the Caribbean to replace the British monarch as their head of state. Antigua and Barbuda’s prime minister has vowed to hold a referendum soon on whether to become a republic, and Jamaica’s ruling Labour Party also plans a vote. The Caribbean at one point formed the heart of England’s first colonial empire in North America, with millions of enslaved Africans taken to the islands, where many were worked to death. Dorbrene O’Marde, chair of the Antigua and Barbuda Reparations Commission, says he is not personally mourning Queen Elizabeth’s death because her reign helped to “cloak the historical brutality of empire in this veneer of grandeur and pomp and pageantry.” We also speak with renowned Jamaican poet and musician Mutabaruka, who says the British monarchy “represents criminal activity” and that the British state needs to make reparations to former colonies like Jamaica to redress the history of abuses. “Actions speak louder than words,” he says.

      • The NationWith Queen Elizabeth Gone, Monarchy’s Magic May Be Fading

        Queen Elizabeth was “the glue that held our nation together”—or so it has been frequently uttered since Britain’s longest reigning monarch died last week. It is a revealing cliché, simultaneously hinting at the fragility of the country’s social order and the Crown’s abiding function in maintaining it. If, in life, this was the queen’s largely unspoken function, her death unintentionally underlined it.

      • Common DreamsOpinion | The Death of a Queen and the Whitewashing of Empire

        ollowing the death of Queen Elizabeth, no one in the established media is taking any chances with the public mood. Public affection for the late queen is not in doubt, and yet BBC journalists are whipping up paroxysms of grief that wouldn’t be out of place in North Korea.

      • ScheerpostAmerica’s Forever Wars Go Viral

        Andy Kroll traces the pathways we’ve taken from our disastrous war on terror abroad to wildly disturbed and conspiratorial thinking right here at home through the life of one (murdered) young man.

      • ScheerpostRussia’s Underperforming Military (and Ours): Convenient Lessons to Impede Learning

        Russian military ineptitude obliquely affirms the military mastery of the United States. Will the U.S. learn anything from Putin’s disastrous invasion?

      • Meduza‘The public reaction is very emotional,’ says Russian press secretary about war in Ukraine — Meduza

        Dmitry Peskov, press secretary to the Russian president, said that although not all Russians are happy with how the situation in the war zone in Ukraine is developing, the majority, like before, support the president.

      • MeduzaUAF says they have shot down an Iranian drone; Russia denies purchasing such weapons — Meduza

        The Department of Strategic Communications of the Ukrainian Armed Forces (UAF) reported that they shot down an unmanned aerial vehicle (UAV) near Kupyansk, in the Kharkiv region, which “in all likelihood” was produced in Iran.

      • MeduzaRussian Communist Party leader Gennady Zyuganov: ‘The special military operation in Ukraine has escalated into a full-scale war’ — Meduza

        At the first plenary meeting of the Russian State Duma’s fall session on Tuesday, Russian Communist Party (KPRF) leader Gennady Zyuganov said that the “special [military] operation” in Ukraine has grown into a full-fledged war. During the two months that he and his fellow deputies were on vacation, Zyuganova said, the situation on the front has “changed drastically.”

      • Counter PunchNATO’s “death wish” will destroy not only Europe but the rest of the world as well

        This is not the first time that humanity finds itself confronted by a grave crisis that could have been prevented by keeping the promises given to the late Mikhail Gorbachev by the former US Secretary of State James Baker[1] and by other US officials. NATO’s eastern expansion since 1997 has been perceived by Russian leaders as a serious breach of a crucial security agreement with existential overtones. It has been perceived as an ever increasing menace, a “threat of the use of force” for purposes of article 2(4) of the UN Charter. This entails a grave risk of nuclear confrontation, since Russia has a huge nuclear arsenal and the means to deliver the warheads.

      • Common DreamsOpinion | What—If Anything—Will US Military Learn From Putin’s Disastrous Ukraine Invasion?

        In Washington, wide agreement exists that the Russian army’s performance in the Kremlin’s ongoing Ukraine “special military operation” ranks somewhere between lousy and truly abysmal. The question is: Why? The answer in American policy circles, both civilian and military, appears all but self-evident. Vladimir Putin’s Russia has stubbornly insisted on ignoring the principles, practices, and methods identified as necessary for success in war and perfected in this century by the armed forces of the United States. Put simply, by refusing to do things the American way, the Russians are failing badly against a far weaker foe.

      • Common Dreams10,000+ Sign Letter Urging Biden to Reverse ‘Terrorism’ Designation for Cuba

        “Your policies toward Cuba, which have been more aligned with those of President [Donald] Trump than President [Barack] Obama, are hurting the well-being of the Cuban people and run counter to the will of the majority of U.S. citizens,” says the letter, organized by peace campaigners at CodePink. “An important policy change that we urge you to take immediately is to remove Cuba from the list of State Sponsors of Terrorism.”

      • Common DreamsOpinion | Peaceful Resistance Turns Military Might Into Weakness

        Here’s a story I’ve never told before:

    • Environment

      • VOA NewsUN Chief: Climate Impacts Heading to ‘Uncharted Territories of Destruction’

        The impacts of climate change are “heading into uncharted territories of destruction,” U.N. Secretary-General António Guterres warned on Tuesday on the release of a multi-agency scientific report reviewing the latest research on the subject.

        The report, led by the World Meteorological Organization (WMO), warns that the world is “going in the wrong direction” on climate change.

      • Helsinki TimesClimate change is affecting drinking water quality, says study

        Forests play a key role in the water cycle. They filter the water and bind nutrients and are therefore necessary for good water quality. The fewer nutrients – i.e. nitrogen or phosphorous compounds – contained in reservoir water, the better it is for drinking water treatment. “This makes it more difficult for algae to develop, making drinking water treatment in the waterworks more cost-effective and easier,” explains UFZ lake researcher and co-author Dr. Karsten Rinke. “Nutrient management in water conservation areas is therefore very important. Over the past decades, long-term concepts with close cooperation between forest and water management have advanced the development of large areas of forest in the Rappbode reservoir catchment area.” The rapid forest decline in the eastern Harz region is now a matter of grave concern for the reservoir and waterworks operators.

      • The HillDRIED UP: In Utah, drying Great Salt Lake leads to air pollution

        Cars and wildfires contribute to Utah’s air pollution, but the Great Salt Lake is a less obvious but important contributor. Sitting just northwest of Salt Lake City, the largest saltwater lake in the Western Hemisphere is drying up because of water use and drought amid a changing climate, sending dust with toxic metals — including arsenic — in the air of a metro area with approximately 1.2 million people.

      • Common Dreams50,000 People Urge Biden Admin to Reject ‘Archaic’ Oil Terminal in Houston Area

        “Choose our health and our climate over the greed of Enterprise and Enbridge.”

      • Common DreamsNew UN Report Shows Fossil Fuel Addiction Is a ‘Recipe for Permanent Climate Chaos’

        “The current fossil fuel free-for-all must end now.”

      • Energy

        • Le MondeParis monuments to shut off lights at 10 pm to save energy

          The “energy sobriety” plan aims to cut energy use by 10%, said Ms. Hidalgo, which could help soften the blow of rising costs by some 10 million euros. Ms. Hidalgo, a Socialist who played up her efforts to green Paris during a failed presidential run earlier this year, said she would also push the government to do the same for national monuments in the city, such as the Pantheon or the Arc de Triomphe.

        • ABCEiffel Tower to go dark earlier at night in response to energy crisis

          Additionally, the lighting on the exterior facades of all municipal buildings and monuments, including borough town halls, will be turned off at 10 p.m. starting on the same date, she said.

          Public lighting will be maintained to ensure the safety of Parisians, the mayor said.

        • Counter Punch“We’ll Meet Them Out in the Fields”: Challenging the Pipelines to Nowhere

          A company called Summit Carbon Solutions is proposing to build a 2,000-mile network of pipelines sprawling across parts of Iowa, Minnesota, Nebraska, and the Dakotas. The system would collect liquefied carbon dioxide (CO2) from 32 ethanol fuel plants across the region and transport it to North Dakota’s oil country for storage. A second company, Navigator CO2 Ventures, wants to build 1,300 miles of pipeline to pick up CO2 from 20 ethanol and fertilizer plants in the same region but transport it in the opposite direction, to Illinois. At both destinations, the compressed CO2 would be injected into deep rock formations where it is supposed to remain until far-off geologic time.

        • Democracy NowYanis Varoufakis on Europe’s Energy Crisis, War in Ukraine & Crackdown on Dissent After Queen’s Death

          We look at how the Ukraine war is contributing to an energy crisis across Europe with Greek politician and economist Yanis Varoufakis. Last week Russia announced it would not resume sending natural gas to Europe via the Nord Stream 1 pipeline, blaming Western sanctions for supposed maintenance delays keeping the gas shut off. Prior to the war, Russia supplied Europe with 40% of its natural gas, but now European nations must find ways to cope with fuel shortages and soaring energy prices as winter approaches. Varoufakis says a history of market liberalization and reliance on cheap Russian gas has left the continent scrambling, in turn pushing up energy costs in the Global South as richer European countries buy up other sources of energy. “Yet again, Europe is exporting misery to the rest of the world,” says Varoufakis, a member of the Greek Parliament and former finance minister. His latest piece for Project Syndicate is “Time to Blow Up Electricity Markets.”

        • Common DreamsRapid Green Energy Transition by 2050 Could Save the World at Least $12 Trillion

          “Accelerating the transition to renewable energy is now the best bet not just for the planet, but for energy costs too.”

        • Common DreamsOpinion | Europe’s Energy System Is a Scam Against Its Own People

          Amid a growing energy crisis, political leaders across Europe want to divert attention away from their own role in its exacerbation and instead make citizens focus on one thing only: Russia. However, it is far more complex than that.

        • Common DreamsOpinion | The Climate Solution Standing Right in Front of Us: Mature and Old-Growth Forests

          This August, we saw the passage of the historic Inflation Reduction Act, which includes more than 100 programs that will invest about $369 billion in climate action, clean energy jobs, and environmental justice. While this marks the single largest investment in climate action by Congress, it does not mean our work to address the climate crisis is over. It marks just the beginning. 

        • The NationThe Price of Private Equity’s New York Power Plant Grab

          In November 2021, without fanfare, and having received no public comments, the New York Public Service Commission (PSC) issued a succinct declaratory ruling enabling a new company called Generation Bridge LLC to absorb a massive fossil-fuel-burning power plant in Staten Island and another one upstate, in Oswego. The PSC’s language made it seem benign. “No further review will be conducted of the proposed transfer of ownership interests,” the order stated, noting that the direct owners of the Arthur Kill and Oswego Harbor plants were authorized to go into debt for up to $700 million to fund their acquisitions and would continue to be subject to lightened regulation. This story was published in partnership with New York Focus, an independent, investigative news site covering New York state and city politics.

        • TruthOutNuclear Power Is Too Risky Even in Peacetime. Ukraine Is the Tip of the Iceberg.
        • DeSmogGas Companies Accused of Using Hydrogen to ‘Greenwash’ Boilers

          Analysis published today by Global Witness finds that brands including British Gas and Worcester Bosch are portraying “hydrogen blend” boilers as a green way to heat homes. At recent trade fairs, some firms have also had “100 percent hydrogen boilers” on display.

      • Wildlife/Nature

        • Counter PunchA Bigger Hammer Won’t Stop Large Fires

          Yet over and over, lawmakers and others continue to believe that they can control wildfires by “reducing” fuels through logging or prescribed burning and ramping up firefighting.

      • Overpopulation

    • Finance

      • The VergePatreon is laying off 17 percent of its workforce and closing offices

        The layoffs are hitting Patreon’s go-to-market, operations, finance, and people teams. Workers in the US will receive three months’ severance pay as well as two extra weeks per half year of tenure they have beyond their first year at the company. European workers get a similar deal, with three months of healthcare coverage, whereas Americans will get COBRA through the end of 2022. Conte says he’ll be hosting “multiple Q&A sessions” to address the decision.

      • FuturismGoogle Employees Alarmed That the Company Suddenly Expects Them to Do Work [Ed: Media promoting the lie that workers are lazy so that you can abuse them some more]

        Crab cake lunches aren’t enough to quell growing employee discomfort at Google. In late July, Googlers were told to get off their bean bag chairs and work — and now, upon the announcement that the company has extended a two-week hiring freeze, Insider reports that workers have grown increasingly alarmed at the new mandate that they actually do work.

      • TruthOut2021 Had Lowest-Ever Supplemental Poverty Rate, Thanks to Stimulus Provisions
      • TechdirtT-Mobile Fires More Employees After Promising That Most Definitely Wouldn’t Happen After Their Last Merger

        It’s a tale as old as time. Two companies look to merge, and promise regulators that the new super-union will create unlimited, untold synergies. They insist repeatedly the consolidation most certainly won’t raise prices, and that the megadeal will absolutely in no way result in layoffs.

      • Counter PunchRepublicans: Another Reason a Recession Would be Bad News

        I, and others, have pointed out the enormous human costs associated with a recession. Unemployment is traumatic for everyone, but we know that the people who are most likely to lose their jobs in a recession are those who are most disadvantaged in the labor market, such as Blacks, Hispanics, people with less education, and people with a criminal record.

      • Common DreamsHistoric Drop in Child Poverty at Risk Due to Manchin’s Tanking of Key Tax Credit

        According to the federal data, child poverty fell from 9.7% in 2020 to a record low 5.2% last year, a decline that the Census Bureau attributed largely to the Child Tax Credit (CTC) expansion approved under the American Rescue Plan. Stimulus checks and enhanced unemployment benefits also played a role in cutting poverty among children and the U.S. population overall in 2021.

      • Common DreamsManchin Calls in Big Oil CEOs to Help Ram Through Dirty Deal as Backlash Grows

        Bloomberg reported Monday that Manchin’s outreach “has included companies in the mining, utilities, and oil and gas industry,” all of which stand to benefit from a federal permitting overhaul—and all of which donate to the West Virginia Democrat’s political campaigns.

    • AstroTurf/Lobbying/Politics

      • New YorkerThe Search for Dirt on the Twitter Whistle-Blower

        Many of Peiter (Mudge) Zatko’s former colleagues have received offers of payment for information about him.

        On August 23rd, a Slack chat for former employees of the payments company Stripe began filling with accounts of strange queries about an ex-colleague. “I’m getting inundated with paid interview requests,” one of the former employees, Dan Foster, wrote. Another, Marty Wasserman, later posted that he’d received a similar message via e-mail. “Hi Marty, Hope you’re having a great week!” the message read. “I’m currently working on a project regarding leadership in tech, and my client is hoping to speak to an experienced professional about a particular individual you may have worked with.” The message requested a “45-60 minute compensated phone consultation.” Wasserman was suspicious of the timing. “Preeeettyy sure this is regarding Mudge,” he wrote, pasting it in the Slack chat with his former colleagues. “Hard pass.”

        Hours earlier, CNN and the Washington Post had reported that Twitter’s former head of security, Peiter (Mudge) Zatko, had filed a whistle-blower disclosure to federal agencies, accusing the social-media platform of reckless security practices. Zatko’s sweeping claims, if proven, could aid Elon Musk in his attempt to terminate his forty-four-billion-dollar agreement to acquire Twitter, a legal fight with implications of billions of dollars for investors. The dozens of e-mails and LinkedIn messages received by people in Zatko’s professional orbit appeared to be mostly from research-and-advisory companies, part of a burgeoning industry whose clients include investment firms and individuals jockeying for financial advantage through information. At least six research outfits—Gerson Lehrman Group (G.L.G.), AlphaSights, Mosaic Research Management, Ridgetop Research, Coleman Research Group, and Guidepoint—approached former colleagues of Zatko’s at Stripe, Google, and the Pentagon research agency darpa. All offered to pay for information, sometimes noting that the compensation would be high or apparently unrestricted. At least two investment firms, Farallon Capital Management L.L.C. and Pentwater Capital Management L.P., also sought information from individuals close to Zatko.

      • Bruce SchneierWeird Fallout from Peiter Zatko’s Twitter Whistleblowing – Schneier on Security

        People are trying to dig up dirt on Peiter Zatko, better known as Mudge.

        For the record, I have not been contacted. I’m not sure if I should feel slighted.

      • Twitter, Facebook may need license to operate: US senator

        Graham said that he was working on a measure – he did not say what form it would take – with Senator Elizabeth Warren, a Democrat, and Senator Josh Hawley, a Republican. Graham could not be reached for further comment and Warren and Hawley did not immediately return a call for comment.

        At a hearing to discuss security lapses at Twitter, Graham said the companies were allowed to become internationally powerful with few restrictions on what they could and could not do. He also expressed concern that the Federal Trade Commission seemed to have few tools in their regulatory toolbox to rein them in.

      • ABCTwitter whistleblower details allegations to lawmakers

        Last month, he brought sweeping allegations to Congress and federal regulators, contending that Twitter misled regulators about its cybersecurity capabilities and efforts to control millions of fake accounts.

        The Senate Judiciary Committee subpoenaed Zatko to tesitfy, worried that his allegations “raise serious concerns” and potentially “show dangerous data privacy and security risks for Twitter users around the world.”

      • NPRWhistleblower calls out Twitter’s sloppy security in Congressional hearing

        Zatko said Twitter struggled to identify potential infiltration by foreign agents and typically was only able to do so when notified by outside agencies. The company was “unwilling to put the effort in” to hunt down bad actors, he said.

        In his testimony, Zatko painted a portrait of a company beset by widespread security issues and unable to understand the extent and implications of the data it collects.

      • The HillFour takeaways from the Twitter whistleblower hearing

        The hearing also led to calls for restructuring Twitter management, revamping U.S. regulatory agencies, and passing bipartisan bills targeting tech giants that have struggled to get across the finish line.

        Here are four takeaways from the hearing.

      • The HillTwitter shareholders approve Musk merger agreement

        During the special meeting, the shareholders also approved a measure relating to compensation for Twitter executives resulting from the merger agreement.

        After the meeting concluded, an official said more details would be provided publicly in the near future.

      • Counter PunchTrump’s Legal Troubles Bare Secret Government Run Amok

        We laugh  when President Trump, caught trying to steal secret documents that as president he was able to rifle through at will, read in bed, tear up, flush down the toilet, or cart off to his hotel and golf club at Mar-a-Lago, is defended against an FBI raid of his Florida “home,” by right-wing political supporters who say, “If this can happen to an ex-president think what can happen to you?”  (These same right-wing Trump backers have long supported such police-state actions including passing the laws and confirming the judges that allow them to happen, so the hypocrisy is stunning.)

      • Counter PunchElizabeth II and Marsha Hunt: Two Passings That Impoverish Our Memory

        While these two women came from different countries and backgrounds, and took wildly different career paths, I’m struck by what they had in common with each other that few of the rest of us can even remember, let alone really understand.

      • Counter PunchBannon: Another Trumpeter in the Dumpster
      • HackadayHow The BBC (Still) Sends Audio To Transmitter Sites

        Running a radio station is, on the face of it, a straightforward technical challenge. Build a studio, hook it up to a transmitter, and you’re good to go. But what happens when your station is not a single Rebel Radio-style hilltop installation, but a national chain of transmitter sites fed from a variety of city-based studios? This is the problem facing the BBC with their national UK FM transmitter chain, and since the 1980s it has been fed by a series of NICAM digital data streams. We mentioned back in 2016 how the ageing equipment had been replaced with a modern FPGA-based implementation without any listeners noticing, and now thanks to [Matt Millman], we have a chance to see a teardown of the original 1980s units. The tech is relatively easy to understand from a 2020s perspective, but it still contains a few surprises.

      • MeduzaActivists demand Moscow lower greenhouse gas emissions in Russia’s first climate lawsuit — Meduza

        A group of environmental activists have filed a lawsuit in the Russian Supreme Court demanding the revision of a presidential order and a government decree concerning the reduction of greenhouse gas emissions in the country. The filing marks the first climate change-related lawsuit against the Russian government.

      • Craig MurrayThe Question of The Day

        I have just spoken to the media office of the Scottish government, and followed up with this email.

      • The NationEverybody Has a Price: Ari Fleischer, the LIV Golf Tour, and the House of Saud

        Ari Fleischer is a bought man. The former press secretary under George W. Bush, best known for threatening post-9/11 dissenters from the White House press podium and laundering the lie about weapons of mass destruction in Iraq, is now a PR flack for the LIV Golf Tour, the “sportswashing” fig leaf of the House of Saud.

      • The NationAlaska’s Special Election Offers a Lesson for Democrats

        Last month, when Mary Peltola won the special election for Alaska’s sole seat in the US House of Representatives, Democrats gained major ground—literally. By flipping that seat, they doubled the amount of land they represent in the lower chamber of Congress, reflecting how unusual it is that the party was able to succeed in the massive rural state.

      • The NationBarrel of Monkeys
      • MeduzaKazakh president supports bid to change capital’s name back to Astana — Meduza

        Kazakh President Kassym-Jomart Tokayev has endorsed an initiative by parliamentary deputies to change the name of the country’s capital from Nur-Sultan to its previous name, Astana. Kazakh Presidential Press Secretary Ruslan Zheldibai confirmed Tokayev’s support in a Facebook post…

      • The NationCan Stacey Abrams Turn the Tide in Georgia?

        Here’s a case of political affirmative action for white male Republicans: As they run for reelection, Georgia Governor Brian Kemp and Secretary of State Brad Raffensperger, both of whom resisted former President Donald Trump’s arm-twisting to overturn Joe Biden’s victory there, are getting credit as democracy-affirming GOP moderates. Trump backed “Big Lie” primary challengers to both men in May, but both prevailed. That gave them a patina of independence and integrity, and they are leading their Democratic opponents right now—despite their ongoing actions against democracy.

      • Common DreamsNearly 100 Members of Congress Reported Stock Trades That Overlap With Committee Work

        “People wonder why it’s so difficult for Democrats to convince voters that they’ll improve outlooks for working families.”

    • Misinformation/Disinformation

  • Freedom of Information / Freedom of the Press

    • VOA NewsEU Wants to Assess Media Mergers for Media Pluralism, Editorial Independence

      Editorial independence safeguards should consider undue interference by owners, management or governance structures, it added.

      The proposed rules also require regulators to examine whether the merging companies would remain economically sustainable if there was no deal.

      The EU executive and a new European Board for Media Services can offer their opinions on whether the two criteria have been met.

    • teleSURRally Supporting Assange Before Blinken’s Arrival in Mexico

      On Sunday, Julian Assange’s father and brother, John and Gabriel Shipton, were present at a rally outside the U.S. Embassy in Mexico City to demand the release of the Wikileaks founder.

      The 24F Life and Liberty Coalition called for a rally with cyclists before the visit of the U.S. Secretary of State Antony Blinken, who will arrive in this country on Monday for a dialogue with officials from the administration of President Andres Manuel Lopez Obrador ( AMLO).

    • RFERLImprisoned Iranian Journalist Razzagh Faces New Charges

      Saeed Dehghan, Razzagh’s lawyer, wrote in a tweet on September 11 that his client has been accused of “conspiring and colluding against the regime” for managing a popular room on the Clubhouse social media network.

      He also faces two other new charges, including “propaganda against the system and publishing lies with the intention of disturbing the public mind,” which he is accused of for defending people of the Baha’i faith and supporting Sepideh Rashno, a woman who was arrested for protesting mandatory head-scarf rules.

    • TechdirtCalls For Violence Against The Press Have Paid Off: Politician Accused Of Murdering Investigative Reporter

      Given the inalienable protections this country has determined are essential to democracy, the United States has only tolerated limited violence against journalists. Most of this violence is perpetrated by law enforcement officers who feel a fully functioning democracy demands they greet documentation of their acts with force or unjustified arrests.

  • Civil Rights/Policing

    • France24UN accuses Taliban of harassing, detaining female staff in Afghanistan

      Citing an example, UNAMA said three Afghan women working for the organisation were “singled out and temporarily detained for questioning” by armed security agents of the authorities on Monday.

    • Citizen Lab[Repost] Mass DNA Collection in the Tibet Autonomous Region from 2016–2022

      Police have targeted men, women, and children for DNA collection outside of any ongoing criminal investigation. In some cases, police have targeted Buddhist monks. Authorities have justified mass DNA collection as a tool to fight crime, find missing people, and ensure social stability. But without checks on police powers, police in Tibet will be free to use a completed mass DNA database for whatever purpose they see fit. Based on our analysis, we believe that this program is a form of social control directed against Tibet’s people, who have long been subject to intense state surveillance and repression.

    • VOA NewsCrow Tribe Journalism Teacher Seeks Stories No One Tells

      Brien’s interest in reporting started while growing up in Hardin. Skimming her father’s daily newspapers once he was finished with them. What started out as skipping to the comics led to finding her name in the scholastic achiever’s list and eventually to learning about current events through local articles.

      As she grew older, she noticed the lack of news focusing on the Crow Indian Reservation. She said it was her curiosity about a family member who went missing that spurred her own journalistic pursuits. She pestered family members who were reluctant to discuss it and neighbors to find out what everyone knew about the disappearance.

      She learned that people went missing from her community, often without much of a follow-up investigation, more often than she thought.

    • NPRThe economics behind ‘quiet quitting’ — and what we should call it instead

      “People who shut down their laptop at 5… they don’t work for me,” says business thinkfluencer Kevin O’Leary in a CNBC video. “I hope they work for my competitors.”

    • Counter PunchAlabama and the Alabama Room: a Needed Reminder of Successful Arbitration

      If Americans think of Alabama as a Southern state, when public international lawyers and members of the International Geneva community think of Alabama, they think of the Alabama Room in the City Hall of Geneva where the first third-party arbitration took place following the American Civil War. The Room was also the venue for the 1864 signing of the Geneva Convention, the founding act of the International Committee of the Red Cross.

    • TruthOutHundreds Protest as Starbucks Holds Investor Day Without Any Retail Workers
    • Common DreamsOpinion | Is the Right-Wing Supreme Court the Actual Death Panel?

      The U.S. Supreme Court has turned radically to the right. Starting in 2010, the Court decided that corporate spending on politics is protected speech (Citizens United v. FEC). Currently, approximately 84% of Americans think corporate political spending should be limited, but nearly unlimited individual and corporate money is allowed to filter through to campaigns via PACs, Super PACs, and corporate-backed nonprofits such as the Chamber of Commerce that do not have to disclose who the donors are.

    • Pro PublicaVoting Restrictions Could Make It Harder for 1 in 5 Americans to Vote

      For all the recent focus on voting rights, little attention has been paid to one of the most sustained and brazen suppression campaigns in America: the effort to block help at the voting booth for people who struggle to read — a group that now amounts to about 48 million Americans, or more than a fifth of the adult population.

    • Pro PublicaHow Human Traffickers Force Victims Into Cyberscamming

      “Selling a Chinese man in Sihanoukville just smuggled from China. 22 years old with ID card, typing very slow,” one ad read, listing $10,000 as the price. Another began: “Cambodia, Sihanoukville, six Bangladeshis, can type and speak English.” Like handbills in the days of American slavery, the channel also included offers of bounties for people who had run away. (After an inquiry from ProPublica, Telegram closed the White Shark Channel for “distributing the private information of individuals without consent.” But similar forums still operate freely.)

    • Counter PunchOn Lord of the Rings: The Rings of Power, Alt-Right Trolls, and Racism in JRR Tolkein’s Writings

      Putting it simply, Jackson had a lot more to worry about with Film I. Back in 2001, the Kiwi director was an unknown commodity and the studio didn’t know what exactly they had on their hands. Fantasy had been relegated for decades to the B movie ghetto of old men shooting cartoon lightening bolts from their fingers with cutesy sidekicks and knights in tin can shining armor. If Fellowship had bombed, it would have meant that the studio would be stuck with two massive clunkers to dump on direct to video release (remember that veritable toilet of glorious schlock?) As such, Jackson front-loaded the first film with an average of one action set piece every ten minutes or so, which is the recipe for a magnificent epic action movie in the best tradition of Classical Hollywood Cinema.

    • Common DreamsRights Advocates Condemn UK’s Crackdown on Anti-Monarchy Protesters

      “As precious, if not more precious than the monarchy, is the real beautiful web of freedoms and civil liberties that we’ve built up here over centuries, and we’d be very wrong to begin to sacrifice those in this kind of moment.”

    • TruthOutLaw-and-Order Policies Make Us Less Safe. The Trajectory of the ’90s Shows Why.
  • Monopolies

    • TechdirtBehind Washington’s Antitrust Gambit

      Summer is nearly over, but, for many politicians, destructive tech regulations are always in season. Congress is back from recess, and the American Innovation and Choice Online Act (AICOA) is once more under consideration. 

    • The NationVeteran Activist David Segal Shows How to Make an Issue of Corporate Monopolies

      David Segal, a cofounder of the progressive activist group Demand Progress, is mounting a congressional campaign in Tuesday’s Rhode Island Democratic primary that highlights his many years of work on issues of economic, social, racial, and environmental justice—alongside his steady support for a foreign policy focused on peace and diplomacy.

    • TechdirtEurope Moves Forward With Dumb Plan To Tax ‘Big Tech’ To Pad The Pockets Of Big Telecom

      Last year we noted how FCC Commissioner Brendan Carr had launched a bad faith effort suggesting that “big tech” gets a “free ride” on the internet, and should be forced to fund broadband expansion. This argument, that tech giants like Google and Netflix somehow get a free ride (they don’t) and should “pay their fair share” to fund broadband expansion is a fifteen year old AT&T lobbyist talking point.

    • Trademarks

      • TechdirtThe Absurdity Returns: Iceland Foods Appeals Invalidation Of Its Trademark

        I really cannot believe we’re back here. Way back in 2016 we wondered aloud who gets to trademark the word “Iceland”. Confused? Well, Iceland Foods is a grocery in the UK that’s been around since the 1970s. Iceland is also the name of a sovereign nation established in the early 1900s. In 2016, Iceland Foods finally got a trademark on its brand name after years of trying. It then chose to block a trademark application in the EU for “Inspired by Iceland”. The applicant of that mark was the nation of Iceland. The nation, as you might assume, was not pleased and petitioned EUIPO to invalidate the Iceland Foods mark entirely, which it did in 2019. The first part of the title of that last post I did was The End of Absurdity.

    • Copyrights

      • Torrent FreakTelecoms Group Wants to DDoS IPTV Pirates Off The Internet

        In most regions of the world, the problem of IPTV piracy isn’t going away, despite attempts to take illegal services down using enforcement agencies and ISP blocking. In Hungary a new anti-piracy option has been placed on the table – cyberattacks against IPTV pirates. What could possibly go wrong?

      • Torrent FreakAdobe Thinks it Can Solve Netflix’s Password ‘Piracy’ Problem

        As Netflix and similar legal streaming services come under pressure to maximize profits, ‘password piracy’ looks set to become a recurring news event in the months and years to come. Adobe believes that business opportunities exist and is offering its services. Tools include carrots and sticks, supported by intense monitoring of customer behavior.

      • TechdirtTechdirt Podcast Episode 329: Is AI Art The End For Artists?

        The explosion of AI-generated art has taken the internet by storm, and is poised to continue growing for a long time. In turn, that’s sparked a lot of conversation (and a lot of backlash) about the impact on artists — but much of the controversy seems misguided or overblown. This week we’re joined by Rob Sheridan, an artist and designer who has embraced the power of these tools, to discuss what AI-generated art really means for artists.

      • Michael GeistThe Bill C-11 Hearings Are Back, Part Two: The Risks to Canadian Creators

        The first post in my series on Bill C-11 focused on the risks associated with regulating user content. But it isn’t just ordinary users posting on services such as TikTok or Youtube that could find their content subject to regulation. The bill is ostensibly designed to support Canadian creators, yet many fear it will do the opposite. For the independent production sector, there was a late change to the bill as part of the government’s rush to pass it without committee debate that could undermine an essential policy that supports the film and television sector. And for digital creators, there are justifiable fears the bill will result in less revenue, less global exposure, and lost opportunities for one of Canada’s fastest growing cultural sectors.

        The independent production sector issue has not attracted much attention, in part because it was snuck into the bill during a process where the government effectively cut off debate or discussion as it rushed debate on over 150 proposed amendments.

      • Michael GeistThe Bill C-11 Hearings Are Back, Part One: The Risks of Regulating User Content

        The Senate Standing Committee on Transport and Communications resumes its hearings into Bill C-11 this week with plans for four sessions that will hear from a wide range of witnesses. Given the shortcomings of the House committee hearings – numerous important stakeholders were not given the opportunity to appear – the Senate review this fall provides a critical opportunity to re-examine the bill and to address some of its obvious flaws. With that in mind, this post is the first of a series that highlights some of Bill C-11’s major risks and concerns.

  • Gemini* and Gopher

    • Personal

      • The end of the United Queendom

        I’m moderately against monarchy, but I’ve lived in one all my life, so I’m used to it. The queen didn’t seem like an objectionable person, and it’s a sad thing that she died. But the news media have gone bananas. There’s queen coverage everywhere.

        [...]

        People have been arrested for protesting about the new king. A man holding up a blank sheet of paper was told he’d be arrested if he wrote “Not my king” on it (and he posted a video of his discussion with the police to prove it).

        [...]

        My protest idea is to print a t-shirt with a photo of Elvis Presley and “Not my king either”. Subtle enough to avoid arrest?

      • GHILNSR Wordo: CHINK
      • Balance of Power

        Elections tend to get pretty tight and even outside of parliamentary politics it seems that on any issue there is as many people believing in one thing as believing the opposite.

        [...]

        There might be other reasons too. It’s not fully understood, but while the Overton window shifts like a tug-of-war (usually in the wrong direction), there’s usually about as many people on side A as on side B.

        And, take climate change as an example. It’s much more important and urgent and actionable than even side A’s policies reflect (let alone side B which is much worse).

        So it’s not as if they’re tug-of-warring right over the center of the chasm of truth. Instead, they’re both lost far over the edge of wrongness.

        Let’s not delude ourselves here. Side A’s and Side B’s strengths both derive not from truth itself, but from perception of truth. From narrative.

    • Religion

    • Technical

      • Science

        • HackadayNeon Lamps — Not Just For Pilot Lights

          It’s easy to see why LEDs largely won out over neon bulbs for pilot light applications. But for all the practical utility of LEDs, they’re found largely lacking in at least one regard over their older indicator cousins: charm. Where LEDs are cold and flat, the gentle orange glow of a neon lamp brings a lot to the aesthetics party, especially in retro builds.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

[Meme] Microsoft Love

Posted in Deception, GNU/Linux, Microsoft at 8:28 am by Dr. Roy Schestowitz

Recent: Microsoft is Trying to Hire (Read: Pay Salaries to) Matthew Garrett (of ‘secure’ boot infamy)

Microsoft loves Linux Traitors; backstabbers? Yes!

Summary: Now that GNU/Linux approaches 10% in India (personal site) it’s clear that it’s a major threat to Windows (people in India and China don’t choose Apple), hence Microsoft is blocking it from booting and hijacking 'Linux' vendors which would otherwise file antitrust complaints; hiring and using people like Lennart Poettering and Miguel de Icaza is cherry on the cake — indicative of subversive agenda rather than love of Linux

We Exist Because of Software Patents’ Threat to Free Software

Posted in Boycott Novell, Free/Libre Software, Microsoft, Novell, Patents at 8:03 am by Dr. Roy Schestowitz

Jonas Bosson (FFII Sweden) is one among many who explained what Novell had done with Microsoft and why this site exists in the first place:

Jonas Bosson (FFII Sweden)

Summary: Reminder of why Techrights exists and what motivated us (the above petition has long been offline, but we have this local copy of it; 2,221 people added their signatures to this petition by Bruce Perens)

MORE than 7 weeks from now we’re turning 16. It all started in 2006, i.e. around the time of the above petition. We’re of course covering a lot more topics now; what’s more, we’re not limited to campaigning on a single issue. Just over 6 weeks from now the Microsoft-Novell deal turns 16. Then, we too turn 16.

It’s possible that by wintertime, i.e. before the anniversary, we’ll have already begun deploying the new CMS under Alpine Linux. It’s also probable we’ll keep on going for another decade, even if the World Wide Web can barely survive that long.

To get a taste of what the new CMS looks like, check this site or this Gemini capsule. It is worth remembering that this is still work in progress changelog here).

IRC Proceedings: Tuesday, September 13, 2022

Posted in IRC Logs at 2:16 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 QmNauYq3oRzf1vLDGLmoDbuMHj9dhW1Wkj35LgynWDwKWj IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmTFNk7FYk9m8gRfvAyHRedAJVcSrKGBodjT6V8dD4cVSw IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmT8c4dFkxVHvSzUsjVyC9VSTPhPvqeWVkzTg6BmXG6Hwe IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmQjPt9XHYywZztAoHLveZJuXwmQ5Nc8pgHjBcNuqaw99H IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmXmA48kKqaAmt5kvFjyZhnSteJdrjBHw7BWpCWoE4yEMB IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmbhPwPLP8Wr3DUEacGyJNuDu1ouQfVWYJwBWyuC1G8xAz IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmbDrtPDcLVKvSmta6jpwF58c1ZgopHu1XgE8T47dyF2Tp IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmVTWA1iPLsWis5NuG3pTWFtoDGoMhXQjmtSBvdZiEG6mP IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmVMkxTFB9LnSNGEQQ9wHzrmgcc9R1GBBrkXQwesnZn9sF

Software Freedom Conservancy’s (SFC) Income Fell 63% After Working to Oust the Founder of the Free Software Foundation (FSF), Richard Stallman

Posted in Finance, Free/Libre Software, FSF at 2:10 am by Dr. Roy Schestowitz

And then they increased their own salaries some more (in spite of the income falling)

SFC taxes

2020 SFC

Summary: As the IRS forms reveal [PDF] (those are mandatory by the way), the SFC maintains the lifestyle of a couple of fat cats (salaries and bonuses now over $200,000 per annum for the chief; no tax paid by the organisation) and a lot of income was lost after trying to ruin the FSF

Privacy-Respecting Book Loaning

Posted in Videos at 1:17 am by Dr. Roy Schestowitz

Direct link to video

Summary: An old video about how sending data to another country can help bypass oppressive laws at one’s home country

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts