Links 20/09/2022: OpenJDK Java 19 and System76 Thelio Puff Pieces; More Debian-Private ‘Leaks’

Posted in News Roundup at 1:14 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • FOSSBytesIt Is 2022, And Time To Let Go Of The “Linux Is Hard To Use” Satire

      When was the last time you installed an operating system? If your answer is “A few years ago” or “When I got my first PC in the early 2000s or 2010s, you should try installing one. But instead of Windows, why not try installing Linux this time? I know that people have previously complained about how hard installing and using Linux could be, but what if I told you that it’s not hard; in fact, using Linux is just a piece of cake these days.

      When choosing operating systems, Windows is a straightforward choice for millions out there, and why wouldn’t it be? It’s still widely believed to be one of the easiest OS. However, with the growth of Linux over the past few years, Windows is no longer the only easy OS to use and install. It’s time to let go of the “Linux is hard to use satire,” get out of our comfort zones and embrace the project that truly respects your privacy and grants extra layers of security. Here’s a list of things that prove Linux is not hard to use.

    • 9to5LinuxSystem76 Announces Redesigned Linux-Powered Thelio Desktops with Swappable Accents – 9to5Linux

      Linux hardware vendor System76 announced today a new line of Thelio desktop computers that feature a full chassis redesign with support for swappable accents.

      Thelio is System76’s flagship Linux-powered desktop computer lineup that comes in no less than five different configurations, both internal and external. The Thelio’s current lineup includes the Thelio, Thelio Mira, Thelio Major, Thelio Mega, and Thelio Massive models.

    • PhoronixSystem76 Launches Redesigned Thelio Desktop
    • Beta NewsSystem76 Thelio Linux desktop chassis gets a sexy redesign that may not give you wood [Ed: The clickbait from Fagioli is getting worse. "sexy redesign"... "may not give you wood"]

      System76′s Thelio desktop computers have been notable for three things — being assembled in the USA, running Linux-based operating systems, and having a largely wooden chassis. Moving forward, the PC will still be assembled in America and ship with a Linux distribution (Ubuntu or Pop!_OS), but it won’t necessarily contain any wood.

      You see, the computer manufacturer has decided to redesign the chassis to be mostly aluminum, save for a thin accent strip. Actually, while the strip can be made of wood, not all of them are. In other words, it is not a given that a Thelio desktop will contain any wood — only if you specifically choose a wooden access strip. Some of the strips are instead made of powder-coated aluminum. And yes, you can replace the strip by easily pinching and sliding it off.

    • VideoThe New 2022 System76 Thelio Desktop with a Customizable Case (Full Review) – Invidious

      System76 revolutionized desktop PC’s with their Thelio desktop, and now the company has released a refresh that has a very interesting feature. In addition to many small tweaks and modifications, the new model actually lets you swap the new accent panel with one of several variations at any time. In this video, Jay will give you a full day 1 review of the brand new Thelio.

    • VideoLet’s compare the BRAND NEW System76 Thelio to the 2019 Thelio – Invidious

      System76 has a brand new design for their flagship PC: Thelio. In this video we’re going to compare the differences between the 2019 Thelio I own and their latest revision.

    • Linux Format 294

      Linux Mint 21 is here and it’s awesome! We show you not only how to get it installed but how you can multi-boot it with Windows and a plethora of other Linux distros! Along the way discovering Logical Volume Management, delve into the UEFI system and play with partitions!

      PLUS: How open source can save the smart home, discover OpenIndiana, create better cutouts with GIMP, hide messages in images, set up your 3D printer for better prints, recreate Pac-Man with Python, boost your creative writing and more!

    • Desktop/Laptop

      • Its FOSSLoongson is Getting Ready for LoongArch Linux Laptops

        Don’t confuse it with Arch Linux :)

        LoongArch is a CPU architecture by Loongson Technology.

        Recently, Loongson added the initial support for LoongArch CPU architecture in Linux Kernel 5.19.

        If you are curious, LoongArch has similar attributes to RISC-V. You can also call it a new RISC ISA (Instruction Set Architecture).

        Want more technical details? The Linux Kernel’s documentation is your friend.

        While it is not popular, a new CPU architecture support is always welcome and opens up various opportunities with new hardware.

    • Audiocasts/Shows

    • Kernel Space

      • LWNLinux 5.19.10
        I'm announcing the release of the 5.19.10 kernel.
        All users of the 5.19 kernel series must upgrade.
        The updated 5.19.y git tree can be found at:
                git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.19.y
        and can be browsed at the normal kernel.org git web browser:
        greg k-h
      • LWNLinux 5.15.69
      • LWNLinux 5.4.214
      • LWNLinux 5.4.214
      • LWNLinux 4.19.259
      • LWNLinux 4.14.294
      • LWNLinux 4.9.329
      • Welcome to Théo Lebrun! – Bootlin’s blog

        We are happy to announce that Théo Lebrun has joined our engineering team, as of September 9, 2022, just in time to attend the Embedded Linux Conference Europe with the rest of the Bootlin engineering team.

      • Linux Foundation Europe Launched; Aims To Accelerate Open Collaborative Efforts
      • The Register UKLinux Foundation launches European division • The Register

        The body behind the biggest open source project in the world has opened a European division.

        Sometimes, attending a European trade show – even virtually – can give you a slight feeling of being a supporting feature, with the main act happening in North America, usually some time earlier. So the launch of the Linux Foundation Europe in Dublin last week was a welcome change. After all, the Linux kernel itself was originally a European project, from a member of Finland’s Swedish-speaking minority.

    • Applications

      • Linux LinksSaving Money with Linux: PowerTOP

        We reduced power consumption from the BIOS in the previous article in this series. And we’re using GNOME’s Balanced power saving mode. What else is next?

        Let’s try PowerTOP, software that displays data about the power use of a Linux system. What piqued our interest is that the software analyzes power issues and offers optimization suggestions. Let’s see what it suggests.

        PowerTop is available from the repositories of all main Linux distros, so installing it on your system is straightforward.

      • Linux Hint10 Best Terminal Alternatives for Ubuntu

        The Terminal emulators listed here are tested on Ubuntu 22.04 LTS and could work easily on older releases depending on the hardware resource you have.

      • 9to5LinuxPipeWire Gets Initial Support for Next-Generation Bluetooth LE (Low Energy) Audio

        PipeWire is becoming the norm in audio and video handling among GNU/Linux distributions as more and more of them are switching to it as the default server for handling audio, video streams, and hardware, as well as its powerful session and policy manager WirePlumber.

        From my perspective, because of the above, PipeWire is getting a lot of attention from developers these days, and the latest addition paves the way for support of the next generation of Bluetooth audio with the initial implementation of Bluetooth LE (Low Energy) audio support.

      • Make Tech EasierWhy You Should Use Timeshift to Back Up Your Computer – Make Tech Easier

        Timeshift is a relatively new utility for Linux, but it’s something that’s become so essential to desktop users that many distros have added it to their official repositories. This nifty application essentially brings the System Restore utility from Windows to Linux.

        Timeshift allows you to create incremental backups that produce exact images of your system at a specific point in time. You can use them to restore your system to the exact state that it was in when the backup was made. Since they’re incremental, they don’t take nearly as much hard drive space to store. In this post we show you how to get started with Timeshift on your own desktop.

    • Instructionals/Technical

      • Linux HandbookHow to Change IP Address in Linux

        As a sysadmin, you’ll often deal with IP address configuration. Changing the IP address is one of the common IP configuration tasks.

        While the IP addresses on most systems are configured automatically, you may need to change them manually in some cases.

        In this article, you’ll see various ways to change the IP address in Linux. I’ll also focus on Ubuntu network configuration separately.

      • IT Pro TodayHow to Install Docker on Ubuntu

        Ubuntu makes it easy to install Docker. Install Docker on Ubuntu by following the steps in this how-to article.

      • ID RootHow To Install Pinta on Manjaro 21 – idroot

        In this tutorial, we will show you how to install Pinta on Manjaro 21. For those of you who didn’t know, Pinta is a free, open-source program for drawing and image editing. It is designed to have lots of amazing features yet it has a very simple and minimalistic interface. For anyone looking for a powerful yet user-friendly image editor, Pinta is an excellent option.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Pinta image editor on a Manjaro 21 (Ornara).

      • Linux CapableHow to Install Floorp Browser on Manjaro 21 Linux

        Floorp is a new, privacy-friendly Firefox-based browser developed by the Japanese student community. The browser is designed to provide users with a fast, private browsing experience while protecting their online privacy. Floorp uses several privacy-enhancing features, including a built-in ad blocker, tracker blocker, and cookie manager. In addition, the browser includes several other useful features, such as a dark mode, bookmarks sync, and an integrated password manager.

        The following tutorial will teach you how to install Floorp on Manjaro 21 Linux. The tutorial will use the command line terminal with yay AUR helper. Ideally, most users may be using some wrapper for Pacman; for new users, it is essential to install one to keep your packages up-to-date while you learn Arch/Manjaro.

      • Linux CapableHow to Install Gnome Text Editor on Manjaro 21 Linux

        The Gnome Text Editor, better known as GEdit or Text Editor, is a free and open-source text editor which is part of the Gnome Desktop Environment. It has been designed with usability and accessibility in mind and features a clean and straightforward interface. GEdit is highly configurable and supports various programming languages and file formats. It can be extended with plugins to add additional functionality, such as spell-checking and code completion. The Gnome Text Editor is an ideal choice for those who need a versatile and powerful text editing tool.

        The following tutorial will teach you how to install Gnome Text Editor on Manjaro 21 Linux. The tutorial will use the command line terminal with yay AUR helper. Ideally, most users may be using some wrapper for Pacman; for new users, it is essential to install one to keep your packages up-to-date while you learn Arch/Manjaro.

      • Linux CapableHow to Install Pinta on Manjaro 21 Linux

        Pinta is an open-source image editing tool available for free, and it has quickly become a favorite among novice and experienced users. One of the things that makes Pinta so appealing is its ease of use. The interface is clean and intuitive, and users can quickly find the necessary tools. Even better, Pinta offers a wide range of features, including support for layers, transparency, and high-resolution images. For anyone looking for a powerful yet user-friendly image editor, Pinta is an excellent option.

        The following tutorial will teach you how to install Pinta on Manjaro 21 Linux. The tutorial will use the command line terminal and the default Arch Linux/Manjaro repository.

      • Trend OceansHow to Limit the Rate of Connections in NGINX – TREND OCEANS

        Rate limiting is very crucial for a website with a massive user base to avoid 503 or 429 errors. Even if you have a small website, you should limit the rate of each connection to prevent DDOS attacks (which are surely going to spoil the user experience) or prevent your server from receiving too many requests at the same time.

        So, the question is how the rate limit for connections (or requests) will work on your NGINX server. The answer is pretty simple. Let me give you an example:

        You have a room with space for 20 people. Usually, they come and go simultaneously, but in a situation where more than 20 people arrive in your room, you will gently avoid them with a message like 429 (too many people).
        In such a situation, you can either kick them out and say “never ever gonna come here” or let them wait in the queue until the same number of people inside the room leave.

        It’s all your choice what you wish to do with the extra people who arrived. So let’s see how you can apply this terminology to your NGINX server using the directives.

      • TecMintInstall UrBackup [Server/Client] Backup System in Ubuntu

        Backups are an integral part of any operating system. They ensure that critical copies of data are always available in the unfortunate event that the system crashes or something goes wrong.

        Urbackup is an efficient and easy-to-use Client-Server backup system for Linux and Windows Systems. It’s a fast and reliable Linux backup tool that provides a web interface that allows you to add clients whose files and directories need to be backed up.

        Urbackup employs deduplication to store backups on either Windows or Linux servers. Backups are created quietly without interrupting other running processes in the system. Once backed up, files can be restored through a web interface while drive volumes can be restored with a bootable USB-Stick.

      • Linux Shell TipsHow to Install SELinux to Harden Apache Webserver

        Security Enhanced Linux or SELinux is responsible for the implementation of mandatory access control mechanisms on major Linux distributions like Fedora, RHEL, and Rocky Linux. These access control mechanisms guarantee increased security on all processes and files within a Linux operating system distribution.

      • TecAdminHow to quit/exit/deactivate a Python Virtualenv – TecAdmin

        The Python virtual environment provides a command “deactivate” to go back to normal. Once the virtualenv is activated, you simply run the below command to deactivate the environment and get the original shell back.

      • TecMintMonitor Linux Users Activity with psacct or acct Tools

        psacct or acct both are open source utilities for monitoring users’ activities on the Linux system. These utilities run in the background and keep track of each user’s activity on your system as well as what resources are being consumed.

        I personally used these tools in our company, we have a development team where our developers continuously work on servers. So, these are the best utilities to keep an eye on them.

        These programs provide an excellent way to monitor what users are doing, what commands are they executing, how many resources are being consumed by them, and how long users are active on the system. Another useful feature is, that it gives total resources consumed by services like Apache, MySQL, FTP, SSH, etc.

      • AddictiveTipsHow to install the Fedora 37 beta

        psacct or acct utilities run in the background and keep track of each user’s activity on your Linux system as well as what resources are being consumed.

      • Simon JosefssonPrivilege separation of GSS-API credentials for Apache – Simon Josefsson’s blog

        To protect web resources with Kerberos you may use Apache HTTPD with mod_auth_gssapi — however, all web scripts (e.g., PHP) run under Apache will have access to the Kerberos long-term symmetric secret credential (keytab). If someone can get it, they can impersonate your server, which is bad.

        The gssproxy project makes it possible to introduce privilege separation to reduce the attack surface. There is a tutorial for RPM-based distributions (Fedora, RHEL, AlmaLinux, etc), but I wanted to get this to work on a DPKG-based distribution (Debian, Ubuntu, Trisquel, PureOS, etc) and found it worthwhile to document the process. I’m using Ubuntu 22.04 below, but have tested it on Debian 11 as well. I have adopted the gssproxy package in Debian, and testing this setup is part of the scripted autopkgtest/debci regression testing.

      • OpenSource.com3 ways to use the Linux inxi command | Opensource.com

        3 ways to use the Linux inxi command Don Watkins Tue, 09/20/2022 – 03:00
        I was looking for information about the health of my laptop battery when I stumbled upon inxi. It’s a command line system information tool that provides a wealth of information about your Linux computer, whether it’s a laptop, desktop, or server.

        The inxi command is licensed with the GPLv3, and many Linux distributions include it. According to its Git repository: “inxi strives to support the widest range of operating systems and hardware, from the most simple consumer desktops, to the most advanced professional hardware and servers.”

        Documentation is robust, and the project maintains a complete man page online. Once installed, you can access the man page on your system with the man inxi command.

      • Red Hat OfficialDeploy an ARM64 Fedora VM on your PC: 3 steps | Enable Sysadmin

        Set up a virtual machine to test your applications, binaries, and container images on different architectures.

      • TechRepublicHow to prevent the Firefox web browser from consuming too many system resources

        Jack Wallen shows you prevent Firefox from consuming all of your system resources and make the browser faster.

        Every so often I give up on Firefox, only to return to it at a later time because I find other browsers to be either unreliable, unsafe or just too bloated with features. I want a web browser to be a web browser, not a kitchen sink filled with features I neither need nor want.

        One of the reasons that sends me away from Firefox is how heavy it can be on system resources. When it has trouble, I can start Firefox and hear the fans on my System76 Thelio come to life as if to say: “Captain, I’m giving her all she’s got!” Well, Scotty, sometimes it’s just not enough, and Firefox brings the system to a halt.

      • TechRepublicHow to upgrade Fedora to the beta version of 37 | TechRepublic

        Okay, let me start by saying: Don’t do this on a machine you depend upon for productivity.

        With that warning out of the way, let’s talk Fedora 37 beta. This upcoming release will include GNOME 43, a much-improved file manager, improved support for web apps, a new system menu and a new device security panel. Given how amazing Fedora 36 has been, logic would dictate that 37 will be nothing but improvements to what many consider to be the best Linux distribution on the market.

      • TechRepublicHow to deploy the Percona database performance monitor with Docker | TechRepublic

        If you’re a database admin, you might want to be able to keep track of the performance of those servers. Jack Wallen shows you how with Percona and Docker.

      • Trend OceansHow to Increase NGINX Worker Connections Limit in Linux – TREND OCEANS

        NGINX provides you with many more options than any available web server provides to customize your website for performance, optimization, and security.

      • Linux HintHow to Install Oracle Java JDK 18 on Debian and Ubuntu

        “After reading this tutorial, you will be able to install both Oracle Java JDK and OpenJDK on Debian and based Linux distributions, including Ubuntu. The process also includes instructions to add the JAVA HOME path.”

        This tutorial explains how to install Oracle Java JDK 18 on Debian-based Linux distributions easily.

        This document is optimized both for users looking for fast instructions to implement and for users looking for theoretical knowledge. For practical purposes, theoretical content was placed at the end of the instructions.

        All steps described in this tutorial contain screenshots, making it easy for every Linux user to follow them independently of their expertise level.

      • Linux HintWhat Version of Linux Mint Am I Running?

        Every Linux distribution has different versions available in the market. Whenever a newer version is released, most users are tempted to upgrade their systems. However, to install the latest available release, they must know the current Linux version that they are using. Therefore, this guide will explain the four different methods of checking the Linux Mint version.

      • OSTechNixUpgrade Offline Debian Systems With Apt-offline – OSTechNix

        A while ago, we have shown you how to install software in an offline Ubuntu Linux system. Today, we will see how to fully update and upgrade offline Debian-based systems using Apt-offline utility. Unlike the previous method, we do not update/upgrade a single package, but the whole system. This method can be helpful in situations where you have slow Internet speed or don’t have an active Internet connection at all.

      • Linux HintWhere and How are Passwords Stored on Linux

        “A username and password for a single account are the primary requirements for accessing a Linux system. In order to verify a user during a system login attempt, all user accounts passwords are saved in a file or database. Finding this file on a user’s machine is beyond the knowledge and abilities of every user. Linux checks the password given by the user against an entry in one or more files located in the directory named “/etc.” when the user logs in with a username and password.

        All the crucial data required for user login is stored in the /etc/passwd files. The user’s account information is kept in the /etc/passwd file, to put it another way. The entire list of users on your Linux system is contained in this plain text file. It contains data about the user name, password, group ID, user id, shell, and home directory. Only superuser or root user accounts should have restricted write access permissions.”

        This article will show you where and how to save the passwords for system user accounts on Linux distributions.

    • Games

      • OMG UbuntuSuperTuxKart 1.4 Revs Up for Release with Visual Improvements

        Yep, that revving you hear is the sound of a new release candidate.

        The last few releases of SuperTuxKart have, it has to be said, spoiled us in terms of new karts, characters, tracks, features, game modes and more — the upcoming SuperTuxKart 1.4 release is no different!

        A stack of visual changes are proffered in the latest builds. Collectable items are said to have a “more dynamic and polished way to interact with players”, something you can (partially) see demoed in this gif…

    • Desktop Environments/WMs

      • GSoC’22: Adding Custom Actions to Screenshooter

        Screenshooter (xfce4-screenshooter), as the name suggests, is an application that takes screenshots. Some action is needed once the screenshot is taken on the captured image. Currently, the application provides four well-defined actions: to save the picture, open the image, copy it into the clipboard, and upload it to Imgur. But some users may want to perform other specific actions after taking the screenshot, such as printing them or sending them over an email. So the task was to allow users to add custom actions that can be executed once the screenshot is taken. Similar functionalities are also present in Thunar and AppFinder.


        Then comes the most crucial part, where the custom action gets executed. Here we don’t read the list, just the command and name stored in the ScreenshotData structure. The absolute path of the image first replaces the placeholder text. Then “g_spawn_async” is used to execute the command asynchronously. It’s done asynchronously so that the command may not block the application.

        This implementation’s beauty lies in how we have used the already implemented code. Once the image is captured, it is stored in the /tmp directory using the “Save” option. Then the execution part happens. So under the hood, two actions are occurring from the action selection dialog box.

      • GSoC’22: The Final Report

        My days as a GSoC mentee have ended, and I would like to share everything I have done during these days and what is left. I have posted a few blogs already, so if you have read them, you already know what I have done, and thus you can skip to the last section.

      • K Desktop Environment/KDE SC/Qt

        • KDE OfficialThe Kdenlive Fundraiser is Live

          Up until now, when KDE has run a fundraiser, or received donations, the proceedings have gone to KDE as a whole. We use the money to fund operational costs, such as office rent, server maintenance, and salaries; and to pay for travel expenses for community members, event costs, and so on. This has worked well and helps the KDE Community and common project to flourish.

          But the fundraiser starting today is very different. For the first time KDE is running a fundraiser for a specific project: today we have the ambitious goal of raising 15,000€ for the Kdenlive team. The funds will be given to contributors to help Kdenlive take the next step in the development of KDE’s advanced, free and open video-editing application. For the record, on the cards for upcoming releases are nested timelines, a new effects panel, and improving the overall performance of Kdenlive, making it faster, more responsive, and even more fun to work with.

        • GamingOnLinuxKDE are raising funds for the Kdenlive video editor

          Kdenlive, a powerful free and open source video editor from the KDE team is now having a dedicated fundraising campaign to support the team working on it.
          Probably one of my favourite pieces of software, which I often have a love / hate relationship with due to some historic instability issues it has genuinely gotten a lot better there. It could be improved as with anything and these funds will help towards that.

      • GNOME Desktop/GTK

        • Linux MagazineCanonical May Be Replacing GNOME Software With a Community-Driven Flutter Store – Linux Magazine

          An alternative to GNOME Software has been written, using Flutter, and it’s making enough noise that Canonical is rumored to be considering using it as the default.

          A community-drive software store, named Ubuntu Software Store, has been written in Flutter and received so much positive attention that Canonical is, according to this Reddit thread, considering it as a replacement for GNOME Software.

          The features found in Ubuntu Software Store include Snap support, dbpk/rpm support, an adaptive layout, install from file manager, remove and update software, permission manager, and search. But the most impressive aspect of Ubuntu Software Store is its speed. Unlike GNOME Software (on Ubuntu), which can be quite slow, Ubuntu Software Store is fast.

  • Distributions and Operating Systems

    • Reviews

      • TechRadarWireshark review

        Wireshark is a free, open-source vulnerability scanning tool that relies on packet sniffing to get a precise picture of network traffic. It’s a terrific tool for troubleshooting all sorts of issues and bugs, it works perfectly with multiple OS’, and it helps capture the traffic traveling through the network. Unfortunately for beginners, Wireshark is geared towards tech-savvy users only.

        Whether you’re a cyber security professional, software development enthusiast, or aspiring network engineer – if you want to tackle network troubleshooting that includes inspecting individual packets, you’re probably considering using Wireshark.

    • Screenshots/Screencasts

    • Fedora Family / IBM

      • H2S MediaEuroLinux Desktop, or Enterprise Linux for Windows users – Linux Shout

        EuroLinux Desktop is a modern operating system that combines the aesthetics and functionality of Windows and macOS with the reliability and security of server Linux distributions. The software, built upon the source code of Red Hat Enterprise Linux 9, incorporates a series of changes to the user interface, introduced by EuroLinux. The system was designed for use in office work, public institutions, companies, educational institutions, and private users. It is covered by 10 years of technical support from the manufacturer.

        The premiere of the EuroLinux Desktop, an operating system prepared for personal computers, took place on September the 20th, 2022. This solution is designed for people and organizations which use Windows or macOS daily and are looking for a stable system with many years of technical support as well as a similar aesthetic to Microsoft and Apple. The new system intuitively responds to the needs of public administration, the financial sector, educational institutions, and private users. EuroLinux Desktop is based on the source code of Red Hat Enterprise Linux 9, the system that is universally used in the most demanding environments (banks, stock exchanges, industry). However, it includes additional functionalities, extensions, and facilities.

      • Enterprisers Project5 pillars of modern digital transformation | The Enterprisers Project

        Companies today need to continuously reimagine themselves to stay relevant. In a hypercompetitive, fast-moving business landscape, we cannot rest on our laurels or put off digital transformation projects for a better time. This mindset is critical to surviving at a time when digital transformation is flipping traditional business models to better enable digital engagement and the use of digital products and services.

        Throughout my career as a technology executive in both the public and private sectors, I’ve led and been heavily involved in several transformation projects, including the implementation of a new association management system last year at ISACA.

      • Enterprisers ProjectEdge computing: 4 use cases for the industrial sector | The Enterprisers Project

        Given the relationship between edge computing and IoT, it’s unsurprising that the industrial sector – which spawned its own IoT sub-category, aka Industrial IoT (IIoT) – is ripe with edge computing use cases.

        The industrial sector – which we’re using here as a broad term for businesses like manufacturing and energy (think heavy machine manufacturing and power plants, for example) – actually had a head start on the edge concept: Industrial SCADA systems. In short, these are local, isolated control systems responsible for all manner of critical industrial and other processes on-premises. You could think of these as precursors of modern edge architecture.

    • Debian Family

      • European Heritage Days & Debian-Private leaks 1996 to 1998 inclusive

        In the spirit of the hugely popular European Heritage Days, where unusual buildings and artworks are opened to the public for one weekend each year, Debian Suicide FYI volunteers are opening the debian-private vaults to bring you more relics from that period in the 1990s when volunteers were hoodwinked by Bruce Perens, Software in the Public Interest and trademarks.

    • Devices/Embedded

      • Linux GizmosAI Vision dev kit based on Allwinner V853 SoC includes 7″ LCD and dual cameras

        Crowd Supply recently featured an open-source V853 Development board accommodating the high-performing V853 System-on-Chip (SoC). This device provides a 7” MIPI LCD, dual camera modules and many other peripherals to target AI-Vision applications.

        The V853 Dev board comes in a 4-layer PCB featuring a Cortex-A7 core (up to 1GHz), a RISC-V E906 core (up to 600MHz) and a 1-TOPS Neural Processing Unit NPU (NPU). The memory system available is about 512MB DDR3 while storage offered is 8GB of eMMC and an SD card slot.

      • CNX SoftwareKhadas Edge2 Pro review – A Rockchip RK3588S SBC tested with Ubuntu 22.04

        We’ve had a sample of the Khadas Edge2 single board computer powered by Rockchip RK3588S octa-core Cortex-A76/A55 processor for a couple of weeks, and now that the board is officially launched we can post our review of the board with Ubuntu 22.04, and we’ll check out Android 12 later on.

        The Khadas Edge2 comes in two variants: Basic and Pro, We received the Edge2 Pro SBC with 16GB RAM and 64GB flash that ships with two WiFi antennas by default, but the company also sent a low-profile fansink and thermal pad for cooling that in theory would be optional, but in practice, it is required as while the board runs fairly cool considering the performance it brings, it still needs a heatsink to prevent overheating and throttling. The fan may not really be necessary though as we’ll see below.

      • CNX SoftwareJeVois-Pro ultra-compact deep learning camera gets 26 TOPS Hailo-8 AI accelerator

        JeVois-Pro tiny AI camera was introduced last year with an Amlogic A311D processor with a built-in 5 TOPS NPU, and support for an Intel Myriad X or Google Edge TPU M.2 card all that in a compact 50x50x45 mm box.

        The company has now managed to get hold of some M.2 A+E 2230 Hailo-8 modules delivering up to 26 TOPS of AI performance and is selling for JeVois-Pro ultra-compact deep learning camera with the Hailo-8 accelerator for $599 delivering up to 31 TOPS once we include the built-in 5 TOPS NPU.

    • Open Hardware/Modding

      • HackadayA Peppy Low Power Wall Mounted Display

        [Phambili Tech] creates a battery powered mountable display, called “the Newt”, that can be used to display information about the time, calendar, weather or a host of other customizable items.

      • UbuntuUbuntu Blog: Common use cases for digital twins in automotive

        Digital twins have become somewhat of a buzzword in the past couple of years. But what exactly are they? A digital twin, as its name indicates, is a non-physical copy of a physical object. Just like a digital scan of a physical picture. This virtual element enables a real-time view of all relevant data coming from said object. Depending on the system being studied, specific sensors can be tracked and monitored. This allows for the replication of the system’s environment (adherence of the road, weather, surrounding objects or systems, etc). In this blog post, we will discuss digital twins and their use cases in automotive.

      • ArduinoImprove your astrophotography quality with this automatic lens heater | Arduino Blog

        Nighttime photography, and especially astrophotography, requires very long exposure. To get a good picture of the stars, you might leave the shutter open for several minutes. That gives nature plenty of time to produce dew on your lens, which can ruin the photo. The solution is a lens heater, but running that heater all night can consume a lot of power. That’s why Andrew Brocklesby built this automated lens heater that only activates when necessary.

        Heated dew straps are common and affordable pieces of equipment for photographers. They slip over the frame of the lens and use electrical resistance to produce heat. Like the rear defroster on your car, that heat helps get rid of the condensation that forms as humid air comes into contact with a cool surface. Brocklesby’s device takes into account that the condensation doesn’t form unless both the ambient temperature and humidity are at specific levels. If they aren’t, then there is no need to activate the lens heater and waste power.

      • ArduinoImprove your cooking with home automation | Arduino Blog

        Cooking is something many of us love to do at home. There are few feelings more rewarding and satisfying than throwing together a delicious meal in your own kitchen and sharing it with family or friends.

        However, cooking can be tough. There are lots of things to pay attention to, lots that can go wrong, and lots of preparation and planning to stay on top of. The good news is that home automation has many different solutions to make the cooking process easier, more fun, and more organized.

      • HackadayThe Inner Machinations Of The Arduino Are An Enigma

        Arduinos have been the microcontroller platform of choice for nearly two decades now, essentially abstracting away a lot of the setup and lower-level functions of small microcontrollers in favor of sensible IDEs and ease-of-use. This has opened up affordable microcontrollers to people who might not be willing to spend hours or days buried in datasheets, but it has also obscured some of those useful lower-level functions. But if you want to dig into them, they’re still working underneath everything as [Jim] shows us in this last of a series of posts about interrupts.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Industrial Systems

      • Red Hat OfficialHow Red Hat is reshaping the fabric of industrial computing at the edge with NVIDIA

        Computing at the edge is fueling the need for special-purpose hardware and software infrastructure that complements computational capabilities found in a typical datacenter. The advent of Industry 4.0, the term often used to describe the fourth industrial revolution, has shifted the focus of industrial innovation toward the edge where operational technologies (OT) and traditional IT converge.

        This convergence requires organizations to adopt modern, software-defined practices that provide more effective and efficient data analysis closer to the source; implement on-premise artificial intelligence (AI) infrastructure for near real-time predictive analytics; and enable digital twin environments.

      • UbuntuUbuntu Core set to redefine industrial computing with new edge AI platform NVIDIA IGX | Ubuntu

        Enterprises struggle to bring AI and automation to the edge due to strict requirements and regulations across verticals. Long-term support, zero-trust security, and built-in functional safety are only a few challenges faced by players who wish to accelerate their technology adoption.

        At Canonical, we are excited by the promise of bringing secure AI and automation to the edge, and we look forward to providing a stable, open-source foundation for NVIDIA IGX, a new, industrial-grade edge AI platform announced by NVIDIA today. IGX is purpose built for high performance, proactive safety, and end-to-end security in regulated environments. The first product under the IGX platform is NVIDIA IGX Orin, designed to deliver ultra-fast performance in size and power. It’s ideal for use cases in manufacturing, logistics, energy, retail and healthcare.

      • CISACISA Releases Eight industrial Control Systems Advisories | CISA

        CISA has released eight (8) Industrial Control Systems (ICS) advisories on September 20, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

    • Programming/Development

      • DevOps World 2022: Cloud-Native Will Force CI/CD Issue

        It may have taken longer than anyone initially expected, but the cloud-native era for building and deploying applications has finally arrived. Nearly every major application development initiative being launched today is based on a microservices architecture that runs natively on platforms such as Kubernetes.

      • LLVM 15.0.1 Released!

        I am happy to announce that LLVM 15.0.1 is now available!

      • We need more sub-languages :: Sébastien Wilmet’s blog

        Specifically for the GNOME community, Kell writes about GObject and its introspection system (GIR) in Towards a dynamic object model within Unix processes, with liballocs. I didn’t try testing it in practice against codebases I work on, but it would be valuable.

      • Python

        • RkBlog :: Watching docker logs in the browser with Python and Eel

          Multiple microservices deployed with Kubernets and Docker mean multiple containers to check for logs when debugging or watching internal communication. It would be handy if we could look through logs in a more organized way – and that’s how Docker-watcher was born.

      • Java

        • JDK 19 Release Notes

          These notes describe important changes, enhancements, removed APIs and features, deprecated APIs and features, and other information about JDK 19 and Java SE 19. In some cases, the descriptions provide links to additional detailed information about an issue or a change. This page does not duplicate the descriptions provided by the Java SE 19 ( JSR 394) Platform Specification, which provides informative background for all specification changes and might also include the identification of removed or deprecated APIs and features not described here.

  • Leftovers

    • Pro PublicaHow Pig Butchering Scams Work

      If you’re like most people, you’ve received a text or chat message in recent months from a stranger with an attractive profile photograph. It might open with a simple “Hi” or what seems like good-natured confusion about why your phone number seems to be in the person’s address book. But these messages are often far from accidental: They’re the first step in a process intended to steer you from a friendly chat to an online investment to, ultimately, watching your money disappear into the account of a fraudster.

    • HackadayKeyboard Shortcuts At The Touch Of A Planetary Cube

      [Noteolvides] creates the CubeTouch, a cube made of six PCBs soldered together that creates a functional and interactive piece of art through its inlaid LEDs and capacitive touch sensors.

    • Education

    • Hardware

      • HackadayRetrotechtacular: The Original Robot Arm

        Do you know the name [George Devol]? Probably not. In 1961 he received a patent for “Programmed Article Transfer.” We’d call his invention the first robot arm, and its name was the Unimate. Unlike some inventors, this wasn’t some unrealized dream. [Devol’s] arm went to work in New Jersey at a GM plant. The 4,000 pound arm cost $25,000 and stacked hot metal parts. With tubes and hydraulics, we imagine it was a lot of work to keep it working. On the other hand, about 450 of the arms eventually went to work somewhere.

      • HackadayMulti-Stage Ion Thruster Holds Exciting Promise

        Anyone who’s looked into high-voltage experiments is likely familiar with ion lifters — spindly contraptions made of wire and aluminum foil that are able to float above the workbench on a column of ionized air. It’s an impressive trick that’s been around since the 1950s, but the concept has yet to show any practical application as the thrust generated isn’t nearly enough to lift a more substantial vehicle.

      • Hackaday2022 Cyberdeck Contest: The Hosaka MK I Connects You To Cyberspace, Neuromancer Style

        It’s hard to pin down exactly what a cyberdeck is, as we’ve seen through the huge variety of designs submitted to our 2022 Cyberdeck Contest. The most basic requirement is that it is a type of portable computer, typically with a futuristic, cyberpunk-style design, but beyond that, anything goes. The original concept was introduced in William Gibson’s novel Neuromancer, where it refers to portable devices used to connect to cyberspace. The design of the ‘decks is not described in detail, but we do know that Case, the protagonist, uses a Hosaka computer which is supposedly “next year’s most expensive model”.

    • Health/Nutrition/Agriculture

      • Common Dreams‘No Regard for the Law’: Starbucks to Deny Union Workers New Paid Leave Benefits

        According to an internal memo obtained by More Perfect Union, Starbucks is set to announce Monday that it is ending Covid-19 sick pay benefits that offered employees two five-day rounds of paid leave per quarter if they contracted the virus or were exposed to it.

      • The NationWe Didn’t Vanquish Polio. What Does That Mean for Covid-19?

        I must have been unlucky to catch polio in Cork, Ireland, in 1956, as this was one of the last polio epidemics ever in Western Europe and the US. Jonas Salk had discovered a vaccine that had been successfully tested the previous year, and at the time I fell ill, mass inoculation was being rolled out for the first time to stop the spread of the virus in Chicago. Across the city, health workers took over vacant shops, the forecourts of gas stations, the backs of trucks, parks, and street corners to vaccinate people. The number of new infections declined as herd immunity was established, marking a turning point in the effort to stop epidemic polio. The success of this decades-long campaign was one of the greatest American achievements in the 20th century.1Adapted from Patrick Cockburn’s The Broken Boy (2022), which is available from orbooks.com and wherever books are sold.

      • Common DreamsBiden Rebuked for Claiming ‘Pandemic Is Over’ as Hundreds Die of Covid Each Day in US

        “We still have a problem with Covid,” Biden acknowledged in a “60 Minutes” interview aired on Sunday night. “We’re still doing a lotta work on it.”

      • ScheerpostHow Humans Are Making Pandemics Three Times More Likely

        Mitchell Beer reports on two factors that are leading scientists to predict a tripling in pandemics in the future.

    • Proprietary

    • Privatisation/Privateering

      • TruthOutEntirety of Puerto Rico’s Private Power Grid Knocked Out Before Hurricane Hit
      • Democracy NowBlackout in Puerto Rico: Whole Island Loses Power Amid Hurricane Fiona as Privatized Grid Collapses

        More than 1.5 million people are in the dark after Hurricane Fiona knocked the power out across all of Puerto Rico Sunday, triggering floods and landslides. We go to San Juan for an update from Democracy Now! correspondent Juan Carlos Dávila, who describes how privatization of the island’s electrical grid coupled with a legacy of U.S. colonialism “has really caused the crisis.” We also speak with former San Juan Mayor Carmen Yulín Cruz as President Biden has declared a national emergency and federal aid pours in. “The distribution has to be robust and has to be people-centered and community-centered,” notes Cruz.

      • Common DreamsOpinion | Climate Crisis and the Age of the Super-Typhoon: Storms Batter Puerto Rico, Pakistan, Japan, and Shanghai

        A mere category 1 hurricane dumped so much water on Puerto Rico so quickly that one of its rivers has swollen to 25 feet above normal, even more than it rose during Hurricane Maria in 2017, which was a Category 5 hurricane. The island is beset by flash floods, and is getting 16-30 inches of rain. The usual average amount of rainfall received by Puerto Rico is 31 inches, so it is getting from six months’ to a year’s worth all at once in a single day. All power was knocked out, though the government is vowing to get it back on in days, not the months it took after Maria. Puerto Ricans are U.S. citizens, though it is a territory and not a state. President Biden declared a state of emergency.

      • Common DreamsPuerto Rico Blackout From Fiona Fuels Calls for ‘Immediate Climate Action’

        “The climate crisis is urgent and here. We will continue to fight for policies that can protect our planet and people.”

      • Democracy NowStronger & Wetter: Michael Mann on How Climate Change Makes Storms Worse & Why We Must Cut Emissions

        Climate Week kicks off this week in New York City as more than 150 world leaders gather for the U.N. General Assembly and as Hurricane Fiona rips through Puerto Rico, Typhoon Nanmadol slams southern Japan, and Typhoon Merbok floods parts of western Alaska. We speak to climate scientist Michael Mann about how climate change has changed the pattern of tropical storms, and what needs to happen to address the crisis. He says rising global temperatures have worsened the effects of storms like these, and more aggressive climate legislation from Congress is needed. “We are experiencing devastating consequences of past climate inaction, and it really drives home the importance of taking action now,” says Mann.

    • Security

      • OpenSource.comSecurity buzzwords to avoid and what to say instead | Opensource.com

        Technology is a little famous for coming up with “buzzwords.” Other industries do it, too, of course. “Story-driven” and “rules light” tabletop games are a big thing right now, “deconstructed” burgers and burritos are a big deal in fine dining. The problem with buzzwords in tech, though, is that they potentially actually affect your life. When somebody calls an application “secure,” to influence you to use their product, there’s an implicit promise being made. “Secure” must mean that something’s secure. It’s safe for you to use and trust. The problem is, the word “secure” can actually refer to any number of things, and the tech industry often uses it as such a general term that it becomes meaningless.

        Because “secure” can mean both so much and so little, it’s important to use the word “secure” carefully. In fact, it’s often best not to use the word at all, and instead, just say what you actually mean.

      • Chrome & Edge Enhanced Spellcheck Features Expose PII, Even Your Passwords

        Chrome’s enhanced spellcheck & Edge’s MS Editor are sending data you enter into form fields like username, email, DOB, SSN, basically anything in the fields, to sites you’re logging into from either of those browsers when the features are enabled. Furthermore, if you click on “show password,” the enhanced spellcheck even sends your password, essentially Spell-Jacking your data.

      • CNX SoftwareChipWhisperer-Husky is a palm-sized power analysis and fault injection tool (Crowdfunding) – CNX Software

        NewAE Technology’s ChipWhisperer-Husky is a compact tool designed for side-channel power analysis and fault injection with features such as a high-speed logic analyzer used to visualize glitches, real-time data streaming for attacking asymmetric algorithms, and support for JTAG/SWD programming.

      • LWNSecurity updates for Tuesday [LWN.net]

        Security updates have been issued by Fedora (dokuwiki and rizin), SUSE (libcontainers-common, permissions, sqlite3, and wireshark), and Ubuntu (tiff, vim, and xen).

      • Privacy/Surveillance

        • EFFHow to Ditch Facebook Without Losing Your Friends (Or Family, Customers or Communities)

          Watch the video on Youtube

        • Daniel AleksandersenReview: Aqara indoor climate sensor (for home automation) | Ctrl blog

          I’ve bought three Aqara sensors for use around my home, so I’ve had the opportunity to compare them to each other and other reference measuring tools. I don’t have any scientifically calibrated thermometers or hygrometers. However, I have half a dozen, and they all agree with each others readings.

        • Papers PleaseCBP aggregates and disseminates travel data from warrantless searches

          Use of the fruit of this surveillance of travelers hasn’t been limited to the government agency that first obtained it from travelers or commercial third parties, or to the purpose that purportedly allowed CBP to obtain it without warrant or probable cause. No access logs are maintained for some of these databases of travel surveillance data, so it’s impossible to audit how they have been used.

        • Red HatHow hashing and cryptography made the internet possible | Red Hat Developer

          A lot of technologies, business choices, and public policies gave us the internet we have today—a tremendous boost to the spread of education, culture, and commerce, despite its well-documented flaws. But few people credit two deeply buried technologies for making the internet possible: hashing and cryptography.

          If more people understood the role these technologies play, more money and expertise would go toward uncovering and repairing security flaws. For instance, we probably would have fixed the Heartbleed programming error much earlier and avoided widespread vulnerabilities in encrypted traffic.

          This article briefly explains where hashing and cryptography come from, how they accomplish what they do, and their indelible effect on the modern internet.

    • Defence/Aggression

      • HackadayThe Long Tail Of War: Finding Unexploded Ordnance Before It Finds Us

        Long after the enemy forces have laid down their arms, peace accords have been signed and victories celebrated, there is still a heavy toll to be paid. Most of this comes in the form of unexploded ordnance, including landmines and the severe pollution from heavy metals and other contaminants that can make large areas risky to lethal to enter. Perhaps the most extreme example of this lasting effect is the Zone Rouge (Red Zone) in France, which immediately after the First World War came to a close comprised 1,200 square kilometers.

      • MeduzaRussians barred from entering Poland and Baltic states on Schengen tourist visas — Meduza

        Lithuania, Latvia, Estonia, and Poland’s entry bans for Russian citizens with Schengen tourist visas came into effect on Monday. The new restrictions do not apply to truck drivers, diplomats, and citizens entering for family and humanitarian reasons. In addition, they only apply to the EU’s external borders; Russians with Schengen tourist visas will still be allowed to enter all four countries from within the Schengen zone.

      • Meduza‘DNR’ and ‘LNR’ public chambers call for referendums on Russian annexation — Meduza

        The public chambers of the self-proclaimed Donetsk and Luhansk People’s Republics have appealed to their respective leaders to hold referendums on their incorporation into Russia, according to TASS. Interfax reported that “LNR” officials asked for the referendum to be held “immediately,” claiming Russian annexation would “secure the territory of the LNR and open new opportunities for its restoration.”

      • MeduzaGulagu.net founder Vladimir Osechkin says he narrowly escaped an assassination attempt in France — Meduza

        Vladimir Osechkin, the founder of the Russian human rights project Gulagu.net, was the target of an attempted assassination in the French city of Biarritz, he told journalist Yulia Latynina in an livestreamed interview on Monday. According to Osechkin, Bellingcat investigator Christo Grozev had previously warned him of a possible murder attempt, but he only managed to evade the attack because he happened to notice the red dot from the sight of the assassin’s gun on the wall next to him.

      • Meduza100 killed and 137,000 evacuated What we know about the deadly conflict on the Kyrgyzstan-Tajikistan border — Meduza

        On September 14, violence erupted between border forces on the unmarked line between Kyrgyzstan and Tajikistan. In the four days that followed, the fighting would spread along virtually the entire 604-mile border, killing at least 100 people and leading Kyrgyzstan to evacuate roughly 137,000 people from the area, while officials from both countries would repeatedly try and fail to reach lasting ceasefire agreements. By September 18, disinformation surrounding the event had proliferated, with each side casting the other as the aggressor. Here’s what we know for sure about the conflict.

      • Common DreamsOpinion | Is Authoritarian Exceptionalism the Future?

        Here’s a nightmare scenario: Unable to recruit enough soldiers from the Russian Federation, Vladimir Putin takes North Korean leader Kim Jong-un up on his recent offer to send 100,000 North Koreans to join the Russian president’s ill-fated attempt to seize Ukraine. Kim has also promised to send North Korean workers to help rebuild that country’s Donbas region, parts of which Russian forces have destroyed in order to “save” it. Consider this an eerie echo of the fraternal aid that Eastern European Communist states provided Pyongyang in the 1950s after the devastation of the Korean War.

      • TechdirtHundreds More Cases Linked To Dirty NYPD Cops Dismissed By Prosecutors

        No matter how expensive law enforcement is, it can always get more expensive. Most agencies demand outsized portions of local budgets. That’s just the ground floor.

      • ScheerpostZelensky and NATO Plan to Transform Post-War Ukraine into Hyper-militarized Police State

        The NATO-backed Atlantic Council has proposed apartheid Israel as a blueprint for a hyper-militarized Ukraine. The paper was authored by Obama’s former ambassador to Tel Aviv, now an Israeli spy-tech consultant.

      • ScheerpostAs Falls Russia, So Falls the World

        John Feffer examines what it means that North Korea has been driven ever closer to fellow nuclear powers Russia and China.

      • ScheerpostBiden Doubles Down on Defending Taiwan From Potential Chinese Invasion

        President Biden says he doesn’t encourage Taiwanese independence but also says US forces would defend the island in the case of a Chinese invasion.

    • Environment

    • Finance

    • AstroTurf/Lobbying/Politics

      • The NationThe Trump Judges Are Officially Running the Show

        The US Senate confirmed Amy Coney Barrett to the Supreme Court eight days before the 2020 presidential election. At the time, the man who appointed her, Donald Trump, said he expected that the court would be called on to decide the election, and he wanted Barrett involved in that decision.

      • The NationPandora’s Box
      • The NationAll of Life

        In the introduction to her new fertility memoir, Knocking Myself Up, Michelle Tea writes: “The whole story of a birth begins with that decision to say yes, and the roller coaster that loop-de-loops you to the delivery table or at-home birthing pool or what have you—there is so much in it. All of life, every hope and fear, joy and sadness, the understanding of yourself as a mammal, an embodied animal, is in that story.” Tea, the author of 15 books ranging from memoir to young adult fiction, has decided to detail her unorthodox path to motherhood in her latest. It’s quite a story and involves semen from a gay drag queen, eggs from Tea’s nonbinary partner, a makeshift vessel referred to as the “sperm bowl,” a designated friend to transport said bowl, and a lot of modern medicine.

      • TruthOutOcasio-Cortez Calls Out Cruz for Lying About Martha’s Vineyard Stunt
      • TruthOutVirginia’s Governor Mansion Tour No Longer Includes Mention of Enslaved People
      • Democracy Now“Racism Is as British as a Cup of Tea”: Kehinde Andrews Says Many Black Britons Don’t Mourn the Queen

        As Monday’s state funeral for Queen Elizabeth II marks the end of a national period of mourning in Britain, we speak with the U.K.’s first professor of Black studies, Kehinde Andrews, about the generational difference in perceptions of the queen within his Jamaican family, which he lays out in his recent essay, “I Don’t Mourn the Queen.” He also describes the brutal legacy of the British slave trade and the British Empire, which makes the monarchy a symbol of white supremacy that should not be mourned, but rather abolished. “This is an old institution — deeply racist, deeply classist, deeply patriarchal. It just needs to go. And this is the perfect time to discuss when it should end,” says Andrews.

      • TruthOutPublic Opinion Is Shifting in Favor of Abortion Rights. Will It Affect Policy?
      • Common DreamsOpinion | If the Government Pays for the Research, It Doesn’t Have to Grant Patent Monopolies

        I was glad to see Ezra Klein’s piece today touting the Biden administration’s creation of ARPA-H. This is the Advanced Research Projects Agency-Health, a DARPA-type agency explicitly designed to promote the development of health-related innovations, like vaccines, drugs, and medical equipment.

      • The NationDeSantis’s Contempt for Immigrants Makes Him Politically Stupid

        Right-wing immigration policy has been depraved from the moment Donald Trump instituted the Muslim travel ban as one of his first acts in office. From there, it has spiraled into increasingly brutal and inhumane policy shifts, from family separation and child cages at the border to pledges to enact mass deportation on flimsy procedural grounds. One proposed initiative from the Trump White House’s suite of xenophobic backlash policies that proved a bridge too far, however, was a plan from ghoulish immigration policy adviser Stephen Miller to flood designated asylum cities with undocumented immigrants in a bid to overstretch their social safety nets and exact petty political revenge for dissenting from the right’s new policy consensus.

      • TruthOutPoll Finds Trump’s Approval Is Declining — While Biden’s Is on the Rise
      • Telex (Hungary)We have no intention of not delivering on our commitments – Navracsics
      • Common DreamsMass. Lawmaker Demands Federal Human Trafficking Probe Into DeSantis

        Fernandes, a Democrat, called the Republican governor’s actions “morally criminal” and warned, “There are legal implications around fraud, kidnapping, deprivation of liberty, and human trafficking.”

      • Common DreamsOpinion | ‘It’s Not Over’: While Biden Touts Rail Deal, Workers Have Yet to Vote—And Many Remain Skeptical

        President Joe Biden took a victory lap on Thursday after his administration helped broker a deal to stave off what would have been the first national freight railroad strike in 30 years. But the potential crisis is not over until rank-and-file rail workers vote on whether to approve the agreement — which could take weeks.

      • Misinformation/Disinformation

        • MeduzaMoscow judge shaves month from seven-year sentence of first Russian to be imprisoned for ‘disinformation’ — Meduza

          At an appeal hearing on Monday, the Moscow City Court reduced municipal deputy Alexey Gorinov’s seven-year prison sentence by one month. Gorinov was found guilty of spreading “false information” about the Russian army on July 8 after he called Russia’s war against Ukraine a war at a municipal council meeting. The verdict made him the first person to be sent to prison by a Russian court for spreading” disinformation” about the military.

        • MeduzaKommersant: Tired of news and lacking other options, Russians are spending more time on YouTube — Meduza

          According to data from the media research company Mediascope, Russians have been spending more time on YouTube in recent months. After analyzing the data, Kommersant reported that for the first six months of 2022, Russians spent about 84 minutes per day on the site on average. In July, however, the average daily watch time was 87 minutes, and in August, the number rose to 88 minutes.

        • FAIRPBS and BBC Team Up to Misinform About Brazil’s Bolsonaro

          Both the US and British governments supported the rise of Brazil’s far-right President Jair Bolsonaro. Future Prime Minister Liz Truss had secret meetings with the future president in 2018 to discuss “free trade, free markets and post-Brexit opportunities”  (BrasilWire, 3/25/20).

        • Common DreamsNew Analysis Destroys Fossil Fuel Industry’s Misleading US Job Claims

          The advocacy group’s fact sheet—titled Oil Profits and Production Grow at the Expense of Jobs, Consumers, and the Environment—comes as scientists continue to call for a swift transition to clean energy and critics around the world accuse the fossil fuel industry of war profiteering.

    • Censorship/Free Speech

      • Project CensoredTHE PROJECT CENSORED NEWSLETTER – September 2022 – Censored Notebook, Newsletters

        This September marks the 40th anniversary of Banned Books Week, an annual celebration of the right to read. Book challenges and bans are at an all-time high. During the week of September 18-24, events across the United States will take place, organized around the theme “Books Unite Us–Censorship Divides Us.” Project Censored is a longtime supporter and proud cosponsor of Banned Books Week.

      • Project CensoredThe Many Costs of War and the Legacy of Mikhail Gorbachev – The Project Censored Show
      • Common Dreams‘Heed This Warning’: 2,500+ Book Bans Threaten US Schools and Democracy

        “More books banned. More districts. More states. More students losing access to literature. ‘More’ is the operative word for this report on school book bans,” begins the update to PEN America’s Banned in the USA: Rising School Book Bans Threaten Free Expression and Students’ First Amendment Rights, which was published in April and covered the first nine months of the 2021-22 scholastic year.

      • TechdirtFinally, Some Good News: Federal Anti-SLAPP Law Introduced

        It’s been seven years since Congress last introduced a federal anti-SLAPP law (and that was six years after the previous attempt). So here we are, and once again we’ve finally got a federal anti-SLAPP law introduced in Congress, this time by Rep. Jamie Raskin, who recently held a hearing focusing on SLAPP lawsuit attacks against environmental activists (which is where many SLAPP cases have been filed, though the issue is much broader than that).

      • ScheerpostBanned in the USA: Banned Books Week Celebrates Its 40th Anniversary

        or its 40th anniversary, the Banned Books Week Coalition’s theme is “Books Unite Us: Censorship Divides Us.” Indeed, as we survey today’s contentious political climate, we would all do well to pick up, read, and share a banned book or two. Doing so, we might discover amazing things about each other—not to mention ourselves. We can learn how to “agree to disagree,” while honoring the higher ideals of an open society, free expression, and the right to read. Censorship anywhere is a threat to “FReadom” everywhere. Celebrate Banned Books Week September 18-24, but stay vigilant and keep reading and sharing banned books every week throughout the year.

      • Daniel AleksandersenYou don’t want to be on Cloudflare’s naughty list

        I don’t know what I did wrong, but I’ve angered one of the titans of the internet! For the last six days, my home internet connection has been partially broken. Some apps and many websites either load slowly, partially, or not at all. Everywhere I go, I’m greeted by the same blockade message from Cloudflare.

        Cloudflare is the market leader in shielding public websites from targeted traffic-saturation attacks, page load time acceleration, and Content Delivery Network (CDN) services. The company plays a massive role in delivering everyday internet services. Roughly one in three of the top one-million websites is shielded and accelerated through Cloudflare’s massive global data centers, according to data from analytics firm BuiltWith.

        Among other methods, Cloudflare uses a browser-challenge page to detect and thwart malicious and unauthorized bots. The page tests the capabilities of your web browser and tries to figure out whether you’re human. The page can be fully automated and only slows down your browsing. However, sometimes it includes a CAPTCHA challenge that prompts you to identify letters and numbers, or images.

    • Freedom of Information / Freedom of the Press

      • Meduza‘We’ll win without her songs’ How Russians (and one Ukrainian) reacted to pop legend Alla Pugacheva’s anti-war statement — Meduza

        On September 16, Russia’s Justice Ministry added comedian and TV host Maxim Galkin to its “foreign agents” registry, claiming he was engaged in political activity using money from Ukraine. Galkin denied the accusation, saying, “I don’t trade conscience.” Two days later, his wife, pop megastar Alla Pugacheva, asked to be declared a “foreign agent” herself — likely the first time a high-profile figure has publicly requested the designation, which brings with it a range of administrative headaches. In the request, Pugacheva called her husband an “honest, decent, and sincere person, [and] a genuine and incorruptible patriot of Russia” who wants Russians to have “peaceful lives and free speech” and for people to stop dying “for illusory goals.” The statement received over half a million likes on Instagram and was quoted by virtually every Russian media outlet — though the Kremlin-controlled ones refrained from mentioning her allusion to the war. Meduza is publishing translations of some of the most notable public reactions to Pugacheva’s statement.

      • Meduza‘We hear daily that this war is for peace’ Moscow municipal deputy Alexey Gorinov’s seven-year prison term for ‘disinformation’ has been shortened — by a month. Here’s his final court speech. — Meduza

        On September 19, Moscow’s Municipal Court “softened” its earlier decision, which sentenced Alexey Gorinov to seven years in prison. The municipal deputy, charged under Russia’s law against “disinformation” for calling the war a war, is now to spend six years and 11 months in a penal colony. During a closed hearing, the 61-year-old defendant addressed the court. His final speech was published by the Free Alexey Gorinov! Telegram channel.

    • Civil Rights/Policing

      • MeduzaRussian lawmaker disputes report that government rejected bill expanding ‘LGBT propaganda’ law — Meduza

        In a Telegram post on Monday, Russian State Duma Deputy Alexander Khinshtein claimed that the Russian Justice Ministry has officially approved his bill that would amend Russia’s law against “LGBT propaganda” by expanding it to apply to all ages, among other changes. Shortly after, Khinshtein published images of what he said is the ministry’s official response to the bill. “The bill is supported by the Government of the Russian Federation,” reads the document’s closing paragraph.

      • TechdirtThe Media Demanded That Airbnb Do More Background Checks; Now It’s Upset That Airbnb Is Banning People With Criminal Records

        A story made the rounds recently about how Airbnb effectively banned Bethany Hallam for life. Hallam, an Allegheny County, Pennsylvania councilperson received a notification from Airbnb that a third party it used for background checks had noted a “criminal records match” in doing a background check, and she would not be able to use Airbnb to either rent or host.

      • TechdirtDevice Searches Have Created A Massive Database Of American Phone Data CBP Agents Can Search At Will

        The “Constitution-free zone” — the area within 100 miles of any border crossing, port of entry, or international airport — now apparently covers the entire country in perpetuity.

      • Common DreamsOpinion | Strike, Strike, Strike

        The ruling oligarchs are terrified that, for tens of millions of people, the economic dislocation caused by inflation, stagnant wages, austerity, the pandemic, and the energy crisis is becoming unendurable.  They warn, as Kristalina Georgieva, Managing Director of the International Monetary Fund (IMF), and NATO Secretary-General Jens Stoltenberg, have done, about the potential for social unrest, especially as we head towards winter.

      • ScheerpostChris Hedges: Strike, Strike, Strike

        The mounting social inequality is fueling protests around the globe. The global ruling class is determined to prevent these protests from employing the weapon that can bring them down — strikes.

      • Common DreamsWarnings Mount Over Right-Wing Plot to Rewrite US Constitution

        “Republicans always tell us what they want to do. We should believe them and think broadly and in the long term of where we should be working to stop this from happening.”

      • ScheerpostDemocracy Now Interviews Dr. Gabor Maté on New Book, “The Myth of Normal”

        In an extended interview, acclaimed physician and author Dr. Gabor Maté discusses his new book, just out, called “The Myth of Normal: Trauma, Illness, and Healing in a Toxic Culture.” “The very values of a society are traumatizing for a lot of people,” says Maté, who argues in his book that “psychological trauma, woundedness, underlies much of what we call disease.” He says healing requires a reconnection between the mind and the body, which can be achieved through cultivating a sense of community, meaning, belonging and purpose. Maté also discusses how the healthcare system has harmfully promoted the “mechanization of birth,” how the lack of social services for parents has led to “a massive abandonment of infants,” and how capitalism has fueled addiction and the rise of youth suicide rates.

    • Internet Policy/Net Neutrality

    • Digital Restrictions (DRM)

      • TechdirtEA Announces New Anti-Cheat Tech That Operates At The Kernel Level

        It seems anti-cheat technology is the new DRM. By that I mean that, with the gaming industry diving headfirst into the competitive online gaming scene, the concern over piracy has shifted into a concern over cheating making those online games less attractive to gamers. And because the anti-cheat tech that companies are using is starting to make the gaming public every bit as itchy as it was over DRM.

    • Monopolies

      • Sébastien Wilmet: GAFAM to MAGMA

        The GAFAM are evil, and the nice thing about it is that we can call them the MAGMA now (replace the F with M for Meta).

        We can also call the MAGMA a form of hyper-capitalism: they are so big that they destroy any kind of competition, by either buying other companies, or creating something better. The “barrier to entry” to compete with them is just way too high.

      • Copyrights

        • Torrent FreakAimJunkies Countersues Bungie for Hacking and DMCA Violations

          The legal battle between game developer Bungie and cheat seller AimJunkies has taken a surprising turn. The AimJunkies defendants, who previously distributed ‘Destiny 2 Hacks’, deny any wrongdoing and have now filed a countersuit. Turning the tables, they accuse Bungie of hacking, stealing computer data, and circumventing the DMCA.

        • Torrent FreakPiracy Crisis Averted? AT&T, Verizon & Comcast Lawsuits Dismissed

          Three almost identical copyright infringement lawsuits filed against AT&T, Verizon and Comcast this month accused the ISPs of allowing subscribers to pirate movies online, despite being aware of their infringing activities. If successful, the lawsuits could’ve had serious financial consequences for the companies. But as quickly as they arrived, all three lawsuits have now been dismissed.

        • Public Domain ReviewThe Blood Collages of John Bingley Garland (ca. 1850–60) – The Public Domain Review

          Some 50 years before collage would become an established art form, came these pioneering Victorian images all of which exude a certain decorative detail: blood.

  • Gemini* and Gopher

    • Personal

    • Technical

      • It does get better you know

        Fortunately, the computer has started working again after a full day of drying out. I had a talk with my boss, and while I didn’t address the root of the problem, it still was pretty good. The postage meter has started working again, so I don’t have to drive across town to get the mail done.

      • MAGMA Monopolies

        He told me about how the hypercapitalist monopolies are like a layer of magma destroying everything and transforming everything they touch into more magma.

        Where magma stands for : Meta-Apple-Google-Microsoft-Amazon.

        Don’t talk about GAFAM anymore, talk about MAGMA.

      • Far vs Around Games

        It occured to me the other day that while multiplayer games in the past were made to play/interact with people close to and around you, more and more games nowadays assume internet connectivity at all times and encourage you to play with strangers around the globe.

      • Thinking, speaking, writing

        You can’t copy, paste, or edit blocks. You can type and go back one character at a time. And every line you are writing starts to fade away so you are focusing only on the latest paragraph and, mostly intended, on your current idea.

      • The Haiku Operating system is…pretty good

        So I was in need of a Beos-FS formatted partition, and the easiest way
        to get that was to use the Haiku installer. Since I was running the
        installer already I thought I might as well install the OS and have a
        look around.

        It’s pretty good. I like it.

        I’m running it on a Thinkpad X61. The install was very fast and it
        picked up the network right away, and a lot of things seem to work.

      • Internet/Gemini

        • Copyrighting Textfiles, The Legality Of Archives, and should I care?

          I have been encountering alot of archives and mirrors lately. Mostly in the efforts of expanding the catalog of the CDG.But also just recently Ben Collver released an archive of the GameFAQs today. Mirroring web content and hosting archives of large text file databases is something that occurs quite often here in the gemini-space one way or another. Preserving information for future generations is a natural occurance for us internet dwellers. Buut theres a thorn in every internet archivst side. Copyright.

        • Capsule Testing Pains

          Like the rest of Geminispace, I run my capsule as a hobby project. I’m also not a developer by trade. As a result, the processes I use to design and update my capsule are rather ad-hoc and purpose-built. Perhaps most crucially, I don’t have a test capsule to develop on–I build everything on the live server.

          That has come back to bite me a few times. When I originally developed the chess service, one script contained a bug that prevented invitations from appearing on the home page. I didn’t catch the bug for almost a month, and in that time, no-one played any chess matches. Similar issues plagued the weather forecast CGI in its early days, when flaky connections and CSV parsing errors caused the script to fail more than half of the time.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 20/09/2022: Darktable 4.0.1, SuperTuxKart 1.4 Release Candidate, and Gajim 1.5.0

Posted in News Roundup at 3:37 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Why use docker for a home server?

        With all that context I summarised, what’s the role of docker in my use case and do I still need it? I’m running some services with attached databases, some with file storage, some talking to each other on their own network. Most of them can be trivially moved to a simper system. Specifically most features I care about can be provided by systemd parameters and the reproducibility by NixOS.

        It wasn’t always that way though. In the old days we had lxc containers and openvz and if you wanted something that looks like a container, you needed to actually run the whole secondary system. Docker definitely helped by minimising that scope to just the app and its dependencies. (more than a chroot, less than a VM) It enabled a single description for running a single app. Then docker-compose allowed spawning the whole mini-environment with all the required blocks. It was an amazing change and it made hosting multiple things on one host really nice – perfect for home usage.

      • Kubernetes BlogBlog: Kubernetes 1.25: Local Storage Capacity Isolation Reaches GA

        Local ephemeral storage capacity isolation was introduced as a alpha feature in Kubernetes 1.7 and it went beta in 1.9. With Kubernetes 1.25 we are excited to announce general availability(GA) of this feature.

        Pods use ephemeral local storage for scratch space, caching, and logs. The lifetime of local ephemeral storage does not extend beyond the life of the individual pod. It is exposed to pods using the container’s writable layer, logs directory, and EmptyDir volumes. Before this feature was introduced, there were issues related to the lack of local storage accounting and isolation, such as Pods not knowing how much local storage is available and being unable to request guaranteed local storage. Local storage is a best-effort resource and pods can be evicted due to other pods filling the local storage.

        The local storage capacity isolation feature allows users to manage local ephemeral storage in the same way as managing CPU and memory. It provides support for capacity isolation of shared storage between pods, such that a pod can be hard limited in its consumption of shared resources by evicting Pods if its consumption of shared storage exceeds that limit. It also allows setting ephemeral storage requests for resource reservation. The limits and requests for shared ephemeral-storage are similar to those for memory and CPU consumption.

    • Audiocasts/Shows

    • Applications

      • Ubuntu HandbookDarktable 4.0.1 Released with Various Bug-Fixes, PPA Updated | UbuntuHandbook

        The free open-source photography software Darktable got a new update few days ago with various bug-fixes, new cameras support and some other changes.

        Darktable 4.0.1 added base support for CANON EOS R7 and CANON EOS R10, and noise profiles for NIKON D780, CANON EOS M50 Mark II, CANON EOS 850D.

        The $(MAKER) and $(MODEL) can now be used when importing files. And display infinity for very large focus distance as supported by the exif standard.

        The release also added support for fast pipe mode on the diffuse module, HEIF media type association for the desktop, and various bug-fixes for issues ranging from DNG creation, TIFF export, Latex export, to memory corruption. See more details via the official release note.

      • The AnarcatLooking at Wayland terminal emulators – anarcat

        Back in 2018, I made a two part series about terminal emulators that was actually pretty painful to write. So I’m not going to retry this here, not at all. Especially since I’m not submitting this to the excellent LWN editors so I can get away with not being very good at writing. Phew.

        Still, it seems my future self will thank me for collecting my thoughts on the terminal emulators I have found out about since I wrote that article. Back then, Wayland was not quite at the level where it is now, being the default in Fedora (2016), Debian (2019), RedHat (2019), and Ubuntu (2021). Also, a bunch of folks thought they would solve everything by using OpenGL for rendering. Let’s see how things stack up.

      • Gajim 1.5.0 – Gajim

        Gajim 1.5.0 comes with a significant performance boost. Pinned chats can be ordered via drag and drop, message corrections have been improved, and many bugs have been fixed.

      • Its FOSSManage Linux Chroot Environments Easily With Atoms GUI Tool

        A chroot environment provides you with isolation for testing in Linux. You do not need to take the hassle of creating a virtual machine. Instead, if you want to test an application or something else, create a chroot environment that allows you to select a different root directory.

        So, with chroot, you get to test stuff without giving the application access to the rest of the system. Any application you install or anything you try gets confined to that directory and does not affect the functioning of your operating system.

        Chroot has its perks, which is why it is a convenient way to test things for various users (especially system administrators).

    • Instructionals/Technical

      • FOSSLinuxHow to install Ubuntu Server 22.04 LTS | FOSS Linux

        Canonical announced the launch of Ubuntu 22.04 LTS (Jammy Jellyfish) on April 21, 2022. It’s now available on desktop computers and Servers. This article will highlight the procedures needed to set up Ubuntu 22.04 Server Edition with LTS (Long Time Support) on your computer.

      • FOSSLinuxHow to list all users in Ubuntu | FOSS Linux

        As a Linux system administrator or regular user, one key component of keeping your system secure is managing what privilege every user has over a particular file, directory, or settings. To achieve that, you need to have a detailed understanding of all users present on your system.

      • Matthew GarrettMatthew Garrett: Handling WebAuthn over remote SSH connections

        Being able to SSH into remote machines and do work there is great. Using hardware security tokens for 2FA is also great. But trying to use them both at the same time doesn’t work super well, because if you hit a WebAuthn request on the remote machine it doesn’t matter how much you mash your token – it’s not going to work.

      • How to run Chronyd in Debug mode On RHEL / CentOS

        This tutorial will be helpful for beginners to run Chronyd in debug mode On RHEL , CentOS , Alma Linux and Rocky Linux.

      • Linux CapableHow to Install Neofetch on Arch Linux

        Neofetch is a free, open-source command-line system information tool written in bash. Neofetch displays system information in a beautiful aesthetic way, such as system model and manufacturer, operating system, kernel version, uptime, memory resources, disk usage, and more. All this is displayed in an easy-to-read format that can be further customized with colors and logos. Neofetch also outputs the information in JSON, so other programs and scripts can use it. Neofetch is an excellent tool for anyone who wants quick and easy system information without installing additional software.

        In the following tutorial, you will learn how to install Neofetch on Arch Linux using the command line terminal and how to use the terminal commands to achieve more with Neofetch.

      • Linux CapableHow to Install Sysdig on Arch Linux

        Sysdig is a powerful open-source system analysis tool that can capture and inspect system state and activity on a running Linux-based system. Sysdig is scriptable in Lua and includes a command-line interface and a powerful interactive UI. The Sysdig UI can filter and analyze captured data, making it particularly useful for system debugging and inspection. Sysdig is also extensible, allowing users to create custom scripts and plugins to extend its functionality. Overall, Sysdig is an extremely powerful and versatile tool that can be used for various system administration and analysis tasks.

        The following tutorial will teach you how to install Sysdig on Arch Linux using the command line terminal and basic commands for using Sysdig.

      • Linux CapableHow to Install Duf on Arch Linux

        The Duf disk utility is an open-source, free “Disk Usage Free Utility” written in Goland and released under an MIT license. The disk utility supports multi-platforms such as BSD, Linux, macOS, and Windows operating systems. One of the excellent features of Duf is its ability to display disk usage details in a beautiful, user-friendly layout in tab form. Some extra features with Duf include disk usage in JSON output for further integrations with other programs or scripting languages. Duf is an excellent tool for system administrators to keep track of their server’s disk space or for general users to keep track of the space on their computer’s hard drive. Overall, the features and usability of Duf make it an excellent program for managing and understanding your computer’s disk usage.

        The following tutorial will teach you how to install Duf on Arch Linux using the command line terminal. The tutorial will also focus on some common-use commands.

      • UNIX CopHow to Install KDevelop on Ubuntu 20.04 | 22.04 LTS

        In this article, we will show you how to install KDevelop in Ubuntu systems.

        KDevelop is a free and open-source integrated development environment (IDE) for Unix-like computer operating systems and Windows. It provides editing, navigation and debugging features for several programming languages, and integration with build automation and version-control systems, using a plugin-based architecture.

        KDevelop 5 has parser backends for C, C++, Objective-C, OpenCL and JavaScript/QML, with plugins supporting PHP, Python 3 and Ruby. Basic syntax highlighting and code folding are available for dozens of other source-code and markup formats, but without semantic analysis.

        KDevelop is part of the KDE project, and is based on KDE Frameworks and Qt. The C/C++ backend uses Clang to provide accurate information even for very complex codebases.

      • UNIX CopHow To Install RawTherapee on Ubuntu 20.04 | 22.04 LTS

        In this guide, we will show you how to install RawTherapee on Ubuntu Systems.

        RawTherapee is application software for processing photographs in raw image formats, as created by many digital cameras. It comprises a subset of image editing operations specifically aimed at non-destructive post-production of raw photos and is primarily focused on improving a photographer’s workflow by facilitating the handling of large numbers of images. Also, it is notable for the advanced control it gives the user over the demosaicing and developing process. It is cross-platform, with versions for Microsoft Windows, macOS and Linux.

        So, RawTherapee was originally written by Gábor Horváth of Budapest, Hungary, and was re-licensed as free and open-source software under the GNU General Public License Version 3 in January 2010. It is written in C++, using a GTK+ front-end and a patched version of dcraw for reading raw files. The name “Therapee” was originally an acronym derived from “The Experimental Raw Photo Editor”.

      • UNIX CopHow To Install SoftMaker FreeOffice on Ubuntu 20.04 | 22.04 LTS
      • UNIX CopHow To Install WebStorm on Ubuntu 20.04 | 22.04 LTS

        In this guide, we will show you how to install WebStorm in Ubuntu Systems.

        Webstorm is the smartest JavaScript IDE. WebStorm is an integrated development environment for JavaScript and related technologies. Like other JetBrains IDEs, it makes your development experience more enjoyable, automating routine work and helping you handle complex tasks with ease.

      • Barry KaulerCreate a CLI app that will run on Linux, Windows, macOS, BSD
      • HowTo GeekHow to Make and Combine PDF Files on the Linux Command Line

        PDF files were designed to promote sharing. Everyone can open them—in their web browser if they have nothing else. Linux lets you manipulate, merge, and split PDF files on the command line.

      • Network WorldUsing the Linux apropos command – even if you have to fix it first

        On Linux, the apropos command helps identify commands related to some particular term. It can be helpful in finding commands you might want to use—especially when you can’t remember their names.

      • Make Use OfHow to Compress Image Files on Linux Using Curtail

        Storing and sharing large image files can be a headache. Fortunately, there are several ways to compress image files. If you’re on Linux—and prefer native tools—Curtail is one good image compression tool you can use to compress images on your computer.

      • Linux Made SimpleHow to install Lightworks 22.3 on a Chromebook

        Today we are looking at how to install Lightworks 22.3 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • MakeTech EasierHow to Edit a Screenshot on Your Phone – Make Tech Easier

        Taking screenshots is just one part of the job. You will need to edit it if you want to crop an area, add text or draw on the picture. So how does one edit a screenshot on the phone? Well, both Android and iPhone offer native methods to edit screenshots. You can use those, use the gallery apps or install third-party apps to edit screenshots. Let’s check all the different methods to edit screenshots on Android and iPhone.

      • UNIX CopHow To Install XanMod Kernel on Ubuntu 20.04 | 22.04 LTS

        In this guide, we will show you how to install XanMod Kernel on Ubuntu systems.

        XanMod is a general-purpose Linux kernel distribution with custom settings and new features. Built to provide a stable, responsive and smooth desktop experience.

        The real-time version is recommended for critical runtime applications such as Linux gaming server / client for eSports, streaming, live productions and
        ultra-low latency enthusiasts.

      • Make Use OfHow to Install and Set Up Grafana on Ubuntu

        Data visualization tools make it easy to discern useful information and draw a conclusion from large and complicated data sets. Grafana is one of the popular and open-source interactive data visualization tools that let you analyze and visualize your data from all the sources into a unified dashboard.

    • Games

      • GamingOnLinuxIntel’s Linux Vulkan Driver readying up a 60%+ speed boost “in draw throughput”

        Blumenkrantz blogged about it, in their usual funny way, going over some profiling they did on the Intel ANV driver using the vkoverhead tool. Thanks to their investigation the result is two small patches that aren’t yet merged into Mesa but once in, should provide a “60%+ improvement in draw throughput on ICL”. The fun thing is that the patches only touch a few lines and yet provide such a boost.

      • Boiling SteamScathe: Not The Doom You Are Looking For – Boiling Steam

        This was going to be a review of Scathe, a new “bullet hell” single-player/online co-op first-person shooter, but I couldn’t bring myself to make it far enough for a full review. So let’s call this “impressions” with a hope that the game will evolve into something to spend many more hours with in the near future.


        There are no plans currently for a Linux version. Scathe should work well on the Steam Deck with its official controller support and lower settings. I never (yet?) got the hang of FPSes with a controller so I didn’t try it, but yes it is on my list of things to do with the Deck.)

      • GamingOnLinuxSteam Deck Q3 invites are all out early as Valve beats own production estimates (again)

        Again and again Valve has managed to speed up production of the Steam Deck, so much so that for reservations the Q3 era is over. Valve said that everyone who was inside Q3, would have gotten their purchase invite email today and so they’re now speeding onwards into the Q4 window.

      • GamingOnLinuxReturn to Monkey Island is out now, Linux version due soon

        It’s here at last. Terrible Toybox and Devolver Digital have today released Return to Monkey Island, and for fans of Native Linux ports one is on the way. For the Linux side, developer Ron Gilbert said on Twitter: “Works on Proton and a pure Linux version is coming soon after.”

      • GamingOnLinuxSteam Mobile App continues adding new features to the Beta

        Valve are continuing to roll out big changes to the brand new Steam Mobile App, which is currently in Beta. This will eventually replace the older app, which has been left in the dust for too long.

      • GamingOnLinuxThe Wandering Village is a clear hit with over 50K copies sold

        The Wandering Village, the new city-builder from Stray Fawn Studio has clearly become something of a hit and for good reason. Announced in a Steam post, the developer mentioned how “The Wandering Village has sold 50’000 copies in the first two days” and it also has a Very Positive user rating now too.

      • GamingOnLinuxGE-Proton installer ProtonUp-Qt adds support for the Steam Snap

        ProtonUp-Qt continues being an incredibly helpful GUI for installing the likes of GE-Proton, Wine-GE, Luxtorpeda and more with a new version out now.

      • GamingOnLinuxValve had the official Steam Deck Docking Station at TGS, plus other TGS bits

        While they haven’t yet released the official Steam Deck Dock and they haven’t really talked about it since the indefinite delay, it’s clearly still a thing.

      • SuperTuxKart 1.4 Release Candidate 1 available!

        We are happy to announce the release of the first release candidate for STK 1.4!

        This release mainly focuses on visual changes, notably our collectable items now have a more dynamic and polished way to interact with players…

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • GamingOnLinuxPlasma 5.26 Beta brings on the bigscreen experience

          Plasma 5.26 Beta is officially out now and it comes with plenty of massive improvements, especially when it comes to using it on the bigscreen. With this version in preview, it’s a chance for users and developers to find and help fix any remaining bugs to make the full release on October 6th a great one.

        • Plasma 5.26 Beta available for testing | Kubuntu

          Are you using Kubuntu 22.04 Jammy Jellyfish, our current stable LTS release? Or are you already running our development builds of the upcoming 22.10 Kinetic Kudu?

          We currently have Plasma 5.25.90 (Plasma 5.26 Beta) available in our Beta PPA for Kubuntu 22.04 and for the 22.10 development series.

        • Bryan LundukeLinux, Alternative OS, – Retro Computing News – Sep 17, 2022

          KDE releases TV interface: “Bigscreen”

          The Beta release of KDE Plasma version 5.26 was just released. And it has some really fun stuff — and big stuff — in there. Far more than a “5.26” point release would otherwise suggest.

          The biggest, in my opinion, being their new “Bigscreen” interface, intended for use when connected to a TV.

      • GNOME Desktop/GTK

  • Distributions and Operating Systems

    • BSD

    • Arch Family

    • Fedora Family / IBM

      • Fedora at OpenAlt 2022 | Brno hat

        Covid stopped a lot of activities including IT events. As things are hopefully coming to normal the Czech community of Fedora had its first booth at a physical event since 2019. It was also a revival for OpenAlt, traditional open source conference in Brno, because its last edition was in 2019, too. The traditional date of OpenAlt is the first weekend in November, but to avoid any possible autumn covid waves the organizers decided to have it on Sep 17-18.

    • Canonical/Ubuntu Family

    • Devices/Embedded

      • HacksterYuzukiTsuru’s Yuzuki Chameleon Pops an Allwinner H616 Chip Into a Raspberry Pi Model A Form Factor – Hackster.io

        Pseudonymous maker “YuzukiTsuru,” also known as “GloomyGhost,” has published an open-hardware design for a single-board computer mimicking the Raspberry Pi Model A layout but with an Allwinner H616 system-on-chip at its heart: the Yuzuki Chameleon.

        “Yuzuki Chameleon is a Raspberry Pi A-shaped SBC [Single Board Computer], based on [the] Allwinner H616 chip,” YuzukiTsuru explains in a post brought to our attention by CNX Software. “[It can] run Android, Debian Linux, Ubuntu Linux, Armbian, Android TV, and other OS[es].”

      • NPRRep. Jackie Walorski’s driver was at fault in the fatal crash, police say

        The sheriff’s office said evidence from the crash reconstruction, including information from the airbag control module (also referred to as the car’s “black box”) showed that the Toyota was traveling at 82 mph five seconds before the crash.

        Police added no phones were apparently used prior to the crash, and there was no indication of mechanical failures.

    • Open Hardware/Modding

      • ArduinoThis DIY strain wave gearbox is strong enough to pull a car | Arduino Blog

        Mechanical advantage is arguably the most important engineering concept that humanity has ever learned to harness. By converting distance, like the length of a lever or rotations of a gear, into torque (and vice versa) we can overcome almost any physical challenge. But that distance can be an issue. For example, if you have an input gear 10mm in diameter and want a 100:1 reduction, your output gear needs to be a full meter in diameter. Strain wave gearboxes solve that problem and Brian Brocken’s video will walk you through how to build your own that is strong enough to pull a car.

        To avoid meter-wide gears, engineers typically turn to gearboxes that incorporate several gears. Each gear multiplies the reduction of the preceding gear, so several gears can achieve dramatic reductions and one can arrange them in a compact space. But a strain wave, AKA “harmonic drive,” gear can achieve a similar reduction with just three parts: a wave generator, a flex spline, and a circular spline.

  • Free, Libre, and Open Source Software

    • JoinupOpen Source code repository for the EU institutions launched by DIGIT Director-General Gaffey

      On Friday 16 September, Director-General for Informatics Veronica Gaffey announced the launch of the Commission’s open source repository for the EU institutions: code.europa.eu. (Speech transcript below) She reported that there are already over 100 projects and 150 developers on the platform, and that the Commission’s Open Source Programme Office is “busily onboarding others”.

    • SaaS/Back End/Databases

      • SQLite: Past, Present, and Future

        SQLite is a single node and (mostly) single threaded online transaction processing (OLTP) database. It has an in-process/embbedded design, and a standalone (no dependencies) codebase …a single C library consisting of 150K lines of code. With all features enabled, the compiled library size can be less than 750 KiB. Yet, SQLite can support tens of thousands of transactions per second. Due to its reliability, SQLite is used in mission-critical applications such as flight software. There are over 600 lines of test code for every line of code in SQLite. SQLite is truly the little database engine that could.

      • SQLite: Past, Present, and Future

        In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed “the SQLite for analytics”, has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite’s performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.

    • Programming/Development

      • FinnstatsLAB to Delta E conversion in R – finnstats

        LAB to Delta E conversion in R, First we need to understand what is Delta E. The “distance” between two colours is represented by a single integer called delta-E.

        It’s alluring to just contrast the euclidean distance between an RGB’s red, green, and blue components.

        Unfortunately for us, rgb doesn’t correspond to how we truly sense colour. It was designed for the convenience of use with electrical equipment.

      • Perl / Raku

        • PerlIssue #582 – 2022-09-19 – Grandfather’s Perl

          I was pleasantly surprised when I found out that Dave came up with perfect response to the other blog post with this This is not your grandfather’s Perl. It has already created positive noise. If you want to take a closer look at the recent changes to the latest release of Perl v5.36 then please do checkout the GitHub repository sharing the changes with example. By the way, it is not just limited to v5.36. You will find plenty more to keep you busy.

        • Rakulang2022.38 Another Wave – Rakudo Weekly News

          Ben Davies has been working a lot on Data::Record, a module that introduces record types for maps, lists and tuples to the Raku Programming Language. Still not happy with the feature set, they described how the next wave of changes to the module may look.

        • PerlTypes, Objects, and Systems, Oh my! | AWNCORP [blogs.perl.org]

          Perl isn’t a strongly typed language, and its built-in types are limited and not generally accessible to the engineer, however, Perl supports various classes of data and in recent years has flirted with various ways of enabling runtime type checking.

          In a strongly typed language the tl;dr; case for declaring data types is memory management, compile-time code optimization, and correctness. To this day I’m both impressed and horrified by the number of errors caught when I implement some kind of type checking in my programs. When it comes to runtime type checking we’re only concerned with enforcing correctness.

          Types, values, objects, signatures, and the systems that tie these all together, are all inextricably bound. They are necessarily interdependent in order to present/provide a cohesive and consistent system. Peeling back the layers a bit, types are merely classifications of data. Any given piece of data can be classified as belonging to a particular type whether implicit or explicit.

          Types are instantiated (i.e. have concrete representations, i.e. instances) whenever data is created and/or declared as conforming to the type’s criteria. Runtime types are arbitrary. A value of 1 can be said to be of type number where the value “1″ can be said to be of the type string. Also in Perl, an object is a specific kind of reference; a reference tied to a particular namespace.

      • Shell/Bash/Zsh/Ksh

        • [Old] Is mktemp posix?

          Is mktemp posix?

          Since mktemp is not POSIX compliant, we can create a POSIX compliant version using the GNU M4 macro processor. This tool can expand the mkstemp() function specified by the C API.

          a Is mktemp portable?

          tempfile is not portable. mktemp exists more widely (but still not ubiquitously), but it may require a -c switch to create the file in advance; or it may create the file by default and barf if -c is supplied.

        • [Old] Creating a Temporary File in Linux

          In this tutorial, we’ll show how to create temporary files when using Linux. We’ll start by explaining the purpose of temporary files, after which we’ll continue with the usage of the mktemp utility available on most Linux systems. Then, we’ll finish off with a POSIX compatible solution.

        • [Old] How Do I Use mktemp?

          Many times when we’re writing an application, we need a temporary file or directory. mktemp provides a system-based way to create a valid and unique temporary file or directory from a script or application.

          In this tutorial, we’ll present a way to safely and reliably create temporary files and directories on Linux using mktemp.

        • [Old] Greg WooledgeHow do I create a temporary file in a secure manner?

          There does not appear to be any single command that simply works everywhere. tempfile is not portable. mktemp exists more widely (but still not ubiquitously), but it may require a -c switch to create the file in advance; or it may create the file by default and barf if -c is supplied. Some systems don’t have either command (Solaris, POSIX). POSIX systems are supposed to have m4 which has the ability to create a temporary file, but some systems may not install m4 by default, or their implementation of m4 may be missing this feature.

        • [Old] Code MavenCreate temporary directory on Linux with Bash using mktemp

          When writing a test or whenn running a build job it is usually a good practice to use a temporary directory and then clean up after the process is done.

          It is also a good practice to make sure the temporary directoy is unique so if two processes run at the same time they won’t interfere.

          In Linux one usually has a directory called /tmp to store temporary files. In most of the programming languages there is some tool to create temporary directories. Sometimes these also handle the removal of these directories once they are not needed any more.

          In Unix/Linux shell we can use the mktemp commmand to create a temporary directory inside the /tmp directory.

      • Rust

  • Leftovers

    • Science

      • Quantum AI breakthrough: theorem shrinks appetite for training data | Discover Los Alamos National Laboratory

        Rigorous math proves neural networks can train on minimal data, providing ‘new hope’ for quantum AI and taking a big step toward quantum advantage

      • Decoding Canine Cognition

        Scientists have decoded visual images from a dog’s brain, offering a first look at how the canine mind reconstructs what it sees. The Journal of Visualized Experiments published the research done at Emory University.

        The results suggest that dogs are more attuned to actions in their environment rather than to who or what is doing the action.

        The researchers recorded the fMRI neural data for two awake, unrestrained dogs as they watched videos in three 30-minute sessions, for a total of 90 minutes. They then used a machine-learning algorithm to analyze the patterns in the neural data.

      • Quanta MagazineQuanta Magazine

        Richard Rusczyk, founder of Art of Problem Solving, has a vision for bringing “joyous, beautiful math” — and problem-solving — to classrooms everywhere.

      • Simulation aids the search for the origin of cosmic rays – Newsportal – Ruhr-Universität Bochum

        Cosmic rays seem to surround us everywhere. This is precisely what makes it difficult to find its sources. It would be helpful if we could trace their path through space. A new programme can help.

        An international research team has developed a computer programme that can simulate the transport of cosmic rays through space. The researchers hope it will help them solve the mystery of the sources of cosmic rays. So far, we do not know which celestial objects emit the high-energy radiation that pelts the Earth from space. Theoretical models are necessary to explain experimental data; the new computer simulation can provide these. A team of researchers from Ruhr-Universität Bochum (RUB) describes the software in the Journal of Cosmology and Astroparticle Physics, published online on 12 September 2022.

      • ReutersNorth American companies send in the robots, even as productivity slumps

        North American companies snapped up a record number of robots in the first half of this year as they struggled to keep factories and warehouses humming in the face of an extremely tight labor market and soaring compensation costs.

        Companies ordered a record 12,305 machines in the second quarter valued at $585 million, 25% more units than during the same period a year ago, according to data compiled by the industry group the Association for Advancing Automation. Combined with a strong first quarter, the North American robotics market notched its best first half ever, the group said.

        “Companies need to get product out the door — and so they need” new automation, said Jeff Burnstein, president of the Association for Advancing Automation, known as A3.

    • Hardware

      • ReutersUpset by high prices, GM’s Cruise develops its own chips for self-driving cars

        Cruise had developed four in-house chips so far – a computing chip called Horta, the main brains of the car, Dune which processes data from the sensors, a chip for the radar, and one that it would announce later, Jenkins said.

        The sensors and computing chips would also reduce power consumption, helping to increase driving range.

      • Mullvad creates a hardware company

        Something that makes the key unique is the fact that both its software and hardware are open source. Therefore it can be trusted because of its ability to be inspected and verified. The USB is free to be programmed by end users whilst still being secure. This offers the flexibility to easily be used in a wide variety of new applications.

      • Mullvad Creates an Open-Source USB Security Key

        According to Mullvad, this process should allow the Tillitis Key to verify an app’s integrity before it loads. It also prevents applications from “seeing” each others’ secrets, which may provide a strong defense against malware. (Note that Tillitis Key loads applications, but these applications aren’t persistently stored on the security key.)

      • Tillitis Key

        A user- or host-supplied secret can also be mixed into the key derivation function, providing further protection. A sophisticated physical attacker should be assumed to have knowledge of the target application’s hash, and will likely eventually succeed in extracting the UDS from the hardware. By adding a host-supplied secret, knowledge of the application used as well as the security key’s UDS is not sufficient to produce the application secret. This makes the security impact of a lost or stolen Tillitis Key less than for conventional security keys.

    • Health/Nutrition/Agriculture

      • NBCCovid will be a leading cause of death in the U.S. indefinitely, whether or not the pandemic is ‘over’

        Covid was the third-leading cause of death in the U.S. in 2020, after heart disease and cancer, according to the Centers for Disease Control and Prevention. The same was true last year, provisional CDC data shows. Since April, Covid deaths have stayed relatively flat, at a weekly average of around 300 to 500 per day. If the trend continues, the U.S. could expect 113,000 to 188,000 deaths a year from Covid, putting it on par with Alzheimer’s, chronic lower respiratory diseases and stroke.

      • DaemonFC (Ryan Farmer)Biden declares COVID-19 Pandemic “over” one week before voting begins.

        Just a coincidence, I’m sure.

        I mean, sure, there’s still at least half a million confirmed cases a day worldwide, and the US government has stopped providing tests to the poor and uninsured for free, and sure Governor Pritzker (Democrat) of Illinois recently said to send the kids to school without masks.

        See how fast they need it to go away? They realize they’re going to get thumped hard in the election and the Democrats want everyone to forget the Two Years of Hell they caused, including millions of job losses, 25% inflation in a single year (rent, food, utilities), and such a high suicide rate now that the Germans and Japanese want to know what’s going on in here.


        I fear that the only way to stop them will be to vote for Mark Curran and to try to flip the state Supreme Court.

    • Proprietary

      • A few thoughts about Uber’s breach – 2022-09-19

        Allegedly, an eighteen-year-old spammed an employee with two-factor authentication via push notifications on an employee with a known password. They got into the VPN and scanned for servers, found a file share without any access controls, and a script that could access break-the-glass credentials. With the highest level of credentials available, they then got effective root access to Slack, AWS, Google Suite, and active directory at Uber.

      • Deutsche WelleWhat will the [Internet] of the future look like?

        Their vision: Rather than scrolling through websites or apps, people will soon stroll virtually through a three-dimensional version of the internet dubbed the “metaverse” — a digital landscape of sorts where users can work, buy things or meet their friends, and where physical and digital realities converge.

      • FuturismUber [Breach] Was So Huge Employees Thought It Was A Prank

        The company told Reuters that it’s investigating the breach and claims no sensitive user data had been accessed. Until the company — or the [cracker] — provide more updates, we won’t really know what happened or why the hacker went after the ride-sharing giant. But it’s clear, at least, that it was not a joke.

      • SECSEC Charges VMware with Misleading Investors by Obscuring Financial Performance

        The SEC’s order finds that, beginning in fiscal year 2019, VMware began delaying the delivery of license keys on some sales orders until just after quarter-end so that it could recognize revenue from the corresponding license sales in the following quarter. According to the SEC’s order, VMware shifted tens of millions of dollars in revenue into future quarters, building a buffer in those periods and obscuring the company’s financial performance as its business slowed relative to projections in fiscal year 2020. Although VMware publicly disclosed that its backlog was “managed based upon multiple considerations,” it did not reveal to investors that it used the backlog to manage the timing of the company’s revenue recognition.

      • ReutersSEC charges VMware with misleading investors by obscuring financial performance

        The company was charged with misleading investors about its order backlog management practices, which the agency said enabled it to push revenue into future quarters by delaying product deliveries to customers, thereby concealing the company’s slowing performance relative to its projections.

        Without admitting or denying the findings in the SEC’s order, VMware consented to a cease-and-desist order and will pay an $8 million penalty, the SEC said. VMware confirmed in a statement of its own that it reached a settlement with the SEC and agreed to pay the penalty without admitting or denying the SEC’s findings.

      • The Register UKSEC charges VMware with hiding slowing sales from investors

        VMware misled investors about its order backlog management processes that allowed it to roll revenue into future quarters by postponing product delivery dates to customers to conceal slowing sales relative to forecasts.

      • NasdaqSEC charges VMware with misleading investors by obscuring financial performance

        Without admitting or denying the findings in the SEC’s order, VMware consented to a cease-and-desist order and to pay an $8 million penalty, the SEC said.

      • US News And World ReportSEC Charges VMware With Misleading Investors by Obscuring Financial Performance

        “VMware shifted tens of millions of dollars in revenue into future quarters, building a buffer in those periods and obscuring the company’s financial performance as its business slowed relative to projections in fiscal year 2020,” the SEC said.

      • Silicon AngleVMware settles with SEC for $8M over allegedly misleading investors

        In May this year, VMware announced that it had reached a deal to be acquired by Broadcom Inc. for $61 billion.

      • IT WireGrand Theft Auto maker breached, next version footage stolen

        In a statement, Rockstar said confidential information had also been taken by the attacker. “At this time, we do not anticipate any disruption to our live game services nor any long-term effect on the development of our ongoing projects,” the company added.

        Take-Two Interactive Software, the parent company of Rockstar, issued an SEC filing notifying its investors of the attack.

      • Input MagazineA ragtag community that updates this aughts Wikipedia gadget

        Take, for instance, the Kin, a social networking device which Microsoft spent a billion dollars developing just for it to be taken off the market after two months due to poor sales.

    • Security

      • GoogleAnnouncing the Launch of the Chrome Root Program [Ed: A prelude to Web censorship by Google]

        The Chrome Root Program ultimately determines which website certificates are trusted by default in Chrome, and enables more consistent and reliable website certificate validation across platforms.


        As part of establishing a secure connection to a website, Chrome verifies that a recognized entity known as a “Certification Authority” (CA) issued its certificate. Certificates issued by a CA not recognized by Chrome or a user’s local settings can cause users to see warnings and error pages.

      • Help Net SecurityHigh severity vulnerabilities found in Harbor open-source artifact registry – Help Net Security

        Oxeye security researchers have uncovered several new high severity variants of the IDOR (Insecure Director Object Reference) vulnerabilities (CVE-2022-31671, CVE-2022-31666, CVE-2022-31670, CVE-2022-31669, CVE-2022-31667) in CNCF-graduated project Harbor, the popular open-source artifact registry by VMware.

      • IT WireiTWire – Uber admits breach, says it was effected through contractor’s credentials

        Ride-sharing firm Uber says a recent compromise of its network was effected using stolen credentials of an external contractor, but claimed that there was no evidence that its production network had been accessed.

        In a statement, the company claimed it was likely that the attacker had bought the Uber contractor’s corporate password on the dark web, after malware had been used to steal the credentials. It said the attacker was likely linked to a group known as Lapsus$ which has carried out a number of attacks this year.

        The attacker then repeatedly tried to log in to the contractor’s Uber account. Each time, the contractor received a two-factor login approval request, which initially blocked access. Eventually, however, the contractor accepted one, and the attacker successfully logged in.

      • IT WireiTWire – Grand Theft Auto maker breached, next version footage stolen

        Rockstar Games has revealed that an attacker breached its network and accessed early development footage of the next version of its well-known video game Grand Theft Auto 6.

        In a statement, Rockstar said confidential information had also been taken by the attacker. “At this time, we do not anticipate any disruption to our live game services nor any long-term effect on the development of our ongoing projects,” the company added.

      • Privacy/Surveillance

        • India TimesNew Data Protection Bill to augment efficient usage of data by industry: Centre

          The Centre on Monday said that the new draft of the data protection bill is being prepared to augment efficient usage of data since it would largely be used by the industry.

          Speaking at the CII ‘International Technology Summit 2022,’ Dr Rajendra Kumar, Additional Secretary, Ministry of Electronics and Information Technology (MeitY), noted that the government has put in place a proactive approach to deal with emerging technologies and subsequent threat levels.

        • Broadband BreakfastCalifornia Social Media Law, Rosenworcel Deep in Space, Changes at I3 Connectivity Explorer

          Effective July 1, 2024, the California Age-Appropriate Design Code Act will limit the online collection of children’s data by any business that “provides an online service, product, or feature likely to be accessed by children.” The act also forbids the usage of children’s data in a manner “the business knows, or has reason to know, is materially detrimental to the physical health, mental health, or well-being of a child” and limits businesses’ ability to dispose of such data, among other measures. To ensure compliance, businesses would be required to establish the age of online users and issue reports to state officials.

        • Assembly Bill No. 2273: CHAPTER 320: An act to add Title 1.81.47 (commencing with Section 1798.99.28) to Part 4 of Division 3 of, and to repeal Section 1798.99.32 of, the Civil Code, relating to consumer privacy.

          This bill would create the California Children’s Data Protection Working Group to deliver a report to the Legislature regarding best practices for the implementation of these provisions, as specified. The bill would require the members of the working group to have certain expertise, including in the areas of children’s data privacy and children’s rights. The bill would require the working group to take input from a broad range of stakeholders, including from academia, consumer advocacy groups, and small, medium, and large businesses affected by data privacy policies, and make prescribed recommendations on best practices, including identifying online services, products, or features likely to be accessed by children.

          This bill would authorize the Attorney General to seek an injunction or civil penalty against any business that violates its provisions. The bill would hold violators liable for a civil penalty of not more than $2,500 per affected child for each negligent violation or not more than $7,500 per affected child for each intentional violation. The bill would require any penalties, fees, and expenses recovered in an action brought under the act to be deposited in the Consumer Privacy Fund with the intent that they be used to fully offset costs incurred by the Attorney General in connection with the act.

    • Defence/Aggression

    • Transparency/Investigative Reporting

      • Michael West Media“Be honest for once”: cost of secret trials rises as Government covers-up Timor spying fiasco – Michael West

        The Timor-Leste secret spy trials are not over, with costs already $5m and rising, Rex Patrick writes the Government will be back in court spending more public money trying to censor one of the former Chief Justice’s decisions to keep secret the finding of the Court that the spying operation took place.

        Court proceedings relating to Bernard Collaery blowing the whistle on a conspiracy to defraud Timor-Leste of its oil and gas by spying on the Timorese sea boundary negotiating team are over. Yes?


        $5,421,115 of taxpayers’ money has been spent, but there’s more cost to come. Secret trials have occurred, but they’re not over yet.

        On 23 September the Government will be back in the ACT Supreme Court spending taxpayers’ money trying to censor one of the former Chief Justice’s decisions to keep secret the finding of the Court that the spying operation took place.

      • Michael West MediaFalk Lines: Information Commissioner fights for the right to hide information indefinitely, que? – Michael West

        Information Commissioner Angelene Falk will argue in the Federal Court that she can take forever to handle FOI complaints. Rex Patrick, who brought the case, reports she is acting against the government’s transparency regime, advice from Mark Dreyfus, and the public interest.

        For people to make valid judgments on government policy or to contribute to new policies in an intelligent way, they must be able to exercise their rights to have timely access to government information.

        So it is with great disappointment that at 10.15 this morning the Information Commissioner (IC), Angelene Falk, will argue in the Federal Court that, when she is asked to conduct a review of a government’s FOI decision that refuses a person’s access to information, she can take forever to do so, thereby denying indefinitely the right of that person to engage fully in our democracy.

        The IC’s decision to instruct her taxpayer-funded solicitors to do so is a betrayal and a disgrace. It’s also a particularly strange move when the Attorney-General has already intervened in the case spelling out the adverse effects of her delay in decision making is having on the FOI regime.

    • Environment

      • Energy

        • New York Times‘Crippling’ Energy Bills Force Europe’s Factories to Go Dark

          This past week, the European Commission president, Ursula von der Leyen, proposed offsetting the hit by capping revenue from low-cost electricity generators and forcing fossil fuel firms to share the profit they make from soaring energy prices.

          But the solutions may not be fast enough. Costs have already soared beyond what many manufacturers can afford. Thousands of European companies are near the end of fixed energy contracts signed when prices were cheaper, and must renew them in October at current prices. Year-ahead electricity prices, which are tied to the cost of gas, are around 1,000 euros per megawatt-hour in Germany and France, while natural gas is at record highs of around €230 per megawatt-hour.

        • FuturismMiners Forked Ether So They Can Still Pollute After The Merge, But It’s Already Crashing In Value

          But that also means mining outfits are now sitting on massive piles of extremely power-hungry hardware. Many banded together to create ETHPoW, a hard fork of Ethereum that lets them keep their environmentally damaging operations going.

          That’s not going so great, though. Today alone — the fork was yesterday — ETHPoW is already down by a staggering 55 percent.

        • The EconomistCan Europe decarbonise its heavy industry?

          Heavy industry has long seemed irredeemably carbon-intensive. Reducing iron ore to make steel, heating limestone to produce cement and using steam to crack hydrocarbons into their component molecules requires a lot of energy. On top of that, the chemical processes involved give off lots of additional carbon dioxide. Cutting all those emissions, experts believed, was either technically unfeasible or prohibitively expensive.

        • What The Merge Means – a16z crypto

          The Merge – the major Ethereum upgrade that happened early Thursday morning – will go down as one of the most important moments in the history of open source. It’s hard to think of a cooler example of a community of hundreds of developers across many organizations driving years of open-ended research and hard technical development.

          Many people don’t realize: Transitioning Ethereum to “proof-of-stake” (PoS) – an alternative to “proof-of-work” (PoW) mining for reaching consensus on blocks of transactions – was an insane feat. The update involved hot-swapping the most important component of Ethereum’s architecture – its consensus mechanism – *while it was running*. All this occurred while maintaining perfect uptime for millions of users, thousands of decentralized applications (dapps), and hundreds of billions of dollars secured.

    • Finance

      • [Old] The Asymmetry of Open Source

        Users need open source projects, but open source projects do not need users.

        That asymmetry is, I believe, at the crux of the open source sustainability problem. We all use open source projects either directly or indirectly. But projects do not need us. Of course, projects need users to create rich and active communities, collaborate on code, and contribute in other ways; but those are optional components, and projects can absolutely do what they want in a vacuum, ignore their users, or even abandon them altogether. Ultimately, project developers do not need users in order to write code and put it on the Internet.

        With the recent revival of the discussion about sustaining open source spurred on by multiple severe CVEs in a popular logging library, and with so many hot takes clamoring for more funding—some calling on companies, others on maintainers—I wanted to write about the problem and its solutions more wholistically, as I have spent many years thinking about this from my own experience with both failing and succeeding… a perspective that I hope some of you will find helpful.

      • DaemonFC (Ryan Farmer)Walmart Grocery Pickup, Walmart App, and Walmart+ is getting more frustrating.

        Walmart Grocery Pickup is getting more frustrating.

        Walmart has been looking at ways it can convince more people to pay for Walmart+, which is their answer to Amazon Prime.

        Recently, Walmart decided to ditch DoorDash because the “partnership” wasn’t working out, and by “wasn’t working out”, I mean that DoorDash doesn’t actually pay their slaves enough to bother, so orders would just sit forever until Walmart canceled them without delivery.

        On the off chance that your order went through, Walmart basically discouraged tipping the driver, which created even more bad feelings towards the scheme from drivers, which caused even more drivers to stop taking Walmart orders. Some had stories like “I just carried in like 100 gallons of bottled water up four flights of stairs for $3 and the cheap fucker didn’t even tip me!”.

        So that didn’t last long, and now our local Walmart has its own delivery van and a store employee. (You can tip them, but Walmart has to pay them the legal minimum wage, and it’s Walmart’s van and gas money. This is a win for labor.)

        I usually pick up grocery orders. I don’t go inside much because I have a Walmart credit card which gives me 2.5 times as many points to have someone else do my shopping.

    • AstroTurf/Lobbying/Politics

      • The HillPentagon orders audit of clandestine information warfare: report

        Undersecretary of Defense for policy Colin Kahl last week asked the military commands that participate in online psychological operations to give a complete rundown of their activities by next month, according to the outlet.

      • The Washington PostPentagon opens sweeping review of clandestine psychological operations

        The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. While the researchers did not attribute the sham accounts to the U.S. military, two officials familiar with the matter said that U.S. Central Command is among those whose activities are facing scrutiny. Like others interviewed for this report, they spoke on the condition of anonymity to discuss sensitive military operations.

      • NetblocksTikTok restricted in Azerbaijan and Armenia amid clashes over Nagorno-Karabakh

        Network data confirm the restriction of social media platform TikTok on multiple internet providers in Azerbaijan and Armenia amid deadly clashes between the two countries as tensions rise over the Nagorno-Karabakh region.

      • India TimesProfessor behind $12 billion empire fuels China’s tech rise

        Li Zexiang grew up in rural China during the Cultural Revolution, when capitalists were the enemy. Now the 61-year-old academic has quietly emerged as one of the country’s most successful angel investors. He’s groomed a generation of entrepreneurs and set up an incubation academy, funding or nurturing promising players in robotics and artificial intelligence valued at almost $12 billion.

      • Misinformation/Disinformation

        • New York TimesFood Supply Disruption Is Another Front for Russian Falsehoods

          Disinformation experts agree that there is a main driver for these falsehoods: Russia. Propaganda from the Kremlin, they said, has bled into right-wing social media chat rooms and, occasionally, into mainstream conservative news media like Tucker Carlson’s Fox News program.

          U.S. officials have said Russia is trying to deflect its responsibility for disrupting the world food supply through its invasion of Ukraine. And they warn that these conspiracy theories will only find a more receptive audience as Russia’s invasion continues to pressure the global markets for food and energy and, as is expected, keeps prices elevated through the winter.

        • NBCMigrants who landed on Martha’s Vineyard were tricked by misleading brochure, lawyers say

          But there’s one problem with what the brochure was promoting: The migrants aren’t anywhere close to being classified as refugees, a specific term under U.S. immigration law. The implicit promises of help, therefore, were misleading and potentially criminal, according to Lawyers for Civil Rights, a nonprofit legal aid group representing 30 of the people who landed on the Massachusetts island last week.

    • Censorship/Free Speech

      • The HillCalifornia Dems follow Texas GOP into online speech battle

        California’s transparency law, signed by Gov. Gavin Newsom (D) last week, has the opposite intent as that of a law backed by Texas Republicans that is set to go into effect after an appellate court ruled Friday in favor of the state.

        But the industry groups opposing Texas’s law are tying the two together, arguing that both content moderation laws are unconstitutional and could set dangerous precedents that lead to more hate speech online.

      • How TikTok is Censoring the Left

        It goes down like this: Right-wingers target my account, which presently has 26,410 followers, by falsely mass reporting videos that have managed to get through to a sizable audience (quite a few of my TikToks have had viewership in the six figures) and in which I speak out against Republican tyranny (as well as smug Democratic inaction). But because I have racked up enough community guidelines violations — largely factitious — TikTok hits me with a seven day ban, even when I appeal every single one of these falsely flagged videos and win the vast majority of my petitions.

      • [Old] BBCNigeria clash: Abuja mob burns man to death over row with Muslim cleric

        Ahmad Usman, 30, was in a local vigilante group and police say about 200 people were mobilised against him.

        Eyewitnesses said the row was over an alleged blasphemous remark, but the police have not confirmed this.

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • BBCMahsa Amini: Iran police say woman’s death was ‘unfortunate’

        Her death sparked protests in the capital and western Iran, where two people were reportedly killed in clashes with riot police on Monday.

      • VOA NewsIran Police Use Tear Gas, Water Cannon to Disperse Protest Over Woman’s Death

        The protest came three days after doctors declared Amini dead on September 16 after she showed no brain activity since falling into a coma after being admitted to the hospital.

        According to reports published on social networks, Amini had traveled from the western Iranian province of Kurdistan to Tehran to meet relatives when she was arrested by the morality police on September 13.

        Eyewitnesses to her arrest told journalists that Amini appeared to have been beaten inside the police van while being taken to the detention center.

      • ABCHarris County Sheriff’s Office deputy gets sick after taking drugs he mistook for candy: Sources

        An internal review is underway after a Harris County Sheriff’s Office deputy got sick Wednesday morning at a substation. Sources told ABC13 the deputy took drugs, which had been recovered at a crime scene, because he thought they were candy.

        It happened at the Cypresswood substation in northwest Harris County. The drugs were colorful in nature and divided into clear plastic baggies and packed in a box. The deputy said he mistook it for candy.

    • Digital Restrictions (DRM)

    • Monopolies

      • Computer WorldGoogle’s failure to quash EU antitrust ruling has broad implications for tech companies

        The ruling dealt with three types of agreements that involved Google’s mobile application distribution agreements (MADAs), antifragmentation agreements (AFAs), and revenue sharing agreements (RSAs).

        According to the case, Google’s MADAs required smartphone manufacturers to pre-install Google search and browsers to carry the Play Store, while its AFAs forced smartphone makers not to run alternative versions of Android. Finally, under the company’s RSAs, mobile operators and smartphone manufacturers earned revenue if they agreed not to pre-install a competing search engine to Google’s, what are known as “exclusivity rebates.”

  • Gemini* and Gopher

    • Personal

      • 19th September 2022 – Queen Elizabeth II’s Funeral

        Today is a bank holiday so I was free from work. Sadly it was due to the Queen’s funeral. So of course, I felt obliged to watch as I did some Scout digital stuff. As ever with these things, there is a lot of nonsense.

      • Manhattan: Overheard Conversation
      • Star Log 2022-09-18 23:00 AKDT (Fairbanks, AK, US)

        I prayed for good star-gazing weather yesterday morning, and was blessed with a great opportunity last night, with skies clearing up for most part around 9pm. The top item on my agenda was to try out the telescope again on Jupiter. Unfortunately, of the original three magnification lenses I had, I lost one in storage, and I discovered that another one had a cracked lens, which left only the lowest magnification. So I didn’t have enough magnfication to get any detail on Jupiter’s surface. But I was excited to be able to view four of jupiter’s moons. The image I saw looked just like this screenshot from Stellarium, except that the moons were not disks but instead bright points, and also my view was inverted horizontally.

      • 2022 Week 36/37: Catch-Up and Photos

        Rob’s capsule has been quiet over the last several days. The reason is that I’ve decided to finally move the capsule off of my Raspberry Pi 1B and onto a faster machine. That, combined with a mid-week sinus infection and multiple personal commitments, left me with little time to add content.

        My capsule is now served on Rocky Linux 8 using KVM. I had originally intended to stay with gmnisrv to power the server, but I was unable to get it to compile on Rocky. I then set up vger using ncat and a systemd socket, only to discover that vger does not support client certificates. gmid also had problems compiling, so I turned to Jetforce, with which I’m now very happy.

      • The Ringing

        The weirdest thing I’ve ever experienced happened to me and Roomie last night.

        We were watching TV when a high-pitch ringing note started playing, it almost sounded metallic like a bell. Except it didn’t sound like a weird house noise or something from outside, it sounded like it was coming from inside my ears. It was extremely foreboding and filled us with a sense of dread. Roomie asked me “What’s that sound?” and paused the video.

    • Technical

      • Swearing at computers

        I’ve been trying to get DHL Express to deliver a package to my place. After three unsuccessful deliveries the tracking page informed me that I would have to contact support to arrange another.

        I tried the email form first but I expected the back-and-forth would last for days so I looked for a more immediate solution. There is a “Digital Assistant” which just a chatbot with a predetermined set of questions it can answer. The same chatbot is also available over WhatsApp but calling the provided phone number results in the call being dropped as expected.

      • A brief lull

        I’ve been looking at getting a NeoCities page. I’m sticking around here, I love smol.pub. NeoCities would be a good personal hub, a place to put links and photos and interests outside of social media. It looks easy, it looks like it has a lot of good features, and it’s part of the indie web, and I like that a lot. It’ll be fun to play with, especially since my experiment with having a VPS doesn’t seem to have worked out (which is fine, that’s what experimenting is for).

      • Internet/Gemini

        • Gemini search

          There are 38616 results, so I’m not going to be able to search through all of them. There’s a few problems. I get the link, but not the title. The text shown in the results didn’t seem especially helpful, either.

          So OK, suppose I’m interested in how to configure the PWM (Pulse-Width Modulation) hardware that’s on the stm32. I search for “stm32 and pwm”, but I still don’t get a useful result. One of the top links is to “Open Hardware: Arduino, Raspberry Pi, and ESP32″, none of which is applicable to the stm32.

      • Programming

        • Somewhat confusing

          Learning a programming language is hard. I try and try, yet I just overfill my head with knowledge I don’t need and stress myself out. What i really need is an end goal.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Monday, September 19, 2022

Posted in IRC Logs at 2:52 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmYP5TerSPKZ4Z1gN95JD93jxqX2DgJisp9Wn8cXajJEDQ IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmZDPnvXYqzZsLR1TBDNJ88rhi9UhhSwqkoFC4TcYhoFes IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmVr8Tw3dMb2EiU4yE8zRXYY4DjYxsjWPmQok8WR1Gryco IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmVQKHB8FECGoG85Cg5eLGuVU1uchDD8Mv755eSmgeHf3K IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmWAuQRJ2NgfZqMZZxHN8Ct5noeZw5s48ZoBCxsb3EJLiv IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmWchdwgtHHj3BexdtedM57eYuZeKGrmnpVvZMx8NHAsP4 IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmPShaJjyM3pdSM7Lba8mhGNGs76q4KYZN3HJoXtDgF7EC IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmSCRkfmr8pN8PEHxdzhyqYCoDiKJdNxp7jSycyM5cA2bJ IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts