Links 20/10/2022: OpenBSD 7.2 and Claws Mail 3.19.1/4.1.1

Posted in News Roundup at 7:59 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Linux Format 295

      Build the ultimate retro emulation gaming experience, relive your Amiga Basic days and explore the huge open source emulation world! Discover all the software to enjoy the classic computer days of the ZX Spectrum, Commodore 64, Atari ST, Amiga and more. We’ll even run a mainframe for fun.

      PLUS: Search your PC faster, monitor your bandwidth, perfect your 3D prints, full-disk encryption, the best Lightweight distros tested, we dive into Kubernetes and loads more!

    • Desktop/Laptop

      • Ubuntu Pit7 Best Linux Distros For Laptop in 2022

        Linux was complex to use on personal computers or laptops and used on servers or high-end cloud devices. But now the days have changed. There are various distros available for individuals wanting to use Linux on their laptops. Whether you have a high-end laptop or an old laptop, there are Linux distros that cover every device. Moreover, there are some distros available that might help the user switch from Windows or mac systems. In this article, we will take a look at five of the best Linux distros for laptops. We will also discuss some of the pros and cons of each distro.

      • HowTo GeekYou Can Now Buy a Linux PC With Ryzen 7000 or 13th Gen Intel [Ed: Seems more like sponsored webspam, not an article]

        System76 has been selling desktop and laptop computers built with Linux in mind for years. The company just updated the design of its Thelio desktop, and now it’s available with the latest and greatest x86 CPUs.

        System76 sells three desktop computers: the cheapest Thelio workstation (starts at $949), the more powerful Thelio Mira (starts at $999), and the high-end Thelio Major (starts at $3,499). Starting today, you can now configure the Thelio and Thelio Mira with 13th Gen Intel Core or AMD Ryzen 7000 processors. Specifically, you can choose the Core i5-13600K at 5.1 GHz or the Core i7-13700K at 5.4 GHz on both computers, while the Mira is available with Ryzen 7 7600X, Ryzen 7 7900X, or Ryzen 7 7950X. The Thelio Major uses AMD Threadripper CPUs, just like before.

      • HowTo GeekThis Laptop Runs Android, Not Windows or Linux

        You’ve heard of Android phones, tablets, TVs, cars, and smartwatches, but have you ever considered it for your laptop? The closest thing is Chromebooks, as they support Android apps. But what about actual Android? India-based Reliance will start selling a laptop powered by Google’s world-famous mobile OS.

        Reliance has launched the JioBook, a laptop that’s running an Android-based OS called JioOS that’s, according to the company, “optimized for superior performance.” It supports many local Indian languages, and it starts at 15,799 rupees, or $190. As it runs Android and it’s priced similarly to entry-level Android handsets, you can expect pretty modest specifications. Laptops running Android are nothing new, but they have fallen out of style as Windows and Chrome OS became more optimized for low-end hardware.

    • Server

    • Audiocasts/Shows

    • Applications

      • Claws Mail 3.19.1 and 4.1.1 unleashed!!
        20th October 2022                           Claws Mail 3.19.1 / 4.1.1
        Claws Mail is a GTK+ based, user-friendly, lightweight, and fast
        email client.
        New in this release:
        * Marked messages in the Message List can now be displayed with bold
          text by setting the hidden preference "bold_marked".
        * The confirmation dialogue when saving all the attachments of a
          message can now be disabled.
        * The Message List tooltip for the From column now shows name and
        * OAuth2: various fixes and improvements.
        * The user manuals have been updated.
        * Updated translations: Brazilian Portuguese, Catalan, Czech, Dutch,
          French, Polish, Russian, Slovak, Spanish, Swedish, Traditional
          Chinese, Turkish.
        * Build system: GLib version 2.50 or greater is required; autoconf
          version 2.69 or greater is required; pkgconfig support for GPGME
          and libgpg-error has been added; GnuTLS is required for OAuth2;
          OAuth2 support can be removed with --disable-oauth2.
        * bug fixes:
        	• bug 4547, '--enable-tests makes compilation fail'
        	• bug 4583, 'Compose window 'Discard message' dialog is
        		     displayed even though draft is already saved'
        	• bug 4584, 'Compose window causing Claws to terminate
        	• bug 4589, 'Edit Group Details panel wording unclear.'
        	• bug 4615, 'Compilation fails with --disable-gnutls'
        	• bug 4620, 'German translation of Content-Transfer-Encoding
        		     adds unwanted colon'
        	• bug 4628, 'typos in the README file'
        	• bug 4630, 'Fancy loads remote images when remote content
        		     is disabled'
        	• bug 4636, 'Handle non-ascii characters in server response'
        	• AddressKeeper plugin: not saving addresses.
        	• Perl plugin: building with perl v5.35.2 or greater.
        	• AttRemover plugin: filenames would not be shown and corrupt
        	  the output
        	• OAuth2: Use the user-configured timeout
        	• 'save all' dialogues' logic.
        	• Make custom headers compliant with RFC 2822 § 3.6.
        	• correctly set modified flag after auto-save
        	• NNTP account's SMTP server wasn't used
        	• building with older GLibs
        For further details of the numbered bugs and RFEs listed above
        see https://www.claws-mail.org/bug/[BUG NUMBER]
        See ChangeLog for full information regarding changes in this release.
      • UbuntubuzzList of FOSS Modern Instant Messenger Applications

        This is a list of FOSS instant messenger applications. It’s aimed for people who want to quickly use and know more about Telegram, Signal and many others as free/libre open source software alternatives to Skype or WhatsApp proprietary messengers. We hope this helps you and your friends choose one. Happy communicating!

      • CPU-X: Linux System Profiling and Monitoring | BIOSLEVEL | Linux Harware Profiling

        For nearly twenty years, CPU-Z has been a staple for performance Windows users who want to see as much detailed information about their system as possible. Windows’ built-in device manager and resource monitor only provided so much information about the hardware in a computer, but finding certain settings or tweaks that may have been set in the system BIOS or UEFI may not be exposed. Applications such as CPU-Z have filled this gap for Windows users over the years, however Linux and BSD users have been without a single desktop GUI that gives the same information.

        CPU-X was first released in 2014, and can be easily downloaded from their Github repository. Written in C, CPU-X can be run on the desktop with a GTK interface similar to that of CPU-Z, or from the command line using ncurses. It provides to Linux users essentially what CPU-Z provides to Windows users.

      • UbuntuJoin our Ubuntu circle | Canonical

        The MAAS 3.3 Beta 1 release is out. You should take a look.

      • Insider 2022-10: type support; Splunk/Sentinel; MongoDB; Photon; – Blog – syslog-ng Community – syslog-ng Community

        This is the 105th issue of syslog-ng Insider, a monthly newsletter that brings you syslog-ng-related news.

    • Instructionals/Technical

      • AddictiveTipsHow to use LXC containers on Linux

        LXC (aka Linux Containers) is a kernel-level virtualization tool. With it, users can create and run fully contained Linux operating systems. Here’s how to use LXC on your Linux system.

      • TechRepublicHow to deploy MongoDB as a Docker container | TechRepublic

        MongoDB is an outstanding NoSQL database that offers plenty of features to satisfy the most demanding needs, but I’ve found installing MongoDB to be a bit inconsistent across Linux distributions. MongoDB might install just fine on, say, Ubuntu 20.04, but there’s no guarantee it will start properly. That’s an issue I’ve experienced on several occasions.

      • TechRepublicHow to install Cockpit on Pop!_OS for easier system maintenance | TechRepublic

        Pop!_OS is my primary operating system. I use it every day for the vast majority of my productivity. The other day I was taking care of a few tasks and I thought: “I should really do something to make this a bit more efficient.”

        It’s not like I mind using the command line or working with different tools for different tasks. But some days I would much rather do everything under one roof. Even better, I have other machines to deal with that could benefit from a more efficient solution.

      • Packages needed for Vulkan development on openSUSE | Stefan’s openSUSE Blog

        Recently I had a first look into Vulkan development. So I started by reading a Vulkan Tutorial. It’s rather detailed and actually it takes a long time before you see your first shaded triangle (about 900 lines of code!). The Vulkan Tutorial has some software requirements on Linux, which are explained in detail in the Development environment for Linux. In order to make things easier for openSUSE users here is the package list you need to have installed. Just install them via zypper.

      • Make Use OfHow to Access Wikipedia Without Ever Leaving the Linux Terminal

        It’s easy to access and read Wikipedia articles using the Linux terminal when you need to.

        Hardcore Linux fans spend their lives on the command line. From inside a terminal, you can do virtually everything—to the extent, that many don’t even bother installing a desktop environment.

        But did you know that you can easily read Wikipedia summaries from the terminal? Here’s how.

      • TechRepublicMultiple SSH Sessions in a Single Window with EasySSH | TechRepublic

        Jack Wallen shows you how you can wrangle all of those SSH connections you use daily into a single, easy-to-use application.

      • Make Tech EasierHow to Resample Hi-Res FLAC in Linux – Make Tech Easier

        Hi-Res FLAC files are one of the pinnacles of the Hi-Fi audio experience. However, if you rip your CD into FLAC files, you might find that they are often hard to play outside the equipment they are made for. This can be an issue for users who own high-resolution audio tracks but do not have the tools to play them properly.

        One way to fix this is to use sox to resample your Hi-Res FLAC files. This tutorial teaches the basics of sox and how to use it to resample FLAC files in Linux.

      • Linux HintHow to Install OpenShot Video Editor Ubuntu 22.04

        “For video editors, the OpenShot Video editor is a good choice. The open-source and free tool helps users create and edit classic videos and offers multiple audio, video, and image formats. With this tool, you can create content videos for social media platforms and platforms like YouTube.

        This tutorial covers different ways of installing OpenShot on Ubuntu 22.04.”

      • H2S Media3 Ways to install OpenSCAD on Ubuntu 22.04 LTS Jammy

        Learn the commands to install free and open-source OpenSCAD 3D CAD software on Ubuntu 22.04 LTS Jammy JellyFish Linux using the terminal and GUI.

        The 3D tool OpenSCAD generates 3D models from descriptive scripts. This gives you very precise control over every single work step during modeling.

        From various two- and three-dimensional basic shapes, you assemble your model, move elements and assign colors.

        Various mathematical operators, modifiers, transformations, variables, loops, and other functions allow to realize of almost arbitrarily complex models.

        The interface of OpenSCAD is essentially divided into two areas. While you type the script on the left, the freeware renders the result on the right side at the push of a button.

      • H2S MediaInstall – play 2048 game on Ubuntu 22.04 or 20.04 LTS Linux

        Install the 2048 mathematical game on Ubuntu 22.04 Jammy JellyFish or Ubuntu 20.04 Focal Fossa to take a break from your Terminal commands.

        2048 is a simple but complicated puzzle board game in which a single player gets 4×4 tiles. Where the player has to combine or add the random but same digits to achieve the value of 2048 before the board is full. It was developed by Gabriele Cirulli, an Italian developer.

        At first glance, the game seems quite basic and easy to play but as you start sliding the tiles to get the number 2048 you will realize, it is not a piece of cake for everyone. Only the mathematical sound person could get the right number to win the game.

        Originally the game was written in Javascript and CSS. And being an open-source software it is available to install using the default system repository of Ubuntu Linux.

        The best part is that we can use our Terminal to play it, no need to launch some separate application launcher to play the game.

      • CitizixHow to install and set up PHP and Apache(LAMP stack) on Ubuntu 22.04

        In this guide we are going to Install and set up Apache virtual host to serve PHP content on a Ubuntu 22.04 system. The Apache HTTP Server(Apache), is one of the most popular free and open-source cross-platform web server software, released under the terms of Apache License 2.0.

      • CitizixHow to Install and Configure Zabbix Server 6 on Ubuntu 22.04

        Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines and cloud services. Zabbix provides monitoring metrics, among others network utilization, CPU load and disk space consumption.

      • ID RootHow To Install Fork CMS on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Fork CMS on Ubuntu 22.04 LTS. For those of you who didn’t know, Fork CMS is a free open source content management system (CMS) written in PHP and uses Symphony components. Fork CMS comes with many themes and apps like Banners, Guestbook and support many third-party extensions available to use.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Fork content management systems on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

    • Games

      • Boiling SteamSteam Deck: 6000 Games Playable/Verified – Boiling Steam

        For the Steam Deck, we have just reached 6000 games (almost, 5974 at the last count an hour ago), classified in two categories:

        - Verified; 2370 verified
        - Playable: 3604 playable

        Here’s a graph of the progression over time – we are headed towards somewhere between 7000 and 8000 games by the end of the year.

    • Desktop Environments/WMs

  • Distributions and Operating Systems

    • New Releases

      • Makulu Max Coming Soon – MakuluLinux

        In preparation for the upcoming Makulu Max release, We have now added a “Max” section to the Main website where we have posted the “Release notes highlights” for the last 2 months, users can now follow development as we get ready for the Beta 1 release. The release date is expected to be in the coming weeks, however no exact date is yet determined. Feel free to check out the Release Notes Highlights by clicking here. We will also be making some videos in the Coming Days/Weeks to prepare users for what to expect. More news will follow…

    • BSD

      • Mailing list ARChivesOpenBSD 7.2 released
        - OpenBSD 7.2 RELEASED -------------------------------------------------
        October 20, 2022.
        We are pleased to announce the official release of OpenBSD 7.2.
        This is our 53rd release.  We remain proud of OpenBSD's record of more
        than twenty years with only two remote holes in the default install.
      • OpenBSDOpenBSD 7.2

        This is a partial list of new features and systems included in OpenBSD 7.2.

    • Fedora / Red Hat / IBM

      • ZDNetRed Hat releases a virtual Red Hat Enterprise Linux desktop on AWS | ZDNET

        Once upon a time, and it wasn’t that long ago, “desktops” were terminals to mainframes or midrange computers running Unix. Then along came the PC, and everything changed. That is, until now. Today, Desktop-as-a-Service (DaaS) is making a comeback. And Red Hat is joining this trend with the general availability of Red Hat Enterprise Linux for Workstations (RHEL WS) on Amazon Web Services, announced Tuesday.

      • Red Hat OfficialRed Hat and IBM Research Advance IT Automation with AI-Powered Capabilities for Ansible
      • Red Hat OfficialRed Hat Ansible Automation Platform on Azure Now Available at Microsoft Azure Marketplace [Ed: Instead of compering with Microsoft, Red Hat helps Microsoft push proprietary software and spy on people]
      • Red Hat OfficialRed Hat Introduces Red Hat Ansible Automation Platform in AWS Marketplace
      • Red Hat OfficialUlta Beauty Standardizes on Red Hat Ansible Automation Platform for Automation Transformation

        Red Hat, Inc., the world’s leading provider of open source solutions, today announced that Ulta Beauty, the nation’s largest beauty retailer, has selected Red Hat Ansible Automation Platform as its internal standard for automation transformation. As part of a three-phased transformation project to free up IT teams by deploying technology with greater speed and efficiency, the retailer is using automation as a catalyst for innovation and cultural change. Through this effort, Ulta Beauty has already saved thousands of hours a year in manual work with Ansible Automation Platform.

      • Cockpit Project: Login issues with newer browsers

        Firstly, there’s a fix.

        In most cases, update. Cockpit 277, released last month, has the fix.

        Updating Cockpit should work for Arch, CentOS Stream, Debian, Fedora, openSUSE, non-LTS versions of Ubuntu.

        If updating doesn’t work (in Ubuntu LTS, some versions of RHEL, Alma Linux, and Rocky Linux), then hopefully it will work very soon. For the time being, please look at the bottom of this post for some workarounds.

      • Fedora MagazineEPEL 8 Modularity is going away

        EPEL 8 Modularity was set up shortly after the main EPEL 8 release. It attempted to use the Fedora module ecosystem with RHEL modules. The strange mixture of Fedora ecosystem and RHEL modularity never worked properly. There have been routine instances of modules that wouldn’t install, modules that overwrote RHEL modules, Fedora maintainers surprised their modules were in EPEL, and the constant issue that EPEL modules couldn’t depend on RHEL modules.

        Many people have attempted to fix EPEL modularity over the years but none of these attempts have worked. At this point the EPEL Steering Committee is saying that the experiment with modules in EPEL has not worked. We are decommissioning EPEL 8 modularity.

      • Red Hat OfficialA brief history of mktime()

        In the beginning, there was… well, we don’t know, because we weren’t there to tweet about it. Without the internet, it was difficult to arrange things like hunting parties or afternoon tea. Most people woke up with the sun and slept when it was dark. The keeping of time was so sloppy that eventually winter stopped happening in winter, and something had to be done about it. In 1582 Pope Gregory XIII created our modern calendar, and centuries later most countries have adopted it. I’m not kidding about “centuries” either; Saudi Arabia only adopted it in 2016, and Britain waited until 1752 as can be seen by the weird calendar that year…

    • Canonical/Ubuntu Family

      • DebugPointUbuntu 22.10 Kinetic Kudu Arrives with GNOME 43, Pipewire, debuginfod and many new features

        Ubuntu 22.10, codenamed “Kinetic Kudu”, is finally released today. This release is a mark of continuous improvements to the new technology adoption by Ubuntu for its general and commercial users across desktops and servers.

        This is the final release of this year and a short-term one, supported until July 20, 2023. The team has worked hard through the development and testing cycle and finally introduced the final Ubuntu 22.10.

        Here’s what’s new.

      • DebugPointHow to Upgrade to Ubuntu 22.10 From 22.04 LTS (Jammy to Kinetic)

        Always stay with long-term support release. That is the thumb rule. So, the prior Ubuntu 22.04 LTS Jammy Jellyfish is supported until April 2027. That’s a long time.

        In addition, LTS releases are super stable. They rarely break and become unstable. So, if you use your laptop/desktop or server installation with the LTS version, stay with it.

        However, if you want the latest Kernel, GNOME 43, and new technology like Pipewire – you might want to make the jump and want to upgrade to Ubuntu 22.10 Kinetic Kudu.

        Here’s how.

      • 9to5LinuxUbuntu 22.10 (Kinetic Kudu) Is Now Available for Download, This Is What’s New

        Dubbed the “Kinetic Kudu,” Ubuntu 22.10 is here with the latest and greatest GNOME 43 desktop environment by default (yes, with support for GTK4 apps), which comes with numerous new features and enhancements for fans of the GNOME/Ubuntu desktop, yet the look and feel remain unchanged from previous releases.

        After a few releases that were not synced with the latest GNOME desktop release, Ubuntu’s engineers finally managed to ship an Ubuntu system that features the most recent GNOME Stack, and GNOME 43 introduces a new GNOME Text Editor app that replaces Gedit in Ubuntu 22.10 as the default text editor.

      • 9to5LinuxUbuntu 22.10 Official Flavors Released, Here’s What’s New

        Included as part of the Ubuntu 22.10 release, there are the Kubuntu 22.10, Xubuntu 22.10, Lubuntu 22.10, Ubuntu Unity 22.10, Ubuntu Studio 22.10, Ubuntu MATE 22.10, Ubuntu Budgie 22.10, and Ubuntu Kylin 22.10 official flavors, which are packed with all the internal changes of Ubuntu 22.10.

        The highlight of the Kinetic Kudu flavors release is Ubuntu Unity 22.10, which sees first ever release as an official Ubuntu flavor recognized by Canonical. Ubuntu Unity features the good old Unity7 desktop environment that Canonical used to maintain many years ago, and this should please many old Ubuntu users out there.

      • DebugPoint10 Things to Do After Installing Ubuntu 22.10 [With Bonus Tip]

        Ubuntu 22.10 brings exciting new features such as GNOME 43, the latest Kernel, a newly re-designed tray menu, Files features, Pipewire and many more.

        I am sure you are excited to try them.

        Before you head over to enjoy a new installation of Ubuntu, here’s an assorted list of customization tips which you can’t miss.

      • OMG UbuntuHow to Upgrade to Ubuntu 22.10 – OMG! Ubuntu!

        In this post I show you how (relatively) easy it is to upgrade to Ubuntu 22.10 from Ubuntu 22.04 LTS.

        Just keep in mind that Ubuntu 22.04 LTS is a long-term support release and Ubuntu 22.10 is not! As an interim release, Ubuntu 22.10 gets just 9 months of guaranteed support compared to the (at least) 5 years of support Ubuntu 22.04 LTS receives.

        Which do you covet more: rock-solid stability and a UI you can depend on not changing for five years, or the latest features, refreshed software, and a big upgrade every six months?

        If you’re happy to ride the interim wave, here’s the actual “how to” bit.

      • OMG UbuntuUbuntu 22.10 is Available to Download – OMG! Ubuntu!

        It’s live — Ubuntu 22.10 “Kinetic Kudu” is available to download.

        Ubuntu 22.10 comes with a number of improvements to the user experience, a new sound server, new text editor app, and Linux kernel 5.19. It also boasts better-than-ever support for the Raspberry Pi single board computer.

      • LWNUbuntu 22.10 released [LWN.net]

        Ubuntu 22.10 has been released. “Codenamed ‘Kinetic Kudu’, this interim release improves the experience of enterprise developers and IT administrators. It also includes the latest toolchains and applications with a particular focus on the IoT ecosystem.” See the release notes for details.

      • Make Use OfUbuntu 22.10 Lands With Desktop Tweaks, IoT Focus

        Canonical has announced the release of Ubuntu 22.10, codenamed “Kinetic Kudu.” The new release comes with some desktop and performance tweaks, as well as a focus on Internet of Things development.

      • GhacksLinux distribution Ubuntu 22.10 is now available – gHacks Tech News

        Canonical released a new version of its Linux distribution Ubuntu today. Ubuntu 22.10, codename Kinetic Kudu, is a short term support release that will be supported until July 2023. Ubuntu users who need long term support should use the Ubuntu 20.04 LTS, Long Term Support release, instead, as it is supported until April 2027.

        Downloads are not yet provided on the official Ubuntu website, but several mirrors host the new interim release already. Soon, downloads will also be offered on the official website and you may check out the main download page to find the Ubuntu 22.10 download.

      • LinuxiacUbuntu 22.10 ‘Kinetic Kudu’ Is Here, GNOME 43 Is the Main Accent

        GNOME 43 Desktop Environment, PipeWire as default, and Linux kernel 5.19 are the key new features in the just-released Ubuntu 22.10.

        The wait is finally over. Ubuntu 22.10, codenamed ‘Kinetic Kudu’, has finally arrived and is available to download.

        Following a tradition, Ubuntu 22.10, like all prior versions of the x.10 series, was released on the penultimate Thursday in October, as planned. For those interested, this is the 37th release of Ubuntu since 2004, when the initial version, Ubuntu 4.10, debuted.

      • Xubuntu 22.10 released! – Xubuntu

        The Xubuntu team is happy to announce the immediate release of Xubuntu 22.10.

        Xubuntu 22.10, codenamed Kinetic Kudu, is a regular release and will be supported for 9 months, until July 2023.

      • It’s FOSSXubuntu 22.10 Releases With Xfce Upgrades, and Other Refinements

        Xubuntu is an XFCE-powered official Ubuntu flavour.

        It is also one of the best lightweight Linux distributions available.

      • Kubuntu 22.10 Kinetic Kudu Released | Kubuntu

        The Kubuntu Team is happy to announce that Kubuntu 22.10 has been released, featuring the ‘beautiful’ KDE Plasma 5.25 simple by default, powerful when needed.

        Codenamed “Kinetic Kudu”, Kubuntu 22.10 continues our tradition of giving you Friendly Computing by integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution.

        Under the hood, there have been updates to many core packages, including a new 5.19-based kernel, KDE Frameworks 5.98, KDE Plasma 5.25 and KDE Gear 22.08.

      • It’s FOSSKubuntu 22.10 is Now Available!

        Kubuntu is an official Ubuntu flavor that offers a lot of functionality in a refined KDE-powered package.

        The release of Kubuntu 22.10 promises various improvements and a newer version of KDE Plasma.

        Let us go through the highlights of this release.

      • Ubuntu MATE 22.10 Release Notes | Ubuntu MATE

        Ubuntu MATE 22.10 is a modest update by recent standards and focused on “quality of life improvements”. And there is good reason why this release of Ubuntu MATE doesn’t feature the usual bucket list of changes you’d typically expect, and that’s because I’ve been helping bring the full Ubuntu MATE experience to Debian MATE

      • It’s FOSSUbuntu MATE 22.10 Release Has Some Interesting Upgrades!

        Ubuntu MATE is one of the official Ubuntu flavours that add interesting improvements with every upgrade.

        It is aimed at users who cherish the look and feel of a traditional desktop but also desire the functionality of a modern operating system.

        Ubuntu MATE 22.10 release adds a number of betterments and features, let us take a look at those.

      • Ubuntu Studio 22.10 Released – Ubuntu Studio

        The Ubuntu Studio team is pleased to announce the release of Ubuntu Studio 22.10, code-named “Kinetic Kudu”. This marks Ubuntu Studio’s 32nd release. This release is a regular release and as such, it is supported for 9 months (until July 2023).

        Since it’s just out, you may experience some issues, so you might want to wait a bit before upgrading. Please see the release notes for a complete list of changes and known issues.

      • It’s FOSSUbuntu Budgie 22.10 Release Improves Control Center and Removes Some GNOME Apps

        Ubuntu Budgie is an official flavor of Ubuntu, which is popular for its traditional desktop interface and minimal software bloat.

        The release of Ubuntu Budgie 22.10 brings in a few crucial tweaks and additions.

      • NeowinUbuntu 22.10 “Kinetic Kudu” made available for download – Neowin

        Canonical has announced the availability of Ubuntu 22.10 “Kinetic Kudu”. This is described by the company as an interim release that is aimed at improving the experience for enterprise developers and IT administrators. It comes with the newest toolchains and applications for the IoT ecosystem. Unlike LTS versions of Ubuntu, such as Ubuntu 22.04 LTS, this interim release will only receive support for nine months.

      • Ubuntu NewsUbuntu 22.10 (Kinetic Kudu) released
      • Ubuntu FridgeUbuntu Fridge | Ubuntu 22.10 (Kinetic Kudu) released

        Ubuntu 22.10, codenamed “Kinetic Kudu”, is here. This release continues Ubuntu’s proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution. The team has been hard at work through this cycle, partnering with the community and our partners, to introduce new features and fix bugs.

        Ubuntu Desktop 22.10 users will benefit from the refinements in GNOME 43, including GTK4 theming for improved performance and consistency. Quick Settings now provide faster access to commonly used options such as wifi, bluetooth, dark mode and power settings.

        The Pipewire audio platform broadens support for audio devices and provides a step up in bluetooth connectivity, delivering improved performance for video conferencing. Linux 5.19 improves the power performance of Intel devices and now includes multithreaded decompression on Ubuntu to improve multi-core desktop snap performance.

      • LubuntuLubuntu 22.10 Released! – Lubuntu

        Thanks to all the hard work from our contributors, Lubuntu 22.10 has been released. With the codename Kinetic Kudu, Lubuntu 22.10 is the 23rd release of Lubuntu, the ninth release of Lubuntu with LXQt as the default desktop environment.

      • Xubuntu 22.10 Released

        Xubuntu 22.10, “Kinetic Kudu,” has been released! The antelope-inspired release packs the latest and greatest GNOME 43, MATE 1.26, and Xfce 4.17 packages. Some long-running issues have finally been addressed, making for a better overall experience over recent releases. I hope this new release makes using your computer more enjoyable.

    • Open Hardware/Modding

      • ArduinoEnvironmental monitoring of corporate offices with Arduino Pro | Arduino Blog

        The quality of the air we breathe has a direct impact on our health. Poor air quality can cause a variety of health problems, including respiratory infections, headaches, and fatigue. It can also aggravate existing conditions such as asthma and allergies. That’s why it’s so important to monitor the air quality in your office and take steps to improve it if necessary.

        Furthermore, the number of people in an office can have a significant impact on air quality. The more people there are, the greater the chance of contaminants being emitted into the air. This is why environmental monitoring is so important in corporate offices; it helps to ensure that the air quality is safe for all workers.

        The last few years added to this challenge yet another layer: The COVID-19 pandemic has forced many businesses to re-evaluate their workplace safety protocols. One of the most important considerations is air quality. Poor air quality can lead to a variety of health problems, including respiratory infections.

      • ArduinoStranger Things Christmas lights are the perfect Halloween decoration | Arduino Blog

        In the first season of Stranger Things, a character uses a string of Christmas lights to communicate with a missing loved one. The missing person in question can flash particular lights next to letters painted on a bedsheet to spell out messages. The Christmas lights and bedsheets have become a part of pop culture and because the show is creepy, Redditor BishSaidWut’s recreation is the perfect Halloween decoration.

        Unlike most of the similar decorations that you can buy online that either blink randomly or spell out pre-programmed messages, BishSaidWut’s Christmas lights can spell out any message that they text to a specific phone number. That phone number connects to the Twilio service, which parses SMS messages and makes the text available through an API. An ESP8266 board connects to that API and processes incoming messages. If the message is within an acceptable length and doesn’t contain profanity, the ESP8266 passes on the text to an Arduino Uno development board.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Web Browsers/Web Servers

      • Mozilla

        • OMG UbuntuFirefox 106 Brings PDF Annotation – Gesture Nav to Linux – OMG! Ubuntu!

          I’ve been a bit busy with site design changes and Ubuntu 22.10 release content writing so I missed Firefox 106 being release released.

          And, y’know what? Firefox 106 is actually a pretty meaty update, even if I’m not a fan of all of its changes. The browser’s rapid release cadence means big new features are few and far between, or introduced slowly over several releases.

          Not so here — let’s take a look.

        • CISAMozilla Releases Security Updates for Firefox | CISA

          Mozilla has released security updates to address vulnerabilities in Firefox ESR and Firefox. An attacker could exploit these vulnerabilities to cause denial-of-service conditions.

        • Security and Correctness in Wasmtime

          The essence of software engineering is making trade-offs, and sometimes engineers even trade away security for other priorities. When it comes to running untrusted code from unknown sources, however, exceptionally strong security is simply the bar to clear for serious participation: consider the extraordinary efforts that Web browser and hypervisor maintainers take to preserve their systems’ integrity. WebAssembly runtimes also run untrusted code from untrusted sources, and therefore such efforts are also a hard requirement for WebAssembly runtimes.

          WebAssembly programs are sandboxed and isolated from one another and from the host, so they can’t read or write external regions of memory, transfer control to arbitrary code in the process, or freely access the network and filesystem. This makes it safe to run untrusted WebAssembly programs: they cannot escape the sandbox to steal private data from elsewhere on your laptop or run a botnet on your servers. But these security properties only hold true if the WebAssembly runtime’s implementation is correct. This article will highlight the ways we are ensuring correctness in the Wasmtime WebAssembly runtime and in its compiler, Cranelift.

          This is our second blog post leading up to Wasmtime’s upcoming 1.0 release on September 20th, 2022. The first blog post focused on Wasmtime’s performance. We’re ready to release Wasmtime 1.0 because we believe not only that it solidly clears the bar for security and correctness, but also that we have the momentum, processes, and multi-stakeholder investment in place to keep it that way in the future.

        • Firefox Nightly: A new release, a new button and much more – These Weeks in Firefox: Issue 126
        • Barry KaulerHTML-NOTEPAD WYSIWYG HTML editor

          To bring it back, something else very big has to go. Easy has both Firefox and SeaMonkey, which is too much of a luxury, one will have to go.

    • Content Management Systems (CMS)

      • Linux Links9 Best Free and Open Source TypeScript-Based Web Content Management Systems

        A web content management system (WCMS) is software designed to simplify the publication of Web content. In particular, it enables content creators to submit content without requiring technical knowledge of HTML or the uploading of files. A CMS is most commonly used in creating an intranet or in establishing a presence on the Web.

    • Programming/Development

    • Standards/Consortia

      • The Register UKDisplayPort backwards compatibility outshines USB • The Register

        The USB Implementers Forum, USB-IF, rolled out the spec of USB 4 version 2 just last month, as you’ve probably read in The Register. We noted at the time that the nitty-gritty stuff would debut in time for developer events scheduled for November.

        Well, it’s nearly November, and a more detailed announcement [PDF] is here. (We especially like the _FINAL_v2 on the end of the filename. We’ve all done it.)

        Apparently, if you have a passive USB-C cable capable of 40Gbps, with USB-4 v2 it will now be able to do 80Gbps. Good for you if you know the speed rating of your USB-C cables, because here at the Reg FOSS desk, we freely admit that we don’t. We don’t even know if ours are active or passive. We can only apologize for this wretched lack of professionalism, and once we learn how to tell, we’ll put a new cartridge in our label-maker and rectify this.

  • Leftovers

    • Security

      • LWNSecurity updates for Thursday [LWN.net]

        Security updates have been issued by Debian (firefox-esr), Red Hat (java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, OpenShift Container Platform 4.9.50 bug fix and, and rh-nodejs14-nodejs), SUSE (buildah, clone-master-clean-up, go1.18, go1.19, helm, jasper, libostree, nodejs16, php8, qemu, and xen), and Ubuntu (libxdmcp, linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gke-5.15, linux-gkeop, linux-hwe-5.15, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oem-5.14, linux-oracle, linux-raspi, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux-oem-5.17, and perl).

      • VideoScammers Target | US Student Loan Debt Relief Applicants – Invidious

        In this video, I cover an FBI warning issued about how scammers may be targeting individuals seeking to enroll in the Federal Student Aid program to steal their personal information, payment details, and money.

      • Bleeping ComputerOldGremlin hackers use Linux ransomware to attack Russian orgs [Ed: Ransomware is predominantly a Windows issues, so Microsoft boosters try to associate it with "Linux" without even explaining how the malware gets to systems in the first place]
      • USCERTCISA Adds Two Known Exploited Vulnerabilities to Catalog [Ed: Talking about Zimbra to distract from Microsoft Exchange being cracked at alarming rates?]

        CISA has added two vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.   

      • USCERTCISA Requests for Comment on Microsoft 365 Security Configuration Baselines [Ed: On grounds of security, Microsoft should just be banned; it's actively undermining real security]

        CISA has issued requests for comment (RFCs) on eight Microsoft 365 security configuration baselines as part of the Secure Cloud Business Application (SCuBA) project to secure federal civilian executive branch agencies’ (FCEB) cloud environments.

      • USCERTCISA Releases Three Industrial Control Systems Advisories | CISA

        CISA has released three (3) Industrial Control Systems (ICS) advisories on October 20, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

      • Help Net SecurityConstellation: Open-source, runtime-encrypted Kubernetes

        Confidential Computing is a hardware-based technology that shields computer workloads from their environments and keeps data encrypted during processing.

        In this Help Net Security video, Felix Schuster, CEO at Edgeless Systems, talks about the open-source release of Constellation.

      • IT WireiTWire – In the midst of a major digital mess, ASPI is pushing digital ID. Really?

        With Australia in a fairly messy situation as far as network security is concerned, it is somewhat curious to note that the Australia Strategic Policy Institute is trying to lobby for the complete adoption of digital identity.

        This is the equivalent of saying that one should digitise a confusing analog setup, in the hope that it would suddenly morph into something efficient.

        What always happens when a confused set-up is digitised is that the mess is magnified. Computerisation is very good at that – no fault of the discipline, but that’s just the way it is.

        It is even more puzzling that the lobbying for digital identity comes from Fergus Hanson, director of the International Cyber Policy Centre at ASPI, who is touted as a cyber security expert by that august media organ, the Australian Financial Review.

      • Help Net SecurityApache Commons Text flaw is not a repeat of Log4Shell (CVE-2022-42889) [Ed: Notice how Microsofters, even a year after the patch, keep bringing up and hyping up "Log4Shell" (or J); the Microsofters did the same with "heartbleed" for years]

        A freshly fixed vulnerability (CVE-2022-42889) in the Apache Commons Text library has been getting attention from security researchers these last few days, worrying it could lead to a repeat of the Log4Shell dumpster fire.

    • Monopolies

      • Copyrights

        • Public Domain ReviewEtteilla’s *Livre de Thot* Tarot (ca. 1789) – The Public Domain Review

          Great revolutions were stirring in Paris during January 1789: Abbé Sieyès published his incendiary pamphlet Qu’est-ce que le tiers-état? (What is the Third Estate?), and from the study of “M. Etteilla, Professeur d’Algebre” at 48 Rue de l’Oseille, a letter was sent applying for a patent to print a French edition of Livre de Thot, which promised to reveal the theory and practice of ancient Egyptian magic through Tarot. By July, when the French Revolution began with the storming of the Bastille fortress, scores of Parisians were already turning to Etteilla’s cards to divine the fate of France.

  • Gemini* and Gopher

    • Personal

      • Off-Topic – My Week of Sanity and Not Binging: A Different Way of Touching Grass

        The other day, Malobee wrote a very thought-provoking post about temporarily leaving behind social media[1] based on a different post on Medium by Devon Price[2].

        Reading through these and looking at the rules being laid out, I started thinking on the way I personally make use of social media. I’m not what I would describe as a power user. While I have various social media accounts, I rarely ever make posts on them or check my personal feeds. Part of the reason I laid this gemlog out for myself as “not a place to talk about my projects or journal my daily life” is I personally dislike the idea of using the internet for social validation. That isn’t to say I never post things I’ve made to the internet or toss thoughts on my day out to others, but when I do I prefer to do so within specific Discord servers filled with people I know and enjoy speaking with in the same way you might call up a friend or a family member IRL for a chat.

        The problem I’ve always seen with social media is that it expands the relevant social circle to an unknowable amount of strangers, the majority of whom you’ll never interact with in any meaningful way. Clout-chasing is the act of trying to gain praise and validation from vast numbers of people you don’t know and whose opinions should usually hold very little value to you. And even if you’re merely reading social media there’s an endless amount of content out there, which means endless ways to burn your time on something actively unimportant or even destructive, and an even more endless amount of negativity and public opinion you can be sucked into. If you don’t know who these hundreds of people are, why do you need to care what they think about a movie that just came out or something a celebrity said?

      • non-fatherhood

        I just couldn’t. In any way. Physically I *can* have a kid (or kids), but the lifestyle and responsibility would crush me. I was barely raised by MY parents, and was left to be on my own accord from a very young age, like many a 1980s/90s reckless youth, who usually end up “ending” before their life expectancy due to wild environments, weird “life” situations, etc

      • SpellBinding: AGLNTUY Wordo: THOUS
      • Having fun with a scammer…

        Some years ago I wasted a few weeks of a scammer’s time, enjoying it greatly. Here is how it went down.

      • fatherhood

        About two years ago, I lost my father.

        A few weeks ago, I came to know I am going to be one.

        My emotions underwent a rapid change when I first found out. From fear, to anxiety then exhilaration and finally happiness. It took me a while to take the decision. Lots of discussion and thinking between me and my wife, and finally we found the answer from god. We went to a temple and I told her to ask Mahadev what she should do. When she came back the confusion was absent from her face. It was a little bit early in our marriage, but I guess that’s how my life is. Everything is a tad bit early.


        My dad, whatever he did in his professional life, never let me feel the lack of things. He would always bring me things that I wanted, not needed. He sent me to a school far away just so I could get a good education when the family could barely afford it. My spending habits in the early days were not something I would call sustainable, and yet he helped me sustain them. I guess he was not a good father in techincal terms (not spoiling the kids, teaching discipline, et cetera) , but he was always good to me. Always smiling.

      • This is the Current Moment

        Christian lately has been talking about the subject of what he calls *memory drift* (as good a term as any) and it being one of the reasons for keeping a journal. It was certainly one of the reasons that I originally began writing and especially continued to write. Well, I also started to write to make myself appear to be more of an elitist scum than my peers. I’d peer at them from my plinth made of strung together phrases joined by tenuous punctuation. I’d guffaw at their lowliness. Peering down from the plinth of *journaling*, one observes that all others are earthbound morsels consumed by insects.

    • Politics

      • Number Shock

        Recently I saw a video clip from 2007, in which a statistic was cited claiming that one in five Americans are unable to locate the United States on a map. The statistic might be apocryphal, but for purposes of this log, I’m going to treat it as a result actually claimed by a real study.

        A number like that is absolutely shocking. How could so many Americans not know the location of their own home country when looking right at it on a map? People tend to believe it, however, because of a prevailing opinion–even among US citizens–that the average American is appallingly ignorant.

      • How Can We Decide?

        I received my ballot for the November 8 election in the mail yesterday, and it will soon be time to complete it and return it. Among the items included on the ballot is the selection of a new county sheriff.

        On what basis should I decide between the candidates? There are two local law enforcement-related issues that come to mind.

        The first issue is how does law enforcement interact with the population of homeless persons? This is primarily an issue for local city police departments since homeless persons tend to congregate in cities rather than the rural areas that the sheriff’s office is responsible for. However, the voters are also in the cities so candidates must base their appeals to voters on issues that city-dwelling voters care about. In the local discussions regarding homelessness drug use and addiction is a prominent topic. Both candidates claim they will be tough on crime, especially mentioning drug dealers.

    • Technical

      • Docker Compose to Kubernetes with Kompose

        I really love using docker compose for local development. Whenever I start writing a service with any kind of external dependencies (databases, containerized APIs etc), I quickly setup a `docker-compose.yaml’ for the project to allow me to try it out locally. I’ve heard murmurings that this is not what you should do anymore, instead you should use Kubernetes to do this. While I do like Kubernetes, I definitely prefer the simplicity of the docker-compose.yaml format. Writing a simple `docker-compose.yaml’ file takes a few minutes, writing the correct Kubernetes manifests to achieve the same thing takes considerably longer.

      • Binary Coded Decimal

        Like many others I’m trying to implement a GameBoy emulator. The development is sporadic to say the least and mostly occurs when I happen to have both some time and inspiration to spare. I’m still implementing the CPU instructions, and this week I came to the one called DAA (Decimal Adjust Accumulator according to the GameBoy Programming manual). I mostly wanted to summarize my findings to have something to refer back to later, but maybe this someone out there will find it useful as well.

        The purpose of the DAA instruction is to correct a value which resulted from addition or subtraction of numbers in Binary Coded Decimal (BCD) representation. Since I had no idea what BCD was, I had to do some digging. Below are some notes to help me remember this for later.

      • The No Hello Club

        I saw the above link posted in IRC today and after reading the entire page at the link, I really agree with the statement.

        Frequently in a techical environment whether at work or elsewhere, someone will try to be friendly by timidly introducing themselves and posting other introductions before getting to the point. For someone whose job it is to respond and help people, not asking the question right away feels like their time is itentionally being stolen. After a while, it gets harder and harder to remind yourself that they don’t mean to waste your time by stealing your attention away from what they are trying to focus on.

      • Internet/Gemini

        • Hello Again, World!

          It has been quite some time, and many miles moved, since I wrote here last. In April I was in the Dallas suburbs, messing around with converting gemtext to HTML in awk. The family is now all in the UK, having arrived in August and September. Car, job, bank account, and various other vital things are sorted out now. We’ve also made an offer on a house. Now there’s a little bit of time to play around with computers and music again.

      • Programming

        • Statically-Typed languages Are Just Not Good Engineering

          Over the past 40 years I’ve used (and disliked) many languages. To provide some context, I’ve written a bunch of compilers and code-generating thingamajigs, and have not seen anything better than Common Lisp as high-level languages go.

          And so I take an exception to including Common Lisp into the broad category of badly-engineered dynamic-typing languages, because I don’t think that any part of that description fits.

          Common Lisp has a pretty good type system, which you may choose to completely ignore. Modern CL compilers _infer_ type all by themselves, and if you care about types, you can provide declarations at a _per-scope level_, specifying with any degree of precision, the types you expect certain things to be, including combinations of types with a variety of logic operators.

        • Dynamic Typing is Fine

          The upshot is that most of the studies have limitations that limit their general applicability, but if you wanted to take home a message from them, in aggregate, it’s that if static typing provides stability/reliability/maintainability benefits to programs, the effect is very, very small. But also likewise, if dynamic typing provides a benefit to developer productivity, it is also very, very small.

          There are a couple of studies that both come to about the same estimate of what percentage of errors in dynamically-typed languages are from type errors — about two (2) percent. It ought to follow that this is about the reliability benefit that you should expect to see from using static typing.

        • A base32 decoder

          For reasons behind the scope of this entry, I had to decode some data encoded in base32. After an embarrassing moment where i used EVP_DecodeBlock from libcrypto because apparently I can’t read (it’s a base64, not 32, decoder), I discovered that libcrypto doesn’t provide a base32 decoder. Probably some other popular library provides it, but since I was hacking in a project that only uses libc and libcrypto as dependencies, I wrote one.

          Decoding base32-encoded data is not difficult, the encoding scheme is very, very simple, so why bother writing a post about it? Well, before writing my own decoder I searched on the web if there was something I could stole and, hum, I didn’t like what I found, too over engineered. I haven’t looked too much, so apologize if I’ve missed your sexy decoder.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Microsoft-Funded ‘Analysts’: Microsoft is Popular, Based on Microsoft Data (Projects That Choose Microsoft’s Proprietary Hosting)

Posted in Deception, Microsoft at 6:00 pm by Dr. Roy Schestowitz

“Analysts sell out – that’s their business model… But they are very concerned that they never look like they are selling out, so that makes them very prickly to work with.”

Microsoft, internal document [PDF]

Published minutes ago: (link intentionally omitted)

Redmonk's BS

Summary: Stephen O’Grady and Rachel Stephens, failing to disclose that Microsoft pays them (conflict of interest at Redmonk, as usual), assess programming languages’ popularity using… Microsoft’s own data, as usual (they’ve done this for years). If one assesses the trends and usage levels only of projects which choose Microsoft as their master (and proprietary development tools), what does one actually measure*?

* We have repeatedly cautioned (since 2018) and also demonstrated that GitHub would be used for propaganda through false statistics (licences, programming languages, censorship of particular viewpoints and projects, supposed ‘popularity’, and so on).

Updated: Redmonk now admits it is biased, but Microsoft-friendly sites like “FOSSlife” link to it regardless… as if it’s an authoritative list.

Redmonk lies

GitHub and Redmonk

Best ‘analysts’ Microsoft could buy?

[Meme] EFF Stopped Worrying About Corruption and Monopolies

Posted in EFF at 5:07 pm by Dr. Roy Schestowitz

EPO corruption? Don't care... EFF USA: We ignore international problems

Summary: Political activity by the EFF and neglect of technical issues can show that the EFF is soft on the private sector (it funds the EFF)

When It Comes to Patent Policy, EFF Has Become Utterly Useless This Year (and It Refuses to Mention EPO Scandals)

Posted in EFF, Europe, Patents at 4:53 pm by Dr. Roy Schestowitz

Video download link | md5sum 4803208301bfe9450cfb04470c57c286
What Does the EFF Even Do These Days?
Creative Commons Attribution-No Derivative Works 4.0

Summary: The EFF never talked about EPO corruption under Benoît Battistelli and António Campinos; it never even named them and it doesn’t talk about their campaign to spread software patents worldwide

OVER the years we wrote many articles about the EFF. In recent years our articles were mostly critical because there seems to be a coup, staged by people who don’t truly care for the EFF’s values and original mission. Suddenly the EFF is acting hostile towards the FSF/Richard Stallman and Wikileaks/Julian Assange, despite an historically amicable relationship. So what is going on? And why does the EFF act so soft on Microsoft? What does the EFF work for? Who does it raise money from? (The big sponsors, not individual members)

“As far as patent reform is concerned, the EFF has been severely weakened.”This seems like a pattern that we saw before in the OSI, the Linux Foundation, and several other organisations. They register for special status with the IRS and then pay astronomically wages to people who serve monopolies instead of the organisations they claim to serve. The watchdogs fall asleep.

The video above shows that the EFF says almost nothing about EPO and about European software patents. It has not mentioned software patents in Europe or the EPO since about a decade ago. It covered the subject mostly 17.5 years ago in relation to the EU. To make matters worse, today’s EFF hardly says anything about patents at all. It has said nothing about patents since last month and we could find only one post (blog post) about it in the past 50 days; no press release on patents since last year (December)!

The EFF used to write about patents almost every day and staff that used to deal with the issue no longer seems to be employed by the EFF, except perhaps one person. As far as patent reform is concerned, the EFF has been severely weakened. Common wisdom says, “follow the money…”

Techrights Has Over 43,000 Pages in Gemini

Posted in Site News at 11:25 am by Dr. Roy Schestowitz

43,000 pages in Gemini

Summary: We recently crossed another milestone with 43,000 Gemini pages in total; the Web site turns 16 in a couple of weeks and with 34,805 blog posts at the moment it seems possible this anniversary can be special as that’ll coincide with the 35,000 milestone (35K in 16 years is 2,187.5 per year, on average, or 5.9931 posts per day)

“There are 2782 capsules. We successfully connected recently to 2169 of them,” Lupa said this morning, but those number fluctuate a lot and we expect 2,200 active capsules very soon, maybe by month’s end or start of next month. Here’s a chart of the rather consistent growth trend:

Gemini capsules as of 2022-10-20

Gemini capsules as of today

Our anniversary is fast approaching (bulletins turn two, then IPFS turns 2, then Gemini turns 2) and some time after the blog’s sixteenth anniversary we plan to shift to another (our own) Content Management System (CMS). No date or details are set in stone yet.

Links 20/10/2022: Canonical’s Ubuntu 22.10 and LibreELEC (Matrix) 10.0.3

Posted in News Roundup at 10:01 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • InfoQBellSoft Introduces Alpaquita Linux for Containerized Java Applications

        BellSoft has released Alpaquita Linux, an operating system based upon Alpine Linux, optimized for containerized Java applications. A plain Docker image is available, as well as Docker images with Liberica JDK or JRE or a Native Image Kit based upon GraalVM.

      • UbuntuLandscape beta: test the Landscape Server migration to Ubuntu 22.04 LTS | Ubuntu

        Landscape is the leading management and administration tool for Ubuntu, and the most cost-effective way to support and maintain large and growing networks of desktops, servers, and clouds. The stable version of Landscape can only be installed on Ubuntu 18.04 (Bionic Beaver), which is due to reach the end of standard support in April 2023. Despite reaching the end of standard support, Bionic will continue to receive security patches throughout its extended security maintenance window, if an Ubuntu Pro subscription is enabled. Landscape beta is a modernised iteration of the current stable Landscape version. Landscape beta can be installed on Ubuntu 20.04 (Focal Fossa) and Ubuntu 22.04 (Jammy Jellyfish), which reach the end of standard support in April 2025 and April 2027 respectively. This means any Landscape user can now test their upgrade path to a newer version of Ubuntu.

      • Container Journal5 Laws of Cloud-Native Authorization – Container Journal

        In a microservices world, each service needs to verify that a subject (user or machine) has permission to perform an operation on a resource that the service manages. But in an agile environment where each team owns the implementation of their application or service, authorization models are quick to diverge. Since roles and permissions need to be enforced consistently across the organization’s services and applications, this divergence makes it hard to evolve the authorization model in a holistic way. Agility and security suffer.

      • Kubernetes BlogServer Side Apply Is Great And You Should Be Using It | Kubernetes

        Server-side apply (SSA) has now been GA for a few releases, and I have found myself in a number of conversations, recommending that people / teams in various situations use it. So I’d like to write down some of those reasons.

    • Audiocasts/Shows

      • VideoThe Future of GNOME? | Fedora 37 v Ubuntu 22.10 – Invidious

        Learn more than ever from important non-fiction books at https://shortform.com/galactic and receive 5-days of unlimited access and an additional 20% discount on the annual subscription! Today, I’m giving my impressions of the future directions of Fedora and Ubuntu based on their latest interim releases in late Oct 2022

      • VideoCommand Not Found? I Refuse To Accept That! – Invidious

        If you are Vim user and you spend a lot of time at the command line, then surely you’ve encountered this frustrating problem…

      • The BSD Now PodcastBSD Now 477: Uninitialized Memory Disclosures

        Analyzing BSD Kernels for Uninitialized Memory Disclosures Using Binary Ninja, Sharing Dual-Licensed Drivers between Linux and FreeBSD, favorite Things About The OpenBSD Packet Filter Tools, How to trigger services restart after OpenBSD update, Gems from the Man Page Trenches, and more.

      • The TLLTS PodcastThe Linux Link Tech Show Episode 976

        Joe extrudes the filament.

    • Kernel Space

      • LWNFingerprinting systems with TCP source-port selection [LWN.net]

        Back in May 2022, a mysterious set of patches titled insufficient TCP source port randomness crossed the mailing lists and was subsequently merged (at -rc6) into the 5.18 kernel. Little information was available at the time about why significant changes to the networking stack needed to be made so late in the development cycle. That situation has finally changed with the publication of this paper by Moshe Kol, Amit Klein, and Yossi Gilad. It seems that the way the kernel chose port numbers for outgoing network connections made it possible to uniquely fingerprint users.


        Kol and company were able to come up with an interesting attack on this algorithm. A hostile web page (otherwise known as almost any page on today’s Internet) could load a JavaScript fragment that, through a series of iterations, creates a mapping between destination port numbers and the counter-table entries used to assign source-port numbers. It is, in other words. looking for hash-table collisions on the counter table. This table, remember, has only 256 entries, so hash collisions will not be rare or hard to find.

        Specifically, the attack initiates a series of outgoing connections, all to the same remote address, but each to a different destination port. It then looks at the assigned source-port number for each connection attempt (note that the connection need not actually be established). Since any given counter-table entry is incremented after being used to generate a source-port number, two connection attempts that hit that counter-table entry will result in source-port numbers that differ by one — if the source and destination addresses are the same. So the attack looks for connection attempts that resulted in sequential source-port numbers and concludes that the destination-port numbers used in those attempts map to the same counter-table entry.

        The optimal number of outgoing connections for one iteration of this attack is said to be one less than the size of the counter table, or 255. A single iteration of this algorithm will produce at most a small number of collisions, which do not tell an attacker much, but it can be run over and over again to come up with more of them. So the above process is repeated until collisions have been found for each entry in the counter table. Once that is done, a second phase uses a similar technique, but mixing connections to a loopback address with connections to the remote-server destination ports found in the first phase. The purpose here is to find which destination ports, when used with a loopback destination, map to the same table cell as one of those remote-server port pairs. This second phase generates pairs of destination port numbers that, when used with the loopback address, generate collisions in the counter table; these port-number pairs are independent of any remote address.

        Each pair of colliding loopback port numbers, in effect, tells the attacker a little more about the secret key that the kernel generated at boot time. The key itself is never disclosed, but there is no need for that; a sufficient number of colliding port-number pairs is sufficient to uniquely identify the system involved. The key point is that these port-number pairs are a function of the secret key — which is different for every system — and can thus be used to create a unique device identifier.

      • LWNThe first half of the 6.1 merge window [LWN.net]

        The 6.1 merge window is well underway: since it opened, 5,752 non-merge changesets have been pulled into the mainline repository. That is approximately half of the work that had piled up in linux-next and marks a good time to look at what has been merged so far. Some long-awaited core changes have landed for the next kernel release, but there are likely to be more significant changes to come.

      • LWNA plan for the kernel Bugzilla [LWN.net]

        The kernel’s Bugzilla instance is largely unloved and ignored, at least as a bug-reporting tool for the bulk of the upstream kernel. At the recent Maintainers Summit, Bugzilla was discussed during the regression-handling session led by Thorsten Leemhuis. In a followup to that discussion, Leemhuis posted some ideas for improving the state of bugzilla.kernel.org to the ksummit-discuss mailing list recently; the resulting discussion helped clarify a number of problem areas for it—and for the Bugzilla tool itself.

        In his post, Leemhuis noted that those present at the summit expressed a fair amount of dissatisfaction with the kernel Bugzilla, so his goal was to propose a few different fixes to make things better. The main complaints during that session were effectively that bug reports via email work better for most kernel developers; there was also concern expressed that the Bugzilla project is unmaintained at this point. Part of his Kernel Summit session (YouTube video) on regression tracking was another place where many of the same problems with Bugzilla were raised. But there are kernel developers (and kernel subsystems) that use and rely on Bugzilla, so the ultimate “solution”—dropping the bug-reporting tool—is not really a viable option even though it is a popular sentiment.

        Leemhuis’s suggested path is to make it clear that most of the kernel does not use or pay attention to what gets submitted to Bugzilla. There are only 20 of around 2500 entries in the kernel MAINTAINERS file that specify Bugzilla as the place to post bugs; the rest either point to email addresses for mailing lists and maintainers, or to external bug trackers. Part of the problem from the user side is that there are “lots of bug and regression reports (even good ones!)” that never get a reply from a developer, as his analysis back in April showed. His goal is to redirect most of these reports to the proper places, or at least to make it clear to reporters that their bug may well be ignored.

    • Applications

      • Linux Hint13 Best Google Drive Clients for Linux in 2022

        Cloud computing is becoming more important as we enter the era of a data-driven world. In the data-driven world, it is important to keep data secure and accessible from everywhere. Well, Google Drive offers that solution in the most efficient way possible. You can securely store all your important data on Google Drive and access it from anywhere by logging into your Google account.

        Like other apps in Google Suite, Drive has become an essential cloud storage app in our life. It offers free storage of up to 15 GB which is more than enough and can be used across GMAIL, Google Photos, and other Google services.

        So, today I am going to share with you Google Drive clients you can use to access your Google Drive account on Linux and other distributions.

      • OpenSource.com4 open source editors I use for my writing

        I’ve done a lot of writing throughout my career, mostly as an IT consultant creating product documentation as client deliverables. These documents generally provide instructions on installing various operating systems and software products.

        Since 2018, I’ve contributed to opensource.com with articles about open source software. Of course, I use open source editors to write my pieces. Here are the four open source editors that I have used.

      • Linux HintTmux vs Screen

        A Terminal multiplexer is a program that multiplexes the login sessions inside the Terminal. A multiplexer makes life easy for a user by allowing him to have multiple sessions inside a single Terminal window. Users can attach and detach these sessions.

        Today, we will discuss the two popular multiplexer tools: Tmux and Screen. The tutorial is supported by examples that include snapshots of commands and their output so that the users can easily grasp the concept of multiplexers.

        Without any further ado, let’s get started!

      • FOSSLifeArdour 7.0 Released

        Ardour 7.0 is now available, bringing many changes and additions to the popular open source digital audio workstation (DAW), reports Sourav Rudra.

        Version 7 is a major release, and it marks the end of 32-bit builds, Rudra says.

    • Instructionals/Technical

      • Red Hat OfficialHow to schedule Osquery to monitor your system regularly | Enable Sysadmin

        Scheduled queries allow you to collect and process data about your systems on a regular cadence so that you can respond to changes promptly.

      • ID RootHow To Install ExifTool on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install ExifTool on Linux Mint 21. For those of you who didn’t know, ExifTool is a free and open-source software program for reading, writing, and manipulating image, audio, video, and PDF metadata. It supports a wide range of file formats, making it a versatile tool for anyone who needs to view, edit, or manipulate metadata. ExifTool is frequently updated with new features and bug fixes, and the developers provide excellent support via the official website.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of ExifTool on Linux Mint 21 (Vanessa).

      • It’s UbuntuHow To Upgrade To Ubuntu 22.10 ‘Kinetic Kudu’ | Itsubuntu.com
      • BeebomHow to Install Tor Browser on Your Chromebook [2 Ways] | Beebom

        While the Chrome browser works stupendously well on Chromebooks, some users might want to install the Tor browser for added privacy protection. As you know, Tor is one of the best browsers for privacy that offers a private Tor network to route traffic securely and has many built-in security features. So if you are a privacy-conscious user and want to install the Tor browser on your Chromebook, this guide is just what you need. You can either install the Linux version or go for the Android version of the Tor browser based on your requirement. So on that note, let’s move to the tutorial.

      • Pi My Life UpSetting up a Cloudflare Tunnel on the Raspberry Pi – Pi My Life Up

        Cloudflare is a company that has become well-known for its DDOS protection services. However, it is also one of the leaders in providing secure and private connections.

        One of the products that Cloudflare offers for free is its tunneling service. This tunnel allows you to create a secure connection between your device and the Cloudflare network.

        Using Cloudflare’s tunnel on your Raspberry Pi, you don’t have to worry about opening any ports in your firewall. If you want to give access to a service that uses HTTP or HTTPS, you won’t even need Cloudflared installed on another device.

      • Pi My Life UpWhat is the whoami Command on Linux – Pi My Life Up

        The whoami command is short for “Who am I” and will print the effective username of the user that invoked the command. It is a fundamental command and will come in handy if you need to know the current user’s identity. For example, you might want to check the user before running a script.

        The Linux version of the whoami command differs from the Windows version. The Windows version has more options you can use with the command, while the Linux only features two options. However, the basic functionality of the command is the same on both operating systems.

        If you want a command that provides you with more information about the system’s current users, you should look at using the w or who command. Even without any options, the who command will provide you with a decent amount of information.

      • Pi My Life UpHow to Install ZoneMinder on the Raspberry Pi – Pi My Life Up

        ZoneMinder is free, open-source software that allows you to monitor your CCTV feeds from one location. Best of all, thanks to being open-source software, it has support for most analog or IP cameras.

        The Raspberry Pi makes an excellent pick for running ZoneMinder, especially when you don’t have many cameras since it is relatively low-powered and can be left running 24/7.

        To make the most of ZoneMinder, you will need to know your cameras’ IPs and how to connect to them. Thanks to ZoneMinders popularity, you can often search for your camera brand name followed by “ZoneMinder” and find connection guides.

        Over the following sections, we will cover how to install all of the software required to get ZoneMinder running on a Raspberry Pi.

      • Pi My Life UpHow to Install the Plex Media Server on Ubuntu – Pi My Life Up

        The Plex Media Server is one of the best ways to categorize and stream your media from Ubuntu to any Plex client.

        This server organizes all of your media, whether that be a photo, audio, movie, or TV show, and allows you to stream it to a Plex client. If you pay for the Plex Pass, the server can even scan your media and allow you to skip intros.

        For devices that don’t support the format you have your media in, the Plex Media Server can even transcode it on the fly to a supported format.

        In the following sections, you will learn how to install the Plex Media Server to your Ubuntu system using the official repositories.

      • Pi My Life UpHow to Run a Python Script – Pi My Life Up

        For this tutorial to work correctly, you will need to install Python to your chosen operating system. We have tutorials on installing Python to Windows, macOS, and Linux. These are all straightforward and will not take long to complete.

        The steps below will take you through all you need to know to run a Python script. If you encounter any issues, your system may not have Python configured correctly.

      • Pi My Life UpRunning Pi-Hole as a Docker Container – Pi My Life Up

        Pi-Hole is a software that act as your DNS provider to actively block internet ads and trackers. It does this by filtering the DNS requests and sending any blocked domains into a blackhole, so the request is never completed.

        Another cool thing about Pi-Hole is that it can also work well to monitor your network traffic, as you can set it to log any DNS requests that the server receives.

      • Pi My Life UpHow to exit Python in the Terminal – Pi My Life Up

        There are a couple of different methods that you can use to exit the Python interpreter while in the terminal, which I will go into detail below. The instruction for Linux or macOS is slightly different from Windows, so choose carefully.

      • Pi My Life UpHow to Install and Configure NordVPN on Ubuntu – Pi My Life Up

        NordVPN is one of the most popular VPN services around, known for its fast and diverse network while managing to maintain privacy.

        VPN stands for Virtual Private Network and allows you to create a secure tunnel between two locations. This tunnel is heavily encrypted, meaning no one can see what’s occurring inside it. In addition, services will see you connecting from the VPN provider’s IP address and not your own.

        For Linux systems such as Ubuntu, the NordVPN team maintains its own client. This client has some benefits over using the Wireguard or OpenVPN apps but requires you to use the desktop version of Ubuntu.

      • HowTo ForgeHow to Install Webmin with free Let’s Encrypt SSL Certificate on Ubuntu 22.04

        Webmin is a web-based application for managing Linux-based operating systems.

      • HowTo ForgeHow to Install Yarn Package Manager on Ubuntu 22.04

        Yarn is a package manager for JavaScript environments.

      • Linux HintBasic Linux Network Commands

        This tutorial explains the most relevant basic Linux network commands which covers both the practical implementation and straight to the point theoretical knowledge.

        After reading this document and reproducing all its examples, you will learn how to manage the most important networking aspects from the Linux terminal.

        This content is thoroughly optimized for the users without experience or knowledge on networking, avoiding uncritical theoretical information and focusing on practice, but including all the basic theory that a user without previous knowledge on networking must learn.

        This is also the first part of a comprehensive Linux networking course. The second part can be found in the Advanced Linux Network Commands Tutorial which is more practical and less theoretical. By reading both of them, you will acquire the practical knowledge of a Linux network administrator.

        All the examples used in this article contain screenshots, making it easy for all Linux users to learn how they are applied and how to understand the outputs and results.

      • The wasted potential of CSS attribute selectors

        Aleksandr and Keith both advocate for attribute selectors instead of class names, but while Aleksandr describes the more conservative approach of preferring attribute selectors where one already exists on the HTML element, Keith goes a step further and proposes adding your own data-* attribute instead of another class when you need something to hook into.

        Let’s look at both more closely.

      • Manuel MatuzovicDay 18: inheritable styles and web components

        It’s time to get me up to speed with modern CSS. There’s so much new in CSS that I know too little about. To change that I’ve started #100DaysOfMoreOrLessModernCSS. Why more or less modern CSS? Because some topics will be about cutting-edge features, while other stuff has been around for quite a while already, but I just have little to no experience with it.

      • Manuel MatuzovicDay 17: the :picture-in-picture pseudo-class

        It’s time to get me up to speed with modern CSS. There’s so much new in CSS that I know too little about. To change that I’ve started #100DaysOfMoreOrLessModernCSS. Why more or less modern CSS? Because some topics will be about cutting-edge features, while other stuff has been around for quite a while already, but I just have little to no experience with it.

      • DEV CommunityYes, Lisp is useful for DevOps and automation

        In this article, I will show you modern examples of Lisp which can help you with DevOps tasks and automation in general. No, I’m not joking. No, I’m not drunk.

        In no uncertain terms, the power of Lisp is ideally suited for automation. This is not just because of how expressive it is. It’s also because of how straightforward Lisp is for solving real-world problems.

        Now, let’s dive in.

      • DebugPointHow to Check: Xorg or Wayland Display Server?

        Here’s how you can quickly check whether you are running Xorg or Wayland Display Server.

        With every passing day, the modern Wayland display server is making its way to all Linux distributions. Although the legacy Xorg is still relevant and will stay, Wayland is undoubtedly better in security and other performance aspects.

        However, Xorg will not completely phase out anytime soon. Probably never.

      • Linux HintHow to Create a Reverse Proxy in Nginx

        A reverse proxy server directs the client requests to the appropriate backend server. Today, we will learn how to create a Reverse Proxy in Nginx. To demonstrate that, we use the Ubuntu 22.04. Using the Ubuntu’s command line, we will implement a set of commands to first install the Nginx and then create a reverse proxy.
        Without any further ado, let’s get started!

      • Linux Shell TipsHow to Install Latest MySQL 8 on AlmaLinux

        This article guide takes us through the installation, configuration, and testing of MySQL database server software on an AlmaLinux 9 and AlmaLinux 8 distribution.

        MySQL, the most popular open-source database management software solution, is developed, distributed, and supported by Oracle Corporation. However, if linked with Linux, Apache/Nginx, and PHP/Python/Pearl, it creates a complete LAMP or LEMP stack solution, which makes data query and management possible through its implementation of SQL (Structured Query Language) and relational models.

      • TecMintHow to Install PostgreSQL 15 on Rocky Linux and AlmaLinux

        PostgreSQL is an immensely popular open-source relational database management system (RDBMS) that has been around for over 30 years. It provides SQL language support which is used for managing databases and performing CRUD operations (Create Read Update Delete).

      • LinuxConfigHow to list and manage files attributes on Linux

        When using Linux we have many ways to manage access to resources: the most basic one is by setting the appropriate UGO/RWX permissions on files and directories. In some occasions we may also want to make use of the setuid, the setgid and the sticky bit. Furthermore, we can use ACLs (Access Control List) in order to achieve an higher level of granularity or implement Mandatory Access Control security such those based SELinux or AppArmor.

        In addition to the strategies mentioned above, on most filesystems we can manipulate a set of “attributes” in order, for example, to make a file immutable.

        In this article we talk about file attributes on Linux, and we learn how to check the attributes assigned to a file and how to manage them.

      • Linux HintHow to Change a User’s Password in Linux

        We use the passwd command in Linux to change a user password with ease. This command replaces an old authentication token/password for a user with a new one and it is stored in Linux system’s /etc/shadow file.
        Today, we will explore the two methods to change the password in a Linux system. One method follows the change of password via Graphical User Interface (GUI) and the other method involves using the Linux commands that are executed on Linux command line OR Terminal to change the password.

      • ID RootHow To Install Stellarium on Manjaro 21 – idroot

        In this tutorial, we will show you how to install Stellarium on Manjaro 21. For those of you who didn’t know, Stellarium is a free open-source planetarium for your computer. It displays stars, constellations, planets, and nebulae, and has many other features including multiple panoramic landscapes, fog, light pollution simulation, and a built-in scripting engine. Stellarium is available for Linux, Windows, and macOS.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Stellarium desktop planetarium on a Manjaro 21 (Ornara).

      • UNIX CopHow to install Viber Desktop on Ubuntu 22.04 | Linux Mint 21

        In this post, you will learn how to install Viber Desktop on Ubuntu 22.04 | Linux Mint 21

        Viber is an instant messaging client similar to WhatsApp or Telegram. One of the main differences is that Viber from the beginning supported native calling and video.

        Fortunately, Viber has a desktop client that allows you to have it linked to your mobile phone.

      • UNIX CopHow to Install SeaMonkey Internet Suite on Ubuntu 20.04 22.04 LTS

        SeaMonkey is a free and open-source Internet suite. It is the continuation of the former Mozilla Application Suite, based on the same source code, which itself grew out of Netscape Communicator and formed the base of Netscape 6 and Netscape 7.

        Compared to Firefox, the SeaMonkey web browser keeps the more traditional-looking interface of Netscape and the Mozilla Application Suite, most notably the XUL architecture. This allows the user to extend SeaMonkey by modifying add-ons for Thunderbird or the add-ons that were formerly compatible with Firefox before the latter switched to WebExtensions.

      • UNIX CopHow to Install Bpytop on Ubuntu 20.04 | 22.04 LTS

        Bpytop is a resource monitor that shows usage and stats for processor, memory, disks, network and processes.

      • Linux BuzzHow to configure proxy for apt command on Ubuntu and Debian

        In this post, we will learn how to configure proxy for apt command on Ubuntu and Debian system.

        In most of the production environments, Ubuntu and Debian servers do not have direct internet connectivity. To install updates, one must configure proxy for apt command so that all the apt command requests go via proxy server.

        APT proxy settings can also be enabled during the OS installation however if proxy settings are skipped during OS installation, then use the following steps to configure.

      • Linux CapableHow to Install NotepadQQ on Linux Mint 21 LTS

        Notepadqq is a free and open-source text editor program for Linux. It is an alternative to Notepad++, which many programmers and even general desktop power users often use as their notepad of choice due to its ease and minimalism. In contrast, others prefer its more unique features, such as multiline editing. While some may find the absence of certain features limiting, others appreciate the program’s simplicity. The clean interface makes it easy to find what you’re looking for, whether a specific line of code or a particular symbol.

        In the following tutorial, you will learn how to install NotepadQQ on Linux Mint 21 LTS using two different methods, with APT and Flatpak as an alternative installation methods of installing NotePadQQ using the snap package manager and wine.

      • Linux CapableHow to Install DeaDBeeF Player on Manjaro 21 Linux

        DeaDBeeF (as in 0xDEADBEEF) is an audio player for Linux, Android, and other Unix-like operating systems. It is free and open-source software released under the terms of the GNU General Public License. DeaDBeeF is primarily targeted at audio enthusiasts and power users. It supports a wide range of audio formats, including popular ones such as MP3, AAC, WMA, OGG, Vorbis, FLAC, and others. DeaDBeeF also supports playback of high-quality music files with bit depths of up to 32 bits and sample rates of up to 384 kHz

        The following tutorial will teach you how to install DeaDBeeF on Manjaro 21 Linux. The tutorial will use the command line terminal with the yay AUR helper. Ideally, most users may be using some wrapper for Pacman; for new users, it is essential to install one to keep your packages up-to-date while you learn Arch/Manjaro.

      • Linux NightlyHow to Update Manjaro to Latest Version – Linux Nightly

        This tutorial shows how to update and upgrade Manjaro Linux to the latest version using command line and GUI methods.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • UserBase Rebooted | clauschr

          UserBase is a wiki about all things KDE with a goal of presenting our users with helpful and up-to-date information. Sadly, we are some way from achieving this: While KDE developers are moving swiftly forwards producing amazing software our efforts to document this have been stalling.

          At the recent Akademy, a week long gathering of KDE community members, we decided to do something about it. It is a big task, however, and we need your help! The team is small, but we hope it will grow and become a vibrant and friendly community.

  • Distributions and Operating Systems

    • New Releases

      • LibreELEC (Matrix) 10.0.3 – LibreELEC

        LibreELEC 10.0.3 has been released, bringing Kodi (Matrix) v19.4 with additional fixes from the Kodi Matrix branch (till Oct 2, 2022).

        Users of LibreELEC 10 Beta or RC1 get an automatic update to the final version. LibreELEC 9.2 setups will not be automatically updated, you will need to manually update.

        We can offer stable and good working versions for Allwinner, Generic and Rockchip devices. The RPi4 is also in good shape but the codebase is rather new, so it is not polished yet (keep reading for details).

    • Screenshots/Screencasts

      • VideoGhostBSD 22.10.12 – No Trick, All Treat – Invidious

        If you think Casper is the only friendly Ghost, think again – GhostBSD (22.10.12) is spooktacularly easy to use and a very polished. There is one scary part – there is a bit of ramble, so beware poor viewers…

    • SUSE/OpenSUSE

      • OpenSUSEAudacity, Gear, GPG update in Tumbleweed – openSUSE News

        Snapshots of openSUSE Tumbleweed rolled out consistently this week.

        The rolling release put out a snapshot everyday since Oct. 12 and this week brought a few major version updates as well as an update of KDE’s Gear.

        The latest snapshot 20221019 came out a few hours ago and updated the Common Internet File System and user-space tool cifs-utils 7.0. The update fixed some warnings that included a compiler warning as well as the package fixing some memory allocation. The Netscape Portable Runtime package mozilla-nspr updated to version 4.35, and it had fixes for building with clang compiler. The package also uses a number of online processors on certain platforms. Mozilla’s mozilla-nss updated to version 3.83. The Network Security Services package removed older unix support, added two DigitalSign root certificates and changed configuration settings behavior to skip configs with unsupported mandatory extensions instead of these failing; this was focused on Encrypted Client Hello extensions. A few other packages updated in the snapshot.

        GNOME’s encryption interface Seahorse updated to major version 43 in snapshot 20221018. This package joined the several other GNOME 43 Guadalajara packages that are already in the rolling release. The package fixed warnings related to authorized keys, and it disabled key sharing over DNS Service Discovery by default. An update of gpg2 2.3.8 fixed a problem with Yubikey 5.4 firmware and fixed a regression in READKEY –format=ssh. An update of libsoup 3.2.1 fixed a minor memory leak and libxml2 2.10.3 fixed an integer overflow, which addressed CVE-2022-40303; this had no effect on OpenStack Cloud’s 8 and 9. And cfg80211, which is configuration Application Programming Interfaces for 802.11 devices in Linux, had some changes with the 6.0.2 kernel-source update. It fixed a Block Starting Symbol refcounting bug and avoids a non-transmitted BSS list corruption. A change was made with the nodejs18 18.11.0 update; it added an experimental watch mode. Running in watch mode using node, watch restarts the process when an imported file is changed. Several other packages updated including libzypp 17.31.4, libgcrypt 4.4.28, yast2-network 4.5.9 and more.

      • YaST Development Report – Chapter 10 of 2022 | YaST

        Almost one month after our latest update, here it comes a bunch of news from the YaST Team trenches.

    • Fedora / Red Hat / IBM

      • EWeekRed Hat Transfers Storage Portfolio and Teams to IBM

        Red Hat’s Ceph Storage is a highly scalable open-source software-defined storage solution designed to address enterprises’ block, file and object storage needs. It is deeply integrated with Red Hat’s OpenStack Platform and is at the center of the OpenShift Data Foundation (ODF).

        Many enterprises are running Red Hat Rook as the Ceph operator in Kubernetes clusters. However, Ceph can run securely anywhere that OpenShift runs—on-premises and in the cloud—and is designed to help enterprises simplify operations and speed application developers’ time to market.

        According to IBM, it will integrate the storage technologies from Red Hat ODF as the foundation for IBM Spectrum Fusion, thus combining the companies’ container technologies. In addition, IBM intends to offer new Ceph solutions to deliver a unified, software-defined storage platform that bridges the architectural divide between data centers and cloud providers.

      • Red Hat OfficialRed Hat Enterprise Linux for Workstations is now available on Amazon Web Services

        Red Hat Enterprise Linux (RHEL) for Workstations is a reliable, flexible, high-performance operating system, optimized for intensive workloads such as animation, computer-aided design and engineering, scientific research, medical imaging and more.

      • Business WireRed Hat Launches Red Hat Enterprise Linux for Workstations on AWS
      • DebugPointFinally! Flatpak Apps Gets Verification Badge in Flathub

        Flathub system merged a feature that gives you a verified badge for Flatpak apps.

        From the look of the code, it seems you get a verification symbol if -

        1. You own the application and its respective GitLab/GitHub repo
        2. You control the domain of the app ID (e.g. org.mozilla.firefox)

        Here’s how it may look.

      • Enterprisers ProjectThe AI revolution: 4 tips to stay competitive

        As accessibility to artificial intelligence (AI) has increased, so has its adoption. Over the last two years, more than half of organizations have accelerated their AI rollout, revolutionizing the future of work.

        The simplification and commoditization of AI tools have catalyzed harnessing AI’s true potential. Banking institutions have embraced AI to detect and prevent fraud, schools leverage the systems to help students learn faster and alert teachers to problems, and supply chain managers integrate end-to-end solutions to address procurement and distribution challenges.

        With some organizations at the start of their implementation journey and others struggling to understand the impact, it’s critical to understand the full breadth and potential the technology holds, especially as it serves as a competitive edge.

      • Enterprisers Project7 qualities of a resilient IT culture

        Resiliency can make all the difference between a team that struggles with changing priorities and repeated setbacks and one that sails through the unexpected and adapts quickly. This isn’t magic or coincidence – it’s a result of leaders building key characteristics of resilience into the DNA of their IT culture.

        “Resiliency is facing challenges and difficult times head-on and coming out the other side stronger. If the past few years have taught us anything, it is that we need to be adaptive, communicative, and willing to challenge the norms of our organizational culture,” says Bill Golden, deputy state treasurer and CIO, NC Department of State Treasurer. “It’s about being able to listen and respond to the ever-changing needs of our customers with a smile and a productive attitude.”

      • The Next PlatformIBM’s AI Accelerator: This Had Better Not Be Just A Science Project

        Big Blue was one of the system designers that caught the accelerator bug early and declared rather emphatically that, over the long haul, all kinds of high performance computing would have some sort of acceleration. Meaning, some kind of specialized ASIC to which a CPU would offload its math homework.

      • Fedora ProjectCPE at Nest 2022 – Fedora Community Blog

        This year the annual Flock to Fedora conference was online again and again it was known as Nest With Fedora. Even with the situation around COVID-19 and without the option to meet others in person, Nest was still an awesome conference with plenty of things to do. The conference was hosted on Hopin platform, which allowed organizers to provide conference wide presentations and smaller sessions for other talks. There were also some social related activities, like booths or meeting others in Work Adventure. You could also invite anybody for a private talk. The Community Platform Engineering (CPE) Team was there and gave quite a lot of talks.

      • Red Hat10 essentials to mitigating API security risks

        Application programming interfaces (APIs) make connections between systems that enable companies to conduct business. APIs are now one of the most popular ways for applications, microservices, and containers to communicate. They offer a wide range of benefits, including reliable communication and data transfer, streamlined development, easy scalability, and cost-effective re-usability. However, as APIs become more prevalent in the cloud-native landscape, they also leave applications vulnerable to many more security risks.

        APIs can expose an application and its data, greatly expanding the attack surface and providing a range of new opportunities for attacks. Since APIs are used for communication and data transfer, an insecure API can expose sensitive customer or corporate data, causing revenue loss and damage to a brand’s reputation.

      • Red HatThe ultimate CI/CD resource guide | Red Hat Developer

        Continuous integration (CI) and continuous deployment (CD) are development processes making use of automated tools to produce high-quality software.

        CI ensures that any code submitted by each developer works together with all other code in the project. Typically, CI works by running regression tests.

        CD involves further automation to make sure that the latest accepted versions of a project enter production, and that all the pieces deployed together are compatible.

        Numerous tools, such as integrated development environments and version control systems, help you build software. But when it comes to creating software that customers trust—and even love—you need to pay attention to the details. A good CI/CD environment ensures that testing, integration, and deployment are fast, easy, and accurate. CI/CD allows you to iterate faster, build more reliable code, and deliver better customer experiences.

    • Canonical/Ubuntu Family

      • The Register UKUbuntu has a new remix in the family: Unity • The Register

        Ubuntu 22.10 is out, and the biggest change is a new official remix: Ubuntu Unity is now an official flavor.

        Unity was once Ubuntu’s in-house desktop, but was abandoned for a stock GNOME Shell interface in 2017. As we noted here in The Reg, it was revived by 12-year-old Linux wunderkind Rudra Saraswat, and since then the Ubuntu Unity team applied to become an official edition. After the vote went through, and from version 22.10, it’s official once more.

        The “Kinetic Kudu” release is based on kernel 5.19, released at the end of July, and the official mainstream flavor uses GNOME – specifically, the latest GNOME 43.

        The various underlying subcomponents of 22.10 mostly also apply to the various remixes as well: systemd 251.4, Netplan 0.105, Firefox 104, Thunderbird 102, LibreOffice 7.4, CUPS 2.4, BlueZ 5.65, NetworkManager 1.40, Mesa 22, Pipewire 0.3.57, Poppler 22.08, PulseAudio 16, and xdg-desktop-portal 1.15.

        Bear in mind that 22.10 is an interim release. The rule is easy to remember, but apparently quite a few people don’t get it. Ubuntu puts out a release twice a year. Stable releases are the earlier ones in even-numbered years.

      • Beta NewsCanonical releases Ubuntu Linux 22.10 ’Kinetic Kudu’

        Today, Canonical releases Ubuntu 22.10. Are you excited? Well, you probably shouldn’t be. Don’t get me wrong, the newest version of the operating system — which is codenamed “Kinetic Kudu” — seems fine, but there is nothing truly exciting to be found in it. Yeah, it is just another cookie-cutter Ubuntu release.

        With all of that said, there are some notable improvements, such as the new GNOME 43 desktop environment and inclusion of the latest Mesa in the Steam snap. For the most part, however, desktop users will likely find this version very underwhelming.

        “All users will benefit from the refinements in GNOME 43, including GTK4 theming for improved performance and consistency. Quick Settings now provide faster access to commonly used options such as Wi-Fi, Bluetooth, dark mode and power settings,” says Canonical.

      • It’s FOSSUbuntu 22.10 Is Here!

        Ubuntu 22.10 “Kinetic Kudu” is here. It brings many significant improvements, notably Linux Kernel 5.19 and the GNOME 43 experience.

        Of course, this is a customized GNOME experience that will be familiar to existing Ubuntu users.

      • UbuntuCanonical releases Ubuntu 22.10 Kinetic Kudu | Ubuntu

        Ubuntu 22.10 will be available to download and install later today from https://ubuntu.com/download.

        Codenamed “Kinetic Kudu”, this interim release improves the experience of enterprise developers and IT administrators. It also includes the latest toolchains and applications with a particular focus on the IoT ecosystem.

        “Connected devices are an exciting area of innovation that also create new digital risks in the home and the business. We are focused on enabling a new generation of easy to use and highly secure IoT, so these developers in particular will find a number of quality of life improvements for embedded device and remote development in Ubuntu 22.10”, said Mark Shuttleworth, CEO of Canonical. ”This release also brings new capabilities to our enterprise management story. The new Landscape beta makes it easier than ever to administer your entire Ubuntu estate across any architecture”.

      • UbuntuUbuntu 22.10 on the Raspberry Pi delivers new display support and the full MicroPython stack | Ubuntu

        When it comes to Raspberry Pi support, the theme of Ubuntu 22.10 is definitely embedded devices.

        In this release, Ubuntu now supports a range of embedded display HATs as well as under-the-hood improvements to the GPIO stack as we transition from RPI.GPIO to lgpio (more about that later).

        In addition we’ve worked hard to support the Raspberry Pi’s even smaller cousin, the Raspberry Pi Pico W with the full MicroPython stack now available in the Ubuntu repositories.

        We’ll run through these highlights and more in the rest of this post, but as usual Dave ‘Waveform’ Jones, our resident Raspberry Pi engineer at Canonical, has put together a suite of detailed blog posts to provide additional backstory to each feature. Check them out as we go through.

    • Devices/Embedded

      • Stacey on IoTCan you add a secondary Z-Wave controller for a connected door lock?
      • CNX SoftwareBIGTREETECH CB1 – A Raspberry Pi CM4 compatible Allwinner H616 system-on-module

        When PI4B is used with the CB1, the CPU performance will be close to that of the Raspberry Pi 3B, but with compatibility with many of the accessories for the Raspberry Pi 4. If you wish to do so, you could also connect a Raspberry Pi CM4 to the PI4B adapter board. BIGTREETECH provides a Debian Linux for the CB1, and other operating systems are also in the works, but the company has not released public documentation for the board nor any OS images just yet. [Update: The OS image and Linux kernel source code can be found on GitHub]

        The BIGTREETECH CB1 system-on-module can be purchased on Taobao in mainland China for about $19.9, and the complete package with the PI4B adapter goes for about $29.9. The company also has an Aliexpress store, but the CB1 is not listed yet. Let’s hope it will show up on Aliexpress in the near future. [Update: it can be purchased on the BQ store, see comments section]

      • CNX SoftwareZPE Nodegrid mini SR Intel Linux cloud gateway targets IoT and OT applications

        ZPE Systems Nodegrid Mini SR is a compact cloud-orchestrated gateway designed for the secure management of Internet of Things (IoT) and Operational Technology (OT) infrastructures.

        Power by a dual-core Intel processor, the Linux-based device is equipped with 4GB RAM, a 16GB encrypted storage device, and whose hardware looks to be very similar to the Compulab Fitlet2 mini PC with two Gigabit Ethernet ports, four USB 3.0/2.0 ports, and optional support for WiFi 6 and 4G

      • CNX SoftwareMaking a weather station with Maker Pi Pico Mini board and SparkFun SerLCD display – CNX Software

        Cytron’s Maker Pi Pico Mini comes with a Raspberry Pi Pico or Raspberry Pi Pico W microcontroller board. It has the same features as the larger Maker Pi Pico including a GPIO LED, WS2812B Neopixel RGB LED, a passive piezo buzzer, programmable push buttons, and a reset button.

        I would like to thank Cytron for sending the Maker Pi Pico Mini board fitted with a Raspberry Pi Pico W as well as a character RGB LCD and a 3.7V Lithium Polymer battery. In this tutorial, we will show how to make a weather station with the Maker Pi Pico Mini board using Arduino code and the OpenWeather API.

    • Open Hardware/Modding

      • ArduinoKeep your surroundings safe and clean with building automation | Arduino Blog

        Whether it’s a home, an office, a school, a restaurant, or something else, it’s always important to keep your indoor environment safe, clean, and pleasant to be inside.

        It’s also a good idea to keep track of the air quality and conditions around you, not just for safety but also to ensure your systems are all working correctly and to avoid any wastage and inefficiencies.

        Accurately monitoring your buildings can seem like a big challenge, but it’s actually very achievable with the right tools, and in fact, doesn’t require a whole lot of technology and expertise to get started. In this article, we’ll look at why it’s so essential to monitor your buildings and how anyone can build their own systems for doing so.

      • Linux GizmosCarrier board supports Jetson Nano/NX modules

        SeeedStudio announced yesterday the A205E Carrier Board which is compatible with Jetson Nano/Xavier NX modules from NVIDIA. The A205 includes flexible peripherals such as dual GbE LAN ports, dual HDMI ports, one PCIe M.2 key-M for SSD storage, one M.2 Key for Wi-Fi/BLE, etc.

      • Make Tech EasierHow to Power Light Bulbs Using an Arduino With a Relay Module – Make Tech Easier

        Controlling tiny LEDs with an Arduino can be a fun project to kick off your journey learning DIY electronics. But do you know what’s even more fun? Powering light bulbs with a custom-built Arduino project: large, high-power, room-enlightening light bulbs!

        However, the Arduino can’t emit more than 5V from any of its pins, let alone enough to power a light bulb that needs 30 to 40 times the voltage for an LED. That’s why you’re supposed to use a relay module instead. Here’s how to do that with your Arduino.

      • HackadayRubber Stamping Your Way To Custom PCBs

        Many of us now outsource PCB production to board houses overseas, which offer high-quality boards with increasingly-impressive turnaround times. [Shri Hari Ram] still likes to brew up their own PCBs, though, and decided to try a new method to speed things up. 

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • MedevelQueries Is a New Open-source GUI Database Manager for Relational Databases

      Queries is a free Libre software database management solution for Linux desktops. It is written pure Rust.

      In the nutshell, it is a complete workbench for SQL database engines with initial support for PostgreSQL.

    • OpenSource.comTest your IoT platform with open source tools | Opensource.com

      The Internet of Things (IoT) and edge computing industries are developing quickly, and with it so does the scale of endpoints and the complexity of business logic. The more the IoT ecosystem grows, the more important it becomes to verify the availability and reliability of your platform. If you’re delivering services, then testing your IoT system can help you find bottlenecks in performance, and help you plan ahead for scalability.

      IoT can consist of any number of different devices using diverse protocols, strung together with complex integration architecture. This can make it challenging to design effective and meaningful tests for it. In this article, I demonstrate how to test an IoT platform using EMQX as an example of how to introduce performance test tools to verify and test platform-related quality indicators.

    • MedevelDrip is a Free Privacy-focused Menstrual Cycle and Fertility Tracking App [Ed: Any "app" that runs on mobile cannot be trusted on privacy, irrespective of the assurances and promises]
    • MedevelConvert image to Text with this Free App: Capture2Text OCR

      Convert image to Text with this multilingual free app: Capture2Text

      Capture2Text is a free open-source OCR that allows you to convert any image capture to text. It supports about 90+ languages so far and comes with a highly customized shortcuts.

      Alongside its rich graphical user interface (GUI), Capture2Text also offers a command-line interface CLI that an advanced user can use to batch convert many images with one command.

      The app is released as a free Libre open-source software (FLOSS) under the GNU General Public License version 3.0 (GPLv3).

    • Web Browsers/Web Servers

      • uni TorontoWe’re finally fully moving away from Apache’s prefork MPM (hopefully)

        In the very beginning, what is now Apache’s prefork MPM was your only option; it was just how Apache worked. Then a long time ago, Apache added other Multi-Processing Modules (MPMs), although they were somewhat untrusted so for a while the conservative, backward compatible default was the prefork MPM. We started using Ubuntu based web servers (running Apache) a long time ago, and so we got their default of the prefork MPM.

      • Mozilla

        • It’s FOSSPocket Casts Announces Open-Source Mobile Apps

          Pocket Casts is a popular podcast app for its simplicity, hand-curated collection, and features.

          If you did not know, it was entirely a paid app a few years back.

          In 2019, they made their mobile apps accessible to all and introduced Pocket Casts Plus subscription to access desktop apps and extra features.

          Automattic (the company behind WordPress.com) acquired Pocket Casts in 2021.

          Automattic is involved with open-source projects. So, it was obvious for users to expect it to be open-source sooner than later.

          And the time has come!

        • MozillaPrep for the U.S. midterm elections with these online tools

          Avoiding misinformation online can be tricky, especially during election season. And while the media cycle may be more low-key than it would be for a U.S. presidential election (coming up soon in 2024), this November’s midterm has not been immune to internet discord. Americans have got some big decisions to make after all, like how power is balanced in Congress and who gets to make decisions about important issues in your state and local community.

          We’re not here to tell you who to vote for. But as an organization that advocates for a healthy internet, we consider online misinformation to be a huge barrier to seeing that better internet. Here are some nonpartisan, online resources to help us all do the responsible thing: Make informed choices and get ready to vote.

        • Seven-Year Moziversary – chuttenblog

          Seven years ago today I began working at Mozilla.

          What have I been up to this year? Not blogging, that’s for sure. I’m not sure if I can lay the entire blame of this at the feet of *gestures at everything*, but with the retirement of the This Week in Glean rotation, I’ve gone from infrequently blogging to never blogging.

          Which is weird. I like doing it. It can be very fun. It isn’t usually too difficult. Seems like the intersection of all the things that would make it not only something I could do but something I want to do.

    • Productivity Software/LibreOffice/Calligra

      • Document FoundationThe Document Foundation provides LibreOffice on the Microsoft Store [Ed: Swimming right into the DRM shark's mouth]

        The announcement reflects the project’s new marketing strategy: The Document Foundation is focused on the release of the Community version, while ecosystem companies are focused on value-added long-term supported versions targeted at enterprises. The distinction has the objective of educating organizations to support the FOSS project by choosing the LibreOffice version best suited for their needs instead of the Community version generously supported by volunteers.

    • Education

      • CCCNo Congress 2022: Looking forward to decentralized alternatives and Camp 2023

        Since 2022, we have observed that the general pandemic situation is improving. While no large event may be possible this year, nothing stands in the way of smaller events. We are therefore looking forward to decentralized events of a variety of local groups between Christmas and New Year. We are looking forward to talks, workshops, art, music and certainly one or the other surprise.

    • Programming/Development

      • Dirk EddelbuettelDirk Eddelbuettel: qlcal 0.0.3 on CRAN: Maintenance and Updates

        qlcal is based on the calendaring subset of QuantLib. It is provided (for the R package) as a set of included files, so the package is self-contained and does not depend on an external QuantLib library (which can be demanding to build). qlcal covers over sixty country / market calendars and can compute holiday lists, its complement (i.e. business day lists) and much more.

        This release fixes a small bug affecting one function, brings calendar updates from QuantLib 1.27 and 1.28, and applies a little bit of polish to appease clang++-15.

      • Dirk EddelbuettelDirk Eddelbuettel: RcppQuantuccia 0.1.1 on CRAN: Maintenance

        A minor release of RcppQuantuccia arrived on CRAN today. RcppQuantuccia started from the Quantuccia header-only subset / variant of QuantLib which it brings it to R. This project validated the idea of making the calendaring functionality of QuantLib available in a more compact and standalone project – which we now do with qlcal which can be seen as a successor to this.

      • Nicholas Tietz-SokolskyAlpha-beta pruning illustrated by the smothered mate

        In the process of writing it and debugging it, another Recurser and I traced through the execution with a known position where we could calculate the execution. This let us figure out what was going wrong, and also gain some intuition for what the algorithm was doing. I’m going to use that same position here to illustrated alpha-beta pruning. (This is partially so that when I inevitably forget the details, I can come back here and refresh myself!)

      • Alexandru NedelcuThe case against Effect Systems (e.g., the IO data type)

        As Scala developers and fans of the functional programming promoted by Haskell, how do we justify the use of IO to newbies coming from Java? It’s been a fun ride, but the truth is that Java 19 is changing everything.

      • Mark DominusTree search in Haskell

        There are two problems with this. First, the filter is in the wrong place. It says that the search should proceed downward only from the good nodes, and stop when it reaches a not-good node. This isn’t what we want, because it should be up to childrenOf to decide how to continue the search. If the search should be pruned at a particular node, childrenOf should return an empty list of children. For example, when searching for palindromes, the search would be cut off at ab, and never proceed downward to find aba or abccbccba.

        But the larger problem is that in most cases the search computes forever without producing any output at all, because the call to s recurses before it returns even one list element.

      • uni TorontoThe proper setup of a Go module, as I understand it

        I have been a little bit confused about some aspects of Go modules in practice for a while, and to get things more nailed down in my head, I’m writing some entries (writing entries here can be a form of talking to the duck). This is the first one, because before I understand the unusual corner cases I need to cover the normal and proper cases.

      • LWNA deeper look into the GCC Rust front-end

        Philip Herron and Arthur Cohen presented an update on the “gccrs” GCC front end for the Rust language at the 2022 Kangrejos conference. Less than two weeks later — and joined by David Faust — they did it again at the 2022 GNU Tools Cauldron. This time, though, they were talking to GCC developers and refocused their presentation accordingly; the result was an interesting look into the challenges of implementing a compiler for Rust.
        Herron started by saying that he initially found the project too difficult; the Rust language was simply too volatile to try to develop a compiler for it. So he gave up for a while. He kept getting questions about when the work would be done, though, so he eventually restarted the project. The language has been mostly stable since 2015, so the task has gotten a little easier.

        There are a few goals for the gccrs project beyond simply compiling Rust code. The work needs to end up in the GCC mainline once it’s ready. It should reuse as much of the GNU toolchain as possible. There is also an effort to make the gccrs code as easy as possible to backport to older versions of GCC. Finally, advanced features like link-time optimization should be supported for Rust code.

      • Perl / Raku

      • Python

        • HackadayGenerating Stereo FM Signals, Thanks To Python

          A casual understanding of how AM radio works is pretty easy to come by, and standard FM is only a little more complicated. Things can go off the tracks a bit with stereo FM, though — figuring out how they squeeze two separate audio tracks onto one radio signal is a bit of a head-scratcher. In that case, wrapping your head around the concept might be helped by mocking up a stereo FM signal with an arbitrary waveform generator and a little bit of Python.

        • LWN(Re)moving outdated Python tools and scripts [LWN.net]

          At the end of September, Victor Stinner reported on a security bug fix he had been working on for a script from the CPython Tools/scripts directory. As part of that work, he realized that there were 74 scripts in that directory that were potentially outdated, unused, unmaintained, trivial, buggy, or some combination of all of those. It is not uncommon for projects to have code that accretes in overlooked corners of the source tree, but it makes sense to periodically take a look to see if changes are needed. Stinner seems to have kicked that off for Python with his message.

          The proximate cause was a shell-code-injection flaw in get_remote_certificate.py, which is a thin wrapper around the openssl command-line tool to retrieve a TLS certificate from a site and display it. As Stinner notes, just using openssl directly is “simple enough”. So he suggested removing get_remote_certificate.py from the repository entirely for Python 3.12.

      • Git

        • Linux HintBest 14 Git GUI Clients for Ubuntu in 2022

          I know most people reading this article are developers of Linux or Linux enthusiasts and do not need any introduction to Git. But for beginners, Git is one of the most popular and widely used version control systems available for software development and other similar kinds of work. Git is a tool that can be managed and used through the command line, and it is one of the easy-to-use command-line version control tools available for Linux developers and users.

          With most developers nowadays using graphical tools for programming and development, there is no surprise they are also seeking GUI tools which could prove to be efficient alternatives to the Git command line tool. There are many Git GUI clients available for Linux and its distros like Ubuntu which offer most of the features of the Git command line tool with more efficiency and reliability.

          So today, we’re going to look at the best 10 Git GUI clients, which you can install on Ubuntu and use as a version control tool for software development.

      • Rust

  • Leftovers

    • The NationShadow Play

      The anxiety around the state of cinema that Olivier Assayas captured in his 1996 international breakthrough, Irma Vep, has proved remarkably enduring. The French auteur uses the setting, a troubled production of a remake of Louis Feuillade’s 1915 Les Vampires, to explore the ways film is adapting to an epoch of encroaching globalization and ever-changing tastes. The movie’s aging, unstable director, René Vidal (Jean-Pierre Léaud, the most prominent actor of the French New Wave), strives to update a classic for a self-aware era with Maggie Cheung (playing a version of herself), an international star best known for her action films, in the role of Irma Vep—arguably the ur–femme fatale, originally brought to life by the silent film star Musidora. On this postmodern canvas, Assayas places a New Wave icon in direct conversation with French cinema’s past and its globalized present.

    • Our product got free advertising from AI

      But what if you could get GPT-3 to market your product for you? Well, I certainly couldn’t do it if I tried. But serendipity is, in many ways, what makes life worth living. You can imagine my surprise when I woke up to a message on ChiselStrike’s discord, with someone claiming that GPT-3 auto-generated a story attributing one of the ChiselStrike cofounders, Pekka Enberg, as the author! See if for yourself: [...]

    • Matt RickardRichard Feynman and Narrative

      But Feynman’s anecdotes were intentional. Colleagues would talk about how he would obsess over narratives. A longtime “rival” and fellow Nobel Prize winner in Physics, Murray Gell-Mann, never achieved the same level of pop culture fame as Feynman. Gell-Mann had the same propensity for marketing complex ideas: he was the one who discovered and named quarks, a subatomic particle that is a fundamental part of matter. The quirky name comes from James Joyce’s Finnegan’s Wake.

    • Counter PunchThe Battle of the Books: The Waste Land, Ulysses and Howl

      It’s also “a fantastic farm where ashes grow like wheat into ridges and hills and grotesque gardens; where ashes take the forms of houses and chimneys and rising smoke and, finally, with a transcendent effort, of men who move dimly and already crumbling through the powdery air.”

    • Counter Punch“Nobody Said Anything Because They Feared Being Benched:” How Abuse is Baked into American Sports

      My book on the hypercommercialization of girls sports identified many instances of verbal and physical abuse of girls and young women at both the youth and college levels.

    • HackadayCrusty Leaking Cells Kill Your Tech. Just What’s Going On?

      Seasoned Hackaday readers may have noticed over the years, that some of us who toil under the sign of the Jolly Wrencher have a penchant for older tech. After all, what’s not to like in a dirt cheap piece of consumer electronics from decades past that’s just begging for a bit of hardware hacking? For me at the moment this is manifesting itself in a selection of 8mm movie cameras, as I pursue a project that will eventually deliver a decent quality digital film cartridge.

    • The NationReading James Baldwin
    • Science

      • Mark DominusWhat’s this search algorithm usually called?

        Is the history of this algorithm lost in time, or do we know who first invented it, or at least wrote it down? I think it sometimes pops up in connection with coin-weighing puzzles.

    • Hardware

      • HackadayPermeability Tuned Oscillators Made Stable With A Glue Stick

        For over a century now, radio amateurs have made tuned circuits using a coil of wire and a variable capacitor. In recent decades the supply of variable capacitors has dwindled, as SDR technology has supplanted the traditional tuning capacitor. No more tuned circuits for the radio amateurs? Not quite, as [Bill Meara N2CQR] shows us in the video below the break by making variable inductors using permeability tuning. This is hardly high-tech, the major component is as simple as a glue stick.

      • HackadayHackaday Prize 2022: A Cheap And Effective Mouth Joystick Mouse

        Some people have issues using regular computer mice, and need alternative input devices that suit their needs. [Olman Orozco] designed an affordable mouth-joystick intended to work as a mouse to suit that very use case.

      • HackadayA 3D Printer With Quadruple The Output

        While the polygraph is colloquially associated with pseudoscientific lie detector tests, the actual invention of the first polygraph was designed to mechanically duplicate the pen strokes of someone writing. Famously, a polygraph was used by former US President Thomas Jefferson in his “modern office”, a replica of which still sits in the Smithsonian museum. Few of us have a need for a pen-based polygraph anymore, but inspiration from the centuries-old invention can still be gleaned from the machine, like in this 3D printer which can output four identical prints at once.

      • HackadayUV Monitoring Budgie Keeps An Eye On Exposure Levels

        UV rays are great at helping us generate vitamin D, but they can also be harmful, causing sunburn and even melanoma. To help kids keep track of the UV index in his local area, [Jude Pullen] created the UV Budgie.

    • Health/Nutrition/Agriculture

    • Proprietary

      • DaemonFC (Ryan Farmer)Walmart’s employee benefits Web site requires Microsoft Internet Exploder in 2022.

        Soon, I was left figuring out how to load a Windows 10 Enterprise Edition 90 day evaluation copy into VirtualBox from an image supplied by Microsoft…..

        Yeah, I’m serious.

        I was disgusted that it took up most of an afternoon to get the appliance working.

      • Basemark Debuts GPUScore Sacred Path Benchmarks Between Android, iOS, Linux, MacOS and Windows Devices

        GPUScore Sacred Path is the world’s only cross-platform GPU benchmark that includes the latest GPU technologies like Variable Rate Shading (VRS). Sacred Path supports all the relevant device categories – ranging from premium mobile phones to high-end gaming PCs. It has full support for Android, iOS, Linux, macOS and Windows.

        This benchmark is of great importance for application vendors, device manufacturers, GPU vendors and IT Media. Game developers need a thorough understanding of performance across the device range to optimize the use of the same assets across a maximum device range. GPU vendors and device manufacturers can compare their products with competitor products, which allows them to develop new product ranges with the correct targeting. In addition, Sacred Path is a true asset for media reviewing any GPU-equipped devices.

    • Linux Foundation

    • Security

      • 9to5LinuxDebian and Ubuntu Users Get Kernel Security Updates to Fix Recent Wi-Fi Stack Flaws

        On October 18th, 2022, Debian GNU/Linux 11 “Bullseye” users received a new major kernel update patching a total of 17 security vulnerabilities, including CVE-2022-3176 and CVE-2022-2602, two flaws discovered in the io_uring subsystem that could lead to local privilege escalation to root, and CVE-2022-40307, a race condition discovered in the EFI capsule-loader driver that could also lead to local privilege escalation or a denial of service (crash or memory corruption).

      • ProtocolMicrosoft customer data leak includes contact info, emails – Protocol
      • IT WireMassive leak of Microsoft customer data claimed to be biggest B2B spill

        Threat intelligence firm SOCRadar says it has detected that sensitive data from 65,000 entities has been made public because of a misconfigured Microsoft endpoint. It has dubbed the leak BlueBleed, adding that this data was only the first part of the leak.

        The total amount of data was from more than 150,000 companies in 123 different countries, SOCRadar said in a post.

        British security guru Kevin Beaumont tweeted about the leak, saying: “Microsoft have had some sort of breach due to a misconfigured system, which has exposed customer data.”

      • IT WireiTWire – Medical data of 3.9m Australians at risk as Medibank faces ransom demand [iophk: Windows TCO]

        Medical insurer Medibank Group says its shares have entered a trading halt after it was contacted by an individual who claims to have stolen 200GB of data from the company during a network attack which it reported last week.

        In a statement issued on Thursday, the company said the individual in question had provided a sample of records for 100 policies. “…we believe [this] has come from our ahm and international student systems,” it said.

        The company provides private health insurance and health services to more than 3.9 million people in Australia.

        “That data includes first names and surnames, addresses, dates of birth, Medicare numbers, policy numbers, phone numbers and some claims data,” Medibank Group said.

      • Pen Test PartnersSocial Engineering dos and don’ts | Pen Test Partners

        Another day, another success at sneaking into a building and pretending to be staff. I do so love drinking other people’s expensive office coffee. No fruit bowls though. Close, but no banana.

        It got me thinking, again, about what makes for good social engineering (SE), and what advice would I give my younger self.

      • IBM Old TimerHow Should Companies Prepare for the Coming Cybersecurity Regulations [Ed: Delete Windows, for starters. He cites the example of Microsoft incidents, but does not name the culprit.]

        “Cybersecurity has reached a tipping point,” wrote MIT professor Stuart Madnick in a recent Harvard Business Review article, New Cybersecurity Regulations Are Coming. Here’s How to Prepare. “After decades of private-sector organizations more or less being left to deal with cyber incidents on their own, the scale and impact of cyberattacks means that the fallout from these incidents can ripple across societies and borders.”

        Given the growing threat of cyberattacks, there’s an urgent need to improve the security of IT systems. However, we still don’t know a lot about cyberattacks, including how many attacks have taken place and who’s been attacked. Until recently, cybersecurity regulation were mostly focused on data privacy, and the only attacks that had to be reported were those involving personal information, such as the theft of names and credit card numbers.

      • IPFire Official BlogIPFire 2.27 – Core Update 171 released [SECURITY ADVISORY]

        Today, we release IPFire 2.27 – Core Update 171. It updates major parts of the distribution, such as the kernel and the IPS engine, and features bug fixes as well as stability and security improvements – most notably, upstream fixes against a strain of vulnerabilities in the kernel’s WiFi components. Particularly IPFire users running WiFi networking hardware are advised to install this update as soon as possible, and reboot their systems afterwards.

        Also, this Core Update initiates the deprecation of IPFire support for 32-bit ARM hardware, ultimately taking effect on February 28, 2023.

      • The VergeWhy Signal won’t compromise on encryption, with president Meredith Whittaker

        WhatsApp uses the Signal encryption protocol to provide encryption for its messages. That was absolutely a visionary choice that Brian and his team led back in the day ­- and big props to them for doing that. But you can’t just look at that and then stop at message protection. WhatsApp does not protect metadata the way that Signal does. Signal knows nothing about who you are. It doesn’t have your profile information and it has introduced group encryption protections. We don’t know who you are talking to or who is in the membership of a group. It has gone above and beyond to minimize the collection of metadata.

        WhatsApp, on the other hand, collects the information about your profile, your profile photo, who is talking to whom, who is a group member. That is powerful metadata. It is particularly powerful—and this is where we have to back out into a structural argument ­ for a company to collect the data that is also owned by Meta/Facebook. Facebook has a huge amount, just unspeakable volumes, of intimate information about billions of people across the globe.

        It is not trivial to point out that WhatsApp metadata could easily be joined with Facebook data, and that it could easily reveal extremely intimate information about people. The choice to remove or enhance the encryption protocols is still in the hands of Facebook. We have to look structurally at what that organization is, who actually has control over these decisions, and at some of these details that often do not get discussed when we talk about message encryption overall.

      • Privacy/Surveillance

        • Franz DillSuing for Surveillance

          Journalist Sues Predator Spyware Maker for Allegedly Helping Government Surveil Him

        • Hollywood ReporterNetflix’s Data Vault Cracks Open a Little (For Its Advertising Partners)

          If Netflix’s business models were structured like the Marvel Cinematic Universe, the company would be about to enter Phase 3. Phase 1, of course, is when the company launched its DVD-by-mail service in 1999, transforming the way DVDs were rented. Phase 2 began in 2007, when it supplemented its DVD subscriptions with a streaming video-on-demand service, ushering in the modern era of streaming entertainment. Phase 3 of the Netflix Revenue Universe (the NRU?) will begin in earnest in November, when the company launches its advertising-supported streaming tier.

        • TechdirtLouisville Cop Used Law Enforcement Database To Seek Female Targets To Hack For Sexually Explicit Content

          Law enforcement officers have plenty of unfettered access to expansive databases containing plenty of personal information. This access is instrumental to law enforcement work, including ongoing investigations, attempts to locate wanted criminals, and the routine minutia of validating drivers licenses and registration.

        • EFFEU Lawmakers Must Reject This Proposal To Scan Private Chats

          The European Union’s executive body is pushing ahead with a proposal that could lead to mandatory scanning of every private message, photo, and video. The EU Commission’s wants to open the intimate data of our digital lives up to review by government-approved scanning software, and then checked against databases that maintain images of child abuse. 

        • EFFBetter Regulating Drone Use Requires Communication, Not Surveillance

          The 2018 law was already too broad, exempting officials from following procedures that ordinarily govern electronic surveillance and hacking, such as the Wiretap Act, Electronic Communications Privacy Act, and the Computer Fraud and Abuse Act.

        • EFFSpanish ISPs Fall Short of Robust Commitments to User Privacy in New Eticas’ Report

          This year, Eticas checked public policies and documents of 15 Internet companies that handle user data in their day-to-day activities, including telecom providers, home sales and rental sites, and apps for selling second-hand goods. Eticas added three new companies to the report: the telecom provider Digi Spain Telecom, the second-hand goods app Vinted, and the startup Trovit.es, which offers deals for selling or renting homes, cars, and other products. Telecom provider Euskatel is no longer in the ranking after its acquisition by MásMóvil.

        • Venture BeatIs privacy only for the elite? Why Apple’s approach is a marketing advantage

          Shortly after GDPR went into effect in 2018, Apple began running privacy-focused advertisements and since then, has released several more along the same line — coming out with unique angles to showcase its enhanced security features.

          Using privacy as a marketing asset was viewed as a smart marketing move by Estelle Masse, Europe legislative manager and global data protection lead at Access Now, a data privacy advocacy organization that defends the digital rights of users worldwide.

          “Privacy is actually a commercial advantage,” Masse said. “Companies need to move beyond thinking it’s part of an annoying compliance checklist. It can be a competitive advantage for you and build trust for your users.”

          As other companies clamored to navigate compliance with enhanced privacy regulations while maintaining their marketing data strategies, Apple embraced privacy issues as a key point for its marketing. The company proved privacy could be an asset, rather than the liability it became for its Silicon Valley neighbor, Facebook (now Meta), which spent 2018 navigating the Cambridge Analytica data privacy scandal. Meanwhile, for other tech companies, privacy became a downfall instead of a key feature.

        • The RecordDemocracies are having a reckoning with mercenary spyware – The Record by Recorded Future

          Off-the-shelf spyware has long been associated with abuses by autocratic regimes, but in recent years it’s democracies who are reckoning with the their own potential abuse of such surveillance tools.

          Sophisticated digital surveillance tools were once only available to a handful of government intelligence operations. But mercenary software-as-a-service operations like Pegasus, from Israeli firm NSO Group, have made such powers accessible to practically any government willing to pay.

    • Defence/Aggression

    • Environment

    • Finance

    • AstroTurf/Lobbying/Politics

      • BBCI was dragged into China consulate, protester Bob Chan says

        “I then found myself being dragged into the grounds of the consulate. I held on to the gates where I was kicked and punched, I could not hold on for long,” he said.

        “I was eventually pulled onto the ground of the consulate. I felt punches and kicks from several men. Other protestors were trying to get me out of this situation, but to no avail.

        “The attack only stopped when a man who turned out to be a uniformed officer from the Greater Manchester Police pulled me outside the gates.

        “Let me say it again so I am clear: I was dragged into the consulate, I did not attempt to enter the consulate.”

      • India TimesCISO’s pick for 2023 cybersecurity stack: What’s in and what’s out

        According to the Forrester report 2022, 55% of security professionals acknowledge their organization experienced a security incident or breach last year involving supply chain providers, while third-party attacks account for 60% of global security incidents.

        As per Avinash Tiwari, CISO, Pidilite Industries, such issues stem from unmaintained hygiene on IT/OT (Information Technology/Operation Technology) convergence, which has accelerated due to digital adoption, innovations, and collaborations.

      • Site36No registration address: German Federal Office fines Telegram

        Now, for the first time, the German Federal Office of Justice has imposed fines on Telegram for violations of the Network Enforcement Act. The company is said to have violated the obligation to maintain reporting channels that comply with the law. Neither Telegram users nor state authorities can therefore report incriminated content. According to its own information, the Federal Office of Justice has tried to serve hearing letters since April 2021 without success. However, the notification of an authorised representative with a summonable address in Germany was missing. Thus, no official documents can be served in a legally binding manner. Therefore, the makers are now to pay a total of €5.12 million. However, the penalty order is only legally binding if Telegram waives its right to appeal.

      • The Telegraph UKJust Stop Oil bankrolled by group part-funded by oil heiress

        She is reported to have personally given $1 million (£800,000) to the CEF, which has handed out more than $4 million (£3.5 million) in grants, including to Extinction Rebellion and Just Stop Oil.

      • The NationThe MAGA Road to Anti-Semitism

        In the past week, a number of prominent MAGA leaders have made comments about Jews that range from insulting to outright anti-Semitic.

      • Pro PublicaHow to Help People Vote in the 2022 Midterm Elections

        Our reporters found that voting is a modern-day literacy test in many ways for the 48 million Americans who have trouble reading. Voters must navigate confusing ballots and registration processes, as well as attempts by some states to make voting more difficult, such as by putting restrictions on the assistance people can recieve. Misinformation and false claims about voting fraud have exacerbated the issue.

      • TruthOutChuck Grassley Is Downplaying His Anti-Abortion Extremism to Win Reelection
      • TruthOutThe First 2 Days of Early Voting in Georgia Midterms Have Been Record Breaking
      • TruthOutBiden Expands Title 42 to Turn Away Venezuelan Asylum Seekers at the Border
      • Democracy NowVenezuelans Seeking Asylum Are Now Turned Away at U.S. Border as Biden Expands Trump-Era Title 42

        We get an update from immigrant justice advocate Guerline Jozef, who is in Mexico to look at the impact of the Biden administration’s expansion of Title 42 to turn away Venezuelan asylum seekers at the U.S.-Mexico border. The Trump-era policy lets the government expel asylum seekers on public health grounds. “It is unacceptable today for the government to try to expand Title 42, and forcing people to continue to die,” says Jozef. Meanwhile, the Biden administration announced it will allow 24,000 Venezuelans to enter the country by air if they have a financial sponsor in the United States. Applicants must first apply online. The program is similar to one set up for Ukrainians earlier this year. Jozef notes immigrants from Venezuela and Haiti are treated harshly, while Ukrainians fleeing similar political instability back home are welcomed, and that the immigration system should be structured to treat everyone with compassion and dignity.

      • Democracy NowHaitians Protest Economic Crisis & Gang Violence, Demand U.S. Stay Out and Allow Domestic Solution

        Protests are growing in Port-au-Prince as thousands fill the streets to demand the U.S.-backed Prime Minister Ariel Henry resign after he announced he would raise fuel prices amid an already dire humanitarian crisis. Countries including the U.S. and Canada have sent military equipment to assist the Haitian police in cracking down on the unrest, and the U.S. has been pushing the United Nations Security Council to authorize a security mission, spurring more protests against foreign intervention. “We are seeing people really protesting on the street for the right to [a] sovereign solution to the issues that are happening, and they are saying ‘no’ to an armed invasion from the international community,” says Guerline Jozef, executive director of the Haitian Bridge Alliance.

      • TruthOutPolls Show Republican Attacks on Teaching Racism Are Backfiring
      • Meduza‘You’re sitting in robes, beneath the state flag and coat-of-arms. Do something to help our country.’ Alexey Navalny urged his judges not to be complicit in Putin’s crimes. — Meduza

        On October 18, the imprisoned Russian politician Alexey Navalny appeared before the Moscow appellate court to appeal his nine-year maximal-security prison sentence. We’re publishing an abridged version of Navalny’s courtroom speech, in which he called the war in Ukraine “an immense crime,” started by Vladimir Putin and his circle to cover up the disastrous results of their 22 years of government. Navalny urged the court not to be complicit in the crimes of Putin’s regime. The court dismissed his appeal.

      • MeduzaNavalny team: new head of Roscosmos owns real estate worth a billion rubles — Meduza

        The family of Yury Borisov, the new head of Russian space program Roscosmos, owns real estate in Russia and abroad worth at least a billion rubles, says an investigation by Alexey Navalny’s team.

      • Counter PunchFibs and Fantasy: Scott Morrison Joins the Global Lecture Circuit

        Still a parliamentarian representing the federal seat of Cook, Morrison – so we are told – did remarkable things.  According to the group’s blurb on Morrison’s achievements, they are manifold and grand, the sort expected from this “globalization mastermind”.

      • Common DreamsJudge Signals Trump Knowingly Signed Court Doc With False Election Fraud Claims

        “The emails show that President Trump knew that the specific numbers of voter fraud were wrong but continued to tout those numbers, both in court and to the public.”

      • Counter PunchWhen Police Become Judge, Jury and Executioner

        These death squads believe they can kill, shoot, taser, abuse and steal from American citizens in the so-called name of law and order.

      • Common DreamsConcerned Over Lack of ‘Working-Class’ Energy for Midterms, Sanders Plans 8-State Blitz

        Starting on October 27, the Vermont independent senator will hold at least 19 events with grassroots groups MoveOn and NextGen America.

      • TechdirtYe’s ‘Buyout’ Of Parler Looks Very Much Like A Failed Company Taking Advantage Of Troubled Rich Guy

        Ye, formerly Kanye West, has had quite a week or so. He got locked out of both his Instagram and Twitter accounts for posting anti-semitic nonsense. Immediately following that, he went on the Drink Champs podcast/video show and spouted even more such nonsense. He’s continuing to spew similar nonsense in other interviews as well. Indeed, it seems like anyone putting him on right now is really exploiting someone who is dealing with some pretty serious issues.

      • Common DreamsTexas Woman’s Near-Death Experience Is What GOP ‘Hopes to See Nationwide’

        The advocacy group Obstetricians for Reproductive Justice (ORJ) began traveling the country in September to meet people who have been personally impacted by abortion bans that have now been passed in at least 13 states following the U.S. Supreme Court’s overturning of Roe v. Wade in June.

      • Common DreamsOpinion | Democracy Is Defenseless and the Midterms Can Kill It

        American democracy is not guaranteed by the Constitution. It has no impregnable defense in law, and in the coming midterm election it stands in mortal jeopardy.

      • The NationA Black Guy’s Guide to Utah’s Senate Debate

        Utah Senator Mike Lee should lose his reelection bid and be drummed out of office for his support of the scheme to install fake electors to overturn the 2020 election. Text messages from Lee to former White House Chief of Staff Mark Meadows revealed that Lee was an early and vocal advocate of the idea that Trump should challenge the results of the election he lost. “If a very small handful of states were to have their legislatures appoint alternative slates of delegates, there could be a plan,” he wrote to Meadows. Lee was also an early backer of now-disgraced lawyer Sidney Powell, helping her secure an audience with the White House. On January 4, two days before the insurrection, Lee whined to Meadows: “I’ve been spending 14 hours a day for the last week trying to unravel this for [Trump]”—“this,” of course, being the election results.

      • Misinformation/Disinformation/Propaganda

        • WiredI Uncovered an Army of Fake Men on Hinge

          But then I figured I’d “like” these bot profiles back, establishing a match, to see what I could dig up. Hinge itself soon confirmed what I suspected, booting some of these supposed people off the app for potentially fraudulent behavior. I received automated emails on August 6, 8, 9, 14, and again on September 18 and 22, letting me know a match was a fake.

        • WiredThe Hunt for Wikipedia’s Disinformation Moles

          Some researchers believe that Wikipedia could be an overlooked venue for information warfare, and they have been developing technologies and methods similar to the ones used on Facebook and Twitter to uncover it. A team from the UK-based Institute for Strategic Dialogue (ISD) and the Centre for the Analysis of Social Media (CASM Technology) published a paper today exploring how to uncover disinformation on Wikipedia. They also believe that the data mapping may have uncovered a strategy that states could use to introduce disinformation. The trick, they say, is playing the long and subtle game.

        • TechdirtAfter All That Nonsense… Republicans Aren’t Even Using The Spam Backdoor They Forced Google To Create

          Do you remember all the nonsense from earlier this year, in which executives from the Republicans’ favorite spamming operation misread a study about how various email providers handled political mailings and absolutely flipped out? The study didn’t say what they claimed it said: that Google was nefariously sending GOP emails to spam filters. It showed that in an untrained inbox, Google was more likely to declare Republican political messages as spam than Democratic political messages (the same study also showed the opposite for Outlook and Yahoo Mail — those sent more Dem emails to spam than Republicans, but nobody complained about that). Of course, the same study showed that this differential in Gmail went away for anyone who trained their spam filter.

        • Common DreamsOpinion | How Corporate Media Help GOP Spread Inflation Misinformation
    • Censorship/Free Speech

      • WiredIran’s Internet Blackouts Are Part of a Global Menace

        Internet shutdowns can have significant impacts on the economy, health care, and education even in the best of times, but when they are instituted during crises, they can cost lives. Curbing the use of [Internet] shutdowns—and the severe second-order consequences that attend them—requires a united approach that recognizes the underlying impulses and technologies, as well as the struggle of those impacted.

      • Tech TimesIran Government Censors Protests with Internet Outages

        This is exactly what the Iranian government is doing right now, with Internet blackouts and acts of violence during the peak of the Tehran protests. But, as it turns out, the regime carries out the same approach each time the country is embroiled in a scandal.

        According to Amnesty International, at least 323 men, women, and children were killed by Iranian law enforcement during five days of nationwide protests in 2019. The deadly crackdown was preceded by the authorities blocking most people’s access to the [Internet].

      • BBCKerala’s TJ Joseph: The Indian teacher whose hand was cut off for an exam paper

        He was thrown into a prison cell with 15 others, including men accused of murders and selling illicit liquor. The police visited his home and took away his passport, bank documents and other official papers. Most importantly, they had accused him of “blasphemy and defying God”.

      • GannettProtesters shut down Dearborn school board meeting over LGBTQ books

        Not until Dearborn Police Chief Issa Shahin arrived later did the protesters stop their agitation. Shahin pleaded with the crowd to relax and not embarrass Dearborn. There was concern expressed by some community leaders that the protesters are making the city and its Arab American Muslim population look bad. But others said that as Muslims, they have to stand up for their faith.

      • TechdirtChinese City Decides LARPers Are Next In Line For Government Censorship

        The Chinese government is being weird again. Most of this weirdness springs naturally(?) from its desire to suppress dissent and control the narrative.

    • Freedom of Information / Freedom of the Press

      • VOA NewsWife of Jailed RFE/RL Consultant in Belarus Detained

        Meanwhile, the BGM Telegram channel, founded by Darya Losik’s husband, cited several other Telegram channels close to the government as reporting on October 18 that Darya Losik faces a charge over an interview with the Poland-based Belsat, which Belarusian authorities shut down and labeled extremist in July last year.

        The United States has called for the immediate and unconditional release of Darya Losik, a State Department spokesman said at a briefing.

      • The HillBiden, Archives sued over JFK assassination records

        A nonprofit that curates an online collection of John F. Kennedy’s assassination records sued President Biden and the National Archives and Records Administration (NARA) on Wednesday to demand the release of all remaining materials on the former president’s 1963 killing.

        The Mary Ferrell Foundation and two of its members filed the suit in a Northern California federal trial court, asking a judge to throw out Biden’s order last year to postpone the records’ release.

      • NBC‘What are they hiding?’: Group sues Biden and National Archives over JFK assassination records

        The Mary Ferrell Foundation filed the federal lawsuit Wednesday one year after Biden issued a memo postponing the release of a final trove of 16,000 records assembled under the President John F. Kennedy Assassination Records Collection Act of 1992, which Congress passed without opposition in response to Oliver Stone’s Oscar-nominated film “JFK.”

        The JFK records act, signed by President Bill Clinton, required that the documents be made public by Oct. 26, 2017, but President Donald Trump delayed the release and kicked the can to Biden, who critics say continued the policy of federal obfuscation that has existed since Kennedy was assassinated Nov. 22, 1963, in an open motorcade at Dealey Plaza in Dallas.

    • Civil Rights/Policing

      • VOA NewsUN: Killings and Mass Arrests of Protesters in Iran Must Stop

        U.N. human rights officials said they are alarmed by the unabated violent response by security forces against protesters, and reports of arbitrary arrests and the killing and detention of children are also deeply worrying.

        U.N. human rights spokeswoman Ravina Shamdasani said as many as 23 children reportedly have been killed and many injured by security forces who used live ammunition, metal pellets, and fatal beatings.

        She said schools also have been raided, and children arrested by security forces.

      • NPRAthlete Elnaz Rekabi, who competed without a hijab, returns to Iran

        Supporters and Farsi-language media outside of Iran have worried about Rekabi’s safety after she choose to compete without the hijab.


        Rekabi left Seoul on a Tuesday morning flight. The BBC’s Persian service, which has extensive contacts within Iran despite being banned from operating there, quoted an unnamed “informed source” who described Iranian officials as seizing both Rekabi’s mobile phone and passport.

      • Frontpage MagazineProtests in Iran: The Silence of the ‘Feminists’ and ‘Progressives’

        As for the rest of The Squad, silence.

        No call by American feminists and progressives for the collapse of the totalitarian government of Iran. No wholesale condemnation of this police state’s mandate that women wear the hijab and face imprisonment for failing to do so, or for failing to wear it “correctly.” No plea that the Biden administration, at the very least, publicly support the Iranian protesters demonstrating the same kind of courage as have the Ukrainians following the Russian invasion.

      • FirstpostExclusive: ‘Was forced to strip, govt uses sexual violence against female protesters,’ says Iranian Christian activist

        Christian converts and other religious minorities like the Bahais are not recognised in Iran.

        Over the last few years, Mary has faced persecution from the authorities in the form of arrests and interrogations due to her faith as well as activism.

      • Common DreamsUS Progressives ‘Stand in Solidarity’ With Women and Girls Defying Iran’s Oppression

        “As U.S. organizations committed to women’s rights and justice across the world, we stand in solidarity with the brave people of Iran, overwhelmingly Iranian women and girls, who are demonstrating for their basic rights and strongly condemn the outrageous, widespread, and systematic human rights violations of the Iranian government seeking to silence the Iranian people’s demand,” the 39 groups, led by the National Iranian American Council, said in a statement.

      • Metro UKIranian girl ‘beaten to death in classroom for refusing to sing pro-regime song’

        Protests erupted in the northwestern city of Ardabil on Saturday over the death of Asra Panahi, a teenager from the Azeri ethnic minority.

        According to the Coordinating Council of Iranian Teachers’ Trade Associations, the 16-year-old was fatally injured after security forces stormed her classroom, demanding a group of girls sing an anthem praising Ali Khamenei, Iran’s supreme leader.

      • The NationAmid Inflation and Corporate Windfalls, French Workers Are Rising Up

        At the heart of France’s strike movement is inflation.

        Compared to the eurozone average, the country’s annual rate of inflation of 5.6 percent is fairly low—largely thanks to government measures to cap rising energy costs. The state has fixed increases in the price of gas and electricity to 4 percent this year and plans to limit those hikes to 15 percent in 2023. It’s also subsidizing the distribution of gasoline and diesel to keep prices at the pump in check.

        Much of this is the heritage of the Yellow Vests. The government is anxious to avoid provoking an unruly protest movement such as erupted over fuel costs in late 2018. But while state interventions have helped to lighten the burden of rising prices for consumers, something much more fundamental remains unchanged for many workers: Pay is stagnant across much of the French economy. According to France’s labor ministry, wages in the private sector have grown by only 3.5 percent over the past year.

      • Project CensoredThe Potential for a Class I Railroad Strike – The Project Censored Show

        The Official Project Censored Show The Potential for a Class I Railroad StrikePlay EpisodePause EpisodeMute/Unmute EpisodeRewind 10 Seconds1xFast Forward 30 seconds 00:00 /SubscribeShareThe Official Project Censored Show The Potential for a Class I Railroad StrikePlay EpisodePause EpisodeMute/Unmute EpisodeRewind 10 Seconds1xFast Forward 30 seconds 00:00 /SubscribeShare

      • The NationAttorneys General Elections Take Center Stage Post-Roe

        Barely 10 years after women finally secured the right to vote, at a point in the early 1930s when Herbert Hoover was president and Prohibition was the law of the land, an otherwise undistinguished session of the Michigan Legislature passed a sweeping ban on access to abortion. Then, in 1973, the US Supreme Court rendered the law meaningless with its Roe v. Wade decision. But in the wake of the ruling in Dobbs v. Jackson Women’s Health Organization, Michigan’s ghost law, which lingered on the books for more than 90 years, is haunting the present.

      • ScheerpostCuban Adjustment Act of US Still Privileges Cuban Migrants, Hurts Cuba

        The Cuban Adjustment Act is another way the US tries to curtail the Cuban government.

      • EFFAlaa Abd El Fattah Surpasses 200 Days of Hunger Strike as COP27 Summit Nears

        The Egyptian government is ultimately responsible for setting Alaa free. But Alaa is a British citizen and the UK government should also intervene, immediately, to do everything it can to uphold Alaa’s human rights and secure his freedom. In her last days as foreign secretary, now-PM Liz Truss called Alaa’s case a “high priority” and affirmed a commitment to secure his release.

      • Common DreamsOklahoma Inmate Facing Execution After Supreme Court Rejects Appeal

        Lawyers for Benjamin Cole, a 57-year-old sentenced to death for murdering his 9-month-old daughter Brianna Cole in 2002, do not deny that he killed the infant. However, they argue that his severe mental illness and brain damage—which they say have worsened during his imprisonment—are grounds for stopping his execution.

      • Common DreamsOpinion | Common Misperceptions About Refugees

        Refugees and immigrants are one of the reasons that the U.S. is the only western country to count among the top 10 populous countries in the world. However, the population grew at the slowest rate in the U.S. in 2021 since the country’s founding. Reduced refugee and immigration intake has much to do with it. Even though the Biden administration set the limit to 125,000 refugees a year, the actual intake was fewer than 26,000 refugees. 

      • Common DreamsOpinion | If Abortion Is Murder, Then It Looks Like Herschel Walker Is a Murderer

        To my Christian friends in the state of Georgia: Do you believe that an unborn fetus is a human being? If you do, then abortion is murder.

      • Democracy NowRep. Cori Bush on Being Raped, Her Abortions, Police Brutality & Her Journey from Activism to Congress

        As President Biden vows to codify abortion rights if Democrats can control Congress after the midterms, we speak with Democratic Congressmember Cori Bush, who faces reelection this November as a first-term Democrat in Missouri, where abortion was banned after the Supreme Court overturned Roe v. Wade in June. She just wrapped up a “Roe the Vote: Reproductive Freedom Tour.” She discusses her experiences with abortion and much more in her new memoir, “The Forerunner: A Story of Pain and Perseverance in America,” which traces her journey as a registered nurse who took part in Black Lives Matter protests in Ferguson to running for the House of Representatives. “It was not easy” becoming a Black woman politician in a state and country where “true equity or equality” has not yet been achieved, says Bush.

      • Counter PunchEU Deliberately Causes Needless Suffering for Refugees in the Mediterranean

        Many attempting the crossing have not been so fortunate. The International Organization for Migration (IOM) reports that since 2014, more than 17,000 people have died or gone missing en route. In the first three months of 2022 alone, up to 600 peopleattempting to reach Europe have gone missing, per the IOM.

    • Internet Policy/Net Neutrality

      • Telex (Hungary)Internet freedom in Hungary in decline according to Freedom House
      • Repressive regimes around the world are nationalizing the internet and isolating people

        China, Iran, Russia and Cambodia, all authoritarian states, are deeply invested in ensuring the isolation of their people from the global internet.

        They’re among the top countries trying to centralize state control over domestic internet infrastructure, according to Freedom House’s 2022 Freedom on the Net report, which studied internet freedom in 70 countries, making up 89% of the world’s internet users.

        Released on October 18, the report found that global internet freedom has declined for the twelfth year in a row. Rising internet fragmentation, with countries ringfencing their national internet services from the global internet, is one of the main reasons.

      • TechdirtAT&T Hit With $23 Million Fine For Bribing Illinois Lawmaker

        In just the last decade or so AT&T has been fined $18.6 million for helping rip off programs for the hearing impaired; fined $10.4 million for ripping off a program for low-income families; fined $105 million for helping “crammers” rip off their customers; fined $60 million for lying to customers about the definition of “unlimited” data; and accused of ripping off U.S. schools for decades.

      • WiredIran’s Internet Blackouts Are Part of a Global Menace | WIRED

        FOR THE PAST five weeks, thousands of Iranians, led by courageous young women, have taken to the streets of dozens of cities around the country, driven to action by the case of Mahsa Amini, a 22-year-old Iranian woman who died while in the custody of the country’s Morality Police. At tremendous risk to their safety, these young people are demanding an end to years of oppression, burning their hijabs, shearing their hair, and marching in solidarity as the protest anthem Baraye, with its chorus “for women, life, freedom,” echoes through the streets. Authorities have responded with a brutal crackdown in which over 230 Iranians are believed to have died already. The government has also instituted strict internet controls, blocking access to social media and messaging apps, as well as knocking the entire web offline for hours at a time in an effort to stymie organizing and conceal the extent of the protests and the police response.

    • Monopolies

      • Trademarks

        • TechdirtThe Word ‘Emoji’ Is A Protectable Trademark?

          Emoji Co. GmbH has registered trademarks in the dictionary word “Emoji.” They mostly are a licensing organization, and their registrations are in a wide range of classes: “from articles of clothing and snacks to ‘orthopaedic foot cushions’ and ‘[p]atient safety restraints.’” (Raise your hand if you’ve ever seen Emojico-branded patient safety restraints). Indeed, the court essentially questions the entire basis of Emojico’s licensing business, saying:

      • Copyrights

        • TechdirtCopyright Absurdity Rules Over Amazon’s ‘The Rings Of Power’

          J.R.R. Tolkien’s “Lord of the Rings” is one of the best-known and best-loved modern works of literature, not least thanks to Peter Jackson’s films based on the cycle. Given that popularity, it’s no surprise that there was interest in creating adaptations of other Tolkien works. The result is “The Lord of the Rings: The Rings of Power”. According to Wikipedia:

        • Torrent FreakManga Piracy Sites Targeted in US Court Have Reappeared in Russia

          Major Japanese manga publishers requested assistance from a US court this week. The companies say that information held by financial and tech companies will help them file lawsuits against the operators of seven pirate sites, some with ‘Mangaraw’ branding. After previously using Cloudflare’s services, some of the sites are now operating openly from Russia.

        • Torrent FreakNeutral Intermediaries are Not Notorious Piracy Markets, Coalition Warns

          The Internet Infrastructure Coalition, which represents many key Internet companies, is urging the U.S Trade Representative to keep neutral infrastructure intermediaries off its annual list of notorious piracy markets. The coalition calls for clarification to prevent the review process from singling out the wrong targets.

        • Walled CultureA concept that should not exist at all is already implemented: the ‘paying’ public domain – Walled Culture

          A couple of weeks ago, Walled Culture reported on a terrible idea in France: requiring companies to pay for the use of public domain material. As the post explained, this is a subversion of what it means for something to enter the public domain, and a betrayal of the implicit bargain of copyright. Fortunately, the plan was dropped, partly as a result of the outrage it generated.

          Naively, I assumed that this was a lucky escape, but that the idea would be back unless we were on our guard. I was wrong: the idea won’t be back, because it has already been implemented in a number of other countries. For example, Jorge Gemetto pointed out on Twitter that something called the “paying” public domain has existed in Uruguay and Argentina for many years. He linked to an interesting article on the topic by Maximiliano Marzetti, who lists even more countries blighted by this copyright perversion: Algeria, Kenya, Ruanda, Senegal, Republic of the Congo, Côte d’Ivoire, and Paraguay. Marzetti refers to a 2010 report from WIPO, which explore the idea of the “paying” public domain further.

  • Gemini* and Gopher

    • Personal

      • on the prioritization of laughter

        is in the wrong order. in fact, shouldn’t we think it strange that “laugh” is included at all? is humor truly on equal grounds with love and conscious existence itself? what might it look like for a society to prioritize laughter over love?

        laughter is certainly enjoyable, but it’s a dangerous goal on its own. what happens in such a society when a non-normative group emerges? long after widespread fear and disgust of homosexual people has faded, laughter remains, in more circles than I like to accept. this is unacceptable, and it is only one such example.

    • Technical

      • Re: Remote Work Blues

        My pre-pandemic job was 80% on-site, downtown Minneapolis. I got up early, took the bus down the street all the way into the city. Our company had moved downtown a few years prior so there were still a lot of people who originally signed up for a much more local commute, and the company said work part time remote if you want. We were a web services business, no real need to always be in the office if your day to day didn’t require it. I didn’t mind the commute as I wasn’t driving. My wife, however, liked the days when I was Work From Home as it meant I was off work and instantly available. So some Fridays, or weeks with lots of other stuff going on I’d stay home and work out of my home office.


        A big thing I missed about that job was interacting with my coworkers, both in work and non-work activities. We did the little pods with no walls between our cubicles. Everyone sitting so close together that often the entire room would have ongoing conversations while we all typed away.


        I miss having a whiteboard. I am planning on cleaning out my office, which went to shambles when I was WFH 100%, and setting up a board on my wall with an HD webcam pointed at it so I can easily stream what it is I’m writing. Still haven’t found a way to resolve the “hey, sorry to bug you but can you come over here and show me X” part of office life that we are missing.


        Being a software developer you have one of two options. Stick with the companies that are local, or open yourself up to more global opportunities. Before the pandemic there were lots of companies that had remote contractors and full time employees. Some companies were exclusively remote. Doing the remote gig is something a lot of us do. It requires a special type of person and needs to be an active choice. Sadly due to the pandemic many of us didn’t have much choice. Will be interesting to see how many places stay remote only. This may be a more permanent change than we first thought.

      • Trial and Error
        Well, I've needed some technical support with an application I've
        There are two ways to get it:
        The first is by contacting the company, and then wait for some days
        till they call you back, and then let someone guide you step by step
        through the process of installing the application. But prior to them 
        calling me, I had been receiving some ispinning wheel of death and so could not
        complete the installation. And with that person's help, I just get the same
        spinning wheel of death.
        The secret is to try and install time and time again until you pass that
        screen with the spinning wheel of death.
        I don't like it when that moron says that the problem is with my smartphoe
        because everybody else has successfully installed the application.
        Now, guess what? Had only that duce read the review on Google Play, he
        would have known that the application is problematic. Why not just fix it?
      • Command line parsing for shell scripts

        Recently I learned about docopt — idea (anof generating command line parser from help message and implementation for multiple languages; conventional command line parsers do it other way round: help message from the parser. It was pleasant to discover something new in design area that seemed to be fully explored for decades.


        Of course, there is still room for improvement. For example, if user provides unknown option or both of mutually-exclusive options, full usage line is printed without clarification of what exactly was wrong.

        Still, from help message that needs to be written anyway (since getopt does not generate it) decent command line parser is generated. Writing of the shell scripts is much easier now.

      • scorn

        been playing this. never expected it to come out, but it is fitting a hellish game escaped kickstarter hell. it didn’t escape feeling unfinished, though.

      • Science

        • A dolphin is a fish

          Humans really want to put things in categories, so we invent the categories. They don’t exist outside our minds. But we disagree about whether we got them right. There is no right! We invented them, and we invented the rules about what belongs in them.

          Science involves a lot definition of categories that are very precise, but one thing that scientists like doing is taking categories that alrady exist and “fixing” them: a dolphin isn’t a fish; and there’s no such thing as a fish any way. Sometimes the “fix” sticks. We don’t want to sound foolish so we don’t call a dolphin a fish. Sometimes everyone ignores the “fix”. We all carry on talking about fish.

      • Internet/Gemini

        • The perils of selling out

          I received some email from Remy [1] about my post yesterday [2] where they sent along some related links. They received their own badly written sponsored post email [3], and also linked to Kev Quirk’s badly written sponsored post email [4]. I was then reminded of the time I sold out [5] to get that sweet-sweet sponsored money (it wasn’t much—about $100 for seven ads) and the aftermath five years later [6].

      • Programming

        • Shooting Myself in the Foot with Python
        • A Python Foot Gun

          It’s a simple node class that has a list of children. You can pass a list of children when you create the object, or if you don’t supply one it defaults to an empty list.

          There’s something very wrong with this code that’s somewhat obvious with hindsight, but I didn’t catch it until after some time in the debugger.

          So you create a couple empty nodes and then start appending to each one’s children list. Straightforward enough. But what actually happens?


          Thankfully for me this was all in a piece of code less than 50 lines long so I was able to figure things out pretty quickly. I ended up just removing the children parameter from the constructor since I wasn’t really using it anyway and instead I set the children list to a new empty list defined in the constructor body.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

T-Mobile Joins Growing Number of Sites Blocking Firefox in Private Browsing Mode

Posted in Site News at 3:25 am by Guest Editorial Team

Reprinted with permission from Ryan

When you attempt to log in to the T-Mobile Web site using Firefox in Private Browsing Mode, you’ll now be greeted by this message.

Firefox is no longer supported in private mode

The Firefox browser is no longer supported in private mode on our site. To continue, please take Firefox out of private mode or choose another browser. We recommend Chrome, Safari or Edge.

It turns out that what’s going on is there’s a way to detect Firefox is in Private Browsing Mode and Mozilla is not fixing it. Apparently, a number of news sites, including the New York Times, use this to determine if you’re trying to use the Private Browsing Mode to avoid their paywall, which counts how many articles you’re reading using cookies and local storage, and then demands that you pay to continue reading.

They do it by looking to see if Indexed Database API is available, and if it’s not, blocking your browser.

Fortunately, there’s a Firefox extension called Hide Private Mode that fakes support for this. I tested this (by installing it and giving it permission to work in Private Browsing Mode, of course), and found that T-Mobile is no longer able to detect the Private Browsing session, and allows me to log in.

Mozilla has apparently known about the problem since at least ten years ago, but two years ago, they closed this bug to replace it with another bug that describes the same problem and still isn’t fixed.

Too busy adding “Colorways” that expire on January 16th?

I saw the release notes for Firefox 106, and it’s no wonder people are leaving. There’s been pretty much no work on the browser at all, and in this 6 week release, the only improvements have been an updated PDF reader. There weren’t even any Web Platform changes for developers in those notes.

So much for Mozilla.

IRC Proceedings: Wednesday, October 19, 2022

Posted in IRC Logs at 3:23 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmSN8YVhDYq4iz1FyHekFfi3nGvSUaZRqRQHg3FwrJF6zT IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmZJbg7gU9WE9TJpqzXvh6aKyPEFuLdnJApDyL5L4zLpSA IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmVgY3htLExLKQopwVYwp1ghFpAMRLebDMUcrut9aUzyAB IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmUWWvSKTcSD4HcoNJUG4T9cxKk2f5rGJwaXHKYU4mj97D IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmYVabyvh2LBLANc5vMoZTogUiVFkfHuyKWukaMQEX6V1e IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmTxZixvSW4mfcYzus76aCr9efT6HLa84QxHosfGWPw6Cr IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmW2mrKhqh1eXy5TgZymGRfW8Zs2WvQP9DbajS4xKQ9V9T IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmXknfektZnk8KDyDaujWMvmYFv61qSsngxFAvT2jbqKEm IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmQpbKVNQYKS8GikXcbjhn6Pd8QBKST3j18Pt4SWqQ77uE

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts