DRM is ‘Protected’ by Phoronix

Posted in DRM, Hardware at 7:37 pm by Dr. Roy Schestowitz

Video download link | md5sum 2905be7b0686697c888bc869935fee7c
Protected From Scrutiny
Creative Commons Attribution-No Derivative Works 4.0

Summary: x86 stronghold (rather weak lately due to the inflation and Windows failing users) is pushing DRM into kernel space, typically along with Microsoft and Google; Phoronix, which is funded or bossed by the x86 giants, is being far too weak or too “soft” (like it is on Microsoft), insisting that corporations treating clients like they’re criminals is in fact “protected content” (that isn’t independent, honest and courageous journalism, its’s docile cowardice)

THE comments (Forums) in Phoronix sadly remain a lot more informative than the 'articles' because Phoronix self-censors (based on a sixth sense of who pays the bills and/or will pay them in the future).

So the video above dives straight into the comments on the article after a quick introduction. The short story is that Intel is promoting DRM in Linux, once again (not the first time), even though (to quote one comment) “4k streaming works just fine on sites that don’t insist on using DRM. “piracy” is always the technically and morally superior option over complying with corporate copyright bullshit.”

There are many other comments to that effect. The readers aren’t tolerating DRM.

Shown below is now Phoronix fancies describing DRM (the term “DRM” is not even mentioned in the page, just the euphemisms).

Intel's Open-Source OpenGL Driver Adds Support For 'Protected Content'

Red Hat is Bragging, Knowing That It’s Killing People for Profit With Raytheon and Lockheed Martin (That’s Not Freedom, It’s Death)

Posted in IBM, Red Hat at 6:24 pm by Dr. Roy Schestowitz

The latest white-washing spin/slant is “Hey Hi” (like Maven)

Summary: Red Hat, which pretends to have moral high ground over the Free software community, has Red Blood on its hands; today was a reminder of that

THE “ETHICS” of wars — and of militarism in general — are relative; for instance, if another nation invades yours, then you could argue to be defending your home and family. But Raytheon and Lockheed Martin aren’t defending their homeland; they occupy and colonise for the (still most dominant) global empire.

How does Red Hat fit into this? Well, 2 days ago the video above was published and merely 8 hours ago there was another with Red Hat and Lockheed Martin. Those might seem like some friendly reconnaissance drones, but don’t be mistaken. See this keynote from 3 years ago. In Red Hat Summit 2019, Lockheed Martin bragged about war planes. Audience excited by militarism? Of course! Lots of ovations. Also see “Lockheed Martin taps Red Hat for F 22 Raptor”. Bombers, fighters, you name it…

Red Hat!

And no less than 40% of today’s Weekly Roundup from Red Hat was about Lockheed Martin [1, 2]. So Red Hat boasts about killing people with a big client, which must be pocketing a lot of money right now because of the war in Ukraine. And later on they lecture the FSF on ethics?

A few hours ago Red Hat linked to its own paid-for puff piece, which says: “The Lockheed Martin use case was about providing direct control to drones that had already been deployed but might need to have their mission altered in flight.”

Not just drones; also planes that drop very heavy bombs.

It’s not just Lockheed Martin, either.

As we noted a few years ago, Red Hat had rewarded Raytheon (special honours) and it was headed by military generals. It’s like Red Hat is an extension of the Department of War (now euphemistically known as Department of Defence or DoD). Biggest client by far?

Here’s a series of videos where Raytheon reciprocates with Red Hat endorsements [1, 2, 3, 4]. This whole thing is no laughing matter. People are dying. Women and children dismembered by bombs will certainly not be happy to know the missiles were backed by Red Hat(TM) OpenShift(R) at the back end. They will not die happily because of the openwashing.

Earlier today we posted a story about yet another large company that abandons Red Hat. In fact, Red Hat must be running out of high-profile clients and cases studies to boast/brag about. Quite a few dumped the company, seeing what IBM does to the products (formerly “projects”; there used to be an actual community), seeing how many managers leave the company, and spotting the rapid exodus of engineers.

Links 27/10/2022: Ubuntu 23.04 is Lucently Likeable, OpenSSL Patch Coming

Posted in News Roundup at 5:07 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • TiVo Goes Back To The (Linux) Well

      The only item here that really piques my interest is the technological approach. While the current TiVo Stream 4K dongle runs Android TV, the new television platform is described as Linux-based… like their original line of DVRs.

    • Desktop/Laptop

      • Linux GizmosTUXEDO Computers releases InfinityBook Pro 16 Gen7 Laptop

        This week, TUXEDO launched two variations of their latest InfinityBook Pro 16 laptop built around the i7-12700H Intel core processor. TUXEDO’s high-end laptop supports up to 64GB RAM, 2x M.2 2280 slots, Wi-Fi 6, 80Wh battery and other optional features.

        The Max Performance and the Workstation edition feature the same 12th Gen processor from Intel…

    • Server

      • Why K8s deployments need `matchLabels` keyword

        To create a Kubernetes deployment, we must specify the matchLabels field, even though its value must match the one we specify in the template. But why? Cannot Kubernetes be smart enough to figure it out without us being explicit?

    • Audiocasts/Shows

    • Kernel Space

    • Applications

      • Linux Links4 Best Free and Open Source GUI Spotify Clients – LinuxLinks

        First launched in 2008, Spotify is a digital music streaming service with a freemium business model. You can listen to a huge library of music and podcasts for no charge if you are prepared to have shuffle play (with limited skips), interrupted listening and lower audio bitrate. Alternatively, there’s the option of Spotify Premium. In the UK, a subscription costs £9.99 per month for an individual account. This gives you streaming music at 320 kbps, the ability to download music, and full functionality.

        Spotify provide a semi-official app for the service which uses Chromium Embedded Framework (think bloated memory footprint). But third-party clients are available for Spotify Premium users. Spotify blocks API access to their audio for non-premium members.

        This article recommends our favourite GUI Spotify clients. Here’s our verdict summarized in a legendary Linuxlinks-style chart.

    • Instructionals/Technical

      • Make Use OfHow to Run ChromeOS Flex From a USB Drive

        Google launched ChromeOS along with Chromebooks in 2011. The idea was to deliver an economical laptop that could handle basic productivity tasks with ease. It was a fairly lightweight operating system that didn’t need many underlying hardware resources to work.

        After a few years, Google decided to not confine it to Chromebooks and released a lightweight OS that everyone could run on average systems.

      • ID RootHow To Install ModSecurity with Nginx on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install ModSecurity with Nginx on Ubuntu 22.04 LTS. For those of you who didn’t know, ModSecurity is a free and open-source Web Application Firewall (WAF) that protects your website from several types of attacks, including cross-site scripting (XSS), SQL injection, session hijacking, and many more. It also allows for HTTP traffic monitoring, logging, and real-time analysis. ModSecurity was created as a module for the Apache HTTP Server. However, since its early days, the WAF has grown and now covers an array of HyperText Transfer Protocol request and response filtering capabilities for various platforms such as Microsoft IIS, Nginx, and Apache.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of ModSecurity 3 with Nginx on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • KifarunixInstall TheHive on Ubuntu 22.04/Ubuntu 20.04 – kifarunix.com

        Follow through this tutorial to learn how to install TheHive on Ubuntu 22.04/Ubuntu 20.04 server.

      • SUSE’s Corporate BlogThe success continues – 6th edition of ‘Getting started with Linux’ available

        In the editorial, Hans-Georg Eßer, Editor in Chief, highlights that “installing and using Linux has become so easy that there’s no good reason to stick with Windows”. We who live in a Linux world for many years know for quite a while that Linux is ‘the better Windows’. But still – there are people out there who somehow do not dare to touch Linux in their private environment, on their laptops and desktops. Fortunately, the Linux Magazine remains defiant in fighting ignorance with education. The 2022 edition of “Getting Started with Linux” features the latest version of openSUSE Leap, 15.4, and it comes with a DVD containing the software so you can simply check it out yourself.

      • SUSE’s Corporate BlogGet fresh SLE Micro 5.3 docs – all you need to be productive | SUSE Communities

        SUSE Linux Enterprise Micro (SLE Micro) is a lightweight and secure OS platform purpose built for containerized and virtualized workloads. It leverages the enterprise-hardened technology components of SUSE Linux Enterprise and merges that with what developers want from a modern, immutable OS platform. As a result, you get an ultra-reliable infrastructure platform that is also simple to use and comes out-of-the-box with best-in-class compliance. SLE Micro is well suited for any decentralized computing environment such as edge, embedded or IoT deployment without vendor lock-in. Using SUSE Linux Enterprise Micro, you can build and scale differentiating edge systems across a wide range of industries including aerospace, telecom, automotive, defense, healthcare, hospitality, and manufacturing.

        With the recent release of SLE Micro 5.3, we have also published fresh and shiny new documentation – once again, my colleagues Jana Halackova (for the docs) and Lukáš Kucharczyk (for the release notes) did a fantastic job here!

      • Linux Made SimpleHow to install Wire Desktop on Linux Mint 21

        Today we are going to look at how to install Wire Desktop on Linux Mint 21.

        Firstly, we download the application, and then open and install it with the built-in installer.

      • Linux Made SimpleHow to install MultiMC on a Chromebook

        Today we are looking at how to install MultiMC on a Chromebook.

        If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

        This tutorial will only work on Chromebooks with an Intel or AMD CPU (with Linux Apps Support) and not those with an ARM64 architecture CPU.

      • Linux HandbookDir Command in Linux [Examples]

        How do you see the contents of a folder in the Linux terminal? You use the ls command.

        In fact, the ls command is so popular that many Linux users don’t even know about dir.

        Yes, there exists a dir command with the sole purpose of showing you the directory contents. And in this tutorial, I’ll show you how to use it.

      • TechRepublicHow to fix the VirtualBox USB enumeration error and extension pack installation | TechRepublic

        Jack Wallen experienced several errors upon installing VirtualBox 7.0 and he has the fixes for them.

        Recently, I upgraded to VirtualBox 7.0, and it’s been a stellar release for the virtual machine management tool. While some VirtualBox upgrade experiences were less than ideal, the march from 6.x to 7.x was, for the most part, pretty painless. However, there are two issues you will probably encounter, both of which require different fixes.

      • Build a Tailscale exit node with firewalld – Major Hayden

        Once upon a time, I spent hours and hours fumbling through openvpn configurations, certificates, and firewalls to get VPNs working between servers. One small configuration error led to lots of debugging. Adding new servers meant wallowing through this process all over again.
        A friend told me about Tailscale and it makes private networking incredibly simple.
        Tailscale makes it easy to add nodes to a private network called a tailnet where they can communicate. In short, it’s a dead simple mesh network (with advanced capabilities if you’re interested).
        This post covers how to create an exit node for your Tailscale network using firewalld Fedora, CentOS Stream, and Red Hat Enterprise Linux (RHEL).

      • Reload Prometheus ConfigMap without Restarting the Kubernetes Pod | Lisenet.com :: Linux | Security | Networking

        We run Prometheus on Kubernetes. Every time we make changes to Prometheus ConfigMap, we end up restarting the pod so that the new configuration would be picked up.

        While Prometheus configuration does not change very often, we would prefer to have a way to do this without downtime.

      • Convert a root filesystem to a bootable disk image – formicapunk

        The year is 2022, and it is still that complicated to install GRUB2 externally onto a disk image.

        But using the wonders of libguestfs, you can create a bootable diskimage using a qemu VM abstraction very easily. The steps here imply we want to create a disk with a single partition containing the root filesystem.

    • Games

      • fun with pygame – Michael Ablassmeier – ..

        Next year my son will turn 4. I have quit playing computer games for a pretty long time now, but recently i questioned myself: what will be the first computer game hes going to play? Why not create a simple game by myself?

        Living on the landside, his attention has been drawn to farming machines for quite some time now and that topic never grows old for him, which makes for a perfect game setting.

        The game logic should be pretty simple: A tiling 2d jump game where you have to make an tractor jump over appearing objects. Different vehicles and backgrounds to choose and a set of “lives” with randomly generated “coins” which you have to catch to undo happened failures.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • The Register UKKDE 5.26 gets a second point release (yes, already) • The Register

          KDE 5.26.2 is out with an emergency fix for a memory leak – so if you already have the new version, you should update. If you don’t have 5.26, we’re here to tell you how.

          The version first appeared on October 11 with a bunch of new features that we described when we looked at the beta in September. Version 5.26.1 followed a week later with some relatively minor bug fixes. Another week after that, version 5.26.2 is here, and sadly, the developers had to disable one of the fun new bits: animated wallpapers.

          If you use Wayland, it’s fine, but on X11 this leaks memory, and 5.26.2 turns the feature off. We suspect it will reappear in version 5.26.3 if the team can trace the leak.

  • Distributions and Operating Systems

    • New Releases

      • Make Use OfZorin OS 16.2 Lands With Enhanced Windows App Support

        Zorin OS also comes with new fonts and a spruced-up LibreOffice, but will it make people want to switch from Windows?

        The Zorin Group has announced the availability of Zorin OS 16.2. The Ubuntu-based distribution offers a greater ability to run Windows applications on the system.

      • LinuxiacZorin OS 16.2 Is Here as the Best Linux Distro for Windows Users

        Zorin OS 16.2 includes an updated app base, an improved office experience, and enhanced support for Windows apps.

        Zorin OS is a Ubuntu-based Linux distribution that aims to make life easier for new users, especially those from Windows.

        The distribution has a beautiful user interface with which Windows 11 users will feel comfortable. Moreover, Zorin includes many well-known productivity tools.

        Today, seven months after the previous 16.1 release, Zorin OS 16.2 is available for download. So, without further ado, let’s see what’s new.

    • Fedora Family / IBM

      • SDx CentralRed Hat Shrinks OpenShift for Device Edge

        The Lockheed Martin use case was about providing direct control to drones that had already been deployed but might need to have their mission altered in flight.

      • Red Hat OfficialLockheed Martin, Red Hat Collaborate to Advance Artificial Intelligence for Military Missions

        Lockheed Martin and Red Hat today announced a collaboration to advance artificial intelligence (AI) innovation at the edge on Lockheed Martin military platforms. Adopting the newly announced Red Hat Device Edge will enable Lockheed Martin to support U.S. national security missions by applying and standardizing AI technologies in geographically constrained environments.

    • Canonical/Ubuntu Family

      • OMG UbuntuUbuntu 23.04 Codename Revealed – And It’s a Lucently Likeable Label – OMG! Ubuntu!

        The codename for next year’s Ubuntu 23.04 release has been revealed.

        According to Launchpad, home of Ubuntu development, and a cryptic tweet from the official Ubuntu Twitter account, it appears that Ubuntu 23.04 will be labelled “Lunar Lobster”.

        Rather a lively combination with which to liken the next interim release of the much-loved desktop Linux distribution, isn’t it — but what does it mean?

  • Free, Libre, and Open Source Software

    • Events

    • Productivity Software/LibreOffice/Calligra

    • Programming/Development

      • Alberto Mardegan: Performance reviews | Mardy

        It happened a few times during my career, that I found myself in a team with a colleague whose productivity was close to zero. In most of these cases it was simply a matter of people who hadn’t the skills and happened to choose the wrong career path, and in one case it was actually an excellent developer, but just slacking off. Regardless of the case, in many of these occasions it looked like the team manager hadn’t noticed the poor performance of the individual in question, whereas this was rather obvious to the rest of the team. I’m not sure why the managers didn’t notice the black sheep, but the point is that none of the other developers did raise the issue either: why would I report a fellow colleague, who might risk losing his job because of my evil tongue?

        So, Scrum to the rescue? Not quite. As a matter of fact, while it is true that an underperformer could be easily spotted by seeing how often he fails to complete his stories in the timeframe suggested by the story points, this information is generally accessible to the product owner, whereas the line manager might not attend the Scrum meetings at all (as was the case in a previous project of mine, where the line manager was completely detached from the project); and even if the line manager had this information, it’s not a given that he’d make use of it — as a matter of fact, I cannot say with certainty that the line managers did not notice those underperforming colleagues of mine; maybe they noticed, but failed to intervene for some reason?

  • Leftovers

    • IBM Old TimerIrving Wladawsky-Berger: The Latest Trends in Work from Home (WFH)

      For years, companies and governments found all kinds of reasons for not embracing work from home, virtual meetings, telemedicine, online learning, and other online applications. But, the pandemic forced us to accelerate the digital transformation of the economy and society to help us cope with the crisis. And, not only have these digital applications worked remarkably well, but they offer a number of important benefits, like not waiting for a straightforward doctor diagnosis in a room full of sick people, and not having to travel for hours to participate in a 60 minute meeting.

      For example, about a year ago I participated in an online panel. To start with, the moderator asked each panelist to introduce ourselves and to briefly say something positive about our lives over the past year despite the obvious challenges of coping with Covid. I truly struggled to find something positive to say about the highly frustrating pandemic-induced limitations of the previous year.

      But finally, I did find something positive to say. I’ve been able to attend a number of meetings, including weekly lunch seminars, that pre-pandemic required me to drive for a few hours or catch a plane. In response to the pandemic, these meeting first changed from physical to online, and more recently to hybrid. In other words, my ability to attend such meetings from home was my one pandemic-induced benefit, a major one the more I thought about it.

      Work from home (WFH) has been around for decades, modestly growing in the 1990s with the rise of the internet. The share of WFH three or more days per week was under 1% in 1980, 2.4% in 2010, and 4.0% in 2018. Then came Covid-19, forcing tens of millions around the world to work from home and triggering a mass workplace experiment that broke through the technological and cultural barriers that had prevented its adoption in the past.

    • Science

      • I CringelyPaul Graham’s Legacy | I, Cringely

        Last week there was a press release you might easily have missed. A Distributed Autonomous Organization (DAO) called OrangeDAO is cooperating with a small seed venture fund called Press Start Capital to establish the OrangeDAO X Press Start Cap Fellowship Program for new Web3 entrepreneurs. Successful applicants get $25,000 each plus 10 weeks of structured mentorship plus continued access to the more than 1200-member OrangeDAO network. In exchange, OrangeDAO and Press Start get to invest in the resulting companies, if any, produced by the class.

        Big deal, it’s Y Combinator Junior, right?

        Wrong. It’s Y Combinator on steroids.

        This second-generation YC has been released in the wild where it will replicate and grow unconstrained. Expect to see more deals like this one.

        A Distributed Autonomous Organization is a financial partnership that leverages blockchain technology to help multiple users make decisions as a single entity. There are many DAOs around and hardly anybody understands them or knows what they are good for. Mainly they have seemed to be involved in the NFT market. But OrangeDAO is different. It has 1200+ members and every one of those members is a graduate of the Y Combinator startup accelerator. They are verified Y Combinator company founders, so they’ve all had similar entrepreneurial experiences and see business much the same way as a result. OrangeDAO seems to have big plans and to make those plans happen in August the DAO, itself, raised $80 million in venture capital, with their first use of that capital being these Fellowships.

    • Hardware

      • IT WireChina 3Q smartphone shipments better than 2Q, but down on 2021

        Smartphone shipments in China during the third quarter of 2022 increased marginally over the previous three months but, at 70.0 million units, represented a 11% year-on-year fall.

        The technology analyst company Canalys said in a statement that local manufacturers vivo and Oppo – both part of B.B.K Electronics – took the first and second spots, shipping 14.1 million units and 12.1 million units respectively. OnePlus shipments are now reported as part of Oppo’s figures.

        Honor, the low-budget seller formerly owned by Huawei, was third with 12.0 million units, while Apple (11.3 million units) and Xiaomi (9.0 million units) made up the top five.

    • Security

      • GoogleRC4 Is Still Considered Harmful

        I’ve been spending a lot of time researching Windows authentication implementations, specifically Kerberos. In June 2022 I found an interesting issue number 2310 with the handling of RC4 encryption that allowed you to authenticate as another user if you could either interpose on the Kerberos network traffic to and from the KDC or directly if the user was configured to disable typical pre-authentication requirements.

        This blog post goes into more detail on how this vulnerability works and how I was able to exploit it with only a bare minimum of brute forcing required. Note, I’m not going to spend time fully explaining how Kerberos authentication works, there’s plenty of resources online. For example this blog post by Steve Syfuhs who works at Microsoft is a good first start.

      • Dark Reading4 Reasons Open Source Matters for Cloud Security

        When we depend on an open commons as our computing foundation, we need it to be secure, and the most effective way to do that is through open solutions.

      • ZDNetOpenSSL warns of critical security vulnerability with upcoming patch | ZDNET

        We don’t have the details yet, but we can safely say that come Nov. 1, everyone — and I mean everyone — will need to patch OpenSSL 3.x.

    • Monopolies

      • Patents

        • The USPTO Must Restore America Invents Act Proceedings – Patent Progress

          Over the past decade, the Leahy-Smith America Invents Act of 2011 has been discussed and debated extensively in intellectual property circles. Given the potential for new USPTO rulemaking on the horizon, however, it is worth revisiting why it has become necessary for the Patent Office to restore key AIA proceedings to function as Congress originally intended.

          I worked hard for the reforms contained in the America Invents Act (AIA), and applauded its passage as “the kind of reform that is necessary to set America back on track toward a prosperous future” and as a key step to “promote progress and innovation.” The AIA was a critical update to a patent system that was stuck in the past, placing a renewed focus on patent quality and reining in litigation abuses.

          Our Founding Fathers considered intellectual property rights essential, going so far as to include them in Congress’s enumerated powers. By passing the AIA, Congress upheld our end of the bargain to promote progress. Analysis has shown that from 2014 to 2019, the AIA resulted in an increase of $2.95 billion in U.S. gross product and $1.41 billion in personal income. Among the largest beneficiaries was the manufacturing industry, which accounted for almost half of the gross product gains. These numbers do not lie. When we make improvements to our patent system, we are also supporting economic growth.


          I will be watching closely in the coming months for formal rulemaking regarding the Fintiv factors and IPR more generally. Reforms that restore AIA proceedings to their original promise would encourage greater innovation and “promote the Progress of Science and useful Arts.”

  • Gemini* and Gopher

    • Personal

      • Extreme lizards, Brevard NC edition

        “Ah yeah. Ooh ahh. That’s how it always starts. Then later there’s the running and the screaming.”

      • Gotta find something to do next

        Now that I’ve been released from that garbagefire of an organization, I need to find something to do. It’s been about a week since I was let go, so I think I’d like to have some travel plans set by this time next week. I’d love to go by train somewhere, perhaps Canada. I’ve heard that VIA Rail is great.

      • Enoying the Big Blue Room

        The sun is out, there’s not a cloud in the sky, and the temperature is cool but not unbearibly so (for a Floridian) and I’m sitting out in, I guess for lack of a better term, the garden of The Bromfield Inn [1].


        A nearby church is giving an improptude concert with the church bells. I wasn’t aware that American churches even had bells anymore. How neat!

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

More Problems With Google’s “Insecure Apps” Alert and SeaMonkey Mail

Posted in Google, Protocol, Security at 3:44 pm by Guest Editorial Team

Reprinted with permission from Ryan

I went to get my email yesterday using SeaMonkey Mail over IMAP.

Google logged me out of OAuth and then SeaMonkey said it failed to fetch my mail.

So I tried to log back in and it said I had an “insecure app” and to try again with another “app”.

After playing around with the User Agent again, I noticed that Firefox 106’s would work, but since Mozilla releases Firefox versions every 6 weeks, and Google is obviously making it impossible to continue logging in using the older version after another week or so, I decided to play around with User Agents until I found something that worked.

It turns out Firefox 102’s user agent doesn’t work for OAuth even though it’s an ESR.

So I decided to fake a Thunderbird “102.12” on “Windows 10” UA.

Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.12.0

I don’t know if Google logs you out and pops up an “insecure app” alert over minor revisions to Thunderbird, but it’s likely. The current release is actually 102.4 according to the Web site. This 102.12 bogus UA would therefore probably buy me about 8-9 months before I have to come back and bump it again.

You can use this value for these “new string”s in about:config




And that should be the last you hear about Google for a while.

You will obviously have to come back and bump it again sometime next year.

My guess is that when the next major version is out, use that followed by “.12.0 at the end of the Thunderbird part at the end, but not on the Gecko version.

OAuth is turning into a major usability disaster and there’s not any guarantee that simple UA hacks will keep SeaMonkey working. Google could actually resort to testing browser features that it knows are only in the latest “supported” applications.

Links 27/10/2022: Zorin OS 16.2 and GNUnet 0.18.0

Posted in News Roundup at 3:15 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • LWNThe search for the correct amount of split-lock misery [LWN.net]

        Unlike many other architectures, x86 systems support atomic operations that affect more than one cache line. This support comes at a cost, though, in terms of overall system performance and, even, security. Over the last few years, kernel developers have worked to discourage the use of this sort of “split-lock” operation. Now, though, one group of users is feeling a little too discouraged, leading to a discussion of how much misery can appropriately be inflicted upon users who use problematic but architecturally legal operations.

        The problem with atomic operations that cross cache-line boundaries is that the system bus must take special measures to ensure that both cache lines are simultaneously protected from concurrent access. In practice, that means locking the bus for the duration of the operation, which can stall every other processor in the system. A malicious program executing a tight loop with a split-lock operation can destroy the performance of the system as a whole. For this reason, split-lock operations have long been frowned upon.

        Unfortunately, software that is malicious (or just poorly written) turns out to be remarkably indifferent to even the most severe of frowns. So, starting in 2019, kernel developers sought more persuasive ways to get their point across. The initial work was done by Fenghua Yu but, in the end, this patch by Peter Zijlstra was merged in January 2020 for the 5.7 kernel release.

      • LWNThe rest of the 6.1 merge window

        Linus Torvalds released 6.1-rc1 and closed the 6.1 merge window on October 16; at that point, 11,537 non-merge changesets had been pulled into the mainline repository. That is considerably less than the 13,543 changesets pulled during the 6.0 merge window, but quantity is not everything: there were quite a few significant changes brought in this time around. Many of those were part of the nearly 5,800 changesets pulled since our first 6.1 merge window summary; read on for a look at some of the work done in the latter part of this merge window.

      • LWNIdentity management for WireGuard

        Since its inclusion in the Linux kernel, the WireGuard VPN tunnel has become increasingly popular. In general, WireGuard is simpler to configure than other VPNs, but the approach that it takes to authentication can present some challenges. Each node in a WireGuard network has a cryptographic key that serves as the node’s identity; nodes that do not know each other’s keys cannot directly communicate. Keeping track of these keys and distributing them to the other nodes in a mesh network quickly becomes a chore as the network grows. Fortunately, there are now several open-source tools that can automate the management of these keys and make using WireGuard easier for both administrators and end users.

        Key management can be particularly challenging for non-technical end users, who are used to logging into services with a username and password. Thus, the main feature that all of these tools have in common is that they allow a user to log into a WireGuard network using a username and password (and possibly a second factor, such as a one-time password). This is usually accomplished by integrating with an identity provider that implements the OpenID Connect (OIDC) standard. OIDC is built on top of the OAuth 2.0 protocol and can be used to implement the ubiquitous “Sign in with Some Big Company” functionality seen on many web sites.

        Some of the software discussed in this article requires an OIDC provider; there are several open-source options for people who aren’t already running their own and don’t want to farm the task out to some big company. Keycloak is one of the most mature and popular choices and Authelia is an up-and-coming alternative.

      • LWNA first look at Rust in the 6.1 kernel [LWN.net]

        October 13, 2022 There have been a lot of significant changes merged into the mainline for the 6.1 release, but one of the changes that has received the most attention will also have the least short-term effect for users of the kernel: the introduction of support for the Rust programming language. No system with a production 6.1 kernel will be running any Rust code, but this change does give kernel developers a chance to play with the language in the kernel context and get a sense for how Rust development feels. Perhaps the most likely conclusion for most developers, though, will be that there isn’t yet enough Rust in the kernel to do much of anything interesting.

        Work on Rust for the Linux kernel has been going on for a few years, and it has resulted in the creation of a lot of support code and some interesting drivers to look at. There are other initiatives underway, including the writing of an Apple graphics driver in the Rust language. For the initial merge into the mainline kernel, though, Linus Torvalds made it clear that as little functionality as possible should be included. So those drivers and their support code were trimmed out and must wait for a future kernel release. What is there is the support needed to build a module that can be loaded into the kernel, along with a small sample module.

    • Applications

      • MedevelSFTPGo: Open Source SFTP Server with WebDAV Support

        SFTPGo is a feature-rich open source SFTP server that offers HTTP/S, FTP, FTPS, and WebDAV support.

        It also supports several storage backends as local filesystem, encrypted local filesystem, S3 (compatible) Object Storage, Google Cloud Storage, Azure Blob Storage, SFTP.

        The project is written in the Go programming language. It is an ideal solution for enterprise companies and creative team which require something fast and efficient.

      • Medevel15 Open Source WebDAV Servers

        WebDAV is an extension protocol to HTTP that allows users to create, move and edit remote documents on the server.

        WebDAV is widely used for file sharing, file collaboration between teams and groups. It is widely used in many enterprise apps as groupware, and ERP solutions.

    • Instructionals/Technical

      • Barry KaulerProblem with mount utility when non-root

        Posting about this, in case anyone else is puzzled by the behaviour of the ‘mount’ utility.

        I am working on running EasyOS as user “zeus”, where zeus has administrator rights. That means you don’t have to prepend “sudo” to do stuff, such as mount a partition.

        No problem with ‘mount’ in busybox, mounting and unmounting work when running as user zeus. Busybox in Easy is currently version 1.32.0.
        The ‘util-linux’ package is version 2.35.1, and it has the “full” ‘mount’ utility, currently named /bin/mount-FULL

        I do intend to get rid of that weird name, just have the one /bin/mount. Busybox mount does almost everything the “full” mount does, except “mount -t ext4 -o offset=<number> imagefile mntpt” does not work — that “offset” parameter isn’t recognized. However, I looked at the source for version 1.35.0 and it looks like that parameter is now supported.

      • Barry KaulerBusybox 1.34.1 compiled in OE
      • DebugPointCustomize GNOME 42 with A Polished Look

        A tutorial on how you can give your favourite GNOME desktop a polished look, in 5 minutes.

        There are many ways you can customize your favourite GNOME desktop with icons, themes, cursors and wallpapers. This article shows you how to give the GNOME 42 desktop a more polished look. The GNOME 42 desktop environment is available with the recently released Ubuntu 22.04 LTS and Fedora 36.

        Before you read further, here’s how it looks with a side by side comparison (before and after).

      • CitizixHow to run Kafdrop the Kafka Web UI in Docker and Docker compose

        Kafdrop is a web UI for viewing Kafka topics and browsing consumer groups. The tool displays information such as brokers, topics, partitions, consumers, and lets you view messages. Apache Kafka is an open-source platform. Kafka was originally developed by Linkedin and was later incubated as the Apache Project.

      • CitizixHow to run Apache Kafka in Docker and Docker Compose

        Apache Kafka is a distributed event store and stream-processing platform. It is an open-source system developed by the Apache Software Foundation written in Java and Scala.

      • Make Use OfHow to Install and Use Proton GE on SteamOS and Linux

        Proton GE is a bleeding-edge version of Steam’s Proton. It adds many patches and fixes ahead of main Proton releases. Proton GE even has a counterpart for non-Steam games called Wine GE. Many Linux gamers consider Proton GE and Wine GE to be essential software for Linux gaming.

        Proton GE and Wine GE are also easy to install. You can either install them manually or through an app. Linux gamers can use this guide to get Proton GE and Wine GE in a breeze. This tutorial will work for Steam Deck users, as well as any desktop running a Linux distribution.

      • Make Use OfHow to Download YouTube Videos on Linux Using yt-dlp

        yt-dlp is a command-line tool that lets you download YouTube videos and playlists to save them offline for later. Here’s how to use it on Linux.

      • TechRepublicHow to install the new GNOME Console terminal emulator on Ubuntu-based distributions | TechRepublic

        If you’ve been following along with the latest GNOME desktop news, you’re probably aware that there’s a new terminal emulator around. Say goodbye to GNOME Terminal and say hello to GNOME Console.

        This new app is a part of the new GNOME direction which aims to clean up and simplify the user interfaces such that any would feel instantly familiar with the UI. I’m here to tell you that the developers have done a remarkable job with the new console tool.

        To be fair to GNOME Terminal, I will say that GNOME Console does feel like a stripped-down version. It doesn’t offer nearly the customizations of Terminal, so for some it might seem a bit barebones, but it is clean looking and makes using the command line much simpler.

      • H2S MediaHow to Install Docker Desktop GUI on Ubuntu 22.04 LTS Linux

        Tutorial to install Docker Desktop GUI on Ubuntu 22.04 Linux LTS Jammy JellyFish and manage containers using a Graphical user interface.

        The general way to manage Docker containers is by using the command line interface. However, those who are beginners or just want a Graphical use interface to manage their Docker images and containers can go for “Docker Desktop” for Linux.

        It is an easy-to-install free application provided by the developers of Docker. We can install it on Mac, Linux, and Windows operating systems. However, larger enterprises with more than 250 employees need to purchase a paid subscription.

        The benefit of using Docker Desktop is, it offers a simple interface that let users manage containers, applications, and images on their local PC without touching the command line.

      • Port SwiggerInstalling Burp’s CA certificate in Chrome – Linux
      • LinuxTutoHow to Install phpBB on AlmaLinux 9 – LinuxTuto

        phpBB is an acronym for PHP Bulletin Board. It is a fully scalable and customizable open-source forum written in PHP. It can be used to to create forums, start topics and share ideas.

      • HowTo ForgeHow to run Python Scripts with Apache and mod_wsgi on Ubuntu 22.04

        The Apache module mod_wsgi provides an interface for hosting Python-based web applications.

      • HowTo ForgeImplementing SSL Perfect Forward Secrecy in NGINX Web-Server

        This HOW-TO describes the process of implementing Perfect Forward Secrecy with the NGINX web-server on Debian and Ubuntu systems.

      • VideoHow To Execute a Bash Script Without ./ – Invidious

        Since Bash looks in the default locations for commands to execute at the CLI, we need to add the “./” proceeding the command.

      • Windows CentralHow to run any Linux distro alongside Windows 11 | Windows Central [Ed: Misleading. The Microsofters suggest running fake 'Linux' which is in fact Windows spyware crippled by design to make GNU/Linux looks bad]

        or 21H2, if you are a developer, network administrator, or advanced user who needs to use Linux tools, you don’t need a second computer since the system offers different solutions to run Linux alongside Windows, including the Windows Subsystem for Linux and Hyper-V.

      • HowTo ForgeHow to Setup APT Proxy on Ubuntu 22.04 LTS

        A proxy server is an intermediate server that sits between the client computer and the internet. In this tutorial, we will show you how to set up proxy settings and apt-proxy in Ubuntu 22.04 Server and Desktop system.

      • Red Hat Official7 Linux commands to gather information about your system | Enable Sysadmin

        Get information about your CPU, storage, RAM, BIOS, and more without leaving the terminal.

      • Linux HintSMTP Commands: Essential SMTP Commands and Response Codes

        The ASCII Simple Mail Transfer Protocol (SMTP) comes with an array of commands and response codes. It functions on a client-server interface and uses TCP port 25. Since SMTP sessions are conversations between SMTP clients and SMTP servers, SMTP commands are often sent from the client machine to the server device.

        Every command should consist of the keyword for the command and zero or more arguments. So, while some keywords contain one or more arguments, the keywords for several commands will not have any accompanying arguments.

        The commands can either be supported by SMTP, CSSMTP, or both. Notably, a client sends commands in alphabetical characters while the server responds using numerical codes.

      • Linux HintReferential Integrity

        Referential Integrity is discussed in this tutorial in the relational database context. Referential integrity is a data property, stating that all its references are valid. Two tables are concerned here. One is called the referenced or parent table. This referenced table has a primary key, which may be made up of one or more columns. The other table has a foreign key whose values are the same as those of the primary key of the referenced table. The other table is referred to as a child table to the parent table.

        The number of columns that make up the foreign key in the child table is the same as those that make up the primary key in the referenced (parent) table. All the foreign key values are found in the column of the primary key. However, the values in the foreign key column may repeat in the child table.

      • Linux HintBoyce–Codd, Fourth and Fifth Normal Forms
      • Linux HintInstall Mate Desktop on Debian 11

        As time passes, one can get bored with the same interface, which can be frustrating because we all need something new at some point in our lives, and the same goes with Debian 11, in which the default theme isn’t good enough for most of the users. So, today we will help you change the appearance of your Debian 11 desktop environment by installing Mate Desktop, which has a new, exciting, and beautiful look.

        This article will cover all aspects of Installing Mate Desktop on Debian 11.

      • Linux HintInstalling Google Chrome in openSUSE

        “Developed and maintained by Google, Google Chrome is one of the most popular web browsers. At the time of writing, Chrome has around 70% of the browser market share across all devices. It’s a cross-platform web browser that’s free of charge.”

        This guide will teach us how to install Google Chrome in openSUSE.

      • DebugPointHow to Fix – Failed to Start Light Display Manager Error [Solved]

        This post guides you on fixing the error – Failed to Start Light Display Manager Error in Linux systems.

        I know it’s not a good feeling when you expect something to come up on the screen and suddenly face this particular error. It is uncomfortable because you are lost in a terminal and unsure of what to do.

        If you follow some steps, it’s easier to fix. So, let’s try to fix it.

      • Linux HintHow to Fetch Cluster Information in Cassandra
      • DebugPoint[Tutorial] How to Install Oracle VirtualBox in Ubuntu and Linux Mint

        Oracle’s VirtualBox is a virtualization application which brings several advanced features. It can dynamically allocate virtual machine storage, USB, networking, NVMe support and so on. However, other free and open-source virtual machine apps are available such as virt-manager, GNOME Boxes, etc. They have their own benefits and features. However, VirtualBox is a little advanced, hence ideal for experienced users.

        Here’s how you can install it in Ubuntu and Linux Mint (latest versions). And these steps also should work in Debian and other Debian & ubuntu-based distros.

    • Games

    • Desktop Environments/WMs

      • DebugPoint10 Lightweight Linux Distributions for your Old Hardware in 2022

        We highlight a list of 10 lightweight Linux Distributions ideal for your older PC in 2022. We give you their features and what makes them perfect for reviving older hardware.

        We believe that you should not throw away any hardware, especially PC and its components. Ideally, well-designed software should always run on any hardware. There are many Linux Distributions specifically designed for older hardware and PCs. And you can quickly revive them with the help of these Linux operating systems. In this post, we highlight ten such Linux Distributions which are lightweight and old hardware friendly in 2022.

      • GNOME Desktop/GTK

        • The Register UKThe GNOME Project is closing all its mailing lists • The Register

          The GNOME Project is preparing to shut down its mailing lists due to problems maintaining the project’s GNU Mailman instance – which relies on Python 2 – and a lack of moderators.

          The community’s leaders maintain a substantial selection of mailing lists, hosted via the GNU Project’s Mailman tool. It also hosts its own instance of the Discourse web forum tool, notably also used by Canonical to host the official Ubuntu forums.

          That’s going to change, and very soon: at the end of this month. Announcements on several of the lists, such as here on the list for the Evolution email client, state that the lists are closing down, and discussions must move to Discourse.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Web Browsers/Web Servers

      • Mozilla

        • Chris H-C: This Week in Glean: Page Load Data, Three Ways (Or, How Expensive Are Events?)

          At Mozilla we make, among other things, Web Browsers which we tend to call Firefox. The central activity in a Web Browser like Firefox is loading a web page. It gets done a lot by each and every one of our users, and so you can imagine that data about pageloads is of important business interest to us.

          But exactly because this is done a lot and by every one of our users, this inspires concerns of scale and cost. How much does it cost us to learn more about pageloads?[0]

          As with all things in Data, the answer is the same: “Well, it depends.”

          In this case it depends on how you record the data. How you record the data depends on what questions you hope to answer with it. We’re going to stick to the simplest of questions to make this (highly-suspect) comparison even remotely comparable.

    • GNU Projects

      • GNUnetGNUnet 0.18.0 released

        We are pleased to announce the release of GNUnet 0.18.0.
        GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old insecure Internet protocol stack. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and applications towards the creation of a GNU internet.

        This is a new major release. It breaks protocol compatibility with the 0.17.x versions. Please be aware that Git master is thus henceforth (and has been for a while) INCOMPATIBLE with the 0.17.x GNUnet network, and interactions between old and new peers will result in issues. 0.17.x peers will be able to communicate with Git master or 0.18.x peers, but some services – in particular the DHT – will not be compatible.
        In terms of usability, users should be aware that there are still a number of known open issues in particular with respect to ease of use, but also some critical privacy issues especially for mobile users. Also, the nascent network is tiny and thus unlikely to provide good anonymity or extensive amounts of interesting information. As a result, the 0.18.0 release is still only suitable for early adopters with some reasonable pain tolerance.

    • Programming/Development

      • CollaboraFrom Lua to JSON: refactoring WirePlumber’s configuration system

        Refactoring WirePlumber’s configuration system is the first big feature I took up since I joined the PipeWire/WirePlumber team a year back. It’s a year well spent in my professional life, hanging around with caring people and truly open source technology. With what I have seen in the multimedia stacks, I honestly believe PipeWire is the next generation multimedia server and WirePlumber playing the role of enhancing its utility and appeal.

        Let me cut back to the subject at hand.

      • OpenSource.comTrick Lua into becoming an object-oriented language | Opensource.com

        Lua isn’t an object-oriented programming language, but a scripting language utilizing C functions and a C-like syntax. However, there’s a cool hack you can use within Lua code to make Lua act like an object-oriented language when you need it to be. The key is in the Lua table construct, and this article demonstrates how to use a Lua table as a stand-in for an object-oriented class.


        The term “object-oriented” is a fancy way of describing, essentially, a templating system. Imagine you’re programming an application to help users spot and log zombies during a zombie apocalypse. You’re using an object-oriented language like C++, Java, or Python. You need to create code objects that represent different types of zombies so the user can drag them around and arrange them on a map of the city. Of course a zombie can be any number of things: dormant, slow, fast, hungry, ravenous, and so on. That’s just textual data, which computers are good at tracking, and based on that data you could even assign the virtual “object” a graphic so your user can identify which general type of zombie each widget represents.

      • QtQt for Python: the release, what?

        We regret to inform you that during the 6.4.0 release, we were attacked by release goblins.

      • Raku

        • DEV CommunityDon’t fear the grepper! (4) – DEV Community

          The grep method allows one to filter a list of values: either a value gets through, or it does not. In this way, the functionality of grep is rather limited.

          What if you would not only like to filter out unwanted values, but also would like to adapt an acceptable value on the fly? Or turn a single value into multiple values? With the map method, you can!

          The map method provides a superset of the functionality of grep. But you can also use it as grep with a block to do the filtering (instead of using something to smart-match against).

          In many ways, understanding map well, will make understanding a lot of aspects of the Raku Programming Language a lot easier! So let’s focus on that a bit.


          This concludes the fourth part of the series, this time introducing the map method. And also introducing the concept of Empty, and Slip in general. And also showing that you can have a statement modifier version of if if you don’t need an else or an elsif.!

          Questions and comments are always welcome. You can also drop into the #raku-beginner channel on Libera.chat, or on Discord if you’d like to have more immediate feedback.

      • Kernel

        • “Old/weird laptops” sought to help test Linux kernel backlight drivers | Ars Technica

          Do you have a laptop that’s either “pretty old” or “weird in some other way”? Did it ship without Windows from the factory, or did you flash its firmware with coreboot? You could help the Linux kernel move its backlight code forward without abandoning quirky gear like yours.

          Hans de Goede, a longtime Linux developer and principal engineer at Red Hat, writes on his Livejournal about the need to test “a special group of laptops” to prevent their backlight controls from disappearing in Linux kernel 6.1.

          Old laptop tests are needed because de Goede is initiating some major changes to user-space backlight controls, something he has been working on since 2014. As detailed at Linux blog Phoronix, there are multiple issues with how Linux tries to address the wide variety of backlight schemes in displays, which de Goede laid out at the recent Linux Plumbers Conference. There can be multiple backlight devices operating a single display, leaving high-level controls to “guess which one will work.” Brightness control requires root permissions at the moment. And “0″ passed along as a backlight value remains a conundrum, as the engineer pointed out in 2014: Is that entirely off, or as low as the display can be lit?

        • Kernel 6.1-rc# might break backlight control on old/weird laptops, please test: hansdegoede — LiveJournal

          I have landed a large(ish) refactor of the ACPI/x86 backlight detection code in the kernel for 6.1. I have been very careful to try and not break things but there is a special group of laptops where the ability to control the backlight brightness may disappear because of this.

          The most likely laptops to be hit by this are laptops which are either pretty old and or which are weird in some other way (e.g. flashed with coreboot, did not ship with Windows as factory os, …). Note Chromebooks are affected by this too, but that special category has already been fixed.

          You can check if your laptop is affected by this by running “ls /sys/class/backlight” if this shows only 1 entry and that entry is named “intel_backlight”, “nouveau_bl”, “amdgpu_bl0″ or “radeon_bl0″ then your laptop might be affected.

        • Drew DeVaultNotes from kernel hacking in Hare, part 3: serial driver

          Today I would like to show you the implementation of the first userspace driver for Helios: a simple serial driver. All of the code we’re going to look at today runs in userspace, not in the kernel, so strictly speaking this should be “notes from OS hacking in Hare”, but I won’t snitch if you don’t.

          Note: In the previous entry to this series, I promised to cover the userspace threading API in this post. I felt like covering this instead. Sorry!

          A serial port provides a simple protocol for transferring data between two systems. It generalizes a bit, but for our purposes we can just think of this as a terminal which you can use over a simple cable and a simple protocol. It’s a standard x86_64 feature (though one which has been out of style for a couple of decades now), and its simple design (and high utility) makes it a good choice for the first driver to write for Helios.

      • PHP

      • Java

        • Linux HintJava Substring

          “The java substring is a part of the java main string. As the java strings are immutable, the initial string is left unchanged, and a new string is returned by this function. The new string is the substring from the string. To extract the desired substring using the substring method, we must provide the starting index and ending index as input. The substring returned from this method depends on the index value assigned to it.”

      • Rust

        • LWNBos: Do we need a “Rust Standard”? [LWN.net]

          Mara Bos has written a lengthy blog post on whether the Rust language needs to be standardized. The answer is “no” — but she draws a distinction between a “standard” (maintained by some distant standards body) and a “specification”.

        • Do we need a “Rust Standard”?

          Languages like C and C++ are standardized. They are fully specified in an internationally recognized standards document. Languages like Python, Swift and Rust do not have such a standards document.

          Should Rust be standardized? Why, or why not? In this blog post, I try to explain why I do think we need an accurate specification, why I do not think we need “standardization” (depending on your definition), and give an overview of the current state of Rust’s stability and specification efforts.

        • Rust Weekly UpdatesThis Week In Rust: This Week in Rust 466

          Hello and welcome to another issue of This Week in Rust! Rust is a programming language empowering everyone to build reliable and efficient software. This is a weekly summary of its progress and community. Want something mentioned? Tweet us at @ThisWeekInRust or send us a pull request. Want to get involved? We love contributions.

    • Standards/Consortia

  • Leftovers

    • Hardware

      • CNX SoftwareWBZ451 Curiosity Board features Microchip PIC32CX-BZ2 BLE and Zigbee 3.0 microcontroller – CNX Software

        Microchip WBZ451 Curiosity Board features the company’s Microchip’s WBZ451PE Bluetooth Low Energy 5.2 and Zigbee 3.0 RF module based on the new Microchip PIC32CX-BZ2 32-bit Arm Cortex-M4F wireless microcontroller.

      • CNX SoftwareEasily add face detection to your project with the Person Sensor module – CNX Software

        It’s now much easier to AI features to your project thanks to better tools, but as we’ve experienced when trying out Edge Impulse machine learning platform on the XIAO BLE Sense board, it still requires some effort and the learning curve may be higher than some expect.

        But for common tasks like face detection, there’s no reason for the solution to be hard-to-use or expensive, and Pete Warden (Useful Sensors) has designed the $10 Person Sensor fitted with a camera module pre-programmed with algorithms that detect nearby faces and reports the results over an I2C interface.


        The module will also return identity information, or in other words, try to detect up to 8 different users, but this is not shown in the example above, and it’s not clear how well that works. You’ll find documentation and code samples in different languages including Arduino, CircuitPython, and Python on GitHub.

    • Security

      • IT WireAustralian firms hit by industrial ransomware in 3Q, sec firm Dragos claims

        Australia experienced two industrial ransomware attacks in the third quarter of the year, the industrial security firm Dragos says in an analysis of such attacks that occurred globally.

        There was no indication of the organisations involved; Dragos does not provide such information, nor does it tie a particular malicious actor to any country.

        The company said on Wednesday there had been 128 ransomware attacks on industries, just three more than in the second quarter, which matched an assessment it had made. The African continent also experienced two attacks.

        But it added that it was unaware of any significant industrial disruptions during 3Q.

      • IT WireiTWire – Medibank says My Home Hospital also hit, PII and health data accessed

        The next instalment of the Medibank Group data breach has arrived, with the company confessing on Thursday that patient information from My Home Hospital had also been accessed by an attacker.

        My Home Hospital is a joint venture between Calvary and Medibank implemented on behalf of Wellbeing SA and the South Australian Government.

        Medibank said in a statement that personal information and some health data had been accessed. No further details were provided, but given the current trend there may be more to come on Friday.

      • IT WireiTWire – Pathology practice Medlab reveals data breach after nine months

        Almost nine months after it experienced what it terms a “cyber incident”, private pathology practice Medlab Pathology has issued a statement about the incident in which Medicare details and credit card numbers of staff and patients were stolen.

        The “cyber incident” appears to have been a Windows ransomware attack. The statement was made in the name of chief executive Melinda McGrath.

        Medlab is owned by Australian Clinical Labs which acquired the former in December 2021; it has operations in NSW and Queensland. The breach occurred in February 2022.

        The statement said it had begun notifying those affected on Thursday.

      • Hacker NewsAustralian Health Insurer Medibank Suffers Breach Exposing 3.9 Million Customers’ Data

        Australian health insurance firm Medibank on Wednesday disclosed that the personal information of all of its customers had been unauthorizedly accessed following a recent ransomware attack.

        In an update to its ongoing investigation into the incident, the firm said the attackers had access to “significant amounts of health claims data” as well as personal data belonging to its ahm health insurance subsidiary and international students.

        Medibank, which is one of the largest Australian private health insurance providers, serves about 3.9 million customers across the country.

      • Hacker NewsApple iOS and macOS Flaw Could’ve Let Apps Eavesdrop on Your Conversations with Siri

        A now-patched security flaw in Apple’s iOS and macOS operating systems could have potentially enabled apps with Bluetooth access to eavesdrop on conversations with Siri.

        Apple said “an app may be able to record audio using a pair of connected AirPods,” adding it addressed the Core Bluetooth issue in iOS 16.1 with improved entitlements.

        Credited with discovering and reporting the bug in August 2022 is app developer Guilherme Rambo. The bug, dubbed SiriSpy, has been assigned the identifier CVE-2022-32946.

      • Hacker NewsNew Cryptojacking Campaign Targeting Vulnerable Docker and Kubernetes Instances

        A new cryptojacking campaign has been uncovered targeting vulnerable Docker and Kubernetes infrastructures as part of opportunistic attacks designed to illicitly mine cryptocurrency.

      • SudoRunning sudo without updating cached credentials | Sudo

        One of the recurring questions at conferences was whether there is a way to check cached sudo credentials without updating them. Version 1.9.12 of sudo introduces the -N option which makes this possible, and also allows running any commands without updating the cached credentials.

      • LWNSecurity updates for Thursday

        Security updates have been issued by CentOS (389-ds-base, bind, expat, java-1.8.0-openjdk, java-11-openjdk, libksba, and squid), Debian (chromium, libdatetime-timezone-perl, tzdata, and wordpress), Fedora (dbus, dhcp, dotnet3.1, jhead, samba, and strongswan), Mageia (virtualbox), Oracle (device-mapper-multipath), Scientific Linux (device-mapper-multipath and thunderbird), Slackware (curl), SUSE (container-suseconnect, curl, kernel, libmad, libtasn1, libtirpc, qemu, rubygem-puppet, SUSE Manager Client Tools, and telnet), and Ubuntu (curl, linux-intel-iotg, and mysql-5.7).

      • Hacker NewsRansomware: Open Source to the Rescue [Ed: Microsoft Windows TCO]

        In the US, Colonial pipeline is seeking tax reductions from the loss incurred by the 2021 ransomware campaign they were victims of. But wait… to what extent is the government (and, by extension, every taxpayer) is then indirectly sponsoring cybercrime?

      • Hacker NewsResearchers Expose Over 80 ShadowPad Malware C2 Servers[Ed: Microsoft Windows TCO]
      • Hacker NewsBritish Hacker Charged for Operating “The Real Deal” Dark Web Marketplace

        Furthermore, the indictment accuses Kaye of conniving with one or more persons going by the name “thedarkoverlord” to sell Social Security numbers, not to mention launder the cryptocurrency proceeds of the sale through mixing services like Bitmixer.io to obscure the money trails.

      • USCERTCISA Releases Four Industrial Control Systems Advisories | CISA

        CISA has released four (4) Industrial Control Systems (ICS) advisories on October 27, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

    • Censorship/Free Speech

      • Internet Freedom FoundationKarnataka HC dismisses Aakar Patel’s application

        Mr. Aakar Patel, a human rights activist and author, approached the Karnataka High Court seeking permission to intervene in an ongoing petition filed by Twitter challenging blocking orders issued by Union of India under S.69A of the Information Technology Act, 2000 (‘IT Act, 2000). Mr. Patel, whose Twitter Account was blocked in June 2020, approached the Court to highlight how the Government of India is censoring Twitter accounts without even hearing affected users or providing them copies of blocking orders. The Karnataka High Court declined to permit Mr. Patel to intervene because other users would also approach the Court in a dispute which is between Twitter and the Union of India. Senior Advocate V Srinivasa Raghavan appeared on behalf of Mr. Patel and Keystone Partners, and IFF provided legal support.

    • Internet Policy/Net Neutrality

      • Ariadne ConillThe internet is broken due to structural injustice | Ariadne’s Space

        Over the past few years, I’ve come to realize that the Internet as we know it is utterly broken. Lately, I’ve also been pondering how participants in the modern Internet have enabled and perpetuated harm to society at large. Repeatedly, we have seen the independence of the commons chipped away by powerful men who wish for participants to serve their own whims, while those who raise concerns with these developments are either shunned, banned or doxed.

        On Friday, October 28th, we will see another demonstration of these structural injustices where the commons takes another loss to the whims of a powerful man. Last time, it was freenode’s takeover by Andrew Lee, and this time it will be Twitter’s takeover by Elon Musk. No, really, the deal is already concluded: TWTR will be delisted from NASDAQ on Friday.

        Will this be the end of Twitter? Probably not, but it will be the end of the current relationship the commons shares with Twitter. Instead of acting as a self-described “public square,” it will further evolve into a chaotic cacophony of trolling and counter-trolling driven in the name of algorithmic engagement. Some will move to other microblogging services and networks, and will likely discover that everything which made Twitter horrible likely applies in some way to the replacement.

      • AccessNowInternet shutdowns shroud and facilitate brutality of Myanmar junta’s airstrike in Hpakant township – Access Now

        Access Now condemns the ongoing war crimes committed by the military junta in Myanmar, and its use of internet shutdowns to conceal the atrocities. More than 80 people are dead and a hundred more injured after the military dropped four bombs at a gathering of the Kachin Independence Organisation (KIO) at approximately 20:30 local time on 23 October. The deliberate communication blackout meant local media were only able to report on the disaster hours later on 24 October. People on the ground still struggle to get updated information on the number of casualties and their conditions because of ongoing shutdowns.

        “Mobile internet in Hpakant has been shut down for over 430 days. Since last week, curfew-style blocking of wifi is cutting off the region for approximately 17 hours every day, starting at 17:00, and only reconnecting at 10:00 the next day,” said Wai Phyo Myint, Asia Pacific Policy Analyst at Access Now. “When the bombs dropped on Sunday evening, the mostly-civilian crowd was left isolated, unable to contact friends and family to seek help and urgent medical attention. It was a targeted and brutal massacre, and shutting down the internet was a deliberate assurance that the extent of the military’s atrocities would be buried.”

        Access Now documents internet shutdowns globally — recognizing that in recent years, shutdowns have become more sophisticated, lasting longer, harming more people, and targeting vulnerable groups. In 2021, Myanmar ranked 2nd in the world in terms of the number of shutdowns that year.

      • Internet Freedom FoundationReturn to Sender : IFF’s submission to the draft Telecom Bill, 2022

        The draft Indian Telecommunication Bill, 2022 was released for public consultation on September 21, 2022. It follows the consultation paper on the “Need for a new legal framework governing Telecommunication in India” which was published on July 23, 2022. Read our brief, which forms a part of our consultation response, where we identify and analyse specific issues with the Telecom Bill, 2022. Our main recommendation is that the Telecom Bill, 2022 should be recalled and a fresh consultation process commensurate with the stated goal of “​​restructur(ing) the legal and regulatory framework for the telecommunications sector.”


        It consolidates the laws governing provision, development, expansion & operation of telecom services, telecom networks & telecom infrastructure and assignment of spectrum. In doing so, it repeals the Indian Telegraph Act, 1885, the Indian Wireless Telegraphy Act, 1933, & the Telegraph Wire (Unlawful Protection) Act,1950, while amending certain provisions of the Telecom Regulatory Authority of India Act (“TRAI”), 1997. However, any rules made under these legislations will continue to be in force. It purportedly takes into account the comments received from stakeholders & industry associations on the consultation paper on the “Need for a new legal framework governing Telecommunication in India” which was published on July 23, 2022 (Read IFF’s comments on the paper here). The deadline for submitting comments on the paper was August 25, 2022 which was further extended to September 1, 2022. The Telecom Bill was released three weeks after the completion of this deadline.

      • AccessNowIndia’s Draft Telecommunication Bill empowers gov’t to impose internet shutdowns – Access Now

        Note: Access Now signed this letter and joins the call of other organisations for the Indian government to withdraw the Draft Telecommunication Bill, 2022 because its authorizes government to order internet shutdowns in violation of human rights.

      • Public KnowledgeFCC Votes To Strengthen Network Resiliency in Puerto Rico, U.S. Virgin Islands – Public Knowledge

        Today, the Federal Communications Commission voted to approve a Further Notice of Proposed Rulemaking to support mobile carriers and broadband providers operating in Puerto Rico and the U.S. Virgin Islands to strengthen their networks’ resiliency in the face of natural disasters. Public Knowledge applauds the Commission for taking action to keep consumers connected even during disasters and other emergencies, but urges the agency to locate funds for improving network resiliency across the nation.

        The following can be attributed to Harold Feld, Senior Vice President at Public Knowledge:

        “As today’s FCC action makes clear, although carriers have made progress toward hardening their networks in Puerto Rico and the Virgin Islands to withstand increasingly violent hurricane seasons, more work remains. We applaud Chairwoman Rosenworcel and her fellow Commissioners for seeing this through rather than walking away with the job half finished.

      • Public KnowledgeFCC Moves To Leverage 12 GHz Band To Further Close Digital Divide – Public Knowledge

        Today, the Federal Communications Commission voted to approve a Notice of Inquiry seeking comment on the current use of the 12.7-13.25 GHz band as well as ways to encourage more efficient use of the band and whether it’s suitable for mobile broadband services. Public Knowledge applauds the Commission for moving to leverage the 12 GHz band to further close the digital divide.

        The following can be attributed to Kathleen Burke, Policy Counsel at Public Knowledge:

        “We applaud Chairwoman Rosenworcel for her continued leadership in looking for new ways to share access to spectrum for vital telecommunications services like mobile broadband and Wi-Fi. Limited spectrum access is a clear barrier to closing the digital divide and ensuring that all Americans have access to the crucial telecommunications services we rely on to function in our society. Finding creative ways to provide more spectrum access is an important goal that we applaud the FCC for continuing to pursue.

        “Because of the urgency in promoting competition in mobile broadband and increasing unlicensed spectrum access generally, we urge the Commission to issue an Order authorizing shared use in the ‘lower’ 12 GHz band. Opening the lower 12 GHz in addition to the upper 12 GHz would potentially make over 1,000 MHz of spectrum available for advanced services.

    • Monopolies

      • Software Patents

        • LWNThe disabling of hardware codecs in community distributions [LWN.net]

          Software patents affect our systems in many ways, but perhaps most strongly in the area of codecs — code that creates or plays back audio or video that has been compressed using covered algorithms. For this reason, certain formats have simply been unplayable on many Linux distributions — especially those backed by companies that are big enough to be worth suing — without installing add-on software from third-party repositories. One might think that this problem could be worked around by purchasing hardware that implements the patented algorithms, but recent activity in the Fedora and openSUSE communities shows that life is not so simple.

          In September, the Fedora project changed how it builds the Mesa graphics library, disabling support for the H.264 and H.265 codecs. These formats are heavily encrusted with software patents and have long been difficult to support on Linux systems, though the existence of OpenH264 has improved the situation for many users. In this case, though, the patented algorithms are not being executed on the CPU running Linux; instead, they are run (and accelerated) on a peripheral processor like the GPU. With the change, Fedora users (only of the upcoming Fedora 37 release for now, though that will likely change) have lost access to the acceleration provided by their hardware.

          The problem was promptly brought to the Fedora development list, where a number of users expressed their unhappiness at the change. But there was also a certain amount of surprise that Red Hat would not allow code that enables hardware functionality to be shipped; Chris Adams, for example, asked: “But isn’t this just providing for hardware decoding, where (presumably) the hardware vendor arranged for whatever needed licenses?”. The “presumably”, in this case, turns out to be wrong.

      • Copyrights

        • Walled CultureWhy the ‘true fans’ model is great not only for creators, but for entrepreneurs too – Walled Culture

          The “true fans” idea has appeared in many posts on this blog, and also makes an appearance in the last chapter of Walled Culture the book, as a viable alternative to copyright and its manifest ills. Kevin Kelly first articulated the true fans idea in 2008, and it was surprisingly soon after that companies started popping up to provide some of the infrastructure needed to facilitate the idea. For example, Kickstarter was launched in 2009, while Patreon began in 2013, and both have gone on to become hugely successful examples of the true fans approach.

          Simon Owens has an interesting post on his Substack newsletter entitled “Why Patreon is struggling“. He identities a number of what he calls “key weaknesses in the platform’s core offerings”. One is that “a creator’s ability to distribute free content via Patreon is limited”. That’s a problem, because many people (rightly) want to see an example of a creator’s work before sending off money. It also prevents creators from distributing their work freely on Patreon as a matter of course, in order to reach as wide an audience as possible, and to locate the true fans among them.

          Another issue according to Owens is that Patreon doesn’t have a recommendation tool that helps creators find new audiences. The lack of basic tools for distributing and analysing content is another clear gap in Patreon’s offerings according to Owens.

  • Gemini* and Gopher

    • Personal

    • Technical

      • Internet/Gemini

        • Browsing Gemini Offline

          I’m now browsing Gemini completely offline. It works. I managed to make AV-98 a totally offline gemini client which works well enough for my own needs and it’s a very interesting experience.

      • Programming

        • Carbon Dating HTML

          One of the more common feature requests I’ve gotten for Marginalia Search is the ability to search by date. I’ve been a bit reluctant because this has the smell of a a surprisingly hard problem. Or rather, a surprisingly large number of easy problems.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Mozilla Keeps Changing Users’ Settings to Blast Misinformation (or Present Dishonest Ads) at Them in New Tabs

Posted in Deception at 9:59 am by Dr. Roy Schestowitz

Just showed up in a new tab after a Firefox (ESR) update (linking to https://www.mozilla.org/en-GB/firefox/welcome/14/):

Mozilla spam

Summary: The misinformation company Mozilla is promoting fake privacy (rebranded VPN operated by a surveillance company) to GNU/Linux users (Debian in my case) by ‘hijacking’ new tabs for ads’ sake; six days ago Ryan published "Mozilla Changes Firefox Settings/Themes Without Asking" (it seems to be what just happened to me)

Elon Musk is Buying a Dying Train Wreck Tomorrow (Twitter)

Posted in Deception at 8:17 am by Dr. Roy Schestowitz

Video download link | md5sum 261359f77eb56782bd80069121b82f96
Twitter is in Trouble and Mass Layoffs Loom: Twitter is Concerned That Its Most Valuable Users Quit in Droves
Creative Commons Attribution-No Derivative Works 4.0

Summary: The disingenuous takeover by Elon Musk and associates (including the Saudi ‘royal’ family, in dire need of reputation laundering) is a disaster in the making; Twitter is going to die even faster than before

THE thing every lawyer can understand is how contracts work. When Mr. Musk decided to buy Twitter he actually committed to buying it. He would have to find very exceptional and valid circumstances to bail out of the legal committal (“buyer’s remorse” isn’t a legally valid reason). Twitter knows it. That’s why Twitter sued. He is now compelled to buy something he knows to be worthless (even a Twitter whistleblower has since then confirmed it) and he plans to lay off about 75% of the staff after the transaction completes! Tomorrow apparently (based on report). No wonder Twitter staff is in a state of panic and this will certainly impact morale, hence operations.

Twitter is a dead man walking or a zombie site. After losing money year after year for like a decade it still cannot find a way to sustain itself. Musk won’t change this. Musk is a master of grifting, not business. He knows how to steal (or pocket) taxpayers' money.

“Musk is a master of grifting, not business. He knows how to steal (or pocket) taxpayers’ money.”If press reports are correct, Musk and the Saudis still want a dying platform, or maybe they just have no choice (because of a legal commitment made previously on the SEC record, not verbally/orally).

Why would anyone want to buy such a company? It’s a liability, not an asset. Crazy Kanye West (buying Parler) has no clue what to do with his money, Musk is trying to become a cult leader, and logic is thrown out the window! Impulsive behaviour.

Facebook’s shares fell to about 100 dollars this week (down from almost 400), so the bubble of social control media is clearly imploding. Musk et al are overpaying and they know it. Too late, they have no choice…

“Why would anyone want to buy such a company?”As for Facebook, it’s trying to cling onto Microsoft for survival, just like Netflix. There seems to be not much of a future there (“metaverse” is pure hype, not a business plan).

Shown and discussed in the video above are two articles [1, 2].

“Twitter was all along some temporary home. It’s certainly not a place for journalism and the Library of Congress dumped it (no more archiving) quite a few years ago.”“Heavy tweeters have been in “absolute decline” since the pandemic began, a Twitter researcher wrote in an internal document titled “Where did the Tweeters Go?”,” says the more authoritative and “Exclusive” report. After posting 951,000+ tweets I quit Twitter, so I must be one of those “heavy tweeters” that they lost. In the golden days of Twitter I could get about 25 million impressions in a month, but now (after leaving) all my old tweets combined are just north of 10 thousand views per month. That’s the thing about social control media; it only gives visibility to new stuff while old stuff ages poorly.

Let’s hope Twitter will be gone in the next 5 or 10 years. Many of these so-called “heavy tweeters” probably won’t miss it and won’t shed a tear when all their past writings go offline. Twitter was all along some temporary home. It’s certainly not a place for journalism and the Library of Congress dumped it (no more archiving) quite a few years ago.

Let’s Put an End to Software Patents by Contacting Our Representatives (Politicians)

Posted in Deception, Europe, Patents at 7:25 am by Dr. Roy Schestowitz

Video download link | md5sum 8b6a561f07ff627ef388a3271042c268
Derailing the Patent Maximalism Lobby
Creative Commons Attribution-No Derivative Works 4.0

Summary: A call for participation by readers, seeing that the EFF quit doing activism in this domain and the ‘Patent Maximalism Lobby’ makes some gains by misleading ‘our’ politicians

LAST night we said we’d start releasing more information about patents, especially European software patents and the EPO, which wants to grant far more of them (we've shown leaked documents to that effect).

At the moment we need help from readers who are based in the EU and can contact their representatives, many of whom don’t know much or don’t talk — let alone comment — on these issues (or merely pretend to know and to care).

This post will be one of several as we prefer not to compromise still-ongoing engagements with politicians.

One person has asked: “If the Unified Patent Court (UPC) is illegal because a) it strictly requires the UK to be within the EU to sign and b) there are various constitutional issues confirmed by courts, then which source for (a) and (b)?”

As a first step, what is at stake?

We’ve attempted to put this clearly and concisely. This is what we came up with:

What are the key points?

1) Unified Patent Court (UPC) is illegal because:

1a) it strictly requires the UK signing (but it cannot because it left the EU)
1b) it causes various constitutional issues, some of which confirmed by courts already
1c) there was no legitimate economic analysis; it was fabricated a long time ago and those who perpetrated this fraud even said they refuse to allow any further analyses (as that would help their opponents)

Which one or two constitutional issues are more problematic? The European Parliament has a committee dedicated specifically to constitutional matters so this might be relevant to bring to them.

Hungary took this to court. It was ruled unconstitutional. We covered this many times, including 4 years ago (both 1a and 1b). Don’t let this be forgotten.

Other points to bring up

2) The European Patent Convention of 1973 protects software from patents
3) Software is managed via copyright
4) Software patents kill innovation [citation needed, e.g. Prof. Bessen, Boston University; Prof. Mark Lemley, Stanford University]

What else?

A lot more, but one must be very concise. At least try to get the politicians interested in the matter without overwhelming them (or it can become a perceived chore to them).

Who to explain these points to?

Here is the list of people, some of whom you may recognise as coming from your country. Party affiliations are not listed below, but names and contact details are included in the corresponding ‘pages’ (JavaScript):



https://www.europarl.europa.eu/meps/en/197448/RASMUS_ANDRESEN/home (sub

https://www.europarl.europa.eu/meps/en/132191/GUNNAR_BECK/home (sub AFCO)

https://www.europarl.europa.eu/meps/en/197437/NICOLA_BEER/home (sub ECON)













(sub INTA)





sub AFCO




sub ITRE




sub ITRE








sub IMCO






sub ITRE


sub ITRE


https://www.europarl.europa.eu/meps/en/197444/SVENJA_HAHN/home (sub INTA)



https://www.europarl.europa.eu/meps/en/197481/MAXIMILIAN_KRAH/home (sub





sub ITRE


sub INTA




https://www.europarl.europa.eu/meps/en/197465/NIKLAS_NIENAS/home (sub AFCO)

sub ITRE




sub ITRE


sub ITRE


https://www.europarl.europa.eu/meps/en/229839/RENE_REPASI/home (sub ECON)

https://www.europarl.europa.eu/meps/en/206158/MANUELA_RIPA/home (sub INTA)

sub ECON








https://www.europarl.europa.eu/meps/en/197425/RALF_SEEKATZ/home (sub INTA)

https://www.europarl.europa.eu/meps/en/197426/SVEN_SIMON/home (sub AFET,
sub ECON)

sub AFCO












(sub ECON, sub ITRE)

If you contact them, please try to keep it short, amicable, exceedingly polite, and straight to the point. They always claim they’re very busy, so they need to be ‘spoon-fed’ information.

Many people, myself included, are cynical about how politicians ‘represent’ us, but it’s better to try than not to try (I already started days ago). Yours truly is thankful that here in Europe we still have multiple political parties and people we can all contact to scrutinise power, unlike in China for instance.

If you need further information on what to tell them (or respond with), come and chat with us in IRC. We can give references aplenty.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts