10.31.22

Links 31/10/2022: Linux Lite 6.2 and ScummVM 2.6.1

Posted in News Roundup at 7:04 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Late Night Linux – Episode 201 – Late Night Linux

        Docker firewall issues, Ardour’s major new feature, listening for your neighbours’ garage door openers and tyre pressure monitors, colourising old photos, complaints from new Ubuntu users, KDE Korner, and more.

      • VideoChannel Updates – I’m FREE!! – Invidious

        Today we have been released from the Gulag so I have some channel updates. Look for the new site to launch in the next few weeks, and look for us on alternative platforms.

      • VideoIs Debloating Linux Is Just A Waste Of Time – Invidious

        In the past it made legitimate sense to debloat your Linux install but when we’re talking about modern hardware, most systems can over power basically anything you throw at it so is debloating just a waste of time

    • Kernel Space

      • InfoQThreat-Detection Tool Falco Now Supports Multiple Event Sources, Syscall Selection, and More

        As mentioned, the Kernel Crawler is a new tool that automatically searches for new kernel versions supported for a number of Linux distros. It should make it easier to adopt Falco by simplifying the task of installing kernel modules and eBPF probes for a given kernel version. The Kernel Crawler is used to populate and maintain a database with the build matrix which lists all kernel versions and distros supported by Falco.

      • Barry KaulerLinux kernel 5.15.76 compiled

        The 5.15.74 kernel was compiled on October 18, with Android drivers:

        https://bkhome.org/news/202210/kernel-51574-compiled-with-android-drivers.html

        I have compiled 5.15.76 with these changes, shown in bold text. Firstly, for the RTC:

    • Applications

      • DebugPoint5 Best Mastodon Clients for Ubuntu and Other Linux

        Are you planning to leave Twitter and join Mastodon? Use these free and open-source Mastodon clients for your Linux desktop.

        Mastodon is a free and open-source microblogging platform similar to Twitter. It is designed as a decentralised platform that can communicate with other Fediverse protocols such as GNU Social and Pleroma. With the recent news stories about Twitter, many users are trying Mastodon and migrating to the platform.

        With that in mind, we give you a list of free Mastodon clients for Linux desktops as well as Windows and macOS in this post.

    • Instructionals/Technical

      • HowTo GeekHow to List Environment Variables on Linux

        Our various test computers have an average of 50 environment variables on each of them. An environment variable, like any other variable, is a combination of a name and a value. The name is unique, set when the variable is created, and it last for the lifetime of the environment variable.

        Variables hold values for us. When a process needs to know what the value is, it looks up the variable by name, and reads the value from it. Although variable names cannot be changed, their values can be.

      • ID RootHow To Install Cacti on Rocky Linux 9 – idroot

        In this tutorial, we will show you how to install Cacti on Rocky Linux 9. For those of you who didn’t know, Cacti is an open-source, web-based network monitoring and graphing tool designed as a front-end application for the open-source, industry-standard data logging tool RRDtool. Cacti gather performance metrics from servers and network devices and graph and store them for reporting and historical analysis.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Cacti monitoring tool on Rocky Linux. 9.

      • Linux NightlyHow to Monitor CPU Usage on Linux – Linux Nightly

        The CPU is the most important component of your computer. All applications and system services will need to utilize the CPU in order to run. Your Linux operating system will make a determination on how to divide its CPU resources across all of the various programs that are competing to use it.

        In this tutorial, you will learn how to monitor your Linux system’s CPU usage.

      • PurismKerberos authentication on the Librem 5 – Purism

        The Librem 5 features a built-in smartcard reader. While most people use it for GPG I wanted to see if it can be used as an authenticator for services like email (SMTP, IMAP), access to web pages (HTTPS), calendars, etc. without either having to retype a password often or having to store it on the device itself: Single Sign On for all my frequently used services.

      • Linux Made SimpleHow to install Inkscape on a Chromebook

        Today we are looking at how to install Inkscape on a Chromebook.

        If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

    • WINE or Emulation

      • WINE Project (Official)WineHQ – Wine Announcement – The Wine development release 7.20 is now available.
        The Wine development release 7.20 is now available.
        
        What's new in this release:
          - Mono engine updated to version 7.4.0.
          - Font linking improvements.
          - A number of fixes for exception unwinding.
          - Support for dumping EMF spool files in WineDump.
          - Various bug fixes.
        
        The source is available at:
        
        https://dl.winehq.org/wine/source/7.x/wine-7.20.tar.xz
        
        Binary packages for various distributions will be available from:
        
        https://www.winehq.org/download
        
        You will find documentation on https://www.winehq.org/documentation
        
        You can also get the current source directly from the git
        repository. Check https://www.winehq.org/git for details.
        
        Wine is available thanks to the work of many people. See the file
        AUTHORS in the distribution for the complete list.
        
    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Treats for Kate – Welcome Page, Git Diff Viewer, Config Searching – Kate

          It’s Halloween and the Kate and KWrite 22.12 release is approaching, so its about time we give you another update what we’ve been working on.

          [...]

          So far Kate was only able to display code views in Kate’s central view component. In the upcoming release, Kate can also place arbitrary Qt Widgets there, which required making some bigger changes under the hood. You might ask how is this relevant at all, to which we answer: this change enabled us to implement a treat bag of cool, new features. Already we have used this to implement a welcome page, an improved git diff viewer and the configuration options now reside in a tab instead of a dialog.

        • I made outlines for KDE Breeze window decoration | AksDev

          I hope Nate you don’t mind me taking the screenshots from your blog post, I’m just.. Lazy. I have no excuse. Lol.

          For those who just want to see how it’s made, here’s link to the merge request: https://invent.kde.org/plasma/breeze/-/merge_requests/241

          Also I am probably gonna make couple LOTR references due to talking about binding and light and dark and I’m sorry about that beforehand.

        • KDE Network USA: All-American High School Film Festival – Simon’s Blog

          The All-American High School Film Festival (hereafter, A-AHSFF) is a week-long event hosted in New York City. Students can submit their short films in advance, and at the event are exhibitions and rewards for the best-judged films. There is also a tech fair, this year on the 22nd of October. KDE community member Nataniel Farzan is one of this year’s selected entrants, and negotiated a booth for KDE at the tech fair!

          There aren’t very many members in the KDE community in the US, but a few of us live in the area. Philip Cohn-Cort and I heeded the call (with the invaluable remote support of Paul Brown and Aniqa Khokhar).

          Paul and Aniqa did most of the heavy lifting of preparing the event for success. They requested the budget, and ordered the stickers, tablecloth, and banner. Big thank you to both of you! All Philip and I did was prepare the computers and, of course, show up.

        • KDE Gear Snaps fixes and new releases
  • Distributions and Operating Systems

    • Xe’s BlogHow to make NixOS compile nginx with OpenSSL 1.x – Xe

      Image generated by Waifu Diffusion v1.3 (float16) — cloud sea, xenoblade chronicles 2, azurda, blue sky, giant tree, orca, 1girl, red hair, katana

      One of the strengths of NixOS is that you can use NixOS modules to do things like override versions of packages so that you can customize what software is running on your computer. You can use this to manually patch programs, or alternatively override dependencies with other versions. Today I’m going to show you how to use an overlay to force NixOS to rebuild nginx with OpenSSL 1.1.1 instead of OpenSSL 3.x. You may want to do this if you want to reduce risks involved with the CRITICAL security issue announced for OpenSSL 3.x (OpenSSL 1.1.1 isn’t listed as CRITICAL).

  • Free, Libre, and Open Source Software

    • Events

      • Louis-Philippe Véronneau – Montreal’s Debian & Stuff – October 2022

        Our local Debian user group gathered on Sunday October 30th to chat, work on Debian and do other, non-Debian related hacking :) This time around, we met at EfficiOS’s offices. As you can see from the following picture, it’s a great place and the view they have is pretty awesome. Many thanks for hosting us!

      • AlmaLinux OfficialAlmaLinux @ All Things Open 2022 – AlmaLinux OS Blog

        All Things Open 2022 is this week in Raleigh, North Carolina, and we’re here all week! It’s a great event that’s focused on the tools, people, processes and technology that make open source possible.

    • Web Browsers/Web Servers

      • Mozilla

        • MozillaBegin your MV3 migration by implementing new features today | Mozilla Add-ons Community Blog

          Early next year, Firefox will release Mozilla’s Manifest V3 (MV3). Therefore, it’s an ideal time to consider migrating your Manifest V2 extensions. One of our goals throughout our approach to MV3 has been to gradually release new WebExtensions features that enable you to begin implementing APIs that are compatible with MV3. To this end, we recently released some exciting new features you should know about…

        • MozillaHacks.Mozilla.Org: Revamp of MDN Web Docs Contribution Docs [Ed: Mozilla has outsourced its documentation to proprietary software of Microsoft, in violation of the company's mission and spirit]

          The MDN Web Docs team recently undertook a project to revamp and reorganize the “Contribution Docs”. These are all the pages on MDN that describe what’s what – the templates and page structures, how to perform a task on MDN, how to contribute to MDN, and the community guidelines to follow while contributing to this massive open source project.

          The contribution docs are an essential resource that help authors navigate the MDN project. Both the community as well as the partner and internal teams reference it regularly whenever we want to cross-check our policies or how-tos in any situation. Therefore, it was becoming important that we spruce up these pages to keep them relevant and up to date.

    • SaaS/Back End/Databases

    • Content Management Systems (CMS)

      • WordPressPeople of WordPress: Raghavendra Satish Peri – WordPress News

        This month, as WordPress Accessibility Day approaches, we feature Raghavendra Satish Peri, a blogger turned digital entrepreneur based in India, specializing in web accessibility and digital marketing.

        The People of WordPress series shares inspiring stories of how people’s lives can change for the better through WordPress and its global network of contributors.

    • Programming/Development

      • Yoshua WuytsInline Crates

        People sometimes jest that Rust is just ML dressed up to look like C++. And I don’t think that’s entirely off: Rust has many of the key features present in ML languages. We have the same kind of type system (Hindley-Milner), we have sum types, and we have a module system which isn’t directly tied to a module hierarchy. I want to talk a bit more about Rust’s module system here.

        In Rust we distinguish between “crates” and “modules”. To people just learning about Rust the distinction can be a bit confusing. But in practice it makes sense to have both. In this post we’re going to take a look at Rust’s module system, what the differences are, and how we could introduce some features to bring crates and modules closer together.

      • rOpenSci | rOpenSci News Digest, October 2022

        Dear rOpenSci friends, it’s time for our monthly news roundup!

        You can read this post on our blog. Now let’s dive into the activity at and around rOpenSci!

      • Embedding R/exams Exercises in learnr Tutorials

        Introduction to the new exams2learnr package for including quizzes or individual questions from dynamic exercise templates into learnr tutorials which can be deployed as shiny apps.

      • Editing metadata in trail camera images using R, magick and exiftool | What You’re Doing Is Rather Desperate

        I have a new hobby: camera traps, also known as trail cameras. Strapped to trees in my local bushland they sit in wait, firing automatically when triggered by a passing animal. Once in a while, something quite magical happens.

    • Standards/Consortia

      • How Do We Solve the Challenges of glTF Asset Creation? – The Khronos Group Inc

        Artists can leverage glTF to create rich 3D visuals, but the process can be difficult. Assets can be difficult to create, many 3D assets are still not compatible, the tooling ecosystem has gaps, and rendering can be inconsistent. However, solutions are on the horizon! This webinar will showcase the work currently taking place within the Khronos Group to address the current challenges and how to solve them. It will be followed by a Q&A session with the speakers and a panel of industry experts.

  • Leftovers

    • Jakub SteinerPixel Inktober – Even a Stopped Clock

      Just like last year, October was filled with quick pixel dailies. I decided to only post on mastodon, but due to the twitter exodus couldn’t quite post the 30kB images for the two remaining days. Good old blog post it is!

    • Matt RickardAnd Yet it Moves

      Galileo was one of the first scientists to use a telescope, make substantial improvements, and point it at the stars and moon. He published his observations in his “Starry Message” (Sidereus Nuncius) memo in 1610 — causing shockwaves through Italy and the rest of Europe.

    • Hardware

      • The Next PlatformMashing Up CXL And Gen-Z For Shared Disaggregated Memory

        If you are impatient for not just memory pooling powered by the CXL protocol, but the much more difficult task of memory sharing by servers attached to giant blocks of external memory, you are not alone. Memory fabric creator IntelliProp is right there with you.

        And that is why IntelliProp, which has been a custom silicon design shop for the past two decades, has spent the past few years mashing up PCI-Express, CXL, and Gen-Z technologies to create its Omega Memory Fabric, also giving us a preview of what commoditized CXL memory sharing will look like in the future as various technologies, including Hewlett Packard Enterprise’s Gen-Z protocol and IBM’s OpenCAPI protocol, are merged into the CXL specification.

    • Health/Nutrition/Agriculture

      • The ConversationCoronavirus origins: the debate flares up, but the evidence remains weak

        Nearly three years since SARS-CoV-2 first emerged, we’re still not certain where the virus behind COVID-19 came from.

        The location of the initial outbreak close to the Wuhan Institute of Virology drew suspicion that it may have been a lab leak. But scientists largely came out in favour of a natural spillover from bats to humans, through an intermediate animal host, at the Huanan seafood market located a few kilometres away. To date, though, no immediate ancestor of SARS-CoV-2 has been found in bats nor in any other animal that was on sale at the market.

        A recent preprint (a study yet to be peer-reviewed) claims to have identified possibly unusual sequence patterns in the SARS-CoV-2 genome. These patterns may indicate the virus was genetically modified in a lab.

    • Microsoft Junk

      • LWNSystemd 252 released

        Systemd version 252 has been released. As usual, the list of changes is long. It includes a new systemd-measure tool for the calculation of PCR values and a bunch of infrastructure to use the result for disk encryption

      • eSecurity PlanetCybercriminals Use Fake Public PoCs to Spread Malware and Steal Data | eSecurityPlanet

        GitHub proofs of concept (PoCs) for known vulnerabilities could themselves contain malware as often as 10% of the time, security researchers have found.

        Researchers at the Leiden Institute of Advanced Computer Science have alerted security professionals about risks associated with GitHub and other platforms like pastebin that host public PoCs of exploits for known vulnerabilities.

    • Security

      • LWNSecurity updates for Monday [LWN.net]

        Security updates have been issued by Debian (batik, chromium, expat, libxml2, ncurses, openvswitch, pysha3, python-django, thunderbird, and tomcat9), Fedora (cacti, cacti-spine, curl, mbedtls, mingw-expat, and xen), Gentoo (apptainer, bind, chromium, exif, freerdp, gdal, gitea, hiredis, jackson-databind, jhead, libgcrypt, libksba, libtirpc, lighttpd, net-snmp, nicotine+, open-vm-tools, openexr, rpm, schroot, shadow, sofia-sip, tiff, and xorg-server), Mageia (libreoffice), Oracle (expat), Red Hat (device-mapper-multipath), and SUSE (cacti, cacti-spine, chromium, exim, jhead, kernel, libmad, opera, and pdns-recursor).

      • CISACISA Releases Guidance on Phishing-Resistant and Numbers Matching Multifactor Authentication  | CISA

        CISA has released two fact sheets to highlight threats against accounts and systems using certain forms of multifactor authentication (MFA). CISA strongly urges all organizations to implement phishing-resistant MFA to protect against phishing and other known cyber threats. If an organization using mobile push-notification-based MFA is unable to implement phishing-resistant MFA, CISA recommends using number matching to mitigate MFA fatigue. Although number matching is not as strong as phishing-resistant MFA, it is one of best interim mitigation for organizations who may not immediately be able to implement phishing-resistant MFA.

      • UbuntuConfidential computing in public clouds: isolation and remote attestation explained [Ed: Canonical now targets fake 'security' for surveillance companies which steal everybody's data]

        In the first part of this blog series, we discussed the run-time (in)security challenge, which can leave your code and data vulnerable to attacks by both the privileged system software of the public cloud infrastructure, as well as its administrators. We also introduced the concept of trusted execution environments and confidential computing, (CC), as a paradigm to address this challenge. CC takes a pragmatic approach: it considers the execution environment bootstrapped by the cloud’s system software to be untrustworthy, and proposes to run your security-sensitive workloads in an isolated trusted execution environment (TEE) instead. The TEE’s security guarantees are rooted in the deep hardware layers of the platform; security claims can be remotely verified.

        But how does confidential computing work? To understand TEEs and CC in more detail, we need to understand isolation and remote attestation.

      • What You Should Know about the New OpenSSL Vulnerability [Ed: Allegedly hyped up too much]
      • eSecurity PlanetHeartbleed 2.0? OpenSSL Warns of Second-Ever Critical Security Flaw

        The OpenSSL project this week announced plans to release version 3.0.7 on November 1 to patch a critical security flaw affecting versions 3.0 and later. Co-founder Mark J. Cox noted it’s only the second critical patch “since we started rating flaws back in 2014.”

    • Defence/Aggression

      • IT WireiTWire – With nuke-capable B-52s coming, Albanese is now the new deputy sheriff

        Former Liberal prime minister John Howard used to be often contemptuously referred to as the deputy sheriff for the US in the Pacific region when George W. Bush was in power.

        Given the news that the US is now preparing to send six nuclear-capable B-52 bombers to Australia, one would be totally justified if the same title was applied to Labor Prime Minister Anthony Albanese.

        The ABC’s Four Corners program on Monday focused on the build-up of these nuclear-capable planes, and the level of jingoism in the report was quite easy to detect.

        The US and its allies have been spreading fear, uncertainty and doubt about China for years and this step is apparently aimed at keeping the region safe.

      • Michael West MediaBudget 2022: Defence spend on the up – Michael West

        Labor’s budget is projecting just over $38 billion to be spent on defence in 2022-23, increasing to $44.5 billion in 2025-26.

        These projections have not changed since the Coalition’s March budget and represent the third largest spend by the federal government, beaten by just education, health and social security and welfare.

        According to ARENA, “In the decade to 2030, Australia will spend $575 billion on defence.”

        Labor has pledged to spend at least 2% of Australia’s GDP on defence. Spending as a share of GDP is expected to be 2.12% next financial year, followed by 2.11% in 2024-25 and 2.1% in 2025-26.

    • AstroTurf/Lobbying/Politics

      • CoryDoctorowUline’s billions fund voter suppression

        Every billionaire is a policy failure, but every billionaire is also a factory for producing policy failures at scale. The political power conferred by massive wealth accumulation makes a sham of democracy, because “one person, one vote” is easily swamped by “one dollar, one vote.”

        That’s why we need to abolish all billionaires, even the “good” ones who promise to support charities or causes we support. But today, I want to focus on some extremely bad billionaires, Dick and Liz Uihlein, owners of the packing-supply monopoly @Uline.

        The Uihleins are a multi-generational far-right clan of wealthy conspiracy peddlers. The family money starts with the founding of the @SchlitzBrewing company (and you thought @MolsonCoors was the only fascist beer!).

      • Misinformation/Disinformation/Propaganda

        • The Consortium Imposing the Growing Censorship Regime — and Our New Live, Prime-Time Rumble Program

          The rapid escalation of online censorship, and increasingly offline censorship, cannot be overstated. The silencing tactic that has most commonly provoked attention and debate is the banning of particular posts or individuals by specific social media platforms. But the censorship regime that has been developed, and which is now rapidly escalating, extends far beyond those relatively limited punishments.

          [...]

          There has been some reporting — by me and others — on the new and utterly fraudulent “disinformation” industry. This newly minted, self-proclaimed expertise, grounded in little more than crude political ideology, claims the right to officially decree what is “true” and “false” for purposes of, among other things, justifying state and corporate censorship of what its “experts” decree to be “disinformation.” The industry is funded by a consortium of a small handful of neoliberal billionaires (George Soros and Pierre Omidyar) along with U.S., British and EU intelligence agencies. These government-and-billionaire-funded “anti-disinformation” groups often masquerade under benign-sounding names: The Institute for Strategic Dialogue, The Atlantic Council’s Digital Forensics Research Lab, Bellingcat, the Organized Crime and Corruption Reporting Project. They are designed to cast the appearance of apolitical scholarship, but their only real purpose is to provide a justifying framework to stigmatize, repress and censor any thoughts, views and ideas that dissent from neoliberal establishment orthodoxy. It exists, in other words, to make censorship and other forms of repression appear scientific rather than ideological.

          That these groups are funded by the West’s security state, Big Tech, and other assorted politically active billionaires is not speculation or some fevered conspiracy theory.

    • Freedom of Information / Freedom of the Press

      • Hong Kong Free PressTop pro-Beijing Facebook group ‘Save HK’ suspended from Facebook – Hong Kong Free Press HKFP

        One of Hong Kong’s largest pro-Beijing Facebook groups has disappeared, with its founder saying that Meta removed it for apparently violating community rules.

      • ANF NewsANF | Journalist Eren: The way out of this darkness is solidarity

        Faruk Eren, chair of the Turkish Press and Printing Press Employees’ Union (Basın Iş), affiliated with the Revolutionary Workers’ Unions Confederation (DISK), spoke to Mesopotamia Agency (MA) about the arrest of Kurdish journalists. Eren said that if there is no reaction against the unjust and unlawful detentions of Kurdish journalists, sooner or later, everyone will be targeted.

      • RFAPro-democracy publishing house in Thailand targeted for shutdown by Chinese buyer — Radio Free Asia

        A pro-democracy publishing house in Thailand was approached by a Chinese businessman who wanted to pay it to shut down to boost his relationship with Beijing in the wake of the ruling Chinese Communist Party congress, its editors said in a statement.

        A private investigation agency contacted Sam Yan Press in May with an offer of two million baht from a Chinese businessman who wanted to buy the company in order to shut it down, the publishing house said in a statement on its website dated Oct. 26.

        “They said that the Chinese businessman was keen to make good relations with the Chinese government. We were in utter disbelief and thought it was a fraud. Therefore, we completely ignored the messages from the agency and continued with our causes,” the statement, signed by the press’ editorial board, said.

    • Civil Rights/Policing

      • IT WireiTWire – Union claims majority of Aust Apple workers against firm’s pay deal

        More than 2000 workers at Apple retail units in Australia have voted against a pay deal offered by the technology firm, the Retail and Fast Food Workers Union claims.

        The union, one of three representing the workers, said in a statement: “After sitting on the results for 15 hours, Apple has finally admitted workers have smashed its rotten deal at a margin of more than 2 to 1 with well over 2000 workers voting no and for a better deal.”

        The company recently reported its results for the final quarter of its financial year, performing the best of any big technology outfit.

        Apple reported US$90.1 billion (A$141 billion) in revenue for the quarter, an increase of 8% year-on-year, and US$394.3 billion, also up 8% year-on-year. But revenue is forecast to fall by 8% during the December quarter.

  • Gemini* and Gopher

    • Personal

      • SmolZINE: index of featured links
      • Signalis
      • Happy Halloween!

        Halloween. Yes, it’s tonight, I think, as I’m passing orchard their glass of water. One of my favorite night of the year. The jukebox is now playing a song from AC/DC and I’m hearing m15o calling for help in the kitchen. Shall we call it a kitchen? Let’s just say in the room behind the bar. He’s preparing some food for tonight! All I can say is that bread is going to be involved.

      • How is it November already (and little updates)

        Arguing with my partner about when to set our goals for the year still seems so fresh in my memory, like it was just a few weeks ago. But just a few weeks ago, we were sizing up the final act of 2022. Since the pandemic started, time has seemed to crawl and sprint at the same time. Or is it just my perception of it?

      • Extreme clouds, Brevard NC edition
      • Extreme, no, seriously, I mean it, extreme head in the clouds, Cleveland, SC edition

        The clouds lifted, the sun came out, and round 3:30pm, I said to Bunny, “Let’s go to Pretty Place!”

        Pretty place, aka (also known as) The Fred W. Symmes Chapel [1], is a church up on the side of a mountain, just across the North Carolina/South Carolina state line. 11 miles (18km) “as the crow flies” from The Bromfield Inn [2], or 17½m (28km) as the car drives. And I implore you, gentle reader, to check the link out, to get into the mind set Bunny and I were in as we headed out to Pretty Place.

      • Amid Autumn

        I can’t believe it’s Halloween already! We’re having some friends over and it’ll be a fun night!

        Summer went a bit late this year, most days got into the 90s until just a couple weeks ago. We had a short, cool rain storm come in for a few days at the end of September. Roomie called it a “False Fall” which I really like the concept of. There are always those few days at the cusps of the seasons that feel like the upcoming one.

      • Halloween Media Rec

        There is a Grinch Halloween special which doesn’t get nearly enough love as it’s Christmas counterpart that captures the Halloween spirit so perfectly!

    • Technical

      • yet another because I’m dumb and subborn

        Parts showed up Friday so I reset the router I borrowed, and dropped it off.

        Picked up the parts, and got home and they did not work because they are
        “802.3af” type PoE and not “passive 24v” PoE.

      • Explaining Security with Metaphors

        I wonder if people might struggle less with computer security if we employed metaphors for previous technology.

        People have attempted to get videos off the internet, showing a clear misunderstanding how how computers work. If they thought in terms of many people photocopying a picture, I’m sure they would understand how futile the efforts are.

      • Programming

        • Re: On github as a social network

          I don’t have stars and follows on my Github page and they seem to think that is a red flag. When they ask for my twitter (which I haven’t used since basically when twitter came out) or FB or any other social media and I say I don’t really use any of them, they just give me this strange look. So bizarre.

          I just had to remind myself that this process is an exercise in the law of
          large numbers. You send out tons of resumes, get a bunch of interviews, a ton
          of rejections and a few offers you definitely don’t want. Eventually you find a
          good match.

        • Skills that matter for software engineers
        • notes about Firefox
        • OS Integration Files in Python Packages

          My go-to method for deploying command line tools I’ve written is to build Python packages and installing them. This works well for putting the tools on the PATH, but one thing I’ve been missing is to also include “OS integration files” (such as man pages, .desktop app launchers, and systemd unit files). Recently I learned a way to do it.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 31/10/2022: Portmaster’s 1.0 Release, FuguIta 7.2, and GNU Make 4.4

Posted in News Roundup at 1:27 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • 9to5Linux9to5Linux Weekly Roundup: October 31st, 2022, “Halloween Edition”

      This week Kubuntu 22.10 users received the KDE Plasma 5.26 update, TUXEDO Computers announced a new Linux-powered laptop, Canonical enabled Ubuntu Server 22.10 on a new RISC-V computer, and Linux kernel 5.19 users were urged to upgrade to Linux kernel 6.0.

      On top of that, Ubuntu 22.10 users received their first kernel security update to patch the latest Wi-Fi driver stack vulnerabilities and KDE Plasma 5.26 users received a second maintenance update to their beloved desktop environment.

    • Desktop/Laptop

      • Linux MagazineZorin OS 16.02 is Now Available – Linux Magazine

        Zorin OS 16.2 has been officially released just seven months after the first point release of the user-friendly Linux operating system.

        Zorin OS is one of the more user-friendly (and beautiful) Linux distributions on the market. Only seven months after unleashing the first point release for the sixteenth iteration, a new point release is available that includes a really important feature for those migrating from Windows.

      • Systemd 76SpoOoOoOky Update: Murmurin’s of a Pop!_OS October – System76 Blog

        In a dark n stormy castle, or perhaps a sunny factory in Denver, a brigade of robots runs a series of experiments.

        An’ then: A discovery! The robot’s monster, small and mighty, was successfully given a mechanized brain. This brain, an AMD Ryzen 7000 CPU, has become compatible with Pop!_OS.

    • Audiocasts/Shows

    • Kernel Space

      • Linux LinksDouble, double toil and trouble – NVIDIA drivers

        This is a personal post mostly representing anecdotal information sharing my personal experience with the ASUS NVIDIA GeForce RTX 3060 Ti graphics card tested exclusively under Ubuntu 22.10. It captures issues I’ve experienced, together with a few workarounds.

        There are many reasons why NVIDIA produce proprietary graphics drivers. One popular held reason is that there is game-specific code in these drivers which are developed using exclusive rights to the game source code and extensive optimization. This type of information is confidential and valuable as it can give a company a competitive advantage over their rivals. Even if the performance gains are tiny, even a few extra fps may sway customers.

        NVIDIA is starting to embrace open source drivers though. Since May 2022, NVIDIA has published Linux GPU kernel modules as open source with dual GPL/MIT license. This starts with the R515 driver release. However, the open source drivers lag behind their proprietary counterparts with benefits offered by the proprietary driver are not yet available with the open source equivalent. In particular, they include display and graphics features (such as G-SYNC, Quadro Sync, SLI, Stereo, rotation in X11, and YUV 4:2:0 on Turing), as well as power management, and NVIDIA virtual GPU.

    • Applications

      • LinuxiacAngie: A New NGINX Fork Developed by Some of Its Former Devs

        Angie is a drop-in replacement for the NGINX web server aiming to extend the functionality of the original version.

        Let’s start with some background. NGINX Inc. was founded in July 2011 by Igor Sysoev, the original author of NGINX, and Maxim Konovalov to provide commercial products and support for the software.

        It is part of F5 Networks Inc., which bought it in March 2019 for $670 million to help them evolve from a hardware company to a more services-focused one.

        In August this year, F5 Networks Inc., which owns the rights to NGINX and is responsible for its development, discontinued its operations in Russia, leaving the market entirely.

      • It’s FOSSPortmaster 1.0 Release Marks it as a Solid Open-Source Application Firewall for Privacy-Focused Users

        Portmaster by Safing is a free and open-source application firewall that aims to automate the process of protecting the privacy of its users. It allows you to monitor network activity, add custom connection rules for applications, and more. We tested it during the alpha stage, and came to the conclusion that it had good potential to act as a viable alternative to GlassWire. Of course, it may not be a replacement, but it can be one in the near future…

      • Red Hat OfficialReplace your Linux file manager with Midnight Commander | Enable Sysadmin

        If you want the experience of “walking” through your filesystem but don’t want to leave the comfort of your terminal, try the mc command.

      • Ubuntu PitgThumb: An AVIF Image Viewer for Linux System

        Out of all the image file formats available, PNG and JPEG are two of the most common. However, when compared side-by-side, it’s easy to see that there are tradeoffs between quality and image size. With PNGs offer higher quality images but at a larger size, while JPEGs provide lower quality images but with smaller sizes. In order to reduce file size without compromising quality, the WebP image format was created and is already supported by Linux systems.

        The new image file system, AVIF, is becoming increasingly popular because it compresses images without compromising quality. The size of an AVIF image is smaller than a WebP, but the quality remains intact. One downside to this newer image file format is that most Linux distributions have not yet implemented support for AVIF.

        If you get an image or download images in AVIF format from the web, Most of the default image viewers can’t show the thumbnail.

    • Instructionals/Technical

      • BeebomWhat Does Chmod 777 Mean in Linux: Explaining File Permissions Model | Beebom

        The chmod 777 command is often suggested as the solution to quickly fix permission issues while managing web servers in Linux. Now, you might be wondering what does chmod 777 mean in Linux? Well, to give you a basic primer, it grants all the permissions, including sensitive ones, to a file or directory. That being said, there is more to it, so we recommend reading all about the chmod 777 command right below. On that note, let’s move to the article.

      • TecMintLearn Linux Dir Command Examples with Options

        This article shows some examples of using the dir command to list the contents of a directory. The dir command is not a commonly used command in Linux, but it works less like the ls command which most Linux users prefer to use.

      • TecAdminCreating Directory In HDFS And Copy Files (Hadoop) – TecAdmin

        HDFS is the Hadoop Distributed File System. It’s a distributed storage system for large data sets which supports fault tolerance, high throughput, and scalability. It works by dividing data into blocks that are replicated across multiple machines in a cluster. The blocks can be written to or read from in parallel, facilitating high throughput and fault tolerance. HDFS provides RAID-like redundancy with automatic failover. HDFS also supports compression, replication, and encryption.

        The most common use case for HDFS is storing large collections of data such as image and video files, logs, sensor data, and so on.

      • It’s FOSSHow to View AVIF Images in Ubuntu and Other Linux Distros

        PNGs are the best when it comes to quality but they are huge in size and hence not ideal for websites.

        JPEGs reduce the file size but they reduce the quality of the images significantly.

        WebP is a relatively newer format that produces better-quality images with significantly smaller sizes.

        Now, AVIF is a new file format that compresses images without sacrificing quality. They are smaller than WebP for the same image quality.

        Linux has started providing WebP support recently. However, AVIF image format is not yet supported by default in many distributions.

        If you download an image in AVIF format from the web, it won’t display the thumbnail.

      • ID RootHow To Install LAMP Stack on Linux Mint 21 – idroot

        In this tutorial, we will show you how to install LAMP Stack on Linux Mint 21. For those of you who didn’t know, LAMP is a short name that stands for Linux, Apache, MySQL, and PHP. Developers need a combination of these open-source software to do developments on their local machines before their websites go live. Apache is a web server, MySQL is for databases and PHP is the language used for programming. From multi-layered content management systems to social networking portals supporting millions of users, the LAMP provides a stable foundation for some of the largest web applications

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of LAMP Stack on Linux Mint 21 (Vanessa).

      • H2S MediaHow to create Alpine Container in Docker – Linux Shout

        Alpine Linux is popular because of its small size and fast speed. On Docker, its image is of few Mbs, hence consuming less space and resources. Users can opt for it to install a web server, database server such as MySQL, and more… It uses its own package manager called apk to install the packages available through its repository. Being lightweight is the reason why many platforms used it to set up container services.

        Here in this article, we will see the steps to install Alpine Image on Docker to create a container. However, those who are interested in running the docker service on Alpine Linux can see our article: How to install Docker Engine on Alpine Linux.

      • Install Docker on Ubuntu Server – Darryl Dias

        This article will cover the step-by-step process of installing Docker on an Ubuntu Server.

      • ByteXDHow to Install Nerd Fonts on Linux – ByteXD

        Nerd Fonts are a set of free fonts designed for use with code editors. The fonts are designed to be easy to read, even at small sizes, and have a wide variety of character sets. You might have noticed that some projects don’t properly display fonts as they should be.

        This is likely because the fonts are not installed on your system.

        This post will give you a comprehensive guide on nerd fonts and how to install them on your Linux system.

      • Make Tech EasierThe Advanced Guide to Using nslookup in Linux – Make Tech Easier

        As a network administrator, you will find that the nslookup command is one of your most essential tools. With nslookup, you can check DNS records to troubleshoot problems with your DNS server or a specific DNS record. In this article, we take a closer look at nslookup and show you some practical examples of how to use it.

      • UbuntubuzzLibreOffice Writer: How To Make Use of Templates

        This tutorial will help you to import, use, reuse, save and export/convert templates with Writer. You will learn about OTT file format, converting ODT and DOC to it, making new document from template with examples and pictures. Let’s learn now.

      • HowTo ForgeHow to Install Jupyter Notebook on Ubuntu 22.04

        Jupyter Notebook is a free, open-source, and web-based interactive computing platform that allows users to edit and run documents via a web browser.

      • HowTo ForgeHow to Install Suricata IDS on Ubuntu 22.04

        Suricata is a free and open-source network analysis and threat detection software developed by OSIF. It can be used as an intrusion detection system (IDS) and an intrusion prevention system (IPS).

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KWin and tiling | Mart

          Personally I haven’t ever been a big user of tiling windowmanagers such as i3, awesome and what not, is not much the workflow style I want 24/7 out of my desktop, but there is definitely something something to say about that kind of multitasking when it makes sense, when is important to see the status of multiple windows at once for some particular task.

          Plasma’s KWin has since a long time a basic support for tiles via the quick tiling support, by either dragging a window at edges or corners, or via keyboard shortcuts. This feature is very good, but very basic, and while there are 3rd party tiling extensions such as Bismuth which is a very nice thing, but window geometry managing outside the core always can bring you only so far.

          Over the last month I have been working to expand a bit the basic tiling capabilities, both the quick tiling with the current behavior and a more advanced UI and mechanism which lets the user to have a custom tiling layout. Here it is a very short screencast about it.

  • Distributions and Operating Systems

    • Reviews

      • Distro WatchReview: Lubuntu 22.10

        Finally, a kind word about what Lubuntu 22.10 looks like and its default desktop wallpaper. I don’t usually care about that stuff; if something annoys me, I just change it. Dark mode and all of that doesn’t do me much good working in a room with the Texas sun coming in through two sides. So blue wall paper and blue icons. Thank you, thank you, thank you.

    • BSD

      • FuguIta 7.2

        Starting with this release, the autostart configuration file noasks, placed in the root of the partition, will no longer function.

    • SUSE/OpenSUSE

      • DebugPointOpenSUSE Introduces “D-Installer” for Adaptable Linux Platform

        In a blog post last week, the OpenSUSE team introduced a new Linux distro installer called “D-installer”, which will be the primary installation method for the upcoming Adaptable Linux Platform (ALP).

        The installer is currently undergoing testing, and I tested it on a virtual machine. Here’s how it looks.

    • Arch Family

      • Linux Shell TipsBest GUI Package Managers for Arch Linux Distribution

        A package manager is essential for the installation, removal, and upgrade of user and system-targeted packages on a Linux distribution. Also, package managers are viably applicable in resolving dependency issues in order for a targeted package to function as expected.

        In Linux, a package manager can either be used in CLI (Command Line Interface) mode or GUI (Graphical User Interface) mode.

    • Fedora Family / IBM

      • IBus 1.5.27 is released | DesktopI18N’s Blog

        This release enhances ibus restart subcommand for the GNOME desktop session. The GNOME desktop session runs ibus-daemon via systemd and previously ibus restart subcommand failed to restart ibus-daemon but now it’s also connected to systemd by default. The other options can be shown with ibus restart –help subcommand and you can specify –type=direct or –type=systemd or –verbose option.

        ibus im-module subcommand is added newly to get an internal gtk-im-module value from an instance of an GTK instance and this subcommand would be useful in case that users install IBus input method framework by manual and they check if IBus is installed properly. If IBus GtkIMModule is loaded in Xorg desktop sessions, “ibus” is output. “wayland” is output in GNOME Wayland desktop session. The command checks GTK3 by default and the other options can be shown with ibus im-module –help subcommand and you can specify –type=gtk2 or –type=gtk4 option. Currently only GTK is supported.

      • Make Use Of4 Reasons Why AlmaLinux Is a Better CentOS Alternative

        CentOS will reach its end of life in June 2024. As of 2022, it powers a lot of servers around the world, in fact, back in 2010 it was the most popular Linux server distro. Based on Red Hat Enterprise Linux (RHEL), CentOS is a solid Linux OS that powers enterprise desktops and servers.

        News of CentOS’s end of life has caused a lot of concern. Organizations and administrators using the OS are sweating on how to migrate their servers and IT infrastructure from CentOS. Changing server software en masse is no mean undertaking.

      • OpenSource.com20 technology horror stories about learning the hard way | Opensource.com

        Halloween will be here before you know it! This fun, over-the-top holiday is a great time to ponder the mortal fears of the developer in each of us. What haunts you the most, in the quiet moments just before your code starts to run?

      • OpenSource.com10 universal steps for open source code review | Opensource.com

        Have you ever found yourself in a situation where you needed to do a code review but didn’t fully understand the project? Maybe you did not review it to avoid looking like you didn’t know what you were doing.

        This article assures you that there’s a better way. You don’t need to know everything to provide a code review. In fact, based on my experience, that’s quite common.

        I remember when I joined Red Hat as an intern and was asked to help with code reviews. We used a system of +1 or -1 votes, and I was initially very hesitant to weigh in. I found myself asking whether when I gave a +1 on a change but then someone else voted -1, would I look foolish?

        What does happen if someone votes -1 on a change you’ve vote +1? The answer is nothing! You might have missed a detail that the other person noticed. It’s not the end of the world. That’s why we have this voting system. Like the rest of open source, merging code is a collaborative effort.

        Lately, I’ve been so inundated with code reviews that I can hardly keep up with them. I also noticed that the number of contributors doing these reviews steadily decreased.

        For this reason, I’m writing about my point of view on writing a code review. In this article, I’ll share some helpful tips and tricks. I’ll show you a few questions you should ask yourself and a few ideas of what to look for when doing a code review.

      • Red HatBest practices for application shutdown with OpenSSL | Red Hat Developer

        OpenSSL is an essential library for securing web traffic. This article offers simple procedures for initializing and terminating applications using OpenSSL. Modern applications that are more complex than “Hello, world!” usually require several external libraries like OpenSSL, which in turn often need to be properly initialized on startup and deinitialized on shutdown.

        OpenSSL libraries are set up internally during program initialization. At this time, they load the configuration file, allocate resources, and handle FIPS mode, among many other tasks.

        The OpenSSL API function for initialization is OPENSSL_init_crypto. This function accepts a variety of options with reasonable defaults. Initialization should be performed before any other OpenSSL function is used, though some OpenSSL functions invoke OPENSSL_init_crypto themselves.

      • Red Hat OfficialLearn about virtio-networking

        Put simply, virtio-networking is the networking device of virtio, a standardized open interface for virtual machines (VMs) to access simplified devices such as block storage and networking adaptors.

        While the virtio networking device was originally developed as a network virtualization interface between physical hosts and guests in virtual environments, a number of open source communities have adopted this networking device as a means of addressing emerging networking challenges.

        The Linux Kernel community, the Data Plane Development Kit (DPDK) community, QEMU and OASIS among others all lean on these specifications, broadly forming the virtio-networking community.

      • Enterprisers ProjectHow to avoid a leadership horror story | The Enterprisers Project

        In our world, we see signs of trouble often: a complaint from a customer, an employee who misses a key communication or meeting, or a conflict that brews up and then dies down on a team. Sometimes these things are just one-offs or resolve themselves, but it is always best to make sure.

      • Enterprisers Project6 tricks and treats to watch for in your new role | The Enterprisers Project

        It’s an exciting time, full of new opportunities. But starting a new job can also be downright scary. Here are six common trends – three to enjoy; three to avoid – to watch for as you settle into your new position.

      • Red Hat OfficialEdge-compatible recommendations now available in Red Hat Insights Advisor

        The open hybrid cloud vision of Red Hat covers four footprints: physical, virtual, cloud and edge. Red Hat Enterprise Linux (RHEL) is at the forefront of the innovation that comes with edge computing by providing a more consistent, reliable and security-focused operating system to fuel the demand from enterprises to operate at the closest point of data generation.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Events

    • Web Browsers/Web Servers

      • Mozilla

        • MozillaSupport.Mozilla.Org: Introducing Lucas Siebert

          I’m super delighted to introduce you to our new Technical Writer, Lucas Siebert. Lucas is joining the content team alongside Abby and Fabi. Some of you may meet him already in our previous community call in October.

    • GNU Projects

      • GNUmake – News: GNU Make 4.4 Released! [Savannah]

        The next stable version of GNU Make, version 4.4, has been released and is available for download from https://ftp.gnu.org/gnu/make/

        Please see the NEWS file that comes with the GNU make distribution for details on user-visible changes.

      • LWNGNU Make 4.4 released [LWN.net]

        Version 4.4 of the GNU make utility is out. There is a long list of changes and a fair number of potential compatibility issues; see the announcement text for all the details.

    • Programming/Development

      • Perl / Raku

        • RakulangRakudo Weekly News: 2022.44 PRename

          An announcement by the board of The Perl Foundation caused quite a bit of confusion (PerlWeekly, HackerNews comments), both in the Perl and Raku communities. Elizabeth Mattijsen explained that it was the wording of the announcement causing confusion. It’s the underlying legal entity “Yet Another Society” that will get another trade name (doing-business-as) “The Perl and Raku Foundation” (TPRF). Along with the other dbas “The Perl Foundation” and “The Raku Foundation”.

        • PerlHello and welcome! | MarisaG [blogs.perl.org]

          Perl is my all-time favorite language, and I have been using it since it was released. But I just now decided to create a website for it to share and curate Perl content with other fans.

        • DEV CommunityOn the Perl and Raku Foundation

          The announcement of a change of name of “The Perl Foundation” to the “The Perl and Raku Foundation” left me feeling puzzled, and I should say disappointed.

          Fortunately, after the last Raku Steering Council meeting, it became clear that my disappointment was unwarranted. And that my (and probably a lot of other people’s) puzzlement was caused by poor wording of the announcement, not by what it was trying to convey.

      • R

        • Dirk EddelbuettelDirk Eddelbuettel: RcppGSL 0.3.12 on CRAN: Maintenance

          A new release 0.3.12 of RcppGSL is now on CRAN. The RcppGSL package provides an interface from R to the GNU GSL by relying on the Rcpp package.

          This release accomodates, just like so many other releases this week, the more stringent views of clang-15 about what a correct function prototype is. While we were at it, an updatet to GitHub Actions was made as well.

        • Dirk EddelbuettelDirk Eddelbuettel: RcppBDT 0.2.6 on CRAN: Maintenance

          A minor maintenance release for the RcppBDT package is now on CRAN.

          The RcppBDT package is an early adopter of Rcpp and was one of the first packages utilizing Boost and its Date_Time library. The now more widely-used package anytime is a direct descentant of RcppBDT.

          This release accomodates, just like so many other releases this week, the more stringent views of clang-15 about what a correct function prototype is. While we were at it, an updatet to GitHub Actions was made as well.

        • Dirk EddelbuettelDirk Eddelbuettel: RApiDatetime 0.0.7 on CRAN: Maintenance

          A new release of our RApiDatetime package is now on CRAN.

          RApiDatetime provides a number of entry points for C-level functions of the R API for Date and Datetime calculations. The functions asPOSIXlt and asPOSIXct convert between long and compact datetime representation, formatPOSIXlt and Rstrptime convert to and from character strings, and POSIXlt2D and D2POSIXlt convert between Date and POSIXlt datetime. Lastly, asDatePOSIXct converts to a date type. All these functions are rather useful, but were not previously exported by R for C-level use by other packages. Which this package aims to change.

          This release accomodates, just like so many other releases this week, the more stringent views of clang-15 about what a correct function prototype is. While we were at, updates to GitHub Actions and https URL were made as well.

      • Misc.

        • CollaboraMeet Abi – Collabora Software Engineering Intern

          Collabora recruits interns to work over the summer alongside our team, and to build experience to help them assess whether they want to pursue a career in Software Engineering, but how does that work out?

        • ephemerons and finalizers — wingolog

          Good day, hackfolk. Today we continue the series on garbage collection with some notes on ephemerons and finalizers.

          [...]

          This is a more annoying property for a garbage collector to track. If you happen to mark K as live and then you mark E as live, then you can just continue to trace V. But if you see E first and then you mark K, you don’t really have a direct edge to V. (Indeed this is one of the main purposes for ephemerons: associating data with an object, here K, without actually modifying that object.)

          During a trace of the object graph, you can know if an object is definitely alive by checking if it was visited already, but if it wasn’t visited yet that doesn’t mean it’s not live: we might just have not gotten to it yet. Therefore one common implementation strategy is to wait until tracing the object graph is done before tracing ephemerons. But then we have another annoying problem, which is that tracing ephemerons can result in finding more live ephemerons, requiring another tracing cycle, and so on. Mozilla’s Steve Fink wrote a nice article on this issue earlier this year, with some mitigations.

          [...]

          The gnarliness continues! Imagine that O is associated with a finalizer F, and also, via ephemeron E, some auxiliary data V. Imagine that at the end of the trace, O is unreachable and so will be dead. Imagine that F receives O as an argument, and that F looks up the association for O in E. Is the association to V still there?

          Guile’s documentation on guardians, a finalization-like facility, specifies that weak associations (i.e. ephemerons) remain in place when an object becomes collectable, though I think in practice this has been broken since Guile switched to the BDW-GC collector some 20 years ago or so and I would like to fix it.

        • CNX SoftwareTinyML-CAM pipeline enables 80 FPS image recognition on ESP32 using just 1 KB RAM

          The challenge with TinyML is to extract the maximum performance/efficiency at the lowest footprint for AI workloads on microcontroller-class hardware. The TinyML-CAM pipeline, developed by a team of machine learning researchers in Europe, demonstrates what’s possible to achieve on relatively low-end hardware with a camera.

    • Standards/Consortia

      • The Register UKGoogle drops forthcoming version of JPEG from Chromium • The Register

        A note on Google’s bug tracker for the Chromium browser specifies that version 110 won’t get JPEG XL support after all.

        The Chromium browser project is the open source upstream of what later becomes Google’s Chrome browser, along with a host of other browsers including Microsoft Edge, Opera, Vivaldi, and Brave.

        The removal of JPEG XL means that none of these above browsers will be able to natively render JPEG XL images, and in turn that effectively dooms the new format, barring the unlikely event of the Mountain View megalith changing course.

  • Leftovers

    • David RevoyIn the midst of experimentation – David Revoy

      Hi everyone, right now it’s a special time: I need to experiment and it’s more like a wind that is blowing quite strongly in me. You have probably already noticed it by the latest content I shared on blog or on social medias. So I’m telling you: I’m very likely to scatter myself, multiply various attempts, and test even more things soon.

      [...]

      So that’s why it boils inside me all the time. I would like to reform my way of publishing my stories because this mode of production clearly puts me in an impasse. I have the intuition that there is a new angle but also that I will have to experiment. However, one thing is certain in this whole story: I intend to share this exploration with you.

    • Hardware

    • Security

      • Bleeping ComputerMicrosoft releases out-of-band updates to fix OneDrive crashes

        Microsoft has released out-of-band updates to address a known issue causing OneDrive and OneDrive for Business to crash after installing recent Windows 10 updates.

        The issue occurs when signing out or unlinking OneDrive accounts or sites and folders from Microsoft Teams and SharePoint.

        “After installing KB5018410 or later updates, OneDrive might unexpectedly close,” Redmond explained in a Windows health dashboard update on Friday.

      • IT WireRansomware attack on Dialog also took down defence app ForceNet

        The external provider affected in the ransomware attack on ForceNet, a service used by the Australian Department of Defence, is Dialog Information Technology, a company owned by Singtel.

        Dialog was hit by an attack which used the Agenda ransomware that runs only on Windows. The group behind the attack announced it on the dark web on 19 September.

      • Bruce SchneierApple Only Commits to Patching Latest OS Version

        People have suspected this for a while, but Apple has made it official. It only commits to fully patching the latest version of its OS, even though it claims to support older versions.

      • Apple clarifies security update policy: Only the latest OSes are fully patched | Ars Technica

        Earlier this week, Apple released a document clarifying its terminology and policies around software upgrades and updates. Most of the information in the document isn’t new, but the company did provide one clarification about its update policy that it hadn’t made explicit before: Despite providing security updates for multiple versions of macOS and iOS at any given time, Apple says that only devices running the most recent major operating system versions should expect to be fully protected.

      • Hacker NewsGitHub Repojacking Bug Could’ve Allowed Attackers to Takeover Other Users’ Repositories

        Cloud-based repository hosting service GitHub has addressed a high-severity security flaw that could have been exploited to create malicious repositories and mount supply chain attacks.

      • Hacker NewsUnofficial Patch Released for New Actively Exploited Windows MotW Vulnerability

        An unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows that makes it possible for files signed with malformed signatures to sneak past Mark-of-the-Web (MotW) protections.

        The fix, released by 0patch, arrives weeks after HP Wolf Security disclosed a Magniber ransomware campaign that targets users with fake security updates which employ a JavaScript file to proliferate the file-encrypting malware.

      • Hacker NewsSamsung Galaxy Store Bug Could’ve Let Hackers Secretly Install Apps on Targeted Devices [Ed: JavaScript strikes again]

        The vulnerability, which affects Galaxy Store version 4.5.32.4, relates to a cross-site scripting (XSS) bug that occurs when handling certain deep links. An independent security researcher has been credited with reporting the issue.

      • Hacker NewsFodcha DDoS Botnet Resurfaces with New Capabilities

        The threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities, researchers reveal.

        This includes changes to its communication protocol and the ability to extort cryptocurrency payments in exchange for stopping the DDoS attack against a target, Qihoo 360′s Network Security Research Lab said in a report published last week.

        Fodcha first came to light earlier this April, with the malware propagating through known vulnerabilities in Android and IoT devices as well as weak Telnet or SSH passwords.

        The cybersecurity company said that Fodcha has evolved into a large-scale botnet with over 60,000 active nodes and 40 command-and-control (C2) domains that can “easily generate more than 1 Tbps traffic.”

    • AstroTurf/Lobbying/Politics

      • DaemonFC (Ryan Farmer)Matthew J. Garrett, “Social Justice Warrior”, is still on Twitter even as Elon Musk now tweets fake news Web sites that blame LGBT people for the attack on Paul Pelosi.

        As of Sunday, October 30th, 2022, Matthew J. Garrett, “Social Justice Warrior”, is still on Twitter even as Elon Musk now tweets fake news Web sites that blame LGBT people for the attack on Paul Pelosi. (NewsWaffle proxy of Original.)

        [...]

        I’ve reached out to Mr. Garrett on Techrights IRC to see if he has anything to say about why he’s still on a platform that is now 100% owned by a homophobe who is blaming gay people for the attack on Paul Pelosi (Quite an odd accusation, but when have conspiracy theories made sense lately?), which will now do pretty much nothing about far-right cranks.

      • Make Tech EasierThe Elon Musk Twitter Era Officially Begins

        This is the reason many people left Twitter earlier this year and began the search for a replacement. Elon Musk officially bought Twitter last week for $44 billion. One reason for the mass departure is that the Tesla head is known to not agree with preventing users from posting fake news. To no one’s surprise, Musk wasted no time instituting changes.

    • Censorship/Free Speech

      • IT WireiTWire – Law that protects US tech platforms against lawsuits being challenged

        A law which shields big tech platforms from lawsuits over content provided by users is being challenged in the US Supreme Court, and is likely to be heard next year.

        The Wall Street Journal reported on Sunday that the court would be hearing a case against Google which argues that Section 230 of the Communications Decency Act, the clause in law that offers protection to technology companies, should not serve as a shield against companies that link to so-called harmful content.

        The US Government has tried in the past to change Section 230, with a bid two years ago to pass what it called the EARN IT Act which looked to add conditions for those who sought protection under it.

        Under this section, one can sue the person who defamed you on a platform like Twitter, but not the platform itself. An amendment to this section in 2018 made platforms liable for publishing information designed to facilitate sex trafficking.

    • Freedom of Information / Freedom of the Press

      • IT WireiTWire – The Wire gets entangled in its own breathless reporting

        Indian news portal The Wire has filed a complaint against one of its own reporters over a story that claimed Facebook parent Meta was allowing a member of the ruling party to censor social media posts. It was alleged that the journalist had allegedly fabricated documents for the story.

        The case against Devesh Kumar was filed with the Delhi Police’s Economic Offences Wing a day after the cops themselves filed a first investigation report against the portal, the Indian Express reported on Sunday.

        It is somewhat strange when a journalistic organisation does not stand behind its own reporting, preferring instead to hang a reporter out to dry.

        India has been ruled since 2014 by the Bharatiya Janata Party, not exactly a political entity that believes in a free press.

    • Internet Policy/Net Neutrality

      • Internet Freedom FoundationA round-up of WhatsApp’s failed attempts to block the Competition Commission’s investigation

        In October 2021, IFF submitted expert information in the Competition Commission of India’s (CCI) suo moto investigation into potential anti-competitive practices of WhatsApp Inc. (‘WhatsApp). In our information, we highlighted how WhatsApp’s 2021 Privacy Policy enabled it to share user data with Facebook Inc. and its subsidiaries including Facebook India Online Service Private Limited (‘Facebook India’). CCI in its order dated October 12, 2021, tagged the information IFF provided with ongoing proceedings against WhatsApp and Facebook Inc. and made Facebook India a party to those proceedings. Facebook India challenged this CCI order before the Delhi High Court. Facebook India’s petition was dismissed by Justice Yashwant Verma of the Delhi High Court on September 28, 2022. An SLP filed by Facebook and WhatsApp has also been dismissed by the Supreme Court.

  • Gemini* and Gopher

    • Personal

      • Classic rock and supernatural

        I was introduced to supernatural, the tv show a month ago. I must admit I am more of a hip hop guy, but the music in this show… man. The tracks just made me feel so pumped. I have never heard rock before this because to me it was just noise, but now all I listen to is rock.

      • 🔤SpellBinding: NMYOPSH Wordo: FAXES
      • Halloween Dispatch

        Looks like it has been more than two months since my last gemlog. Time sure flies when you have a young baby! (Mostly staggering in sleep-deprived stupor, but still.)

        Truth be told, one gets used to sleeping less after a month or two. Most of my productive time has been spent at the ${dayjob}, which in practice turns out to be a few hours per day. The productivity is still heavily supported by coffee consumption — I think I’m up to 3-4 cups per day now. Will have to start paring that down sooner or later.

      • Who He Was

        He had lived a life of a villagen; who was neither a villager nor a citizen. He was seen as a citizen by his village friends and a villager by his city friends. To his view he was a citizen as he lived in a town for studying and went to his village if there was a holiday of any sort.

    • Technical

      • CCR cover on Pocket Operators

        I have just finished my rendition of “Down on the Corner” by CCR.
        This was done on 3 Pocket Operators by Teenage Engineering.[1]

        Pocket Operators are these small, portable, battery-powered
        synthesizers about the size of a calculator. You can make some
        fun sounds with them. The ones I used for this song were the PO-12,
        PO-14, and PO-16 (rhythm, sub, and factory, all gen 1.) [2]

        The song came out very cheesy and makes me laugh. I recorded it but
        it sounds a bit rough. I don’t plan on spending any more time on it.

      • Nushell: Introduction to a new kind of shell

        In a nutshell, nushell is non-POSIX shell, so most of your regular shells knowledge (zsh, bash, ksh, etc…) can’t be applied on it, and using it feels like doing functional programming.
        It’s a good tool for creating robust data manipulation pipelines, you can think of it like a mix of a shell which would include awk’s power, behave like a SQL database, and which knows how to import/export XML/JSON/YAML/TOML natively.

        You may want to try nushell only as a tool, and not as your main shell, it’s perfectly fine.

      • Programming

        • qiudanz technique: devlog

          our intention is to experiment with a generative approach, performing live and human-powered computation based on the qiudanz technique and tag systems (danzasistemas-tag) to expand and contract a movement sequence.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

People Who Adopt Gmail Help Google Attack E-mail in General

Posted in Google, Protocol, Servers at 10:07 am by Dr. Roy Schestowitz

Video download link | md5sum 2f53949551a60a6d9d691f18043d1405
Gmail is Not Email But Attack on Email
Creative Commons Attribution-No Derivative Works 4.0

Summary: Google has become a big problem and Gmail is massive liability to the global E-mail system; its market share needs to be be significantly lowered (the same is true when it comes to Web browsers; therein, whatever Google does becomes a de facto ‘standard’)

THE other day we covered the way Google critics resorted to a partisan framing, basically distracting from Google’s war on independent or small mail relays, the vast majority of which perfectly legitimate ones. Gmail is not a framework for delivering E-mail but for rejecting E-mail, usually based on some flimsy process with a corporate bias. Forget about politics.

All this false partisanship is a Public Relation (PR)) tactic. Google prefers is that way.

Today we deal with this anecdotal story that “90-95% of the spam I receive originates from servers under Google’s control. Do you guys bother to check outgoing messages, or do you just filter and block incoming messages?”

Google is subjecting everyone to vastly higher standards than it subjects itself to. CoC-like thinking of double standards.

There have been similiar agonising stories lately.

“We need to encourage friends, family, colleagues and other peers to shun centralised E-mail systems…”I myself have long experienced the pain of ISPs (or big American companies) discriminating against mail relays like mine. In fact, at one point I was losing a lot of mail or was unable to respond to mail after a close relative lost a family member. It’s hard to forget the amount of damage this caused, even if that was more than 16 years ago!

E-mail is meant to reliably send mail; but the entrepreneurs behind E-mail (the real ones, not the fraud who threatened me for calling him out) did not envision companies like Google hoarding a lot of the system and then blocking loads of relays without any oversight, let alone independent scrutiny and fines. We need to encourage friends, family, colleagues and other peers to shun centralised E-mail systems; the endgame might be the end of E-mail as an open system.

The European Commission’s Policy-Making on Software Patents Inside Standards

Posted in Deception, Europe, Patents, Standard at 9:34 am by Dr. Roy Schestowitz

Video download link | md5sum 31f6bef340ba276e8686f1e6b4cc8711
EC Adopts Proprietary Web and Patent Tax
Creative Commons Attribution-No Derivative Works 4.0

Summary: The European Commission is hostile towards FOSS (Free and Open Source Software); it not only uses a lot of proprietary software from Microsoft but it also serves a pile of proprietary garbage pretending to be a Web site that mostly loses feedback from the public on matters of monopoly policies

THE proprietary leanings of the EC are a matter of public record. Just look at the official site, including the site of the corrupt EUIPO. It’s just so awful. Usability and accessibility there are truly awful. They hate standards; they hate the Web.

“They hate standards; they hate the Web.”The video above, however, focuses on patent policies, though the EC uses propaganda terms very extensively because these terms bias the debate; the loaded, intentionally-misleading words are there for a reason and that’s why the EPO‘s Benoît Battistelli and António Campinos spread them. We’re meant to think that code is “intellectual property” and thus we need European software patents.

After some search (on the strings “patent” and “patents” among others) or research in the EC’s awful Web site an associate of ours narrowed things down to about 4 links. “There have been four software patent-related initiatives in the EC this summer,” the associate concluded.

“This terrible JavaScript mess (and accessibility nightmare in general) isn’t a new problem at the EC. It merely serves to reaffirm the troubling biases of the EC.”We’ve filtered this further to have just a few links and feedback as discussed in the video above; the “new framework for standard-essential patents” (misnomer) is preceded by “Intellectual property” (another misnomer) and Simon Phipps (OSI) can be found among the comments. There’s also some feefback from the University of Skövde, which mentions Free software. Sadly, many of the interesting comments are now dead links (or became invalidated). “This also snuck through,” the associate noted, but again a lot of the links failed to work.

This terrible JavaScript mess (and accessibility nightmare in general) isn’t a new problem at the EC. It merely serves to reaffirm the troubling biases of the EC.

“Disappointing but not surprising,” our associate called it. “So they are not a page but some highly “clever” web “app” in place of a proper information retrieval system and the unspoken goal seems to be to ensure that the public cannot follow what the EC is up to.”

Removing Electronic Voting Machines (or Moving Everything to FOSS and Open Standards) Would Improve Election Certainty

Posted in America, Free/Libre Software at 9:05 am by Dr. Roy Schestowitz

Video download link | md5sum 22692bae8396f2df8de753bc3958cf29
Lula Winning is a Win for Free Software
Creative Commons Attribution-No Derivative Works 4.0

Summary: Disinformation campaigns and election processes that are virtually impossible to audit serve to show that technology can harm democracies; on the other hand, there’s a better chance at comprehending digital systems if they conform to standards and use only Free software on ‘open hardware’

THE notion of electronic voting is not compatible with the concept of maintaining physical paper trail for assessment by pertinent people, like people who count individual votes (not totals) and respective observers who validate the counting process. There’s ample literature on this subject, authored by people with extensive experience in that domain. They can explain this far better than us. In the past we wrote about the concept of Software Freedom in voting; paper is best, combination of machines and paper is faster but can be tampered with, Free software in voting machines* is a “lesser evil”, and then there’s the back-doored proprietary voting infrastructure, which is pure evil yet increasingly widespread. The last one is the worst and it cannot be tolerated because it leads to uncertainty about outcomes (like the 2016 election in the US where Russians were accused of cracking, then in 2020 when disinformation ran rampant). No operating systems — or no computer programs at all — means no cracking. And without prospects of cracking, confidence only improves. “Show me the ballots” is more powerful than “show me the code!”

Some days ago we cautioned against mindless stigmatisation of people who reject electronic voting and now we’re seeing Bolsonaro trying to ‘pull a Trump’ to dispute the outcome of an election he lost (several links about it were posted here this morning).

“It certainly does not feel like technology is so beneficial to democracy.”The video above focuses on the Free software (or ‘FOSS‘) track record of Lula, the winner of the election in Brazil. He has long supported the country’s digital autonomy and adoption of standards such as Open Document Format (ODF). “Well,” an associate has said this morning, “the outcome of the election in Brazil could have a positive effect on FOSS and Open Standards there.”

That’s aside from how the election was done.

But it remains to be seen if Bolsonaro leaves the helm or wages a violent coup like Donald Trump did (still with total impunity; the country does not take insurrection seriously enough). The video mentions how Bolsonaro himself attempted to rig the election by posting intentionally false (fake) material online. It certainly does not feel like technology is so beneficial to democracy.
____
* “Voting and FOSS are two unrelated topics,” an associate noted, so it’s “best to split them into two posts.” But in the case of Brazil, we’d like to bring light to both aspects. “It would not be good if there were confusion and it looked like advocating for FOSS voting machines at this point,” the associate added. Just to be clear, our position is that Lula should move the country to Free software. As for the voting process, it ought to be done with paper ballots. Not everything needs to be handled by technology. Counting millions of paper ballots by hand does not take a long time, either. It often feels like a “solution” in search of a problem or plain grifting.

Links 31/10/2022: Linux 6.1-rc3

Posted in News Roundup at 4:12 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Linux Made SimpleLinux Weekly Roundup #207

      Welcome to this week’s Linux weekly roundup.

      We had a good week in the world of Linux releases with Voyager Linux 22.10, Bluestar Linux 6.0.5, and Zorin OS 16.2.

    • Audiocasts/Shows

    • Kernel Space

      • LinuxLinux 6.1-rc3
        It's Sunday afternoon, so it must be time for an rc release.
        
        I know I said last week that rc2 was unusually large. It turns out
        that rc3 is almost exactly the same size. But at least for an rc3
        release, that bigger size is a bit more normal: this is when people
        are starting to find problems and send in fixes for them.
        
        So while rc2 was just _way_ bigger than usual, rc3 is only a bit
        larger than an average rc3 release is. But it's still on the largish
        side. I hope that things start calming down, and we'll start seeing
        the size of these rc's shrink. Please?
        
        Unlike rc2, there's no one single reason for the bulk of the rc3
        changes. They're pretty much all over, with the usual distribution -
        drivers dominating (networking, gpu and sound are most noticeable, but
        there's a little bit of everything).
        
        Outside of drivers, tool updates stand out, with selftests, perf, and
        the pm-graph tool all seeing a fair amount of changes.
        
        And then we have the usual things: architecture updates, some
        filesystem work, and core kernel fixes (mainly networking and mm).
        
        Anyway, while it isn't small, nothing looks particularly worrisome or
        strange, and I thin kyou can just scan the appended shortlog to get a
        feel for the kinds of fixes we have here. Please do give it more
        testing, and here's to hoping we'll start seeing the rc's shrink from
        now on.
        
                   Linus
        
      • LWNKernel prepatch 6.1-rc3 [LWN.net]

        The 6.1-rc3 kernel prepatch is out for testing.

    • Instructionals/Technical

      • Jan Piet MensA nifty push notification system: ntfy

        Ever since thinking “that’s quite nifty”, I have the devil of a time spelling ntfy without transposing the ‘t’ and the ‘f’, but it’s called notify so the ‘t’ comes before the ‘f’. :-)

      • DJ AdamsMore Untappd data explorations with jq – my top ranking beer types (part 1)

        I’ve been exploring my Untappd data a bit more since analysing my top brewery countries, this time to see if my average ratings indicated anything about my preferred beer types. Here’s what I’ve done so far, in part 1 of this little series.

      • Linux HandbookHow to Install LOMP Stack on Ubuntu

        Are you looking for a complete LAMP stack guide? This tutorial will show you how to install a LEMP stack on an Ubuntu 22.04 server.

      • ID RootHow To Install Snort on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Snort on Ubuntu 22.04 LTS. For those of you who didn’t know, Snort is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows operating system to detect emerging threats. Snort has a real-time alerting capability, with alerts being sent to syslog, a separate “alert” file, or even to a Windows computer via Samba.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Snort network intrusion detection system on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • NextGenTipsHow to set up an Nginx Server with the Google Cloud Platform – NextGenTips

        Have you encountered a problem where you want to host a simple web server but you don’t know how to go about it, here is a very simple solution to host a simple web server on Google cloud using the free tier.

        In this tutorial, I will take you through the setting up of a server on Google cloud and later install Nginx. From here you can run a simple hello world.

        Here I am using a free tier. Make sure you destroy your instance when you are done experimenting to avoid incurring extra charges.

      • LinuxTechiHow to Delete Partition in Linux Step-by-Step

        Sometimes, you might want to delete some disk partitions on your Linux system to recover or regain some storage space. You can easily accomplish this on the command line with a few simple steps.

        In this guide, we will demonstrate how you can delete a partition in Linux step-by-step. We will start off by deleting a standard partition and then deleting an LVM partition.

      • Linux HintHow to Install Wine on Arch Linux
      • UNIX CopHow to use the nohup command in Linux

        In general, the nohup command allows you to run a command immune to hangups, with output to a non-type.

        What does this mean? It allows you to keep the execution of a command independent of the terminal session. Making it continue to run despite closing the terminal.

        As you can notice, the nohup command is quite useful in situations of configurations that we want to be done in the background and without affecting the user’s work.

        Being a bit more technical, the nohup command ignores the HUP signal, which is the one sent to the process when the controlling terminal is closed, making it still alive.

      • Linux HintInstall Python PIP Debian 11
      • Linux Made SimpleHow to install Psych Engine 0.6.3 on a Chromebook

        Today we are looking at how to install Psych Engine 0.6.3 on a Chromebook.

        If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

    • Games

    • Desktop Environments/WMs

      • 9to5LinuxXfce’s Apps Update for October 2022: Thunar Gets More New Features Towards Xfce 4.18

        This month there weren’t so many releases of your favorite Xfce apps as the devs continue to focus on the next major release of the lightweight desktop environment, Xfce 4.18, which should soon be ready for public testing.

        According to the official Xfce 4.18 roadmap, the first pre-release version is expected to hit the streets on November 1st, 2022. A second pre-release version is planned for December 1st, while the final release could be out on December 15th or the 29th if there’s a need for a third pre-release version.

  • Distributions and Operating Systems

    • Canonical/Ubuntu Family

    • Devices/Embedded

      • Linux GizmosIoT board based on RPi CM4 supports various wireless interfaces and optional PoE

        The RAK7391 WisGate Connect is an industrial gateway board powered by the Raspberry Pi Computer Module 4. This product also includes flexible peripherals such as dual GbE ports, camera connectors, and multiple expansion sockets for memory devices.

        According to RAKwireless, the WisGate Connect can support the whole Raspberry CM4 family.

    • Open Hardware/Modding

      • HackadayZIF HDDs Dying Out? Here’s An Open-Source 1.8″ SSD

        A lot of old technology runs on parts no longer produced – HDDs happen to be one such part, with IDE drives specifically being long out of vogue, and going extinct to natural causes. There’s substitutes, but quite a few of them are either wonky or require expensive storage medium. Now, [dosdude1] has turned his attention to 1.8 ZIF IDE SSDs – FFC-connected hard drives that are particularly rare and therefore expensive to replace, found in laptops like the Macbook Air 1,1 2008 model. Unsatisfied with substitutes, he’s designed an entire SSD from the ground up around an IDE SSD controller and NAND chips. Then, he made the design open-source and filmed an assembly video so that we can build our own. Take a look, we’ve put it below the break!

      • Old VCRIf one GUI’s not enough for your SPARC workstation, try four

        And it turns out that particular computing environment was really the intersection point for a lot of early GUI efforts, which were built and run on Sun workstations and thus will also run on the Solbourne. With some thought, deft juggling of PATH and LD_LIBRARY_PATH and a little bit of shell scripting, it’s possible to create a single system that can run a whole bunch of them. That’s exactly what reykjavik, this S3000, will be doing.

      • Bozhidar BatsovWhy Bother with a Custom Desktop PC in 2022?

        Many people are quite surprised when I tell them that my primary computer is a custom-built desktop PC, that I assembled myself. After all, desktops have been going out of fashion for over a decade and most people these days use laptops or even tablets as their primary (work) devices. The only big users of the desktop PCs today seem to be gamers, but they rarely assemble their rigs from scratch.1 I’m definitely not a (big) gamer. Customs-built PCs require some degree of maintenance (at the very least you have to get them working) and are prone to some subtle issues (e.g. the RAM not playing well with the MB, some drivers being a mess, etc). So, why bother with all of this in 2022?

    • Mobile Systems/Mobile Applications

      • GSM ArenaFlashback: Firefox OS burns down, KaiOS rises from the ashes – GSMArena.com news

        The browser wars of the 90s and 2000s saw the dominant player – Microsoft’s Internet Explorer – locked in a David and Goliath battle against Firefox, an open-source browser that was spun off from work at Netscape.

        A decade later another software war began – Microsoft was involved again with Windows Mobile, but the Goliath in this case was Symbian lead by Nokia. You should be familiar with the two Davids that took it on – Apple’s iPhone and Google’s Android project.

        However, today’s story is about Firefox OS, which was developed by Mozilla, the same community that had been working on the Firefox browser since the late 90s. Mozilla wanted to bring its principles of openness, security and privacy to the smartphone market and some smartphone makers were receptive to a new alternative to Android.

  • Free, Libre, and Open Source Software

    • 4 Twitter features Mastodon is better for not having

      At first Mastodon looks like a straight-up clone. It meets Twitter’s 280-character Tweets with 500-character Toots. On Twitter you can Like, or Retweet to your followers; on Mastodon you can Favorite, or Boost to your followers. So far, so familiar.

      But after some time on the network (I joined when the Musk purchase was first discussed in April), I’ve noticed subtle, welcome differences in how conversations play out. And some of the improvements come not from cool new Mastodon-specific features, but from Twitter features that are deliberately missing. The first of these happy omissions is right on the home timeline. Compare, Mastodon versus Twitter: [...]

    • SaaS/Back End/Databases

      • Phil EatonA Database Without Dynamic Memory Allocation

        Let’s recap memory allocation in general. In most languages, you can choose to have fixed size objects and arrays at program start. Or, you can modify the object and array sizes during the run of the program, maybe to add new keys to the object or maybe to grow the array to fit more elements.

    • Programming/Development

      • Linux HintArduino dtostrf() Function -Turn Your Floats into Strings

        While programming Arduino boards we have to deal with different programming techniques to manipulate the data accordingly. To deal with data we need multiple functions that help us to write code for our project. One of the widely used functions is dtostrf() which converts double and float values into string with defined precision.

      • ButtondownSoftware Isomorphisms

        Last week Gabriella Gonzalez wrote What does “isomorphic” mean (in Haskell), which covers isomorphism from a first-principles perspective.

    • Standards/Consortia

      • [Old] Greg WooledgeFTP Must Die

        9. To Summarize

        FTP is an outdated, insecure, slow and unfriendly pig of a protocol. It has no business being on the Internet in the 21st century.

        FTP MUST DIE!

  • Leftovers

    • HackadayStop Silicone Cure Inhibition, No Fancy Or Expensive Products Required

      Casting parts in silicone is great, and 3D printing in resin is fantastic for making clean shapes, so it’s natural for an enterprising hacker to want to put the two together: 3D print the mold, pour in the silicone, receive parts! But silicone’s curing process can be inhibited by impurities. What’s cure inhibition? It’s a gross mess as shown in the image above, that’s what it is. Sadly, SLA-printed resin molds are notorious for causing exactly that. What’s a hacker to do?

    • HackadaySuper 8 Film Editor Reborn As A YouTube Terminal

      We love hacks that give new life to old gadgets, and [edwardianpug]’s YouTube Terminal certainly fits the bill by putting new hardware inside a Super 8 film editor.

    • Nicholas Tietz-SokolskyRC Week 5: Wrapping up projects and starting a new one | nicholas@web

      Another week of my RC batch wraps up. I’m done with five weeks, and seven weeks are left! Time is still flying by, and I’ve hit an inflection point. I have gotten what I want out of the two projects I’ve worked on so far, so I’m going to wrap them up and move on to one new project for the rest of the batch.

    • Zach FlowerMy Grandfather Still Gets Typewritten Mail

      While getting personal mail is a novelty in itself in 2022, what made these particular letters so interesting was the fact that more than a few of them were typewritten… you know, like with a typewriter. Now, as funny as it would be to say that my grandpa is friends with a bunch of farm town hipsters, the much more heartwarming reality is that he and his peers haven’t embraced modern technology with nearly as much vigor as younger generations have; and as a result, still connect on a much more physical and personal level.

    • Counter PunchShakespeare Today

      We recall that at the conclusion of Romeo and Juliet, the Prince bemoans the predictable and preventable consequences of senseless vendettas, vanities, arrogance and intransigence – a riveting moment:

    • HackadayPlaying With The Power Of Full G-Code Control

      Slicing software needs to maintain a balance between ease-of-use and control, while handling handle any STL file you throw at it. If you eliminate the need to convert an existing 3D model, and create G-Code directly, you gain a lot of design freedom, at the cost of increased design effort. By taking advantage of this freedom and making it more accessible, [Andrew Gleadall] and [Dirk Leas] created the FullControl Design Library.

    • HackadayRecreating The “Stuck Throttle” Problem On A Toyota

      A few years ago, Toyota was in the news for a major safety issue with a number of their passenger vehicles. Seemingly at random, certain cars were accelerating without concern for driver input, causing many crashes and at least 37 confirmed deaths. They issued recalls both for the floor mats which were reported to have slid forward to jam the accelerator pedal, but this didn’t explain all of these crashes. There was another recall for stuck throttles, which [Colin O’Flynn] demonstrates a possible cause for on his test bench.

    • Science

      • New ScientistFirst 3D quantum accelerometer could let ships navigate without GPS | New Scientist

        A quantum device that can determine its position in three dimensions is more accurate than non-quantum versions. Vehicles could use it to navigate even if GPS stopped working.

        One way to keep track of something’s position is with an accelerometer, which is a small device that is found in everything from phones to drones. Accelerometers work by detecting changes in movement and therefore position.

      • ACM[Computer] In Your Ears

        ClearBuds” is the code-name of the first “end-to-end hardware-software neural-network based binaural system using wireless synchronized earbuds,” according to hardware engineer Maruchi Kim at the University of Washington.

        Kim and his colleagues demonstrated a prototype of their speech-enhancing/noise-reducing devices at the ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys2022, held in Portland, OR June 27-July 1 ).

        The “first” claimed by the researchers is the pairing of binaural (dual) microphones—one in each ear’s ClearBud—with two neural networks in an app on a smartphone, resulting in a superior user-experience of voice isolation and noise cancellation during telephone conversations, according to test subjects.

        “While neither dual mics nor neural network software is unique or innovative, the combination has value since it reportedly provides an experience that the users liked,” said Fan Gang Zeng, a professor of otolaryngology and director of the Hearing and Speech Laboratory at the University of California, Irvine. A researcher in auditory science and technology who was not involved with the research, Zeng added, “Also, there is no technical barrier for others to develop or use the same combo.”

        To assist other researchers and even commercial telephony equipment providers to use the ClearBud approach, the researchers open-sourced their hardware, software, and neural network architectures. Details are provided in their paper, as well as in their audio demonstrations (which also contain links to the open-source hardware, including the printed circuit board layout, the software code for binaural transmission over Bluetooth, and the code and architectures of the neural networks).

      • NatureAI model transferability in healthcare: a sociotechnical perspective | Nature Machine Intelligence

        To deliver value in healthcare, artificial intelligence and machine learning models must be integrated not only into technology platforms but also into local human and organizational ecosystems and workflows. To realize the promised benefits of applying these models at scale, a roadmap of the challenges and potential solutions to sociotechnical transferability is needed.

        Predictive model transferability, traditionally defined as “the ability to produce accurate predictions among patients drawn from a different but plausibly related population”1, is receiving increasing attention as healthcare organizations attempt to implement artificial intelligence (AI)-based prediction tools2,3,4. Although some machine learning (ML)-based models fail when subjected to retrospective validation across institutions and patient populations5, technical improvements (e.g., foundation models) show promise for addressing this model efficacy problem. To address the engineering challenges, a technical subfield labelled MLOps has emerged, promising to address technical transferability by injecting needed discipline into the development, integration, deployment, monitoring, iteration and governance of ML models6,7. These developing solutions open the door to deploying models developed for localized applications in new contexts, thereby realizing AI’s promise of scalability.

    • Education

      • Austin Z HenleyDoes experience make you a better programmer?

        A study was recently published that tries to shed light on this topic: Correlates of Programmer Efficacy and Their Link to Experience: A Combined EEG and Eye-Tracking Study.

        They conducted a lab study where 37 programmers were instructed to comprehend code solutions to Leetcode-like problems and then asked the output given a specific input. The programmers did so while wearing an EEG cap and in front of an eye tracker.

    • Hardware

      • Kev QuirkThe Time My Nan Bought Me a Baby-G Watch

        Back in the 1990’s I wanted a G-Shock watch, so my nan bought me one for Christmas. Here’s the story of what happened to that watch…

        So cast your mind back to the late 90s. I was in high school, Saved By The Bell was all the rage, and 13 year old Kev desperately wanted a G-Shock watch.

        This was because my good friend, Cockney Chris (he was from Milton Keynes and moved to the north…that made him a cockney to us), had a G-Shock. I remember Chris’ G-Shock being MASSIVE and really cool. I was so jealous.

        Then, one day when we were getting changed in the gym for PE (physical education), and he dropped a bombshell…

      • Jeff GeerlingAutomating my Homelab with Ansible (AnsibleFest 2022) | Jeff Geerling

        In the presentation, I gave a tour of my homelab, highlighting it’s growth from a modem and 5-port switch to a full 24U rack with a petabyte of storage and multiple 10 gigabit switches!

      • HackadayGarmin HUD Got Discontinued, But Not Trashed

        The Garmin HUD+ was a small Bluetooth device intended for the dashboard of a car, meant to be used as a GPS heads-up display for data from Garmin smartphone apps. It used a bright VFD (vacuum fluorescent display) which was viewed through a clear reflector, and displayed GPS information and directions. It was discontinued in 2015, but [Doz] was fond of his and used it happily until a phone upgrade meant it no longer worked. Was it destined for a landfill? Not if he had anything to say about it!

    • Health/Nutrition/Agriculture

      • Mexico News DailyFeds look for suppliers of non-GM corn as imports ban nears

        Deputy Agriculture Minister Víctor Suárez told the news agency Reuters that the government is proceeding with the ban and no modifications would be made, but didn’t specify whether it would apply to corn used to feed farm animals.

      • RTLCases of fuel siphoning on the rise in France

        Siphoning is the practice of emptying a vehicle’s tank by sucking fuel with the mouth through a hose. The contents of the tank can then be transferred to a jerrycan to fill up another vehicle. It is a phenomenon that has multiplied in recent weeks: with parts of France being deprived of petrol and diesel, the number of poisonings linked to fuel siphoning have thus exploded.

        The National Agency for Food, Environmental, and Occupational Health Safety (ANSES) has even released a statement to address the dangerous practice: “In October 2022, the poison control centres have recorded more than five times the number of poisonings caused by siphoning petroleum fuels.”

      • [Older] Disparities in United States COVID-19 Vaccine Distribution

        UC San Diego study finds health care facilities serving underrepresented, rural and hardest-hit communities were less likely to administer COVID-19 vaccines during initial rollout

      • RTutor: Political Incentives and River Pollution in China

        River pollution in China tended to substantially increase at the border of an upstream province, which means the harm was mainly born by the neighboring downstream province. A classic case of negative externalities. As a measure to reduce this problem, the central Chinese government changed the promotional incentives of province leaders in a way that makes them more accountable for river pollution at the province border.

        In their very interesting and great article Water Pollution Progress at Borders: The Role of Changes in China’s Political Promotion Incentives (AEJ Policy, 2015) Matthew E. Kahn, Pei Li and Daxuan Zhao study in how far that change in promotional incentives indeed helped to reduce river pollution at province borders. They also explore concrete channels to reduce river pollution like the placement of pulp and paper factories and whether younger provincial leaders react stronger to the change in the promotional incentives.

    • Proprietary

      • India TimesWhy are there so many data breaches? A growing industry of criminals is brokering in stolen data [iophk: Windows TCO]

        For example, one of the fastest-growing and most damaging forms of cyber crime – ransomware attacks – involves malicious software that paralyses a victim’s device or system until a decryption key is provided following payment of a ransom.

        Ransomware attacks are big business. In 2021 alone, they earned cyber criminals more than USD 600 million. The huge amounts of money to be made in ransomware, and the rich abundance of targets from all around the world are fostering the development of a vast ransomware industry.

    • Security

      • IT WireiTWire – UK sec guru plays down hype over new OpenSSL vulnerability

        British security researcher Kevin Beaumont has played down the hype over a recent announcement about a critical flaw in the open-source cryptographic library OpenSSL from Red Hat Linux. The advisory is due on 1 November.

        Mark Cox, vice-president of security at the Apache Software Foundation, tweeted on 26 October that an OpenSSL 3.0.7 update would fix a critical CVE due to be announced on 1 November, adding that it did not affect versions before 3.0.

        This led to American tech site ZDNet putting the hype machine in overdrive, with Steven Vaughan-Nicholls penning an article where the standfirst read: “We don’t have the details yet, but we can safely say that come Nov. 1, everyone – and I mean everyone – will need to patch OpenSSL 3.x.”

      • Privacy/Surveillance

        • Computer WorldIs performance tracking about to go mobile?

          Some collaboration suites offer built-in tracking already — it’s used holistically to identify communication roadblocks, ensure teams work together, find technical or administrative impediments to collaboration, even to help workers understand their own personal productivity and improve it. These kinds of tools track usage across devices and platforms, focusing on interaction with a suite of services instead of an individual PC or device.

    • Defence/Aggression

    • Transparency/Investigative Reporting

      • SalonHow candy corn became the villain in our modern Halloween lore

        Simultaneously, culinary horrors tend to captivate audiences. As Sam Stone wrote for Bon Appetit earlier this week, scathing restaurant reviews have reached TikTok, and this breed of review is particularly cutting, with virality in mind. One reviewer told Stone: “People want the drama — and that’s what we’re giving.”

    • Environment

      • NPRHow big coal companies avoid cleaning up their messes

        Alpha has transferred more than 300 mining permits to smaller companies since 2015, when an industrywide downturn pushed it and other big coal companies into bankruptcy. By shedding those permits, more than it currently holds, the company also freed itself from the responsibility to clean up the mines. Those old Alpha permits are now owned by smaller companies like Lexington, many of them in precarious financial shape. The smaller companies have drawn pollution lawsuits, environmental violations and complaints from distraught homeowners like Hatfield.

        While coal’s devastating contribution to climate change has been well documented, it has also left a long and painful legacy in communities where it’s mined. A joint investigation by Bloomberg News and NPR found that Alpha is one of several large U.S. coal companies that used the same playbook. They transferred old mines in need of cleanup to smaller operators with meager financial resources, raising the risk that taxpayers, rather than industry, will eventually be stuck with the cost.

      • Michael West MediaTakes the plunge: Tanya Plibersek releases roadmap to fix Australia’s water trading wreck – Michael West

        Water Minister Tanya Plibersek has released the “Roadmap” document accepting Australia’s water trading markets are “a market-design car-crash” and backed the findings of the long-awaited ACCC report. Authors of Sold Down the River, Stuart Kells and Scott Hamilton, report.

        Over a span of years if not decades, people in the Murray-Darling Basin have raised serious concerns about the water market, and the conduct therein of brokers, traders, ‘investors’ and ‘speculators’.

        At first-hand, farmers, irrigators and other people in rural communities saw widespread evidence of market manipulation, front-running, insider trading, conflicts of interest, and brokers ‘trading their own book’. The benign idea of farmers trading their water rights had turned into some kind of 1980s Wall Street nightmare.

      • Michael West MediaBOM nickname ridgey-didge. Bureau of Meteorology needs un-corporatising not rebranding – Michael West

        Australians love a nickname and recoiled in indignation at the farcical rebranding of the BOM. What’s the scam?

        The scam is that the rebrand is just the latest plank in the corporatisation of the BOM. They tried to do away with climate change too.

        Former MWM editor Sandi Keane and her contact, former BOM operative Stephen King, broke the story here two years ago of the infiltration of BOM by global oil and gas funders such as Shell, Santos, Woodside and Chevron.

      • Energy

        • India TimesBank of England considering a central bank digital currency

          The central bank of the United Kingdom said people were using cash less and financial technology (fintech) firms have started to offer new forms of money and new ways to pay. The Bank posted a statement last week that these changes mean new opportunities and risks that the central bank needs to plan for.

          Central bank digital currency (CBDC) is money that a central bank, like the Bank of England, can produce. It’s called digital (or electronic) because it isn’t physical money like notes and coins. It is in the form of an amount on a computer or similar device.

      • Wildlife/Nature

    • Finance

    • AstroTurf/Lobbying/Politics

    • Censorship/Free Speech

      • IT WireLaw that protects US tech platforms against lawsuits being challenged

        The Wall Street Journal reported on Sunday that the court would be hearing a case against Google which argues that Section 230 of the Communications Decency Act, the clause in law that offers protection to technology companies, should not serve as a shield against companies that link to so-called harmful content.

        The US Government has tried in the past to change Section 230, with a bid two years ago to pass what it called the EARN IT Act which looked to add conditions for those who sought protection under it.

      • Eesti RahvusringhäälingJournalist: Press often holds back stories to protect children’s interests

        Risto Berendson, head of the investigative editorial department of Estonian daily Õhtuleht, said the paper had decided not to publish the story about Marko Mihkelson until all parties involved had had the opportunity to explain their sides publicly. Speaking on ETV show “Ringvaade,” Berendson said, that the press often refrains from publishing stories in order to protect the wellbeing of children.

      • Why the Death Edict on Salman Rushdie? The death edict was neither about rivalries nor geopolitics

        I disagree. This was not a tactical move by Khomeini to promote himself but a true and furious response. Why? Because an author named Salman Rushdie wrote a book called The Satanic Verses. Those two bare facts—and not the complex contents within the 546 pages in the novel—sufficed to provoke an emotional reaction.

      • ScheerpostThe Consortium Imposing the Growing Censorship Regime

        Glenn Greenwald is launching a new live, one-hour, prime-time news broadcast. Armed with cable-sized budgets, it will be part of a network that Russell Brand has already debuted.

      • MeduzaPrigozhin asks Prosecutor General to block YouTube in Russia — Meduza

        Businessman and founder of PMC Wagner Evgeny Prigozhin appealed to Russia’s Prosecutor General to limit access to video sharing service YouTube, and to declare Google’s activities in Russia “undesirable.” Prigozhin’s company, Konkord, shared the appeal on its VKontakte page.

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

    • Internet Policy/Net Neutrality

      • IT WireiTWire – Govt to conduct mobile coverage audit next year in bid to improve services

        The Federal Government will conduct an audit of mobile coverage in the country with a view to identify blackspots and help guide it in areas of investment from next year onwards.

        A statement issued by Communications Minister Michelle Rowland on Monday said $20 million had been set aside for the Better Connectivity for Regional and Rural Australia Plan.

        It said a regional telecommunications review in 2021 had expressed concerns from community members about the predictive coverage maps issued by providers and indicated that an audit would help validate them.

        Presumably the focus will be on rural and regional areas where coverage is not half as good as in the metropolitan areas.

    • Monopolies

      • IT WireiTWire – Facebook parent accused of ‘robber-baron’ tactics in Canada

        Facebook’s parent company Meta has been accused of resorting to “robber-baron” tactics in Canada by threatening to block sharing of news feeds if Ottawa legislates to force it to pay news outlets for their content.

        The accusation was made by Liberal MP Chris Bittle during a parliamentary hearing on Friday.

        Liberal MPs Anthony Housefather and Lisa Hepfner also subjected Meta Canada Media Partnerships chief Marc Dinsdale and global policy director Kevin Chan to tough questioning.

      • Copyrights

        • [Old] The public domain grows

          On New Year’s 2021, books, music and films published in 1925 entered the public domain, free for anyone to copy, quote at length, mash up, whatever you like. Jennifer Jenkins at Duke Law’s Center for the Study of the Public Domain provides a rundown of what’s been set free and why it matters. Highlights in literature include Mrs. Dalloway, The Great Gatsby, and Kafka’s The Trial in the original German. An English translation of The Trial, however, won’t be public domain until 2033, and the Franz Kafka cartoon rock opera that got teenage me into Kafka will stay copyrighted until 2096.

        • Torrent Freak‘Pirate’ Streaming Boxes Boosted Netflix Viewership, Research Finds

          A new study reveals how purchasing a Kodi-powered streaming box changed the Internet and media consumption habits of US households. The researchers use these boxes as a piracy proxy, as they were often loaded with third-party piracy apps. Interestingly, their data show that the use of these boxes led to increased legal consumption through on-demand services such as Netflix and YouTube.

  • Gemini* and Gopher

    • Politics

      • Extreme bridge, Brevard NC edition

        Today was a pretty miserable day here in Brevard [1], with it being both cold and rainy. Bunny and I didn’t really go out much today. But a few days ago, when I sat in the garden [2] I also took a stroll around the grounds here at the The Bromfield Inn [3]. And it was on the grounds that I found this bridge:

    • Technical

      • Thinkpad camera repair and upgrade

        I bought a second-hand Thinkpad X13 Yoga (Gen 1) with a broken camera. A quick search shows this is quite a common problem that usually ends up in a RMA’d laptop, but as this one is well out of warranty I had a go at repairing it.

        These laptops come with one of two types of cameras – one that includes an infra-red sensor and one without. The IR sensor is mostly used to sign in using facial recognition (i.e. Windows Hello). My laptop was originally non-IR model but through the repair I upgraded it to an IR-capable camera too.

      • Internet/Gemini

        • Mayan and Gemini priests

          There is a short discussion with #Gemini hashtag on Mastodon where a barrier term came up. It’s about accessing Geminispace, where reading and writing is limited to people who has knowledge how to do this. It’s true that there is a technical barrier. People must learn to do things in a special way to overcome that. I appreciate that it is so. Probably many of us appreciate that. So we are a new caste of Gemini priests?

          Like a Mayan priests (and several other historical examples) who had a power to rule (in a direct or indirect way) the whole society. Mayan priests had a knowledge of astronomy, astrology and calendar/time. Gemini priests have a knowledge to do a real network communication. There are no any abilities to control a whole society, but this is a key to enter or not enter that better world. So you can be an ordinary account in the world of big social network, or an awaken man. It’s some cyberpunk theme there?

        • Posting/replying via gemini
        • Answers to correspondents

          I’m slightly surprised that anyone reads this, but I have had a couple of people get in touch. Since my last post I heard from Sandra (idiomdrottning) who wondered why I thought it wasn’t good that Alonso got a penalty if that’s what the rules say. This question opens a can of worms, but lets start with the facts.

          [...]

          So Sandra asked why Alonso shouldn’t get a penalty if that’s what the rules say. My answer is that the rules are not clear and straightforward, and their application is even less so.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Sunday, October 30, 2022

Posted in IRC Logs at 2:59 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 QmQxuYSZCmxdeyPWsPctxpdm7v3iCBgqbovX2Xei83LECf IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmSneTSGEFRW4KDgcVB7sRz4vrSV7ZvQAtc5Y7pqfMPKJZ IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmcKZVfk5nDU9F9e4ypDgUNxRHjAr6sKkDt5HpHtkSdUjG IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmbX25DfquYHuRrpCbwWaJ7Cyu7v5WujgVQJRaCvN4QHEU IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmT9onFqLUFXBipxVjyC73Jst5xy5kcQNW1iJh1fju78g1 IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmWiWEubiYy85Mb5gFsrBWdwUJBj2cHRFoRAYWP8u25S9k IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmUENJYyGAgzSyEGKq8TAzyGWwhxWs17CRV2X9zDYQjxte IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 Qmerm6tNcdUPue3TVBNra1k8zm679JGTwXJNRhyEcyCV7g IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmUms9EuWBHXEEkvgXfiNBHhTnkSeHCSbJ5Nez2q3VB3uY

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts