Links 03/11/2022: FEX 2211 Tagged and Rust 1.65.0 Released (Making Political Statements)

Posted in News Roundup at 7:15 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • DEV Community9 Docker Extensions Every Developer Must Try – DEV Community 👩‍💻👨‍💻

        The world of software development is changing faster than ever. The need for faster release cycle times has led to a proliferation of virtualization technologies. Virtual machines (VMs) have been around for many years, but containers have recently overshadowed them. The reason is that VMs are slower and not as lightweight as containers. With the popularity of microservices, containers have emerged as an excellent alternative to virtual machines for developing, testing and deploying applications in a lightweight environment.

    • Audiocasts/Shows

    • Kernel Space

      • Lennart Poettering: Linux Boot Partitions
      • The Register UKVersion 252 of systemd, as expected, locks down the Linux boot process [Ed: Microsoft now attacks Linux freedom via systemd]

        The fall version of systemd is here, with support for increased boot security, including tightened full-disk encryption.

        The 113th version has the usual long feature list of very specific, targeted elements outlined in the release announcement. However, as one might expect following recent events, several of the headline features relate to the new UKI fully signed boot process.

        UKI is short for “Unified Kernel Image” and combines the Linux kernel and initrd into a single file, along with some other smaller components, allowing the whole thing to be cryptographically signed. The purpose is to tighten up security on the Linux boot process.

        This version also has new functions and modules concerned with manipulating the Platform Configuration Registers (PCRs) of Trusted Platform Module 2.0 chips – as also favored by VMware as well as Windows Server and Windows 11, unless you use Rufus or other tools to turn this off.

        The enhanced TPM2 support will enable linking a drive’s encryption keys to the keys held in compatible firmware so that an encrypted disk can be unlocked automatically during boot – but can’t be unlocked by other distros. The result will be improved security for users, especially corporate users, but we foresee this hindering data-recovery efforts.

    • Applications

      • OMG Ubuntu’Search Light’ is Like macOS Spotlight for GNOME Shell – OMG! Ubuntu!

        Looking for a desktop-based app launcher for GNOME Shell?

        Check out Search Light, whose developer describes it as “…a Gnome Shell extension that takes the apps search widget out of Overview. Like the macOS spotlight, or Alfred.” Linux users will be familiar with the concept thanks to open-source app launchers like ULauncher, Albert, Kupfer and, back in the day, GNOME Do.

        With this extension enabled you get to harness the power of GNOME Shell’s search capabilities but without being punted to a different screen.

        Search Light can show any/all results the regular GNOME Shell search can as it’s the same widget, just floating above all windows. To control what kind of results you see for queries toggle on/off options listed in the system Settings > Search panel.

        The default keybinding is ctrl + super + space. This requires more finger-flexing than macOS’s cmd + space or GNOME Shell’s stock super. You can’t (currently) set your own keyboard shortcut from the extension’s settings panel.

    • Instructionals/Technical

      • ID RootHow To Install Backports on Debian 11 – idroot

        In this tutorial, we will show you how to install Backports on Debian 11. For those of you who didn’t know, Backports have recompiled packages from testing (mostly) and unstable (in a few cases only, e.g. security updates), so they will run without new libraries (wherever it is possible) on a stable Debian distribution. Backports are pinned to priority 100 using apt-pinning, ie they are only installed when explicitly requested. Otherwise, the package from stable takes precedence. A package that has been installed from the backports is updated from the backports.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Backports on a Debian 11 (Bullseye).

      • OSTechNixHow To Securely Transfer Files With SCP In Linux – OSTechNix

        File transfer over a network can be done in various ways and using different protocols. The most commonly used protocols for copying files remotely are Rsync, SCP and SFTP. In this guide, we will look at what is SCP and how to securely transfer files between local and remote computers with SCP in Linux and Unix-like operating systems.

      • Linux HandbookHow to List Files Recursively in Linux command line

        The ls command is the default for viewing the contents of a directory. This is despite the existence of the dedicated dir command.

        The ls command list the contents of the present directory, but it doesn’t show the contents of the subdirectories by default. You can make it though.

      • Junichi Uekawa: user namespace not enabled when running podman.

        user namespace not enabled when running podman. Completely forgot about this but seems like I need to enable user namespace for podman. sudo sysctl -w kernel.unprivileged_userns_clone=1. Not quite sure when this started being required.

      • ID RootHow To Install OnlyOffice on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install OnlyOffice on Ubuntu 22.04 LTS. For those of you who didn’t know, OnlyOffice is a free software office suite developed by Ascensio System SIA. It is available for Windows, Linux, macOS, Android, and iOS. Like other office suites such as Microsoft Office and LibreOffice, OnlyOffice comes with documents, spreadsheets, presentation editors, mobile web viewers, and other functionalities.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the OnlyOffice suite on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • HowTo ForgeHow to Compare Three Files in Linux Using diff3 Tool

        In one of our earlier tutorials, we discussed a Linux command line utility – dubbed diff – that allows you to compare two files line by line. But what if the requirement is to compare not two, but three files? Yes, there exists a Linux command line utility for this as well, and it’s appropriately called diff3.

      • HowTo ForgeHow to Compare and Merge Text Files on Linux

        Comparing text files requires time, effort, a large monitor and a good amount of patience, or simply just the right tools to do it without any of the aforementioned. If you are an editor that has to deal with multiple versions of a text file, or a developer that wants to check the various code revisions of a file, then the following tutorial is for you.

      • HowTo ForgeHow to Compare and Merge Text Files on Linux using Desktop Tools (part 2)

        This post is a response to the overwhelming comments about Meld (and other tools) on my previous article on text files comparison and merging tools. While my intention wasn’t to focus on code text only but to also present something useful to word editors and writers as well, but the coders community objected for the “shallowness” of the previous post so here we go with part 2.

      • Ubuntu HandbookHow to Display Login Screen in External Monitor in Ubuntu 22.04 | 22.10 | UbuntuHandbook

        Have multiple monitors connected into your Ubuntu machine? Here’s the quick tip shows you how to configure which one to display the login screen.

        It’s quite easy to set primary display in Ubuntu with default GNOME desktop. However, the login screen is always sticking to the built-in display in my laptop. In case you use the external monitor for the most time, you may also set it as primary display for the GDM login screen by following this tutorial.

        NOTE: This tutorial is tested only in Ubuntu with default GNOME desktop! Though, it may also work in other Linux with GNOME (e.g., Fedora, Debian and Arch) or Linux with GDM display manager.

      • Make Tech EasierHow to Install Synaptic Package Manager in Linux – Make Tech Easier

        Synaptic Package Manager was once the default package manager for nearly all Debian-based Linux distributions. To date, it remains one of the most versatile package managers. Although it remains dated, many users still prefer it because of its simplicity.

        In this tutorial, we show you how to install and use Synaptic Package Manager on Linux.

      • Make Use OfHow to Use FSearch to Quickly Find Files and Folders on Linux

        Searching for a specific file or folder on Linux can be overwhelming, especially if you’ve got a lot of data. Here’s where FSearch comes into play.

      • HowTo ForgeHow to do line-by-line comparison of files in Linux using diff command

        In Linux, the diff command can be used to compare two files, but the thing is that there’s a slight learning curve involved with this utility. If you don’t know how diff works, and are looking for quick tutorial to get started, look no further, as in this article, we will discuss the basics of this command along with some easy to understand examples.

      • HowTo ForgeHow to search files from the Terminal on Linux

        While there are many ways with which we can search and locate files and directories on Linux, the easiest and quickest is probably through the terminal. However, not many Linux users know about that, which leads to unneeded frustration. Here is a quick guide that will hopefully help you locate what you’re looking for in your system.

      • H2S Media2 ways for Installing FFmpeg on Ubuntu 22.04 LTS – Linux Shout

        Learn how to install FFmpeg in Ubuntu 22.04 Jammy JellyFish using the command terminal for playing or converting various media files.

        With the command line tool FFmpeg, which is an open-source program, converting from one multimedia format to another is just a piece of cake. FFmpeg contains the libavcodec library, which contains numerous formats and codecs to help with encoding and decoding. It supports FFmpeg Video h.264 (MPEG-4 AVC), h.265 (HEVC), Xvid, VP8, VP9, AVI, MPEG-1, MPEG-2, and WMV. Its Audio supports AAC, MP3, Vorbis, WMA, and other codecs. libavcodec is also used by media suites and players such as VLC media player, Kodi, and MPlayer.

        This command line tool not only brings the video codecs to the computer, but also offers conversion commands including as parameters the input file, output file, frame rate, and bit rate. With it, you can record videos directly from the TV card. FFmpeg also comes with helpful tools – the FFprobe included in the FFmpeg package analyzes multimedia streams and libavformat can be used to analyze and create container files for video and audio.

      • HowTo ForgeLinux Command Line Navigation Tips: The Basics of pushd and popd Command

        In this article, we will be discussing how you can have a faster navigation experience on the Linux command line using the pushd and popd commands.

      • HowTo ForgeLinux sdiff Command Tutorial for Beginners (8 Examples)

        Here at HowtoForge, we have already discussed multiple command line utilities that are focused on finding file differences. But there are several more such tools, and in this tutorial, we will discuss on such command dubbed sdiff using some easy to understand examples.

    • Games

      • FEXFEX 2211 Tagged!

        A lot of good changes this month for our users. Both performance and compatibility improvements to be had!

      • Steam on Chromebook, now in beta

        Earlier this year, the ChromeOS gaming team and our partners at Valve collaborated to release an alpha version of Steam on Chromebook. Since then, we’ve received thousands of gameplay reports from the amazing ChromeOS community and invested in improving the experience at every level of the stack. Today, we’re excited to announce that Steam on Chromebook is entering beta with ChromeOS 108, featuring broader availability, an improved user experience, and better performance and compatibility for more of your favorite games.

  • Distributions and Operating Systems

    • New Releases

      • The Register UKNitrux 2.5: The latest update to a radical Linux • The Register

        Nitrux OS is one of the most stylish and innovative distros we’ve seen so far: systemd-free, based on AppImages, and with a very unusual desktop.

        Nitrux OS version 2.5 is the latest version of this innovative distro, led by Uri Herrera from Coacalco on the outskirts of Mexico City. It’s nominally based on Debian and KDE, but it doesn’t look or feel like any other KDE OS, or work much like any other Debian either. It doesn’t use systemd, replacing it with OpenRC, as used in the minimal Alpine Linux distro.

        It uses the vendor-neutral AppImage packaging format, and mostly uses its own independently developed applications. Even so, it’s bang up to date: version 2.5 has the latest Linux kernel 6.0, and uses tech from KDE 5.26.

    • SUSE/OpenSUSE

      • OpenSUSELLVM, sudo, Plasma update in Tumbleweed – openSUSE News

        Besides updates for LLVM, sudo and KDE’s Plasma, packages like systemd, curl, strace and tracker also gained software updates.

        An update of gnome-terminal 3.46.3 arrived in snapshot 20221101. The package updated translations, put to use a new icon and removed XML namespaces. Other GNOME packages updated in the snapshot like document viewer evince 43.1. The document viewer fixes a crash and avoids a rendering issue. An update of glib2 2.74.1 had a patch that reverts the handling of collisions between standard input/output file descriptors and newly created ones, which solves the password and secrets storer gnome-keyring-daemon from eating 100 percent CPU. The building blocks package for libraries and applications written in C also fixes regression with int64, which is used to represent 64-bit signed integers; the package also fixes various build failures in different situations. Terminal Emulators vte 0.70.1 implemented the clipboard for GTK4, added a define for Apple’s darwin and fixed a filter for unwanted environment variables. Macedonian translations were added with an update to yast2-trans. A few other packages were updated in the snapshot.

        The new major version of the diagnostic, debugging and instructional userspace package strace was made available in the 20221031 snapshot. The 6.0 version updates the decoding of setns system call, which allows for the calling thread to move into different namespaces, and updates the lists of ioctl commands related to Linux Kernel 6.0. The package update of timezone 2022f will let people reading this Tumbleweed blog know that Mexico no longer observes daylight savings except near the US border. Chihuahua moves to year-round time, but it’s unclear if that is for the state or the city. The timezone update changes the time for Fiji as it also no longer observes daylight savings. The few Python Package Index and RubyGems packages were updated in the snapshot as well.

      • SUSE’s Corporate BlogIntel® and SUSE – Stronger Than Ever | SUSE Communities

        SUSE has achieved the highest level of partnership status within Intel’s Partner Alliance Program.

    • Canonical/Ubuntu Family

      • Ubuntu FridgeThe Fridge: Call for nomination for the Ubuntu Membership board

        As you may know, Ubuntu Membership is a recognition of a significant and sustained contribution to Ubuntu and the Ubuntu community. To this end, the Community Council recruits from our current member community for the valuable role of reviewing and evaluating the contributions of potential members to bring them on board or assist with having them achieve this goal.

      • Ubuntu NewsCall for nominations: Ubuntu Technical Board
      • Ubuntu FridgeCall for nominations: Ubuntu Technical Board

        We are looking for nominations for people to join the Ubuntu Technical Board.

        The Ubuntu Technical Board is responsible for the technical direction of Ubuntu. It makes decisions on package selection, packaging policy, installation systems and processes, kernel, X server, display management, library versions, and dependencies. The board works with relevant teams to establish a consensus on the right path to take, especially where diverse elements of Ubuntu cannot find consensus on shared components. The current Technical Board is expiring at the end of the year, and the Community Council would like to confirm a new Technical Board, consisting of five people, who will serve for two years.

    • Open Hardware/Modding

      • ArduinoAre you ready to go back to the future? | Arduino Blog

        The first Arduino UNO was launched back in 2005, with a clear purpose to allow everyone who had an idea to make it possible through a simple and open interface.

        Many years have passed, technology has evolved, but we never forgot that initial thrill that came from opening up countless possibilities to so many makers.

        The Arduino Make Your UNO Kit is the natural extension of a story that will shape the makers of tomorrow, a step in the past to move forward in a brilliant future.

      • ZDNetRaspberry Pi Pico has a problem with Macs using MacOS Ventura [Ed: Microsoft mole Liam Tung and propagandist looking to badmouth Microsoft rival somehow (as usual)]

        he UK maker of the Raspberry Pi is warning of an issue affecting its Pico device and other boards when using a Mac running the new MacOS Ventura, which has broken key functionality for flashing the $4 Raspberry Pi Pico microcontroller board over USB.

        In a blogpost titled “The Ventura problem”, Raspberry Pi Trading’s head of documentation Alasdair Allan explains the glitch affecting the Pi Pico on Ventura and urges Pico users not to upgrade to Ventura, “at least not yet”.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Events

      • Daniel Stenbergthehttpworkshop2022-day3.txt

        The last day of this edition of the HTTP workshop. Thursday November 3, 2022. A half day only. Many participants at the Workshop are going to continue their UK adventure and attend the IETF 115 in London next week.

        We started off the day with a deep dive into connection details. How to make connections for HTTP – in particular on mobile devices. How to decide which IP to use, racing connections, timeouts, when to consider a connection attempt “done” (ie after the TCP SYNACK or after the TLS handshake is complete). QUIC vs TCP vs TLS and early data. IPv4 vs IPv6.

        ECH. On testing, how it might work, concerns. Statistics are lies. What is the success expectancy for this and what might be the explanations for failures. What tests should be done and what answers about ECH in the wild would we like to get answered going forward?

        Dan Stahr: Making a HTTP client good. Discussions around what to expose, not to expose and how HTTP client APIs have been written or should be written. Adobe has its own version of fetch for server use.

      • BootlinNew training course: Linux debugging, profiling, tracing and performance analysis – Bootlin’s blog

        Since its inception, Bootlin has offered training courses on technical topics related to the use of Linux in embedded systems, with freely accessible training materials, and trainers with in-depth and real-life experience in their field. Based on these ideas, we have progressively extended our training portfolio over the years.

      • FSFLibrePlanet 2023 CFS office hours (2022-11-10)

        The LibrePlanet 2023 call for sessions is currently open, will be open until November 23, and we want to hear from you!

        Speaking at a conference, and even submitting a proposal, can be intimidating or hard. Luckily, some great, experienced speakers are volunteering their time to help out during the CFS office hours.

        Whether you want to propose a talk and want feedback on your idea, proposal wording, talk title, or just advice on how to deal with nerves, the FSF campaigns team is here for you.

    • Productivity Software/LibreOffice/Calligra

      • What is Miklos hacking – Content controls in Writer: titles and tags

        Writer now supports titles and tags for content controls, which helps providing context for the filled in text even if the placeholder text is replaced already.

      • Crash fixes, part 2: abort

        One category of the bugs that we see in computer programs including LibreOffice is the unexpected crashes. You’re working with the application, and it is suddenly closed! In the previous part, I have discussed crashes that are caused by segmentation fault. In this article, I discuss the crashes from invoking abort() function. Please note that not an abort is not always a bad thing, or a bug.

      • Document FoundationLibreOffice Conference 2022 videos: DaaS, ScriptForge, FontWork, OpenDocument, Writer…

        Here’s a new batch of talks from the recent LibreOffice Conference 2022! Watch the individual videos below, or click here to view the playlist.

      • Document FoundationAnnouncement of LibreOffice 7.3.7 Community

        LibreOffice 7.3.7 Community, the seventh and last minor release of the LibreOffice 7.3 family, which will be reaching soon the end of life, targeted to desktop productivity, is available for download from https://www.libreoffice.org/download/. Users still using this version should start looking at the LibreOffice 7.4 family, now at 7.4.2, which has been extensively tested by millions of users worldwide.

    • Programming/Development

      • Remi Collet: PHP version 7.4.33, 8.0.25 and 8.1.12

        RPMs of PHP version 8.1.12 are available in remi-modular repository for Fedora ≥ 35 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky…) and in remi-php81 repository for EL 7.

        RPMs of PHP version 8.0.25 are available in remi-modular repository for Fedora ≥ 35 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky…) and in remi-php80 repository for EL 7.

        RPMs of PHP version 7.4.33 are available in remi-modular repository for Fedora ≥ 35 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky…) and in remi-php74 repository for EL 7.

      • IBM Old TimerThe AI Maturity Framework [Ed: IBMers have replaced substance and products with buzzwords]

        I recently attended a seminar, The Art of AI Maturity, by Accenture executives Philippe Roussiere and Praveen Tanguturi as part of MIT’s Initiative on the Digital Economy (IDE) lunch seminar series. The seminar was based on their recently published article The Art of AI Maturity: Advancing from Practice to Performance.

        “Today, so much of what we take for granted in our daily lives stems from machine learning,” wrote the authors in the article’s executive summary. “Every time you use a wayfinding app to get from point A to point B, use dictation to convert speech to text, or unlock your phone using face ID … you’re relying on AI. And companies across industries are also relying on – and investing in – AI to drive logistics, improve customer service, increase efficiency, empower employees and so much more.”

        To determine the true state of AI maturity in the marketplace, Accenture conducted a survey in August and September of 2021 of over 1,600 C-suite executives at nearly 2,000 of the world’s largest companies across 16 industries with headquarters in 15 countries. In addition, they interviewed 25 CEOs, Chief Data Officers and Chief Analytics Officers, as well as a number of Accenture AI experts, and developed over 40 case studies on AI transformation.

      • VideoLearn Vim In 11 Minutes – Invidious
      • fg-daemon-gdb

        I’ve recently enhanced my emacsclient(1) wrapper script to make it possible to have my primary Emacs daemon always running under gdb. That way, if there’s a seemingly-random crash, I might be able to learn something about what happened. The tricky thing is that I want gdb running inside an instance of Emacs too, because Emacs has a nice interface to gdb, and gdb’s Emacs daemon – hereafter “gdbmacs” – needs to be the installed, optimised build of Emacs, such that it’s not likely to suffer the same crash. And the whole thing should be transparent: I shouldn’t have to do anything special to launch the primary session under gdb.

      • QtCreating an effect with QQEM

        Todays blog post gives a bit more information about how to effectively use the Qt Quick Effect Maker (see the QQEM introduction blog post). We will first create an example effect using several Qt Graphical Effects and then re-create this same effect using a single QQEM multi-effect. This will be done with the node editor, so no experience of writing a shader code is required.

      • VideoHow To Increase the Quality of Your Code – Invidious
      • Rust

        • Rust BlogAnnouncing Rust 1.65.0

          The Rust team is happy to announce a new version of Rust, 1.65.0. Rust is a programming language empowering everyone to build reliable and efficient software.

          Before going into the details of the new Rust release, we’d like to draw attention to the tragic death of Mahsa Amini and the death and violent suppression of many others, by the religious morality police of Iran.

        • LWNRust 1.65.0 released
    • Standards/Consortia

      • Deliver Interactive Experiences with glTF: A Node Graph-Based Approach

        The Khronos 3D Formats Working Group is constantly assessing emerging requirements of the glTF ecosystem and asking how the group can make the most impactful progress. Over the past 18 months, one issue has consistently bubbled to the top of these discussions: interactivity.

        The urgency of developing new interactivity and behaviors capabilities for glTF has been fueled in part by the evolution towards the open metaverse. It’s clear that glTF can and should have an important role to play in this ecosystem, but we have some important functionality gaps to close first. We’ve spent the past few months cooperatively refining proposals for how we might build interactivity into glTF 3D assets. This blog will outline our current approach and reasoning, as well as invite the community to weigh in.

  • Leftovers

    • Peter ‘CzP’ CzanikPhotography is not just about the camera | Random thoughts of Peter ‘CzP’ Czanik

      Once upon a time I started taking photos with a Lubitel, which is an old, very basic, and completely manual camera. In 2000 I switched from film to digital and everything could be automated. This was the time when I finally realized that having a good camera is not everything. A perfect exposure with a good camera can still result in an ugly and boring photo.


      My first digital camera was a Nikon Coolpix 950. This was state-of-the-art camera in 2000, way ahead of the competition. I did not have to guess exposure and distance anymore, as everything was properly measured and set by the camera. Still, the majority of my photos were ugly and boring. This was an eye-opening moment for me: I realized that technology is not everything.

      For almost two decades, my primary focus was on mastering the perfect exposure and distance without any tools. This camera could set those on its own. This was the moment when I realized that composition is also key. Making sure that I focus on the main subject, do not chop off the head or legs of people, select a proper background, that I am aware of the depth of field and the rule of thirds, and so on.

      To me, mastering the proper exposure was an instinct. Learning how to compose nice photos was a long learning process. I have some really nice photos. Most of them are now well composed, but there is nothing really special about them. No matter how many photos I take or how many books I read about photography, it is not really possible to learn creativity…

      For many years I considered mobile photography a joke. Compared to a full frame or APS-C camera, the lens and sensor in a mobile are ridiculous. However, the camera is not everything. Of course, the camera can limit some of the advanced possibilities, but not the composition and creativity.

    • Security

      • Hacker NewsOPERA1ER APT Hackers Targeted Dozens of Financial Organizations in Africa

        A French-speaking threat actor dubbed OPERA1ER has been linked to a series of more than 30 successful cyber attacks aimed at banks, financial services, and telecom companies across Africa, Asia, and Latin America between 2018 and 2022.

        According to Singapore-headquartered cybersecurity company Group-IB, the attacks have led to thefts totaling $11 million, with actual damages estimated to be as high as $30 million.

        Some of the more recent attacks in 2021 and 2021 have singled out five different banks in Burkina Faso, Benin, Ivory Coast, and Senegal. Many of the victims identified are said to have been compromised twice, and their infrastructure subsequently weaponized to strike other organizations.

      • Help Net SecurityWhat closed-source software developers can learn from their open-source counterparts – Help Net Security

        Open-source software has reached greater levels of security than ever before, but its increased adoption comes with new challenges.

        In this Help Net Security video, Josep Prat, Open Source Engineering Director at Aiven, illustrates how threat actors see greater use of open-source software as an opportunity, deploying new methods targeting tech professionals and open-source projects. Phishing attacks and compromised open-source applications are now a clear and constant danger for developers and the community.

        By its very nature, open source is easily accessible and open to all, making it all the more concerning that many hacking groups carrying out these attacks are linked to hostile groups and organizations. Open-source developers must be aware of these new trends and carefully check change requests in their projects.

      • CISACISA Releases Three Industrial Control Systems Advisories | CISA

        CISA has released three (3) Industrial Control Systems (ICS) advisories on November 3, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

      • CISAETIC Telecom Remote Access Server (RAS) | CISA

        Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information and compromise the vulnerable device and other connected machines.

      • LWNSecurity updates for Thursday [LWN.net]

        Security updates have been issued by Debian (pypy3), Fedora (drupal7, git, java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, and php), Oracle (kernel, lua, openssl, pcs, php-pear, pki-core, python3.9, and zlib), Red Hat (kernel, kernel-rt, kpatch-patch, lua, openssl-container, pcs, php-pear, pki-core, python3.9, and zlib), Scientific Linux (kernel, pcs, and php-pear), SUSE (EternalTerminal, hsqldb, ntfs-3g_ntfsprogs, privoxy, rubygem-actionview-4_2, sqlite3, and xorg-x11-server), and Ubuntu (ntfs-3g, python3.10, and sqlite3).

      • IT WireiTWire – Ransomware most destructive online crime, ACSC report claims

        Ransomware attacks are more or less exclusively limited to systems running versions of Microsoft’s Windows operating system.

      • IT WireiTWire – Real estate firm Harcourts latest to suffer data breach

        Real estate company Harcourts says its Melbourne City franchise has been breached in what it describes as a “cyber incident”, with the route for entry being a device used by the franchisee’s service provider Stafflink.

        The company said in a statement on Thursday it became aware on 24 October that its rental property database had been infiltrated by a third party.

        Harcourts lists a total of 216 franchisees on its website and the statement said each office had its own operating system and IT infrastructure.

        Regarding the data that was accessed, the statement said: “The rental property database holds personal information relating to landlords, tenants and trades and was used by the franchisee’s service provider, Stafflink, to provide it with administrative support.

      • Hacker NewsResearchers Find Links b/w Black Basta Ransomware and FIN7 Hackers

        A new analysis of tools put to use by the Black Basta ransomware operation has identified ties between the threat actor and the FIN7 (aka Carbanak) group.

        This link “could suggest either that Black Basta and FIN7 maintain a special relationship or that one or more individuals belong to both groups,” cybersecurity firm SentinelOne said in a technical write-up shared with The Hacker News.

        Black Basta, which emerged earlier this year, has been attributed to a ransomware spree that has claimed over 90 organizations as of September 2022, suggesting that the adversary is both well-organized and well-resourced.

      • CISAApple Releases Security Update for Xcode | CISA

        Apple has released a security update to address vulnerabilities in Xcode. A remote attacker could exploit one of these vulnerabilities to take control of an affected system.

      • CISACisco Releases Security Updates for Multiple Products | CISA

        Cisco has released security updates for vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.

      • Privacy/Surveillance

        • AccessNowStop the deception: dos and don’ts for responsible online design – Access Now

          Everyday, people are influenced online by user interface design tactics attempting to sway their decision-making, snatching away their agency, and manipulating their behavior. These deceptive designs — also known as dark patterns — are made up of calculated decisions by digital product, platform, and service providers to boost their agendas, often toward a decision that is against the person’s best interests in regards to privacy and autonomy. It doesn’t have to be this way. No more deceptive designs: dos and don’ts for responsible user experience practices can help combat the deception.

          “Manipulating how people navigate a website or app is a choice,” said Sage Cheng, Head of Design and Creative Production at Access Now. “We’re not simply asking designers and their Big Tech backers to not make that choice, we’re showing them exactly how they can avoid design practices that could harm people, and urging them to center human rights in people’s experiences on digital platforms.”

    • AstroTurf/Lobbying/Politics

    • Civil Rights/Policing

      • AccessNowAlaa Abdel-Fattah’s life at serious risk: demand Egypt to immediately release him now! – Access Now

        As the world attention turns to COP27 in Egypt, amidst fears of greenwashing Abdel Fattah El-Sisi’s authoritarian regime, Access Now calls on government representatives attending COP27 to do everything in their power to ensure the immediate release of British-Egyptian activist Alaa Abd El-Fattah, and all human rights defenders and political prisoners detained for exercising their fundamental rights.

    • Digital Restrictions (DRM)

      • OMG UbuntuIt’s Not Just You: Disney+ Doesn’t Work on Linux ATM [Ed: Digital Restrictions (DRM) are not a feature and no need to celebrate DRM in Linux]

        Linux users are experiencing issues when attempting to stream content from Disney+, despite the video-streaming service explicitly adding Linux support a few years back.

        So what’s up?

        Well, some diligent debugging by YouTuber gnifs-tech detects that that cause of the issue is a bug in analytics code running on the video streaming site. Changing the user agent string of a Linux browser to pretend it is running on Windows magically fixes the issue, and users can stream content from Disney+ on Linux without any issue.

      • PurismIntroducing PureBoot Restricted Boot [Ed: Purism jumps the shark with fake security]

        We have been busy on the PureBoot front! Recently we announced “PureBoot Basic Mode” which is a low-security option for PureBoot that disables tamper detection, but leaves you with the robust PureBoot recovery console for debugging boot issues. To balance our last “low security” feature, our most recent PureBoot release, version 23, offers a new high-security feature called Restricted Boot. By default PureBoot will allow you to boot any USB disk you choose, and offers a failsafe boot mode so you can boot into your system even if signatures don’t match. Restricted Boot tightens down boot security so you can only boot trusted, signed boot images. In this post I will describe the thinking and design behind Restricted Boot and how it contrasts with boot restrictions on other platforms.

    • Monopolies

      • Copyrights

        • Public Domain Review*Shadows from the Walls of Deaths by week of occurrence, 2015-21.ods (1874) – The Public Domain Review

          Originally printed in a run of one hundred copies, only a half-dozen of which remain, this dangerous book is made from wallpaper laced with arsenic.

        • Walled CultureThe copyright world is already panicking about music created using generative AI; too late

          A couple of weeks ago, Walled Culture wrote about the rapid rise and advance of generative AI in the world of visual arts. One key aspect was its impact on copyright, which emerges as making even less sense in a world where AI programs can knock out an infinite number of images on any topic in any style, for close to zero cost. The post also noted that this development was not unique to the visual arts, but would also soon be found elsewhere – in the world of music, for example.

          TorrentFreak has an interesting article about how the copyright world is already panicking about this possibility. As the post explains, the Recording Industry Association of America (RIAA) recently sent to the US government a list of “notorious markets” – basically countries and companies that it doesn’t like for various reasons.


          The idea that copyright holders should have some kind of ownership of the next generation’s music is not just wrong, it’s deeply pernicious. It seeks to extend the corrosive view that creativity can be owned by one person – or, worse, one company – by further asserting control over art that has been produced under its influence in some way. It underlines how antithetical copyright is to both art and creativity.

  • Gemini* and Gopher

    • Personal

      • Snowflakes 2022-11-03 (Fairbanks, AK, US)

        I learned toward then end that it is not practical to try to sketch each snowflake with perfect artistic accurancy, but rather to draw all the geometric shapes you see, and then shade them in to make the drawing look good.

    • Technical

      • The Evercade is a really neat retroconsole

        The Evercade is a retro console, which exists in two versions – a portable one, something like a Nintendo Switch, and a proper console, which can only be attached to a TV.

        Unlike most other retro consoles though, the Evercade is based on physical media, which it calls cartridges. It’s something larger than a Switch game, but also smaller than the cartridges of classical videogames.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Open Source Initiative (OSI) Continues to Cover Up for Microsoft’s GPL Violation Machine (Spiced Up as ‘HI’)

Posted in Deception, GPL, Microsoft, OSI at 2:15 pm by Dr. Roy Schestowitz

Published a short while ago in the Open Source Initiative’s Web site:

OSI Sponsored by Microsoft, Salaried partly by Microsoft

Summary: As noted last week, the OSI’s “voices of Open Source” is sponsored by proprietary GitHub/Microsoft to push anti-Free software misinformation, in effect helping the attack on Free software

Links 03/11/2022: Ardour 7.1 and Xfce 4.18

Posted in News Roundup at 11:58 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Kernel Space

      • LWNLinux 6.0.7
        I'm announcing the release of the 6.0.7 kernel.
        All users of the 6.0 kernel series must upgrade.
        The updated 6.0.y git tree can be found at:
                git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-6.0.y
        and can be browsed at the normal kernel.org git web browser:
        greg k-h
      • LWNLinux 5.15.77
      • LWNLinux 5.10.153
      • LWNLinux 5.4.223
      • LWNLinux 4.19.264
      • LWNLinux 4.14.298
      • LWNLinux 4.9.332
    • Applications

      • 9to5LinuxArdour 7.1 Open-Source DAW Is Here with Quick Audio Exporting, Usability Improvements

        Ardour 7.1 is here only two weeks after the release of Ardour 7.0, which was a major update with numerous new and exciting features, to introduce yet another new feature called Quick Audio Export to make it easier for you to export your work in the desired format.

        Ardour 7.1 improves the Cue Markers ruler with a new ‘Clear All Cues’ context menu action and a Cue Markers option in the main menu, improves the Clips feature to list the folder where files from FreeSound are stored in the clips list, and improves the mixer scenes to let you restore a mixer scene only for a selection of tracks.

      • DebugPointXfce 4.18: Top New Features & Release Guide

        After almost two years of development, Xfce 4.18 will be released during Christmas 2022. Coming as a major release since Xfce 4.16, the development was going on to enhance this lightweight desktop under the development tag 4.17.

        Xfce 4.18 is a significant milestone considering GTK4 updates, initial Wayland support and revamp of core native apps. The volume of updates is massive.

        Release-wise, the first Xfce 4.18 pre-release (pre1) is now out. There shall be another pre-release in the first week of December 2022. And the Xfce 4.18 final release is expected between December 15 and December 29, 2022.

        Since there is no official detailed write-up yet, I have summarised this article with essential and major Xfce 4.18 features.

      • It’s FOSSGrafana Phlare is a New Scalable Open-Source Database to Enhance Observability

        Grafana is a popular open-source data visualization tool that supports various object storage and cloud services.

        To improve on what they offer, Grafana has announced a new open-source database for continuous profiling data that helps enhance the monitoring of servers (or your application), making life easier for performance engineers and enterprises.

    • Instructionals/Technical

      • Comparing TCP and QUIC

        There is a common view out there that the QUIC transport protocol (RFC 9000) is just another refinement to the original TCP transport protocol [1] [2]. I find it hard to agree with this sentiment, and for me QUIC represents a significant shift in the set of transport capabilities available to applications in terms of communication privacy, session control integrity and flexibility. QUIC embodies a different communications model that makes intrinsically useful to many more forms of application behaviours. Oh, yes. It’s also faster than TCP! In my opinion It’s likely that over time QUIC will replace TCP in the public Internet. So, for me QUIC is a lot more than just a few tweaks to TCP. Here we will describe both TCP and QUIC and look at the changes that QUIC has bought to the transport table.

        However, we should first do a brief recap of TCP.

    • Games

      • GamingOnLinuxGodot Engine now has its own dedicated Foundation for funding

        Previously they teamed up with the Software Freedom Conservancy charity, who handled the donations and ensured it was used correctly but as they’ve constantly grown, they feel the need to run it themselves now. In a blog post from founder Juan Linietsky, they noted having their own organization gives them the “opportunity to explore broader funding sources” while mentioning crowdfunding like Blender and Krita do.

      • GamingOnLinuxNarrative adventure Where Birds Go to Sleep has a demo up

        Do you love text-based narrative adventures that look a bit insane? Where Birds Go to Sleep is releasing next year and they now have a demo available. The game will also have Native Linux support, and the demo already does.

      • GamingOnLinuxPixelJunk Scrappers Deluxe is Steam Deck Verified before release with a demo

        PixelJunk Scrappers Deluxe is the next Steam release coming from Q-Games and they’ve managed to get it Steam Deck Verified ahead of release. Originally released on Apple Arcade, it’s getting a full Steam release at some point but there’s no exact date on that yet.

      • GamingOnLinuxFun Steam Deck Verified & Playable games from October 2022

        Recently the Steam Deck hit over 6,000 games marked as Playable and Verified together, so I took a little look at some of the entries across October to point out some fun picks.

      • GamingOnLinuxEscape Simulator recently had a big update with a free Graveyard level

        Probably one of the most popular games of its kind on Steam, the co-op escape room puzzler Escape Simulator recently had a nice update.

      • GamingOnLinuxVoid Scrappers blends Vampire Survivors mechanics with a space shoot ‘em up

        Void Scrappers recently released with Native Linux support and it is Steam Deck Verified. A pretty great game if you love the mechanics of Vampire Survivors but want something different. I previously took a look at their Prologue but the full game is out now.

      • GamingOnLinuxTransport Tycoon Deluxe inspired game OpenTTD has a new release coming

        OpenTTD is a free and open source sim based on the classic Transport Tycoon Deluxe, and the team have announced a new release is coming with a first Beta. While based on TTD, OpenTTD had a wide array of improvements including bigger maps, better multiplayer, dedicated servers, better AI and so much more.

      • TechdirtHow Price Tourism Propelled A Switch Game To Nintendo Switch Fame

        While we’ve had a lot of conversations about how some forward-thinking content creators have managed to look at understandably frustrating things like copyright infringement as opportunities rather than threats. There’s a lot of ways that can happen: looking at infringement as free marketing research, looking at it as an avenue for exposure, looking at infringers as under-served customers, etc.

  • Distributions and Operating Systems

    • BSD

    • Devices/Embedded

      • Linux GizmosStick PC available with Gemini Lake or Jasper Lake CPUs

        The MeLE PCG02 Pro is a fanless PC compatible with the Celeron J4125 or the Celeron N5105 Intel processors. The device is as big as an iPhone 14 pro, but it packs flexible peripherals such as dual [email protected] HDMI ports, one GbE RJ45, dual UBS 3.2 ports, etc.

      • Linux GizmosEmbedded platform integrates Xilinx Artix-7 FPGA and i.MX Mini processor

        The MYC-JX8MMA7 CPU Module from Myirtech, is an embedded platform powered by a Xilinx XC7A25T Artix-7 FPGA and a i.MX 8M Mini quad-core processor. The company is also offering a compatible dev board which provides access to one GbE, one HDMI port and several other peripherals.  

    • Open Hardware/Modding

      • I finally found an use case for my Raspberry Pi Model B+

        Due to the very limited performance, the use cases for a Raspberry Pi 1 are quite limited in 2022. Use cases that don’t require much computational power are often better solved by other platforms. Use cases that are actually useful to me and solve a problem I have are too much for the Pi 1. At the same time, I absolutely hate it when I have computing equipment sitting around on a shelf doing nothing. I can’t even sell this Pi, because it is not worth much any more and it has some sentimental value for me.

  • Free, Libre, and Open Source Software

    • Linux Links10 Best Free and Open Source RAW Processing Tools

      There is a good range of open source Linux software that processes RAW files. Here’s our recommendations. Hopefully, there will be something of interest here for anyone who has a passion for digital photography.

    • Naked SecurityThe OpenSSL security update story – how can you tell what needs fixing?

      Fortunately, the latest update, once it came out, brought just one piece of mildly worrying news, along with three reasons to feel relieved.

      Although what was originally reported as one bug turned out to be two (the second hole was found while researching the first, given that bugs of a similar type often clump together), their impact wasn’t as dramatic as first thought, because: [...]

    • Web Browsers/Web Servers

      • Chromium

        • [Old] Chromeloader browser hijacker

          In our analysis we will be discussing the capabilities of this loader, as well as trying to dig a little deeper, in order to find some indicators that will be more difficult for the threat actor to alter without making significant changes to the malware’s architecture (at least compared to extracting domains, IP and hashes as only IOCs)

    • Productivity Software/LibreOffice/Calligra

      • 9to5LinuxLibreOffice 7.3 Gets Last Maintenance Update, Users Urged to Upgrade to LibreOffice 7.4

        LibreOffice 7.3.7 is here about two months after the LibreOffice 7.3.6 maintenance update and includes a total of 28 bug fixes that address last remaining issues reported by users or discovered by the LibreOffice developers.

        Those using the LibreOffice 7.3 office suite should update their installations to version 7.3.7 as soon as it lands in the stable software repositories of their GNU/Linux distributions. However, The Document Foundation recommends LibreOffice 7.3 users to consider upgrading to the latest and greatest LibreOffice 7.4 release.

    • Content Management Systems (CMS)

      • Terence EdenWoohoo! WordPress accepted my accessibility PR

        About 2.5 years ago I proposed a small accessibility improvement to WordPress. It has taken a bit longer than I’d hoped but, as of WordPress 6.1 it has been merged!

    • Programming/Development

      • Evan HahnRuby: how to get the MD5 hash of a file

        This uses Digest::Class.file, the base class for Digest::MD5.

      • DJ AdamsSome notes on modular JSON Schema definitions

        Here are a few rambling notes-to-self on understanding how a modular JSON Schema definition might be constructed. I’ve recently become acquainted with JSON Schema through the BTP Setup Automator project.

      • Python Logging Guide: The Basics

        Once your Python programs grow beyond basic scripts run from a command line, using print() statements for logging becomes a difficult practice to scale. Using print()logging modules enable you to better control where, how, and what you log, with much more granularity. As a result, you can reduce debugging time, improve code quality, and increase the visibility of your infrastructure.

        To help you get up to speed with Python logging, we’re creating a multi-part guide to cover what you need to know to make your Python logging efficient, useful, and scalable. To get the most out of this guide, you should be comfortable with basic Python programming and understand general logging best practices.

        In this first post, Part One of our overview on Python logging, we’ll introduce you to the default logging module and log levels, and we’ll walk through basic examples of how you can get started with Python logging.

  • Leftovers

    • HackadaySimple Wi-Fi Cat Door Solves The Extra Critter Problem, And Nothing More

      Anyone with an outdoor cat in their life knows their propensity for bringing home offerings, in the form of critters in various stages of the process of becoming ex-critters. And anyone with a hacker in their life knows that there’s a tendency to throw technology at this problem. But sometimes, the simplest solutions are the best.

    • HackadayHeirloom Knife Will Carve Pumpkins For Years To Come

      Halloween may be behind us, but that just means that we’ve reached the best time to buy pumpkins. After all, it’s still fall, and there are pies to be made and tables to be decorated. Why should carved-up pumpkins be restricted to spooky season?

    • Common DreamsOpinion | A Message from Fresno: No One Should Be ‘Living Just to Die’

      It’s a weekday evening in Fresno, and I’m at a community center with a group of about 30 residents listening as they discuss what is top of mind for them when it comes to poverty and opportunity.

    • Education

      • Common DreamsOpinion | End ‘Poverty Wages’ in Schools

        The Great Resignation continues to punish schools. It has become increasingly difficult to fill the all important position of the Education Support Professional (ESP). For a moment, pause in awe of the number of unheralded women who have shaped countless lives in education as ESPs:

      • QuilletteBloated College Administration Is Making Education Unaffordable

        All of these orientation activities are overseen by administrative staff, who are now basically running a school within a school, teaching content based on the mandate of their respective offices (disability accommodation, diversity, anti-discrimination, sustainability, student-life enhancement, and so forth). As of 2019, for instance, the University of Michigan was paying $10.6 million annually to employ 76 diversity officers on a single campus. This kind of encroachment has been subtle, but faculty members and other long-time observers of higher education can recognize the phenomenon even if it evades precise description.

        The solution rests with college and university governing boards, which typically are composed of non-academics—prominent alumni and civil leaders who play the equivalent role of civilian commanders-in-chief overseeing the military. These governors must wrest control from the bureaucrats who have a vested interest in maintaining (or even exacerbating) the status quo, regardless of its dire effects on these academic institutions.

    • Hardware

      • ROS IndustrialROSCon 2022 – ROS-Industrial Consortium Americas Look Back

        Last week, my colleagues, Jerry Towler and Fernando Martinez, and I made the grueling 14-hour trans-Pacific flight and 3-hour train ride to attend ROSCon in Kyoto Japan. All told, we probably would have endured a lot worse for the opportunity to travel to Japan and talk about robots.

      • HackadayLaser Projector Relies On Steppers Rather Than Galvanometers

        Laser light shows have always been real crowd-pleasers. There’s just something about the frenetic movement of a single point of intensely bright light making fluid animations that really captures the imagination. Large-scale laser shows require a lot of gear, of course, but that doesn’t mean you can’t get in on the fun yourself using something like this homebrew X-Y laser projector.

    • Health/Nutrition/Agriculture

      • NPR‘Predatory gambling’ has helped the lottery reach sky-high jackpot, critics say

        Bernal says that, through marketing and advertising, state-run lotteries have no regulation to their “predatory practices” that affect low-income communities — which are made up of primarily Black and brown people.

        “There are people who do develop unhealthy relationships with the lottery and they develop a gambling use disorder,” said Timothy Fong, co-director of the Gambling Studies Program at the University of California, Los Angeles.

      • The HillToxic ‘forever chemicals’ found in children’s textiles, pet food packaging

        Cancer-linked “forever chemicals” are contaminating a broad assortment of pet food packaging and textiles made for babies and toddlers, a new investigation has found.

        These toxins — per- and polyfluoroalkyl substances (PFAS) — are common ingredients in children’s and pet product coatings, and can wear off as dust over time, according to the Environmental Working Group, a Washington, D.C.-based advocacy organization.

      • The NationFinding Hope Through Ketamine Therapy

        My doctor tells me to close my eyes and asks me what I am feeling in my body. I tell her my chest feels heavy. She asks me to describe the heaviness—its shape and size. I tell her it’s a rectangular brick stretching from side to side. “What color is it?” she asks. I tell her it’s dark grayish, and now the pressure is so great it’s pressing into my throat. She asks more questions—“If it was an animal, what would it be?” “Would I be willing to ask it questions?”—and eventually my throat relaxes, and my chest lightens. Sometimes, I cry during these weekly check-ins that follow our more intensive work together. I am learning what it means to self-regulate.

      • Common DreamsFlint Residents Return to Court After City Misses Deadline to Replace Lead Pipes

        The city failed to meet a court-ordered deadline of September 30 for excavating and replacing all the lead service lines, which officials had agreed to do under a 2017 legal settlement. The city has been granted several extensions to complete the work.

      • MeduzaUN and Ukraine to resume grain deal shipments on Thursday — Meduza

        Ukrainian Infrastructure Minister Oleksandr Kubrakov said Wednesday that grain shipments through the Black Sea humanitarian corridor will resume on November 3 as part of the grain export deal that was reached in July.

      • MeduzaAs Black Sea grain shipments resume, Russia announces it’s rejoining deal — Meduza

        Turkish President Recep Tayyip Erdoğan confirmed on Wednesday afternoon that grain shipments under the Black Sea grain deal resumed at noon Moscow time.

    • Proprietary

      • The HillCyber incident reporting isn’t the problem — ignorance is [iophk: Windows TCO]

        But simply relying on industry to report incidents voluntarily hasn’t been enough. We still lack key data about cyber incidents: What is the overall rate of incidents? How does it differ by sector or region or company size? Can we use knowledge about an incident at one company to prevent something bad from happening to another?

        Acknowledging that voluntary reporting isn’t sufficient, Congress passed legislation earlier this year requiring critical infrastructure owners to report substantial cyber incidents. While almost everyone supports mandatory reporting in theory, some organizations are trying to weaken the new requirements.

      • Broadband BreakfastRansomware Summit, Twitter Board Dissolved, NetworkX Winners [iophk: Windows TCO]

        A White House official said ransomware attacks are increasing faster than the country’s ability to disrupt them, according to a transcript from the second Counter Ransomware Initiative summit that began this weekend.

      • Mexico News DailyCyberattack causes shutdown at communication, transportation and aviation agencies [iophk: Windows TCO]

        The Ministry of Infrastructure, Communications and Transport (SICT) announced Tuesday that it had suspended a range of bureaucratic procedures and other work due to a cyberattack.

        In an announcement published in the federal government’s official gazette (DOF), the ministry said that the suspension took effect on Oct. 24 and would remain in force until Dec. 31.

      • Hollywood ReporterApple vs. Everyone: Why Rivals Are Sharpening Knives

        Now, thanks to an update to Apple’s App Store rules, Spotify may soon find a powerful ally in another U.S. company whose own economic downturn has been exacerbated by Apple’s policy changes: Meta. On Oct. 24, Apple, led by Tim Cook, updated its rules, announcing that for boosted posts sold on iOS apps, developers are required to use Apple’s payment system, thus necessitating Apple’s 30 percent cut. “Boosting, which allows an individual or organization to pay to increase the reach of a post or profile, is a digital service — so of course in-app purchase is required,” an Apple rep said.

      • USABackground Press Call by a Senior Administration Official Previewing the Second International Counter Ransomware Initiative Summit

        Just this summer, for example, in the U.S. we saw the largest unified school district in the U.S. attacked by ransomware actors the day before school began. We’ve seen hospitals and networks of hospitals attacked in France and the UK. A significant ransomware attack that occurred just recently in Australia as well.

        So, to take a step back, we launched the CRI last year to build on President Biden’s leadership to rally allies and partners to counter the shared threat of ransomware.

      • Site36„Partial unavailability“: Largest EU police database repeatedly down

        Since the Schengen Information System has been run by an EU agency, it has failed completely on at least 34 occasions. The latest incidents are only now being made public.

    • Security

      • Privacy/Surveillance

        • India TimesTikTok tells European users its staff in China can access their data

          The Chinese-owned social video app is updating its privacy policy to confirm that staff in countries, including China, are allowed to access user data to ensure their experience of the platform is “consistent, enjoyable and safe”, The Guardian reported.

          The other countries where European user data could be accessed by TikTok staff include Brazil, Canada and Israel as well as the US and Singapore, where European user data is stored currently, the report said.

        • The Age AU‘Maximise profits’: Facial recognition tool used to target high rollers

          A surveillance technology company that manufactures facial recognition software that NSW pubs and clubs will widely roll out in gaming rooms next year markets its product overseas as a tool to “balance commerce and compliance” by identifying potential high rollers and repeat customers.

        • Counter PunchThe US “Intelligence Community” Can’t Be Trusted to Police Itself

          The NSA’s investigation of the analyst began about a month before American hero Edward Snowden’s public disclosures of other illegal activities on the part of the  “intelligence community.”

        • Counter PunchGeorge Washington: Father of His Country? Town Destroyer?  New Anti-Colonialist Documentary Asks Big Questions

          In recent times, probably no San Francisco news story has traveled as far or as wide as the story about Victor Arnautoff’s murals which subvert the myths and depict the life of George Washington as a foe of the Iroquois and an owner of Black slaves.

        • New York TimesSecurity Cameras Make Us Feel Safe, but Are They Worth the Invasion?

          First, let me explain what’s happening in San Francisco. This week, the city will put into effect its new camera ordinance, which is aimed at helping the police investigate crimes. The legislation, crafted by the city’s mayor, London Breed, gives the police the right to request access to the live footage of privately owned [Internet] cameras.

        • [Old] A technical analysis of Pegasus for Android – Part 1

          Pegasus is a spyware developed by the NSO group that was repeatedly analyzed by Amnesty International and CitizenLab. In this article, we dissect the Android version that was initially analyzed by Lookout in this paper, and we recommend reading it along with this post. During our research about Pegasus for Android, we’ve found out that vendors wrongly attributed some undocumented APK files to Pegasus, as highlighted by a researcher here. We’ve splitted the analysis into 3 parts because of the code’s complexity and length. We’ve also tried to keep the sections name proposed by Lookout whenever it was possible so that anybody could follow the two approaches more easily. In this part, we’re presenting the initialization of the application (including its configuration), the targeted applications, the commands related to the core functionality, and the methods that Pegasus could use to remove itself from a device. Our contributions consist of dissecting the application deeper than before and explaining additional functionalities that were identified.

        • [Old] A technical analysis of Pegasus for Android – Part 2

          Pegasus is a spyware developed by the NSO group that was repeatedly analyzed by Amnesty International and CitizenLab. In this article, we dissect the Android version that was initially analyzed by Lookout in this paper, and we recommend reading it along with this post. During our research about Pegasus for Android, we’ve found out that vendors wrongly attributed some undocumented APK files to Pegasus, as highlighted by a researcher here. We’ve splitted the analysis into 3 parts because of the code’s complexity and length. We’ve also tried to keep the sections name proposed by Lookout whenever it was possible so that anybody could follow the two approaches more easily. In this second part, we’re presenting the HTTP communication with the C2 server, the commands received via SMS that were implemented by the spyware, the live audio surveillance functionality, and the keylogging activity. You can consult the first part of the Pegasus analysis here.

        • A technical analysis of Pegasus for Android – Part 3

          Pegasus is a spyware developed by the NSO group that was repeatedly analyzed by Amnesty International and CitizenLab. In this article, we dissect the Android version that was initially analyzed by Lookout in this paper, and we recommend reading it along with this post. During our research about Pegasus for Android, we’ve found out that vendors wrongly attributed some undocumented APK files to Pegasus, as highlighted by a researcher here. We’ve splitted the analysis into 3 parts because of the code’s complexity and length. We’ve also tried to keep the sections name proposed by Lookout whenever it was possible so that anybody could follow the two approaches more easily. In this last part, we’re presenting the WAP Push messages that could be used to autoload content on the phone without user interaction, the C2 communication over the MQTT protocol, the exploitation of a vulnerability in MediaPlayer that was not disclosed before, and the ability of the spyware to track phone’s locations. You can consult the second part of the Pegasus analysis here.

        • TorTransparency, Openness, and Our 2020-2021 Financials

          Transparency for a privacy project is not a contradiction: privacy is about choice, and we choose to be transparent in order to build trust and a stronger community. In this post, we aim to be very clear about where the Tor Project’s money comes from and what we do with it. This is how we operate in all aspects of our work: we show you all of our projects, in source code, and in periodic project and team reports, and in collaborations with researchers who help assess and improve Tor. Transparency also means being clear about our values, promises, and priorities as laid out in our social contract.

        • HackadayYour Car Has Driving Profiles – Here’s How To Change Them

          Just like mobile phones of yesteryear, modern cars have profiles. They aren’t responsible for the sounds your car produces, however, as much as they change how your car behaves – for instance, they can make your engine more aggressive or tweak your steering resistance. On MQB platform cars, the “Gateway” module is responsible for these, and it’s traditionally been a black box with a few user-exposed profiles – not as much anymore, thanks to the work of [Jille]. They own a Volkswagen hybrid car, and had fun changing driving modes on it – so naturally, they decided to reverse-engineer the configuration files responsible.

    • Defence/Aggression

      • The AtlanticUkrainians and Iranians Have the Same Enemy. They Should Have the Same Ally.

        Yet that kinship between the struggles of these two nations has not yet received the urgent recognition it needs in Washington, D.C.—the center of American democracy and government. National Security Adviser Jake Sullivan’s recent announcement of measures “to hold Iran accountable for violence against its own population, particularly against women and girls” is a welcome development—if those measures prove to be more practical than rhetorical. But as I found in a series of recent meetings with senators and senior State Department officials, the way that Ukraine’s and Iran’s destinies are now entwined—by virtue of Moscow’s alliance with Tehran, and Iran’s escalating supply of military aid to Russian forces in Ukraine—is gravely overlooked. Many of those I met seemed particularly unprepared to hear about the full measure of the Iranian people’s demands. The refrain I kept hearing was: “What’s the difference between these uprisings in Iran and the ones that came before?”

      • Democracy NowHow to End the War in Ukraine: Matt Duss and Ray McGovern Debate U.S. Policy on Russia, NATO & More

        As the U.S. pours billions in military aid into Ukraine, we host a debate on the Biden administration’s response to the war and U.S. policy toward Russia amid increasing calls among progressives for a diplomatic end to the conflict. We speak to former Bernie Sanders foreign policy adviser Matt Duss, now a visiting scholar at the Carnegie Endowment for International Peace, and Ray McGovern, a former CIA analyst who specialized in the Soviet Union. “Everyone understands that at some point there will need to be a negotiation to bring this war to a close, but I think the tension within the progressive community comes to when and how that diplomacy actually takes place,” says Duss. McGovern stressest that U.S. policymakers must understand Russia’s motivations, saying Russia sees the eastward expansion of NATO as threatening its core interests akin to how the United States viewed the Cuban Missile Crisis in the 1960s. “We need to go back and figure out how this all started in order to figure out how to end it,” says McGovern.

      • New York TimesFor Daughter of American Militant, Scars of ISIS’s Reign Run Deep

        The extent of the Islamic State’s atrocities in Syria are well known, but this tale, backed by interviews, testimony and court documents, is an extraordinary account of one daughter’s abuse at the hands of her mother. Just as extraordinary was her willingness to help federal investigators locate Ms. Fluke-Ekren, who was brought back to the United States in January to face prosecution and pleaded guilty months later to providing material support to a terrorist organization.

        Years after the United States declared victory in Syria, the damage wreaked by the Islamic State continues to reverberate to places as far as Overbrook, Kan., a tiny town in the gently rolling hills outside Topeka. Leyla’s account underscores the depth of those scars, a reminder that the intense suffering in Syria did not just stay in the Middle East.

      • CBSOpium production increases 32% in Taliban-ruled Afghanistan, U.N. report says

        Opium cultivation in Afghanistan jumped 32% during 2022 despite the ruling Taliban regime’s ban on narcotics, according to an annual report by the United Nations Office on Drugs and Crime. The Taliban regime rejected the findings, telling CBS News it was part of a “politically motivated” international pressure campaign.

        “The 2022 opium crop in Afghanistan is the most profitable in years, with cultivation up by one-third and prices soaring even as the country is gripped by cascading humanitarian and economic crises,” said the UNODC report released on Tuesday.

      • UNAfghanistan: Opium cultivation up nearly a third, warns UNODC

        The 2022 opium crop in Afghanistan is the most profitable in years with cultivation up by nearly a third amid soaring prices, and despite the multiple humanitarian and economic crises facing the country and it’s Taliban rulers, said the UN Office on Drugs and Crime (UNODC) on Tuesday.

      • The Independent UKRecord opium crop helps the Taliban fund its resistance

        The head of the UN agency, Antonio Maria Costa, said: “No other country in the world has ever had such a large amount of farmland used for illegal activity, beside China 100 years ago,” when it was a major opium producer.

        He urged [NATO] to more actively support counter-narcotics operations. “Since drugs are funding insurgency, Afghanistan’s military and its allies have a vested interest in destroying heroin labs, closing opium markets and bringing traffickers to justice. Tacit acceptance of opium trafficking is undermining stabilisation efforts.”

      • Counter PunchWhy Many Global South Countries Side with Russia

        The latest on the war, including: – Russia’s allies in the Global South – Why does Ukraine, a former colony, not elicit sympathy from former colonies in Africa? – Putin’s anti-colonial speech – Summary of UNHCR report on Russian war crimes in Ukraine from Feb-March 2022 – Sexual violence, summary executions, and unspeakable atrocities carried out by Russian soldiers – Should Russians be allowed into Europe as tourists? – How Putin has reorganized the Russian state – Putin’s “Coordination Council” as a tacit admission of failure thus far

      • Counter PunchWhy Support for Ukraine Could Dwindle in the Final Months of 2022

        While the U.S. economy is in a relatively good state compared to much of the rest of the world, Republicans have exploited domestic economic concerns to undermine Biden and the Democrats for months. And though many influential Republicans, such as Senator Lindsey Graham, continue to voice strong support for Ukraine, others aligned with the Tea Party and former U.S. President Donald Trump form the GOP’s increasingly vocal “isolationist wing.”

      • Counter PunchAn Obituary for Our World

        After all, the one obituary you can’t really have is your own; at least, not unless you decide to write it yourself or you’re so well known that a newspaper obit writer interviews you as one of the “pre-dead” while you’re still kicking. Of course, for the best known among us, such pieces, as at the New York Times, are prepared and written well in advance because the one thing we do know, whether we think about it or not, accept it or not, is that we all will indeed die.

      • Counter PunchThe Good and the Bad in Latin Maxims

        The awful quote “si vis pacem, para bellum” (if you want peace, prepare for war) comes to us from the fifth century AD Latin author Publius Flavius Renatus, whose essay De re militari is of no interest other than this superficial and contestable phrase.  Ever since warmongers all over the world have delighted in citing this pseudo-intellectual assertion — to the joy of domestic and international weapons producers and dealers.

      • Counter PunchWhat is to be Done?

        Since the Gulf War, and the rolling chain of shameful absurdities that followed—Iraq, Afghanistan, Libya, Syria, et.al.—in the idiotic dirty joke of the bumbling “War on Terror”, I have seen the mainstream press devoured by the Capitalist Monster to the point where all voices of integrity have been marginalized and expelled, then denounced and vilified by the diseased whores who slunk into their places.

      • TechdirtReport Shows Los Angeles Sheriff’s Department Wastes Most Of Its Time Hassling Minorities

        The Los Angeles Sheriff’s Department has long since abandoned any pretense of serving the public. In fact, it may never have pretended to respect this ideal at any point in its history. It has been a rogue agency for years, openly hostile to oversight, boldly breaking the laws it has sworn to uphold, filling its ranks with deputy gangs, engaging in routine rights violations, prosecuting its critics, and otherwise behaving as though it answers to no one.

      • The Nation¡Compañero Mike Davis, Presente!

        The word I most associate with Mike Davis—and have ever since we first met on the riot-ridden streets of Los Angeles’s Pico Union neighborhood in May of 1992—is “compañero.” I first heard Mike use it when he was writing what would become a historic piece for The Nation. In the middle of the fire and ferocity of that moment, he reached out for an interview about a largely unreported story: the neighborhood sweeps leading to the arbitrary arrests of hundreds, possibly thousands, of Pico Union’s Mexican and Central American migrants by the LAPD, the Border Patrol, and the National Guard. I was working at the Central American Refugee Center (CARECEN), then the largest immigrant rights organization in the United States.

      • TechdirtIowa City Officials Prove They Aren’t Fascists By Arresting An Activist Twice For Calling Them Fascists

        I’m not here to make broad statements about the state of Iowa, its various governing entities, or its court system, but it does seem that the state periodically struggles with recognizing long-held, pretty much unassailable rights. Lots of assailing in recent years, with only one instance working out for the government, and even that’s unlikely to remain precedent for much longer because it’s so obviously wrong.

      • MeduzaUkraine’s nuclear agency: Russian military are building something at Zaporizhzhia nuclear power plant — Meduza

        The Russian military are building a new object at the Zaporizhzhia nuclear power plant, reports the Ukrainian Nuclear Regulatory Inspectorate. It isn’t clear what exactly the occupying army is constructing.

      • ScheerpostTom Engelhardt: An Obituary for Our World

        Give Vladimir Putin full credit. His invasion of Ukraine helped take our minds off climate change at the worst possible moment (so far), even as his war only increases the level of greenhouse gases heading into the atmosphere.

      • ScheerpostPutin Skewers US Ineptitude

        Speaking on Oct. 27 at the Valdai International Discussion Club, Russian President Vladimir Putin questioned the sanity of those who would “spoil relations with China at the same time they are supplying billions-worth of weapons to Ukraine in a fight against Russia.” In answer to a question on “the growing tensions between […]

      • MeduzaWith Zaporizhzhia NPP disconnected from Ukraine’s electrical grid, Kyiv says Moscow wants to connect it to Russia’s — Meduza

        According to Energoatom, Ukraine’s state nuclear power company, the Zaporizhzhia Nuclear Power Plant (NPP) has completely lost electricity after being shelled by Russian forces.

      • MeduzaFour students in Ufa charged with railway sabotage. Medvedev discusses the death penalty. — Meduza

        A district court in Ufa has taken into custody four suspects accused of organizing a terrorist act, reports Kommersant, citing the court’s press release.

      • The NationThe Two Wars

        A number of years ago, in his book Yankee Leviathan, the political scientist Richard Franklin Bensel insisted that the relationship between the federal government and finance capital that was forged during the Civil War “mortgaged a radical Reconstruction” before the conflict had even ended. It is an arresting argument, and a relevant one. The idea that wars make states—because governments have to create the capacity to wage and pay for them—certainly holds true for the Civil War. The claim that the conflict saw the birth of the modern American state is also now widely accepted. But what kind of state, and what kind of economy, did the war produce? Did it create a state dedicated to emancipation, or to big business?

      • Common DreamsOpinion | The Republican Party of Violence

        A MAGA “patriot” broke into the home of House Speaker Nancy Pelosi in order to kidnap her, break her kneecaps, and perhaps beat her to death with a hammer.

      • TruthOutJudge Orders Far Right Group to Stop Intimidating Voters at Arizona Drop Boxes
      • Common DreamsEmails Reveal Trump Legal Team Saw Clarence Thomas as ‘Best Shot’ to Stop Election Certification

        A federal judge recently ordered former Trump lawyer John Eastman, the architect of the plot to overturn the election, to share emails with the House select committee investigating the January 6, 2021 attack on the U.S. Capitol, which briefly delayed the certification process.

      • TruthOutEmails Show Trump Team Saw Clarence Thomas as Key to Overturning 2020 Election
      • Common DreamsBolsonaro Mob Rallies Outside Army HQ Demanding Military Coup

        The Associated Press reported that thousands attended the rally, where Bolsonaro loyalists chanted “Armed forces, save Brazil!” and carried signs demanding a “federal intervention” following the president’s narrow defeat in Sunday’s runoff election.

      • Common DreamsBolsonaro Drove Brazil’s 2021 Emissions to Highest Level in Nearly Two Decades

        “Lula must use the political power won at the polls to pressure Congress to stop votes for bills that seek to advance attacks against the forest.”

      • Common DreamsDemocracy Watchdog Group Sues Federal Agencies Over Missing Jan. 6 Texts

        The agencies, along with the Department of Defense (DOD), the U.S. Army, and the National Archives are required under the Federal Records Act to take enforcement action to recover text messages that were sent from multiple Trump administration officials on January 6 and the surrounding days.

      • TruthOutWatchdog Group Sues Secret Service Over Deleted January 6 Texts
      • Meduza‘It’s like making a tank operator fly a plane’: How Moscow military officials alter documents to draft men with no combat experience — Meduza
      • MeduzaMore than 100 draftees from Chuvashia launch protest at training center, claiming government hasn’t issued promised payments — Meduza

        More than 100 draftees from Russia’s Chuvash Republic took part in a protest at a training center in the Ulyanov region on Wednesday to draw attention to the government’s alleged failure to issue the payments they were promised. The protesters’ message was shared by the prisoners’ rights group Gulagu.net (No to the Gulag) and the Telegram channel Angry Chuvashia.

      • MeduzaBritish law firm to sue Wagner PMC and founder Evgeny Prigozhin on behalf of Ukraine — Meduza

        The British law firm McCue Jury & Partners announced Wednesday that it will file a lawsuit against Russian businessman Evgeny Prigozhin and the Wagner private military company (PMC), which he founded, on behalf of Ukrainians.

      • MeduzaMoscow drops more than $15 million on initiatives to ‘culturally integrate’ annexed Ukrainian regions — Meduza

        The Russian Presidential Fund for Cultural Initiatives spent 953 million rubles (approximately $15.5 million) on a competition dedicated to “culturally integrating” the regions of Ukraine that were annexed by Moscow in September, according to the news outlet Siren.

      • MeduzaRussia Ministry of Foreign affairs issues statement on ‘prevention of nuclear war’ — Meduza

        The Russian Ministry of Foreign affairs issued a statement saying Russia could “hypothetically” use nuclear weapons only defensively or if the very existence of the state is threatened:

      • MeduzaShoigu claims alarm at increased NATO presence, accuses Ukraine of using ‘prohibited warfare methods’ — Meduza

        Russian Defense Minister Sergey Shoigu told his colleagues in Russia and Belarus that, since February 2022, NATO has more than doubled its military presence near the Russian borders, bringing the number of its personnel to 30,000. This, of course, is only a tenth of the number of conscripts mobilized by Russia this fall, only by official statistics.

      • MeduzaDagestan Supreme Court quashes arrest of Meduza journalist Vladimir Sevrinovsky — Meduza

        The Supreme Court of Dagestan has deemed unlawful the arrest of Vladimir Sevrinovsky, who was arrested in late September in the Dagestan capital Makhachkala, while covering an anti-mobilization rally for Meduza. Sevrinovsky reported this on his Facebook page.

    • Environment

      • Energy

        • [Old] Tech rants #1: PC-s use way too much power in 2021

          At the same time, we have made great leaps in CPU/GPU architectures and chip manufacturing technologies, which should result in faster and more efficient devices, right?

          Well, yes. However, with some fierce competition between AMD vs Intel and AMD vs NVIDIA all reason is thrown out the window and the power limits are raised in order to preserve the performance crown. In the end, all that matters is “but my CPU is 5% faster in this benchmark!” or “Oh yeah Intel has the performance crown even if it took 290W to get there”.

          This all sounds absurd during a time when it’s clear that energy usage is becoming a big problem in the near future. Using up more power daily also makes it more difficult to rely on renewable (not necessarily green!) energy sources due to the simple fact that building more capacity is more expensive.

        • HackadayLow-Voltage DC Network Build Incited By Solar Panels

          Nowadays, some people in Europe worry about energy prices climbing, and even if all the related problems disappear overnight, we’ll no doubt be seeing some amounts of price increase. As a hacker, you’re in a good position to evaluate the energy consuming devices at your home, and maybe even do something about them. Well, [Peter] put some solar panels on his roof, but couldn’t quite figure out a decent way to legally tie them into the public grid or at least his flat’s 220V network. Naturally, a good solution was to create an independent low-voltage DC network in parallel and put a bunch of devices on it instead!

        • TruthOutBanks and G20 Nations Spent at Least $55 Billion a Year Financing Fossil Fuels
      • Wildlife/Nature

    • Finance

    • AstroTurf/Lobbying/Politics

      • The EconomistAmerican society is so focused on race that it is blind to class

        A diversity of backgrounds in elite institutions is a desirable goal. In pursuing it, though, how much violence should be done to other liberal principles—fairness, meritocracy, the treatment of people as individuals and not avatars for their group identities? At present, the size of racial preferences is large and hard to defend. The child of two college-educated Nigerian immigrants probably has more advantages in life than the child of an Asian taxi driver or a white child born into Appalachian poverty. Such backgrounds are all diverse. But, under the current regime, the first is heavily more favoured than the others.

        Racial preferences are not, however, the most galling thing about the ultra-selective universities that anoint America’s elite. The legal case against Harvard, one of the universities defending itself before the Supreme Court, has prised open its admissions records to show the scale of unjustified advantage showered upon the already privileged—disproportionately those who are white and wealthy. A startling 43% of white students admitted to Harvard enjoy some kind of non-academic admissions preference: being an athlete, the child of an alumnus, or a member of the dean’s list of special applicants (such as the offspring of powerful people or big donors).

      • TechdirtFCC Commissioner Brendan Carr Still Doesn’t Understand That Banning TikTok Doesn’t Fix The Actual Problem

        We’ve noted repeatedly how FCC Commissioner Brendan Carr doesn’t have the authority to regulate social media. And over in the sector he does actually regulate, telecom, Carr is routinely a no show. He’s been a consistent opponent of holding telecom monopolies like AT&T accountable for pretty much anything, and generally doesn’t believe government has any real role telling telecom monopolies what to do.

      • ReasonTwitter Was Toxic Long Before Musk Took Over

        Verification was originally designed to deal with the problem of people impersonating public figures like politicians and celebrities. It still serves that purpose, but it has also become much more—a status symbol in the minds of some, and a driver of online resentment. A signaling mechanism. A shorthand for a hated class (“blue check Twitter”).

      • Matt RickardWho Pays? The Twitter Blue Check

        Typical advice is that you price discriminate against your power users — the users who derive the most value from the platform should be charged the most. Distribution to millions of followers is valuable.

      • TechdirtHey Elon: Let Me Help You Speed Run The Content Moderation Learning Curve

        It’s kind of a rite of passage for any new social media network. They show up, insist that they’re the “platform for free speech” without quite understanding what that actually means, and then they quickly discover a whole bunch of fairly fundamental ideas, institute a bunch of rapid (often sloppy) changes… and in the end, they basically all end up in the same general vicinity, with just a few small differences on the margin. Look, I went through it myself. In the early days I insisted that sites shouldn’t do any moderation at all, including my own. But I learned. As did Parler, Gettr, Truth Social and lots of others.

      • TruthOut40 Justice and Watchdog Groups Urge Twitter Advertisers to Hold Musk to Account
      • New York TimesCan Elon Musk Make the Math Work on Owning Twitter? It’s Dicey.

        Last year, Twitter’s interest expense was about $50 million. With the new debt taken on in the deal, that will now balloon to about $1 billion a year. Yet the company’s operations last year generated about $630 million in cash flow to meet its financial obligations.

        That means that Twitter is generating less money per year than what it owes its lenders. The company also does not appear to have a lot of extra cash on hand. While it had about $6 billion in cash before Mr. Musk’s buyout, a large portion of that probably went into the cost of closing the acquisition.

        That gives Mr. Musk little wiggle room, Mr. Pascarella said. “They are essentially going to take all the financial resources of the company and just pour it into servicing the debt,” he said.

      • Gulf NewsSaudi cleric slams ‘seditious’ social media

        The cleric also accused those websites of spreading “malicious” rumours, lies, agitating instability, promoting debauchery and progandising depravities.

        In 2007, the Saudi government approved an anti-cybercrime law incorporating jail and financial penalties.

      • Frontpage MagazineThe ‘Islamophobia’ Industry Goes Bankrupt

        A recent poll, however, has completely overturned this position (not, of course, that the powers that be will acknowledge it). As it happens, Muslims—they who know Islam more than anyone else—are more Islamophobic than non-Muslims in America; they are more, not less, prone to believing that fellow Muslims are violent, hostile, and uncivilized.

        The poll was conducted by the Institute for Social Policy and Understanding (ISPU), a Muslim think tank headquartered in Dearborn. Its findings were so inescapable that ISPU—whose entire existence revolves around presenting Muslims as victims of Islamophobia in America—had to conclude that, “over time, Islamophobia has declined among other groups but has increased among Muslims.”

      • ReasonTwitter Was Already a Hellscape Even Before It Was Set Free

        In this week’s The Reason Roundtable, editors Matt Welch, Peter Suderman, and Nick Gillespie celebrate the triumphant return of Katherine Mangu-Ward with a conversation about Elon Musk’s Twitter takeover and the chatter around political violence in the U.S.

      • Unix SheikhIs criticizing tech on political grounds valid?

        I have criticized aspects of the tech industry, such as modern web development, the influence of Red Hat, Lenovo, Microsoft and other big tech giants on the open source and free software communities, and the general influence on IT developers and enthusiasts by the tech industry’s hype machine, which in my humble opinion, unfortunately completely dominates the industry today.

        Such blog posts are naturally met with opposition from the people who do the things I criticize and they often respond either by dismissing everything as a long-winded rant, or by simply stating that technology should only be judged by its technical value alone.

        In my opinion and experience, it’s fantasy to judge a technology on its technical merit alone, isolated from political influence. It cannot be done without you closing your eyes to some of the facts of life.

      • The HillMusk to cut 3,700 jobs at Twitter, half of workforce: report

        Senior personnel on the product teams have been asked to target a 50 percent reduction in headcount, the publication reported, and layoffs have been drawn up based on an employee’s contributions to coding.

        The new owner of Twitter has not finalized how many jobs exactly will be cut, and he may allow laid off workers to earn up to 60 days’ worth of severance pay, according to Bloomberg. Musk is also reportedly considering reversing a work-from-anywhere policy.

      • Hollywood ReporterElon Musk Defends Controversial Blue Checkmark Twitter Plan to Stephen King

        FiveThirtyEight political guru Nate Silver similarly wrote to his 3.5 million followers: “I’m probably the perfect target for this, use Twitter a ton, can afford $20/mo, not particularly anti-Elon, but my reaction is that I’ve generated a ton of valuable free content for Twitter over the years and they can go fuck themselves.”

        Early Tuesday, Musk responded to the uproar, replying directly to King: “We need to pay the bills somehow! Twitter cannot entirely rely on advertisers. How about $8?”

        Musk then suggested that additional clarity on the matter is still to come: “I will explain the rationale in longer form before this is implemented. It is the only way to defeat the bots & trolls.”

      • The NationMisinforming Voters
      • ScheerpostThe Rise of Israeli Fascism as the Swing Vote in Parliament, and the Project of Ethnic Cleansing

        Despite Israeli propaganda about being a democracy that shares values with the liberal West, the country has for some time gone down a much darker path. Exit polling done by the major Israeli television channels in Tuesday’s election suggests that Bezalel Smotrich’s Religious Zionist Party, in […]

      • Common DreamsOpinion | What’s at Stake in the Midterms? Electoral Democracy as We Know It

        Not to be alarmist, but the November 8 midterm elections could be the last in which the United States operates as a functional democracy. President Joe Biden hinted at this when he declared on September 1 that America is at “an inflection point—one of those moments that determine the shape of everything that’s to come after.” Yet the President stopped short of stating the obvious: The 2022 competition pits his own relatively hapless Democratic Party against an authoritarian Republican Party that seeks power in order to rig the electoral process to its permanent advantage.

      • Common DreamsReverberations of Trump ‘Big Lie’ as GOP Sows Doubt Ahead of Midterms

        As The Guardian reported Wednesday, high-profile candidates in Arizona, Wisconsin, and Pennsylvania have refused to say they’ll concede to their Democratic opponents if they lose their elections—in some cases repeating ideas espoused by Trump in the weeks leading up to the 2016 and 2020 elections.

      • Robert Reich3 Lies Republicans Are Using This Election
      • Common DreamsPA Supreme Court Ruling Could Toss Thousands of Ballots Over ‘Irrelevant Technicality’

        In a two-page order, the six-judge high court ordered election officials to “refrain from counting any absentee and mail-in ballots received for the November 8, 2022 general election that are contained in undated or incorrectly dated outer envelopes” even if they were received on time, pointing to two specific Pennsylvania statutes.

      • TruthOutGraham Must Testify Following Supreme Court’s Rejection of Last-Ditch Appeal
      • Common DreamsWis. Gov. Candidate Says GOP ‘Will Never Lose Another Election’ If He Wins

        “Republicans will never lose another election in Wisconsin after I’m elected governor,” Michels—a construction executive and advocate of former President Donald Trump’s “Big Lie” that the 2020 presidential election was stolen—told supporters Monday at a campaign rally.

      • Common Dreams‘Biden Is Right’ That ‘Democracy Itself’ Is at Stake in Midterms: Progressives

        “MAGA Republicans are running up and down the ballot, including for election administration positions, to undermine our democracy and the will of voters.”

      • TruthOutTrumpier-Than-Trump Candidates Threaten to Regain Partial Control of Congress
      • Misinformation/Disinformation/Propaganda

    • Censorship/Free Speech

      • New York TimesTumblr Says Clothing Is Optional Again

        That content, according to the company, can include “nudity, mature subject matter, or sexual themes,” as long as those posts are tagged with the appropriate community labels, a system Tumblr rolled out in September. However, as the post noted, “visual depictions of sexually explicit acts remain off-limits on Tumblr.”

      • JURISTPakistan dispatch: persecution of religious minorities continues under current blasphemy law

        Pakistan retained the British-acquired penal code after gaining its independence in 1947. The founding father of Pakistan, Muhammad Ali Jinnah, devoted special attention to minorities in his inaugural speech to the Constituent Assembly on August 11th, 1947, asserting that people of every faith are allowed to visit their places of worship. A few years later, General Zia-ul-Haq came into power under a military dictatorship, heralding an era of “Islamization” that saw considerable changes to the Pakistan Penal Code (PPC). With the help of fundamentalists, he started a far more rigorous Islamization of the nation, most notably through the blasphemy laws. The Pakistan Penal Code was revised several times between 1980 and 1986, and five sections were added that address blasphemy and other religious offences. Every clause in the blasphemy law was modified or changed when Zia was leader, and the intent or mens rea requirement was completely removed. Section 295-C of the PPC is undeniably the most contentious clause as it perpetuates the death penalty for defiling the name of the Prophet Mohammad. As Section 295-C is a strict liability offence without a “mental element,” it is easier to prove despite the fact that it carries the death sentence.

      • SSRNWhat Can Professors Say in Public? Extramural Speech and the First Amendment

        Since the early twentieth century, academics have urged universities to recognize robust protections for the freedom of professors to speak in public on matters of political, social, and economic controversy, so-called “extramural speech.” The U.S. Supreme Court eventually recognized First Amendment protections for government employees, including state university professors, who express themselves about matters of public concern. The Court has indicated that the state should be especially solicitous of the speech of government employees in an academic context, but it has not adequately elaborated on the nature of those protections and how courts and government employers should assess the state’s interests relative to the extramural speech of professors employed at public universities.

        This article describes the state of the existing principles and doctrine surrounding extramural speech and examines the factors that private and public universities can reasonably take into consideration when responding to such speech – and what rationales for suppressing such speech or sanctioning faculty for engaging in such speech are inappropriate. Controversies surrounding the public speech of university faculty have only become more common and more intense in recent years, and both public and private universities need to be more self-conscious about the risk of stifling the intellectual environment of universities and chilling unpopular speech when responding to such controversies. If First Amendment values are particularly weighty in the context of the marketplace of ideas on university campuses, then many of the rationales for disciplining government employees for controversial speech that may make sense in some governmental workplaces should be rejected if applied in the university context.

    • Freedom of Information / Freedom of the Press

      • Times Higher EducationUS faces battle over secrecy in presidential searches

        Mr Hosseini and his board were generally correct, said Michael Horn, a higher education strategist, in warning that presidents of prominent universities generally will not take the risk of letting their names be made public if they are not assured of winning an appointment at the institution recruiting them.

      • VOA NewsIn Belarus, Journalism Being ‘Driven Underground’

        Enacted in 2021, the law against extremist organizations applies not only to the leaders of these so-called groups but to those deemed to have participated with such groups. That extends to people who gave interviews to media outlets, including Zerkalo — the prominent media outlet previously known as Tut.By — BelaPAN and Radio Liberty, Bastunets said.

        “Even for an interview, we are seeing people prosecuted for ‘complicity’ with extremist group activities,” Bastunets said.

      • RTL“NATO and the EU should have put a stop to it long ago”

        Asli Erdogan, a journalist who shares a name with the Turkish president, was once an award-winning writer in Turkey until her arrest in 2016 shortly after the failed coup. She was imprisoned for 132 days, during which she was denied access to vital medication and treatment.

        She now lives in exile in Berlin and was invited to Luxembourg by the Pierre Werner Institute and the State Theatre for the performance of an opera based on her texts. She also took the time to speak to RTL’s Caroline Mart about being forced out of her homeland, the Turkish repressive regime, President Erdogan and how Europe should deal with him.

      • FAIRTrump Judge Allows Starbucks to Assail Press Freedom

        Notorious anti-union coffee giant Starbucks has won a major victory against both organized labor and press freedom. Trump-appointed federal Judge John Sinatra has ordered that Starbucks Workers United in Buffalo, New York, must hand over messages to reporters as the company attempts to fight union efforts in court (Washington Post, 10/29/22). New York’s shield law protecting journalists from disclosing sources doesn’t apply in this case, because the court is seeking the information from the union organizers, not the press, the Post explained.

    • Civil Rights/Policing

      • ReasonDungeons & Dragons is Apparently Banned in Federal Prisons

        The Washington Post’s FOIA guru, Nate Jones, alerted me to this 2018 FOIA request on MuckRock, which indicates that the federal Bureau of Prisons (BOP) bans D&D and other roleplaying games from being purchased for inmates: [...]

        Any rationale for the ban, if given, is buried under redactions, but D&D and other roleplaying games are widely banned in state prison systems under the dubious rationale that they present a security threat or encourage gang behavior. As I noted in a 2017 Reason feature on D&D’s resurgence, this has resulted in some unusual case law: [...]

      • Associated PressVoters can erase racist wording in Alabama Constitution

        Voters in 2020 authorized state officials and lawmakers to cut the racist language that lingers from the era of racial segregation. That work, finally completed, now goes back before voters to ratify the Alabama Constitution of 2022.

      • VOA NewsUS Calls for Iran to be Removed from UN Women’s Rights Commission

        “It is clear that the so-called investigations into the death of Mahsa Amini have failed the minimum requirements of impartiality, independence and transparency,” Javaid Rehman, the U.N. special rapporteur for Iran, told the meeting in a video briefing.

        He called for an independent, international investigation into her death – a call that was supported by several council members.

      • RTLUS moves to remove ‘unfit’ Iran from UN women’s commission

        Iran is witnessing some of the most significant protests since the 1979 Islamic Revolution in the wake of the September 16 death of Mahsa Amini, a 22-year-old who had been detained by the notorious “morality police” that enforces strict codes on women’s dress.

      • Common DreamsOpinion | The New Iranian Revolution Could Help the International Left Find Its Way

        Dealing with random, unprovoked abuse is never easy. But dealing with random, unprovoked praise can be even harder.

      • India Today‘Jamie Oliver of Iran’ beaten to death in police custody month after Mahsa Amini

        The alleged killing took place after Shahidi was arrested on October 25 for taking part in anti-government protests. In the aftermath of his death and funeral on October 29, people marched in thousands to mark their grievances against the regime in Iran.

        The incident is related to raging protests in Iran’s Arak where hundreds marched against the custodial death of Mahsa Amini. She was arrested for not wearing a hijab.

        As per reports, Shahidi was thrashed with batons and the Iranian security forces left him bleeding with severe skull injuries. In fact, the media house Mirror mentioned that an Iranian news agency quoted Shahidi’s parents as saying, “Our son lost his life as a result of receiving baton blows to his head after his arrest, but we have been under pressure by the regime to say that he died of a heart attack.”

      • Counter PunchRevolutionary Struggle in Iran: Conspiracies, Enemies, and Friends
      • BBCNUS president dismissed over anti-Semitism claims

        It follows an independent code-of-conduct investigation after allegations were made against her.

        The findings of a wider investigation into the NUS are yet to be published.

      • Gatestone InstitutePalestinians: Why Are Attacks on Christians Being Ignored?

        As in previous instances, the Palestinian Authority has failed to take real measures to punish those who attack Christians or Christian holy sites in the Bethlehem area.

        The attacks by Muslims on Christians are often ignored by the international community and media, who seem to speak out only when they can find a way to blame Israel.

      • Counter PunchImmigrants Are Us

        The only groups which were not completely successful in this process were non-European: African Americans, Latins, Asians and actual native Americans as well. The social, economic and political restrictions that flowed from a persistent white American racism limited the ability of non-Europeans to assimilate and created a feared and resented “other” for the Western majority. Non-Western groups were more or less ghettoized into ethnic communities that were much harder to break down and meld with the greater society.

      • Counter PunchThe Erasure of Affirmative Action

        The only question that remains from now until June, 2023, when the Supreme Court’s decision is expected to be announced, is just how extreme this Supreme Court decision will transform into; will the ruling to dismantle race-conscious policies and considerations reach all aspects of society.

      • Democracy Now“Working People Everywhere Have Had It”: SEIU Pres. Mary Kay Henry on Unions Mobilizing for Midterms

        We look at the high stakes of the midterm elections for workers, including in key battleground states. Mary Kay Henry, president of the Service Employees International Union, says they are campaigning to empower working people, especially infrequent voters of color and new immigrants, to vote in their best interests. “We have got to make our votes a demand, and not a show of support for candidates that are with us one day and against us the next,” says Henry.

      • ScheerpostBrazil’s Supreme Court Orders Suspension of Bolsonarista Road Blockades

        Supporters of outgoing Brazilian President Jair Bolsonaro set up over 300 road blockades on October 31. The far-right leader has isolated himself since Sunday and has remained completely silent since his defeat.

      • ScheerpostJohn Kiriakou: American Gulag

        Western journalists are providing breathless depictions of the harsh conditions facing U.S. basketball star Brittney Griner in Russia. Have none of them been inside a U.S. prison?

      • The NationThe Post-Dobbs Election

        Heidi L. Sieck is the chief empowerment officer and cofounder of #VOTEPROCHOICE, a digitally savvy reproductive rights advocacy organization that tracks pro-choice candidates nationwide. I spoke with her in October. This interview has been condensed and lightly edited.

      • The NationAfter Dobbs, Anti-Abortion Activists Are Targeting Clinics in Blue States

        With the decision in Dobbs v. Jackson Women’s Health Organization in June, the Supreme Court eliminated the constitutional right to an abortion nationwide. Now, a new kind of abortion-rights archipelago has formed. Though 21 states and the District of Columbia have laws guaranteeing the procedure as a right, there are 17 states—mostly in the South and Midwest—that now ban or restrict abortions. Within the first month of the SCOTUS ruling, dozens of clinics were forced to close or to stop offering abortions.

      • TruthOutAbortion Rights Opponents Are Targeting Patients Seeking Care in Blue States
      • TruthOutStakes Are High for Workers, So Unions Are Mobilizing for Midterms
      • Telex (Hungary)If you’re afraid of change, you may as well just get pickled, jarred, and given your pension check
    • Internet Policy/Net Neutrality

      • Eesti RahvusringhäälingHigh-speed fiber optic internet not part of Apollo TV deal

        MM Grupp, an investment company owned by businessmen Margus Linnamäe and Ivar Vendelin, sold streaming service provider Apollo TV to TV Play Baltics (formerly ViaSat). The deal, however, did not include the high-speed internet service, which Apollo TV began offering its customers in June this year.

    • Monopolies

      • Patents

      • Copyrights

        • Creative CommonsCC Certificate: Alumni interview with Jennifer Miller

          In this interview, we were delighted to speak with Jennifer Miller, a graduate of the CC Certificate for Educators with over 10 years experience teaching and doing research in public policy and public management. She is a civic technologist and open knowledge advocate. Here is the Q&A:

        • Torrent FreakGoogle Removes Hundreds of Domains to Aid French Sports Piracy Crackdown

          In January 2022, rightsholders began utilizing a new site-blocking law introduced by France, specifically targeted at live sports streaming piracy. In the following months, Internet providers were ordered to block hundreds of domain names. Positive results of the new legislation are already being reported and with Google taking action, the crackdown has serious momentum.

        • Torrent FreakBungie & Ubisoft Reach $300,000 Settlement With Ring-1 Cheat Sellers

          In July 2021, Bungie and Ubisoft filed a lawsuit in the United States targeting alleged members of Ring-1, an online group behind Destiny 2 and Rainbow Six Seige cheating tools. After more than a year of uncertainty, two people named in the complaint have now agreed to settle with the videogame companies for $300,000. The fates of two others remain uncertain.

        • MeduzaRussian lawmakers consider creating registry for ‘unfriendly’ copyright holders — Meduza

          Anatoly Semyonov, the head of Russia’s Parallel Import Association, has proposed creating a registry of “unfriendly” copyright holders, according to the newspaper Kommersant. Semyonov reportedly raised the idea at a roundtable discussion held by the Russian Federation Council.

  • Gemini* and Gopher

    • Personal

      • Type III perhaps

        Consider the analogy “a picture is worth a thousand words” for the difference in mathematical application when pondering the vast abilities of a Type III civilization. We use words, Type III uses pictures. Such a conceptualization of mathematics cannot be merely obtained over time and through practice. The Type III were lucky to have this gift, a result of randomness in their evolution. Humanity was lucky to evolve with an enlarged brain and propensity for creative endeavor, and lucky to have a planet perfectly tailored to diverse life. Type III are lucky in different ways, much as Saturn is lucky to have beautiful rings around it.

      • Azhdahak I
      • Why I love my Saab 9-5

        The story of Saab is an all too familiar tragedy.
        A company known for building exceptional products struggles to stay afloat, slowly compromising and working with inferior companies before eventually becoming a hollow shell of what it once was, and optionally collapsing. GM killed Saab in 2011 after acquiring them 11 years prior. But before that, Saab made some amazing cars.

      • the afternoon is nice amongst my rgbs

        hi this is my first time visiting the pub, although im not much of a drinker i enjoy the vibe here so far. i like this feeling of a warm space in the company of strangers sharing their thoughts, its a nice alternative to the algorithmic hell i’m so sick of.

      • Why I don’t teleport anymore

        Oh sure, it’s got its fantastic upsides: overcoming that initial morning stay-in-bed inertia by teleporting onto the toilet and then into the shower, straight into a bundle of towels, kitchen, living room, etc, etc.

        But that ends pretty quickly the minute you live with someone, and even *if* you clue them in on your secret, they never quite get over the shock of you suddenly appearing on top of them in the bathroom because you forgot they were there.

      • 🔤SpellBinding: ADGNORP Wordo: BITCH
    • Politics

      • Corpse-state

        My parents informed me a few days ago that their friend Noka is now a corpse. Those are my words, of course, since, according to those who don’t *get* my so-called dark humour, I am an insensitive galoot. Be that as it may, Noka is now a corpse. Though it is a common thing, it still astounds me the ease at which a human can transition from a dynamic state into corpse-state. Noka experienced this transition after living for more than eighty-two years. According to my parents, she simply *gave up*. She had stopped eating regularly and possibly at all at the end. Depression wrapped her in its shroud. But why? It seems that only the dynamic Noka knew. Corpse-Noka probably doesn’t know.

    • Technical

      • Science

        • HackadayRoll The Radioactive Dice For Truly Random D&D Play

          When you have a bunch of people gathered around a table for a “Dungeons & Dragons” session, you have to expect that things are not always going to go smoothly. After all, people who willingly create and immerse themselves in an alternate reality where one bad roll of the dice can lead to the virtual death of a character they’ve spent months or years with can be traumatic. And with that trauma comes the search for the guilty — it’s the dice! It’s always the dice!

      • Programming

        • Email Netiquette

          The most important rule for email is to live and let live.

          Other people are gonna bork up the subject lines, CC you on list mail, be overly verbose or terse, top-post, bottom-post, interleave, fullquote, forget to quote, reply too quickly, too slowly, ask too many questions, too few questions, have annoying signatures etc etc etc. That’s fine.

          Get and keep your own house in order with whatever filters and templates you need. Then don’t worry about it.

        • YAML vs StrictYAML

          StrictYAML is a project that tries to fix some issues with YAML.

          They set out to make tools, not standards, and that’s great.

          They wanted to make a subset of YAML and a parser for it. Super good approach. But that that’s not really what it is. For example, No is a boolean false in YAML but when StrictYAML reads it, it’s a two-character string (if I understand their documentation correctly). So you’ll end up with misleading bugs later. Maybe a linter would’ve been better?

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 03/11/2022: Mesa 22.3.0 RC1 and Canonical Promotes Surveillance

Posted in News Roundup at 5:34 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • LWNAccessing QEMU storage features without a VM [LWN.net]

        The QEMU emulator has a sizable set of storage features, including disk-image file formats like qcow2, snapshots, incremental backup, and storage migration, which are available to virtual machines. This software-defined storage functionality that is available inside QEMU has not been easily accessible outside of it, however. Kevin Wolf and Stefano Garzarella presented at KVM Forum 2022 on the new qemu-storage-daemon program and the libblkio library that make QEMU’s storage functionality available even when the goal is not to run a virtual machine (VM).

        Like the Linux kernel, QEMU has a block layer that supports disk I/O, which it performs on behalf of the VM and supports additional features like throttling while doing so. The virtual disks that VMs see are backed by disk images. Typically they are files or block devices, but they can also be network storage. Numerous disk-image file formats exist for VMs and QEMU supports them, with its native qcow2 format being one of the most widely used. The QEMU block layer also includes long-running background operations called blockjobs for migrating, mirroring, and merging disk images.

      • LWNMore flexible memory access for BPF programs [LWN.net]

        All memory accesses in a BPF program are statically checked for safety using the verifier, which analyzes the program in its entirety before allowing it to run. While this allows BPF programs to safely run in kernel space, it restricts how that program is able to use pointers. Until recently, one such constraint was that the size of a memory region referenced by a pointer in a BPF program must be statically known when a BPF program is loaded. A recent patch set by Joanne Koong enhances BPF to support loading programs with pointers to dynamically sized memory regions.

      • LWNWould you like signs with those chars? [LWN.net]

        October 24, 2022 Among the many quirks that make the C language so charming is the set of behaviors that it does not define; these include whether a char variable is a signed quantity or not. The distinction often does not make a difference, but there are exceptions. Kernel code, which runs on many different architectures, is where exceptions can certainly be found. A recent attempt to eliminate the uncertain signedness of char variables did not get far — at least not in the direction it originally attempted to go.

        As a general rule, C integer types are signed unless specified otherwise; short, int, long all work that way. But char, which is usually a single byte on current machines, is different; it can be signed or not, depending on whatever is most convenient to implement on any given architecture. On x86 systems, a char variable is signed unless declared as unsigned char. On Arm systems, though, char variables are unsigned (unless explicitly declared signed) instead.

        The fact that a char variable may or may not be signed is an easy thing for a developer to forget, especially if that developer’s work is focused on a single architecture. Thus, x86 developers can get into the habit of thinking of char as always being signed and, as a result, write code that will misbehave on some other systems. Jason Donenfeld recently encountered this sort of bug and, after fixing it, posted a patch meant to address this problem kernel-wide. In an attempt to “just eliminate this particular variety of heisensigned bugs entirely”, it added the -fsigned-char flag to the compiler command line, forcing the bare char type to be signed across all architectures.

        This change turned out to not be popular. Segher Boessenkool pointed out that it constitutes an ABI change, and could hurt performance on systems that naturally want char to be unsigned. Linus Torvalds agreed, saying that: “We should just accept the standard wording, and be aware that ‘char’ has indeterminate signedness”. He disagreed, however, with Boessenkool’s suggestion to remove the -Wno-pointer-sign option used now (thus enabling -Wpointer-sign warnings). That change would enable a warning that results from the mixing of pointers to signed and unsigned char types; Torvalds complained that it fails to warn when using char variables, but produces a lot of false positive warnings with correct code.

    • Graphics Stack

      • Free Desktop[ANNOUNCE] mesa 22.3.0-rc1
        Hello everyone,
        I'm happy to announce the start of a new release cycle with the first
        release candidate, 22.3.0-rc1.
        New features (in no particular order):
        - GL_ARB_shader_clock on llvmpipe
        - VK_KHR_shader_clock on lavapipe
        - Mesa-DB, the new single file cache type
        - VK_EXT_attachment_feedback_loop_layout on RADV, lavapipe
        - VK_KHR_global_priority on RADV
        - GL_KHR_blend_equation_advanced_coherent on zink
        - VK_EXT_load_store_op_none on RADV
        - VK_EXT_mutable_descriptor_type on RADV
        - VK_EXT_shader_atomic_float on lvp
        - VK_EXT_shader_atomic_float2 on lvp
        - GL_NV_shader_atomic_float on llvmpipe
        - VK_EXT_image_robustness on v3dv
        - VK_EXT_extended_dynamic_state3 on lavapipe
        - VK_EXT_extended_dynamic_state3 on RADV
        - VK_EXT_pipeline_robustness on v3dv
        - Mali T620 on panfrost
        - Shader disk cache on Panfrost
        - support for R8G8B8, B8G8R8, R16G16B16 and 64-bit vertex buffer formats
          on RADV
        - initial GFX11/RDNA3 support on RADV
        - various ray tracing optimizations on RADV
        - extendedDynamicState2PatchControlPoints on RADV
          (VK_EXT_extended_dynamic_state2 feature)
        - Radeon Raytracing Analyzer integration (using RADV_RRA_* environment
        A couple of notes for packagers:
        - When building the Intel Vulkan driver with ray-tracing (using
          `-D intel-clc=enabled`, disabled by default), libclc is required
          (both as build and runtime dependency).
        - Rusticl, the OpenCL implementation (`-D gallium-rusticl=true`,
          disabled by default), introduces a bunch of new dependencies.
          Make sure you read docs/rusticl.rst (https://docs.mesa3d.org/rusticl)
          if you're considering enabling it.
        For now, no driver is enabled by default in Rusticl. See here for how
        to enable them:
        If you find any issues, please report them here:
        The next release candidate is expected in one week, on November 9th.
    • Applications

      • Linux Shell Tipsapt-offline – An Offline APT Package Manager

        This article guide walks Debian-based users through the download, installation, and usage of the apt-offline tool to effortlessly upgrade Debian-based Linux distribution with limited, slow, or zero internet connection.

        apt-offline is an offline package management utility that is used to install/upgrade software packages with their dependencies on Debian-based Linux distributions with no direct internet connection.

      • TecMintCollectl: An Advanced All-in-One Performance Monitoring Tool for Linux [Ed: They seem to have just changed the data, but probably edited the article a little]

        The most important duty of a Linux system administrator is to make sure the system he/she is administering is in very good condition. There are many tools available for Linux system admins that can help to monitor and display processes in a system such as top and htop, but none of these tools can compete with collectl.

    • Instructionals/Technical

      • Linux CapableHow to Enable Backports on Debian 11 Bullseye

        Debian is known amongst the Linux community for its gold standard in being stable, and a common drawback can be that the packages, especially after the new Debian release ages are that they are often years behind what is currently available as they only receive security and bug updates to keep packages stable. Now for most environments, this is acceptable. Still, it can be very frustrating for users needing specific packages to be upgraded to utilize the features or fix annoying non-critical or security-related bugs. However, the great thing about Linux and using repositories is that you can use what is known as backports or experimental repositories, which are packages taken from the next Debian release, which is nearly always the testing repository and adjusted recompiled for usage on Debian stable.

      • Red Hat OfficialHow to build Ansible execution environment images for unconnected environments | Enable Sysadmin

        Create a defined, consistent and portable environment for executing automation jobs on air-gapped or disconnected systems.

      • Linux CapableHow to Install Linux Kernel 6.0 on Debian 11 Bullseye

        For most users, the standard Linux Kernel that ships with your distribution suites your purpose fine. But for users that would like to install the latest kernels that the Debian team is working on, which is usually found in the sid repository or better known as unstable can be more beneficial to install given it should be better compatible than a generic kernel in some circumstances along with being easy to upgrade.

        The tutorial will demonstrate how to add the sid repository and create an apt pin using the command line terminal for users who prefer installing an upgraded kernel from the Debian team.

      • How to Install OctoPrint on Linux/Ubuntu

        OctoPrint on Linux is a great combination for diehard Linux and 3D printing fans. Read on for an OctoPrint-Linux installation guide!

      • FOSSLinuxHow to capture the Tmux pane history | FOSS Linux

        Tmux sessions are persistent. This means after exiting the program, the sessions will continue running. Ctrl + b is the default prefix used in Tmux. All commands in Tmux start with this default prefix, followed by a key to invoke the command into your Tmux application. This article guide will illustrate how to capture the Tmux panes’ history.

        However, before we dive into our subject matter, we need to install Tmux on our Linux OS. To do so, follow the brief guide provided herein, and if you encounter any challenges or want an in-depth article on how to install Tmux and use Tmux, check out this comprehensive guide.

        You have come to the right spot if you use Tmux and are unsure how to utilize it to capture pane history. You can use the directives in this article to learn the essential procedures for capturing the Tmux pane history.

      • UNIX CopEnabling exFAT support on Ubuntu 22.04

        exFAT file system is a worthy successor to FAT32 and can be quite useful in many ways. Well, today you will learn how to enable exFAT support in Ubuntu 22.04.

      • It’s FOSSHow to Trim a Video in VLC Player

        VLC media player is one of the best media players out there. This cross-platform player is feature rich and it can literally play any media format that’s available.

        You’ll be surprised to know that VLC is much more than just a video player. It can do a lot of things with your media files.

        Downloading YouTube video with VLC is one of the VLC tips we have shared on It’s FOSS.

        Let me share another one with you. How about trimming a video with VLC? It’s not the best way to trim videos but it is available as an option.

      • Ubuntu PitHow To Install Arc and Arc Dark Theme in Your Linux Distros

        The “Arc” theme for Linux is popular for its simplicity and modern look. The high-quality contrast and flat, Material-like design make it a step above other themes. Additionally, the transparent elements make it compatible with desktop environments like GNOME, Xfce, Unity, Mate, Budgie, and more.

        Arc is a flat theme for GTK 3, GTK 2, and various desktop shells. It’s well-suited for any window manager or application that uses GTK.

        If your Linux computer uses GTK as the theming engine, you won’t have trouble using and enjoying the beauty of Arc. Arc theme has 4 options: Arc – a combination of light and dark, Arc-Lighter, Arc-dark, and Arc-darker.

      • DebugPointHow to Install and Use Snap Packages in Ubuntu [Tutorial]

        Snappy (in short, Snap) packages are transactional packages developed by Canonical for Ubuntu for its line of solution offerings. Due to its transactional nature, snap packages can be used in across Linux Distributions. Snap packages are handy due to their atomic update in nature for critical industrial use cases such as IoT.

        This article will show you how to perform basic operations with snap via the command line.

    • Desktop Environments/WMs

  • Distributions and Operating Systems

    • Barry KaulerQEMU 7.1.0 compiled

      EasyOS has QEMU in the repository. It is compiled in OpenEmbedded, with an existing build recipe. I have never compiled QEMU in a running system, and decided to do so, to explore the configure options. I noticed that the build recipe in OE is using a minimum of system libraries, so wanted to see if that can be improved.

    • Red Hat and Fedora

      • Enterprisers ProjectDigital transformation: 3 pieces of contrarian advice

        Many organizations struggle to determine the best ways to modernize their internal and external business processes and applications. In this process, it can be challenging to determine the best path forward, especially when the options sometimes seem to conflict.

        Here are some of the most common approaches, based on conventional wisdom, along with some emerging alternatives contrary to traditional thinking. You might be surprised at which approaches better fit your organization’s specific needs.

      • Enterprisers Project8 bad communication habits to break in IT

        There’s no denying the value of strong communication skills in IT. These soft skills forge strong relationships among stakeholders and teams, aid in problem-solving, build robust workplace cultures, and drive projects forward. Strong communication skills are more important than ever in today’s hybrid and remote work era.

        We asked business and IT leaders to share the poor communication habits they’ve encountered among their teams and peers and ways to turn these bad habits into strengths. Here’s what they had to say.

      • Red HatHow the Next-10 project supports the future of Node.js | Red Hat Developer

        The Node.js community is working on an effort to ensure the Next-10 project is just as successful over the next ten years as it was in the first ten. This large open source project is the basis for many backend web applications and offers lessons for other open source communities. This article discusses the project’s goals and progress.

      • Red HatNode.js Reference Architecture, Part 10: Accessibility | Red Hat Developer

        Making applications accessible to disabled users is both good business and often required by law. We must develop the Node.js components that are part of these applications in a way that facilitates accessibility. This installment of the ongoing Node.js Reference Architecture series covers the key questions that Node.js developers need to understand about accessibility…

      • Fedora ProjectFedora 37 Release Party Brazil

        The Fedora Community in Brazil recently celebrated the release of Fedora Linux 37. The last Release Party in-person in Brazil was back in July 2016. We hosted a Fedora 37 Release Party at the University of São Paulo this month with the help of the Grupo de Extensão em Livre e Open Source (GELOS) group. Thank you to all the organizers, speakers, and attendees who made the Fedora 37 Release Party Brazil possible.

      • Madeline Peck: 11/2/22 Weekly Update

        This is going to be mostly for 10/26 – 11/2 but with some other background information from other things I worked on in October.

        We are Red Hat Week happened last week which was super fun! On 10/26 I attended the emerging OS CY22Q3 celebration to play bingo and get updates. On Thursday 10/27 I was in the Boston office and joined the Crayons to Cradle group, packing hygiene kits for kids ages 3-12 and coloring pieces of paper for them. Really great to see everyone from around Red Hat.

    • Canonical/Ubuntu Family

      • UbuntuUbuntu Blog: How GCP pricing works [Ed: Canonical is sadly encouraging developers to outsource their code to surveillance companies that deny access to code, resort to predatory pricing, and generally abuse Software Freedom]

        If you’re embarking on a new project and evaluating public clouds, the cost involved will be one of your main considerations. You might decide to use Google Cloud Platform (GCP) as your primary cloud platform. If so, you’ll want to estimate costs based on listed prices. But it might surprise you to find a higher bill than you originally expected.

    • Devices/Embedded

    • Open Hardware/Modding

      • HackadayMake Your Pi Moonlight As A Security Camera | Hackaday

        A decade ago, I was learning Linux through building projects for my own needs. One of the projects was a DIY CCTV system based on a Linux box – specifically, a user-friendly all-in-one package for someone willing to pay for it. I stumbled upon Zoneminder, and those in the know, already can tell what happened – I’ll put it this way, I spent days trying to make it work, and my Linux skills at the time were not nearly enough. Cool software like Motion was available back then, but I wasn’t up to the task of rolling an entire system around it. That said, it wouldn’t be impossible, now, would it?

      • CNX SoftwareAndes unveils AndesCore AX65 Out-of-Order RISC-V core for compute intensive applications – CNX Software

        Andes Technology has unveiled the high-end AndesCore AX60 series out-of-order 64-bit RISC-V processors at the Linley Fall Processor Conference 2022 with the new cores designed for compute-intensive applications such as advanced driver-assistance systems (ADAS), artificial intelligence, augmented/virtual reality, datacenter accelerators, 5G infrastructure, high-speed networking, and enterprise storage.

      • CNX SoftwareLearn soldering and programming with the Arduino Make Your UNO Kit – CNX Software

        Arduino Make Your UNO Kit is a kit with two boards, one for the microcontroller and the other for audio, and all components required that can be used to learn how to solder and then Arduino programming.

        Once soldering and assembly are complete you’ll hopefully get a working Arduino UNO and an audio synthesizer shield. But before you get there, you’ll need to equip yourself with a soldering iron and some soldering tin to solder the components below to the two PCBs.

  • Free, Libre, and Open Source Software

    • OpenSource.comHow open source weaves connections between countries | Opensource.com

      Long ago, when I was a tech administrator for Arlington Public Schools, I received an unexpected email saying, “Our school in India loves your children’s stories, so we’ve printed them all out in braille.”

      Apparently, the school had found my collection of children’s stories on the web. I spent a moment visualizing those students so far away, enjoying my stories on those printed pages of braille. The email’s sender might not have realized how meaningful their email was to me, but it’s stayed with me for two decades.

    • Notesnook Is an Open Source Note-taking App and Evernote Alternative

      Notesnook is a free (as in speech) & open source note-taking app focused on user privacy & ease of use. To ensure zero knowledge principles, Notesnook encrypts everything on your device using XChaCha20-Poly1305 & Argon2.


      Notesnook is an open source free project that is released under the GPL-3.0 License.

    • Events

      • Daniel StenbergWorkshop season 5 episode 2

        Mike Bishop talked about the complexities of current internet. Redirects before, during, after. HTTPS records. Alt-svc. Alt-SvcB. Use the HTTPS record for that alternative name.

        This presentation triggered a long discussion on how to do things, how things could be done in a future and how the different TTLs in this scenario should or could interact. How to do multi-CDN, how to interact with DNS and what happens if a CDN wants to disable QUIC?

        A very long discussion that mostly took us all back to square one in the end. The alt-svcb proposal as is.

    • Web Browsers/Web Servers

      • Mozilla

        • MozillaSupport.Mozilla.Org: How to contribute to Mozilla through user support

          It is with great pleasure that I am announcing the launch of our new contribute page in SUMO a.k.a SUpport.Mozilla.Org. SUMO is one of the oldest contribution areas in Mozilla, and we want to show you just how easy it is to contribute!

          There are many ways you can get involved with SUMO, so getting started can be confusing. However, our new contribute page should help with that, since the pages are now updated with simpler steps to follow and a refreshed design.

    • Content Management Systems (CMS)

      • LWNThe Ghost publishing system [LWN.net]

        Part of the early appeal of the World Wide Web was the promise that anybody could create a site and publish interesting content to the world. A few decades later, that promise seems to have been transformed into the ability to provide content for a small number of proprietary platforms run by huge corporations. But, arguably, the dream of widespread independent publishing is enjoying a resurgence. The Ghost publishing platform is built around the goal of making publishing technology — and the ability to make money from it — available with free software.

        Ghost is an MIT-licensed application written primarily in JavaScript; it has been under development since 2013. The project is owned by the non-profit Ghost Foundation, which appears to be mainly funded by an associated Ghost(Pro) hosting business. The entire platform appears to be free software; this is not an open-core offering.

        At a first glance, Ghost looks like yet another blogging platform, providing the ability to create, edit, and publish articles. Tied closely to that platform, though, is the ability to send articles via email newsletters; Ghost seems to be firmly positioned as a free alternative to operations like SubStack. Support for paid subscriptions is also built in, with the ability to define multiple subscriber levels. Much of the documentation and in-system help provided by Ghost is aimed at helping users create and monetize their content with the platform.

    • Programming/Development

      • OpenSource.comIs Lua worth learning? | Opensource.com

        Lua is a scripting language used for procedural programming, functional programming, and even object-oriented programming. It uses a C-like syntax, but is dynamically typed, features automatic memory management and garbage collection, and runs by interpreting bytecode with a register-based virtual machine. This makes it a great language for beginners, but also a powerful tool for experienced programmers.

        Lua has been somewhat eclipsed from the public view by languages like Python and JavaScript, but Lua has several advantages that make it popular in some major software projects. Lua is easily embedded within other languages, meaning that you can include Lua files in the code base of something written in (for instance) Java and it runs as if it were native Java code. It sounds like magic, but of course there are projects like luaj working to make it possible, and it’s only possible because Lua is designed for it. It’s partly because of this flexibility that you’re likely to find Lua as the scripting language for video games, graphic applications, and more.

        As with anything, it takes time to perfect, but Lua is easy (and fun) to learn. It’s a consistent language, a friendly language with useful error messages, and there’s lots of great support online. Ready to get started?

      • Python

        • LWNAn ordered set for Python? [LWN.net]

          Python has lots of different options for mutable data structures, both directly in the language and in the standard library. Lists, dictionaries (or “dicts”), and sets are the foundation, but two of those maintain an order based on how the elements are added, while sets do not. A recent discussion on the Python Discourse forum raised the idea of adding an ordered variant of sets; while it does not look like there is a big push to add the feature, the discussion did show some of what is generally needed to get new things into the language—and could well lead to its inclusion.

          By their very nature, Python lists have always been ordered; they can also be indexed like arrays. On the other hand, Python dicts started off as unordered, so that adding two entries to a dict could result in either order when, say, iterating over the keys. Dicts would normally maintain the same order if no additions or deletions were made to them, but it was not guaranteed by the language. That all changed when a new implementation of dicts for Python 3.6 maintained the insertion order as a side-effect of a more memory-efficient algorithm. In Python 3.7, ordered dicts were adopted as part of the Python language, so all implementations have to support that feature.

          There is also the longstanding collections.OrderedDict implementation in the standard library; it is optimized for reordering efficiency, which makes it a good choice for least-recently-used (LRU) caches, for example. The standard dict is optimized for mapping operations and insertion speed, so there are (still) good reasons to have both available. But, since the existence of OrderedDict pre-dated the switch to ordered dicts in the language, to some it seems like it might provide a precedent for an OrderedSet data structure in the standard library as well.

          But sets in both math and Python are just containers for some items—objects—with no duplicates. The operations available for sets are what would generally be expected: membership (using “in”), union, intersection, difference, subset, and so on. The order of the elements in a set is effectively random.

      • Rust

    • Standards/Consortia

      • Eric Baileyaria-label is a code smell

        The aria-label property is made available to us by the Accessible Rich Internet Applications (ARIA) standard. It allows a property/value declaration in HTML as a way of providing an accessible name for an interactive element.

  • Leftovers

    • Security

      • IT WireiTWire – Proofpoint says threat actor deploying malicious code on media sites

        Proofpoint says threat actor deploying malicious code on media sites More than 250 regional and national newspaper sites in the US have accessed malicious JavaScript that is being created by an actor known as TA569, the email security firm Proofpoint claims.

        In a tweet thread, the company’s Threat Insight unit said the media company that was serving as the host for this malicious code served content to its partners using JavaScript.

        “The actual number of impacted hosts is known only by the impacted media company,” Proofpoint tweeted.

      • PurismLibrem Key Goodies (Part 1)

        The Librem Key comes preloaded with the PureBoot bundle to protect your firmware. While it’s good at protecting your boot firmware, that’s only some of what it can do.

        You can also encrypt your computer’s file system, auto lock on removal, and encrypt local documents just to get started.

      • IT WireiTWire – Ransomware booming if one goes by Lockbit founder member’s claims

        Ransomware is a booming business judging by the claim made by a founding member of the Lockbit group that he owns three restaurants in China and two in New York.

        A threat researcher who goes by the pseudonym vx-underground conducted an interview with this individual who claims to be a veteran of the ransomware scene.

        Lockbit was founded on 3 September 2019 and the person interviewed said it had pentesters, developers, money launderers, testers and negotiators among its members.

        The individual said Lockbit was founded by a team of more than 10 people, adding that drug use was often an issue in ransomware groups, with cocaine or marijuana being the most common drugs abused.

      • Hacker NewsHackers Using Rogue Versions of KeePass and SolarWinds Software to Distribute RomCom RAT [Ed: The issue here is that people install malware from dodgy places]

        The operators of RomCom RAT are continuing to evolve their campaigns with rogue versions of software such as SolarWinds Network Performance Monitor, KeePass password manager, and PDF Reader Pro.

        Targets of the operation consist of victims in Ukraine and select English-speaking countries like the U.K.

      • Privacy/Surveillance

        • Hacker NewsNew TikTok Privacy Policy Confirms Chinese Staff Can Access European Users’ Data

          Popular short-form video-sharing service TikTok is revising its privacy policy for European users to make it explicitly clear that user data can be accessed by some employees from across the world, including China.

          The ByteDance-owned platform, which currently stores European user data in the U.S. and Singapore, said the revision is part of its ongoing data governance efforts to limit employee access to users in the region, minimize data flows outside of it, and store the information locally.

    • Finance

      • IT WireiTWire – AUSTRAC to check if Sportsbet, Bet365 comply with financial crime laws

        The Australian Transaction Reports and Analysis Centre says it will conduct an audit to determine whether betting companies Sportsbet and Bet365 have complied with laws governing financial crimes.

        In a statement, AUSTRAC said it would appoint external auditors “under section 162 of the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (AML/CTF Act) to assess compliance of two corporate bookmakers, Sportsbet and Hillside (Australia New Media) aka Bet365″.

    • Civil Rights/Policing

      • AccessNowCOP27 in Egypt: stop greenwashing, free human rights defenders – Access Now

        Egyptian President Abdel Fattah El-Sisi must free Alaa Abd El-Fattah, a British-Egyptian activist, and all human rights defenders and political prisoners detained for exercising their fundamental rights. All government representatives attending COP27 in Egypt must do everything in their power to ensure their swift release.

        In a blatant violation of human rights, Alaa, along with tens of thousands of activists and dissidents has long been persecuted by a government now opening its doors to the largest climate change conference in the world — COP27. Climate change is a human rights issue, and President El-Sisi must demonstrate he takes human rights seriously.

        “President El-Sisi hosting COP27 is hypocrisy incarnate,” said Marwa Fatafta, MENA Policy and Advocacy Manager at Access Now. “Alaa and activists from across Egypt exist in a human rights vacuum, but if the government of Egypt is now purporting to elevate human rights through this global climate change conference, it must seize this opportunity to free Alaa and all activists.”

        Against a backdrop of persecution lasting more than 15 years, Alaa has used his body as a tool for protest. The activist stated that after an extended hunger strike, he will eliminate water from his diet beginning at the start of COP27, November 6. The human body needs water to survive.

    • Internet Policy/Net Neutrality

      • Michael GeistThe Law Bytes Podcast, Episode 144: Keldon Bester on the Rogers-Shaw Merger and the Problem with Canadian Competition Law – Michael Geist

        The proposed Rogers-Shaw merger was back in the news last week as Canadian Industry minister Francois Philippe Champagne held a mid-week press conference to announce that the original deal was dead, but that a reworked deal that brings in Videotron might be a possibility if certain government expectations on restrictions on transferring spectrum licences and consumer pricing outside of Quebec were met. Keldon Bester is a co-founder of the Canadian Anti-Monopoly Project (CAMP), a fellow at the Centre for International Governance Innovation and an independent consultant and researcher working on issues of competition and monopoly power in Canada. He’s been one of the most insightful and outspoken experts on the proposed Rogers-Shaw merger and he joins the Law Bytes podcast to discuss where things stand and the big picture weaknesses of Canadian competition law and policy.

  • Gemini* and Gopher

    • Personal

      • The Midnight UnHabit

        Writing each day for no other reason than just writing does not seem a good or respectful idea. It seems a bit like the guy who every night when walking into the bar picks the same song on the jukebox.

      • There and back again

        Not much to report other than we made it home. I-95S in South Carolina was a horror show, what with a segment were it took us nearly an hour to travel 3 miles, and the I-95 exit to our house was closed off, but other than that, it was a long and gruelling trip.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Wednesday, November 02, 2022

Posted in IRC Logs at 2:28 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmPMS38qe6EgYT7dstavVjDWV3sZZ7Aei3PJhc143ma9Tx IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmTk1cyxj7aYQqvcymMkQXB64dsrJtoHnc14hNeE7VRe2J IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmX5b8CWSVq5b2Kx8y8oYNCXr1Rfdch7mM1LmYfg7yFxdD IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmVhShMfEgbqHxjgGkfuWDhm6MnpCwj22fiij8M3Sricd3 IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmfJpVWfVyvq3R9hwDDLjf6qFWVdfN2mto8CZycbhQcSr7 IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmZT4aqp7CZLK9syRTnQgXzvWiZg8qRTRuCdhcHgb8bSuE IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmcjDjHWzp4bXEoBQXtZDNi2tVxSQXNppwzFRC9f94f26C IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmeMWtcLt1hupBDUqDADYmq6W5hxq56s45MMKaaQXSsNb9 IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmWzWCzM3tE735knZAeUF9t2XXJbeSby2oJPv244xEiuY1

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts