Bonum Certa Men Certa

Links 31/05/2023: Librem Server v2, curl 8.1.2, and Kali Linux 2023.2 Release



  • GNU/Linux

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Ruben SchadeUsing WordPress for a self-hosted blog

      While I long since moved off WordPress for my own blog, I’ve mentioned that I still maintain various installs for others. This has prompted a few of you to ask if it’s worth it for a personal blog.

      I’d say so. If you’re not tempted by static site generators, or prefer running server-side software (as I keep being tempted back to), it works fine. There are so many benefits to hosting your own material if you can, regardless of what you use. In the words of my late mum: stop worrying about the chisel, and get carving!

    • Web Browsers/Web Servers

      • Daniel StenbergThe Gemini protocol seen by this HTTP client person

        There is again a pull-request submitted to the curl project to bring support for the Gemini protocol. It seems like a worthwhile effort that I support, even if it is also a lot of work involved and it might take some time before it reaches the state in which it can be merged. A previous attempt at doing this was abandoned a while ago.

        This renewed interest made me take a fresh tour through the current Gemini protocol spec and I decided to write down some observations for you. So here I am. These are comments based on my reading of the 0.16.1 version of the protocol spec. I have implemented Internet application protocols client side for some thirty years. I have not actually implemented the Gemini protocol.

      • Jim NielsenBrowser Defaults We Throw Away

        I think there are a few browser-related features that, collectively, we simply ignore. They’re built-in to the browser for our use, and yet it has become an almost knee-jerk reaction to immediately override them.

      • Daniel Stenbergcurl 8.1.2 ate one too

        This is the second follow-up patch release in the 8.1.x series due to regressions and bugs that are too annoying to leave lingering around.

    • Programming/Development

      • [Old] [Repeat] Jason W ComeauClever Code Considered Harmful

        This is important to keep in mind if you’re building an open-source tool, but it’s even more important if you’re working in a production codebase with other humans. Especially ones that have less experience than you.

  • Leftovers

    • ScheerpostQuitting Time
    • HackadaySimple Cubes Show Off AI-Driven Runtime Changes In VR

      AR and VR developer [Skarredghost] got pretty excited about a virtual blue cube, and for a very good reason. It marked a successful prototype of an augmented reality experience in which the logic underlying the cube as a virtual object was changed by AI in response to verbal direction by the user. Saying “make it blue” did indeed turn the cube blue! (After a little thinking time, of course.)

    • Anders BorchCombine.social as an Org

      I have some ambitions about where I want to take combine.social over time. It starts with taking the old toottail repository and moving it into a Github organization.

      I want to make it easier to adopt combine.social into your workflow, to trust that the code does what it says it does and nothing else. I already created a privacy policy specifically to mitigate any privacy concerns.

    • Ruben SchadeSpreadsheets as a knowledge base and mental map

      Back in February I talked about how I mentally map things, and admitted I was using spreadsheets more. A few of you asked if I could provide some examples, so that’s what I’m (finally!) getting to here. I use LibreOffice, but other graphical spreadsheets have equivalent functionality.

      In summary, I tend to think of things in terms of matrices. Turns out, a spreadsheet is a giant, beautiful, flexible canvas upon which to build them! I can can fill out, sort, filter, and search for things using this glorified database, and change things easily.

    • The NationThe First Street Baptist Church in America: Jesus Had 2 Dads
    • The NationBetter Than Reality

      Ever since I read media scholar Julie Turnock’s The Empire of Effects: Industrial Light & Magic and the Rendering of Realism, I haven’t been able to watch a movie or TV show that contains special effects without focusing on the wrong things. Instead of dragons or landscapes from the past, I see particles everywhere: fog and dust and mist and dirt and shrapnel and rain. These digital details are meant to provide the texture of reality, but now I see them as a constant blanket of static coating the action. Sometimes ignorance is bliss, so if you enjoy admiring the realism of elven villages, don’t read this book.

    • Education

      • RachelFeedback: I try to answer "how to become a systems engineer"

        I got some anonymous feedback a while back asking if I could do an article on how to become a systems engineer. I'm not entirely sure that I can, and part of that is the ambiguity in the request. To me, a "systems engineer" is a Real Engineer with actual certification and responsibilities to generally not be a clown. That's so far from the industry I work in that it's not even funny any more.

      • CERThe information won’t just sink in: Helping teachers provide technology-assisted data literacy instruction in social studies

        Last year, Tammy Shreiner and I published an article in the British Journal of Educational Technology, “The information won’t just sink in: Helping teachers provide technology-assisted data literacy instruction in social studies.” (I haven’t been able to blog much the last year while starting up PCAS, so please excuse my tardiness in sharing this story.) The journal version of the paper is here, and our final submitted version (not paywalled) is available here.

      • Stacey on IoTMy five big takeaways from this week’s big smart home event

        I’m currently in Dallas for the Parks Associates Connections conference, where it’s clear that the smart home industry is laser-focused on five big topics. And while the mood here is fairly grim with regards to the short term, it is optimistic when it comes to the long term.

        The five big topics of conversation both onstage and offstage have been smart energy, senior living, the Matter smart home interoperability standard, generative AI, and privacy. Smart energy and senior living offer the greatest hope for service revenue while Matter and generative AI have provoked both confusion and disappointment. The vibe around privacy, meanwhile, has been one of begrudging acceptance. Yes, this is something the industry needs to care about.

      • Jon UdellEd Iacobucci on DayJet, from IT Conversations

        There’s much more to say about Descript, which by the way deployed a significant upgrade in the middle of my project, but for now I’ll just say: Thank you! It’s a brilliant piece of software that enabled me to revisit one of my most treasured conversations and bring it to life in a way that people can now search for and read, as well as hear, with maximum fidelity. DayJet folded in 2008; it was a remarkable tale of innovation; here’s hoping Ed’s dream will come true.

      • Telex (Hungary)Opposition MEP to request that EC make education reform in Hungary condition for EU funds

        - Anna Donáth, Momentum MEP said at the party's campaign launching press conference in front of the cordons at the Prime Minister's office.

    • Hardware

      • DeveverModern CPUs have a backstage cast

        If you take someone with intermediate knowledge of computing in the right areas, and ask them how an x86 machine boots, they'll probably start telling you about how the CPU first comes up in real mode and starts executing code from the 8086 reset vector of FFFF:FFF0. This understanding of how an x86 machine boots has remained remarkably persistent, as far as I can tell because this basic narrative about the boot process has been handed down from website to website, generation to generation, largely unchanged.

        It's also a pack of lies and hasn't reflected the true nature of the boot process for some time. It's true the 8086 reset vector is still used, but only because it's a standard “ABI” for the CPU to transfer control to the BIOS (whether legacy PC BIOS or UEFI BIOS). In reality an awful lot happens before this reset vector starts executing.1 Aside from people having vaguely heard about the Intel Management Engine, this modern reality of the boot process remains largely unknown. It doesn't help that neither Intel nor AMD have really gone out of their way to actually document what the modern boot process looks like, and large parts of this process are handled by vendor-supplied mystery firmware blobs, which may as well be boxes with “???” written in them. Mainly we have the substantial assistance of assorted reverse engineers and security researchers to thank for the fact that we even have a decent picture of what the modoern x86 boot process actually looks like for both Intel and AMD. I could write a whole article about that process — but instead, I'd like to focus on something else.

      • HackadaySupercon 2022: [Jorvon Moss] Gives His Robots A Soul

        How do you approach your robot designs? Maybe, you do it from a ‘oh, I have these cool parts’ position, or from a ‘I want to make a platform on wheels for my experiments’ perspective. In that case, consider that there’s a different side to robot building – one where you account for your robot’s influence on what other people around feel about them, and can get your creations the attention they deserve. [Jorvon ‘Odd-Jayy’ Moss]’s robots are catchy in a way that many robot designs aren’t, and they routinely go viral online. What are his secrets to success? A combination of an art background, a Bachelor of Fine Arts in illustration, and a trove of self-taught electronics skills helped him develop a standout approach to robot building.

      • TechdirtNow That Snail Mail Has Pretty Much Been Rendered Obsolete, Congress Is Finally Getting Serious About Terminating Postal Surveillance

        For as long as the United States Postal Service (USPS) has had scanners, the government has been able to obtain information about senders and recipients. Under the Third Party Doctrine, information shared with third parties (in this case, shared with the government directly) is the government’s to have. No warrant needed.

      • HackadayUltimate Garage Door Control Does The Job Brilliantly

        [Stephen Carey] had previously relied on an Insteon garage door controller, only to have it perform poorly and fail at integrating with Alexa properly. Thus, he did what any good hacker would do, and built his own system instead.

      • HackadayPretty Small Robot Is Capable, Nonetheless

        When science fiction authors imagined robots in the 20th century, many of them were huge imposing steel automatons. [Shane]’s designs for the Pretty Small Robot are quite contrary to that, being tiny in stature and cute in affect.

    • Health/Nutrition/Agriculture

      • Vice Media GroupEating Disorder Helpline Disables Chatbot for 'Harmful' Responses After Firing Human Staff

        After NEDA workers decided to unionize in early May, executives announced that on June 1, it would be ending the helpline after twenty years and instead positioning its wellness chatbot Tessa as the main support system available through NEDA. A helpline worker described the move as union busting, and the union representing the fired workers said that "a chatbot is no substitute for human empathy, and we believe this decision will cause irreparable harm to the eating disorders community."

      • NBCFoodborne illness outbreaks at restaurants are often linked to sick workers, CDC finds

        Sick employees are major contributors to the spread of foodborne illnesses at restaurants and other food establishments, according to a Centers for Disease Control and Prevention report released Tuesday.

        From 2017 to 2019, the report found, around 40% of foodborne illness outbreaks with known causes were at least partly associated with food contamination by a sick or infectious worker. In 2017, for instance, Chipotle attributed a norovirus outbreak at its restaurant in Sterling, Virginia, to an employee who came to work while ill.

      • HackadayDIY 3D Printed Rain Gauge Connects To Home Assistant

        Measuring local rainfall has real practical uses, especially in agriculture, but most of us will have to admit that it’s at least partly about drawing cool graphs on a screen. Whatever your motivation, you can build this open source electronic rain gauge designed by [Sebastian] of Smart Solutions for Home, and integrate it with Home Assistant.

      • TechdirtMaryland Cops Can’t Seem To Understand Why Marijuana Legalization Means They Can’t Search Cars Just Because They Smell Marijuana

        Everyone likes an easy day at the office. Cops are no exception. They like easy excuses to disregard the Fourth Amendment. Pretextual stops are how cop business has been done for years. Any missing tail light or (subjectively) too dark window tint is enough to initiate a traffic stop and apply pressure on drivers to submit to a so-called “consensual” search of their car.

      • HackadayHackaday Prize 2023: EyeBREAK Could Be A Breakthrough

        For those with strokes or other debilitating conditions, control over one’s eyelid can be one of the last remaining motor functions. Inspired by [Jeremiah Denton] blinking in Morse code on a televised interview, [MBW] designed an ESP32-based device to decode blinks into words.

      • TechdirtA Deeper Look At The Surgeon General’s Report On Kids & Social Media: It’s Not What You Heard

        We had just recently written about the American Psychological Association’s very thorough and detailed report going through much of the research about the impact of social media on the mental health of kids. That report was careful, and nuanced, and basically said that there is little evidence that social media is inherently bad for kids. It noted that studies suggested social media actually seems to be beneficial for many kids, and in the cases where it’s harmful, there are often other, extenuating circumstances. It had many recommendations, focused mainly on better educating children about how to use social media appropriately, rather than any sort of moral panic about it (of course, as we noted, the media still misrepresented the study and claimed it “warned of social media’s potential harm to kids.”)

      • Michael West MediaGrowers nervous over drier conditions for winter crops

        Australia’s winter crop is on target to exceed last year’s planting but overall production could be significantly lower than last year, a Rabobank report shows.

        In its annual Australian winter crop outlook the agribank forecasts 23.48 million hectares will be planted this year, up 0.3 per cent on last year.

    • Proprietary

      • New York TimesWhy an Octopus-like Creature Has Come to Symbolize the State of A.I.

        Comparing an A.I. language model to a Shoggoth, @TetraspaceWest said, wasn’t necessarily implying that it was evil or sentient, just that its true nature might be unknowable.

        “I was also thinking about how Lovecraft’s most powerful entities are dangerous — not because they don’t like humans, but because they’re indifferent and their priorities are totally alien to us and don’t involve humans, which is what I think will be true about possible future powerful A.I.”

        The Shoggoth image caught on, as A.I. chatbots grew popular and users began to notice that some of them seemed to be doing strange, inexplicable things their creators hadn’t intended. In February, when Bing’s chatbot became unhinged and tried to break up my marriage, an A.I. researcher I know congratulated me on “glimpsing the Shoggoth.” A fellow A.I. journalist joked that when it came to fine-tuning Bing, Microsoft had forgotten to put on its smiley-face mask.

      • NVISO LabsTransforming search sentences to query Elastic SIEM with OpenAI API

        The primary task of a security analyst or threat hunter is to ask the right questions and then translate them into SIEM query languages, like SPL for Splunk, KQL for Sentinel, and DSL for Elastic. These questions are designed to provide answers about what actually happened. For example: “Identify failed login attempts, Search for a specific user’s login activities, Identify suspicious process creation, Monitor changes to registry keys, Detect user account lockouts, etc.”

        The answers to these questions will likely lead to even more questions. Analysts will keep interrogating the SIEM until they get a clear answer. This allows them to piece together a timeline of all the activities and explain whether it is a false positive or an actual incident. To do this, the analysts need to know a bunch of things. First, they need to be familiar with several types of attacks. Next, they need to understand the infrastructure (cloud systems, on-premises, applications, etc.). And on top of all that, they must learn how to use these SIEM tools effectively.

      • TechdirtPerhaps GPT Is Not Ready For The Supreme Court

        Over the last few months, we’ve written a bunch about DoNotPay, the company run by Joshua Browder, claiming that it is the “world’s first robot lawyer” — that is until people take him to court for various things, at which point he says the term is just meant to be for marketing, and not to be taken seriously.

      • Windows TCO

        • Security WeekPersonal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack

          The data breach, which occurred between February 26 and March 7, impacted both current and former members of certain state Medicaid and Children’s Health Insurance Programs, the company says in the notification letter, a copy of which was submitted to the Maine Attorney General’s Office.

          During the incident, an unauthorized party accessed multiple systems within MCNA’s network, infected them with malware, and stole personal information stored on them.

        • ABCWorst cyberattack in Greece disrupts high school exams, causes political spat

          It said the distributed denial of service, or DDoS, attacks aimed at overwhelming the platform occurred for a second consecutive day Tuesday. The attack involved computers from 114 countries, causing outages and delays in high school exams but failing to incapacitate the system, the ministry said.

    • Security

      • Integrity/Availability/Authenticity

        • Bruce SchneierBrute-Forcing a Fingerprint Reader

          Depending on the model, the attack takes between 40 minutes and 14 hours.

        • EFFEU’s Proposed Cyber Resilience Act Raises Concerns for Open Source and Cybersecurity

          EFF welcomes the intention of the legislation, but the proposed law will penalize open source developers who receive any amount of monetary compensation for their work. It will also require manufacturers to report actively exploited, unpatched vulnerabilities to regulators. This requirement risks exposing the knowledge and exploitation of those vulnerabilities to a larger audience, furthering the harms this legislation is intended to mitigate.

          Open source software serves as the backbone of the modern internet. Contributions from developers working on open source projects such as Linux and Apache, to name just two, are freely used and incorporated into products distributed to billions of people worldwide. This is only possible through revenue streams which reward developers for their work, including individual donations, foundation grants, and sponsorships. This ecosystem of development and funding is an integral part of the functioning and securing of today’s software-driven world.

          The CRA imposes liabilities for commercial activity which bring vulnerable products to market. Though recital 10 of the proposed law exempts not-for-profit open source contributors from what is considered “commercial activity” and thus liability, the exemption defines commercial activity much too broadly. Any open source developer soliciting donations or charging for support services for their software is not exempted and thus liable for damages if their product inadvertently contains a vulnerability which is then incorporated into a product, even if they themselves did not produce that product. Typically, open source contributors and developers write software and make it available as an act of good-will and gratitude to others who have done the same. This would pose a risk to such developers if they receive even a tip for their work. Smaller organizations which produce open source code to the public benefit may have their entire operation legally challenged simply for lacking funds to cover their risks. This will push developers and organizations to abandon these projects altogether, damaging open source as a whole.

        • Krebs On SecurityDiscord Admins Hacked by Malicious Bookmarks

          A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark.

      • Privacy/Surveillance

        • VideoTesla Had a Massive Data Leak
        • Patrick BreyerData Retention: Red Line Against Storage of Citizens’ IP Addresses

          On 15 and 16 May the judges of the Court of Justice of the European Union heard the French government, several French NGOs, the European Data Protection Supervisor and the European Union Agency for Cybersecurity in a case whose outcome will significantly strengthen or weaken, respectively the privacy of more than 447 million EU citizen’s activities on the Internet. (See case C‑470/21)

        • Scoop News GroupSection 702 data led to State Department warnings about North Korean IT scams, official says

          The revelation about the 2022 scheme comes as the State Department joins the intelligence community, the Justice Department, and the White House in pushing for Congress to renew Section 702 of the Foreign Intelligence Surveillance Act before its sunset at the end of this year.

          While other officials have focused primarily on the surveillance tool’s importance in combatting nation-state threats, Brett Holmgren, the State Department’s assistant secretary for its Bureau of Intelligence and Research, emphasized how crucial the tool is to diplomatic efforts.

        • The Register UKThe FBI as advanced persistent threat – and what to do about it

          Consider a repeat offender: the Federal Bureau of Investigation. Last week, the FBI was caught using its power to hoover up communications without a warrant, ostensibly to monitor foreign threats, to plunder the privacy of many thousands of US citizens whose revulsion at a brutal killing of a Black man by white cops marked them as activists.

          This is nothing new. Search for "FBI abuse of powers" – replacing FBI with other state agencies to taste – and you'll be scrolling for a year. It's actually quite cheering that democracies still have safeguards to bring this stuff to light, and yet it keeps happening. If you live in a part of the world where such protection is diluted or absent, you won't need telling how bad it can get.

        • TechdirtFTC Gives Fertility App $200k Wrist Slap For Sharing Sensitive Medical Info

          We’ve mentioned for years how there’s now an absolute ocean of telecoms, services, apps, and other companies that are busy collecting all manner of sensitive location, health, mental health, browsing, and sexual preference data, then selling access to it to a massive array of dodgy and poorly regulated data brokers. Despite this, we consistently refuse to pass any sort of competent internet privacy law or competently regulate said brokers.

        • EFFTo Save the News, We Must Ban Surveillance Advertising

          The ad-tech industry is incredibly profitable, raking in hundreds of billions of dollars every year by spying on us. These companies have tendrils that reach into our apps, our televisions, and our cars, as well as most websites. Their hunger for our data is insatiable. Worse still, a whole secondary industry of “brokers” has cropped up that offers to buy our purchase records, our location data, our purchase histories, even our medical and court records. This data is continuously ingested by the ad-tech industry to ensure that the nonconsensual dossiers of private, sensitive, potentially compromising data that these companies compile on us are as up-to-date as possible.€ 

          Commercial surveillance is a three-step process:

          This data-gathering and processing is the source of innumerable societal harms: it fuels employment discrimination, housing discrimination, and is a pipeline for predatory scams. The data also finds its way into others’ hands, including the military, law enforcement, and hostile foreign powers. Insiders at large companies exploit data for their own benefit. It’s this data that lets scam artists find vulnerable targets and lets stalkers track their victims.€ 

        • EFFFederal Judge Makes History in Holding That Border Searches of Cell Phones Require a Warrant

          EFF is thrilled about this decision, given that we have been advocating for a warrant for border searches of electronic devices in the courts and Congress for nearly a decade. If the case is appealed to the Second Circuit, we urge the appellate court to affirm this landmark decision.

          U.S. Customs & Border Protection (CBP) asserts broad authority to conduct warrantless, and often suspicionless, device searches at the border, which includes ports of entry at the land borders, international airports, and seaports.

          For a century, the Supreme Court has recognized a border search exception to the Fourth Amendment’s warrant requirement, allowing not only warrantless but also often suspicionless searches of luggage and other items crossing the border.

        • TechdirtThe FBI’s Constant Abuse Of Section 702 Surveillance May Finally Take This Tool Away From The NSA

          The FBI has fucked around and now it’s on a collision course with Finding Out. The NSA likes its Section 702 collection — an upstream collection authorized to gather communications in bulk from foreigners as well as US persons communicating with foreigners.

        • HackadaySecret Bookshelf Door Uses Hidden Fingerprint Scanner

          What is it that compels us about a secret door? It’s almost as if the door itself and the promise of mystery is more exciting than whatever could lay beyond. In any case, [Scott Monaghan] is a lover of the form, and built his own secret door hidden in a bookshelf, as all good secret doors should be.

    • Defence/Aggression

    • Transparency/Investigative Reporting

      • The DissenterFilm Review: Reproducing FBI's Interrogation Of Whistleblower Reality Winner
      • SalonPentagon leaker Jack Teixeira is nothing like Edward Snowden: He's more like Donald Trump

        Another glaring, but overlooked, difference between Teixeira's leaks and Snowden's is the question of how each man viewed his actions. Teixeira bragged about breaking the rules, the sensitivity of what he had access to, and the "f**k ton of information" he possessed about U.S. intelligence on countries considered among America's greatest enemies, such as Syria, Iran and China.

        Snowden, in contrast, was concerned about the U.S. breaking its own rules through mass domestic surveillance and bulk collection of Americans' phone records — a concern later vindicated by an appeals court. Snowden did not boast about his disclosures or seek credit for them. That's why he initially blew the whistle anonymously under the pseudonym "Citizenfour."

        The most significant differences, however, are that Snowden made his disclosure to independent journalists who could vet the information, not to gamer buddies he was trying to impress, and that Snowden's revelations were clearly in the public interest.

      • The Telegraph UKCover-up row over ministers’ WhatsApps

        “It now appears that vital evidence has gone missing,” said Angela Rayner, Labour’s deputy leader.

    • Environment

      • International Business TimesResearch reveals New York City could sink under its own weight in the near future

        A recent research article published in the Earth's Science edition of Advancing Earth & Space Science suggested that New York City could sink under its own weight in the near future. The article published earlier this month shows how the island burdened by skyscrapers is subsiding by 2mm per year.

        The scientists have termed this research the most difficult task because the rate of this subsidence is comparatively new when measured against the urban load of buildings and people, which has been happening for a bigger period. Despite that, they have done thorough research comparing the surface geology of the place from different satellite image sources including GPS or the Global Positioning System and Interferometric Synthetic Aperture Radar.

      • Energy/Transportation

        • Pro PublicaHelp ProPublica Report on Railroad Worker Safety

          To do this right, we need to hear from as many people who work in the system as possible. This means railroaders in all positions, managers and people familiar with the Federal Railroad Administration.

        • Michael West MediaFossil-fuel sponsors for sports and arts shown red card

          Fossil-fuel companies are being shown the red card on their sponsorships of sporting and arts events as industry bosses face pressure to ditch the lucrative deals under a voluntary code.€ 

          Leading environmental advocacy group the Climate Council will launch the code for sports clubs and arts institutions in response to pressure from athletes, artists, fans and punters for action to protect the planet.

        • Michael West MediaPush for Indigenous inclusion in new energy economy

          The First Nations Chamber of Commerce and Industry (FNCCI)€ is plugging into the booming renewable energy industry.

          Attracting delegates from industry and business, the organisation’s inaugural summit kicked off in Gladstone on Wednesday with a focus on Indigenous jobs and economic development.

      • Wildlife/Nature

    • Finance

      • GizmodoFidelity: Twitter is Now Only Worth a Third of What Elon Musk Paid for It
      • ScheerpostThe Death Penalty for Homelessness

        You can measure the depth of a civilization by how it treats its poor, very young, elderly and mentally ill. By any such metric, ours here in the Exceptional Empire is barbaric. Take New York City mayor Eric Adams and his pronouncements on the homeless destitute.

      • ScheerpostRalph Nader: Inverted Corporate Capitalism—Blocking Their Owner-Shareholders

        It is the season of annual shareholder meetings for giant corporations when CEOs go through the motions of elections for their Board of Directors and approval of other resolutions. People who own stock in General Motors (GM) receive the “GM Meeting Information” in an envelope emblazoned with this disingenuous message: […]

      • The NationThe Debt Deal Is a Tragedy

        Two men emerged from the Oval Office. One of them, President Joe Biden, said of the deal they’d just reached that it “reduces spending while protecting critical programs for working people and growing the economy for everyone.”

      • Michael West MediaAsia stocks slump to monthly loss on weak China data

        Asia’s stockmarkets slid toward a second month of losses in a row on Wednesday as weak Chinese factory activity fed growing doubts about the post-pandemic recovery in the world’s second biggest economy.

        MSCI’s broadest index of Asia-Pacific shares outside Japan fell one per cent in early trade and is down 2.4 per cent in a month where hopes for robust Chinese rebound have run dry.

      • Michael West MediaInterest rate buffer intact despite 'mortgage prison'

        The banking regulator is alert to mortgage stress as interest rates rise and borrowers face a looming deadline on cheap fixed-rate home loans, but won’t ease the rules.

        Refinancing a mortgage has hit the highest level in 20 years, Australian Prudential Regulation Authority (APRA) chair John Lonsdale said on Wednesday.

      • Michael West MediaSlow productivity growth risks inflation outlook: RBA

        The head of the Reserve Bank has issued a warning about weak productivity growth as it continues its fight against high inflation with interest rate hikes.

        Philip Lowe told a parliamentary committee that wages growth, in isolation, was not the problem.

      • Michael West MediaPhilip Lowe urges diversity on Reserve Bank board

        Populating the new monetary policy board solely with economists would be a backward step, Reserve Bank governor Philip Lowe says.

        The governor favours a diverse board that includes business people and labour market experts.

      • Michael West MediaThe PwC scandal, the Big Four, and the real elephant in the room. What's next?

        While PwC is struggling to contain what might be its very own Enron moment, the ATO, Treasury and the Senate are trying to figure out why nobody did anything about what everybody seemed to know. It’s now a scandal too big to go away, Kim Wingerei reports on what might be next.

        Fresh out of business school in Norway in 1980, this writer joined the illustrious Arthur Anderson, one of the then “Big 8” audit and consulting firms. At an internal meeting discussing proposed legislative changes to the tax benefits of limited partnerships, the local firm’s tax consulting partner was asked how it would affect some of our big clients. His answer was as succinct as it was cynical:

      • Michael West MediaACCC wary of market power in supermarket sector

        A lack of competition in the supermarket sector is making it easier for major players to charge shoppers more.

        The consumer watchdog has a close eye on the big supermarkets to make sure they aren’t using their market position to charge much higher prices for groceries.

      • Michael West MediaThousands of documents on PwC tax leak not released

        A key body involved in investigating the PwC tax advice scandal says there are thousands of documents relating to the matter that are yet to be released.

        Tax Practitioners Board chief executive€ Michael O’Neill told a Senate estimates hearing there might be thousands of documents relating to the confidentiality breach case that went beyond already publicly released emails.

      • Michael West MediaRBA governor 'appalled' by PwC leak revelations

        The Reserve Bank governor has labelled the confidentiality breach scandal embroiling PwC a disgrace and says the central bank will not sign new contracts with the firm until appropriate action has been taken.

        Philip Lowe also confirmed the bank has contracted the troubled consultancy giant to assist it in correcting staff underpayments.

    • AstroTurf/Lobbying/Politics

      • NYPostBiden sexual assault accuser Tara Reade feels ‘safe’ in Russia after fleeing over safety concerns

        “I felt safe and I felt heard and I felt respected," Reade said of getting off the plane in Russia.

      • New York TimesTara Reade, Who Accused Biden of Assault, Says She Has Moved to Russia

        Years after accusing President Biden of sexual assault, Ms. Reade told a Russian outlet that she had moved in order to feel safe.

      • Michael GeistExtend the Deadline: My Submission to the CRTC on its Deeply Flawed Bill C-11 Consultations

        The CRTC’s Bill C-11 consultations are off to a rocky start with mounting concern over short deadlines that may limit public participation and reduce the quality of the submissions. A dozen groups have asked the Commission to extend the deadlines with more groups joining in the call. The deadline for comment on the extension ended yesterday and I navigated an exceptionally difficult consultation process (more on that shortly) to submit the comments posted below. I support the extension but argue that a better approach would be to wait until the government’s policy direction process is final and there is certainty on support for public interest group participation.

      • Vice Media GroupAI CEOs Say AI Poses ‘Risk of Extinction,’ Are Trying to Find the Guy Who Did This

        “I see this as a way for companies like Open AI to control the narrative and move public attention away from things like data consent, the legality of their systems, and the false and misleading information that they produce (and how all of these can impact our livelihoods). Essentially, it is a misdirection of public attention away from what matters towards that which suits their narrative and business model,” Luccioni added.

        “The whole thing looks to me like a media stunt, to try to grab the attention of the media, the public, and policymakers and focus everyone on the distraction of scifi scenarios,” Emily M. Bender a Professor in the Department of Linguistics at the University of Washington, told Motherboard. “This would seem to serve two purposes: it paints their tech as way more powerful and effective than it is and it takes the focus away from the actual harms being done, now, in the name of this technology. These include the pollution of the information ecosystem, the reinforcement and replication of biases at scale, exploitative labor practices and further gigification of the economy, enabling oppressive surveillance such as the ‘digital border wall’ and theft of data and creative work.”

      • MIT Technology ReviewHow to talk about AI (even if you don’t know much about AI)

        Everyone is talking about AI, it seems. But if you feel overwhelmed or uncertain about what the hell people are talking about, don’t worry. I’ve got you.

        I asked some of the best AI journalists in the business to share their top tips on how to talk about AI with confidence. My colleagues and I spend our days obsessing over the tech, listening to AI folks and then translating what they say into clear, relatable language with important context. I’d say we know a thing or two about what we’re talking about.

      • The NationThe Other Race

        Among the gamblers there’s excitement: Just who will face the next indictment? Will it be Trump, will it be Rudy Who finds himself in deeper doody?

      • The NationRon DeSantis Is Flaunting His Résumé—Does Anyone Care?

        Florida Governor Ron DeSantis, who was planning to launch his presidential campaign as this issue of The Nation went to press, is accruing leadership credentials in a party that no longer exists. DeSantis has used his super€­majority in the Florida Legislature to launch a head-spinning array of salvos in the right-wing culture wars—from an anti-trans surveillance regime in public schools and rolling book bans to an improbable assault on Disney as the avatar of all things woke.

      • The NationIs It Sexist to Demand That Feinstein Resign?

        The drumbeat for Senator Dianne Feinstein to resign has reached a kind of dull fever pitch. Aside from the open secret of her cognitive decline, the California Democrat was “working from home” for three months straight due to shingles, holding up President Biden’s judicial nominees in Washington, D.C., at a time when women are dying like it’s 1973 all over again. Now Feinstein is back in the Senate, looking and sounding completely decrepit. There’s absolutely nothing feminist about defending her nonexistent “right” to remain in office, no matter what Kirsten Gillibrand tries to argue on CNN. Yet there is a double standard at work here, and leftist men in particular would do well to check themselves.1

      • The NationSoul-Crushing Misogyny Made Succession the Perfect Show for Our Time

        So Succession reached its finale, with both a bang and a whimper.

      • Michael West MediaNSW to ditch 'one of most undemocratic' voting schemes

        Controversial powers criticised for being one of the most undemocratic election systems in Australia are set to be ditched, the NSW government says.

        Businesses in the City of Sydney have had twice the voting power of ordinary residents in council elections since 2014.

      • Misinformation/Disinformation/Propaganda

        • Terence EdenM*A*S*H - War Is Heaven

          So now on to M*A*S*H. It's hailed as a masterpiece of comedy. But, really, it's an exercise in military propaganda.

          The first season is genuinely hilarious and, at times, moving. But there's no disguising just how fun it makes war look.

        • Silicon AngleTwitter to expand crowdsourced fact-checking tool after Pentagon explosion deepfake video

          The whole debacle was a testament to how realistic AI can create phony events and how such events can, in some way, even if just for a short time, rock the world. There has been a lot of talk in the last few years about the danger of deepfake technology in the age of information warfare. Recently, an image of the Pope dressed like a rap star went viral. Though harmless, it was so well done that one can only imagine the chaos this technology will cause now and in the near future.

        • The HillOcasio-Cortez says fake Twitter account impersonating her

          “FYI there’s a fake account on here impersonating me and going viral. The Twitter CEO has engaged it, boosting visibility,” Ocasio-Cortez wrote on her official account Tuesday, referring to Twitter owner Elon Musk. “It is releasing false policy statements and gaining spread. I am assessing with my team how to move forward. In the meantime, be careful of what you see.”

    • Censorship/Free Speech

      • Michael West MediaMan told by court to stay away from Brittany Higgins

        A man accused of making death threats online has been ordered to stay away from former political staffer Brittany Higgins and her fiance.

        David William Wonnocott, 49, appeared in a northern NSW court on Wednesday for the first time since his April arrest over social media threats of violence.€ 

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • Vice Media GroupEmployee Non-Compete Agreements Are Illegal, NLRB Lawyer Says

        The general counsel of the National Labor Relations Board issued a memo on Tuesday stating that overly broad non-compete agreements violate the National Labor Relations Act by barring workers from opportunities to get new jobs. The memo is the latest of multiple governmental actions to address the problem of non-competes, including a proposed ruling by the Federal Trade Commission earlier this year to ban them completely.

      • The NationThe Takeover of Shasta County

        Mary Rickert opens her iPad, clicks on her hate-mail folder, and shows me some of the screeds she has received over the past three years. One begins: “I’d like to fuck Mary Rickert in the face with a brick.” Another has the subject line “Going, going, gone, dead woman walking.” She closes the folder, shudders, and says, “I have PTSD because of this, just from the insanity of it all. I have nightmares all the time. Watching the county just crumble is absolutely devastating for me… watching it being taken over by a far-right group.”1

      • The NationAre the Risk Managers Running Planned Parenthood?

        Jon Wiener: When the Supreme Court overturned Roe v. Wade, a lot of our friends immediately sent a check to Planned Parenthood—because Planned Parenthood is known to all as the organization that provides abortion services and defends abortion rights. But it turns out some of the affiliates are less willing to provide abortion services than others. And in many places, independent abortion clinics do a lot of the work, and face a lot of the threats from violent anti-abortion activists: for example, in Montana.

      • The NationBody and Soul

        Arabesques, the first and only novel by the acclaimed Palestinian writer Anton Shammas, was originally translated into English 35 years ago, in 1988. It was a time of great turmoil and hope, with the Palestinian Intifada entering its second year, and it was also a time when the prospects for Israeli-Palestinian solidarity seemed to show more promise than they had at any other time. As though in confirmation, Shammas’s novel appeared, with its array of Israeli and Palestinian characters reflecting on one another and their relations in a wide range of locales. Perhaps most important, the novel managed to narrate the story of the Nakba in Hebrew to a Jewish Israeli public. When I read it back then, it represented a bold and promising departure suitable to the revolutionary times that Palestine was going through.1

      • The NationRepublicans Attacked These Queer Students’ Lives. So They Fought Back.

        Kenzie Roller took a deep breath as they approached the stage microphone. It was Wednesday, March 29, and Roller, a high school senior from Louisville, Ky., had traveled to the state capitol in Frankfort so that they could be here, on this stage, to kick off the rally that they had spent the last 19 days planning. The message they had to share was as clear as day: Senate Bill 150—legislation that dramatically limits the rights of queer and trans youth in Kentucky—would harm them, their closest friends, and their entire community.

      • Site36Racist killings in German city Hanau: Chaos in the police force
      • Pro PublicaJefferson Parish Deputies May Have Violated Law in Eric Parsa’s Death, Feds Say

        The Jefferson Parish Sheriff’s Office in Louisiana may have violated the civil rights of a 16-year-old autistic boy when deputies pinned him to the pavement, handcuffed and shackled, as officers sat on his back for more than nine minutes, according to a “statement of interest” filed this month by the Department of Justice as part of a civil rights lawsuit against JPSO.

        The teen, Eric Parsa, died on the scene in January 2020. The sheriff’s office has also recently faced a number of other lawsuits alleging wrongful death, excessive force and racial discrimination by deputies. The sheriff’s office was the subject of a yearlong investigation by ProPublica and WRKF and WWNO starting in 2021, which disclosed evidence of racial discrimination and violence by deputies; after the first story ran, the American Civil Liberties Union called on federal prosecutors to investigate the department.

      • Michael West MediaCalls for tougher punishment after Iran executions

        Iranian Australians say they are at breaking point and fed up with government inaction as family members are executed, tortured and imprisoned back home.

        Australian-Iranian leaders want the government to step in and go harder against the theocratic and authoritarian regime, which has begun executing protesters.

    • Internet Policy/Net Neutrality

      • uni StanfordHere’s How the European Commission Proposal to Force Websites to Pay ISPs Violates Net Neutrality

        In a frontal assault on net neutrality, the European Commission wants to force websites and apps to pay fees to broadband companies like Telefonica, Orange and Deutsche Telekom, and it just closed its call for comments on the proposal.

        Network fees like this have never existed in the EU. They violate the EU's net neutrality law, and, if put in place, would be a radical departure from how the internet has operated and flourished over the last 30 years.

        While reporting solid profits and telling their investors everything is going great, European internet service providers (ISPs) have seemingly convinced the European Commission that the normal rise in online traffic is overwhelming and that, without the government requiring online companies to pay them, they’ll be unable to roll out 5G and fiber fast enough to meet EU goals.

    • Monopolies

      • Trademarks

      • Copyrights

        • [Old] USDOJ1854. Copyright Infringement -- First Sale Doctrine

          The first sale doctrine, codified at 17 U.S.C. ۤ 109, provides that an individual who knowingly purchases a copy of a copyrighted work from the copyright holder receives the right to sell, display or otherwise dispose of that particular copy, notwithstanding the interests of the copyright owner. The right to distribute ends, however, once the owner has sold that particular copy. See 17 U.S.C. ۤ 109(a) & (c). Since the first sale doctrine never protects a defendant who makes unauthorized reproductions of a copyrighted work, the first sale doctrine cannot be a successful defense in cases that allege infringing reproduction.

          Further, the privileges created by the first sale principle do not "extend to any person who has acquired possession of the copy or phonorecord from the copyright owner, by rental, lease, loan, or otherwise, without acquiring ownership of it." See 17 U.S.C. ۤ 109(d). Most computer software is distributed through the use of licensing agreements. Under this distribution system, the copyright holder remains the "owner" of all distributed copies. For this reason, alleged infringers should not be able to establish that any copies of these works have been the subject of a first sale.

        • Torrent FreakFlawless IPTV: Men Behind UK's Largest Pirate Service Jailed For 30+ Years

          Five men behind pirate IPTV service 'Flawless' were sentenced to more than 30 years in prison today, after a private prosecution by the Premier League. A FACT test purchase in 2017 led to the involvement of four territorial police forces, three regional Trading Standards units, and the arrest of service kingpin, Mark Gould, in 2018. In less than two years, Flawless served over 50,000 UK households while generating millions in revenue.

        • Torrent FreakU.S. Govt Launches Consultation on Future Anti-Piracy Strategies

          The U.S. Government's Patent and Trademark Office will host a public roundtable to discuss future anti-piracy and counterfeiting strategies. The agency notes that piracy causes billions of dollars in losses to the U.S. economy each year. No concrete proposals are mentioned but rightsholders will likely suggest pirate site blocking as an option.

        • TechdirtGoogle Nixes ‘Downloader’ App From Store After DMCA Says Its Browser Can Get To Piracy Sites

          As anyone who reads this site regularly will know, DMCA abuse happens all the time. Typically you see this sort of thing resulting from clear attempts to hobble a competitor, or to silence content someone doesn’t want to see, or pure trolling for the purposes of producing mayhem. But we also see this kind of “abuse” stemming from entities, foreign and domestic, that simply don’t know the strictures under which DMCA and copyright law actually operate.

        • Creative CommonsKirsty von Gogh — Open Culture VOICES, Season 2 Episode 17

          “Opening up cultural artifacts from African organizations might change how we’re represented in online spaces” says Kirsty von Gogh from Johannesburg. She also shares how increasing production of culturally, linguistically, and contextually aware and relevant content can ensure a more representative digital space for Africans, and how open licensing increases accessibility to this content.



Recent Techrights' Posts

Workers' Right to Disconnect Won't Matter If Such a Right Isn't Properly Enforced
I was always "on-call" and my main role or function was being "on-call" in case of incidents
A Discussion About Suicides in Science and Technology (Including Debian and the European Patent Office)
In Debian, there is a long history of deaths, suicides, and mysterious disappearances
Federal News Network is Corrupt, It Runs Propaganda Pieces for Microsoft
Federal News Network used to be OK some years ago
Hard Evidence Reinforces Suspicion That Mark Shuttleworth May Have Worked Volunteers to Death
Today we start re-publishing articles that contain unaltered E-mails
 
Links 30/04/2024: More Google Layoffs (Wide-Ranging)
Links for the day
Fresh Rumours of Impending Mass Layoffs at IBM Red Hat
"IBM filed a W.A.R.N with the state of North Carolina. That only means one thing."
Mark Shuttleworth's (MS's) Canonical is Promoting Microsoft This Week (Surveillance Slanted as 'Confidential')
Who runs Canonical these days? Why does Canonical help sell Windows?
What Mark Shuttleworth and Canonical Can to Remedy the Damage Done to Frans Pop's Family
Mr. Shuttleworth and Canonical as a company can at the very least apologise for putting undue pressure
Amnesty International & Debian Day suicides comparison
Reprinted with permission from disguised.work
[Meme] A Way to Get No Real Work Done
Walter White looking at phone: Your changes could not be saved to device
Modern Measures of 'Productivity' Boil Down to Time Wasting and Misguided Measurements/Yardsticks
People are forgetting the value of nature and other human beings
Countries That Beat the United States at RSF's World Press Freedom Index (After US Plunged Some More)
The United States (US) was 17 when these rankings started in 2002
Record Productivity and Preserving People's Past on the Net
We're very productive these days, partly owing to online news slowing down (less time spent on curating Daily Links)
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, April 29, 2024
IRC logs for Monday, April 29, 2024
Links 30/04/2024: Malaysian and Russian Governments Crack Down on Journalists
Links for the day
Frans Pop Debian Day suicide, Ubuntu, Google and the DEP-5 machine-readable copyright file
Reprinted with permission from disguised.work
Axel Beckert (ETH Zurich), the mentality of sexual violence on campus
Reprinted with permission from Daniel Pocock
[Meme] Russian Reversal
Mark Shuttleworth: In Soviet Russia's spacecraft... Man exploits peasants
Frans Pop & Debian suicide denial
Reprinted with permission from disguised.work
The Real Threats to Society Include Software Patents and the Corporations That Promote Them
The OIN issue isn't a new one and many recognise this by now
Links 30/04/2024: OpenBSD and Enterprise Cloaking Device
Links for the day
Microsoft Still Owes Over 100 Billion Dollars and It Cannot be Paid Back Using 'Goodwill'
Meanwhile, Microsoft's cash at hand (in the bank) nearly halved in the past year.
[Teaser] Ubuntu Cover-up After Death
Attack the messenger
The Cyber Show Explains What CCTV is About
CCTV does not typically resolve crime
[Video] Ignore Buzzwords and Pay Attention to Attacks on Software Developers
AI in the Machine Learning sense is nothing new
Outline of Themes to Cover in the Coming Weeks
We're accelerating coverage and increasing focus on suppressed topics
[Video] Not Everyone Claiming to Protect the Vulnerable is Being Honest
"Diversity" bursaries aren't always what they seem to be
[Video] Enshittification of the Media, of the Web, and of Computing in General
It manifests itself in altered conditions and expectations
[Meme] Write Code 100% of the Time
IBM: Produce code for us till we buy the community... And never use "bad words" like "master" and "slave" (pioneered by IBM itself in the computing context)
[Video] How Much Will It Take for Most People to Realise "Open Source" Became Just Openwashing (Proprietary Giants Exploiting Cost-Free or Unpaid 'Human Resources')?
turning "Open Source" into proprietary software
Freedom of Speech... Let's Ban All Software Freedom Speeches?
There's a moral panic over people trying to actually control their computing
Richard Stallman's Talk in Spain Canceled (at Short Notice)
So it seems to have been canceled very fast
Links 29/04/2024: "AI" Hype Deflated, Economies Slow Down Further
Links for the day
Gemini Links 29/04/2024: Gopher Experiment and Profectus Alpha 0.9
Links for the day
[Video] Why Microsoft is by Far the Biggest Foe of Computer Security (Clue: It Profits From Security Failings)
Microsoft is infiltrating policy-making bodies, ensuring real security is never pursued
Debian 'Cabal' (via SPI) Tried to Silence or 'Cancel' Daniel Pocock at DNS Level. It Didn't Work. It Backfired as the Material Received Even More Visibility.
know the truth about modern slavery
Lucas Nussbaum & Debian attempted exploit of OVH Hosting insider
Reprinted with permission from disguised.work
Software in the Public Interest (SPI) is Not a Friend of Freedom
We'll shortly reproduce two older articles from disguised.work
Harassment Against My Wife Continues
Drug addict versus family of Techrights authors
Syria, John Lennon & Debian WIPO panel appointed
Reprinted with permission from disguised.work
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, April 28, 2024
IRC logs for Sunday, April 28, 2024
[Video] GNU and Linux Everywhere (Except by Name)
In a sense, Linux already has over 50% of the world's "OS" market
[Video] Canonical Isn't (No Longer) Serious About Making GNU/Linux Succeed in Desktops/Laptops
Some of the notorious (or "controversial") policies of Canonical have been covered here for years
[Video] What We've Learned About Debian From Emeritus Debian Developer Daniel Pocock
pressure had been put on us (by Debian people and their employer/s) and as a result we did not republish Debian material for a number of years
Bruce Perens & Debian public domain trademark promise
Reprinted with permission from disguised.work
Links 28/04/2024: Shareholders Worry "AI" Hype Brings No Income, Money Down the Drain
Links for the day
Lawyer won't lie for Molly de Blanc & Chris Lamb (mollamby)
Reprinted with permission from disguised.work
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, April 27, 2024
IRC logs for Saturday, April 27, 2024