Links 15/05/2022: Linux 5.18 RC7 and Calls for More Mass Surveillance

Posted in News Roundup at 2:32 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Kubernetes 1.24: Volume Populators Graduate to Beta | Kubernetes

        The volume populators feature is now two releases old and entering beta! The AnyVolumeDataSouce feature gate defaults to enabled in Kubernetes v1.24, which means that users can specify any custom resource as the data source of a PVC.

        An earlier blog article detailed how the volume populators feature works. In short, a cluster administrator can install a CRD and associated populator controller in the cluster, and any user who can create instances of the CR can create pre-populated volumes by taking advantage of the populator.

        Multiple populators can be installed side by side for different purposes. The SIG storage community is already seeing some implementations in public, and more prototypes should appear soon.

    • Audiocasts/Shows

      • Jupiter BroadcastingNVIDIA’s New View | LINUX Unplugged 458

        NVIDIA is open-sourcing their GPU drivers, but there are a few things you need to know. Plus, we get some exclusive insights into Tailscale from one of its co-founders.

        Special Guests: Avery Pennarun and Christian F.K. Schaller.

      • GNU World Order 460

        **kapidox** , **kapman** , **kapptemplate** , **karchive** , and **kate** from the **kde** software series of Slackware.

      • VideoSysteroid: Best Way To Set Linux Kernel Parameters – Invidious

        It’s not often you need to mess with kernel parameters but when you do instead of using sysctl how about you try out systeroid instead

    • Kernel Space

      • Linux 5.18-rc7
        From	Linus Torvalds 
        Date	Sun, 15 May 2022 18:15:42 -0700
        Subject	Linux 5.18-rc7
        share 0
        So things continue to be fairly calm, and as such this is likely the
        last rc before 5.18 unless something bad happens next week.
        All the stats here look normal, with the bulk of it being random
        driver updates (network drivers, gpu, usb, etc).
        There's a few filesystem fixes, some core networking, and some code
        kernel stuff. And some selftest updates.
        Sortlog appended, nothing really stands out (the most exciting thing
        last week was literally that Andrew has started using git, which will
        make my life easier, but that doesn't affect the *code*)
        Please give it one last week of testing, so that we'll have a nice
        solid 5.18 release.
      • LWNKernel prepatch 5.18-rc7 [LWN.net]

        The 5.18-rc7 kernel prepatch has been released for testing. Linus says: “So things continue to be fairly calm, and as such this is likely the last rc before 5.18 unless something bad happens next week”.

    • Instructionals/Technical

      • Make Use Of5 Things to Do After Upgrading to Ubuntu 22.04 LTS
      • How to Dual Boot Ubuntu 22.04 LTS and Windows 11

        Hey guys, in this guide we will demonstrate how to configure a dual-boot setup of Ubuntu 22.04 LTS (Jammy Jellyfish) alongside Windows 11.

        For this to work, you need to have Windows 11 already installed on your PC.  You will then need to create a separate partition on your hard drive on which Ubuntu 22.04 will be installed. We will go over all this, so don’t worry.

      • UNIX CopUsing SSH Keys

        SSH supports authenticating users with keys. Although they require more setup ahead of time, they’re generally more secure than typing in passwords. They’re also more convenient in the long run. In this article, I am going to cover using key-based authentication in OpenSSH.

      • UNIX CopHow To Install Anaconda on Ubuntu 22.04

        Anaconda is a distribution of the Python and R programming languages for scientific computing (data science, machine learning applications, large-scale data processing, predictive analytics, etc.), that aims to simplify package management and deployment. The distribution includes data-science packages suitable for Windows, Linux, and macOS. It is developed and maintained by Anaconda, Inc.,

      • UNIX CopHow To Install Anaconda on Fedora 36

        Anaconda is a popular Python/R data science and machine learning platform, used for large-scale data processing, predictive analytics, and scientific computing.

        Anaconda distribution ships with 250 open-source data packages, and more than 7,500 additional packages can be installed from the Anaconda repositories. It also includes the conda command-line tool and a desktop graphical user interface called Anaconda Navigator.

      • UNIX CopHow to install Brave Web browser on CentOS 9 Stream

        Hello, friends. In this post, you will learn how to install Brave Web browser on CentOS 9 Stream. This is one of the best alternative web browsers you can use.

      • Install phpMyAdmin on Ubuntu 22.04 with Apache

        phpMyAdmin is a web-based application for interacting with MySQL database server. This tool provides you with a user interface to make MySQL operations so you don’t have to use the command line interface.

        In this guide you are going to learn how to install phpMyAdmin with Apache on Ubuntu 22.04 and secure it.

      • How to Install GNU Octave on Linux Mint 20

        Linux Mint is an ideal operating system for many kinds of users, such as enthusiasts and developers. That’s why it has become one of the most popular in all of Linux, thanks to its ease of use and robustness. In it, we can install all kinds of tools such as programming languages and thus be useful to professional developers. An example of this is that we can install GNU Octave on Linux Mint without too many problems. This is the aim of our post.

      • Linux HintFinding files in Ubuntu 22.04

        In computing, file placement is an important activity to perform as you may forget the file location. Ubuntu 22.04 supports various built-in commands to trace down your files. However, the graphical user interface may also be used to find files.

      • Linux HintHow to Convert SVG or PDF File to Base64?

        Apart from simple text, the image files or documents can also be converted to the Base64 format. These entities can then be stored securely anywhere you want. In this article, we would like to share the methods of converting the SVG files and PDF files to Base64 using the Python programming language in Ubuntu 20.04. First, we will introduce you briefly to these file formats, followed by the procedure of converting them to Base64.

      • Linux Made SimpleHow to install DataGrip 2022 on a Chromebook

        Today we are looking at how to install DataGrip 2022 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Linux HintGDISK Command-Line Options

        The GDISK command in Linux is used to partition the drives of your system. Moreover, it can also be used to list down the existing partitions and display relevant information about them. In this guide, we will be talking about the different command-line options that are available with the GDISK command on a Linux Mint 20.3 system.

      • Linux HintMapfile Bash Linux Command

        The bash shell Mapfile command is often known as a reading array. The primary purpose is to read standard input lines and store them in an indexed array variable. Mapfile must also read from substitution (<<) rather than a pipe. In addition, as compared to a read loop, bash Mapfile is a much faster and more convenient solution. It returns 1 if the execution of the command gets successful and 0 in case it is not successful. If we don’t specify an array name, the bash Mapfile variable will be targeting the array variable by default. Thus, we have decided to cover some examples using the mapfile instruction on the bash.

      • Linux HintResolve Issue: Bash Bad Substitution

        You may have received the Bad substitution syntax problem while developing Bash scripts. After browsing through forums, you may discover that you are not alone; other individuals are encountering the same mistake. It’s a typographical fault that happens when you run your Shell script, and it can happen for a variety of reasons. The wrong use of instruction substitution and erroneous characters appended to the program are two major reasons for this.

        Let’s see how we can make our shell script cause this error and how to resolve it. Get started with the new bash file created with Ubuntu’s “touch” query and open it within the “GNU Nano” editor.

      • Linux HintResolve Issue: Bash Unary Operator Expected

        Errors have a diverse number of types and reasons when it comes to bash programming. One of those errors is the “unary operator expected” error in bash programming. When evaluating expressions in conditional declarations, you may run into the “unary operator expected” issue. The reasons for this error “bash unary operator expected” might be diverse. We’ll start by talking about what’s creating the problem. Following that, we’ll go over a couple of options for resolving this problem. Let’s get started with today’s article by creating a new bash file in Ubuntu 20.04 system. For this, we need to utilize the “touch” instruction within the shell terminal and name the file “unary.sh”.

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • OMG UbuntuONLYOFFICE 7.1 is Out With New PDF Viewer, Slideshow Animations + More

        If you’re a fan of open source office software you’re in for a treat as a brand new version of ONLYOFFICE is now available to download.

        If you can look past the shouty name, ONLYOFFICE offers a highly-performant, well-featured, and fully-functional alternative to LibreOffice (which, though awesome, is a bit ‘old-school’ for some folks’ UI tastes). It’s also the next-best thing to that stalwart of the productivity software scene: Microsoft Office.

        ONLYOFFICE 7.1 inherits a swathe of improvements recently deposited in the cloud-side version of the suite, such as improved performance, better Microsoft Office compatibility, and a handy new new print preview mode in all of the suite’s respective components.

    • Programming/Development

      • The Unix Philosophy and Lagrange

        I wasn’t initially going to wade into this discussion (since it’s not really what I want this gemlog to be), but something is bugging me. Maybe I’m misreading Ainent’s initial post but they seem to be arguing that Lagrange violates the Unix philosophy *because* it supports 6 different protocols (including file://). I think this assumes a stronger interpretation of “one thing” than is desirable.

      • [Old] Wiley“The Canary in the Coal Mine…” A cautionary tale from the decline of SourceForge

        This article tells the cautionary tale of the downfall of Allura/SourceForge. We identified both internal and external causes, both social and technical in nature. We also found evidence of sociotechnical and architectural problems in project archives. Project and community health metrics could have been used to predict and understand the downfall by tracking its early manifestations. The team reported to be aware of the technical debt in the project, yet this was insufficient to maintain the health of the project. Community managers should also measure and manage the mutual impacts of technical and social debt. Furthermore, our analysis suggests that a combination of managerial and technical flaws doomed this project: architectural flaws, power-distance, and measurable management mishaps eventually led to the forge’s demise. Practitioners and maintainers of other software projects can benefit from this cautionary tale, for example, as indications of what not to do, in the scope of their community and architecture management infrastructure.

      • Dirk EddelbuettelDirk Eddelbuettel: RcppArmadillo on CRAN: Updates

        Armadillo is a powerful and expressive C++ template library for linear algebra and scientific computing. It aims towards a good balance between speed and ease of use, has syntax deliberately close to Matlab and is useful for algorithm development directly in C++, or quick conversion of research code into production environments. RcppArmadillo integrates this library with the R environment and language–and is widely used by (currently) 978 other packages on CRAN, downloaded over 24 million times (per the partial logs from the cloud mirrors of CRAN), and the CSDA paper (preprint / vignette) by Conrad and myself has been cited 469 times according to Google Scholar.

        This release brings a first new upstream fix in the new release series 11.*. In particular, treatment of ill-conditioned matrices is further strengthened. We once again tested this very rigorously via three different RC releases each of which got a full reverse-dependencies run (for which results are always logged here). A minor issue with old g++ compilers was found once 11.1.0 was tagged to this upstream release is now 11.1.1. Also fixed is an OpenMP setup issue where Justin Silverman noticed that we did not propagate the -fopenmp setting correctly.

      • Linux HintReversed Linked List (C++)

        When you reverse a linked list, the link path is reversed, and the head becomes the tail, and the tail becomes the head. By swapping the positions of the nodes, we can understand this quickly. In this swapping, we just change the positions of the nodes from left to right or vice-versa.

      • Linux HintGets Function in C

        Bound-checking is therefore not accomplished by the gets() method. It would not examine if the input data integrates inside the character array’s holding limit of bytes. A buffer overflow can occur when an entry exceeds the array limit. Through fgets, this restriction of the gets() method could be eliminated. The gets() method produces a string if it occurs. It reverts NULL if it starts to fail. It displays the EOF indicator on a string if an end-of-file situation generates the error. If another error triggers the failure, the error parameter is displayed on the string.

      • Linux HintGetting started with Node-Red on Raspberry Pi

        Node-Red is a visual programming tool that is used to connect APIs and hardware in a more prominent and exciting way. It has a web-based editor that will allow you to control and manage your Raspberry Pi device from a remote location. The graphical user interface of the editor is excellent and pretty simple which enables a beginner to handle it quite easily. The Node-Red can easily be installed on your Raspberry Pi device and once the installation is completed you will need to acquire a basic understanding of how to use this tool on a web editor to develop different projects.

        In this tutorial, we will provide you with an easy setup guide to get started with Node-Red on your Raspberry Pi and start developing your projects with ease.

      • Python

        • Linux HintStatistics Module in Python

          If you’re in the research world, statistics is of paramount importance! And Python offers many a module for statistics, but the one that we’ll be talking about today is called the statistics module. It’s a simple module, not really for advanced statistics but for those who just need a simple and quick computation. In this tutorial, we’ll be reviewing the statistics module in Python.

        • Linux HintEmulate the Do-While Loop in Python

          Most of the standard programming languages have three types of loops to iterate some statement multiple times. These are the while loop, for loop, and the do-while loop. The while and for loop are available in Python but Python has no do-while loop. The do-while loop can be implemented by using another loop. In the do-while loop, the condition is tested after inserting the loop. So, the statements of the do-loop execute at least once even if the condition may not be matched. The ways of emulating the do-while loop in Python have been shown in this tutorial.

      • Java

        • Linux HintException Handling in Java | Explained

          Java provides a concept of Exception Handling that makes it possible to handle the errors at run time, in this way, the normal follow of the program wouldn’t be affected. To handle the runtime exceptions Java provides multiple ways such as try-catch, finally, throw, throws. The normal flow can be preserved using any of these exception handling methods.

    • Standards/Consortia

      • RIPEImpact Analysis for UTF-8 in the RIPE Database

        The RIPE Database contains the names and addresses of organisations as well as administrative and technical contacts for resources and routing in the RIPE region. The Database currently supports the Latin-1 (ISO-8859-1) character set, which can represent most characters in western European languages. However it cannot fully support characters used in other languages and alphabets that are commonly used in the RIPE service region and beyond. Currently, any unsupported characters must be transliterated into Latin-1 (or even ASCII in some cases, which is a subset of Latin-1), potentially corrupting the meaning. Switching the RIPE Database from Latin-1 to UTF-8 allows names and addresses to be properly represented for querying and display.

  • Leftovers

    • HackadayLight Whiskers From Soap Bubbles Is Real Science

      You might think that anything to do with a soap bubble is for kids. But it turns out that observing light scattering through a soap bubble produces unexpected results that may lead to insights into concepts as complex as space-time curvature. That’s what [stoppi] says in his latest experiment — generating “light whiskers” using a laser and a soap bubble. You can watch the video, below, but fair warning: if videos with only music annoy you, you might want to mute your speakers before you watch. On the other hand, it almost seems like a laser light show set to music.

    • HackadayVicious Little Desktop Shredder Pulverizes Plastic Waste

      We’ve all likely seen video of the enormous industrial shredders that eat engine blocks for lunch and spit out a stream of fine metal chips. The raw power of these metal-munching monsters is truly fearsome, and they appear to be the inspiration for SHREDII, the miniature plastic shredder for at-home recycling of plastic waste.

    • HackadayThe Explosive Art Of Detonographs

      The visual arts are a broad field, encompassing everything from the chiselling of marble sculptures to the creation of delicate landscapes in charcoal on paper. However, [Evelyn Rosenberg] has experimented with some altogether more radical techniques over the years, creating her explosively-formed detonographs.

    • Myths Adults Believe

      As mentioned in the post, we don’t have five senses. We can sense gravity, so we know when we are upside down, so that’s six. We can sense heat, and cold (two different senses, which can be activated both at once), and we can sense when we’re hungry and thirsty.

      Once I read about this old myth (I never figured it out myself), I started writing out lists of senses. I think I got to about twelve, but I’ve heard others have got to 18 distinct senses. It’s one of many myths I’ve believed in life, and every time I find one, I start wondering about how many others I’ve accepted.

    • riding the wave of agency

      Some self reflection has brought up interesting questions of late about the nature of agency as it applies to self-improvement, motivation, and those types of things.

    • Hardware

      • HackadayComputer Thing Might Be Garbage

        [Tech Time Traveller] has a lot of voices in his head this week, and most of them are worried about his wife’s reaction to him buying other people’s garbage. We don’t blame him, though. He bought it from an estate sale and it was billed as a TV typewriter. The device looked completely homebrewed from somewhere around the late 1970s to the early 1980s. It contains a mess of components obviously hand-built in a combination of neat construction and messy wiring.

      • HackadayUpcycling A Flat Bed Scanner

        [Piffpaffpoltrie] had a 20-year-old Acer flatbed scanner that they just couldn’t justify keeping. But it does seem a shame to throw away a working piece of gear. Instead, the old scanner became a light table. We’ll admit, as projects go, it isn’t the most technically sophisticated thing we’ve ever seen, but we do think it is a worthy way to upcycle something that would otherwise be filling up a landfill.

      • HackadayE-Paper Clock Displays Things In A Battery-Friendly Manner

        Clock builds are a hacker staple, and many overflow with power-thirsty LEDs and network features. This build from [mattwach] takes quite the opposite approach, sipping away at its batteries thanks to an e-paper based design.

    • Health/Nutrition/Agriculture

    • Security

      • Privacy/Surveillance

        • TruthOutPrivacy Experts Warn Data From Period-Tracking Apps May Soon Be Used Against You
        • Facial recognition in European cities – What you should know about biometric mass surveillance

          As an effort to promote privacy and human rights in the EU, we at Greens/EFA got together with a team of international experts to understand where biometric mass surveillance, like facial recognition, is put to use this very moment in different European cities and states.

          Keep reading to find out what we learned, and why must take action to ban the use of these technologies now – before it is too late.

        • Holistic privacy: How to remove the target on encryption’s back

          Encryption, encryption, encryption. When it comes to the digital world, encryption is the number one tool we’ve got for protecting people’s security and privacy. If you had to pick a singular cybersecurity thing which was the most important, it would be encryption. Without encryption, the entire internet would catch on fire and we’d be left with a pile of ashes containing everything from your texts to your grandma, to your bank password, or even top secret government memos.

          Losing—or weakening—encryption would be a catastrophe — and that’s why so many good people fight tooth and nail to protect it. However, as the fiery debate over tech (and how to regulate it) rages on — the focus on encryption is starting to get really intense. And with that intensity, it’s starting to feel like other aspects of security and privacy aren’t getting the attention they deserve. Things like metadata, data storage, and digital identities also have enormous privacy and security implications, but they’re often left out of the discussion when talking about regulation and technical designs.

          Instead, regulators focus their efforts on trying to weaken or ban encryption: it’s all about backdoors, lawful access, and wanting access to things which are, well, impossible to provide access to (that’s the whole point of end-to-end encryption, after all). When it’s only about encryption, the conversation about tech—which is often extremely complex—loses nuance. Don’t get me wrong, encryption has to be a core part of any discussion about privacy and security, it’s just not the only thing that matters. The conversation about whether something is (or isn’t) private does not begin and end with ‘is it encrypted?’. Sure, if it’s not encrypted, that’s a big red flag. But if it is encrypted, does that immediately equal privacy?

        • When the EU wanted to own all computers

          The only way to prevent FOSS e2ee like Matrix or PGP or OMEMO is to own everyone’s uid zero.

          Owning everyone’s uid zero is not OK for a hundred ripple effects. Passwords, finance, love letters, computational resources…

          This is different from already external apps like Signal or iMessage or iCloud, apps which are like hiring someone to come over to your house to fix your broken sink. Any given plumbing company can introduce&advertise an idea like their plummers can wear a body cam to prevent assault, for example, and such cameras can be regulated or even mandated by the EU.

    • Defence/Aggression

      • Common DreamsOpinion | Ukraine: The New American Crusade

        The United States is synonymous with war yet does everything it possibly can to avoid such a connection. Its conflicts are always couched in the language of democracy, liberal values, freedom, and the like, despite swathes of evidence that show these wars produce precisely the opposite outcomes. The unfortunate reality is that bombs dropped in the name of freedom produce the same amount of death and destruction as those dropped by tyrants, and American policymakers actively work to hide this from voters. 

      • Common DreamsOpinion | The Downside Risks of Sweden and Finland Joining NATO
      • Task And PurposeRussian troops are proving that cell phones in war zones are a very bad idea

        When Russian troops cross into Ukraine, their cell phones emit a roaming signal that connects to Ukraine’s cellular network, allowing the Ukrainians to triangulate where the Russians are by using the closest three cell towers, said Artem Starosiek, CEO of Molfar, an open-source intelligence community based in Kyiv.

        “So, the Ukrainian special services automatically receive information with the ID number of the device, roaming number, and, of course, the location of the person,” Starosiek told Task & Purpose. “Fortunately, Russians are quite naive and ignorant about using mobile devices, so they often call home, turning on their phones and connecting to the Ukrainian stations.”

        The Russians have also given away their positions by stealing Ukrainian iPhones, which can be tracked using the Find My iPhone app, even when the phones are turned off, Starosiek said.

      • Common DreamsBuffalo Gunman’s Racism Directly Tied to Mainstreaming of White Nationalism, Say Critics

        Amid the outpouring of grief and heartache following Saturday’s massacre in Buffalo that left 10 people dead and three wounded, critical observers say the racial animus which evidence shows motivated the killer must be seen in the larger context of a white nationalist mindset that has increasingly broken into the mainstream of the right-wing political movement and Republican Party in recent years.

        Taken into custody at the scene of the mass shooting at the Tops Market and identified as Payton Gendron, the white 18-year-old male charged with the murders of the victims live-streamed his attack online where he also posted a detailed, 180-page document that has been described by those who have reviewed it—including journalists and law enforcement—as a white nationalist manifesto rife with anti-Black racism, antisemitism, and conspiracy theories about “white replacement.”

      • VarietyGunman Kills 10 People in Buffalo, N.Y. Shooting While Livestreaming on Twitch

        Officials believe that the gunman streamed his actions through a camera attached to a tactical helmet. Reports indicate that the video depicts the shooter pulling up to the grocery store and pointing his assault rifle at people in the parking lot and opening fire. The gunman then walked into the store to shoot others.

        Twitch, the massively popular live-streaming website owned by Amazon, has since taken the gunman’s channel offline, citing a violation of Twitch’s “community guidelines and terms of service.” A spokesperson confirmed that the company removed the stream less than two minutes after the violence started.

      • Business InsiderThe Buffalo mass shooting gunman live-streamed the attack on Twitch

        Authorities also said the gunman live-streamed the attack using a camera that was attached to the tactical helmet he was wearing.

      • CNNLivestream of shooting shows gunman pulling up to supermarket and saying, “Just got to go for it”

        In a statement sent to CNN, Twitch confirmed the shooting was streamed and said the user “has been indefinitely suspended from our service, and we are taking all appropriate action, including monitoring for any accounts rebroadcasting this content.”

      • BBCGermany shooting: 2,200 people watched on Twitch

        The company said the account that live-streamed the attack had been created two months before the incident. It had only attempted to live-stream once before.

        Twitch said it had shared a “hash” of the video with a group of tech companies including Microsoft and Facebook.

        A video hash is essentially a “fingerprint” of a video that helps platforms detect if the same footage has been uploaded on their service.

      • ABCSupermarket shooting: Accused shooter Payton Gendron livestreamed attack, authorities say

        “The social media platforms that profit from their existence need to be responsible for monitoring and having surveillance, knowing that they can be, in a sense, an accomplice to a crime like this. Perhaps not legally, but morally. They’ve created the platform for this hate to be spewed,” said Hochul.

        Hochul also said there is “a feeding frenzy on social media platforms, where hate festers more hate.”

      • MedforthFrance: Islamist imam sentenced to one year in prison for terrorist offences

        Bassam Ayachi, who is on trial for terrorist criminal organisation, is suspected of belonging to the Islamic nationalist group Ahrar Al-Sham and of ” plotting ” with Al-Nosra, an affiliate of Al-Qaeda. A video from 2015 shows him “entering Idlib like a warlord” and “giving orders” while “a banner of the Al-Nosra Front” can be seen in the background.

      • TruthOutPeople in US Don’t Support the Gaza Blockade. Why Won’t Congress Take Action?
      • Common DreamsOpinion | Can US Progressives Defeat Big Money and Trumpism?

        The authoritarian Right is rapidly cementing its institutional control of US politics. Last week’s leaked draft Supreme Court opinion overturning Roe v Wade is just the latest brick in the wall.

      • TruthOutWhite Supremacist Massacre in Buffalo Shows Alt-Right Ideology Leads to Murder
    • Transparency/Investigative Reporting

      • The Gray ZoneOperation Surprise: leaked emails expose secret intelligence coup to install Boris Johnson
      • CBSHow Bellingcat is using TikTok to investigate the war in Ukraine

        According to Bellingcat founder Eliot Higgins, information from the video sharing platform began amassing prior to Russia’s February invasion, when civilians posted TikTok videos of tanks driving down Russian streets. These videos not only showed the buildup before the invasion, Higgins said, but they also identified the specific units and equipment the Russian military planned to use. In instances where Bellingcat suspects Russians deployed cluster munitions into Ukraine from rocket launchers fired from inside Russia, Bellingcat says they can identify the units likely responsible.

        “In some cases, it’s actually possible to see these convoys through their entire journey from their base all the way to the border,” Higgins said. “So all these bits of information give us additional evidence that we can use for accountability purposes in the future.”

      • Foreign PolicyChinese TikTok Users Are in Love With ‘Daddy Putin’

        These videos, which paint a positive, misconstrued portrait of Putin, often rack up hundreds of thousands of likes and thousands of comments. Users feel he’s a sensitive leader who cares deeply for the Russian people.

        “Social media often represents the distorted reality of many users,” Iuliia Mendel, a former spokesperson for Ukrainian President Volodymyr Zelensky, told Foreign Policy. “All in all, we are talking about attempts to create a positive image of Putin using social networks.”

        Fans of Putin have taken to the platform to confess their “fervent love” for the Kremlin’s longest-serving leader since Joseph Stalin. Many users include heart or prayer emojis alongside “乌拉,” a transliteration of ura, the Russian word for “huzzah.” This Chinese word coincidentally shares the same first character as the Chinese word for Ukraine, “乌克兰.”

    • Finance

      • Capitalists are the real “consumers”

        Everywhere you pick up a book or a newspaper or watch a story, you’ll see the same word: consumer. It’s supposed to refer to us, ordinary people, who do the consuming, as opposed to the big important people who are presumably on the other side of the equation: producers, those people who own businesses and “provide jobs.”

        This language is crazy for a lot of reasons, not the least of which is that “consumer” is just a couple shades away from “useless eater,” which gives you a good idea of how close the dominant discourse already is to straight up fascist thinking. But more importantly for my purposes here, I’d just like to point out the very obvious fact that the dominant way of thinking and speaking about all this is precisely backward. Straightforwardly backward. Capitalist society is full of these ideological reversals.

    • AstroTurf/Lobbying/Politics

      • Common DreamsOpinion | Neofascist Minority Rule by the GOP Is Laying Waste to the United States

        Minority rule is killing America. This is most obvious in our Senate and Supreme Court, although it’s also hurt the credibility of the presidency and is damaging many of our states.

      • India TimesUkraine’s key IT sector booming despite Russian invasion

        When Russian bombing started, IT companies shut offices in the capital Kyiv and eastern city of Kharkiv and engineers found refuge in western Ukraine or Poland next door.

        Veselovskiy said there were already around 500 tech companies in Lviv before the war but now estimates that 80 percent of the sector is in the western city.

      • The EU Commission is planning automatic CSAM scanning of your private communication – or total surveillance in the name of child protection.

        This would be the worst surveillance mechanism ever established outside of China, and all in the pretext of protecting children.

        Cryptography professor Matthew Green said that the EU proposal “describes the most sophisticated mass surveillance machinery ever deployed outside of China and the USSR. Not an exaggeration.”

      • Site36Encrypted communication: UK remains member of EU interception group

        Notwithstanding its exit from the European Union, the British police will remain a member of a Standing Heads of Lawful Interception Units based at Europol. The UK is represented there by the National Crime Agency. This was confirmed by the EU Commissioner for Home Affairs, Ylva Johansson, in her answer to a parlamentary question by the pirate Patrick Breyer. The UK is thus the only third country in the group, which otherwise consists exclusively of EU members and the Schengen states Norway, Switzerland and Iceland.

        The working group of the departments on telecommunications surveillance had once been founded as a strategic „5G Expert Group“ on the initiative of the German Federal Criminal Police Office. It was supposed to give the authorities access to the new telephone standard, which was actually tap-proof. After this was successfully pushed through in the European and international standardisation bodies ETSI and 3GPP, the group was given a new name and new tasks in October 2021. It is now to ensure that the needs of law enforcement agencies are taken into account when amending surveillance laws at EU level and in the member states.

      • Common Dreams‘Still on Track to Win This Primary,’ Says John Fetterman After Stroke

        John Fetterman, the Democratic Lt. Governor of Pennsylvania who is also running for the open U.S. Senate seat in the state, announced Sunday afternoon that he suffered a stroke over the weekend but was already feeling better after the medical condition was treated at a local hospital.

        “Our campaign isn’t slowing down one bit, and we are still on track to win this primary on Tuesday, and flip this Senate seat in November.”

      • Misinformation/Disinformation

        • Common DreamsOpinion | Corporate Media Ignore Left Critiques of Government’s New ‘Disinformation’ Board

          Testifying in front of a House committee, Department of Homeland Security Secretary Alejandro Mayorkas recently announced DHS’s formation of a “Disinformation Governance Board.” The board’s stated mission would be to address “disinformation spread by foreign states such as Russia, China and Iran,” as well as “transnational criminal organizations and human-smuggling organizations.”

        • The EconomistRussia is swaying Twitter users outside the West to its side

          UKRAINE AND Russia are fighting mainly in eastern Ukraine, but they are courting allies around the globe. Ukraine needs other countries to abide by Western sanctions. That means winning hearts and minds in places like India and Turkey.

          To Western ears, Russia’s portrayal of Ukraine’s leaders as Nazis sounds absurd. But just as Ukraine’s military strength surprised the Kremlin, the effectiveness of Russian propaganda might also be underestimated. An analysis of recent Twitter posts suggests that Russia’s online information operations may be focused outside the West—and already bearing fruit.

    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • Christian Student in Sokoto, Nigeria Stoned to Death

        A Christian student stoned to death at a college in northwest Nigeria on Thursday (May 12) was falsely accused of blaspheming the prophet of Islam because she had refused to date a Muslim, sources said.

        Deborah Emmanuel Yakubu, a 200-level student at Shehu Shagari College of Education in Sokoto, the capital of Sokoto state, was beaten, stoned to death and her body set on fire, area residents said; a video showing the attack reportedly appeared on social media on Thursday (May 12). In the video, an unidentified man reportedly rages in the Hausa language that he killed Yakubu and set her body on fire.

      • ICCNigeria is World’s Scariest Country to be a Christian

        Open Doors cited a report by SBM Intelligence, a Nigeria-based research firm, for the reported killings in the West African country. The attacks are blamed on Islamist extremist groups such as Boko Haram and Islamic State in West Africa Province (ISWAP), militant Fulani herdsmen, bandits and violent gangs.

        Open Doors reported that there were increasing signs that these groups were working together and widening the impact of their violence. The organization alleged more Christians are killed for their faith in Nigeria than in the rest of the world combined.

      • Common Dreams‘It’s a Fight They’ll Get’: Defenders of Abortion Rights March Nationwide

        Marches and rallies took place in cities across the United States on Saturday as defenders of reproductive rights vowed to defend the country against a looming decision by the U.S. Supreme Court that would eviscerate protections enshrined in Roe v Wade for nearly half a century.

        Under the banner of “Bans Off Our Bodies,” the demonstrations took place in cities large and small but with a shared message.

      • TruthOutLouisiana Bill Classifying Abortion as Homicide Receives Backlash From the Right
    • Internet Policy/Net Neutrality

      • smolZINE – Issue 26
      • what could have been

        I dunno if the small net is quite the place to went, but it’s the only place I trust to not betray my privacy, so there goes.

      • “I ATEN’T DED”

        In the autumn I worked on rexmpp (an XMPP library) a bit more, made an
        Emacs interface, started using it as my primary XMPP client.

    • Monopolies

      • Patents

        • Japan: Problem of Japan’s patent linkage system comes to the surface by a set of IP High Court decisions [Ed: In a humane society, lives should always become before patents]

          The “patent linkage system” is in general a system wherein market approval of generic drugs is linked with the status of the originator drug’s patents, for the purpose of early resolution of patent disputes and ensuring the stable and consistent supply of generic drugs. Japan has not statutorily adopted the patent linkage system, but the system is said to have been adopted in the Ministry of Health, Labor and Welfare (MHLW)’s notification level, under which marketing approval shall not be granted for a generic drug while the originator’s patent covering the active ingredient is existing. Also, among indications and dose and administrations approved for the originator’s drug, those covered by the originator’s patents shall be carved out from the marketing approval for a generic drug. However, there are some problems in the Japanese system, and one of them is that the process of determination of whether or not a generic drug is covered by the originator’s patents is not open to the public. Further, in practice, when the originator’s patent is invalidated through an invalidation trial at the JPO, marketing approval is sometimes granted for the generic drug or the previously carved-out indications or dose and administrations, “without” waiting for the invalidity decision to become final.

        • Only Humans are Inventors Under the Patents Act, But For How Long? [Ed: Patent extremists want computer-generated patent applications to be allowed. Insane!]

          Artificial Intelligence Systems or Devices cannot be “inventors” under the Australian Patents Act, the Full Federal Court has confirmed. The inventor of a patent must be a natural person. Does there need to be legislative change to address the role of Artificial Intelligence in the Australian patents scheme?

          An expanded five judge appeal bench of the Full Federal Court has recently handed down its judgment confirming that artificial intelligence (AI) systems or devices cannot be an “inventor” under the Patents Act 1990 (Commissioner of Patents v Thaler [2022] FCAFC 62), reversing the decision of Justice Beach at first instance and bringing Australia into line with the position taken in other jurisdictions including the US, UK and Europe.

          In his patent application, Dr Thaler named an AI device that he created, DABUS, as the inventor. The central question for the Full Court was whether AI can be an “inventor” pursuant to the Patents Act and the Patents Regulations 1991 (the Regulations). The Full Court held that the application filed by Dr Thaler did not comply with reg 3.2C(2)(aa) because it failed to identify a natural person as the inventor. The Full Court also held that section 15 of the Patents Act, which provides for circumstances where a person draws entitlement to the grant of a patent from an inventor, requires the inventor to be a natural person. It came to this view having regard to the statutory language, structure and history of the Patents Act and the policy objectives underlying the legislative scheme.

        • Mathys & Squire hires new partner from HGF [Ed: Typical marketing spam from Amy Sandys; when she does not disseminate disinformation she wants us to think one low-level worker changing job is actually important news.]
        • MondaqFederal Circuit Reverses PTAB Decision In Amgen Biosimilar-Related IPR Appeal [Ed: Patent maximalists like to cherry-pick cases where "obvious" (invalid) patents are upheld later; they try to 'scandalise' PTAB, still]

          On April 14, 2022, the U.S. Court of Appeals for the Federal Circuit reversed the PTAB’s determination in IPR2016-01542 that claims of Amgen’s U.S. Patent No. 8,952,138 are obvious. The ’138 patent claims are directed to methods of refolding proteins by “contacting the protein with a refolding buffer comprising a redox component comprising a final thiol-pair ratio” of a specified range and a certain redox buffer strength to form a refold mixture. Amgen appealed the Board’s construction of “final thiol-pair ratio” and its obviousness determination based on the construction. Amgen argued that the plain language makes clear that the “redox component is a distinct volume from the refold buffer, and it is that redox component that comprised the claimed ‘final thiol-pair ratio.’” The Federal Circuit agreed with Amgen, and found the PTAB’s construction “inconsistent with the plain language of claim 1 and the specification.” Under the correct construction, the Federal Circuit found that claims 1-24 of the ’138 patent were not obvious over the prior art and reversed the PTAB’s decision.

        • FOSS Patents: Ericsson insists on proving Apple’s infringement of three 5G standard-essential patents Apple itself once elected to challenge in Eastern District of Texas

          Ericsson means business and just isn’t going to be outmaneuvered by Apple. In a move that demonstrates the company’s confidence in its 5G patents, Ericsson is opposing a motion by Apple to stay a second case in the Eastern District of Texas. The first case is about the parties’ dueling FRAND claims and will proceed to trial in December. The second one is the part of Apple’s countersuit that did not get consolidated into Ericsson’s case. The remaining claims in that case stem from Apple’s declaratory-judgment attack on three of Ericsson’s 5G patents. Apple’s DJ initiative left Ericsson with no other reasonable choice but to counterclaim that those patents (which Apple handpicked because it presumably thought it could easily prove them not to be standard-essential) are valid and indeed infringed by Apple’s 5G products.

      • Copyrights

        • Torrent FreakPirate Bay’s Crypto ‘Token’ is Barely Alive After Just One Year

          One year ago, The Pirate Bay released its very own ‘crypto’ token out of the blue. There was no official whitepaper for this soft launch, but the torrent site envisioned the ‘coin’ being used to access VIP content or donate to uploaders. Thus far, nothing has come of it. People don’t seem interested in the ‘project’ and the price continues to drop.


Links 15/05/2022: GNU libiconv 1.17

Posted in News Roundup at 4:15 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Make Use Of6 Practical and Real-World Applications of Linux

      Everyone knows that Linux powers millions of servers and desktops worldwide. But are there any other applications of this open-source OS?

      If you use Linux on your desktop, you might have wondered if the operating system you’re messing around with has any practical uses. Fortunately, there are plenty of real-world applications of Linux today. Here are some of them.

    • Linux Made SimpleLinux Weekly Roundup #182

      Welcome to this week’s Linux weekly roundup. We had another full week in the world of Linux releases with Fedora 36, Bluestar Linux 5.17.7, ALT Linux 10.0, and LXLE Focal beta.

      I hope you have a wonderful week and enjoy every moment!

    • Desktop/Laptop

      • XDAChromebooks are the perfect place to teach yourself about Linux

        The best Chromebooks you can get today have come a long way from the early days. No longer is Chrome OS just a fancy browser running on a laptop. It has grown to incorporate Android and Linux and the platform is now a lot more capable than you might have thought.

        The second of those is particularly important. I’m not about to preach about how everyone should immediately switch to Linux. Or that 2022 is the year of the Linux desktop. Or anything like that. However, it is in the limelight right now with the immensely popular Steam Deck on the shelves.

        Why am I talking about learning Linux? Well for one, it’s never too late or a bad idea to learn something new. Linux isn’t just some other desktop operating system you don’t currently care about. It has plenty of applications out in the big wide world. All those cloud servers? Running Linux. On a smaller scale, the Raspberry Pi is a tiny, extremely flexible Linux computer you can use to do many wonderful things. A Chromebook is a great place to play around with Linux in relative safety.

    • Server

      • The Register UKOpenVMS 9.2 hits production status for x86-64 • The Register

        VMS Software Inc. has announced the release of OpenVMS 9.2, the first production-supported release for commercial off-the-shelf x86 hardware.

        The expectation is that customers will deploy the new OS [PDF] into VMs. Most recent hypervisors are supported, including VMware (Workstation 15+, Fusion 11+ and ESXi 6.7+), KVM (tested on CentOS 7.9, openSUSE Leap 15.3, and Ubuntu 18.04), and Oracle VirtualBox 6.1.

    • Audiocasts/Shows

    • Kernel Space

    • Applications

    • Instructionals/Technical

      • Linux Cloud VPSHow to Install Code-Server IDE platform on Ubuntu 20.04 | LinuxCloudVPS Blog

        In this tutorial, we are going to install the code-server IDE platform on Ubuntu 20.04 OS.

        Code-Server IDE is a development platform running remotely on a server that can be accessed via a web browser. The main purpose of this code IDE platform is to be accessible from everywhere for better collaboration between developers. It is an open-source project integrated with Git support that allows developers to run Visual Studio Code.

        Installing the code-server IDE platform on Ubuntu 20.04 is a very easy and straightforward process that can take up to 20 minutes. Let’s get started!

      • Linux Host SupportHow to Install Varnish 7 on AlmaLinux | LinuxHostSupport

        Varnish is a free, and open-source web application accelerator used for caching website content in memory. It is designed for HTTP to speed up caching of heavy dynamic websites. It is capable of speeding up your website page loading time by a factor of 10x to 300x. This will helps you with your Search Engine Results Page and also improve the user experience on your website.

        In this post, we will show you how to install Varnish 7 on AlmaLinux.

      • [Old] Sailfish OS Tips & Tricks
      • ID RootHow To Install HPLIP on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install HPLIP on Ubuntu 22.04 LTS, as well as some extra required packages by HPLIP

      • Linux HintBash Check If String Is Empty

        While coding in any programming language, we use many variables of different types. One well-known and most used variable type is the “string”. The string is a group of characters and special symbols including space in programming. While working in Linux provides us the opportunity to utilize string variables in our code. Today, we will demonstrate some of the examples to check whether a string variable is empty or not using some of the most well-known Bash options.

        So, let’s get started now. Let’s start with the Bash file creation, as all of our work will be done within the Bash file. So, use the “touch” instruction of Ubuntu to create a Bash file named “empty” with the “sh” extension. The GNU Nano editor can be utilized to open this newly created Bash file.

      • Linux Hint3 Methods to Install MPV Media Player on Ubuntu 22.04 and Linux Mint 20

        The media players are used to play the videos of different formats and the MPV media player is one of the command line media players which is free to download as well as supports many formats of video, audio, and subtitles type.

        Since MPV is a command-line-based media player, it does not contain the GUI but a small menu bar that contains all the options to control the media file.

        The MPV media player can be installed on different operating systems like Windows, macOS, and the Linux distributions, but in this write-up, we specifically discussed the installation methods of the MPV media player on the Ubuntu 22.04 and Linux Mint 20.

      • PSA: Potential libstdc++ hang in std::filesystem::symlink_status

        Something I caught while running TLGS’s crawler. Due to how drogon works. It needs to always successfully open a new socket on TCP connection. Otherwise the entire process is killed. But Gemini does not support multiple requests on the same connection. So it’s easy to endup with a lot of open sockets (though most are waiting to be closed). My hack to solve this conflict is to periodically walk `/proc/self/` and check how many sockets are open. And rest if there’re too many.

      • The New StackScan Container Images for Vulnerabilities with Grype – The New Stack

        Grype, an open source package managed by security company Anchore, is a vulnerability scanner for both images and filesystems.

      • LinuxiacHow to Install Nginx, MariaDB, and PHP (LEMP) on Ubuntu 22.04 LTS

        This guide shows you step-by-step the installation process of the LEMP stack, Nginx, MariaDB, and PHP, in Ubuntu 22.04 LTS.

      • Linux HintHow to Install TeamViewer on Ubuntu 22.04

        A TeamViewer is the application by which we can access the other computer remotely and can perform various tasks on it. We can also share the files among both machines as well as the screen of the device.

        The TeamViewer can be installed on different operating systems including Windows, but in this write-up, we will focus on the installation of the TeamViewer on Ubuntu 22.04.

      • Fixing Houdini startup error on Linux – Darryl Dias

        After installing Houdini you may come across this error. This error appears in the Terminal, if you open it from the application launcher you maybe be getting this error but it does not show in any way.

    • Games

      • Linux HintBest PlayStation 2 (PS2) Emulators for Android in 2022

        The Google Play Store is packed with interesting games, but most of them pale in comparison with the best PlayStation 2 titles, such as Silent Hill 2, Ico, Shadow of the Colossus, the Ratchet and Clank series, Final Fantasy X, Kingdom Hearts 1 & 2, Wild Arms, or Persona 4, just to give some examples.

        These and many other games are still fun to play, even though it’s been more than two decades since Sony released the PlayStation 2 console to great success. You can play them even if you don’t own the console or any of its successors’ thanks to PlayStation 2 emulators for Android.

      • Linux HintBest Roblox Anime Games

        Roblox is a unique gaming platform with a library that has millions of games created by a community of millions of developers, allowing endless hours of gameplay. If you are a fan of anime and looking for games that resemble them then we have mentioned some of the top anime games in this article.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KlipperScreen: All You Need to Know [Ed: Not about KDE per se. This could be a trademark problem because of KDE. Klipper started in the 1990s.]

          KlipperScreen is a program that runs on Klipper firmware and provides a GUI to control your printer. Read on to learn more about it!

  • Distributions and Operating Systems

    • Top 10 Best Linux Distributions in 2022 For Everyone

      A list of best Linux Distributions in 2022 for every user – students, creators, developers and casual users with guidance to pick one.

    • Barry Kaulereasy.sfs recompress with LZ4_HC

      Thanks to forum member rufwoof, who got me thinking about this. File ‘easy.sfs’ has the entire EasyOS filesystem — we don’t split up into smaller SFS files as is done in Puppy. Except, still have the separate ‘devx’ SFS.

      To keep the download file small, easy.sfs is xz-compressed. This is the smallest file-size; however, decompression when in use is also slower than other compression methods. With a fast CPU, you probably won’t notice it, but with a somewhat older CPU there may be noticeable sluggishness, perhaps in app startup.

    • Fedora Family / IBM

    • Debian Family

      • Overpaid lawyer & Debian miss WIPO deadline

        Debian gangsters promise to continue their vendetta despite missing WIPO’s deadline.

        We have all seen those horrendously long discussion threads that take place in Debian from time to time. We wonder if the Debian trademark team, Brian Gupta and Taowa Munene-Tardif (Rosetwig) have involved the lawyer in one of those endless threads. The lawyer’s phone may well be chiming with the sound of a cash register each time a new Debian email comes in.

        Nonetheless, apart from the budget blowout, the other problem with these endless email discussions from indecisive volunteers is that it is impossible to meet deadlines.

    • Open Hardware/Modding

      • Linux Hint5 Easy Ways to Connect Raspberry Pi Remotely

        To connect Raspberry Pi remotely means that we can access the Raspberry Pi using some other computer and can perform different tasks on the Raspberry Pi.

        The Raspberry Pi can be connected to the display screen by using the mini HDMI port but it can also connect to the desktop remotely by using different approaches which are being discussed in this article.

      • Linux Hint3 Methods to Play Spotify on Raspberry Pi

        Spotify is an application that is used to stream millions of music tracks from all around the world on mobile phones, tablets, and desktops. The users of Spotify not only listen to their favorite music but also can make the albums of favorites to store their favorite collection. These albums can be shared with their friends as well as they can also access the albums or songs collections of their favorite people.

      • Linux HintBest Raspberry Pi for Gaming

        Raspberry Pi is a highly effective device that can be used for various purposes. The major advantage of this device is that it can be an ideal option to play large varieties of games, including Final Fantasy, Dragon Ball Z, Minecraft and so on. However, playing these games on Raspberry Pi will require an emulator and device performance that can handle these emulators providing you with a smooth and fast gaming environment.

      • Linux HintBest RetroPie Controllers in 2022

        The RetroPie is an operating system that enables your Raspberry Pi to be a retro-gaming machine so you can play retro games on the Raspberry Pi including the arcade and classic PC games.

      • Linux HintArduino Uno Pinout Guide

        For beginner and advanced level projects the Arduino provides a platform for the user that gives the assistance regarding programing the microcontroller as well as also helps in creating the hardware for the projects

        This platform provides a variety of the microcontroller boards also known as Arduino boards having different specifications. So before using any Arduino board one must know the specification of the boards and most importantly the pins of the boards and their usability. So, we have explained the pinouts of the Arduino Uno board l and the use of each pin in detail.

      • ArduinoMotorize a manual wheelchair with this adaptable electronic system | Arduino Blog

        Motorized wheelchairs can be very expensive, and for those who are unable to afford them, getting around the house can become a challenge. This is what inspired Wesley Gardner from element14 Presents to design a series of wheelchair modifications that can improve a person’s mobility.

        Gardner began by coming up with a few parts in CAD for the battery mount, an electronics enclosure, and a whole host of clamps for attaching steel tubing to the chair. Next, he added a pair of crossmembers below the wheelchair to secure the 12V lead-acid battery in place. Three more tubes were attached vertically to the back as a way to hold the stepper motors against the wheels which rotate them via friction.

      • CNX SoftwareTrying out Edge Impulse machine learning platform on XIAO BLE Sense board – CNX Software

        I had seen the Edge Impulse development platform for machine learning on edge devices being used by several boards, but I hadn’t had an opportunity to try it out so far. So when Seeed Studio asked me whether I’d be interested to test the nRF52840-powered XIAO BLE Sense board, I thought it might be a good idea to review it with Edge Impulse as I had seen a motion/gesture recognition demo on the board.

        It was quite a challenge as it took me four months to complete the review from the time Seeed Studio first contacted me, mostly due to poor communications from DHL causing the first boards to go to customs’ heaven, then wasting time with some of the worse instructions I had seen in a long time (now fixed), and other reviews getting in the way. But I finally managed to get it working (sort of), so let’s have a look.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Linux LinksBest Free and Open Source Alternatives to Apple FileMaker

      In 2020, Apple began the Apple silicon transition, using self-designed, 64-bit ARM-based Apple M1 processors on new Mac computers. Maybe it’s the perfect time to move away from the proprietary world of Apple, and embrace the open source Linux scene.

      FileMaker is a cross-platform relational database application from Claris International, a subsidiary of Apple.

      A relational database matches data using common characteristics found within the data set. The resulting groups of data are organized and are much easier for people to understand.

    • Leftovers

      • Senses


        I’d say that the traditional five senses are more like classes of things than distinct things. Simplifying and lumping together is one of those tools a lot of people use to grok a really complicated universe. I wouldn’t call the five senses a myth, but I’d say that confusing it with reality is confusing the map with the territory.

      • Hardware

        • The Register UKTSMC, Samsung plan price hikes for chip designers – reports

          Just as costs for some components have started to come down, TSMC and Samsung, the two largest contract chip manufacturers in the world, are reportedly planning to increase prices of production, which may affect Nvidia, AMD, Apple, and others that rely on the foundries.

          Reports emerged earlier this week stating that Taiwan-based TSMC is planning price hikes in the single-digit percentages for legacy and advanced chip manufacturing technologies next year. Citing industry sources, Nikkei reported that the price hike will be around five to eight percent.

        • The Register UKCisco warns of premature DIMM failures
        • The Register UKGermany makes new move to attract chip manufacturers

          Germany’s government is looking to attract chipmakers to the country by offering €14 billion ($14.7 billion) in financial support, apparently spurred on by global semiconductor supply chain problems.

          The move follows the European Chips Act from the European Commission and Intel’s decision earlier this year to build a new fabrication plant in Germany.

        • The Register UKRansomware hits global farm machinery giant AGCO • The Register [Ed: Likely Windows TCO]

          According to the FBI, the three top variants of ransomware that were deployed against critical infrastructure companies last year were Conti, LockBit and REvil/Sodinokibi.

        • The Register UKTablet PC sales decline as consumers consider inflation

          Shipments from nearly all of the major tablet manufacturers are declining as consumers and educators find other things to do with their money.

          Distribution data collated by tech analyst Canalys shows 38.59 million units were sent into retail and business channels in calendar Q1, down 3 percent year-on-year, albeit against a tough comparison period when sales in the same period of 2021 went through the roof.

        • The Register UKEuropean tech businesses cool on China due to coronavirus lockdowns

          Supply chain issues and other disruptions in China caused by strict COVID-19 lockdown measures have seen 23 percent of European businesses operating in the Middle Kingdom consider moving elsewhere, according to a recent report.

          The report, from the European Chamber of Commerce in China and released on Thursday, said the number of European businesses considering leaving nearly doubled since the onset of 2022, a mere five months ago.

        • China’s COVID-19 policy and Russia’s war in Ukraine cause severe disruptions to European business in China
        • The Register UKInfineon more than doubles profit as semiconductor shortages persist

          Infineon joined the ranks of chipmakers that are benefiting from the industry-wide global semiconductor shortages, more than doubling profits in a sector where lead times are severely protracted.

          Formerly Siemens Semiconductor, the German-based company reported revenue of €3.298 billion ($3.48 billion), up 22 percent year-on-year for Q2 of fiscal 2022 ended March 31 [PDF]. Profit bounced 131 percent to €469 million ($494 million).

      • Proprietary

      • Pseudo-Open Source

      • Security

        • The Register UKFive Eyes turn spotlight on MSPs: Potential weak links in IT supply-chain security [Ed: Microsoft resellers a threat to national security]

          Case in point: the SolarWinds attack in 2020, when Kremlin-backed miscreants slipped malware into SolarWinds’ Orion software, which was then pushed to some 18,000 SolarWinds’ customers. This allowed the criminals to infiltrate nearly 100 US government and private-sector networks.

        • The Register UKFalse-flag cyberattacks a red line for nation-states, says Mandiant boss [Ed: Microsoft Windows TCO]

          “When you get a White House podium statement that X did Y, like we did with with everything from Sony Pictures to NotPetya, that’s 100 percent” confidence in the attribution, Joyce said.

          In 2014, the FBI attributed the Sony Pictures cyberattack to North Korea, and US law enforcement blamed the 2017 NotPetya attacks on the Russian military.

        • The Register UKColonial Pipeline faces nearly $1m fine one year after ransomware attack [Ed: Microsoft Windows ransomware; they have left out important details]

          Colonial Pipeline is facing an almost $1 million fine for control room management failures after the US Department of Transportation alleged they contributed to the nation’s fuel disruption in the wake of the 2021 ransomware attack.

        • The Register UKRansomware the final nail in coffin for small university [Ed: Likely Microsoft Windows]
        • The Register UKAnatomy of a campaign to inject JavaScript into compromised WordPress sites [Ed: These need to be compromised in the first place; unlike Windows, WordPress does not have NSA back doors]

          A years-long campaign by miscreants to insert malicious JavaScript into vulnerable WordPress sites, so that visitors are redirected to scam websites, has been documented by reverse-engineers.

        • The Register UKMost organizations hit by ransomware would pay up if hit again [Ed: Usage of Microsoft Windows is extremely expensive]

          Kaspersky claims that in 88 percent of organizations that have had to deal with a ransomware incident, business leaders said they would choose to pay the money if faced with another attack. In contrast, among those that have not so far suffered a ransomware attack, only 67 percent would be willing to pay, and they would be less inclined to do so immediately.

        • The Register UKIf you’ve got Intel inside, you probably need to get these security patches inside, too

          Intel has disclosed high-severity bugs in its firmware that’s used in datacenter servers, workstations, mobile devices, storage products, and other gear. These flaws can be exploited to escalate privileges, leak information, or stop things from working.

        • The Register UK ⚓ https://www.nasdaq.com/articles/how-to-lock-and-protect-away-secret-files-with-gnu-privacy-guard ䷉ Source: nasdaq

          Pangolin8RAT is modular malware that emerged in 2019 and is regularly updated. It is believed to be the successor of the PlugX and ShadowPad malware families, and has been used to target industries beyond gambling – transportation, telecom and governments have all been attacked.


          TeamT5 also found threat actors collect and store victim credentials, software source code and business info for future use.

        • The Register UKAnother ex-eBay exec pleads guilty to cyberstalking critics • The Register
        • The Register UKIran-linked Cobalt Mirage extracts money, info from US orgs – report [Ed: Microsoft Windows TCO]

          In the financially-motivated “cluster” of attacks, the group is using BitLocker and DiskCryptor to hold victims’ documents to ransom.

        • The Register UKResearchers find 134 flaws in the way Word, PDFs, handle scripts

          Security researchers have devised a tool that detects flaws in the way apps like Microsoft Word and Adobe Acrobat process JavaScript, and it’s proven so effective they’ve found 134 bugs – 59 of them considered worthy of a fix by vendors, 33 assigned a CVE number, and 17 producing bug bounty payments totaling $22,000.

        • The Register UK[Older] Critical vulnerabilities found in ‘millions of Aruba and Avaya switches’
        • The Register UKCommunication around Heroku security incident dubbed ‘train wreck’

          Efforts by Salesforce-owned cloud platform Heroku to manage a recent security incident are turning into a bit of a disaster, according to some users.

          Heroku has run security incident notifications for 18 days and appears to have upset several of its customers due to a perceived lack of openness and communication.

        • Heroku resetting passwords for “a portion” of their users immediately

          Just received this email from Heroku. Given the timeline it seems like the breach is pretty serious.

        • The Register UKIt costs just $7 to rent DCRat to backdoor your network [Ed: Microsoft Windows TCO]

          The backdoor Windows malware, dubbed DCRat or DarkCrystal RAT, was released in 2018, then redesigned and relaunched the following year. An individual who goes by the handles boldenis44, crystalcoder, and Кодер (Coder) developed the RAT, we’re told, and works to improve it on a daily basis.

        • The Register UKIndustry pushes back against India’s data security breach reporting requirements

          Opposition is building to India’s recently introduced rules on reporting computer security breaches, which have come under fire for being impractical, ineffective, and impinging on privacy.

          The rules were introduced without fanfare in late April by CERT-In, the nation’s government-run computer emergency response team that has responsibility for incident management and wider infosec guidance.


          India’s Internet Freedom Foundation has offered an extensive criticism of the regulations, arguing that they were formulated and announced without consultation, lack a data breach reporting mechanism that would benefit end-users, and include data localization requirements that could prevent some cross-border data flows.

          The foundation also points out that the privacy implications of the rules – especially five-year retention of personal information – is a very significant requirement at a time when India’s Draft Data Protection Bill has proven so controversial it has failed to reach a vote in Parliament, and debate about digital privacy in India is ongoing and fierce.

        • The Register UKBiden signs cybercrime tracking bill into law [Ed: How about a more constructive approach like banning Windows and other back-doored software?]

          US President Joe Biden has signed into law a bill that aims to improve how the federal government tracks and prosecutes cybercrime.

        • The Register UKF5, Cisco admins: Stop what you’re doing and check if you need to install these patches

          F5 Networks and Cisco this week issued warnings about serious, and in some cases critical, security vulnerabilities in their products.

          F5 officials said Thursday its most serious issue, a critical flaw in its iControl REST framework with a severity score of 9.8 out of 10, could be exploited to bypass the authentication software, used by its BIG-IP portfolio, and hijack equipment. Specifically, the vulnerability, tracked as CVE-2022-1388, can be abused by miscreants to, among other things, run malicious commands on BIG-IP devices via their management ports unimpeded.

      • Defence/Aggression

      • Environment

        • Energy

          • The Register UKDon’t hate on cryptomining, hate the power stations, say Bitcoin super-fans

            Big names in Bitcoin have defended cryptocurrency mining, issuing a jointly signed letter hitting back at US lawmakers who last month urged a government watchdog to probe the practice.

            Twitter founder and Bitcoin champion Jack Dorsey, the CEO of Bitcoin-collecting MicroStrategy Michael Saylor, and others on Monday signed the letter [PDF] that is a point-by-point rebuttal to a memo [PDF] sent last month to America’s Environmental Protection Agency (EPA) by Representative Jared Huffman (D-CA) and a couple dozen other Democrats.

          • The Register UKDemand for GPUs used to mine crypto ‘disappearing’, says ASUSTeK

            Taiwanese hardware giant ASUSTeK says demand for GPU used to mine cryptocurrency is “disappearing” – and so is about ten percent of demand for personal computers.

            Speaking on the company’s Q1 earnings call, co-CEO S.Y. Hsu said the fall in demand for GPUs was caused by the crypto industry responding to critics of its energy consumption. They’re moving away from proof of work to proof of space – verifiable creation of data occupying space in a storage medium – as the means of mining tokens.

          • The Register UKCoinbase CEO says everything’s OK after SEC filing gives netizens the jitters [Ed: Beginning of the end of fakecoins?]

            Coinbase CEO Brian Armstrong has scrambled to alleviate fears that customers storing cryptocurrencies at the digital cash exchange will lose everything if the biz goes under.

            This concern stemmed from Coinbase’s quarterly 10-Q report [PDF] filed this month to the SEC. It disclosed that customers who kept their cryptocurrencies at the exchange could see their assets seized in the event the business went bankrupt, thus:

          • The Register UKUS Treasury sanctions cryptocurrency mixer Blender • The Register

            The US Treasury has sanctioned cryptocurrency mixer Blender for its role in helping North Korea’s Lazarus Group launder stolen digital assets.

            As a result, among other limitations, anyone in the United States or a US person can no longer do any business with Blender without special permission from the government.

            This marks the Feds’ first-ever sanctions against a crypto mixer, which cybercriminals can use to cover their tracks. As the name might suggest, cryptocurrency mixing, or tumbling, can obscure the source of some digital money. The laundered coins cannot be traced back to, say, a wallet robbed of its contents, allowing crooks to spend their ill-gotten gains without being linked to their crimes.

            Such services have legitimate privacy uses, though Uncle Sam isn’t happy that it can be used to make life easy for criminals, and so it’s cracking down on the practice.

      • Finance

        • The Register UKSoftBank to stop investing ‘randomly’ after losing billions of dollars

          SoftBank lost a lot of money over the past 12 months.

          The Japanese giant’s founder and CEO Masayoshi Son today told analysts on a conference call marking the end of its fiscal 2022 year that the SoftBank group as a whole lost $13.15 billion. Its two Vision Funds, which account for 50 percent of SoftBank’s net asset value, alone lost $27.4 billion between them. If your technology stock or cryptocurrency portfolio has taken a dive lately in these bumpy economic times, perhaps you can manage a wry grin here.

        • The Register UKSEC adds Tencent, JD.com, China Mobile to group facing potential delisting [Ed: Companies that do not need to fake their market value?]

          More Chinese tech companies including Tencent, JD.com, and China Mobile face delisting by the US Securities and Exchange Commission (SEC) thanks to opaque disclosures.

          Tencent-affiliated gaming outfits Huya and Douyu, internet datacenter services provider Vnet Group, and online game services provider NetEase were among more than 80 fresh additions to a provisional list of companies on May 4.

      • Censorship/Free Speech

        • The Register UKAppeals court unleashes Texas’s anti-content-moderation law • The Register

          On Wednesday, the US Fifth Circuit Court of Appeals decided to undo a preliminary injunction that for the past few months has been blocking Texas’s law prohibiting online content moderation while that legislation is being challenged.

          Two judges of a three judge panel – all Republican appointees – granted Texas’s motion to stay the preliminary injunction, granted last December, that suspended HB 20 amid the dispute over its constitutionality.

        • The Register UKChina wants its youngsters to stop paying streamers • The Register

          China’s internet regulator, the Cyberspace Administration of China (CAC), has published guidelines that aim to stop minors from giving tips or other forms of payment to livestreamers, watching after 10pm, or livestreaming themselves.

          “Website platforms must not develop functional applications that attract minors to tip or induce minors to give ‘gifts.’ If it is found that the website platform violates the aforementioned requirements, measures such as suspending the tipping function and shutting down the live broadcast business will be implemented,” said the recently published Opinions on Regulating Online Live Rewards and Strengthening the Protection of Minors (in Chinese).

      • Internet Policy/Net Neutrality

        • The Register UKCable giants, ISPs, telcos end legal fight against California’s net neutrality law

          California Attorney General Rob Bonta on Wednesday welcomed the decision by a group of telecom and cable industry associations to abandon their legal challenge of the US state’s net neutrality law SB822.

          “My office has fought for years to ensure that internet service providers can’t interfere with or limit what Californians do online,” said Bonta in a statement. “Now the case is finally over.

        • Attorney General Bonta: California’s Net Neutrality Law Is Here to Stay | State of California – Department of Justice – Office of the Attorney General

          OAKLAND – California Attorney General Rob Bonta today issued the following statement on a decision by associations representing major internet service providers to dismiss their lawsuit challenging California’s net neutrality law. Senate Bill 822 protects Californians from blocking, throttling, harmful forms of zero-rating, and other anti-competitive practices that harm

        • The Register UKFTC says Frontier lied about its internet speeds amid $8.5m settlement

          The FTC has settled a case in which Frontier Communications was accused of charging high prices for under-delivered internet connectivity.

          The US telecommunications giant has promised to be clearer with subscribers on connection speeds, and will cough up more than $8.5 million, or less than a day in annual profit, to end the matter.

          Frontier used to primarily pipe broadband over phone lines to people in rural areas, expanded to cities, and today supplies the usual fare to homes and businesses: fiber internet, TV, and phone services.

        • Loopy links

          One thing I found by looking at where my #hashtag crawler went was that some people have a bottomless pit of links.

          The first one I saw was someone exposing a repository of the site content. That included a link to the content itself. Not a link to the actual site, but to the copy of it in the repo. That had a repo link, where you could find a site link, and so on. I spotted this when it got to several levels of site/repo/site/repo/site/repo and told the crawler to give up. I’m mildy curious how deep that could go. I suppose it’s limited by the maximum length of a gemini request (assuming that either the server or the client respected that limit).


          to give up on those too.

          Having read Sean Connor’s experiences with the crawlers that won’t give up on an infinite redirect loop, I think that some crawlers are probably probing the limits of those two capsules.

        • Re: The Disappearence of Sincere Conversations

          I’ve had similar thoughts, I mean, the immediate of ‘social’ media, designed for engagement has a lot of problems.


          I don’t know, I was born in the 80′s so I can’t talk about what happened before, rather than what older friends and parents told us.
          That said, the lifestyle is always being broken by innovations, cheapest ways. I think travelling abroad was ‘impossible’ for a middle-class citizen 50 years ago, now it’s kind of common. Talking in English with random people from the world was kind of unthinkable. Now you are doing it.

          When things become easier, they are less appreciated, I have seen.
          And then they come the greedy technological companies, fighting against the opposite. ‘Everything has to be for profit’, ‘Everything has to be open and free’. I don’t want to take a side, both parts have something I like. And I think being in the middle is kind of healthy.

      • Digital Restrictions (DRM)

      • Monopolies

        • The Register UKTesla sues former engineer, claims he stole Dojo supercomputer trade secrets

          Tesla has started legal action against a former employee the company alleges was copying confidential data from its Project Dojo supercomputer onto his own systems outside the company. It further alleges he tried to conceal his actions by submitting a substitute laptop for inspection by the carmaker’s information security team.

        • Patents

        • Software Patents

          • $4,000 for CPC Patent Technologies ’208 & ’705 prior art

            On May 9, 2022, Unified Patents added two separate PATROLL contests with an opportunity to collect up to $4,000 in cash for prior art on at least claim 10 of U.S. Patent 9,269,208 and at least claim 1 of U.S. Patent 9,665,705. The patents are owned by CPC Patent Technologies Pty., Ltd., an NPE and Charter Pacific Corp. entity. The ’208 and ‘705 patents generally relate to systems using wireless transmission of security code information. They have both been asserted against Apple.

          • $2,000 for CPC Patent Technologies ’039 prior art

            On May 9, 2022, Unified Patents added a new PATROLL contest, with a $2,000 cash prize, seeking prior art on at least claim 13 of U.S. Patent 8,620,039, owned by CPC Patent Technologies Pty., Ltd., an NPE and Charter Pacific Corp. entity. The ’039 patent is generally related to a biometric security card device. It has been asserted against Apple.

        • Trademarks

    Links 15/05/2022: More Azure Shutdowns and Windows Security Blunders Aplenty

    Posted in News Roundup at 6:17 am by Dr. Roy Schestowitz

    • GNU/Linux

      • Desktop/Laptop

      • Server

        • The Register UKRackspace considers selling part of business: ‘Everything’ on the table [Ed: Pentagon-connected companies that steal money from the taxpayers (de facto bailouts) are harming everybody else]

          Rackspace Technology is considering selling off at least part of its business following a strategic review, with CEO Kevin Jones admitting that “everything is on the table.”

          The company disclosed it has already received interest from a potential buyer.

          The move was announced during a conference call covering Rackspace’s Q1 2022 earnings, where Jones claimed that Rackspace is well positioned as a pure play multi-cloud services company.

      • Graphics Stack

        • OS NewsNVIDIA transitioning to official, open-source Linux GPU kernel driver – OSnews

          NVIDIA is open sourcing all of its kernel driver modules, for both enterprise stuff and desktop hardware, under both the GPL and MIT license, it will available on Github, and NVIDIA welcomes community contributions where they make sense. This isn’t just throwing the open source community a random bone – this looks and feels like the real deal. They’re even aiming to have their open source driver mainlined into the Linux kernel once API/ABI has stabalised.

          This is a massive win for the open source community, and I am incredibly excited about what this will mean for the future of the Linux desktop.

        • Bleeping ComputerNVIDIA has open-sourced its Linux GPU kernel drivers

          NVIDIA has published the source code of its Linux kernel modules for the R515 driver, allowing developers to provide greater integration, stability, and security for Linux distributions.

          The source code has been published to NVIDIA’s GitHub repository under a dual licensing model that combines the GPL and MIT licenses, making the modules legally re-distributable.

          The products supported by these drivers include all models built on the Turing and Ampere architecture, released after 2018, including the GeForce 30 and GeForce 20 series, the GTX 1650 and 1660, and data center-grade A series, Tesla, and Quadro RTX.

          According to the GPU maker, this is a step toward improving its products’ experience on the Linux platform, simplifying the integration process in Linux distributions, debugging, and boosting contribution activity.

      • Instructionals/Technical

        • H2S MediaHow to install R-base Ubuntu 22.04 LTS Jammy – Linux Shout

          Learn the commands to install R- Base on Ubuntu 22.04 LTS Linux Jammy JellyFish, a free programming language for statistical calculations and graphics using the terminal.

          Unlike Python, for example, which also enjoys a high degree of distribution in the field of data science, R is a language specially developed for statistical applications. Its core functions are the statistical evaluation and visualization of data.

        • H2S MediaHow to Install FileZilla FTP Client on Ubuntu 22.04 LTS Jammy

          Start transferring your data over FTP (file transfer protocol) by installing the FileZilla client on Ubuntu 22.04 LTS Jammy JellyFish Linux using the command terminal.

          FileZilla FTP client is free software available for all popular OS such as Windows, macOS, and Linux. Users can use it to copy files and folders via the Internet or local network from one PC to another computer. The FTP client is easy to handle and offers user interactive GUI with numerous special functions such as the continuation of interrupted transfers or the support of various transfer protocols such as FTP, SFTP, or FTPS.

        • NasdaqHow To Lock And Protect Away Secret Files With GNU Privacy Guard

          Users can take advantage of the cryptographic protection offered by GPG to secure files and data that they want to keep well under wraps.

          In this guide, I will explain the options at your disposal for encrypting files using open-source software on a Linux, Mac, or Windows computer. You can then transport this digital information across distance and time, to yourself or others.

        • Cron Jobs: A Comprehensive Guide – SitePoint

          Learn what cron is and how to use it. This guide covers the basics of cron jobs, as well as some more advanced features.

        • Install Zabbix Agent on Ubuntu 22.04/Debian 11 – kifarunix.com

          In this tutorial, you will learn how to easily install Zabbix agent on Ubuntu 22.04/Debian 11.

        • Install LightDM Display Manager on Ubuntu Linux | Mark Ai Code

          LightDM is a free, open-source, and lightweight X Display Manager for Linux desktops. It may also function as a cross-desktop display manager. It supports a variety of desktop environments, as well as display technologies like Wayland, Mir, and X windowing systems.

          This article will walk you through the process of installing the LightDM display manager on the Ubuntu Desktop system.

        • How to Install phpBB forum on Debian 11 | Mark Ai Code

          phpBB is an open-source forum that is completely expandable and customizable. The program includes an easy-to-use UI and simple administrative settings. It is built using PHP and MySQL.

          phpBB, on the other hand, is a collection of multinational individuals that appreciate working on open-source software. This program was developed in June of 2000. There have been several changes to the licenses as well as the phpBB management team. The designers of phpBB still have the same intentions. They seek to give free Internet forum software.

        • How to Install Wiki.js 2 on Ubuntu 20.04/22.04 | Mark Ai Code

          Wiki.js is open-source wiki software that is robust and adaptable, written in javascript and powered by a node.js engine. It is offered as a self-hosted solution or as a one-click install from the Digital Ocean and AWS marketplaces.

        • How to Install Android Studio on Ubuntu Linux | Mark Ai Code

          The Android operating system is installed on over 2.5 billion smartphones worldwide. The need for Android software developers to create new applications and support current ones is enormous.

          Installing Android Studio on Ubuntu, which includes the Android SDK, Java Development Kit (JDK), and other tools required to begin building native Android apps, is how you can get started with Android app development. Let’s get started!

        • How to Install & Configure SSH on Ubuntu 22.04 | Mark Ai Code

          SSH is a secure shell network protocol that allows two computers connected over the internet to interact securely. The OpenSSH package may be installed using the openssh-server default packages in Ubuntu 22.04. Installing the SSH server on Ubuntu 22.04 is done using the apt package manager.

        • How To Install Docker CE on Ubuntu 20.04 LTS | Mark Ai Code

          Docker is a platform as a service product suite that employs OS-level virtualization to distribute applications in containers. Containers are typically separated from one another and have their own software libraries and configuration files, but they may interact over well-defined channels.

          Docker allows multiple applications to run on the same servers while also making it simple to bundle and deploy programs.

        • Add Hosts to Zabbix Server for Monitoring – kifarunix.com

          In this guide, I will demonstrate how to install and Enable Docker CE on Ubuntu LTS. Our Docker-CE is operating as anticipated from here.

    • Distributions and Operating Systems

      • Fedora Family / IBM

        • Silicon AngleRed Hat rollout parade led by Enterprise Linux 9

          Red Hat Inc. is kicking off its Red Hat Summit conference in Boston today with a sweeping set of announcements anchored by version nine of its flagship Red Hat Enterprise Linux operating system.

        • Silicon AngleCIQ raises $26M to promote free alternative to Red Hat Linux

          Ctrl IQ Inc., which does business as CIQ, said today it has raised a $26 million early-stage funding round to advance an alternative to Red Hat Inc.’s Enterprise Linux operating system.

          The Series A infusion brings the company’s total financing to $33 million and its valuation to $150 million, according to co-founder Gregory Kurtzer.

          CIQ is the founding sponsor and services partner behind Rocky Linux, an open-source and community-maintained enterprise Linux distribution based on CentOS, which is a fully compatible version of RHEL. CIQ Chief Executive Gregory Kurtzer was a founder of both CentOS and Rocky Linux.

        • Red Hat CEO: Remote Working is ‘Just Another Day’ to the Open Source World

          Red Hat’s CEO/president Paul Cormier assessed the last two years in a speech at this week’s Red Hat Summit. “Globally we saw nearly every industry go to 100% remote working overnight.”

      • Debian Family

      • Devices/Embedded

      • Open Hardware/Modding

        • Raspberry Pi Pico vs Zero: The Differences
        • Raspberry Pi & Machine Learning: All You Need to Know
        • AppleInsiderThere’s a hack to add CarPlay support to a Tesla | AppleInsider

          That video feed is supplied by a collection of hardware carried inside the vehicle, which is used to run Android. The assembly includes a pair of Raspberry Pi units, with one used for Android and the other using Linux and handling video and connectivity duties.

        • Tesla Refuses To Integrate Apple’s CarPlay — You Can Do It Anyway | Benzinga

          The solution uses a cheap computer development platform Raspberry Pi with a mobile network modem and a wireless internet access point running an Android-based system, micro-HDMI to HDMI cable, and an Ethernet cable. As shown in his YouTube video, the car connects to the device’s network and displays the CarPlay interface on its screen inside the web browser — including applications such as Maps and Apple Music. The solution works while driving and can even be controlled with the media buttons present on the car’s steering wheel.

        • LiliputingLilbits: MIPS pivots to RISC-V, Intel staggers desktop Arc graphics release, and Google releases I/O Pinball

          Last year MIPS Technologies announced that it was going to stop designing MIPS processors. That might sound surprising given the company’s name, but maybe it was inevitable when looking at trends in the semiconductor industry.

          So MIPS pivoted to RISC-V architecture. And the company’s first chips based on that open instruction set are set to launch later this year. MIPS is promising best-in-class performance, but we’ll likely have to wait until this fall to find out whether the company can deliver on that promise.

        • The Register UKMIPS says first RISC-V chips coming in Q4 2022 • The Register

          MIPS is back, but this time the company is bringing processors to market based on the RISC-V open instruction set architecture, rather than the MIPS architecture the chip designer is synonymous with.

          The current incarnation* of MIPS proclaimed its entry to the RISC-V market with a preview of the first products in its new eVocore processor line, which initially comprises two multiprocessor IP cores, the eVocore P8700 and I8500.

          MIPS said that the new processors are designed for high-performance, real-time compute applications such as networking, datacenter, and the automotive industry.

          To deliver on this goal, the eVocore IP cores was developed around scalability. MIPS said it aims to allow customers to specify custom chip configurations that combine coherent clusters of the multi-threaded, multi-core CPUs to match their power and performance requirements.

        • The Register UKRISC-V CEO: Winning over giants like Intel key to growth • The Register

          The CEO of RISC-V’s governing body says she wants to nothing less than “world domination” for the rising open-source processor technology, but to do that, the nonprofit needs buy-in from a variety of organizations, even those steeped in dominant, proprietary architectures, such as x86 giant Intel.

          In an interview this week with The Register, RISC-V International CEO Calista Redmond reckons the buy-in, which comes in the form of paid memberships, is needed to support ongoing development of the royalty-free CPU instruction set architecture to better compete with x86 and Arm ISAs.

    • Free, Libre, and Open Source Software

      • The InformantPromote research through free software

        Real, actionable knowledge, free software is a way for a research scientist to promote and disseminate their findings in society. This is the path advocated by Danielle Le Berry, a research professor of computer science.

        Firefox, OpenOffice, VLC, Ubuntu… Like these few famous examples, free software — those whose license allows everyone to use, modify, and redistribute — often play key roles in our digital ecosystems. We find it on our servers, in our TVs, on our phones, on our computers…Good news: This should go on for a long time. Actually, thanks Law of the Digital Republic for 2016 and The second national plan for open scienceSoftware generated by publicly funded research must be distributed by default under a free license.

        It must be said that the academic world and the world of free software are closely related: the GNU operating system project was created by Richard Stallman in 1983, when he was a researcher at the Massachusetts Institute of Technology, Linus Torvald developed the Linux kernel in 1991 when he was a student at the University of Helsinki … It remains a topical topic because many free programs are developed or improved in our laboratories. On February 5, a 1st Prize “Open Science of Free Research Software”, Organized by the Open Science Committee of the Ministry of Higher Education, Research and Innovation, it has provided evidence of this by rewarding ten programs from the French research world, among 129 high-quality applications. Many of these apps were for software developed over 30 years ago!

      • The New StackSOS: Sustainable Open Source [Ed: It's not a Free software problem; Proprietary software has the exact same peril but it's worse because orphaned work cannot be maintained or fixed, not even audited]

        Free and Open Source Software is eating the world, but is at the same time a victim of its own success. Large enterprises rely on libraries maintained by a single individual, or maybe worse yet: a single vendor.

        Individuals or organizations may restrict the use of their technology or EOL versions of their software, posing real challenges to organizations and customers depending on that technology. How can we contribute to the viability and sustainability of open source?

      • SaaS/Back End/Databases

        • PostgreSQLpgAdmin 4 v6.9 Released

          The pgAdmin Development Team is pleased to announce pgAdmin 4 version 6.9. This release of pgAdmin 4 includes 29 bug fixes and new features. For more details please see the release notes.

      • Licensing / Legal

        • The Register UKJudge agrees damages model in Oracle cloud class-action • The Register

          A US class-action case claiming Oracle falsely inflated its cloud revenue by threatening customers with audits is set to continue after a federal judge approved the damages model proposed by the plaintiffs.

          United States District Judge Beth Labson Freeman has certified an “out of pocket” approach to determining damages incurred by investors as a result of Oracle’s alleged false statements about its cloud revenue. Oracle has consistently insisted the case – which dates back to 2018 – has no merit.

          Oracle had argued that the City of Sunrise Firefighters’ Pension Fund, which is bringing the case, had failed to meet the requirements to disclose its damages model.

      • Programming/Development

        • Tools that follow the UNIX philosophy

          If a program is mentioned in the “don’t use” section, it’s strictly speaking from a bloat standpoint, not if the program is secure/good/etc or no. In some instances, for example KeepassXC, the program is remarkable, but it uses a GUI, which I personally dislike. All programs recommended here have CLI interfaces and it’s my personal preference only.

        • On Bloat and Ingrates

          While I appreciate a friendly abstract discussion about minimalism and what’s an appropriate number of LOCs in an application, let’s not get too carried away.

          It is not your job to critique someone who’s accomplished something wonderful, based on the size of their sources. If Lagrange is too many SLOCs for you, don’t use it, and don’t use it quietly, please. Maybe write a post about how your tiny app is better.

        • Golang v1.18 New Features and Released

          Since its first release in 2009, the Go programming language has progressed significantly. Because of its support for generics and other significant enhancements, Go 1.18 was an eagerly anticipated version.

          In March 2022, Go published version 1.18. Here’s an overview of the most noteworthy changes.

        • InfoQReproducible Development with Containers

          Avdi Grimm describes the future of development, which is already here. Get a tour of a devcontainer, and contrast it with a deployment container.

        • InfoWorldIntro to Micronaut: A cloud-native Java framework | InfoWorld

          The Spring framework has long dominated back-end Java development, but several new frameworks challenge that status quo. Micronaut is among the most compelling. Developed by the team that built Grails, Micronaut is made for modern architectures.

        • Python

          • Geometric Mean using Pandas in Python

            Working with the Python programming language simplifies and simplifies everything. Python was created to make the life of a developer simpler, which is why even rookie and beginning python developers fall in love with programming and development. It is a great programming language for data analysis. Furthermore, the Python programming language has libraries for mathematical and statistical computing.

            Geometric means are a Python pandas function that computes the geometric mean of a given collection of integers, list, or DataFrame. This post will show you how to get the geometric mean in Python using pandas.

          • Colorama in Python

            Python has a plethora of built-in modules and packages for printing colorful text in the terminal. Colorama is one of the Python modules that may be used to display text in multiple colors. It is used to improve the readability of the code. This module provides three formatting choices for coloring text. Back, Fore, and Style are the three options. This module allows you to modify the background or foreground color of the text as well as its style. This tutorial explains how to utilize this module in a variety of ways.

          • The Register UKSAS announces support for Python • The Register

            Analytics industry veteran SAS has announced support for Python in its proprietary analytics studio.

            Founded in 1976, SAS developed its own language which derived from a North Carolina State University project and is deployed across its range of analytics and machine learning environments.

            Bryan Harris, CTO and executive vice president at SAS, told us he wanted to offer users an alternative.

          • ZDNetProgramming languages: Python is slow, but it’s about to get faster

            Python 3.11 will bear the fruits of CPython’s multi-year effort to make Python a faster programming language.

    • Leftovers

      • What it’s like

        My brother and I were two and a half years apart in age. We looked VERY similar to each other. For the first month after he died, I felt like I saw him in the mirror when I looked. When were kids, aged 9 and 11 say, I would get so mad when people thought we were twins.

      • The Disappearence of Sincere Conversations

        How many times do you have a truthful, deep conversation with someone? Probably not that often. I’ve been observing all around me, how people don’t have common interests anymore, and instead resort to small talk about (anti)social media, and general consumerist behaviour, for example clothes and smartphones. You could call them similar passions, but they’re more of destructive passions, if they can be named passions. People are being increasingly alienated from their peers, resulting in
        ephemereal friendships, a degradation in the unity of communities, youth not caring about their parents, and the list can go on. The technological advancements have brought good and bad, but are the overwhelming majority of the advantages working for us or against us?


        Since the first smartphones appeared, we changed our lifestyle drastically overnight, didn’t even realize it. The internet became fully a monopoly made to capitalise and extract money from our minds. We’re not prepared to deal with such a thing, we can only try and prevent, and eventually stop it, by reducing our dependence on proprietary services that work against us and instigate our peers to violence through the so-called news, they make people mutilate themselves for beauty standards, just to be accepted into a niche group. We must fight for technological education, and teach people how they don’t use technology, but technology uses them. The educational system has sold out to corporations, almost all universities have contracts with Microsoft.

        Another reason people get into so many vices nowadays, aside from the continous alienation from our environment, is the fact that they want to be accepted into a group, they’re desperate for it, due to not having any true connections. This can be seen with vaping in teenagers, social media, and other various distractions of the 21st century.

      • Health/Nutrition/Agriculture

      • Proprietary

        • The Register UKThe end of the iPod – last model available ‘while supplies last’ [Ed: It was always hype, branding, and perceived "class"; technically speaking, the competition was better and practically superior]
        • The Register UKLinkedIn settles Dept of Labor charges it underpaid women [Ed: While Bill Gates flies on planes of Jeffrey Epstein and visits Epstein in prison Microsoft continues to abuse women. Microsoft loves to publicly brag about protecting women because, just like greenwashing, it makes business (marketing) sense.]

          Microsoft’s LinkedIn social network has agreed to settle allegations it systematically underpaid women in engineering, product, and marketing roles.

          The US Department of Labor (DoL) on Tuesday announced the settlement on behalf of 686 female workers in California. The government said an evaluation conducted by DoL’s Office of Federal Contract Compliance Programs found that between March 1, 2015, though March 1, 2017, LinkedIn failed to provide equal pay for women in its San Francisco and Sunnyvale, California, offices.

        • The Register UKWarning: Windows update breaks authentication for some server admins

          Microsoft is warning a security update may cause authentication failures for Windows domain controllers.

          “After installing updates released May 10, 2022 on your domain controllers, you might see authentication failures on the server or client for services such as Network Policy Server (NPS), Routing and Remote access Service (RRAS), Radius, Extensible Authentication Protocol (EAP), and Protected Extensible Authentication Protocol (PEAP),” the IT goliath said in an advisory published Wednesday.

        • The Register UKJeffrey Snover claims Microsoft demoted him for inventing PowerShell [Ed: Microsoft did the same to the Minecraft pioneer]

          PowerShell inventor Jeffrey Snover has aired some grievances about how his indispensable tool once got him demoted.

          The Microsoft Technical Fellow discussed the incident in a weekend Twitter thread that started when controversial investor Peter Thiel discussed the virtues of courage.

          “Courage is a key characteristic of future leaders and previous employees,” Snover joked in response to Thiel’s musings. He also asserted that “many people focus on getting their boss to pat them on the head rather than address problems.”

        • The Register UKMicrosoft to ax Azure Video Analyzer in November [Ed: Microsoft also lays off Azure staff and shuts down some datacentres; it relies a lot on government bailouts (stealing from taxpayers]

          Microsoft’s Azure Video Analyzer service is being put out to pasture, with its termination notice arriving less than a year after the preview was unveiled at the company’s 2021 Build event.

      • Security

        • The Register UKFresh ransomware samples indicate REvil is back [Ed: Microsoft Windows TCO]

          New ransomware samples analyzed by Secureworks’ threat intelligence team are the latest indication that high-profile ransomware operation REvil is once again up and running after months of relative inactivity.

          Secureworks’ Counter Threat Unit (CTU) investigated samples that were uploaded to the VirusTotal analysis service and found some showing that the developer of the code has access to REvil’s source code, “reinforcing the likelihood that the threat group has reemerged,” the researchers wrote in a blog post this week.

        • US-Led Seizure of RaidForums May Defy Lasting Effect on Security | TechNewsWorld

          The U.S. Department of Justice on Tuesday announced it seized the website and user database for RaidForums, a popular English-language cybercrime forum that sold access to more than 10 billion consumer records stolen in some of the world’s largest data breaches since 2015.

          The DOJ also charged the alleged administrator of RaidForums — 21-year-old Diogo Santos Coelho, of Portugal — with six criminal counts, including conspiracy, access device fraud, and aggravated identity theft.

        • The Register UKMalware goes regional as attackers change tactics [Ed: Microsoft Windows TCO]

          One such trend is that most recent malware attacks came from within the same region as the victim, a marked difference from previous years, according to Netskope, which believes this is a strategic tactic used by attackers to avoid geofencing filters and other prevention measures.


          Netskope said that EXE and DLL files account for nearly half of all malware downloads as malicious actors continue to see Microsoft Windows as a prime target for attacks.

        • The Register UKiOS, Android stores host more than 1.5 million ‘abandoned’ apps [Ed: Orphaned does not mean malicious]
        • Techstrong GroupOpenSSF Adds Open Source Package Analysis Tool Prototype

          The Open Source Security Foundation (OpenSSF) has made available a prototype of a package analysis tool that has already identified more than 200 malicious packages uploaded to PyPI and npm software components.

        • Help Net SecurityOpenSSF announces 15 new members to tackle supply chain security challenges

          The Open Source Security Foundation (OpenSSF) announced 15 new members from leading software development, cybersecurity, financial services, communications, and academic sectors.

        • The RecordGoogle to create security team for open source projects [Ed: Google works for the NSA. No security professional (a real security person) would take this seriously. Google: we worry about Open Source security! Meanwhile a Google engineer slips backdoored encryption into Linux kernel...]
        • Groundhog Day For Malware – IT Jungle [Ed: "This content is sponsored by iTech Solutions." IT Jungle has rapidly become a puff piece dump of IBM, Intel etc.]

          “The IFS just like a UNIX or Windows file system is susceptible to viruses, the i/OS is NOT.”

          Okay, this comment is pretty much false information. First, the IFS is called the Integrated File System because it’s exactly that. It literally contains ALL TEN IBM i file systems! Here they all are for good measure:

        • IBM Tackles Talent Shortage and Cybersecurity Crisis with New and Expanded Partnerships [Ed: IBM is moaning about talent shortage while laying off some of its most experienced workers]
        • The Register UKSecurity is a pain for American Dental Association: Ransomware infection feared [Ed: The huge cost of using Microsoft Windows]

          The Black Basta crime gang has claimed it infected the American Dental Association with ransomware.

        • The Register UKMicrosoft closes Windows LSA hole under active attack [Ed: While the media obsesses over "Linux" (systemd) bugs that could be exploited, by a local user, Microsoft has these blunders that the media typically shies away from (zero-days, unlike Linux, and far more severe too)]
        • Help Net SecurityMicrosoft patches Windows LSA spoofing zero-day under active attack (CVE-2022-26925) [Ed: With Microsoft, security is not a possibility. Microsoft security advice (that would actually work): turn off the computer until we issue a patch for the zero-day remotely-exploitable hole.]

          May 2022 Patch Tuesday is here, and Microsoft has marked it by releasing fixes for 74 CVE-numbered vulnerabilities, including one zero-day under active attack (CVE-2022-26925) and two publicly known vulnerabilities (CVE-2022-29972 and CVE-2022-22713).

        • The Register UKUS offers $15m reward for information about Conti ransomware gang [Ed: Microsoft Windows is costing the US taxpayers, too]
        • The Register UKUS, Europe formally blame Russia for data wiper attacks against Ukraine, Viasat [Ed: Windows TCO; But the Linux Foundation will carry on badmouth Linux security while taking Microsoft cash, just like Zemlin the wife. The Zemlin family bags more money from Microsoft than the Linux Foundation bags from Microsoft.]

          WhisperGate corrupts an infected Windows system’s master boot record, displays a fake ransom note, and irreversibly scrambles documents based on their file extensions, according to the US government’s Cybersecurity and Infrastructure Security Agency (CISA). Ghostwriter, a crew thought to be connected to Russia’s GRU military intelligence service, started using this strain of malware against organizations in Ukraine on January 15, we’re told.

        • The Register UKCrook jailed for selling stolen credentials on dark web • The Register

          The prosecution’s documents [PDF] detail an unnamed, dark-web marketplace on which usernames and passwords along with personal data, including more than 330,000 dates of birth and social security numbers belonging to US residents, were bought and sold illegally.

        • Privacy/Surveillance

          • Clearview AI banned from selling its facial recognition software to most US companies
          • The Register UKClearview AI promises not to sell face-recognition database to most US businesses

            Clearview AI has promised to stop selling its controversial face-recognizing tech to most private US companies in a settlement proposed this week with the ACLU.

            The New-York-based startup made headlines in 2020 for scraping billions of images from people’s public social media pages. These photographs were used to build a facial-recognition database system, allowing the biz to link future snaps of people to their past and current online profiles.

          • The Register UKIndia’s battle with Pegasus tells a bigger tale of tech laws • The Register

            NSO Group’s Pegasus spyware-for-governments keeps returning to the headlines thanks to revelations such as its use against Spain’s prime minister and senior British officials.

            But there’s one nation where outrage about Pegasus has been constant for nearly a year and shows little sign of abating: India.

            A quick recap: Pegasus was created by Israeli outfit NSO Group, which marketed the product as “preventing crime and terror acts” and promised it would only sell the software to governments it had vetted, and for approved purposes like taking down terrorists or targeting criminals who abuse children.

          • Rest of WorldIndia orders VPN companies to collect user data

            From bypassing censorship to watching porn, Indians’ usage of VPNs has been increasing in recent years. Now, whether VPNs comply with the new rule or exit the country, “it is the user whose privacy will be at stake.”

          • Data breach at California State Bar. Pegasus and India’s data privacy laws. VPN user data leaked on Telegram.

            The State Bar of the US state of California has disclosed that over 322,000 confidential attorney discipline records were exposed when the data was erroneously published on public records aggregator Judyrecords as the result of a bug in the State Bar’s case management system. The organization has begun notifying the 1,300 complainants, witnesses, or respondents who were compromised. “The State Bar is committed to transparency, and maintaining the public’s trust in our agency is paramount,” State Bar Executive Director Leah Wilson stated. The San Diego Union-Tribune reports that the vulnerability has been fixed and access to public State Bar records has been restored.

          • The VergeNew EU rules would require chat apps to scan private messages for child abuse [Ed: Parroting the lies that this is about protecting children]
          • Poynter InstituteShould you worry about data from your period-tracking app being used against you?

            It’s estimated that millions of people in the U.S. use period-tracking apps to plan ahead, track when they are ovulating, and monitor other health effects. The apps can help signal when a period is late.

            After Politico published on May 2 a draft opinion from the Supreme Court indicating that Roe v. Wade, the landmark decision that guarantees the constitutional right to an abortion, would be overturned, people turned to social media. They were expressing concerns about the privacy of this information – especially for people who live in states with strict limits on abortion – and how it might be used against them.

          • KFFShould You Worry About Data From Your Period-Tracking App Being Used Against You? [Ed: You should be worried about getting conned into sharing so much personal ]
          • Scientific AmericanYes, Phones Can Reveal if Someone Gets an Abortion [Ed: Yes, you probably ought to stop carrying around a "smart" "phone"; they do lots of bad things, not just like these...]
      • Environment

        • InfoQHow to Fight Climate Change as a Software Engineer

          Software has an impact on climate change and we as software engineers can make a difference. By keeping the created carbon emissions in mind and doing what is possible to reduce carbon emissions caused by software, we can contribute to the fight against climate change.

        • Energy

          • Financial TimesUkraine war puts Japan’s clean energy transition at risk

            Until one of the biggest earthquakes on record triggered a tsunami that destroyed the Fukushima Daiichi nuclear plant, just over 11 years ago, Japan’s energy supply rarely made front-page news.

            The resource-poor country had 54 nuclear reactors providing about a third of its energy needs. And the nuclear power industry pumped enough money into the political system to ensure its place in the energy mix of the world’s third-largest economy was not questioned. It also provided a useful repository of cushy jobs for retired officials.

            As a result, there was little demand for lawyers to support creative policymaking or become involved in innovative deals bringing sustainable energy to Japan.


            The conflict in Ukraine is complicating matters further due to Japan’s considerable imports of cheap Russian gas, produced jointly with Russian energy firms on the island of Sakhalin, north of Hokkaido.

            About 10 per cent of Tokyo’s gas comes from Sakhalin, while Hiroshima relies on the source for half of its supply.

            Japan has kept pace with western nations in imposing sanctions on Russia but its energy projects in the country are not included. “We are not pulling out,” says deputy chief cabinet secretary Seiji Kihara. “Unfortunately, our country’s energy self-sufficiency rate is in the single digits and we are the most vulnerable country in the G7. So, for us, energy is a matter of life and death.”

        • Wildlife/Nature

          • Omicron LimitedNot all is rosy for the pink pigeon, study finds

            The authors of a major study on the once critically endangered pink pigeon say boosting the species’ numbers is not enough to save it from extinction in the future.

            Despite the population increase, the team’s analysis shows the pink pigeon has a high genetic load of bad mutations, which puts it at considerable risk of extinction in the wild within 100 years without continued conservation actions.

          • Science DailyNot all is rosy for the pink pigeon
      • Finance

      • AstroTurf/Lobbying/Politics

        • The Register UKUS judge dismisses Republican efforts to block release of Salesforce emails

          A US judge has dismissed efforts by the Republican National Committee (RNC) to block the release of emails created and managed on a Salesforce system as part of an investigation into the January 6, 2021 attacks on the Capitol building.

          In a ruling released this week [PDF], District Judge Timothy Kelly rejected the RNC claim that the House Select Committee’s efforts to access the emails could reveal its digital strategy and provide valuable competitive information.

      • Freedom of Information / Freedom of the Press

      • Internet Policy/Net Neutrality

        • Fast CompanyBig ISPs just gave up on blocking net neutrality law in CA

          Trade groups representing AT&T, Verizon, Comcast and the like decided to withdraw their lawsuit, which had already been coldly received three times in federal courts.

        • 90s internet nostalgia

          It looks like it stopped accepting new sites about a year ago, but it’s worth a look — there are a few gems. I think “90s internet nostalgia” is my biggest guilty pleasure these days.

      • Monopolies

        • The Register UKVirginians sue to block rural Amazon datacenter

          Residents in rural Culpeper County, Virginia, aren’t letting Amazon build a datacenter without a fight, so they’ve sued the county to stop the project.

          Culpeper County’s Board of Supervisors voted 4-3 in early April to rezone 230 acres of a 243-acre equestrian center and working horse farm to light industrial use so that AWS could build [PDF] a pair of six-story buildings that cover 445,000 square feet on the site, along with an electrical substation.

          Speaking to the Culpeper Star-Exponent, the six neighboring families that filed the suit largely argue that the datacenter would be an eyesore that would ruin the countryside. Unfortunately, eyesores aren’t always legally actionable; zoning laws, however, are.

        • The Register UKFacebook deliberately took down Australian government pages during pay-for-news negotiations: report

          Facebook whistleblowers have alleged that the company deliberately took down the presences of Australian government and emergency services organizations during negotiations on the nation’s landmark pay-to-link-to-news laws.

          In early 2021, Australia negotiated with Facebook and Google over the News Media Bargaining Code which required both to pay local news outlets for the right to link to their content. Google opposed the Code and embedded links to documents detailing its objections on its home page. Facebook said the Code was so unworkable that it would be forced to stop sharing news links in Australia – and demonstrated the effect by making it impossible for Australians to post such links.

        • The Register UKApple’s return-to-office plan savaged by staff

          Apple’s directive requiring staff to return to the office after two years of pandemic-based working from home has elicited opposition from a group of employees.

          In an open letter published last week, a group calling itself Apple Together said the iGiant’s work-from-home (WFH) policy is motivated by fear.

        • The Register UKIndian government accuses Uber of jacking up prices for loyal customers [Ed: India will learn the hard way that Uber should be banned. These companies have a very sinister and collectively destructive agenda.]

      Links 15/05/2022: Pika Backup 0.4

      Posted in News Roundup at 1:35 am by Dr. Roy Schestowitz

      • GNU/Linux

        • Audiocasts/Shows

        • Kernel Space

          • Asahi Linux on Apple Silicon shows progress in graphics drivers

            Alyssa Rosenzweig, who is leading development of the Panfrost and Asahi Linux graphics drivers, showed off her continuing work in a succession of tweets involving Glmark2, an OpenGL ES 2.0 graphics performance benchmark tool for GNU/Linux, successfully rendering the bunny in 3D detail.

        • Graphics Stack

          • HackadayWho Is Thinking About Open Source Firmware?

            Yesterday, we ran a post on NVIDIA’s announcement of open-source drivers for some of its most recent video cards. And Hackaday being huge proponents of open-source software and hardware, you’d think we’d be pouring the champagne. But it’s trickier than that.

        • Benchmarks

          • Linux Nvidia GeForce GPU drivers move to become open source

            Nvidia GeForce GPU drivers on Linux are finally set to become open source, as the company has announced it will now publish kernel modules. While AMD is better known for openness when it comes to software, the green team has uploaded source code for its R515 drivers onto Github, facilitating a better experience for gaming PCs using the Unix-like operating system.

        • Applications

          • Pika Backup 0.4 Released with Schedule Support – Sophie’s Blog

            Pika Backup is an app focused on backups of personal data. It’s internally based on BorgBackup and provides fast incremental backups.

            Pika Backup version 0.4 has been released today. This release wraps up a year of development work. After the huge jump to supporting scheduled backups and moving to GTK 4 and Libadwaita, I am planning to go back to slightly more frequent and smaller releases. At the same time, well-tested and reliable releases will remain a priority of the project.

        • Instructionals/Technical

          • Computers Are Badamateur hour

            So we’ve talked about radio spectrum regulation in some detail, including the topic of equipment authorization (EA)—the requirement, under 47 CFR, that almost all electronics receive authorization from the FCC prior to sale. We’ve also talked about the amateur radio service (ARS, 47 CFR 97), and I’ve hinted that these two topics collide in an unusual way. So this of course raises the question: does amateur radio equipment require authorization? Or, more fun to type, does EA apply to ARS?

          • Barry HessHTML Only

            My site is now an HTML & CSS website, just like the old days. I’ve had a blast rebuilding it in this way. The approachability of making updates to the site is off the charts, and the speed that it is served by GitHub Pages makes me smile. For some reason it’s just more fun to make this sort of site in HTML & CSS.

          • uni TorontoWhy I’m considering some use of NetworkManager (and I probably have to)

            It’s possible to make NetworkManager ignore devices entirely (also), and I’ve set this up on both my home and my work desktops for all of the connections I definitely don’t want NM touching, as something between preparation and a precaution. I’ve also told NetworkManager not to touch resolv.conf, because I’ll manage all of that myself by hand.

          • H2S MediaHow to install Webmin on Ubuntu 22.04 LTS Jammy JellyFish

            Let’s learn the steps to install the Webmin Control panel on Ubuntu 22.04 LTS Jammy JellyFish using the command terminal.

            To manage a server efficiently for hosting a variety of web applications we can use web-based server management control panels such as Webmin. It is a free and open-source software used as a control panel to manage a server. It is based on Perl and uses port number 10000 to let users access the web GUI dashboard for managing various server services, configuration files, disk quotas, and key platforms for running web applications such as Apache, PHP, and MySQL. We can configure an SSL certificate to access Webmin securely, also due to modular design, users can extend the Webmin functionality using modules.

          • H2S Media3 Ways to Install Ruby on Ubuntu 22.04 LTS Jammy – Linux Shout

            Learn the different commands and steps to install Ruby on Ubuntu 22.04 LTS Jammy JellyFish using the command terminal.

            Ruby is an object-oriented high-level interpreted programming language that is easy to use and productive to use. Inventor Yukihiro Matsumoto wanted to develop a language in which functional and imperative programming is balanced, hence, this dynamic, free and object-oriented programming language Ruby enjoys great popularity among programmers.

            Everything in Ruby is an object that allows any programmer to customize the language to their preferences. In contrast to some others, the syntax is easier to read and write. It is similar to C and Java, so Java and C programmers can easily learn Ruby.

          • H2S MediaHow to Install Ubuntu 22.04 Linux on Windows with Hyper-V
          • How to Install Lynis on Ubuntu 20.04

            The process of auditing a system can give you concrete answers about the state of your system. In addition to this, you can also get a series of recommendations to improve the system’s performance. In this sense, on Linux, there are also applications that allow us to have this audit. That is why today we will show you how to install Lynis in Ubuntu 20.04.

          • Linux HintHow to install Sketchup3D in Ubuntu 22.04

            Sketchup3D is one of the most widely utilized software for 3D modeling and designing software. It is a simple 3D modeling program that is used for creating designs and presentations in several industries, including architecture, construction, interior design, industrial design, video game design, and more. The software is offered in two versions: Sketchup3D Free (with limited features) and Sketchup3D Pro, which comprises the whole tool-set.

            This write-up will discuss the procedure to install Sketchup3D on Ubuntu 22.04. So, let’s start!

          • H2S MediaSteps to Install MySQL on Ubuntu 22.04 LTS Jammy Linux – Linux Shout

            This tutorial will show the simple steps to install the MySQL Database Server on Ubuntu 22.04 LTS Jammy JellyFish using the command terminal.

            Oracle MySQL is the popular open-source database server common to have in LAMP or LEMP environments. This relational database management system is used for many content management systems that are used to store the data, for example, WordPress.

            The abbreviation “SQL” means Structured Query Language and the abbreviation “My” stands for the first name of the daughter of a developer of MySQL. There is no separate graphical user interface within MySQL, but this can be implemented using external programs. There are numerous free programs for this, which provide a graphical interface for administration and operation such as Workbench.

          • ID RootHow To Install vnStat on Ubuntu 22.04 LTS – idroot

            In this tutorial, we will show you how to install vnStat on Ubuntu 22.04 LTS. For those of you who didn’t know, VnStat is a console-based network traffic monitoring tool designed for Linux and BSD. vnStat keeps a log of hourly, daily, and monthly network traffic for the selected interfaces.

            This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the vnStat network traffic monitor on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

          • Install and Setup NTP Server on Ubuntu 22.04/Debian 11
          • Install and Configure NTP Client on Ubuntu/Debian systems
          • Install Zabbix Server on Ubuntu 22.04
          • Install Zabbix Server on Rocky Linux
          • Install Rundeck on Rocky Linux
          • Install Java 11|Java 17|Java 18 on Debian 11
          • VideoThis Is A Growing Standard To Disable Terminal Color – Invidious

            There’s tons of terminal apps with color nowadays but no consistent standard for disabling that color in the many cases where it isn’t needed, NO_COLOR aims to fix that.

          • Make Use Of10 Keyboard Shortcuts That Work on Both Windows and Linux

            Transitioning to a new operating system may seem overwhelming or daunting but the joy of learning something new is worth the effort.

            Let’s take a look at some of the important keyboard shortcuts that work similarly on both Linux and Windows. Although Windows and Linux are inherently different, you can still use most of the shortcuts that you are familiar with, in either of the operating systems.

        • Games

          • GamingOnLinuxDeck Builders Round Up

            Deckbuilders! I love ‘em. Slay the Spire got me into this genre digitally, after originally feeling the pull of Magic the Gathering in the late 90′s. After over a hundred hours playing Slay the Spire, the classic that invigorated the whole genre, I had the bug, bad. So since late 2019 I’ve been hunting for more. MOAR! Here’s a round up of a few favourites.

        • Desktop Environments/WMs

          • GNOME Desktop/GTK

            • Crosswords 0.3 – Jonathan Blandford

              I’m pleased to announce Crosswords 0.3. This is the first version that feels ready for public consumption. Unlike the version I announced five months ago, it is much more robust and has some key new features.

      • Distributions and Operating Systems

        • BSD

          • Digital JournaliXsystems Builds on Global Leadership in Open Storage With New TrueNAS Releases

            iXsystems®, an Open Source pioneer and the company behind TrueNAS, today announced the availability of two major updates to TrueNAS Open Storage software editions. The launch of TrueNAS 13.0 brings significant performance improvements to the world’s most deployed scale-up storage software. The availability of the latest version of TrueNAS SCALE (22.02.1) marks the first major update to the newly released scale-out and hyperconverged edition. Both versions of TrueNAS are designed and tested for their respective data-intensive workloads and made available so all organizations can benefit from true Data Freedom and open source economics.

          • Frederic CambusCustomizing NetBSD boot banners

            I recently discovered that it’s surprisingly easy to customize the NetBSD boot loader banner, simply by adding some directives in the boot.cfg configuration file.

        • Fedora Family / IBM

          • CentOS Successor Rocky Linux Gets $26M to Fund Push Into Enterprise Space – Slashdot

            “CIQ has landed $26 million in funding to support its plans to expand the use of Rocky Linux in the enterprise space,” reports ZDNet.

          • The New StackRed Hat Embraces DevSecOps [Ed: "Red Hat is a sponsor of The New Stack." Steven J. Vaughan-Nichols writes paid-for puff pieces for sponsors instead of actual journalism]

            When DevOps sped up deployment and update rates to unheard-of speeds. We loved it. When our security blunders accelerated at the same pace, we weren’t so happy. So, DevSecOps was created to bring security into the production cycle’s beginning. Now, at Red Hat Summit in Boston, Linux and cloud power Red Hat is embracing DevOpsSec security throughout its product and service lineup.

        • Debian Family

          • Barry Kaulermksquashfs in initrd updated with lz4 support

            I mentioned in a recent post, that QuickSetup has a checkbox to rebuild ‘easy.sfs’, changing from xz to gz compression. Would prefer that to change to lz4, for much faster decompression when in use.

            I also mentioned that the kernel 5.15.39 has been compiled with lz4 support in the squashfs driver.

          • Barry KaulerGalculator missing dep in Easy Bookworm

            Galculator is a calculator, found in the “Business” menu. It won’t run, because ‘libquadmath.so.0′ is missing. I found that to be package ‘libquadmath0′ and installed it via the package manager.

            However, as Debian Bookworm is a very long way from being released (mid-2023), the online repository is a moving target. Click on “pkgget” on the desktop, then go into configuration and click the “Update” button.

          • Barry KaulerCelluloid deps missing in Easy Bookworm
        • Canonical/Ubuntu Family

          • [Older] What to look out for in Ubuntu 22.04 LTS “Jammy Jellyfish”

            It is Ubuntu time! Our favorite open-source Linux operating system is seeing yet another Long-Term Support version with Ubuntu 22.04 LTS. This means that this version will receive ongoing app updates and critical security fixes for the next 5 years.

            This version will also receive periodical new Linux kernel releases and graphics driver updates. But that’s all fine and all but for the average Ubuntu user that doesn’t care about the under-the-hood stuff, what’s new with the Jammy Jellyfish?

        • Devices/Embedded

          • Notebook CheckRock Pi 4 Model C+ released with HDMI 2.0 ports, LPDDR4 RAM and M.2 SSD support

            Radxa has revealed the Rock Pi 4 Model C+, a single-board computer that resembles the Raspberry Pi 4 Model B. However, the former comes with a Rockchip RK3399-T SoC and an M.2 2230 connector, among other features. The Rock Pi 4 Model C+ is already orderable with and without an active cooler, starting at US$59.99.

          • HackadayRunning ARM Chips On Algae Power

            What’s the size of an AA battery and can run an ARM Cortex M0+ for six months? Well… probably an AA battery, but obviously, that wouldn’t be worth mentioning. But researchers at Cambridge have built a cell of blue-green algae that can do the job.

      • Free, Libre, and Open Source Software

        • Programming/Development

          • A new emacs lisp tiny project

            For the most part, every software project I work on is massive, and it’s for someone else. I really have fun working on small projects that solve a problem for me specifically. This is what I want to do next. Unfortunately, I am not an emacs list (elisp) pro. I will stumble through this, and it will be very un-lispy. I hope I’ll gain a better understanding of lisp doing this.

            I have written a few elisp programs in the past, but so much time passes between opportunities, it feels like I have alot of relearning to do. Perhaps I’ll go through the elisp tutorial directly in emacs.

          • Matt RickardNull Programming Philosophy

            The Null Programming Philosophy (inspired by Hoare’s “hack”) flips the hierarchy upside down. It says that a simple program is better than a correct one. Design a simple interface with a simple implementation. A program might not cover all edge cases. A correct feature might be excluded because it requires an inconsistent input or output compared to the rest (against simplicity).

            This tradeoff goes against our intuition, but technologies that we believe to be designed on the “right” side of the pyramid (completeness over simplicity) were products of the quick-and-dirty side of the pyramid (simplicity over completeness). For example, Unix, C, and TCP/IP fit the Null Programming Philosophy.

          • HackadayElectronics And C++ Education With An ATTiny13

            When [Adam, HA8KDA] is not busy with his PhD studies, he mentors a group of students interested in engineering. To teach them a wide range of topics, he set out to build a small and entertaining embedded project as they watch and participate along the way. With this LED-adorned ATTiny13A project, [Adam] demonstrated schematic and PCB design, then taught C++ basics and intricacies – especially when it comes to building low-footprint software – and tied it all together into a real-world device students could take home after the project. His course went way beyond the “Hello world”s we typically expect, and some of us can only wish for a university experience like this.

        • Leftovers

          • Balthazar RouberolCan’t enough be enough?

            About 2.5 years after I was hired, Datadog became a publicly traded company.

            In this article, I will explain the impact this had on me, both financially and psychologically, as transparently as I can. The intention is to examine how such an event can change one’s life, positively and not, and give you some return of experience on the choices that I made.

          • Science

            • HackadayTapType: AI-Assisted Hand Motion Tracking Using Only Accelerometers

              The team from the Sensing, Interaction & Perception Lab at ETH Zürich, Switzerland have come up with TapType, an interesting text input method that relies purely on a pair of wrist-worn devices, that sense acceleration values when the wearer types on any old surface. By feeding the acceleration values from a pair of sensors on each wrist into a Bayesian inference classification type neural network which in turn feeds a traditional probabilistic language model (predictive text, to you and I) the resulting text can be input at up to 19 WPM with 0.6% average error. Expert TapTypers report speeds of up to 25 WPM, which could be quite usable.

            • HackadayAttack Of The Magnetic Slime Robots

              [Li Zhang] and his colleagues at the Chinese University of Hong Kong (CUHK) have developed a blob of goo that can navigate complex surroundings, grow an ‘arm’, grasp a wire and move it, encapsulate a small object and carry it. As explained in the research paper, the secret is in the non-Newtonian material the bots are made of.

          • Education

            • Barry HessAre Straight A’s Worth It?

              Where it gets more interesting, I think, is when considering how valuable straight A’s are to the student’s growth and happiness. For most students, that amount of grade excellence would require a lot of hard work. Most societies around the world consider a strong work ethic to be a positive moral characteristic. (There is a lot of social engineering behind that fact, but this isn’t the time to delve into that topic.)

          • Hardware

            • HackadayBalloon Guitar Is An Absolute Gas, Helium Or Not

              Guitars are most typically built out of wood. Whether it’s an acoustic guitar with a big open cavity, or a solid-body electric, there’s generally a whole lot of wood used in the construction. However, [Mattias Krantz] shows us that alternative construction methods are entirely possible, by building his own balloon guitar.

            • HackadayMiniDisc Player Supports Full Data Transfer

              Between the era of the CD and the eventual rise and domination of streaming music platforms, there was a limbo period of random MP3 players mixed in with the ubiquitous (and now officially discontinued) iPod. In certain areas, though, the digital music player of choice was the MiniDisc, a miniature re-writable CD player with some extra digital features. Among them was the ability to transfer music to the discs over USB, but they did not feature the ability to transfer the songs back to a computer. At least until now, thanks to this impressive hack from [asivery].

            • The Register UKArm wrests back control of its rogue China limb • The Register

              The Chinese arm (as it were) has been of concern since June 2020 when CEO Alan Wu was fired over conflicts of interest. But Wu refused to go or to hand over the documents that would allow the appointment of a new leader.

              SoftBank owns 49 percent of the Chinese venture, and as a minority stakeholder could not order Wu’s removal.

            • The Register UKArm says microcontroller price hikes helped fuel sales • The Register

              With Arm looking to re-enter the public market at some point, the British chip designer is hoping to get would-be investors excited with figures that indicate it achieved record revenues and profits in 2021.

              Arm on Thursday said its fiscal 2021 revenue grew 35 percent year-on-year to $2.7 billion, serving as one of the few bright spots in what was an otherwise dreadful year for its owner, Japan-based SoftBank Group, which failed to sell the chip designer to GPU giant Nvidia after facing pushback from regulators.

            • The Register UKArm China website posts letter from staff opposing change of management
            • The Register UKArm China CEO refuses to go despite SoftBank taking control

              The Arm saga is continuing with the ousted CEO of Arm’s renegade Chinese division still refusing to step down, despite being fired again recently.

              Both SoftBank and Arm were last week seeking an agreement that would allow them to regain control of Arm China, the chip designer’s subsidiary in the Middle Kingdom. SoftBank has only a 49 percent stake in the company, with the rest held by a consortium of various organizations that have ties to the Beijing government.

            • The Register UKAMD approaches ’30%’ x86 CPU market share, thanks to servers ‘n’ laptops

              Here’s a new data point that will rile Intel up: AMD now accounts for nearly 30 percent of x86 CPU market share, and the chip designer got there during an industry downturn.

              This is according to analysts at Mercury Research, which said on Wednesday that AMD’s x86 market share reached 27.7 percent against Intel in the first quarter of 2022. This beat the 25.6 percent record AMD set in the previous quarter, which, notably, surpassed the 25.3 percent shipment milestone it achieved against Intel back in 2006.

          • Health/Nutrition/Agriculture

            • uni BathSocial media break improves mental health – new study

              Asking people to stop using social media for just one week could lead to significant improvements in their wellbeing, depression and anxiety and could, in the future, be recommended as a way to help people manage their mental health say the authors of a new study.

              The study, carried out by a team of researchers at the University of Bath (UK), studied the mental health effects of a week-long social media break. For some participants in the study, this meant freeing-up around nine hours of their week which would otherwise have been spent scrolling Instagram, Facebook, Twitter and TikTok.

              Their results – published today (Friday 6 May 2022) in the US journal Cyberpsychology, Behaviour and Social Networking – suggest that just one week off social media improved individuals’ overall level of well-being, as well as reduced symptoms of depression and anxiety.

            • ABCIndia bans exports of wheat, citing threat to food security

              A key aim is to control rising domestic prices. Global wheat prices have risen by more than 40% since the beginning of the year.

              Before the war, Ukraine and Russia accounted for a third of global wheat and barley exports. Since Russia’s Feb. 24 invasion, Ukraine’s ports have been blocked and civilian infrastructure and grain silos have been destroyed.

              At the same time, India’s own wheat harvest has suffered from a record-shattering heat wave that is stunting production.

          • Security

            • Privacy/Surveillance

              • The Register UKGoogle chases sovereignty market with EU Workspace Data product
              • The Register UKBank for International Settlements calls for reform of data governance

                The Bank for International Settlements (BIS) – a meta bank for the world’s central banks and facilitator of cross-border payments – has advocated new governance systems that promote owner control of data and transparency over its use.

                In a report released on Thursday, the BIS argued that market failures mean that restoring de facto control of data to those who generate it has become necessary – along with requiring permission before service providers collect, share, and process it.

          • Defence/Aggression

            • The HillFinland, Sweden’s NATO moves prompt fears of Russian cyberattacks

              While it is too early to judge how Russia might try to use its cyber capabilities against Finland, Sweden or other NATO members, including the U.S., experts said it will likely launch unsophisticated and small-scale cyberattacks as a form of protest against the expansion.

              Such attacks would not have the severity of cyber efforts Moscow launched against Ukraine amid the Russian invasion of that country.

            • Eesti RahvusringhäälingForeign Intelligence Service: Russia preparing for long war in Ukraine

              Looking at the behavior of Russia’s leadership, the Kremlin is preparing to prolong the war which means the West needs to be ready to support Ukraine in the long run, the head of Estonia’s Foreign Intelligence Agency said on Friday.

            • MedforthBREAKING: Islamist terrorist attack in German regional train – Refugee from Iraq stabs passengers

              There were approximately 270 passengers on the train, Reul said. A police officer who happened to be among the passengers overpowered the 31-year-old suspect with the help of two other passengers, state police confirmed.

            • Hindustan TimesPak-based Jaish behind the killing of Kashmiri Pandit Rahul Bhat

              According to intelligence inputs, the Jaish-e-Mohammad group has been desperate to take action against the minority community in order to keep the terror plot boiling. “After the fall of Afghanistan to Islamist Taliban and globally designated Haqqani network the Jaish-e-Mohammad leadership based in Bahawalpur believes that they can also take on the might of Indian security forces,” said a senior security official.

            • MedforthParis: Magassa O. tries to kill two police officers, whom she calls “crusaders”, shouting “Allah akbar

              A 21-year-old woman was charged and detained for trying to kill police officers at Lariboisière Hospital in Paris (Xe) on May 5. It is a strange case that has been investigated by the anti-terrorist justice system without any jihadist trail being investigated so far.

            • BBCNigeria student killing: Round-the-clock curfew in Sokoto after protests

              A 24-hour curfew has been declared in Sokoto, Nigeria, after protesters took to the streets demanding the release of two suspects in the murder of a Christian student last week.

              Deborah Samuel was beaten and burned by Muslim students who accused her of posting “blasphemous” statements about Islam in a WhatsApp group on Thursday.

            • Site36American Dragnet: Immigration and Customs authority sets up unprecedented surveillance

              For €2.7 billion, ICE has bought information and spying technology in recent years. Data from private brokers and government agencies has been used to create warrantless mass surveillance that affects a large proportion of US residents.

            • Common Dreams‘A Horror Movie’: 10 People Murdered During Mass Shooting by White Supremacist in Buffalo

              Ten people were killed and another three people wounded in Buffalo, New York on Saturday afternoon by a gunman who opened fire inside a supermarket, a pre-planned shooting that he live-streamed on the internet and evidence indicates was motivated by racial hatred and white supremacist ideology.

              “This was pure evil.”

            • Common DreamsRussia Cuts Off Electricity to Finland as Tensions Grow Over NATO Expansion

              The small portion of electricity supplied to Finland by Russia was cut off Saturday just hours before Russian President Vladimir Putin told his Finnish counterpart directly that it would be a “mistake” for his country to join NATO.

              The call between Finland President Sauli Niinistö and Putin was the first direct talks between the two leaders since Finland said it will soon apply for NATO membership after decades of neutrality that has kept it out of the U.S.-European military alliance.

          • Environment

            • SalonThe secrets to passing climate legislation — even in red states

              Many Republican legislators still deny the scientific consensus around climate change and oppose policies to address the problem outright. But a recent study found that these red-state successes weren’t a fluke. The analysis, recently published in the journal Climatic Change, shows that states approved roughly 400 bills to reduce carbon emissions from 2015 to 2020. More than a quarter — 28 percent — passed through Republican-controlled legislatures.

            • Energy

            • Wildlife/Nature

              • Falklands’ inshore waters globally recognized as Key Biodiversity Areas — MercoPress

                A Falklands Conservation project has identified the Falklands Islands’ inshore waters as globally recognized Key Biodiversity Areas (KBA) for breeding seabirds, driving forward their aim for quality marine management practices in the Islands.

                The inshore waters of the Falkland Islands are important breeding grounds for numerous seabird populations, however, these are coming under increasing pressure from climate change and the potential threats of environmentally unsustainable development.

                The work hopes to support the development of quality marine management practices in the Islands and could support the Falklands in achieving its commitments under the Convention of Biological Diversity (CBD) 2020.

          • Finance

          • The NationHow Economic Sanctions Shaped Today’s Global Powers

            The week after Vladimir Putin decided to send troops into Ukraine, Western newspapers were filled with analysis about the economic sanctions that might be imposed on Russia. After a few days, the sheer number and severity of those sanctions surpassed the expectations of almost every previous analysis—and rightly so, because the speed in implementing them and their scale and implications had little precedent when it came to an economy the size of Russia’s. Despite this surprise, however, new questions arose about the consequences that this new set of sanctions could have, both for the war itself and at the level of the global economy.

        • AstroTurf/Lobbying/Politics

          • As Musk buyout looms, Twitter searches for its soul [Ed: This repeats false numbers about Twitter's usage]

            A toxic cesspool. A lifeline. A finger on the world’s pulse. Twitter is all these things and more to its over 229 million users around the world — politicians, journalists, activists, celebrities, weirdos and normies, cat and dog lovers and just about anyone else with an internet connection.

          • The VergeTech industry appeals the bad Texas social media law to the Supreme Court

            Tech industry trade organizations NetChoice and the Computer Communications Industry Association have appealed directly to the Supreme Court for an emergency stay of the Texas social media law known as HB 20. The law, which creates liability for content moderation decisions that are based on “the viewpoint of the user or another person,” could make it impossible to enforce bans on hate speech — or to even moderate platforms at all. HB 20 was successfully blocked in court late last year, and then unblocked by an appeals court on Wednesday without explanation.

            “Texas HB 20 strips private online businesses of their speech rights, forbids them from making constitutionally protected editorial decisions, and forces them to publish and promote objectionable content,” said NetChoice counsel Chris Marchese in a press release. “The First Amendment prohibits Texas from forcing online platforms to host and promote foreign propaganda, pornography, pro-Nazi speech, and spam.”

          • NBCHow a push for equity turned Detroit into a dead zone for legal weed

            At the time, he said, he was focused on changing the fact that the medical dispensaries existed in a legal gray area — people could be licensed as “caregivers’’ to provide marijuana to a limited number of patients with medical conditions, but businesses weren’t formally permitted by the city or state. Tate noticed that of the roughly 240 semi-legal dispensaries the city counted then, only a handful were owned by Detroiters.

            “It was a concern,” he said. “Many of the establishments were making pretty good money,” but the proceeds weren’t staying in the community.

          • The EconomistThe war in Ukraine is spurring transatlantic co-operation in tech

            It is a momentous task. The TTC is the West’s response to efforts by China and others (notably Russia after its invasion of Ukraine) to build an autocratic digital world and bring the physical supply-chains that underpin it under their control. “The big question is whether democratic governments can develop a meaningful alternative,” explains Marietje Schaake of the Cyber Policy Centre at Stanford University. If America and the EU resolve their differences in tech, other countries are bound to follow their lead: the pair account for 55% of the global market for information technology, whose value is expected to reach a staggering $4.4trn this year, according to Gartner, a consultancy.

          • MIT Technology ReviewA quick guide to the most important AI law you’ve never heard of

            Some of the bill’s requirements are technically impossible to comply with at present. The first draft of the bill requires that data sets be free of errors and that humans be able to “fully understand” how AI systems work. The data sets that are used to train AI systems are vast, and having a human check that they are completely error free would require thousands of hours of work, if verifying such a thing were even possible. And today’s neural networks are so complex even their creators don’t fully understand how they arrive at their conclusions.

            Tech companies are also deeply uncomfortable about requirements to give external auditors or regulators access to their source code and algorithms in order to enforce the law.

        • Censorship/Free Speech

          • Sahara ReportersSokoto-based Islamic Preacher Urges Muslims To Kill Blasphemers, Says It’s the Least They Can Do For Prophet Mohammad

            The cleric urged his congregation to kill the suspect once he was released.

            SaharaReporters reported on Thursday how Ms Deborah, a student of the Shehu Shagari College of Education in‪ Sokoto State was burnt to death by her colleagues for allegedly insulting Prophet Muhammad.

            In a viral video obtained by SaharaReporters, the preacher said, “He wrote on Facebook. He said a lot of things that are not right about the prophet of Allah and in Sokoto, I said he was courageous. For us, we kill such a person. For the prophet of Allah, the least we can do is to kill.

          • Daily PostDeborah Samuel: Nigerians fume over killing of student who ‘insulted’ Prophet Mohammed

            Nigerians on social media have condemned the killing of a female student of Shehu Shagari College of Education Sokoto State.

            Daily Post had reported that the student identified Deborah Yakubu was lynched by some male Muslim students and burnt, for allegedly insulting Prophet Mohammed.

        • Freedom of Information / Freedom of the Press

          • VOA NewsChilean Journalist Dies After Being Shot During May Day Protests

            Sandoval was shot in the head during violent clashes on the sidelines of a union demonstration organized to mark International Workers’ Day on May 1. Two other people were also injured by the gunfire.

          • Common Dreams‘An Outrage’: Sanders Condemns Attack by Israeli Soldiers on Shireen Abu Akleh’s Funeral Procession

            Sen. Bernie Sanders on Friday called the attack on the funeral procession of slain journalist Shireen Abu Akleh that took place earlier in the day “an outrage” that must be condemnation by the U.S. government as he also called for an investigation into the killing.

            Friday’s attack was described as “horrific” and “grotesque” across the world after footage emerged of Israeli Defense Forces and security personnel hitting and otherwise assaulting the pallbearers of Abu Akleh’s coffin and other mourners as they made their way through the streets of occupied East Jerusalem.

        • Civil Rights/Policing

          • Hindustan TimesMuslim man arrested for conversion bid, assault of woman: TN police

            On January 14 this year, he called and threatened to leak more photos and videos on social media. “He has been calling my parents and relatives and threatening to kill me,” she claimed in her complaint.

            The accused has been booked under sections 354 A (assault) and 506(I) (criminal intimidation) of the Indian Penal Code (IPC) and relevant sections of the Scheduled Caste and Scheduled Tribe (Prevention of Atrocities) Act and the Information Technology Act, police said.

          • Common DreamsOpinion | The Super Immunity of Our Fabulously Wealthy Corporate Dictators

            Ever since the heads of East India Trading Company (1600) and Hudson Bay Company (1670), were incorporated by English Royal charters, there have been corporate dictators. Their range and actions, have varied widely however. Today’s new corporate dictators shatter past restraints.

          • Scheerpost2024

            “2024,” a new original cartoon by the inimitable Mr. Fish, depicts a call to action that only a genuine people’s revolution based on peace, love, equality, and justice might avert.

          • TruthOutStop Comparing Leaked “Roe” Reversal to Sharia Law and Taliban’s Rules
          • The NationAborting Reality
          • ScheerpostObama and Liberals Killed Abortion Rights

            The revelation that the Supreme Court is poised to overturn the Roe v. Wade decision has not motivated left-wing democrats to effectively mobilize on an issue they claim to care about. They are made powerless by their dependence on liberalism and loyalty to people like Barack Obama who undermine them.

          • Common DreamsOpinion | Populism, Freedom, and the Current Threats to Democracy

            Much ink has been spilt on the subject of populism, so it would be a fool’s errand for me to presume to settle the debate over the meaning of the term. I will simply confine myself to pointing out two well-established facts. First, the original 19th century U.S. populists sought to forge a multi-racial movement of the producing classes to challenge the abuses of power by big corporations and wealthy individuals. They believed that business interests such as railroads and banks as well as wealthy individuals constituted a plutocratic threat to democracy in gilded age America. 

        • Internet Policy/Net Neutrality

          • Internet SocietyTwo Months of War: The Impact on the Internet’s Core

            The Internet shouldn’t become a battleground. The Internet Society has been saying this for years. More recently, we called upon stakeholders to make sure that the sanctions imposed on Russia as a result of its invasion of Ukraine do not impact the global Internet infrastructure.

            We’re not alone. The G7 made similar declarations, stating that access to Internet infrastructure is exempt from sanctions, and companies can continue to operate in these sectors in Russia. We hope that all other nations, including all nations involved in conflict, will also implement this declaration.

          • The Register UKBiden deal with ISPs: Low to no cost internet for 40% of US

            The Biden White House has put forward a plan that could see 40 percent of households in the United States getting subsidized high-speed internet, with some having service free of charge.

            The Affordable Connectivity Program (ACP) was created as part of the recently passed infrastructure law, and will reimburse bills from internet service providers (ISPs).

            Households covered by the ACP will have internet service costs reduced by up to $30 a month, or up to $75 a month if they live on tribal lands.

        • Digital Restrictions (DRM)

          • The VergeNetflix is reportedly looking into livestreaming

            So far, we don’t know much about the upcoming feature yet, and Netflix didn’t immediately respond to The Verge’s request for comment. Disney Plus, one of Netflix’s biggest rivals, has already gotten into livestreams. In February, Disney Plus aired a live showing of the Academy Awards, a first for the service. It has also become the new home of the celebrity dance competition series, Dancing With the Stars, which is set to debut as a live series on the platform later this year.

          • The Register UKJohn Deere tractors ‘bricked’ after Russia steals machinery from Ukraine

            Millions of dollars worth of John Deere agricultural machinery stolen from a dealership in Ukraine by Russian Federation forces has been traced to the Chechen Republic and bricked, it is reported.

            In this instance, the Moline, Illinois-based Deere & Co.’s penchant for proprietary digital access controls may have worked out well from a public-relations standpoint, if the account is true. The looted tractors and combine harvesters have been remotely disabled, according to an unidentified Ukrainian interviewed by CNN, leaving those responsible looking for ways to bypass the machinery’s digital locks.

        • Monopolies


        Links 14/05/2022: Alt Linux 10.0 Released

        Posted in News Roundup at 2:52 pm by Dr. Roy Schestowitz

        • GNU/Linux

          • Audiocasts/Shows

            • Gemini Radio – Episode 41
            • mintCast 382 – Kernel Metamorphosis

              First up in the news: Linux crosses the C; We look into Steam; Flatpak improves; Gnome gets more customizable.

              In security and privacy: Bvp47 found after 10 years.

              Then in our Wanderings: Moss is shaking in his boots and singing about it; Joe fixes more things; JoshT is back from the farm; Bill keeps trucking; and Norbert goes to Maui.

          • Kernel Space

            • nbdkit now supports LUKS encryption | Richard WM Jones

              The threat model here is that you can store the encrypted data on a remote server, and the admin of the server cannot decrypt the disk (assuming you don’t give them the passphrase).

              If you try this filter (or qemu’s device) with a modern Linux LUKS disk you’ll find that it doesn’t work. This is because modern Linux uses LUKSv2, although they are able to create, read and write LUKSv1 if you use set them up that way in advance. Unfortunately LUKSv2 is significantly more complicated than LUKSv1. It requires parsing JSON data(!) stored in the header, and supports a wider range of password derivation functions, typically the very slow and memory-intensive argon2. LUKSv1 by contrast only requires support for PBKDF2 and is generally far more straightforward to implement.

          • Applications

            • Ubuntu HandbookDeaDBeeF 1.9.0 Released! How to install it in Ubuntu 22.04 | UbuntuHandbook

              DeaDBeeF music player released new 1.9.0 version a day ago. Here’s what’s new and how to install the application in Ubuntu.

              DeaDBeeF is one of my favorite music players, especially for its design mode. Glory to Ukraine! In this release you’ll see two little hearts (in blue and yellow) in the title bar of app window.

          • Instructionals/Technical

            • Make Use OfHow to Fix Static Noise Issue in Linux

              Speakers emitting unwanted static noise can be a huge annoyance when trying to focus and can significantly hamper your productivity. It is not a pleasant sound to the ears as well. If you have recently switched to Linux and find your audio devices malfunctioning, this guide can help you troubleshoot your issues and fix static noise on Linux.

            • How to Zip Files and Directories from Linux Command Line
            • Make Use OfHow to Fix the “ifconfig: command not found” Error in Linux

              If you encounter the command not found error while using ifconfig, here’s an easy way to solve it.

              ifconfig is a handy networking utility that fetches important data related to the network interface of your machine. It used to come pre-installed in all Linux distributions, that is until it was unanimously declared deprecated by developers due to lack of maintenance.

              This is why calling the ifconfig command from the terminal returns an “ifconfig: command not found” error. If you still want to use ifconfig on your Linux system, you’ll have to manually install it.

            • [Older] Two new user guides for v7.3: Getting Started and Writer

              The latest user guides from the LibreOffice documentation team are LibreOffice 7.3 Getting Started and LibreOffice 7.3 Writer, available in free PDF, ODT, or to read in a browser. Low-cost printed copies are available from Lulu.com.

            • How to use Photoshop on Ubuntu and other Linux?

              The use of all kinds of open source software throughout recent times is growing exponentially. Even companies such as Microsoft are supporting this type of development. This means that operating systems such as Ubuntu and other Linux distributions are increasingly present.

              Many users consider these open source operating systems as an increasingly real and effective alternative to the popular Windows . That is why they start using all this as a secondary system, or even migrating from Redmond’s software. Here you will find a series of extremely powerful and affordable proposals for most end users. Just a few years ago this was not the case, since Linux distributions were designed for a few professionals and experts on these platforms.

              But things have changed a lot in recent years, hence the success of distros like Ubuntu itself, which has more and more followers. It is true that at first some will have to get used to the changes or differences they find with respect to Windows. However, over time they will realize that there are many advantages here, starting with the price. In addition, in Linux we find a huge number of software solutions, most of open source , that we can use and that will solve our needs on the PC.

            • nixCraftLinux and Unix host Command Examples
            • ID RootHow To Install Htop on Ubuntu 22.04 LTS – idroot

              In this tutorial, we will show you how to install Htop on Ubuntu 22.04 LTS. For those of you who didn’t know, htop is a process-viewer and manager for interactive system monitoring and management. It allows scrolling the list of processes vertically and horizontally to see their full command lines and related information like memory and CPU consumption. Also system-wide information, like load average or swap usage.

              This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Htop interactive process viewer on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

            • Ubuntu PitHow To Create a Windows Bootable USB on Linux
            • Enable Minimize And Maximize Buttons In Fedora – OSTechNix

              Today, we will see one of the post installation steps in Fedora desktop. This brief guide explains how to enable minimize and maximize buttons in application windows in Fedora GNOME Workstation and Silverblue editions.

            • Daniel PocockSubscribing to iCalendar feeds with QR codes

              Every day I receive emails containing invitations to events. Whether they are local community activities or international conferences, they share a common problem that is easily avoidable. Every recipient of the invitation has to manually copy and paste the event to their calendar.

              If it is a recurring event then it can be even more challenging. If the participant sets up a recurring event in their own software and stops reading the emails then it will not always be obvious to them when one instance of the meeting is skipped or in an unusual venue.

            • The AnarcatAntoine Beaupré: NVMe/SSD disk failure

              In any case, after waiting all that time, the machine booted (in Fedora) again, and now it could detect the SSD disk. The BIOS could find the disk too, so after I reinstalled grub (from Fedora) and fixed the boot order, it rebooted, but secureboot failed, so I turned that off (!?), and I was back in Debian.

              I did an emergency backup with ddrescue, from the running system which probably doesn’t really work as a backup (because the filesystem is likely to be corrupt) but it was fast enough (20 minutes) and gave me some peace of mind. My offsites backup have been down for a while and since I treat my workstations as “cattle” (not “pets”), I don’t have a solid recovery scenario for those situations other than “just reinstall and run Puppet”, which takes a while.

            • The AnarcatAntoine Beaupré: BTRFS notes

              I’m not a fan of BTRFS. This page serves as a reminder of why, but also a cheat sheet to figure out basic tasks in a BTRFS environment because those are not obvious to me, even after repeatedly having to deal with them.

              Content warning: there might be mentions of ZFS.

            • Fedora MagazaineAn introduction to USB Device Emulation and how to take advantage of it

              Nowadays, the number of devices is getting bigger and bigger, and modern operating systems must try to support all types and several of them with every integration, with every release. Maintaining a large number of devices is difficult, expensive and also hard to test, specially for plug-and-play devices, like USB devices.

              Therefore, it is necessary to create a mechanism to facilitate the maintenance and testing of old and new USB devices. And this is where USB device emulation comes in. In that way, a complete framework including a big bunch of emulated and validated USB devices will allow easier integration and release. The area of application would be very wide: earlier bug search/detection even during development, automatic tests, continuous integration, etc.

            • Make Use OfHow to Easily Upgrade to the Latest Fedora Beta Version

              Fedora Linux is known as a leading-edge Linux distribution that consistently showcases all the latest Linux features and software technologies. The fact that Fedora is often the first to include the latest versions of popular software is one of the distro’s main draws.

              For those who really like to live on the edge, Fedora also makes it surprisingly easy to upgrade to beta versions of upcoming releases. If you’ve ever wanted to explore, test, or experiment with a new Fedora beta release, we’re going to show you how.

            • UNIX CopHow to install the Development tools on CentOS 9 Stream

              If you are a developer or enthusiast, at some point you will have to compile programs from source code. For that, you need the compiler for the programming language it is developed in, but if you want to create a package from it, then you need even more tools.

            • How to run Windows EXE files on Ubuntu Linux? – LinuxStoney

              How to run Windows EXE files on Ubuntu Linux?, Most PC users prefer to install and use Windows, Microsoft’s operating system. But when looking for other alternatives, there is no doubt that the most interesting is to opt for an open source system , that is, a Linux distro like Ubuntu.

              Here we have a wide variety of distributions to choose from. Although their core is very similar, in most cases each of them is characterized by something. In this sense, we can make use of Linux safer, lighter Therefore, we could say that Linux has been the best alternative to Windows for years, with Ubuntu being one of the most popular distributions.

            • Make Use OfHow to Configure Static IP Address on Ubuntu 22.04 LTS

              The IP address of most devices today is generated by the Dynamic Host Configuration Protocol (DHCP) server. A DHCP server assigns a dynamic IP address to your device when it’s connected to a network. Thus, you have the chance to change this IP address from time to time.

              On the other hand, a static IP refers to a fixed, immutable address, different from dynamic IPs. You can set static IP settings in Ubuntu 22.04 LTS in three different ways. Here’s how to get started.

            • ID RootHow To Install MakeMKV on Debian 11 – idroot

              In this tutorial, we will show you how to install MakeMKV on Debian 11 (Bullseye), as well as some extra requirements by MakeMKV

            • How to set up CORS for an AWS Lambda Proxy REST API resource – Anto ./ Online

              Let’s see how you set up CORS using a Lambda Proxy API and AWS SAM. Heads up! This guide will also help fix a CORS error that fails in the browser but works in CURL.

            • Linux Made SimpleHow to install Moonleap by guselect on a Chromebook

              Today we are looking at how to install Moonleap by guselect on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

              If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

            • Linux Shell TipsHow to Count Number of Columns in a File in Linux

              You may ask yourself, why would a user be interested in noting/counting the number of columns in a file? This segment of our tutorial falls under Linux file management. A CSV (Comma Separated Value) file is a favorite file format for many Linux users for data record keeping because of the following advantages…

          • Games

            • Ubuntu Linux the number one Linux distro for gaming? Every time less – itsfoss.net

              The information on which this entry is based is a couple of weeks old, but it is worth not giving it up for lost because of the implications it has. It is about the advance in the imposition of Snap as an application format in Ubuntu, although just in this aspect it does not have the usual negative bias; but above all it is about how after many years of hegemony, we are beginning to see signs of the fall of Ubuntu as the flagship of the Linux desktop. Starting with the games.

              As they advanced on the Ubuntu blog, Canonical is packaging Steam for Ubuntu in Snap format, with “all the advantages that this entails”: a single package for all versions of the distro, dependencies included; and by dependencies they mention those of the Steam package, mainly the 32-bit libraries that caused so much controversy a few years ago, pitting the developers of Wine or Steam against those of Ubuntu, although as is known, everything ended well on the one hand and on the other. That and more.

              The Steam Snap will include, in addition to the 32-bit dependencies, some drivers for Mesa (OpenGL, Vulkan, and OpenCL, among others), make it easier to update the package, and provide other benefits, such as better security thanks to the confinement model of Snap. This, at least, is how Canonical sells it, all with the intention of positioning Steam Snap as the only option as of Ubuntu 22.10, in the absence of seeing if Valve withdraws the Deb package that they distribute officially. Meanwhile, a beta testing period is being promoted.

            • Boiling Steam2800 Games On The Steam Deck with Days Gone and House of the Dying Sun as Verified – Boiling Steam

              We are back to a quick pace and reached 2800 games soon after the 2700 games milestone.

            • Linux Links10 Fun Free and Open Source Simulation Games

              Simulation video games (“Sims”) describe a wide range of video games, generally designed to closely emulate real life activities. Examples of this genre include operating a copy of a real-life vehicle, or participating in recreating historical events. Sims differ from other PC games in that their raison d’être isn’t always to entertain, at least not primarily. Simulation games remain popular among gamers, offering players the experience of the real world.

              The game frequently credited as the first simulation game is Fortune Builder, a ColecoVision game which let you plan, build and run your own community. The popularity of the genre accelerated with the releases of the classic SimCity, an open-ended city-building computer and console video game series.

              From three basic types of strategic, planning, and learning exercises: games, simulations, and case studies, a number of hybrids may be considered, including simulation games that are used as case studies.

          • Desktop Environments/WMs

            • K Desktop Environment/KDE SC/Qt

              • KDE Frameworks 5.94.0

                KDE today announces the release of KDE Frameworks 5.94.0.

                KDE Frameworks are 83 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the KDE Frameworks release announcement.

                This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner.

              • Building Plasma for KDE Frameworks 6

                Time for another KDE Frameworks 6 update! Since the last one we made significant progress on getting Plasma to build, which also clears the way for properly styled and platform integrated Qt6-based applications.

                Since about a month ago the second to last Framework is also building with Qt 6 and has CI coverage for that. This was plasma-framework, which enabled a lot of progress in the Plasma modules build on top.

              • The KDE Qt5 Patch Collection has been rebased on top of Qt 5.15.4

                I want to personally extend my gratitude to the Commercial users of Qt for beta testing Qt 5.15.4 for the rest of us.

                The Commercial Qt 5.15.4 release introduced some bugs that have later been fixed. Thanks to that, our Patchset Collection has been able to incorporate the reverts for those two bugs that affected Android and Windows and the Free Software users will never be affected by those!

            • GNOME Desktop/GTK

              • #43 Foundation News · This Week in GNOME

                Update on what happened across the GNOME project in the week from May 06 to May 13.

              • Shortwave 3 expands radio station setups

                To listen to the radio in Linux in a simple way we have an application called short wave, of which version 3.0 has recently appeared. It is built with GTK and Rust and is part of GNOME through the circles initiative.

                It is obvious that we are dealing with an application that performs a very specific task and that does not give much room to create something revolutionary. Moreover, it can even be said that for a long time we have lived in an era in which innovation at the level of desktop applications has been scarce, often with more aesthetic changes (yes, very elaborate depending on the case) than technological revolutions. real. However, that does not mean that Shortwave 3 does not bring interesting things.

                To start with, we have the GNOME 42 dark mode support thanks to Shortwave being an application built on GTK 4. Consequently, the aesthetic theme has been updated to use the new Adwaita design which can be seen in the aforementioned version of the desktop environment (at least in its base implementation).

              • Voice – Ole Aamot

                Voice will let you listen to and share short, personal and enjoyable Voicegrams via electronic mail and on the World Wide Web by GNOME executives, employees and volunteers. Xiph.org Ogg Vorbis is a patent-free audio codec that more and more Free Software programs, including GNOME Voice (https://www.gnomevoice.org/) have implemented, so that you can listen to Voicegram recordings with good/fair recording quality by accessing the Voicegram file $HOME/Music/GNOME.ogg in the G_USER_DIRECTORY_MUSIC folder in Evolution or Nautilus.

                Currently it records sound waves from the live microphone into $HOME/Music/GNOME.ogg (or $HOME/Musikk/GNOME.ogg on Norwegian bokmål systems) and plays back an audio stream from api.perceptron.stream:8000/56.ogg simultaneously on GNOME 42.

        • Distributions and Operating Systems

          • Distrobox is Awesome – blog.theuse.net

            When I started using Distrobox, I started wondering what are the limits of what I could do with this system? I was able to install my favorite Usenet newsreader, Knode from Debian 8, and openSUSE on whatever system I wanted. It opened whole new doors for experimenting with software that may be long forgotten.

            Could I run a simple windows manager like i3, Sway, or IceWM in Distrobox? It took some trial and error, but yes I could.

            Now, with that said, we are working with containers. When you run an application in Distrobox, it mainly sees your actual home directory. Outside of your home directory, it sees the container’s filesystem. If you save something to your home directory, it gets saved to your real home directory and you can open it up like you could normally. If you save something to /usr/local/ or any other directory outside of your home directory, it will only be saved in the container and not to your actual base filesystem.

          • Barry Kaulerf2fscrypt utility compiled statically in OE

            I am planning to investigate f2fs instead of ext4 for the working partition. To support encrypted folders in ext4, there is the ‘e4crypt’ utility, which is in the initrd. To support encryption of folders in f2fs, the ‘f2fscrypt’ utility is needed.

          • New Releases

            • Alt Workstation K 10.0 Released

              published release of the distribution kit ” Alt Workstation K 10 “, supplied with a graphical environment based on KDE Plasma, has been Boot images prepared for x86_64 architecture ( HTTP , Yandex Mirror , Distrib Coffee , Infania Networks ). The operating system is included in the Unified Register of Russian Programs and will satisfy the requirements for the transition to infrastructure running domestic operating systems. The build based on KDE was the final one in updating the entire line of Alt distributions to the tenth branch of the platform. In December 2021, the distribution “Alt Server” , “Workstation” , “Education” , Simply Linux , “Virtualization Server” were released .

              An important feature is the ability to boot from the Alt Workstation K disk in Live mode. Like other operating systems from the Alt OS family, the distribution is equipped with the Alterator graphical interface for system configuration, which allows you to manage users and groups, view system logs, add printers, configure the network, and much more. The system successfully works in the Active Directory domain. Support for applying group policies is implemented using the Samba 4.14 server. Alt Workstation K 10 contains all the tools for performing office tasks – a web browser, an office suite of text editors and spreadsheets, as well as players and editors for sound and video.

          • BSD

            • TrueNAS 13.0 Released, a Linux OS for creating network storage

              TrueNAS 13.0 Release, a Linux OS for creating network storage, After a year and a half of development, iXsystems introduced the release of TrueNAS CORE 13 , a distribution kit for the rapid deployment of network storage (NAS, Network-Attached Storage). TrueNAS CORE 13 is based on the FreeBSD 13 code base, featuring integrated ZFS support and web-based management built using the Django Python framework. FTP, NFS, Samba, AFP, rsync and iSCSI are supported to organize storage access, software RAID (0,1,5) can be used to increase storage reliability, LDAP/Active Directory support is implemented for client authorization. The size of the iso image is 900MB (x86_64). In parallel TrueNAS SCALE distribution is being developed, using Linux instead of FreeBSD.

          • Fedora Family / IBM

            • Unicorn MediaAlmaLinux 8.6 Released Less Than 48 Hours After RHEL 8.6

              Last Friday AlmaLinux announced the beta release of version 8.6 of its eponymous Linux distribution. On Thursday, the stable, production ready release of AlmaLinux 8.6, code named “Sky Tiger,” was pushed out the door, less than 48 hours after the release of Red Hat Enterprise Linux 8.6.

              In case you’re new to the neighborhood, AlmaLinux is one of several distros that are vying to be replacements for CentOS, a distro that for 17 years offered users a feature-for-feature downstream copy of RHEL, until Red Hat ended the project at the end of last year, and repurposed the name (as CentOS Stream) to apply to RHEL’s nightly builds.

            • Fedora ProjectFriday’s Fedora Facts: 2022-19 – Fedora Community Blog

              Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)!

              Fedora Linux 36 was released on Tuesday 10 May. Join us tomorrow for second day of the F36 Release Party

              Election nominations are open through 25 May.

            • Red Hat OfficialRed Hat Summit 2022 Newsroom
            • Red Hat OfficialRed Hat Defines a New Epicenter for Innovation with Red Hat Enterprise Linux 9

              Red Hat, Inc., the world’s leading provider of open source solutions, today introduced Red Hat Enterprise Linux 9, the Linux operating system designed to drive more consistent innovation across the open hybrid cloud, from bare metal servers to cloud providers and the farthest edge of enterprise networks. Red Hat Enterprise Linux 9 is designed to drive enterprise transformation in parallel with evolving market forces and customer demands in an automated and distributed IT world. The platform will be generally available in the coming weeks.

            • Red Hat OfficialRed Hat and General Motors Collaborate to Trailblaze the Future of Software-Defined Vehicles

              Red Hat, Inc., the world’s leading provider of open source solutions, and General Motors (NYSE:GM) today announced a collaboration to help advance software-defined vehicles at the edge. The companies expect to expand an ecosystem of innovation around the Red Hat In-Vehicle Operating System, which provides a functional-safety certified Linux operating system foundation intended for the ongoing evolution of GM’s Ultifi software platform.

            • Red Hat OfficialRed Hat Introduces New Cross-Portfolio Edge Capabilities

              Red Hat, Inc., the world’s leading provider of open source solutions, today announced new capabilities and enhancements across its portfolio of open hybrid cloud solutions aimed at accelerating enterprise adoption of edge compute architectures through the Red Hat Edge initiative. This set of new cross-portfolio edge features and capabilities will focus on helping customers and partners better adapt to edge computing by limiting complexity, speeding deployments, enhancing security capabilities and increasing confidence in managing systems consistently from the datacenter to the edge.

            • Unicorn MediaWhat CEO Paul Cormier Didn’t Say In His Red Hat Summit Keynote – FOSS Force

              Tuesday in Boston the doors opened on the first in-person Red Hat Summit since 2019. The company’s 2020 and 2021 events had been held entirely online in deference to the Covid virus.

              At the last in-person Red Hat lovefest, Red Hat was technically still a publicly traded independent company and Jim Whitehurst was the company’s CEO. The biggest news at that conference (other than the all-but-done sale to IBM) was the release of Red Hat Enterprise Linux 8, making it the last RHEL release under an independent Red Hat.

              It seems somehow fitting that the company’s next in-person event has happened about a week before RHEL 8.x is to be replaced by RHEL 9.

          • Devices/Embedded

            • CNX SoftwareZUBoard 1CG – A low-cost AMD Xilinx Zynq UltraScale+ ZU1CG MPSoC FPGA development board – CNX Software

              Avnet ZUBoard 1CG is a development board featuring the new entry-level AMD Xilinx Zynq UltraScale+ ZU1CG dual-core Cortex-A53 MPSoC with 81K FPGA system logic cells, equipped with 1GB LPDDR4 RAM, as well as SYZYGY connectors and mikroBus expansion for Click boards.

              Priced at $159, the board may offer a good opportunity to get started with Zynq UltraScale+ MPSoC, as it’s quite cheaper than boards based on ZU3 devices such as Ultra96-V2 or MYD-CZU3EG. Avnet says the board is suitable for artificial intelligence, machine learning, embedded vision, embedded processing, and robotics applications.

          • Open Hardware/Modding

            • Smart Farm with Raspberry PI, RPI Pico and WIZnet Ethernet Hat

              IoT devices have wide industry application fields. But they can also help improve some sectors such as agriculture to better use resources and keep under control your production

              In this tutorial, I’m going to show you how to create a smart farm architecture by using a Raspberry PI computer board as a central processing and data presentation, while a Raspberry PI Pico microcontroller with WIZnet Ethernet HAT will collect data from your farm.

              Please note that the steps covered in this tutorial should also work with the W5100S-EVB-Pico board.

          • Mobile Systems/Mobile Applications

        • Free, Libre, and Open Source Software

          • Funding

            • The Register UKOpen-source-as-a-service data tech startup scores $210m • The Register

              Finnish open-source-as-a-service provider Aiven received $210 million in funding this week, adding $1 billion to its nominal valuation in just nine months.

              The Series D cash injection – led by Eurazeo, and joined by funds and accounts managed by BlackRock as well as existing investors IVP, Atomico, Earlybird, World Innovation Lab, and Salesforce Ventures – follows $60 million Series C funding which valued the firm at $2 billion.

              The latest investment round values the company at $3 billion. It’s remarkable considering it only supports open-source software and was worth $800 million when it got its first $100 million tranche of Series C funding in March last year.

          • Programming/Development

            • Drew DeVaultA Hare code generator for finding ioctl numbers

              Modern Unix derivatives have this really bad idea called ioctl. It’s a function which performs arbitrary operations on a file descriptor. It is essentially the kitchen sink of modern Unix derivatives, particularly Linux, in which they act almost like a second set of extra syscalls.

          • Leftovers

            • My Brother Brandon

              I don’t know how we got home, but I had a brother, and for the next 12 years or so, he was really the only person I knew. We pretty much did everything together.

            • gemini://okayhousekeeping.flounder.online/gemlog/2022-05-14.gmi

              Bad. It’s going pretty bad. Work is exhausting. Mondays and Tuesdays generally still work out. Wednesdays fall through and I end up doing multiple garbage runs on Saturday.

            • Pseudo-Open Source

              • Openwashing

                • OpenSource.com5 reasons to apply for B Corp certification

                  As Managing Director, I have found that becoming a B Corp has been hugely beneficial to us as at Wholegrain Digital and has contributed to our success in recent years.

                  I believe that it should only be pursued if you truly want to run a more responsible business. It’s a lot of work that won’t immediately pay for itself but if you’re in it for the long term, it can pay dividends for people, the planet, and be financially profitable too.

            • Security

              • USCERTCISA Temporarily Removes CVE-2022-26925 from Known Exploited Vulnerability Catalog [Ed: Almost as if Microsoft controls CISA "from the inside". They certainly control the narrative there as CISA rarely mentions Windows or Microsoft, except in a positive context.]

                CISA is temporarily removing CVE-2022-26925 from its Known Exploited Vulnerability Catalog due to a risk of authentication failures when the May 10, 2022 Microsoft rollup update is applied to domain controllers. After installing May 10, 2022 rollup update on domain controllers, organizations might experience authentication failures on the server or client for services, such as Network Policy Server (NPS), Routing and Remote access Service (RRAS), Radius, Extensible Authentication Protocol (EAP), and Protected Extensible Authentication Protocol (PEAP). Microsoft notified CISA of this issue, which is related to how the mapping of certificates to machine accounts is being handled by the domain controller.

              • Bleeping ComputerMicrosoft: Sysrv botnet targets Windows, Linux servers with new exploits [Ed: This has nothing to do with Linux, but Microsoft-connected sites post garbage like that]

                Microsoft says the Sysrv botnet is now exploiting vulnerabilities in the Spring Framework and WordPress to ensnare and deploy cryptomining malware on vulnerable Windows and Linux servers.

              • Vulnerability in Zyxel firewalls allowing code execution without authentication – LinuxStoney

                in Zyxel’s ATP, VPN, and USG FLEX series devices designed for enterprise firewalls, IDS, and VPNs has been identified critical vulnerability (CVE-2022-30525) To carry out an attack, an attacker must be able to send requests to the device via the HTTP/HTTPS protocol. Zyxel vulnerability in the ZLD 5.30 firmware update. According to the Shodan service, there are currently 16,213 potentially vulnerable devices on the global network that accept requests via HTTP/HTTPS.

                Operation is performed by sending specially designed commands to the /ztp/cgi-bin/handler web handler, accessible without authentication. The problem caused by the lack of proper cleaning of query parameters when executing commands in the system using the os.system call used in the lib_wan_settings.py library and performed when processing the setWanPortSt operation.

              • AstroTurf/Lobbying/Politics

                • Some Government is Probably Okay I Guess

                  I have a lot of anarcho-capitalist friends. Mostly we get on fine, but there’s a limit to our agreement: they say all government is bad, and I say, yeah, but I’m okay with some anyway. Here’s why we disagree:

                  Everyone accepts that people do good things sometimes, and bad things other times. Everyone does something wrong sometimes, and some more than others. There’s a subset of people who are comfortable doing what they know is wrong and would oppose as wrong if others did it, as long as they see a personal advantage in the wrong act. In terms that start to become political, that means that some of us will exercise coercion on people if we see a likely advantage to it. So, in a society of people minding their own business, engaging in voluntary relations of all kinds, some will join together to violate the rights of others for their own gain. They are, after all, acting in their own self-interest: if they feel no particular moral discomfort in gaining by taking your property by force, why wouldn’t they turn marauder? Joined together, they have little to fear from the opposition of one person alone.

            Links 14/05/2022: Builder GTK 4 Porting and Raspberry Pi Matrix Dashboard

            Posted in News Roundup at 8:56 am by Dr. Roy Schestowitz

            • GNU/Linux

              • Server

                • HackadayRetrotechtacular: The IBM System/360 Remembered

                  Before IBM was synonymous with personal computers, they were synonymous with large computers. If you didn’t live it, it was hard to realize just how ubiquitous IBM computers were in most industries. And the flagship of the mainframe world was the IBM System/360. For a whole generation that grew up in the late 1960s and early 1970s, a 360 was probably what you thought of when someone said computer. [Computer History Archive Project] has a loving recollection of the machine with a lot of beautiful footage from places like NASA and IBM itself. You can see the video below.

              • Audiocasts/Shows

                • HackadayHackaday Podcast 168: Math Flattens Spheres, FPGAs Emulate Arcades, And We Can’t Shake Polaroid Pictures

                  Join Hackaday Editor-in-Chief Elliot Williams and Staff Writer Dan Maloney as they review the top hacks for the week. It was a real retro-fest this time, with a C64 built from (mostly) new parts, an Altoids Altair, and learning FPGAs via classic video games. We also looked at LCD sniffing to capture data from old devices, reimagined the resistor color code, revisited the magic of Polaroid instant cameras, and took a trip down television’s memory lane. But it wasn’t all old stuff — there’s flat-packing a sphere with math, spraying a fine finish on 3D printed parts, a DRM-free label printer, and a look at what’s inside that smartphone in your pocket — including some really weird optics.

              • Graphics Stack

                • HackadayNVIDIA Releases Drivers With Openness Flavor

                  This year, we’ve already seen sizeable leaks of NVIDIA source code, and a release of open-source drivers for NVIDIA Tegra. It seems NVIDIA decided to amp it up, and just released open-source GPU kernel modules for Linux. The GitHub link named open-gpu-kernel-modules has people rejoice, and we are already testing the code out, making memes and speculating about the future. This driver is currently claimed to be experimental, only “production-ready” for datacenter cards – but you can already try it out!

              • Instructionals/Technical

                • APNICReducing bias of networking A/B tests

                  My colleagues and I at Stanford University and Netflix, recently published a paper at the Internet Measurement Conference 2021 (and which was one of the recipients of this year’s Applied Networking Research Prize) that showed how A/B tests can have extremely biased results when run over congested networks. We showed experiments where even the direction of the result is switched — a treatment that performs poorly in an A/B test could perform well when deployed, and vice versa.

                • APNICThe future (and history) of IPSec

                  These can be used to either protect IP directly or in a ‘tunnelled’ mode. Tunnelled mode is most like the virtual private network widely used by enterprises in the global Internet.

                • APNICOpen DNS resolvers, from bad to worse

                  This prompted my colleagues and me at the University of Twente to think of how to further shrink the surface for abuse of open resolvers during DDoS attacks, specifically the amplification power. We recently experimented with open resolvers to identify amplification power diversities that we intuitively expected among open resolvers in the IPv4 address space. Among our findings, we found that we can reduce the overall potential of such attacks by 80% if we patch around 20% of the most potent amplifiers.

                • ScribeLinux Accessibility: an unmaintained Mess

                  This article was written so that focus can be brought to the accessibility of the Linux desktop. As Raspberry Pi computers become more prevalent in schools, I want blind students to be able to enjoy learning to code, manage systems, and explore computing. I want blind people to be able to grow up learning about computers to the point that, when they’re in their early 20s, they can build apps, make emulation layers for older systems, or automate their jobs. I want blind kids to have the opportunities I didn’t have. Furthermore, I want them to be able to learn Python, not Quorum. I want them to learn the innards of Linux, not to have to fight Windows for every advanced setting or change. And if a blind person is tired of their blind-specific job, I want them to be able to easily learn to be a system administrator by administering their own Linux system.

              • Games

              • Desktop Environments/WMs

                • K Desktop Environment/KDE SC/Qt

                • GNOME Desktop/GTK

                  • Builder GTK 4 Porting, Part IV

                    I spent a little time this week triaging some incoming Text Editor issues and feature requests. I’d really like this application to get into maintenance mode soon because I have plenty of other projects to maintain.

            • Distributions and Operating Systems

            • Free, Libre, and Open Source Software

              • Programming/Development

                • desperately seeking seclusion (i.e. working from home)

                  You wanna know what’s way more difficult than I thought it would be?

                  Doing real work after over a couple decades of writing software remotely.

                  But, wow, could I get hired again? “Agism” does seem to be a thing in my somewhat recent experience. And I’m not completely opposed to it, for surely younger people need such jobs way more than I do.

                  But I’d really love to setting into a software “generalist” position, and use those earnings to hire others to do what’s become too backbreaking and/or exhausting for me – at least at the pace my wife was hoping I could sustain (especially as outdoor temperatures rise).

                • Perl / Raku

                  • Relativism

                    Like marginalia, I don’t know how to build software. Not only that, I also don’t know how to live my life.

              • Standards/Consortia

            • Leftovers

              • The NationThe New York Times Has Badly Lost Its Bearings

                Joe Kahn, the next executive editor of The New York Times, will inherit a great news organization that has lost its bearings when it comes to national and political coverage.

              • The NationFarewell to Midge Decter, the Bigot on the Beach

                It was Midge Decter’s misfortune to, like Norman Mailer and William F. Buckley before her, become a target of the Olympian ire of Gore Vidal. Decter, who died at age 94 earlier this week, is rarely regarded as in the same league as these three men, although she was, at different points in her life, a close friend of both Mailer and Buckley. Indeed, as an editor at Harper’s Magazine, she helped midwife one of Mailer’s best books, The Armies of the Night (1967). And Vidal himself was a kind of friendly enemy to Decter in the 1960s, before becoming an outright enemy when they quarreled about gay rights.

              • The NationThe American Justice System Has Failed Us All

                If you watched TV in the 1960s and 1970s as I did, you would undoubtedly have come away with the idea that this country’s courts, law enforcement agencies, and the laws they aimed to honor added up to a system in which justice was always served.

              • Counter PunchPowerful Untold Stories

                It occurs to me that a similar untold story of power happening all around us in younger generations involves the “right” demonstrated capacities – and “left” incapacity – to learn from our mistakes and from our adversaries’ victories. From the 30,000 foot level where Dems are “left” and the rightwing looks even more united than (tho just as white as) it actually is, let me try to explain with generations of examples drawn for simplicity from that broad D/R binary tendency as expressed crudely in decades of presidential leadership:

              • Counter Punch“Something to Do with Paying Attention”: David Foster Wallace’s Final Work, the Public Good, and a “Wastoid” Nation

                His appraisal of the emotional utility of literature has become a cliché, quoted endlessly in essays about Wallace (like this one), and articles about literature more broadly. Even though this will also traverse into cliché territory, it seems that the “less alone” function of literature is impossible to actually achieve as a social mechanism. Instead, literature can offer the cold comfort of allowing a person to feel that his or her own sense of separation from the dominant community or culture is not unique. It sounds simple, but when reading David Foster Wallace, I often think, “Someone else gets/got it” – the “it” being a feeling that I cannot fully describe.

                Wallace was not a preacher or politician, even if the borderline worshipful community of admirers that has developed since his 2008 suicide has turned him into a guru. He was an artist. Like most great artists, he made it impossible to separate the substance from the form of his work.

              • Counter PunchLawrence O’Donnell is Worried About Senate Apportionment

                Having recently returned to an apartment equipped with cable television, putting me back in touch with the great pearls of wisdom tossed on the airwaves by the imperialist likes of Anderson Cooper and Rachel Maddow, I am struck by O’Donnell’s recent discovery that the U.S. Senate – wherein every US state gets two representatives (US Senators) – is absurdly malapportioned in ways that vastly over-represent the most rural, white, and reactionary states and regions of the United States and that Republicans are using to crush “American democracy.” O’Donnell recently observed that California is home to nearly 40 million people and gets two US Senators while “the Dakotas” – the two right-wing states North and South Dakota – have four US Senators between them despite a combined population “less than [bright blue and progressive] Brooklyn.” This, O’Donnell feels, is a gross “minority rule” violation of “American democracy,” which is based on the egalitarian notions of one person, one vote and majority rule.

                Ya don’t say.

              • Andre Alves GarziaHow this blog works, or, embracing chaos

                Once I decided to get back into blogging, I first went on a deep rabbit hole of researching what to use. It is not as if I didn’t had a website, it is just that I treated my websites as temporary. I would every couple years burn it all down and create a new one in the same domain. I wish I kept the old data, but at the moment that trashing usually involved migrating to new servers or services, but that is a story for another time. What I ended up finding was all the IndieWeb stuff, and it made me fall in love with blogging again. I was ready to be in control of my own platform and what is best than to be in control of your own CMS source-code, am I right? no.

              • The Shark Pen Is a Great Pen

                Many consider the Lamy Safari to be a good example of good design that’s based on true understanding of the user’s needs, but with cost in mind. I agree and the Safari is a great workhorse pen for me, but I like Jinhao 993 (the “shark pen”) more, and I think it’s a better pen. I think it’s amazing to see how much Jinhao has achieved, within much lower price constraints.

                Although it’s a light pen with good length, the ergonomic grip section of the Safari is thin and tapered. It works best when you put the fingers on the flat sides of the grip section, and rest the fingers on the two “wings”. After a while, my hand gets tired. In contrast, the shark pen has a wide grip section, which isn’t tapered. My hand is relaxed when I hold this pen. It has two curved indents on the sides, allowing you to hold the pen higher, if that’s what works for you, or if your hand is tired and you must switch to a more relaxed grip if you want to keep up with the lecture.

              • Science

                • HackadayWhat’s In A Wattmeter?

                  The idea behind watts seems deceptively simple. By definition, a watt is the amount of work done when one ampere of current flows between a potential of one volt. If you think about it, a watt is basically how much work is done by a 1V source across a 1Ω resistor. That’s easy to say, but how do you measure it in the real world? [DiodeGoneWild] has the answer in a recent video where he tears a few wattmeters open.

              • Education

                • New York TimesMy College Students Are Not OK

                  I also feel compassion for my students, but the learning breakdown has convinced me that continuing to relax standards would be a mistake. Looser standards are contributing to the problem, because they make it too easy for students to disengage from classes.

              • Hardware

                • HackadayAbsolute Encoder Teardown

                  According to [Lee Teschler], the classic representation of encoders showing code rings is out of date. His post says that most industrial absolute encoders use a special magnetic sensor known as a Wiegand wire to control costs. To demonstrate he does a teardown of an encoder made by Nidec Avtron Automation, and if you’ve ever wondered what’s inside something like this, you enjoy the post.

                • HackadayBig Audio Visualizer Pumps With The Music

                  A spectrum analyzer is a great way to create exciting visuals that pulse in time with music. [pyrograf] wanted a big one as a display piece, so set about whipping up something of their very own.

                • HackadayRound LCDs Put To Work In Rack Mount Gauge Cluster

                  Like many of you, we’re intrigued by the possibilities offered by the availability of affordable round LCD panels. But beyond the smartwatches they were designed for, it’s not always easy to come up with an appropriate application for such non-traditional displays. Digital “steam gauges” are one of the first ideas that come to mind, so it’s perhaps no surprise that’s the direction [Tom Dowad] took his project. But rather than just one or two gauges, he decided to go all out and put eight of them in a 1U rack mountable unit.

              • Health/Nutrition/Agriculture

                • Counter PunchDid the Long Pandemic Spawn a New Kind of Repression?

                  I’ve traveled domestically and internationally many times since the start of the pandemic and I hate the mask as much as anyone. It makes me sneeze and it tickles. After 10 hours on long hauls, I can indeed feel like I’m suffocating. It can be almost unbearable. But after two years of obediently masking up to enter airports and planes around the world, I found my first unmasked travel experience jarring indeed, even though I kept mine on. I was not the only masked person on that American Airlines flight, but I was definitely in the minority.

                  Writing a book, Virus: Vaccinations, the CDC, and the Hijacking of America’s Response to the Pandemic, about the politics and science of our Covid-19 experience, I came to know and trust public-health policy experts and vaccine scientists. I learned enough about the mRNA vaccines so many (but not enough) of us have received that I regard them as a major medical milestone well worth celebrating. I also accept that scientific understanding is based on uncertainty and the advice of our health authorities is only as good as the latest peer-reviewed article.

                • Common Dreams‘Flatly Incomprehensible’: White House Prepares to Ration Vaccines as GOP Obstructs Covid Aid

                  The Biden White House is reportedly preparing to ration coronavirus vaccines as Senate Republicans continue to obstruct a multibillion-dollar Covid-19 aid package, sparking outcry from public health experts who say GOP obstruction is hampering the nation’s pandemic response as infections rise.

                  Politico reported late Thursday that the Biden administration “may soon need to run its sprawling pandemic response on a shoestring budget” as Republicans in Congress hold up a $10 billion aid package that a bipartisan group of senators agreed to in late March.

                • TruthOutOverdose Deaths Are Higher Than Ever, and the GOP Is Exploiting the Crisis
                • Pro PublicaThe Plot to Keep Meatpacking Plants Open During COVID-19

                  As hundreds of meatpacking workers fell sick from the coronavirus that was spreading through their plants and into their communities in April 2020, the CEO of Tyson Foods reached out to the head of another major meatpacker, Smithfield Foods, with a proposal.

                  Smithfield’s pork plant in Sioux Falls, South Dakota, had been hit particularly hard, and state and local officials were pressuring the company to shut it down.

                • Counter PunchRussia’s Hunger Games

                  The latest developments, including: – Russia’s war on Ukrainian agriculture – Echoes of Holodomor? – Why is Russia attacking farms and grain warehouses? – Biden limits intelligence sharing with Ukraine – Why Biden is right to do so – How we learned the details on the Butchers of Bucha – The importance of antiwar voices not losing their humanity – German neo-Nazis trained in Russia to fight in Donbas

              • Proprietary

                • SANSOctopus Backdoor is Back with a New Embedded Obfuscated Bat File

                  Last week, I found another interesting Word document that delivered an interesting malicious script to potential victims. Usually, Office documents carry VBA macros that are activated using a bit of social engineering (the classic yellow ribbon) but this time, the document did not contain any malicious code: [...]

                • Computer WorldApple’s Mac shortage is a big red flag for enterprise IT

                  Enterprise purchasers should expect to become frustrated when purchasing new hardware in the coming months, as supply chain logistics continue to deteriorate. When it comes to Apple kit, you may have the budget, but Macs are becoming increasingly difficult to find.

                • MacworldAs WWDC looms, Apple is quickly running out of Macs

                  In fact, the only Macs that don’t appear to be in short supply in the U.S. are the older M1 Macs: the MacBook Air, 13-inch MacBook Pro, Mac mini, and 24-inch iMac, all of which are mostly available for shipping immediately.

                  While Apple shipping delays are hardly a new phenomenon, particularly with newer products, just last month, many of these products were being shipped within 2-3 weeks. with the M1 Max MacBook Pros having a six-weeks backlog. So it’s getting bad out there. Here’s when you can expect to get your Mac if you order from the Apple Store today: [...]

              • Pseudo-Open Source

                • Openwashing

                  • Silicon AngleRed Hat Summit marks the triumph of open source

                    “It’s not enough to just say, ‘Hey, we’ve got APIs.’ We have API Sprawl today, so it’s mainly about building that ecosystem. We are very active in the community and trying to do things that can lift up the community, help the developers, help that cloud-native ecosystem, and help our customers move faster,” he concluded.

                    Here’s the complete video interview, part of SiliconANGLE’s and theCUBE’s coverage of the Red Hat Summit event: [...]

                  • SDx CentralCisco: Community Is Key for Open Source Security

                    The intersection of software and security “is an onion,” he said. To that point, Augustus doesn’t believe open source security can ever be fully trusted in terms of security. “The final answer that I like to give for any sufficiently complex problem is: it depends.”

              • Security

                • Privacy/Surveillance

                  • PIAMental Health Apps Are Not As Private As You Think

                    However, these apps aren’t as trustworthy as you think. Mental health apps secretly pass on your data to their business partners behind your back. It’s not just a few basic facts either: the shared data often contains your address, full name, occupation, marital status, symptoms you’re experiencing, daily moods, and a lot more.

                  • The VergeAnonymous bulletin board app Yik Yak is revealing its users’ exact locations

                    Yik Yak, an app that acts as a local anonymous message board, makes it possible to find users’ precise locations and unique IDs, Motherboard reports. A researcher who analyzed Yik Yak data was able to access precise GPS coordinates of where posts and comments came from, accurate within 10 to 15 feet, and says he brought his findings to the company in April.

                  • Malwarebytes LabsClient side scanning may cost more than it delivers

                    Privacy advocates argue it brings the EU closer to the surveillance state that many see in other countries and that is a frightful image. It is also a step back when it comes to cybersecurity. What do we call software that eavesdrops on what we are doing on our devices and sends it to a third party? Spyware! And what happens to servers that accumulate large amounts of private data? They become targets for cybercriminals.


                    In this case, it means that the EU wants to force all providers of email, messaging, and chat services to comprehensively search all private messages, even in the absence of any suspicion. That makes the contents of messages no longer private between the sender and receiver, and client-side scanning breaks the E2E encryption trust model.

                  • MIT Technology ReviewGoogle is failing to enforce its own ban on ads for stalkerware

                    Stalkerware, also referred to as spyware, is software designed to secretly monitor another person, tracking their location, phone calls, private messages, web searches, and keystrokes. Such apps, some of which are free but most of which are paid-for, typically run undetected in the background on a phone, or masquerade as harmless-seeming calculators, calendars, or system maintenance apps.

                  • The MarkupFacebook Promised to Remove “Sensitive” Ads. Here’s What It Left Behind

                    As far back as 2018, CEO Mark Zuckerberg told Congress the company had “removed the ability to exclude ethnic groups and other sensitive categories from ad targeting. So that just isn’t a feature that’s even available anymore.”

                    The Markup found, however, that while “Hispanic culture” was removed, for example, “Spanish language” was not. “Tea Party Patriots” was removed, but “Tea party” and “The Tea Party” were still available. “Social equality” and “Social justice” are gone, but advertisers could still target “Social movement” and “Social change.”

                    Starbucks, for example, was still able to use existing options after the change to place an ad for its pistachio latte focused on users interested in “Contemporary R&B,” “telenovela,” “Spanish language,” and “K-pop,” all proxies for Black, Latino, and Asian audiences on Facebook.

                  • Malwarebytes LabsClearview AI banned from selling facial recognition data in the US

                    Clearview AI, a facial recognition software and surveillance company, is permanently banned from selling its faceprint database within the United States. The company also cannot sell its database to state and law enforcement entities in Illinois for five years.

                    This is a historic win for the American Civil Liberties Union (ACLU). This nonprofit organization filed a lawsuit against Clearview in 2020, alleging the company has built its business around secretly taking facial recognition data from people without consent.

              • Defence/Aggression

                • Common DreamsOpinion | To End the Horror in Ukraine, Go Big, and Go Broad

                  The tragic, illegal war of aggression by Russia against Ukraine should end now, with a ceasefire and then a comprehensive peace agreement. It could be based on the previously negotiated 2015 Minsk II agreement, which is quite detailed and balanced in seeking to resolve territorial, political, cultural, and linguistic disputes. What makes this war so ghastly is the eventual outcome was widely known and achievable before Russia invaded, namely Ukrainian neutrality, no NATO membership, and territorial, legal and political accommodations over Crimea and the Donbas region.

                • Democracy NowGerman Peace Activist Warns Finland Joining NATO Could Be Step Toward Nuclear War with Russia

                  Finland’s president and prime minister say they plan to end decades of neutrality and join NATO. Sweden is also expected to seek NATO membership. The Kremlin says Russia sees the expansion of NATO on its borders as a threat. “People on both sides will suffer,” says Reiner Braun, executive director of the International Peace Bureau, who warns Russia will escalate in response and move more nuclear weapons near the 830-mile-long Finland-Russia border.

                • TechdirtEU, UK, US Directly Accuse Russia Of Hacking ViaSat Satellites

                  For literally more than a decade researchers warned that global satellite telecommunications networks were vulnerable to attack. These attacks vary in nature but several allowed an intruder miles away to both intercept and disrupt satellite communications. In 2020 hackers again clearly demonstrated how these perpetually unresolved vulnerabilities were putting millions of people at risk.

                • TechdirtThe Rich And Powerful Are Abusing ‘Privacy’ Laws To Silence Journalists And Authors

                  At a time when Russia and Russian oligarchs should be facing more scrutiny and careful work by investigative reporters, it is actually becoming that much more difficult to do so. And the main reason is that EU and UK “data protection” laws, passed in a flurry with promises of protecting your privacy from the greedy Silicon Valley Zuckerbergian overlords, is actually serving as a potent weapon in the hands of Russian oligarchs seeking to avoid scrutiny.

                • Counter PunchThe Ukraine War is Accelerating the New Space Race

                  These decisions have naturally generated concern across the space industry and political landscape. For decades, Russian and Western countries have collaborated in space despite flare-ups in tensions on Earth. In 1975, the U.S. Apollo capsule linked up with the Soviet Soyuz spacecraft briefly as a symbol of cooperation amid the Cold War. In 1995, the U.S. space shuttle Atlantis docked with the Russian space station Mir.

                  And in 1998, the International Space Station (ISS) was launched, featuring a Russian Orbital Segment (ROS) and a United States Orbital Segment (USOS), the latter being operated by NASA, the ESA, the Japan Aerospace Exploration Agency (JAXA), and the Canadian Space Agency (CSA).

                • Common DreamsAthens Declaration Calls for End to Ukraine War and Creation of ‘Lasting Peace’

                  A group of international progressives on Friday released a declaration demanding an urgent withdrawal of Russian forces from Ukraine, a global end to “rampant militarism,” and the forging of a collaborative movement to ensure lasting peace and a planet safe from climate catastrophe.

                  The Athens Declaration was unveiled at a press conference in the Greek capital by Turkish author Ece Temelkuran; British Member of Parliament and former Labour leader Jeremy Corbyn; and former Greek finance minister and leader of the MeRA25 party Yanis Varoufakis. The three are all Progressive International council members.

                • Common DreamsOpinion | We Have More in Common With Cuba Than We Think

                  A week ago I returned to the United States from Cuba where I got to spend International Workers’ Day with 100 other young organizers from the U.S. alongside over 700,000 other people who celebrated in Havana that day. With the International People’s Assembly of North America, we spent a week learning about the Cuban socialist project and how the blockade imposed by the United States impacts life in Cuba.

                • TruthOutZelenskyy Calls for Direct Talks With Putin as Russia Pulls Back From Kharkiv
                • Common Dreams‘We Must Find an Agreement’: Zelenskyy Calls for Direct Talks With Putin

                  Ukrainian President Volodymyr Zelenskyy said Thursday that he is prepared to hold direct talks with his Russian counterpart Vladimir Putin amid mounting fears that Moscow’s invasion and the West’s response have spiraled into a dangerous proxy war between nuclear-armed powers.

                  “We must find an agreement,” Zelenskyy said in an interview with an Italian media outlet as deadly ground fighting between Russian and Ukrainian forces continues to intensify.

              • Counter PunchUkraine in Vain: Fuck Putin but Let the Donbass Go

                It’s tempting to chock this upset up to the fact that Ukraine is the heavily armed quisling state of a massive empire but if Afghanistan taught us a goddamn thing it’s that all the money in the universe can’t buy you a victory in someone else’s country. Kabul collapsed like a trillion-dollar lawn chair because the people there wanted the Taliban to stay and Kyiv withstood a brutal siege from one of the biggest armies on earth because the people there wanted Putin to go fuck himself, and good on them for that.

                I despise Volodymyr Zelensky and his grotesque coalition of neoliberal gangsters and barely closeted neo-fascists, but they didn’t kick Russia’s ass until it broke. This war wasn’t won by NATO, it was won by some working-class, Russian-speaking, Vlad Jerkoff lobbing Stinger missiles at T-72s for running over his fucking mailbox. Saddam Hussein was a gutless dirtbag too but that didn’t make the rooftop Sadrists who spoiled Bush’s “Mission Accomplished” any less legit. Provoked or not, Putin invaded somebody else’s neighborhood and somebody else made him pay a heavy price for his hubris, leaving Vlad with no other choice but to limp from the front lines back to Donbas and declare his retreat Phase Two as if he had planned it all along.

              • TruthOutIndian Boarding Schools Were Part of “Genocidal Process” Carried Out by the US
              • Craig MurrayWhat Might A Ukraine Peace Agreement Look Like?

                Currently nobody in power wants peace. Both sides believe they might yet improve their position on the ground. Thousands are needlessly dying horrible deaths in Europe. But the West now has a proxy war with Russia itself that is weakening Russia militarily, economically and diplomatically. Putin has to keep going, hoping to show something he can portray as victory and worth all the pain. Meantime the arms manufacturers and related interests are profiting enormously – and never forget that applies to both sides.

              • Counter PunchTaking Aim At US Follies and Media Malpractices 2016: Stephen Cohen Takes on the Hawks

                War with Russia: from Putin and Ukraine to Trump and Russiagate (2022) provides lots of critical insights, pearls brought up from the deep diving of Cohen. Our focus in the first article was on the demonization of Vladimir Putin; this one puts the spotlight on US follies and media malpractices in 2016. Reminding us in the  January 20th commentary that Barach Obama had vowed to “isolate” Putin in international relations, Cohen observes that in early January there was a flurry of nervous diplomatic activity in Washington, Paris, Germany, Moscow, and Kiev to discuss two “essential elements” of the Minsk Accords.

                The rebel regions in eastern Ukraine were to receive constitutionally legislated home rule. But Ukrainian president Petro Poroshenko feared a “violent backlash by armed ultranationalist forces” (p. 33). Russia had its own problems and issues – ranging from Europe and Syria to economic woes. But the US media-political narrative misunderstood what Putin wanted in Ukraine: “not a permanently destabilized country, as is incessantly reported, but a peaceful neighbour that does not threaten Russia’s vital economic or security interests – or permanently divide millions of inter-married Russian-Ukrainian families (p. 34). Most of us don’t have a clue about the ethnic-historical composition of Ukraine (about 30% of Ukrainians are of Russian origin). Cohen considered this “secret diplomacy” a hopeful “fork in the road.” However, as we now know more completely, Washington and NATO were opposed to Russia’s security demands.

              • Counter PunchMali’s Military Ejects France, But Faces Serious Challenges

                Colonel Maïga said that there were three reasons why Mali’s military had taken this dramatic decision. The first was that they were reacting to France’s “unilateral attitude,” reflected in the way France’s military operated in Mali and in the June 2021 decision by French President Emmanuel Macron to withdraw French forces from the country “without consulting Mali.” France’s military forces moved to nearby Niger thereafter and continued to fly French military planes over Malian airspace. These violations of Malian airspace “despite the establishment of a temporary no-fly zone by the Malian military authorities” constituted the second reason for the new declaration, according to the statement. Thirdly, Mali’s military had asked the French in December 2021 to revise the France-Mali Defense Cooperation treaty. Apparently, France’s answer to relatively minor revisions from Mali on April 29 displeased the military, which then issued its statement a few days later.

                ‘Neither Peace, Nor Security, Nor Reconciliation’

              • Counter PunchFresh Off Russia, the U.S. Just Can’t Stop Provoking China

                In addition, are the hundreds if not thousands of rulers in human history who invaded foreign countries – are they all Hitler? And I guess we’ve just forgotten about the part where Hitler exterminated six million Jews along with millions of Slavs, Roma, communists and other so-called undesirables. That apparently is no longer considered a defining characteristic of Hitler’s unique evil. How else to explain that accusations of being Hitler are a dime a dozen these days? Such cheap rhetoric does nothing to help ordinary, suffering Ukrainian people. But it sure helps corporate war-mongers get richer. That’s the point.

                “But, but,” Washington’s power-drunk denizens stammer, as defense company stocks soar through the roof, over 60 percent since Russia’s invasion, “the rules-based order!” That’s the humbug by which the U.S. empire evades international law to claim its “rules” apply to everybody else but Washington. Except lately, the civilized world, namely the Global South, doesn’t buy this baloney. The trick ain’t working anyplace outside of Europe.

              • ScheerpostPatrick Cockburn: Will the Ukraine War End Without Destroying All Life on the Planet?

                Veteran award-winning journalists Patrick Cockburn and Robert Scheer, who met in Moscow in 1987 when Mikhail Gorbachev optimistically promised peace, now fear a descent into nuclear war hell.

              • ScheerpostUS Air Force’s British Expansion

                Only Japan and Germany, countries occupied by the US military after World War 2, host more US airmen than Britain. Nuclear-capable American B-52 bombers were recently deployed in Gloucestershire amid Ukraine tensions.

              • Counter PunchThe War on Youth in the Age of Fascist Politics

                One of the most important registers in measuring the democratic health of a society can be found in how it treats its youth. By any current standard, which includes the quality of public schools to laws that protect the health and well-being of young people, the United States is failing miserably. Youth, especially youth of color, are not only viewed as a liability, much of their behavior is also being increasingly criminalized.  When young people are relentlessly and ruthlessly subject to forces that commodify them, criminalize, punish them, and deem them unworthy of receiving a critical and meaningful education, it bodes ill for the nation as a whole.  Of course, this attack on youth is not new.

                In the 1970s youth were viewed as both predatory and dangerous and in succeeding generations they were increasingly marginalized, terrorized, and written out of the social contract.[1] The United States is one of the few countries in the world that puts children in supermax prisons, tries them as adults, incarcerates them for exceptionally long periods of time, defines them as “super predators,” pepper sprays them for engaging in peaceful protests, and describes them as “teenage time bombs.”[2] More recently, it has been reported that hundreds of Native American children in the United States and even more Indigenous children in Canada in government and reservation schools were not only separated from their families but also abused physically, emotionally, and sexually. Many others died in these genocidal factories and were buried in unmarked graves. The legacy of violence against children of color runs deep in the United States.[3]   Viewed as a long-term investment, they are defined under neoliberalism as both an economic liability and a drain on the resources needed to concentrate wealth in the hands of the ruling classes and financial elite.

              • HungaryThe town that blew up its own bridge and chased away the Russians

                Voznesensk is a quiet little town near one of South-Eastern Ukraine’s nuclear power plants. Its name became well-known when they became the first to fight off the Russians. We visited the town and met the mayor who thought it best to blow up their own bridge, and spoke with the angry local who – along with his wife – chased away the armed Russian soldiers with his bare hands. (English subtitles available)

              • Counter PunchIdeological Silos of Left and Right: Missing the Point in Ukraine

                In light of this mélange of considerations how can we hope to achieve a clearer understanding of what is happening, what are the relative risks, and what could yet be done to end the killing to avoid any further massacre of innocents and safeguard humanity from present risks of escalation to a wider war, possibly fought with nuclear weapons? A first step in the right direction is to pronounce that the ideological silos of both extreme left and right slant policy advocacy toward extremism, cause confusion, and to the extent influence is exerted, the effect is confound the search for viable and humane modes of deescalation. Extremist policy vectors are unsatisfactory cognitively, normatively, and prudentially.

                The extreme left explains the Ukraine Crisis as essentially an outcome of inflated post-Cold War global imperial overreach orchestrated by the U.S., manifesting itself by way of neoliberal globalization in close conjunction with the projection of military dominance on a planetary scale. The extreme right, which enjoys far greater access to elite circles of government and media than the left, explains the Ukraine Crisis as an essentially evil plot by a Russian autocrat to destroy sanctity of the territorial rights of a sovereign state, violating the most basic rule of a state-centric world order, and mounting an unacceptable challenge to the exclusive global responsibilities of the West, led by the U.S., to uphold security throughout the world in accord with democratic values and humanitarian principles. These ideological silos of explanation have different impacts in the West, leaving those on the left frustrated by their political irrelevance, while those on the right are currently riding a high wave of influence almost oblivious to the geopolitical storm clouds of a wider war that unleashes nuclear weapons. So far the gray zone that operates in between these silos of clarity and formally holds governmental power in the United States has given up ground to the rightest pressures, but still has been prudent enough to avoid an outright military confrontation with Russia yet as the clock ticks the risks of wider war rise.

              • MeduzaRussians, meet your new heroes The Kremlin is renaming streets across the country in honor of Donbas combatants, hoping to ‘prime public opinion’ for another annexation

                On May 9, when Russia celebrates the USSR’s victory against Nazi Germany, several regions across the country announced that they were renaming local streets in honor of soldiers and political figures from the self-proclaimed Donetsk People’s Republic (DNR). For example, the cities of Grozny, Yakutsk, and Omsk dedicated streets to Alexander Zakharchenko, the DNR’s leader until his assassination in August 2018. Other cities announced streets named after Vladimir Zhoga, also known by his nom de guerre “Vokha,” who commanded the Sparta Battalion, a pro-Russian separatist force in Donetsk, until his death in March 2022 in combat with the Ukrainian military. Also on May 9, Zhoga’s father met personally with Russia’s president. Meduza has learned that these dedications and Vladimir Putin’s sit-down with Artem Zhoga are parts of a strategy developed by the Kremlin to “prime public opinion” for Russia’s annexation of the separatist “republics” in Donetsk and Luhansk.

              • Meduza‘We comforted the kids, crossed ourselves, and bid our lives farewell’: Three Azovstal steel plant workers tell the story of their escape

                The Azovstal steel plant remains the sole point of resistance against the Russian invaders in Mariupol. Though fighting has been ongoing outside of the plant for almost two months, none of the civilians hiding inside were evacuated until April 30. Azovstal workers Ilya and Pavlo (names changed) were some of the first civilians to escape the plant; they’re now safe in Zaporozhye. They spoke to Meduza along with Azovstal HR director Ivan Goltvenko, who left the city on March 9 and has been helping others escape ever since.

              • MeduzaDeadlock in the Donbas Ukraine and Russia are facing the same two problems on the eastern front: enemy fire and the Siverskyi Donets river

                In early May, both Russian and Ukrainian troops launched offensives on eastern Ukraine across different parts of the less-than-mighty Siverskyi Donets river (which crosses from Russia into Ukraine before flowing parallel to the Ukrainian-Russian border). Since then, it’s been the same story over and over again: one side’s troops try to cross the river to launch an attack, but enemy artillery thwarts their attempts, destroying whatever bridge they’ve built and their forward guard. Every kilometer gained is paid for in blood, and the key question right now is whether the Russian army will manage to use the advantage it has before Ukrainian forces begin widely applying precision weapons obtained from the West.

              • Meduza‘Ukro-Nazi enablers’: Police officers and anonymous bloggers harass Russian volunteers who helped Ukrainian refugees reach Estonia

                Up until the end of April, a group of volunteers were working in Penza to help Ukrainian refugees get to St. Petersburg and, from there, to Estonia. However, threats from anonymous Telegram channels and direct pressure from unknown parties — graffitied doors, slashed tires — forced the Penza volunteers to shut down their efforts. Journalist Vladimir Sevrinovsky spent several days with the last group of refugees from Mariupol whom the Penza group was able to help get out of Russia. 

              • MeduzaThe collective Zelensky Amid Russia’s war, Ukraine’s president is more popular than ever. Here’s how his team rallied a nation — and the West.

                On the eve of Russia’s full-scale invasion of Ukraine, President Volodymyr Zelensky’s rating was less than 25 percent. Moscow waging an all-out war turned Zelensky into a national hero — one who now enjoys more than 90 percent support among Ukrainians. For Meduza, journalist Konstantin Skorkin breaks down how Zelensky and his team are running the country, managing Ukraine’s defense, and cultivating the president’s image as a wartime leader.

              • SalonHouse coup plotters stand firm — but DOJ and the Jan. 6 committee are closing in

                According to the interim report on the Jan. 6 insurrection by the Senate Judiciary Committee, it was Scott Perry — who was involved in strategy meetings at the White House, along with other members of the House Freedom Caucus — who introduced Jeffrey Clark to Trump. He also took it upon himself to call Donohue, the no. 2 official at the Department of Justice, and demand that he investigate debunked election fraud allegations in Pennsylvania, effectively reading him the riot act for not pursuing all these ludicrous claims. (I can’t imagine it’s common for congressmen to harangue leading law enforcement officials and importune them to lie. Maybe under the Trump administration it happened all the time.)

              • MIT Technology ReviewRussia [cracked] an American satellite company one hour before the Ukraine invasion

                The operation resulted in an immediate and significant loss of communication in the earliest days of the war for the Ukrainian military, which relied on Viasat’s services for command and control of the country’s armed forces.

              • Rolling StoneThe Feds Are Now Investigating Whether Trump Tampered With Classified Documents

                The federal grand jury investigation will reportedly focus on the documents retrieved from Mar-a-Lago. The Times notes that the Justice Department recently issued a subpoena for the material, and that it has requested interviews with people who worked in the White House before Trump left office. It’s unlikely that any charges will be brought, however, as the Justice Department would need evidence that Trump was personally involved in bringing the records to the White House residence and then to Mar-a-Lago, and that he did so knowing that it was in violation of federal law.

              • New York TimesProsecutors Pursue Inquiry Into Trump’s Handling of Classified Material

                In recent days, the Justice Department has taken a series of steps showing that its investigation has progressed beyond the preliminary stages. Prosecutors issued a subpoena to the National Archives and Records Administration to obtain the boxes of classified documents, according to the two people familiar with the matter, who spoke on condition of anonymity because of the ongoing investigation.

              • The HillHouse Democrats urge social media platforms to preserve potential evidence of war crimes in Ukraine

                Top House Democrats wrote letters to the chief executives of four major social media platforms on Wednesday, urging them to preserve and archive content related to Russia’s invasion of Ukraine that could be potential evidence of war crimes.

                The lawmakers asked Meta, Twitter, YouTube and TikTok to preserve and archive posts related to the conflict “that may provide evidence of war crimes or human rights violations,” establish a mechanism with human rights-specific organizations to share that content and create a way for content depicting a possible war crime to be flagged by the platforms’ users.

            • Transparency/Investigative Reporting

              • TechdirtNYPD Lawyer Forged Emails, Lied To Courts, Withheld Information From Lawsuit Plaintiffs

                The NYPD has long been a stalwart opponent of transparency and accountability. It has spent years trying to rebrand as a national security agency, drafting on former mayor Rudy Giuliani’s unearned reputation as the post-9/11 savior of New York City.

              • uni StanfordStanford law professor calls for digital platform transparency legislation in senate testimony

                Recently, Persily has focused his research on social media platforms, which he warned during the hearing have become too central to the sociopolitical system to operate with minimal transparency.

                “We cannot live in a world where Facebook and Google know everything about us and we know next to nothing about them,” Persily testified before the Senate. “These large platforms have lost their right to secrecy. Their power over the information ecosystem is unrivaled in world history.”

                In a 2021 Washington Post opinion article, Persily argued that Facebook whistleblower Frances Haugen’s use of the platform to uncover documentation detailing executive knowledge of drug cartels and human trafficking rings, as well as details of Instagram exacerbating a societal body acceptance crisis, showed that the U.S. government needed to intervene — particularly because a company like Facebook is too large to suffer market repercussions.

              • NBC911 tapes released after 12 years in case of missing woman that led to finding 10 other bodies on Long Island

                After a dozen years, police on Long Island Friday released 911 audio of a New Jersey woman whose mysterious disappearance in 2010 led authorities to discover 10 other bodies.

            • Environment

              • Copenhagen PostSAS cancels thousands of flights this summer

                The airline revealed this week that it has cancelled 4,000 flights from May to August – roughly 5 percent of the airline’s total summer flight schedule.

              • The NationIce Scream
              • DeSmogAs California Considers Dropping Fossil Fuels from Major Pension Funds, New Report Calls Out ‘Misinformation’ on Costs

                A newly published report by Fossil Free California finds California’s pension fund managers are circulating divestment “misinformation” by exaggerating the costs involved in shedding their fossil fuel investments in documents prepared for state lawmakers.

                California lawmakers are currently considering Senate Bill 1173 (SB-1173), California’s Fossil Fuel Divestment Act, which would require the California Public Employees’ Retirement System (CalPERS) and the California State Teachers’ Retirement System (CalSTRS), to stop investing in fossil fuels before the decade is out. The move would impact billions of dollars currently invested in oil, gas, or coal on behalf of California’s teachers, firefighters, and other public employees.

              • Counter PunchA Picturesque Tour of Toxic Waste Sites in Georgia and Alabama

                April 22 (Earth Day): Jekyll Island and Brunswick, Georgia

                As we headed north on Highway 41 from Micanopy, Florida, I thought about the first Earth Day. I was a freshman at Forest Hills High School in Queens, and the world seemed, at last, to be calming down. Though assassination, riot and war still darkened my dreams, there appeared to be, as the Vietnam War planners liked to say, “light at the end of the tunnel.” On April 20, 1970, Nixon announced the withdrawal of an additional 150,000 U.S. troops, accelerating “Vietnamization” — the handoff of fighting from American to South Vietnamese troops — and hastening the end of the war.

              • Counter PunchClimate Hegemony: Now is the Time of Monsters

                Recently, it was the 85th anniversary of Italian Marxist philosopher and politician Antonio Gramsci’s death in fascist Italy. Starting from humble beginnings on Sardinia, Gramsci went from student to communist partisan in the streets of Turin and the Italian parliament. During the 1920’s he quickly became a thorn in the side of Benito Mussolini’s regime. In 1926, Mussolini had Gramsci arrested. At the show trial, the prosecution proclaimed, “For twenty years, we must stop this brain from functioning.” He spent most of the rest of his life in prison. But his time in prison transformed him into one of the most important political theorists of the 20th century.

              • Counter PunchSlippery Slope

                Snowflakes had been falling two weeks ago, but Wednesday brought blue skies and temperatures in the 80s to Upstate New York. Classes had just ended at Cornell University, and after two years of pandemic restrictions and angst the undergrads were ready for their long-deferred spring bacchanal of booze and music: Slope Day.

              • Common DreamsHot Planet Made Deadly South African Floods Twice as Likely: Climate Scientists

                Intense rainfall that led to deadly flooding and landslides in South Africa last month was made twice as likely by the human-caused climate crisis, a team of scientists revealed Friday, pointing to the findings as proof of the need to swiftly and significantly curb planet-heating emissions.

                “If we do not reduce emissions and keep global temperatures below 1.5°C, many extreme weather events will become increasingly destructive.”

              • Energy

                • Common DreamsOpinion | Why Are Americans Subsidizing Our Own Extinction?

                  Each American—man, woman and child—paid around $2000 last year to subsidize the fossil fuel industry, according to an analysis this year by the International Monetary Fund (IMF).

                • The VergeMajor exchanges delist Terra stablecoin as price collapse continues

                  As the Terra crisis draws on, some of the largest cryptocurrency exchanges in the world have begun to delist Terra’s UST stablecoin and its linked Luna token, citing a need to protect users from risk.

                • ABCEmirates Air lost $1 billion, but that’s an 80% improvement

                  One of the world’s biggest airlines and the Mideast’s top carrier, Emirates Air, said Friday it lost $1.1 billion over the past fiscal year, but that figure still marks an 80% improvement from the year before. The airline said revenue was up 91%, reaching $16.1 billion.

                • NPRCalifornia just ran on 100% renewable energy, but fossil fuels aren’t fading away yet

                  Springtime is an ideal time of year for renewable energy in California. The days are getting longer, so solar energy is on the rise. Wind power and hydropower from dams is humming along and mild temperatures mean air conditioners aren’t turned up, so electricity demand is still relatively low.

                  For about an hour on April 30th, grid operators at the California Independent System Operator (ISO), which serves about 80% of the state, had enough electricity from solar, wind, geothermal and small hydropower dams to meet all of the demand in their area More power was being generated than was needed at that moment, so some was exported to other Western states.

                  “That’s quite an accomplishment because it demonstrates if you can do it for one instantaneous hour, you can do it for longer periods of time,” says Mark Rothleder, senior vice president at the California ISO.

                • BBCRussian operator to suspend electricity supply to Finland

                  Neither Rao Nordic nor the grid operator in Finland, Fingrid, explained what was behind the payment difficulties.

              • Wildlife/Nature

                • Counter PunchMaking Hay: National Park Service Drains “Critical Habitat” From Bull Trout River

                  Hundreds of millions of dollars have already been spent trying to restore life to this embattled river by removing toxic tailings from its banks. It is absolutely necessary to ensure the river contains enough water to support the aquatic ecosystem, dilute what heavy metals still leach into it, and provide the clean, cold, and connected river system that bull trout require to exist.

                  Yet every year a massive amount of the Upper Clark Fork’s scarce water is diverted into the West Side irrigation ditch to grow hay to feed cattle and horses on the Grant-Kohrs ranch, which is owned and operated by the National Park Service as a historic site and “cultural display” of a working ranch from the late 19th century. In most years, the West Side Ditch takes 50% or more of the entire flow of the Upper Clark Fork in mid-to-late summer. In drought years, which are ever more frequent in the West, the diversion takes upwards of 90% of the river’s flow.

                • The RevelatorBiodiversity Solutions Also Fight Climate Change
                • Counter PunchThe Art of Building a Human-Hawk Relationship

                  All birds’ eyes are huge in proportion to their bodies. A human being’s eyes take up only 2 percent of the face; a European starling’s account for 15. A great horned owl’s eyes are so enormous relative to its head that if human eyes were comparable, they would be the size of oranges. Birds’ eyes are so important to them that, like various reptiles, sharks, and amphibians, they have a transparent or translucent third eyelid, the nictitating membrane, to protect and moisten the eyes while retaining visibility. Vision literally sculpts birds’ every movement: one reason birds seem to move in such a jerky manner, as cassowary expert Andy Mack explained to me, is that the bird is actually keeping its head remarkably still, thanks to an extremely supple neck, while the rest of its body is in motion, in order to allow it to focus on what it sees in exceptional detail.

                  In birds of prey, the eyes weigh more than the brain. The two eyes are twice as large as the brain itself. They need to be huge. They are packed with receptors, some types of which humans don’t have at all. Raptors have not merely two (as we do) but six types of photoreceptors in each eye. Because of this, birds are thought to be able to experience colors that humans cannot even describe. Their retinas, unlike ours, contain few blood vessels. Instead, a thin, folded tissue called pecten, unique to birds, brings blood and nutrients to the eye without casting shadows or scattering light in the eye as blood vessels do.

                • Counter PunchNew York Court of Appeals to Consider Animal Personhood as COVID-19 Cases Rise

                  As it happens, Wuhan’s caged pangolins are conceptually related to a Big Apple pachyderm, since the legal battle centered on Happy, a 52-year-old elephant in the Bronx Zoo, points in the direction of such structural transformation. Though her case has received significant media attention, it has not yet been placed it in the context of the incarceration of “food” animals that led to COVID-19 and Roy’s persuasive admonition that “Historically, pandemics have forced humans to break with the past.”

                  The Nonhuman Rights Project has been advocating on behalf of Happy since 2019. On February 18, 2020, they argued before the Bronx Supreme Court that she is a person, not a thing, invoking the writ of habeas corpus to achieve her release to a sanctuary. Happy’s bio belies her name: following capture in Thailand along with six other calves, an event that almost certainly entailed killing her mother and other herd adults who would have fought to protect her, she has spent nearly her entire life either in a one-acre enclosure with an indoor holding area, or a barren, cemented, walled outdoor elephant yard, miniscule fragments of the natural home range for Asian elephants that can reach up to 600 square kilometers. Whereas elephants normally live in complex societies, forming strong, lifelong social bonds, Happy has lived in isolation since 2006. She spends much of her time standing in place, swinging her trunk and raising and lowering her feet, standard examples of “zoochosis,” defined by ethologist Marc Bekoff as the “repetitive, functionless behavior caused by the frustration of living in a highly unnatural and impoverished environment,” itself akin to “psychological torture.” While Bronx Supreme Court Justice Alice Truitt did not accede to the NhRP’s plea, she declared that she was sympathetic with their mission on Happy’s behalf and referenced New York Court of Appeals Judge Eugene Fahey’s 2018 statements that “the issue whether a nonhuman animal has a fundamental right to liberty protected by the writ of habeas corpus is profound and far-reaching” and that “Ultimately, we will not be able to ignore it.” Happy’s attorneys will appeal Tuitt’s decision on May 18, 2022, marking the first time that the highest court of any U.S. jurisdiction will hear a habeas corpus case brought on behalf of someone other than a human being.

              • Overpopulation

                • Counter PunchThe Enduring Land Question

                  That disconnect has defined the modern age, and while it remains with us, it has been notoriously difficult to quantify its social, economic, and environmental impacts. In particular, the causal relationship between land monopoly and present-day environmental conditions has not been sufficiently studied. Exploring this relationship reveals that a comprehensive critique of land monopoly entails a program for the more responsible and sustainable use of land and natural resources.[1] In order to make those who use the land accountable, planning strategically for the long term and internalizing their costs to the extent possible, it must be owned by small groups of people who live on it. When decisions are made by large, distant corporate bodies that are not answerable in any robust way to local communities, we cannot be surprised to find them depleting and draining the life from the land.

                  The ability of the land to sustain life begins with the soil, which, when it is strong and healthy, is a world of irreducible beauty and complexity. This world is full of life forms and the relationships between them, from bacteria and fungi, to plants and animals, both living and dead, of various sizes and scales. Soil is a living thing—an infinitely complex network of them, more precisely—and human civilization has been phenomenally good at killing it, at making dead, dry deserts of dynamic living networks. As observed from space, we might regard humans as a desert-making species.

            • Finance

              • Common DreamsOpinion | No Half Measures—Biden Needs to Cancel All Student Loan Debt

                On September 1, 2021, Hurricane Ida hit Southeast Louisiana, temporarily displacing thousands of New Orleans residents, including myself and most of my family. Residents who had the means evacuated early, leaving others to fight for limited resources while simultaneously seeking refuge in neighboring cities. On top of their pre-existing bills, evacuees were forced to front the costs of hotels, food, gas and repairs or even replacement of their own homes. Natural disasters produce an overwhelming amount of stress and anxiety—you simply don’t know if you will have a house to live in until you are able to return home. 

              • The NationDon’t Boycott Amazon

                After years of dominating American capitalism by grinding workers into the dust, Amazon is on a hot losing streak, and it’s absolutely invigorating to watch. If the Amazon Labor Union had only organized workers in a blowout vote on Staten Island, it would’ve been enough. And if Amazon had only spent $4.3 million fighting them just to fail, it would’ve been enough. But, dayenu! A judge also just threw out the company’s motion to dismiss a case of race- and gender-based discrimination filed by a corporate worker, too!

              • Common Dreams‘Reprehensible’: Biden Slammed for Urging States to Spend Untapped Covid Funds on Cops

                News that President Joe Biden is planning to urge states and cities to use unspent money from last year’s $1.9 trillion coronavirus relief package to further increase police funding elicited furious responses on social media Friday.

                “Incredibly bleak and symptomatic. Money allocated to care for humans will be used to cage and kill them instead.”

              • Common DreamsGreen Groups Push DeJoy to Hand Over Secret Documents From Polluting Truck Deal

                A pair of green groups on Thursday appealed the U.S. Postal Service’s rejection of a Freedom of Information Act request seeking to uncover details about the mail agency’s contract to purchase more than 160,000 new delivery trucks, 90% of which are expected to be gas-powered.

                “As the USPS forges ahead with its ill-conceived and controversial decision to pollute communities across the nation instead of electrifying their delivery trucks, we demand to see the details surrounding the agency’s decision,” said Elena Saxonhouse, managing attorney with the Sierra Club, which joined Elders Climate Action in filing the administrative appeal.

              • Counter PunchLimits to Growth: Where We Stand Today

                Fifty years ago this spring the Club published a book called The Limits to Growth, based on a study using complex computer models by a team at the Massachusetts Institute of Technology led by Donnella Meadows and her husband Dennis, with a couple of MIT graduate students. It used advanced computers to chart out different scenarios, including one in which nothing is done and we continue heedless growth. Its conclusion was stark and simple:

                The book was a worldwide best-seller, but its conclusions were widely challenged and, in centers of political and economic power, mostly ignored.  Growth is, after all, the lifeblood and raison d’etre of capitalism and the idea that there should be limits to it was so repugnant as to be essentially incomprehensible. A lot of people are making a lot of money, and a very few a very lot, so what would be the point in imagining that there would ever be an end to it?

              • TruthOutActivists Have Gathered Enough Signatures to Put $18 Wage on California Ballot
              • ScheerpostGreat Disorder and Extravagant Lies

                For an agenda of compassion that gives hope in the possibilities of a world not rooted in private profit, Vijay Prashad turns to the public-health program of Kerala, India.

              • Unemployment Agency Hassle

                In Sweden there’s a sort of unemployment fund you can opt in to paying to if you’re in a labour union. If and when you lose your employment you will be entitled to payouts from this fund in lieu of a salary. The payout is a percentage of what your salary was. If you’re not in a union you may still be entitled to (much lower, standardised) payouts from a government fund. I don’t actually remember if you have to invest in that before hand.

                As people whom I communicate often with know I lost my employment early April. I was given a very generous severance and will not suffer economically for quite some time. I certainly don’t need any payouts from any of those funds even if I’m eligible, which I haven’t really checked. I’ve not been in a union for a couple of years though.

            • AstroTurf/Lobbying/Politics

              • The NationSo You Want to Reduce Crime?

                Republicans are trying to terrify the public with stories of rising crime, sending Democrats scrambling to prove that they’re tough on the issue. In President Joe Biden’s State of the Union address, he promised to do something about people killed by guns. The solution, he said, is not to defund the police—a rallying cry from the racial justice protests of summer 2020 calling to move resources from police departments to other social investments. “The answer is to fund the police,” he declared.

              • Common Dreams‘Bought and Paid for by You!’: Fetterman Celebrates 200K Individual Donors in PA Primary

                Pennsylvania Lt. Gov. John Fetterman has surpassed 200,000 individual donors since he launched his bid for the key battleground state’s open U.S. Senate seat, his campaign announced Friday.

                “Our campaign will always be funded the right way. No dirty money. No corporate PACs.”

              • The NationGoing Beyond Inclusion in Independent Media

                The Nation’s editor in chief D.D. Guttenplan and senior editor Lizzy Ratner sat with journalists Laura Flanders, Sara Lomax-Reese, and S. Mitra Kalita as part of the magazine’s Conversations series to speak about the critical importance, and challenges, of independent media. The cofounders of URL media, Lomax-Reese is the CEO of WURD Radio, one of the few remaining Black-owned talk radio stations in the nation, and Kalita is a veteran journalist and author, most recently senior vice president at CNN Digital.

              • The NationSummer Lee Is Exactly What a Democrat Should Be

                Summer Lee, a Democratic legislator with a track record of winning tough elections and backing fellow Democrats in critical races, faces a supremely cynical assault as she seeks her party’s nomination for an open US House seat in Tuesday’s Pennsylvania primary. A multimillion-dollar media campaign against Lee, paid for by donors that frequently back Republicans, is smearing the 34-year-old state representative as a threat to the Democratic Party who doesn’t merit a place on its ballot line.

              • Counter PunchA Look Back at Bigger Than Bernie: Can the Democratic Party Be Reformed From Within?

                * * *

                The progressive movement  laid all its eggs in one basket, the Democratic Party, rather than looking to create any alternative means of translating ideas into action. Or rather, not the progressive movement but a small band of self-proclaimed “socialists,” often young and urban and hip, many of them offspring of the Occupy movement, who found a convenient sheltering place in Bernie Sanders’s latest campaign, which they succeeded in reshaping toward their own ideological ends, utilizing forms of flattery and hero-worship the wily old campaigner from Vermont should have been more wary of. Anyway, the inevitable denouement—i.e., the crashing and burning of Sanders’s second Quixotic charge—has already transpired, the encouragement of the Sanders faithful to get in line behind the neoliberal candidate of the moment is in full flourish, and the question that begs to be answered, in the wake of the catastrophe, is this: Can the Democratic Party be reformed? Can it serve as an agency for “socialist” (read progressive) policy changes? Should activists and thought leaders spend time and energy working to reinvent the party, or should they look for new outlets?

              • Counter Punch$40 Billion War Fever Grips Congress as U.S. Escalates Ukraine War

                Previously antiwar Democrats like Reps. Ayanna Pressley, Jim McGovern, Barbara Lee, and Pramila Jayapal, who should know better, have uncritically embraced the Administration’s escalating war against Russia to the tune of $40 billion.

                Russia’s invasion of Ukraine must be condemned. But the Administration has been telegraphing for weeks that its war aims now go well beyond defending Ukraine. President Biden said that President Putin cannot remain in power. Secretary of Defense Austin said the U.S. seeks to weaken Russia. And Speaker Nancy Pelosi said that we are fighting until “victory”.

              • TruthOutSanders Slams AIPAC and Billionaires for Spending Millions Against Progressives
              • Common DreamsRallying for Summer Lee, Sanders Rips AIPAC for Trying to ‘Buy Elections’

                During a rally in support of U.S. House candidate Summer Lee on Thursday, Sen. Bernie Sanders called out super PACs bankrolled by the American Israel Public Affairs Committee and billionaire donors for spending big to crush progressives in Pennsylvania and elsewhere across the country, efforts that the Vermont senator decried as “pathetic” and corrosive to democracy.

                “If they are successful, they will carry this into November,” Sanders warned at the event in Pittsburgh, which was held days before the May 17 Democratic primary in Pennsylvania’s 12th Congressional District. “They have billions of dollars at their disposal.”

              • TruthOutJan. 6 Committee Subpoenas 5 GOP Members of Congress — Including Kevin McCarthy
              • TruthOut“Pro-Life” Republicans Complain Biden Isn’t Starving Babies at the Border
              • TruthOutHow Did Biden Not Notice the Far Right Lurch of the Republican Party Until Now?
              • HungaryThe Hungarian government’s objections could delay EU sanctions on Russian oil
              • Counter PunchRoaming Charges: Caught in a Classic Trap

                + According to the Washington Post, Republicans are getting more and more confident that the overturning of Roe v. Wade will not seriously harm their chances of regaining House and Senate majorities come November. This seems to me  like a pretty solid bet for the GOP. How stupid do you have to be to vote for the same people who said they’d defend abortion rights and didn’t, expecting them to reinstate the very rights that were lost on their watch.

                + There have been 11 murders of abortion clinic workers since 1990 and 41 bombings and 173 arsons at abortion clinics since 1977.

              • FAIRJulie Hollar on Roe Reversal, Tesnim Zekeria on Baby Formula Shortage
              • The VergeA court just blew up internet law because it thinks YouTube isn’t a website

                But the hearing went fully off the rails when Judge Jones began discussing Section 230, the law that shields people who use and operate “interactive computer services” from lawsuits involving third-party content. Courts have applied the term “interactive computer service” to all kinds of things, including old-school web forums, email listservs, and even gossip sites. But as NetChoice’s attorney was arguing that websites should receive First Amendment protections, Judge Jones seemed baffled by the terminology.

                “It’s not a website. Your clients are internet providers. They are not websites,” Jones asserted of websites including Facebook, YouTube, and Google. “They are defined in the law as interactive computer services.” To mangle the term a little further, she asked if the sites were “interactive service providers” that she defined as fundamentally different from media websites like Axios and Breitbart. (Newspaper and blog comment sections have been repeatedly defined as interactive computer services, too.)

                The idea that YouTube is an “internet provider” and not a “website” is nonsense in a literal sense since it’s demonstrably a website that you must access via a separate internet service provider. (Try it from home!) It’s unclear whether Jones was confusing “interactive computer services” with ISPs. But the real problem isn’t a judge that doesn’t understand technology. It’s that she apparently thinks relying on Section 230 strips website operators of First Amendment rights. Around the weird waffling over “internet providers,” Jones laid out a line of thinking that seemingly boils down to this: [...]

              • TechdirtBoiling Elon Musk – Jumping Out Of The Pot Of Platform Law?

                The boiling frog syndrome suggests that if a frog jumps into a pot of boiling water, it immediately jumps out — but if a frog jumps into a slowly heating pot, it senses no danger and gets cooked. Mark Zuckerberg’s Facebook has been gradually coming to a boil of dysfunction for a decade – some are horrified, but many fail to see any serious problem. Now Elon Musk has jumped into a Twitter that he may quickly bring to a boil. Many expect either him – or hordes of non-extremist Twitter users – to jump out.

              • DeadlineElon Musk Says “Committed” To Twitter Deal Just After He Announced It Was “On Hold” – Update

                Elon Musk now says he’s “still committed to acquisition” of Twitter, hours after he tweeted that the $44 billion deal is “temporarily on hold,” sending Twitter stock into a tailspin and contributing to the circus-show quality of this deal.

              • India TimesMusk puts on hold $44-billion deal for Twitter, shares slump

                Elon Musk on Friday put his $44-billion deal for Twitter Inc temporarily on hold, citing pending details in support of calculation that spam and fake accounts indeed represent less than 5% of users.

              • Hollywood ReporterElon Musk: “Twitter Deal Temporarily on Hold”

                “Twitter deal temporarily on hold pending details supporting calculation that spam/fake accounts do indeed represent less than 5% of users,” he said, providing a link to an early May Reuters article citing a Twitter regulatory filing. In that filing, the company estimated how many of its “monetizable daily active users” were false or spam accounts, the report noted.

              • Misinformation/Disinformation

                • FAIRMedia Ignore Criticism of DHS’s New ‘Disinformation’ Board—Unless it’s from the Right

                  Testifying in front of a House committee, Department of Homeland Security Secretary Alejandro Mayorkas recently announced DHS’s formation of a “Disinformation Governance Board.” The board’s stated mission would be to address “disinformation spread by foreign states such as Russia, China and Iran,” as well as “transnational criminal organizations and human-smuggling organizations.”

                • Rolling StoneMarjorie Taylor Greene’s Latest Conspiracy Theory Is That the Left Is Torching Food Facilities

                  There’s no “Jewish space laser,” but conspiracy theorists are circling around the idea that Democrats are trying to cause a food shortage by setting fire to processing plants

                • NBCYouTube creators are pivoting their videos to Depp v. Heard content and raking in millions of views

                  Jacob, who spoke on the condition that his last name be withheld for privacy reasons, said he noticed that the video had millions of views but that the channel it came from had “barely any subscribers.” Jacob’s own videos were getting only a few hundred views at the time, so he decided to try to make a video about the celebrity defamation case, instead.

                  Within a week, Jacob’s new content — often short compilations of clips from the trial set to royalty-free music — had over 10 million views.

                • NBCWhat the memes about the Johnny Depp-Amber Heard trial reveal

                  We don’t know the truth in this situation. Both sides have made upsetting accusations. The problem is the reflexive assumption that Depp is being wronged, along with the gleeful way social media is harassing the woman who accused him of violence. Social media users even harassed a clinical psychologist testifying on behalf of Heard, filling her professional Google profile with one-star reviews calling her a “liar” and “evil.”

                  It’s disheartening and sickening to see the meme-ification and commodification. Domestic violence is not funny. It shouldn’t spur popularity contests. It shouldn’t create an industry in which people are vending merchandise on Etsy, in which Rolling Stone reports that sellers are making items such as pins, T-shirts and coffee mugs featuring the phrase “Justice For Johnny.” It shouldn’t be a spectacle in which a woman shows up bringing two emotional support alpacas to the courthouse to cheer Depp up. It shouldn’t prompt writers to publish articles with lines like “The Johnny Depp and Amber Heard trial is the entertainment we didn’t know we needed in 2022.”

                  And then there are the memes. So many memes.

            • Censorship/Free Speech

              • Counter Punch21 Fallacies Feeding ‘Cancel Culture’ and Holding Back the Contemporary U.S. Left

                Perhaps cancel culture is mostly mirage: the social media shadow of American celebrity obsession, distracting us from the overall healthy left culture on the ground?

                Maybe left-wing cancel culture is real, but marginal. Just a crazy niche of fringe folks—better to ignore?

              • Frontpage MagazineTurkey: Freedom of Religion Only for Islam

                A 2022 report by the Norwegian Helsinki Committee’s Freedom of Belief Initiative, entitled “An Appeal to Move Forward from Aspirations to Actions: Monitoring Report on the Right to Freedom of Religion or Belief in Turkey,” reveals Turkey’s decades-long abuses against non-Muslim communities across the country.

                The Committee lists some of the violations of the rights of non-Muslims: [...]

              • [Old] BBCTurkey guilty verdict for depicting Erdogan as Gollum

                Article 299 of the Turkish penal code states that anybody who insults Turkey’s president can face a prison term of up to four years.

                However, Cetin said he would appeal because Mr Erdogan was not president at the time the pictures were published, Turkish media report.

              • [Old] VerfassungsblogThe Curious Case of Article 299 of the Turkish Penal Code: Insulting the Turkish President

                What is striking at first glance is that the crime of insulting an ordinary person is punishable by imprisonment from 3 months to 2 years according to Article 125 of the Penal Code, whereas if the same crime is committed against the President the imprisonment is from 1 year to 4 years. This appears to be unconstitutional prima facie: Article 90 of the Turkish Constitution explicitly states that international treaties to which Turkey is a party have the force of law. What is more, according to the same Article 90 of the Constitution, in the event of conflict between treaties relating to fundamental rights & freedoms and ordinary Turkish laws, the former prevail over the latter. Thus it is clear that the European Convention on Human Rights (ECHR) prevails over Turkish law, in the event of conflict. The fact that the Turkish Penal Code provides for more protection for state officials, namely the Turkish President, than it does to ordinary citizens, against the crime of insulting is plainly contradictory to the ECHR as interpreted by the European Court of Human Rights (ECtHR).

            • Freedom of Information / Freedom of the Press

              • Democracy NowMexican Journalists Protest “Staggering” Toll of Journalists Murdered with Impunity; 11 Slain in 2022

                Three journalists were killed within a three-day span this week in Mexico, bringing the toll to 11 so far this year and making Mexico the deadliest country in the world for journalists, behind Ukraine. Most of the murders have gone unsolved. This week journalists across Mexico took to the streets protesting the murder of their colleagues and called for accountability. “A crime against a reporter is a crime against the entire country,” says Jan-Albert Hootsen, Mexico correspondent at the Committee to Protect Journalists, who calls the numbers staggering and unprecedented.

              • Common DreamsOpinion | Beloved Palestinian-American Journalist Shireen Abu Akleh Killed in Israeli Raid

                On Wednesday, Palestinian-American journalist Shireen Abu Akleh was reporting for Al Jazeera on Palestinians living under Israeli occupation, as she had for over 25 years. On that morning, she was covering an Israeli army assault on the Jenin refugee camp in the West Bank. Shireen and another reporter were against a stone wall, wearing blue helmets and blue flak jackets clearly emblazoned with the word “PRESS.” Shireen was killed by a single shot to the head. A videographer immediately turned a camera towards Shireen’s body, slumped forward on the ground. Witnesses said she was killed by Israeli fire, likely a sniper who specifically targeted the space between her protective vest and helmet.

              • Common DreamsOpinion | How the US Will Ignore Israel’s War Crime of Killing Shireen Abu Akleh

                On Thursday, I appeared on Al Jazeera English to talk about the killing of the network’s iconic correspondent Shireen Abu Akleh.

              • Common Dreams‘Horrific’: Israeli Forces Attack Mourners Carrying Casket of Shireen Abu Akleh

                Israeli soldiers on Friday brutally beat Palestinian mourners carrying the coffin of longtime Al Jazeera journalist Shireen Abu Akleh, who was killed earlier this week while covering an Israeli military raid on a refugee camp in the occupied West Bank.

                London-based artist Khadijah Said shared Al Jazeera’s footage of the assault by the Israeli Defense Forces (IDF), describing it as “one of the most horrifying things I’ve seen.”

              • ABCUN condemns killing of Palestinian-American journalist

                A press statement was approved by the 15 council members after language was removed emphasizing the importance of media freedom and the need for journalists working in dangerous areas to be protected at the insistence of China and Russia, diplomats said, speaking on condition of anonymity because discussions were private.

              • Counter PunchPalestinians are always the target

                As soon as the Israeli state apparatus started to speak about the event, everyone sensible was able to conclude there were lies being told. The fellow Palestinian journalists with Shireen, who are corroborating eyewitnesses, one of whom was also shot, Producer Ali Al-Samoudi, clearly explained what had happened to them. They had been targeted by clearly visible Israeli soldiers, who identified themselves, to which the Palestinian journalists identified themselves back, and the Israeli soldiers continued to shoot at them anyway, shot Shireen in the head and then at anyone who came to her aide. There is tragic and upsetting video footage of this from just after Shireen is shot dead. Shatha Hanaysha is the fellow Palestinian journalist pinned down by the gunfire in the video, as her friend, mentor and colleague lay maimed next to her. B’Tselem, and Bellingcat, have already concluded in the preliminary that Palestinian gunfire directed against the Israeli security forces raid in Jenin, as initially claimed by the Israeli government as the cause of Shireen’s death, did not have line of sight on Shireen and her team and was very unlikely to have been the cause of her death.

                Was she targeted because she was a journalist? Without doubt. Dozens of Palestinian journalists have been killed by Israeli security forces since 2000. It is policy. Was Shireen targeted because she was a Palestinian? Always. Thousands of Palestinians, children, women, men, the elderly and infirm have been killed and murdered by Israeli security forces in the same time period. It. Is. The. Policy. Of. An. Apartheid. State.

            • Civil Rights/Policing

              • Common DreamsOpinion | Climate Activists Slam UK Government’s Latest Attempt to Silence Them

                New laws designed to crack down on protesters will not deter environmental activists from taking action, campaign groups have warned the UK government.

              • Democracy NowNick Estes: Leonard Peltier’s Continued Imprisonment Is an “Open Wound for Indian Country”

                Calls are growing for President Biden to grant clemency to Leonard Peltier, the 77-year-old imprisoned Native American activist who has spent 46 years behind bars for a crime he says he did not commit. Amnesty International considers Peltier a political prisoner, and numerous legal observers say his 1977 conviction for alleged involvement in killing two FBI agents in a shootout on the Pine Ridge Reservation was riddled with irregularities and prosecutorial misconduct. “At this point, there’s no reason other than vindictive revenge for him to be in prison,” says writer and activist Nick Estes, co-founder of the Indigenous resistance group The Red Nation. “He survived COVID, he’s in poor health, and the man deserves to be with his people,” says Estes, who calls for a full congressional investigation into the deaths of Indigenous activists on Pine Ridge Reservation, where the shootout that led to Peltier’s arrest occurred.

              • The NationCalifornia’s Undocumented Children Are Going Hungry
              • Democracy NowNick Estes: Indian Boarding Schools Were Part of “Horrific Genocidal Process” Carried Out by the U.S.

                The Interior Department has documented the deaths of more than 500 Indigenous children at Indian boarding schools run or supported by the federal government in the United States which operated from 1819 to 1969. The actual death toll is believed to be far higher, and the report located 53 burial sites at former schools. The report was ordered by the first Indigenous cabinet member, Interior Secretary Deb Haaland, whose grandparents were forced to attend boarding school at the age of 8. “It’s kind of a misnomer to actually call these educational institutions or schools themselves when you didn’t have very many people graduating, let alone surviving the dire conditions of those schools,” says Nick Estes, historian and co-founder of The Red Nation. Estes says the institutions were part of a “genocidal process” of “dispossession and theft of Indigenous people’s lands and resources.”

              • EFFGeofence Warrants and Reverse Keyword Warrants are So Invasive, Even Big Tech Wants to Ban Them

                Under the Fourth Amendment, if police can demonstrate probable cause that searching a particular person or place will reveal evidence of a crime, they can obtain a warrant from a court authorizing a limited search for this evidence. In cases involving digital evidence stored with a tech company, this typically involves sending the warrant to the company and demanding they  turn over the suspect’s digital data.

                Geofence and reverse keyword warrants completely circumvent the limits set by the Fourth Amendment. If police are investigating a crime–anything from vandalism to arson–they instead submit requests that do not identify a single suspect or particular user account. Instead, with geofence warrants, they draw a box on a map, and compel the company to identify every digital device within that drawn boundary during a given time period. Similarly, with a “keyword” warrant, police compel the company to hand over the identities of anyone who may have searched for a specific term, such as a victim’s name or a particular address where a crime has occurred.

                These reverse warrants have serious implications for civil liberties. Their increasingly common use means that anyone whose commute takes them goes by the scene of a crime might suddenly become vulnerable to suspicion, surveillance, and harassment by police. It means that an idle Google search for an address that corresponds to the scene of a robbery could make you a suspect. It also means that with one document, companies would be compelled to turn over identifying information on every phone that appeared in the vicinity of a protest, as happened in Kenosha, Wisconsin during a protest against police violence. And, as EFF has argued in amicus briefs, it violates the Fourth Amendment because it results in an overbroad fishing-expedition against unspecified targets, the majority of whom have no connection to any crime.

              • Counter Punch“Privacy”: Some Animals Are More Equal Than Others

                While sponsor John Cornyn (R-TX) justified the action on alleged “threats to the physical safety of Supreme Court Justices and their families,” the real reason for the bill is no secret. In the wake of a leaked draft opinion that would overturn Roe v. Wade, ordinary Americans started showing up to protest outside the justices’ homes, cueing immediate howls about the sanctity of their “privacy.”

                Wait, what?

              • Counter PunchAmerican Politics and the Lost Art of Toleration

                There is something troubling about this statement. It exemplifies the demise of the art of toleration that once was a hallmark of a liberal society. And in large part that is what is wrong with the Dobbs majority opinion and efforts by others to ban abortion or restrict the personal freedoms or ideas of others. It is also a symbol of the larger problem with the conservative and religious right in America.

                The United States is supposed to be a liberal society.  A liberal society is indebted to political ideas and values that trace back to the seventeenth century British political philosopher John Locke as well as Thomas Jefferson, and the Founding Fathers who signed the Declaration of Independence, the Constitution, and the Bill of Rights.  It is a secular view of society where the government must respect individual moral choices, opting to be neutral regarding how its citizens define their vision of a good life for themselves.  It is also a tradition committed to the idea of toleration—the idea that I cannot impose my personal moral choices on to others and that I must allow ideas and choices to be made by others, even if I detest them.

              • Counter PunchAn Artist Not in Uniform: How Walter Richter Defied Nazi Homophobia

                These thoughts went through my mind as I was trying to come to terms with a recent visit to Sachsenhausen, a concentration camp north of Berlin, where—apart from Jews, political prisoners, Soviet prisoners of war—the Nazis also held hundreds of gay men, the 175ers, as they were called, since they were arrested under paragraph 175 of the German criminal code. Recognizable by their pink triangles, they were the victims to regular bullying by the guards and sometimes also by fellow inmates. Hundreds of them died, some of them as the result of medical experiments, in which they were injected with hormones or castrated. Between 5,000 and 15,000 homosexuals,mostly forgotten today, died in Nazi camps.

                I had traveled to Berlin during spring break, in the grim shadow of the coronavirus, with a group of undergraduates from Indiana University, where I teach. To get to Sachsenhausen, you take the S-Bahn from Berlin to Oranienburg, a flat, mostly charmless German city that saw heavy bombing during the war. The camp, or the small portion that’s left, is a short walk away. For the last few minutes, before you get to the visitors center, you’ll pass by a tidy array of brick houses once built for the SS guards and their families, laid out neatly as if on a Lego baseplate. Whatever nightmares they may have once contained are now permanently held at bay by grinning garden gnomes and cheerful signs announcing that “here live the Müllers.” In 1992, the visionary American architect Daniel Libeskind proposed flooding a vast swath of the campsite, creating a “sunken architectural zone” to be viewed from a network of dikes and, on a remaining piece of land, a building that would accommodate a library, a chapel, mental health clinics, and other public services (but no residential spaces). His proposal went nowhere.

              • Pro PublicaIllinois Will Stop Helping Cities Collect Some School Ticket Debt From Students

                Illinois’ top financial official has banned local governments from using a state program to collect debt from students who have been ticketed for truancy, eliminating a burden for families struggling to pay steep fines.

                A number of school districts around the state, meanwhile, have begun to scale back and reevaluate when to involve law enforcement in student discipline, among them a suburban Chicago high school where Black students have been disproportionately ticketed. That school, Bloom Trail High School in Steger, said Thursday that it will stop asking police to ticket students and move to other methods of discipline.

              • BBCKenyan fighting FGM crowned world’s best nurse

                Ms Qabale says she was the only university-educated girl from Torbi village, and the only girl educated past primary school level in her family of 19 children.

                The 31-year-old now holds a Masters in Epidemiology and has set up a foundation aimed at empowering young girls and mothers.

              • The AtlanticI Invented Gilead. The Supreme Court Is Making It Real.

                Although I eventually completed this novel and called it The Handmaid’s Tale, I stopped writing it several times, because I considered it too far-fetched. Silly me. Theocratic dictatorships do not lie only in the distant past: There are a number of them on the planet today. What is to prevent the United States from becoming one of them?

              • Common DreamsNationwide ‘Bans Off Our Bodies’ Rallies Planned for Saturday

                People across the United States are planning to take to the streets on Saturday, May 14 to protest right-wing attacks on abortion rights, including the looming reversal of Roe v. Wade.

                Pro-choice groups—including Planned Parenthood organizations, Liberate Abortion, MoveOn, Service Employees International Union, UltraViolet, and Women’s March—are putting together marches, rallies, and other events for the “Bans Off Our Bodies” day of action.

              • Common DreamsBillie Eilish, Ariana Grande, and More Vow Young People ‘Will Not Back Down’ on Abortion Rights

                Ahead of nationwide pro-choice rallies planned for the weekend, Grammy-winning pop stars Billie Eilish and Ariana Grande were among more than 160 artists, actors, and other famous figures who declared in a full-page New York Times advertisement on Friday that young people intend to fight for abortion rights.

                “Our power to plan our own futures and control our own bodies depends on our ability to access sexual and reproductive healthcare, including abortion.”

              • Counter PunchThe GOP’s “Pro-Life” Victory Will Mean More Dead Mothers

                Some Republican abortion foes have called for a federal law along the same lines, criminalizing abortions nationally as homicide.

                Most of the new wave of anti-abortion statutes include no exceptions for incest or rape. A 14-year-old girl who does not want to give birth to her father’s child could be imprisoned for 10 or 15 years. So could a mother who refuses to add a rapist’s child to her family.

              • Counter PunchOverthrowing Manufactured Inevitability, or, No Safe Way to Be Safe

                Many of us can hear her message only as, “Oh, Rev. Warren is right – the good and right and healthy thing for me to do is to slow down, smell the lilacs, hike in the Adirondacks or walk in the city park, dig in the soil, go out and join with people in church or social cause, etc.” But then, when doing the good thing provides no permanent relief from anxiety, we will blame ourselves or something else and return to the substitute sources of relief we know and trust.

                It would be a harder essay to write, and less “NY Times-ogenic,” but what has to be addressed if we’re to get anywhere in bringing people back to relationships embedded in the material, embodied, interdependent world, is how profoundly, existentially unsafe people feel. Partly this is because we live in objectively Apocalyptic times. But, moreover and crucially, this is because most of us never felt emotionally safe in the first place and continue on untreated for our existential anxiety. We’ve lived with that deeper fear for so long it has become indelibly “in charge,” forming the unspoken basis for many of our most important decisions. Decisions based in fear not in strength (i.e., “vote for a Democrat!”), are mainly conforming; the main object being to assuage that dread without ever actually looking at it, like the way you handle a Medusa.

              • Frontpage MagazineRamadan Sees Spike in ‘Disappearance’ of Coptic Christian Women and Girls

                The only thing uncommon about these two stories, which have played out repeatedly in Egypt, is that both the woman and the teenager actually made it back to their families, though, no doubt, only after being permanently scarred by their ordeals.

                The fact is, Coptic Christian girls have been and increasingly continue to be abducted, sexually abused, and forced to convert to Islam and marry their kidnappers—and the majority of them are never seen again.

              • MedforthGermany: Because “certain cultures” are offended by it, a school forbids pupils to wear miniskirts

                An uproar at a secondary school in Bavaria: Despite summer temperatures, schoolgirls are forbidden to wear short dresses or shorts. This clothing is not appropriate out of consideration for other cultures and religions. The school management says that the school stands for a “cosmopolitan society”.

              • BBCPolygamy: Muslim women in India fight ‘abhorrent’ practice

                A 28-year-old Muslim woman’s petition to a court, seeking to prevent her husband from taking another wife without her written consent, has put the spotlight on the practice of polygamy among Indian Muslims.

            • Internet Policy/Net Neutrality

              • TechdirtBiden Broadband Event Showcases Why U.S. Telecom Policy, Press Coverage Is So Broken

                Earlier this week, the Biden administration announced a “new” broadband plan that wasn’t actually new. The rose garden event featured executives from twenty ISPs who all got a pat on the back in front of the cameras for voluntarily and temporarily participating in a Biden plan to provide a $30 discount off of the broadband bills of low-income Americans.

              • TechdirtThe Internet Has Opened Up The Creator Economy To New Heights

                One of the most dramatic differences between the traditional, analogue world of creation, and the modern, digital one, is the democratization that has taken place in this sphere. Until recently, writers, musicians, artists and filmmakers collectively formed a relatively select group that was hard to enter as a professional. Today, anyone with an Internet connection can spread the word about their work and make money from it. In effect, everyone who is online, to a greater or lesser degree, is a digital creator – even with the most ephemeral of posts on social media. Although it is clear the creative field has been opened up enormously, details are hard to come by. That makes a new “Creator Report” from Linktree particularly useful. Linktree describes itself as:

              • offline and limited bandwidth

                It was interesting to hear about the Internet experience in the country of Tajikistan where unlimited high speed data is not something that can be taken for granted. I was happy to hear that Ben was able to get a better deal by being persistant. I had not heard of Internet data being charged based on the time of usage. My parents many years ago tried to save money by switching to an electric plan that charged a higher rate overall but was much cheaper at night. This resulted in them putting timers on appliances so that they would only run during certain hours.

              • dear big internet, why so negative

                There’s a question that I ask myself very frequently, which sounds somewhat like this: “What on Earth did the Internet do to people to make them so full of their negative opinions?”

                And like, don’t get me wrong, opinions are cool, and people are allowed to dislike things (stars know I have a lot of those), but I feel like for years it’s been, you know. Say, you see a movie and you didn’t like it. You can tell your friends and family that the movie was trash in your opinion. Maybe your movie club if you attend one. If your colleague at work mentions said movie, that may be an opportunity for a discussion, too.
                On the other hand, though, if your colleague or your friend is excited to see that movie or liked it already, and instead of having a discussion and seeing their point of view or simply agreeing to disagree you loudly proclaim that their opinion is invalid because you said so… You’re probably going to look like a major ass, aren’t you.

            • Digital Restrictions (DRM)

              • Hollywood ReporterStreaming TV’s Next Battlefront: Free Services Seize Their Moment

                Could Netflix’s pain be someone else’s gain? A number of entertainment companies are counting on exactly that. As consumers grapple with higher subscription costs, and with more subscription video offerings than ever, those companies in the free, ad-supported streaming space (usually referred to as FAST, in industry jargon) think their time is now.

                In fact, many of the biggest players in the FAST space will be familiar to close followers of the entertainment business. There’s Pluto TV, owned by Paramount; there’s Tubi, owned by Fox Corp.; there’s Freevee (formerly IMDb TV), owned by Amazon; there’s Peacock’s free tier, owned by NBCUniversal; and there’s Roku Channel, owned by, well, Roku.

              • Hollywood ReporterNetflix Tells Employees to “Spend Our Members’ Money Wisely” in New Memo

                Netflix is advising its employees to be fiscally responsible, while facing a loss of subscribers that has sparked fears about the viability of streaming services.

            • Monopolies

              • Copyrights

                • CNNHow your photo could end up in the public domain — and used in ads around the world

                  In 24 states, the person in the photo may have a “right of publicity” — which prevents the unauthorized commercial use of someone’s name or likeness, Sedlik said.

                  That protects the person if their photo is used to appear as if they’re endorsing something.

                  A person may have a right in some states, under certain circumstances, to restrict a photographer’s ability to commercially exploit their likeness, Sedlik said. In some states only celebrities have this right, he added.

                  But right of publicity is not the same as copyright protection.

                • Torrent FreakRussia’s Forced Licensing Plan For ‘Enemy’ Content “Legalizes Piracy”

                  After entertainment companies announced suspensions of new business in Russia, the government faced key questions: What happens when the supply of new movies and music runs dry and existing licensing agreements for older content expire? It appears that the Kremlin has a plan for ‘enemy’ content but according to legal video platforms in Russia, it will effectively legalize piracy.

                • Torrent FreakElon Musk: “Overzealous DMCA Is a Plague On Humanity”

                  The richest man on the planet has just shared some controversial takes on copyright and the DMCA. Elon Musk, who might take over Twitter, believes that the current copyright term goes “absurdly far” in protecting creators. In addition, he characterizes the “overzealous” DMCA as a “plague on humanity.”

                • TechdirtBecause Of Course: Rightsholders Pushing To Turn Digital Services Act Into Another Anti-Piracy Tool

                  It never fails. We’ve been talking about the EU’s Digital Services Act for a few years now, looking at how the EU’s technocratic desire to overregulate the internet is going to cause real problems. And while at least they took a more systematic process to figuring out how to write the law, the end result still struck us as a disaster in waiting. And, because this is how any internet regulation attempt always turns out, after all the back and forth discussions and careful weighing of different ideas, someone always has to come in at the very end and seek to make everything much worse. In this case, the issue is that the EU Parliament, which gave us the terrible and broken Copyright Directive, is now trying to sneak more bad copyright ideas into the DSA.


            Links 13/05/2022: NetworkManager 1.38 and Pseudo-Security

            Posted in News Roundup at 7:33 pm by Dr. Roy Schestowitz

            • GNU/Linux

              • Desktop/Laptop

                • Beelink SER 4 4800U X, new mini-PC with Manjaro pre-installed

                  SER 4 4800U X It is a new equipment from the American assembler Beelink and what is its most outstanding novelty? You have already read it in the headline: he arrives with Manjaro pre-installed… and he is not the first.

                  Although, with exceptions, the big brands remain a bit on the sidelines, it is becoming more and more common to find computers with Linux pre-installed and, who says Linux, says some of the big desktop Linux distributions, including Manjaro, the protagonist in this occasion by reason of what was seen.

                  SER 4 4800U is one of the Mini-PCs from Beelink, a firm specialized in this type of product… And SER 4 4800U X is the team edit with Manjaroone that has just gone on sale to give more color to the company’s catalog, as well as more options for customers looking for something different than usual.

              • Server

                • Red Hat Official5 things SREs and Sysadmins should know about ROSA and cloud services

                  Kubernetes, containers and highly scalable cloud services are the modern elements of business software success. But making the jump to Kubernetes requires training, understanding and a good deal of work from developers, architects and systems administrators alike.

                  To save time, speed up development cycles and limit organizational agony, it often makes sense to choose a managed Kubernetes offering, rather than running your own. If that’s a decision you’re considering, here are five things you should know.

              • Audiocasts/Shows

              • Graphics Stack

                • IT World CANvidia Plans To Open-source Part Of Its Linux GPU Driver – IT World Canada

                  Nvidia has announced plans to open-source part of its Linux GPU drivers joining both Intel and AMD. This mark the first step toward open-source parity for Nvidia’s Linux driver packages.

                  “This release is a significant step toward improving the experience of using NVIDIA GPUs in Linux, for tighter integration with the OS, and for developers to debug, integrate, and contribute back. For Linux distribution providers, the open source modules increase ease of use. They also improve the out-of-the-box user experience to sign and distribute the NVIDIA GPU driver. Canonical and SUSE can immediately package the open kernel modules with Ubuntu and SUSE Linux Enterprise Distributions,” states a blog post attributed to Nvidia employees.

                • Game RantNvidia GPUs Are Starting To Embrace Linux More

                  It’s still a rather uncertain time to be a PC gamer. While graphics card prices are continuing to come down for both AMD and Nvidia products, there’s also the ongoing supply issues that have been plaguing the market for what feels like ages now. That aside, however, both companies, along with newcomers Intel, are still keen to keep pushing out new hardware despite the shortages, and it’s now looking like team green is moving into more open-source territories for the first time.

                  According to a recent blog post on the company website, as spotted by PC Gamer, Nvidia has just released some open-source GPU kernel modules for use in Linux-based operating systems. The post goes on to say that this represents a “significant step towards” making its graphics cards better suited for the alternative system. As a result, this could be the start of Linux users being able to use team green’s products with greater ease. The report from PC Gamer goes on to say that, traditionally, users would have to stick with Nvidia’s “proprietary drivers,” which have not always been reliable.

              • Applications

                • 9to5LinuxNetworkManager 1.38 Released with IPv6 and Wi-Fi Hotspot Improvements, More

                  NetworkManager 1.38 release is here to further improve IPv6 support by preferring static IPv6 addresses from “ipv6.addresses” over addresses from DHCPv6 and preferring the first static IPv6 addresses from “ipv6.addresses” to make it consistent with IPv4.

                  NetworkManager 1.38 also improves support for Wi-Fi hotspots by automatically assigning a stable random channel number if one is not manually selected by the user, adds support for the “throw” route type, and improves connectivity checks when the check endpoint address resolves to multiple addresses.

                • Reproducible Builds (diffoscope): diffoscope 212 released

                  The diffoscope maintainers are pleased to announce the release of diffoscope version 212. This version includes the following changes:

                  * Add support for extracting vmlinuz/vmlinux Linux kernel images.
                    (Closes: reproducible-builds/diffoscope#304)
                  * Some Python .pyc files report as "data", so support ".pyc" as a
                    fallback extension.

                • MedevelLeon is your next open-source personal assistant

                  Leon is a next-generation open-source personal virtual assistant, that aims for providing a unique personalized experience.

                  The project is written using web technologies, and you can download, install it at your local machine or remote server.

                  Leon is the brain child of Louis Grenard, who is the lead developer on the project. The project now is a community based the development continues by several contributors.

                • MedevelAdd a live chat to your website or web app with Papercups

                  Papercups is an open-source self-hosted live customer support tool web app written in Elixir language.

                  The project is currently is on stable state which can be used in production, however, it is also in maintenance mode, so don’t expect new features in the near future.

                • Cockpit 269

                  Cockpit is the modern Linux admin interface. We release regularly.

              • Instructionals/Technical

                • nixCraftHow to check if Ansible collection is installed or not
                • How to Install Luakit Browser on Ubuntu

                  On Linux, we have so many interesting applications that it would be very difficult to name them all. There are even web browsers like Firefox that are very popular and well known for being of general use, but there are others with certain particularities. Today, you will learn how to install Luakit Browser on Ubuntu 20.04.

                • How to install MySQL server on Ubuntu 22.04 LTS Linux

                  ySQL version 8.0 is a free and open-source database system used by most web applications and sites on the Internet. Typically MySQL is part of the LAMP (Linux, Apache, MySQL, Perl/Python/PHP) stack. MySQL heavily uses popular open-source software such as WordPress, MediaWiki, and others as a database storage engine. Let us see how to install MySQL server version 8.x on Ubuntu 22.04 LTS Linux server, including settings up a new database, users and fine tuning server config.

                • Ubuntu HandbookWorkaround Chrome / Chromium Double-click Maximize Not Working in Ubuntu 22.04 | UbuntuHandbook

                  User of Google Chrome or Chromium based web browser? Here are the workarounds if you found that double-clicking does not work for maximizing/restoring app window in Ubuntu Linux.

                  When double-clicking on the header bar of any app window, it should maximize or restore the application. However, it just changes the cursor to drag arrow and back then, nothing else happens in Ubuntu 22.04 with Chrome/Chromium.

                • ELinuxHow to fix 502 Bad Gateway | Cloudflare and Nginx [Engintron]

                  When you want to point cloudflare nameservers to your working website with engintron you will have a technical issue with linking cloudflare with engintron.

                  Our technical support / server administrators at subwayhost worked to fix the issue after the request of many client’s to add cloudflare to our services.

                • DedoimedoHow to install and use Notepad++ in Linux – Tutorial

                  The most difficult part in my recently started Windows to Linux migration, initiated (after more than 30 years of steady use of Windows) due to the inefficiency and pointlessness of Windows 11, is in having a sufficiently engaging opening sequence to an article, without repeating myself. It ain’t easy, but I’m trying.

                  Anyway, if you’ve just turned on your TVs, Dedo is starting a process. It will take three or four years, maybe longer. The mission is to use Linux 100% of the time, no more Windows, reasons ere outlined. In a long series of articles, I will be detailing the progress of this mega-project. We’ve already covered a whole bunch of nice programs, including SketchUp, Kerkythea, and KompoZer. Great success. Now, we need to tackle Notepad++, a most splendid and Windows-only text editor. Follow me.

              • Games

            • Distributions and Operating Systems

              • SUSE/OpenSUSE

                • openSUSE Tumbleweed – Review of the week 2022/19

                  This week you ‘only’ had to update your machine 5 times – for the snapshots 0505, which was for some reason not announced, 0506, 0507, 0509, and 0510 (the last one fresh off the press). 0508 would have been ok, but QA was slightly slower than OBS and so the new snapshot moved to QA before the old one was completely tested. Oops. Anyway, nothing was lost, all good things from that snapshot are still shipped, just a day later.

              • Fedora Family / IBM

                • AlmaLinux OS 8.6 Is Now Available for Download

                  The latest version of Almalinux OS 8.6 “Sky Tiger”, is promoted as an alternative to CentOS. AlmaLinux OS Foundation announces the general availability of AlmaLinux OS 8.6. AlmaLinux OS 8.6 is available for download from the official website,

                • Red Hat Announces Upcoming Release of Red Hat Enterprise Linux 9 – itsfoss.net

                  The Red Hat Summit 2022 is being held these days and among the many novelties that the event is leaving behind, the announcement of Red Hat Enterprise Linux 9 is possibly the most prominent of them, given the importance of the system, as well as in the organizational chart of corporate Linux from which a few distributions derive, as the basis of the company’s own solution offering.

                  The new version of Red Hat Enterprise Linux (RHEL) includes not only what has been accumulated over the last few years, but also many novelties from a new batch of which we already had a first glimpse last November, when the RHEL 9 beta was announced, just before RHEL 8.5 was released. A previous release so that the most adventurous users, but also the most interested, prepare themselves in time for the upcoming changes.

                • ZDNetFedora 36 is one of the best options for new Linux users | ZDNet

                  For the longest time, Fedora was a distribution best used by those with plenty of Linux experience. It was a bleeding-edge operating system, which meant it shipped with all the newest software. That alone makes for a tricky situation for new users as things could tend to break.

                • Remi Collet: PHP version 8.0.19 and 8.1.6

                  RPMs of PHP version 8.1.6 are available in remi-modular repository for Fedora ≥ 34 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky…) and in remi-php81 repository for EL 7.

                  RPMs of PHP version 8.0.19 are available in remi-modular repository for Fedora ≥ 34 and Enterprise Linux ≥ 8 (RHEL, Alma, CentOS, Rocky…) and in remi-php80 repository for EL 7.

                • Enterprisers Project3 reasons autonomy is more important than flexibility

                  As companies switched to a remote work model at the start of the pandemic, some began experimenting with an asynchronous and autonomous work style. Since then, employees have grown accustomed to a certain level of flexibility while working from home – they have priorities outside of work and want a schedule that enables them to balance these priorities with work.

                  More than flexibility, however, autonomy empowers employees to make decisions independent of immediate input from supervisors. It is essential to switch a team to an asynchronous work model successfully.

                  Autonomous and asynchronous workstyles offer many benefits, primarily increased productivity, a better work/life balance, a stronger sense of ownership over schedules, and improved trust between the organization and the employee.

                • Fedora ProjectCPE Weekly Update – Week 19 2022 – Fedora Community Blog

                  This is a weekly report from the CPE (Community Platform Engineering) Team.

                • Fedora ProjectYou’re invited: Fedora Ambassador Call – Fedora Community Blog

                  A couple weeks ago the Fedora Community Outreach Revamp(FCOR) team announced that we would be organising an Ambassador Call Kick-off and collected feedback about availability. Based on the results from the whenisgood, we are excited to invite you to the Ambassador Call Kick-Off, on May 18th at 3PM UTC.

              • Debian Family

                • Bits from Debian: New Debian Developers and Maintainers (March and April 2022) [Ed: Debian (which we use on four machines) manages to recruit just one Developer a month. Not enough, DPL admits. Maybe they need better leadership.]
                • Barry KaulerEasyOS .img file now not compressed

                  Up until now, EasyOS has been available as a compressed image file, named ‘easy-[-]-.img.gz’, for example ‘easy-3.4.7-amd64.img.gz’.

                  Internally, it consists of a 1M gap, then a 639M vfat partition, then a 640M ext4 partition, plus another gap on the end, total file size 1281M uncompressed.
                  Note, these days we have the term “MiB” to denote binary megabytes, 1048576 bytes (1024×1024), instead of 1,000,000 bytes. So, by “M” I actually mean MiB.

                • Barry KaulerIntroducing Easy Bookworm

                  The Dunfell-series of Easy is built with packages compiled from source. There was an earlier Buster-series, now retired, built with Debian Buster DEBs.

                  Debian 12 is not scheduled to be released until mid-2023. It is known as the “testing” branch, and will become the “stable” branch when released. It is also known as “Bookworm”.

                • Barry KaulerKernel 5.15.39 compiled in Easy Bookworm

                  Partly this was to test that the ‘devx’ SFS works, and it does.

                  But also, rufwoof recommended that lz4 be enabled for squashfs in the Linux kernel, as this compression format has very fast decompression. rufwoof’s post:


                  The first time that you boot Easy, the QuickSetup window appears. You can also run it anytime via “Setup -> Quicksetup first-run settings” in the menu. In QuickSetup, there is a checkbox labeled “Recompress easy.sfs” — tick that, and easy.sfs will be changed from xz-compression to gz-compression. This will give faster reading of files from easy.sfs, and you might notice slightly snappier performance on an older computer.

              • Canonical/Ubuntu Family

            • Free, Libre, and Open Source Software

              • MedevelJulius is a lightweight open-source Speech Recognition Engine

                “Julius” is a high-performance, small-footprint large vocabulary continuous speech recognition (LVCSR) decoder software for speech-related researchers and developers. It is primarily written for C programming language.

              • MedevelChatwoot is an open-source self-hosted custom support system

                Chatwoot is an open-source, self-hosted customer engagement suite. Chatwoot lets you view and manage your customer data, communicate with them irrespective of which medium they use, and re-engage them based on their profile.

              • FOSSLifeTake the 2022 “State of Open” Survey from OpenUK

                OpenUK’s second “State of Open” survey” is now live and runs until midnight BST on June 12, 2022.

                This year’s survey aims to capture UK open source adoption levels as well as take “a deep dive into the impacts and consequences of maturing open source software consumption, contribution and redistribution,” according to Amanda Brock, CEO, OpenUK, in the survey announcement.

              • Web Browsers

                • Mozilla

                  • Extension starter pack – Firefox Add-ons Blog

                    You’ve probably heard about “ad blockers,” “tab managers,” “anti-trackers” or any number of browser customization tools commonly known as extensions. And maybe you’re intrigued to try one, but you’ve never installed an extension before and the whole notion just seems a bit obscure.

              • Productivity Software/LibreOffice/Calligra

                • ONLYOFFICE 7.1 Office Suite Update Released

                  ONLYOFFICE 7.1 Office Suite Update Released, New release of ONLYOFFICE DocumentServer 7.1 with the implementation of a server for ONLYOFFICE online editors and collaboration. Editors can be used to work with text documents, spreadsheets and presentations. The project code is distributed under the free license AGPLv3.

                  At the ONLYOFFICE DesktopEditors 7.1 , built on a single code base with online editors. Desktop editors are designed as desktop applications that are written in JavaScript using web technologies, but combine client and server components in one set, designed for self-sufficient use on the user’s local system, without resorting to an external service. For collaboration at your own facilities, you can also use the Nextcloud Hub, which provides full integration with ONLYOFFICE. Ready builds generated for Linux, Windows and macOS.

              • Openness/Sharing/Collaboration

                • Open Access/Content

                  • OpenSource.comWhen open source meets academic publishing: Platinum open access journals | Opensource.com

                    Academics routinely give away their work to companies for free—and then they buy it back! Can you imagine a farmer giving away free food and then paying to get it back for dinner? Probably not. Yet academics like me have been trapped for decades in a scheme where we give free work in exchange for job security and then pay millions of dollars a year to read our own writing.

                    Fortunately, this is changing. The results from a study I just finished show that it is possible for academics to get job security without paying for it. My study found hundreds of journals that are platinum open access (OA)—that is, they require neither the author nor the readers to pay for peer-reviewed work—yet still carry the prestige and readership to help academics succeed in their careers.

                    This trend is exploding: The Directory of Open Access Journals lists over 17,300 journals that offer a means of OA at some level, and over 12,250 have no article-processing charges (APCs). I used a handy open source Python script to compare this list to a list of journals ranked by the frequency with which their published papers are cited in other articles (The Journal Impact Factor List). It is clear that the last few years have seen a growing trend towards both OA in general and platinum OA specifically. These trends have the potential to accelerate science while helping prevent academic servitude.

              • Programming/Development

                • Julia Evanssqlite-utils: a nice way to import data into SQLite for analysis

                  This is a quick post about a nice tool I found recently called sqlite-utils, from the tools category.

                  Recently I wanted to do some basic data analysis using data from my Shopify store. So I figured I’d query the Shopify API and import my data into SQLite, and then I could make queries to get the graphs I want.

                  But this seemed like a lot of boring work, like I’d have to write a schema and write a Python program. So I hunted around for a solution, and I found sqlite-utils, a tool designed to make it easy to import arbitrary data into SQLite to do data analysis on the data.

                • DevOps inspiration from Toyota Production System and Lean considered harmful

                  Note: This text was originally the synopsis for a much longer article which I intended to write as the followup to a lightning talk about the subject I did at my workplace. Acknowledging that I probably won’t get time to write the long version, I think this synopsis can stand pretty well on its own as a statement of intent.

                  DevOps and DevOps-related practices has become a huge thing in the software industry. Elements of this, such as Continuous Integration and Continuous Deployment and the focus on monitoring production systems and metrics has resulted in large improvements in the handling of large-scale deployments. Especially, the act of deployment to production, in traditional systems often an error-prone process riddled with cataclysmic pitfalls and requiring huge amounts of overtime, is reduced to the trivial pushing of a button which can easily be done in normal office hours.

              • Leftovers

                • TediumHow Anti-Right-To-Repair Companies Try to Have it Both Ways

                  One of the greatest innovations of the 18th century came about in wartime and soon helped to enable the industrial revolution. And it involved a simple idea: Machines in which all the parts could be replaced with other, similar parts. But as the parts get smaller and more sophisticated, one could argue that the big innovation at the center of modern repairability is under threat. Simply put, interchangeability, a feature that won wars and enabled much of modern culture, is falling out of fashion in favor of obsolescence and disposability. Today’s Tedium ponders the long tension between these two competing ways of thinking about the objects we buy and use on a daily basis.

                • Linux Foundation

                • Security

                  • DedoimedoIntermittent SSL certificate and connectivity problems

                    Some of you may have noticed, and in fact contacted me about this, that occasionally, Dedoimedo is not available. Specifically, when you try to access the site, you get an SSL certificate warning from your browser. I would like to inform you that I am aware of the issue, and I have been trying to get my hosting provider to resolve this for a while now.

                    In more detail, the problem is that when the issue occurs, the certificate warning tells you that you’re trying to connect to *gridserver.com rather than my site, ergo dedoimedo.com. The aforementioned grid is part of the shared hosting environment where my site resides.

                    My guess is that the hosting provider has a fault with one of their loadbalancer or Web server nodes, which does not properly terminate SSL. I have contacted them numerous times about this, wit no resolution provided yet. As to you, my dear readers, if you encounter this, the fix is simple. Just wait 2-3 minutes, and then refresh the page. You will then most likely land on a different grid node, with correct SSL termination, and everything will work fine. On my side, I will look at perhaps using a different hosting provider. Thank you for reading.

                  • Fear, Uncertainty,

                    • Attack on German companies through NPM packages [Ed: Microsoft is transmitting malware again, but guess who the media will blame (perpetrators and victims, not the carrier)]

                      A new portion of malicious NPM packages created for targeted attacks on the German companies Bertelsmann, Bosch, Stihl and DB Schenker have been uncovered. The attack uses the dependency mixing method, which manipulates the intersection of dependency names in public and internal repositories. In publicly available applications, attackers find traces of accessing internal NPM packages downloaded from corporate repositories, whereupon they place packages with the same names and newer version numbers in the public NPM repository. If, when building, internal libraries are not explicitly linked in the settings to their repository, the npm package manager considers the public repository to be a higher priority and downloads the package prepared by the attacker.

                    • Dark ReadingLinux, OpenSSF Champion Plan to Improve Open Source Security [Ed: Look what companies are in this thing. They relay everyone's data to the NSA. That itself is a data breach.]
                    • LinuxInsiderOpen Source Leaders Push WH for Security Action [Ed: Microsoft is not “Open Source Leader”]

                      The Linux Foundation and the Open Source Software Security Foundation (OpenSSF) brought together over 90 executives from 37 companies and government leaders from the NSC, ONCD, CISA, NIST, DOE, and OMB on Thursday to reach a consensus on key actions to take to improve the resiliency and security of open-source software.

                    • ZDNetWhite House joins OpenSSF and the Linux Foundation in securing open-source software [Ed: Steven Vaughan-Nichols is paid to have become a corporate writer for corporate front group, with his occasional defamation against the community]
                    • Linux Foundation’s Site/BlogThe Linux Foundation and Open Source Software Security Foundation (OpenSSF) Gather Industry and Government Leaders for Open Source Software Security Summit II [Ed: Linux Foundation quotes Jim Zemlin on security like Zemlin is a technical person. He is not. Charade, theatre, kakistocracy for FUD. If you are a Linux user, Linux Foundation does not represent you. If you are a Microsoft fan, then maybe Linux Foundation does speak for you. Linux Foundation is, in a nutshell, suits and nontechnical people exercising totalitarian control an authority over technical people, using capital as a weapon.]
                    • Venture BeatHow much will it cost to secure open-source software? OpenSSF says $147.9M | VentureBeat [Ed: Linux Foundation is a source of FUD against Linux. Well, look who controls the organisation. This report cites Microsoft proxies as "sources" regarding "Open Source" security...]

                      In recent years there have been multiple vulnerabilities in open-source software that have been exploited, leaving organizations of all sizes at risk.

                  • Privacy/Surveillance

                    • PurismThe Second Best Time to Protect Your Privacy – Purism

                      There is a well-known Chinese proverb that says “The best time to plant a tree was 20 years ago, the second best time is now.” This saying applies to many areas of life, and it also applies to privacy. The last few decades have seen a dramatic increase in the depth and breadth of privacy invasions from Big Tech companies. This increase tracks with the increase in smartphone usage, because what better way to invade someone’s privacy than with an always-on, always-connected computer full of sensors that people carry with them wherever they go? Few people took active steps to protect their privacy 20 years ago, but the second best time to protect your privacy is now. If you care about your privacy, what should you do, right now?

                • Internet Policy/Net Neutrality

                  • Public KnowledgeIP3 Awards Nominations – Public Knowledge

                    Public Knowledge’s IP3 Awards is our way of honoring people that make significant contributions in the three areas of “IP”—Intellectual Property, Information Policy, and Internet Protocol.

                  • Public KnowledgePublic Knowledge Applauds NTIA’s ‘Internet for All’ Roadmap To Help Close Digital Divide – Public Knowledge

                    Today, the National Telecommunications and Information Administration announced three Notice of Funding Opportunities, collectively called the “Internet for All” program, outlining grant rules for potential recipients seeking broadband funding to promote access, affordability, and digital equity and inclusion. The Internet for All programs were funded under the bipartisan “Infrastructure Investment and Jobs Act.” Congress directed the NTIA to distribute nearly $45 billion dollars for broadband deployment and digital equity initiatives. Public Knowledge recently submitted comments encouraging the agency to ensure these funds result in affordable, reliable, and open networks for everyone.

              Links 13/05/2022: GCC 12 Becoming Default Compiler in Tumbleweed

              Posted in News Roundup at 2:58 pm by Dr. Roy Schestowitz

              • GNU/Linux

                • Containers

                  • TechTargetDocker Extensions, Desktop for Linux get mixed reception

                    Docker introduced Docker Extensions, Docker Desktop for Linux and the acquisition of Nestybox at DockerCon 2022. The new features received a mixed reception from industry analysts and developers.

                    Palo Alto-based Docker unveiled the new additions to the company’s platform at this week’s DockerCon 2022 virtual event. Docker Extensions includes one-click pluggables from JFrog, Red Hat and VMware and allow developers to integrate additional tools and new functionality to Docker Desktop with more ease.

                  • InfoWorldDocker Desktop comes to Linux, adds extensions SDK
                  • TechTargetZerto 9.5 update adds Linux support and multi-cloud storage

                    Zerto’s latest update to its Zerto Platform adds support for Linux data recovery, an important upgrade for Kubernetes users, and new features for Microsoft Azure and Google Cloud Platform users.

                    The Zerto 9.5 update, now generally available to Zerto customers, brings new features to help companies build cyber resilience and data recovery. Headlining additions in the 9.5 update include support for immutable data in Microsoft Azure, a new Debian Linux virtual appliance for managing Zerto and support for Google Cloud Platform storage.

                • Audiocasts/Shows

                • Kernel Space

                  • Graphics Stack

                    • Alyssa RosenzweigRosenzweig – The Apple GPU and the Impossible Bug

                      In late 2020, Apple debuted the M1 with Apple’s GPU architecture, AGX, rumoured to be derived from Imagination’s PowerVR series. Since then, we’ve been reverse-engineering AGX and building open source graphics drivers. Last January, I rendered a triangle with my own code, but there has since been a heinous bug lurking:

                      The driver fails to render large amounts of geometry.

                      Spinning a cube is fine, low polygon geometry is okay, but detailed models won’t render. Instead, the GPU renders only part of the model and then faults.


                      Traditional immediate mode renderers render directly into the framebuffer. They first run the vertex shader for each vertex of a triangle, then run the fragment shader for each pixel in the triangle. Per-vertex “varying” data is passed almost directly between the shaders, so immediate mode renderers are efficient for complex scenes.

                      There is a drawback: rendering directly into the framebuffer requires tremendous amounts of memory access to constantly write the results of the fragment shader and to read out back results when blending. Immediate mode renderers are suited to discrete, power-hungry desktop GPUs with dedicated video RAM.

                    • How mesh shaders are implemented in the driver | Timur’s blog

                      In part 1 I gave a brief introduction on what mesh and task shaders are from the perspective of application developers. Now it’s time to dive deeper and talk about how mesh shaders are implemented in a Vulkan driver on AMD HW. Note that everything I discuss here is already available as public information in open source driver code. The goal of this blog post is to elaborate on how mesh shaders are implemented on the NGG hardware in AMD RDNA2 GPUs, and to show how these details affect shader performance. Hopefully, this helps the reader better understand how the concepts in the API are translated to the HW and what pitfalls to avoid to get good perf.

                    • Timur Kristóf: How mesh shaders are implemented the driver

                      In part 1 I gave a brief introduction on what mesh and task shaders are from the perspective of application developers. Now it’s time to dive deeper and talk about how mesh shaders are implemented in a Vulkan driver on AMD HW. Note that everything I discuss here is already available as public information in open source driver code. The goal of this blog post is to elaborate on how mesh shaders are implemented on the NGG hardware in AMD RDNA2 GPUs, and to show how these details affect shader performance. Hopefully, this helps the reader better understand how the concepts in the API are translated to the HW and what pitfalls to avoid to get good perf.

                • Applications

                  • Ubuntu Pit20 Best Linux PDF Editors: Edit Pdf Files on Your Linux System

                    Portable Document Format – PDF is a popular and widely used file system for emailing, sharing, and printing documents. You may need to install a suitable Linux pdf editor for basic editing because Linux does not have a default pdf editor. There are many options available when the question comes to editing pdf in Linux, but the choice is very limited if you compare it with adobe acrobat for Windows and macOS. That’s why here I have reviewed both free, open source, and paid Linux pdf editors for fulfilling the requirement of advanced and basic options.

                  • MedevelChatty is an open-source Twitch Chat Client

                    Chatty is a free open-source Twitch chatting app that runs on Windows, Linux, and macOS. It has a retro look that resemble classic IRC clients.

                    Chatty has a built-in streaming support which allows users to watch, and stream their plays with one click.

                    The app is built using Java programming language, and it offers packages for Windows, Linux, and macOS.

                • Instructionals/Technical

                  • Linux HandbookHow to Set Timeout in cURL

                    cURL is an excellent tool for network communications, it stands for ‘client URL.’ Virtually every device uses cURL on the globe that connects to the Internet. The widest use of cURL is to download files from a remote server in the terminal.

                    The initial phase of connecting to a server for any sort of communication is waiting for a response. The delay can occur due to a large variety of reasons, some of them being load on the server, network bandwidth, latency, jitter etc.

                    If the delay is higher than what you would like to wait, you can specify a ‘timeout’ duration.

                  • Install Third Party Software Using Fedy In Fedora – OSTechNix

                    The Fedora project will not include any package that doesn’t comply with Fedora licensing policies in the official repositories. So, the Fedora users rely on third-party repositories like RPM Fusion to install propriety drivers, software and codecs that Fedora doesn’t want to ship due to legal and licensing reasons. In this guide, we will see what is Fedy and how to install third-party software and multimedia codecs with Fedy in Fedora Linux operating systems.

                  • ID RootHow To Install LEMP Stack on Ubuntu 22.04 LTS – idroot

                    In this tutorial, we will show you how to install LEMP Stack on Ubuntu 22.04 LTS. For those of you who didn’t know, LEMP Stack is a combination of free, open source software. The acronym LEMP refers to the first letters of Linux (Operating system), Nginx Server, MariaDB (database software), and PHP components to build a viable general purpose web server.

                    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the LEMP Stack on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

                  • Red Hat OfficialAn Ansible playbook for solving a new problem from scratch | Enable Sysadmin

                    Imagine you’re in the middle of a cloud migration or a penetration test, and you have to enable an existing account on over 400 hosts as quickly as possible. It sounds like a big problem, but it can be easy with automation.

                    First things first. You must define the exact requirements you have for the task. This is the step that will help and guide your code for automation. Don’t do this in code yet.

                  • Digital TrendsHow to dual boot Linux and Windows | Digital Trends

                    Although Windows is the most widely supported operating system, Linux is a great alternative. Thankfully, you don’t have to choose between them. In this guide, we’re going to show you how to dual boot Linux and Windows to get the best of both worlds — whether that’s with Windows 10 or the newer Windows 11.

                  • How to Install Icinga2 Monitoring Tool on OpenSUSE

                    Icinga is an open-source network monitoring tool that was initially created as a fork of the Nagios monitoring tool back in 2009.

                    Icinga checks the availability of servers and network devices such as switches and routers and sends a report to sysadmins about any failures or downtime. It also provides comprehensive data which can be visualized and used for reporting.

                    Its scalability and extensibility make it possible to monitor small and large network environments across several locations.

                    In this guide, you will learn how to install the Icinga network monitoring tool on OpenSUSE Linux.

                  • Linux Made SimpleHow to install Xemu on a Chromebook

                    Today we are looking at how to install Xemu, Xbox Emulator, on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

                  • How to Run a Linux Command Without Saving It in History

                    By default, every command that you execute on your terminal is stored by the shell (command interpreter) in a certain file called a history file or shell command history. In Bash (the most popular shell on Linux systems), by default, the number of commands persisted in the history is 1000, and some Linux distributions have 500.

                  • Linux HandbookHow to Make Nested Directories in Linux Command Line

                    Creating nested directories when the parent directory does not exist is… impossible. But that also does not mean that you need to create the parent directory first and invoke mkdir again.

                    There is a faster way to achieve this; you can use the -p flag with mkdir command.

                    mkdir -p parent_dir/child_dir/nested_child_dir
                    Using the -p flag will let mkdir know that it is okay to make a parent directory if it does not exist yet, and then create a nested child directory.

                  • UNIX CopHow to install Composer on CentOS 9 Stream?

                    PHP Composer is a dependency manager for PHP. With this dependency manager, you will be able to manage the libraries that your web application requires.

                    One of the examples where the usefulness of Composer is best shown is when our project depends on many external libraries. Thanks to Composer, we will be able to add them, to eliminate them and to update them in a fast and simple way.

                    The operation of PHP Composer is quite similar to the one we give to the package managers for Linux, like APT or DNF.

                  • Linux Shell TipsHow to Create Your Own Mail Server Using Modoboa in Ubuntu

                    The main reason for considering other mail servers like Modoboa over the likes of Gmail and Yahoo is the unlimited customization associated with your mailbox.

                    The Modoboa open-source mail server makes it possible to create a mailbox from a unique username and a registered domain name (username@domain-name.extension). Since Modoboa is written in Python, you will need the latest Python version installed on the Linux system intended to run/host this mail server.

                  • ID RootHow To Install MySQL on Ubuntu 22.04 LTS – idroot

                    In this tutorial, we will show you how to install MySQL on Ubuntu 22.04 LTS. For those of you who didn’t know, MySQL is an open-source relational database management system. It is developed and supported by Oracle Corporation. MySQL is available on other platforms and operating systems including Linux, Unix, Mac, and Windows.

                    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MySQL database server on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

                  • UNIX CopInstall FreePBX and Asterisk on Ubuntu 22.04

                    Today you will learn how to install FreePBX and Asterisk on Ubuntu 22.04

                    Asterisk is an Open-Source VOIP server to facilitate business, and other organizations’ communication in terms of Voice calls, Voicemail, call recording, interactive voice response, and conferencing calling.

                    The system is managed through a web browser where we create

                  • Secureboot Signing With Your Own Key

                    First, we’ll need some packages:

                    dnf install pesign mokutil keyutils
                    (Package names are the same on most major distros, though of course your package manager won’t be the same.)

                    Next, we create a key for signing. This uses efikeygen, from the pesign project; I prefer efikeygen because it also creates an NSS database that will be useful for pesign later.

                • Desktop Environments/WMs

                  • K Desktop Environment/KDE SC/Qt

                    • TidBITSKDE Connect Brings iPhone Connectivity to Linux

                      The iPhone and Linux go together like strawberries and mustard. Apple has no interest in supporting Linux and most open-source developers hate Apple and its proprietary platforms. But some iPhone users also use Linux, and while no one would expect the same tight integration that the iPhone and Mac share, it would at least be nice to exchange the occasional file between devices.

                      Linux was actually ahead of Apple on smartphone integration, at least on Android. Since 2013, KDE Connect has let Linux users wirelessly share clipboards, notifications, files, URLs, text messages, and more between their Android phones and Linux desktops.

                  • GNOME Desktop/GTK

                    • Trying out systemd’s Portable Services – Sam Thursfield

                      There’s no sound from the device itself, all it outputs is a USB serial connection. Software instruments connect to the grid to receive button presses and control the lights via the widely-supported protocol Open Sound Control protocol. I am using monome-rs to convert the grid signals into MIDI, send them to Bitwig Studio and make interesting noises, which I am excited to share with you in the future, but first we need to talk about software packaging.

                      Monome provide a system service named serialosc, which connects to the grid hardware (over USB-serial) and provides the Open Sound Control endpoint. This program is not packaged in by Linux distributions and that is fine, it’s rather niche hardware and distro maintainers shouldn’t have support every last weird device. On the other hand, it’s rather crude to build it from source myself, install it into /usr/local, add a system service, etc. etc. Is there a better way?

                    • Marcus Lundblad: [GNOME] Maps Spring Cleaning

                      Thought it was time to share some news on Maps again.

                      After the 42.0 release I have been putting down some time to do some spring cleaning in Maps to slim down a little bit on the code.

                      This would also mean less stuff to care about later on when porting to GTK4.

                      First we have the “no network” view.

                      We used to use the network monitor functionality from GIO to determine if the machine has a usable connection able to reach the public internet to avoid showing incomplete map tile data (where some parts might be cached from earlier, while others are missing).

                      Unfortunately there has been some issues with some setups not playing well NetworkManager (such as some third-party VPN software). So we have had several bug reports around this over the years.

                    • GNOME Project Strategy in 2022

                      Robert McQueen, CEO of the GNOME Foundation, unveiled new initiatives aimed at attracting new users and developers to the GNOME platform. It is noted that in the past, the GNOME Foundation focused on increasing the relevance of GNOME and technologies such as GTK, as well as accepting donations from companies and individuals close to the free and open source ecosystem. New initiatives are aimed at attracting people from the outside world, getting to know the project from third parties, and looking for new opportunities to attract investment in the GNOME project.

                • Distributions

                  • BSD

                  • SUSE/OpenSUSE

                    • Maintaina Horde: Tumbleweed and PHP 8.1

                      PHP 8.1 is available off the shelf in openSUSE Tumbleweed. I will shortly prepare a PHP 8.1 / tumbleweed version of the maintaina Horde containers. These will initially be broken due to some outdated language constructs. As PHP 7.4 will EOL by the end of this year, I decided not to bother with PHP 8.0 and ensure compatibility with PHP 8.1 right away, while staying compatible with PHP 7.4 until end of year. This is not fun. PHP 8.x provides several features which allow for more concise code. I will not be able to use them.

                    • SUSE’s Corporate BlogSee what’s new in Enterprise Container Management at SUSECON

                      I’m excited to be keynoting SUSECON Digital 2022 on June 7-9 2022. As we count down the days, I’m happy to share a little of what to expect from the event in a few short weeks.

                  • IBM/Red Hat/Fedora

                    • LinuxiacAlmaLinux 8.6 “Sky Tiger” Released, Added New Module Streams

                      AlmaLinux 8.6 was made available within 48 hours after the release of the upstream Red Had Enterprise Linux 8.6. Here’s what is new!

                      AlmaLinux has emerged as a popular option for Red Hat Enterprise Linux‘s free version since CentOS’s entry into the “stream.” This is the OS’s fourth stable release, proving the AlmaLinux Foundation’s commitment to delivering on its promises.

                      The new stable AlmaLinux 8.6 release for x86_64, aarch64, and ppc64le architectures are ready for production installations and power the computing needs and workloads. So let’s see what’s new in this release.

                    • Available Fedora 36 with GNOME 42 and Wayland for NVIDIA

                      fedora 36 It is now available as the latest version of the community distribution sponsored by Red Hat, which is also the great pioneer of the technological advancement of Linux. This time we find more of the same, but updated, so GNOME 42 stands out, the establishment of Wayland by default for the NVIDIA driver and the update of compilers and interpreters for various programming languages.

                      We begin the compilation of novelties with the most obvious: the presence of Gnome 42. The close relationship between GNOME, Fedora and Red Hat is no secret, so the distribution has de facto played the role of reference for the desktop environment. here the implementation is pretty pure (there are only a few cosmetic changes), so to a certain extent it can be said that it invites the user to try the experience that it offers by default.

                  • Debian Family

                    • Toolforge GridEngine Debian 10 Buster migration

                      In accordance with our operating system upgrade policy, we should migrate our servers to Debian Buster.

                      As discussed in the previous post, one of the most important and successful services provided by the Wikimedia Cloud Services team at the Wikimedia Foundation is Toolforge. Toolforge is a platform that allows users and developers to run and use a variety of applications with the ultimate goal of helping the Wikimedia mission from the technical side.

                      As you may know already, all Wikimedia Foundation servers are powered by Debian, and this includes Toolforge and Cloud VPS. The Debian Project mostly follows a two year cadence for releases, and Toolforge has been using Debian Stretch for some years now, which nowadays is considered “old-old-stable”. In accordance with our operating system upgrade policy, we should migrate our servers to Debian Buster.

                  • Canonical/Ubuntu Family

                    • OMG UbuntuWe’re Off — Ubuntu 22.10 Daily Builds Available to Download

                      Ubuntu 22.10 daily builds are now available to download.

                      These are snapshot images produced daily for testing and development purposes, but there’s nothing to stop you from using them as your main OS. In fact, Ubuntu daily builds are a quick and easy way to check in on the state of development during the course the 22.10 development cycle.

                      It’s May 12 that I write this so development is only a few weeks in. As such, there’s not much “new” to see in the release codenamed “Kinetic Kudu”. The early part of developer is spent getting imports synced, tooling updated, and the requisite tech plumbed in and hooked up so all is working well.

                      Then all the interesting stuff comes.

                    • Ubuntu 22.10 Kinetic Kudu Daily Build ISO Now Available For Download | Itsubuntu.com

                      Ubuntu 22.10 Kinetic Kudu Daily Build ISO Now Available For Download

                      If you want to try Ubuntu 22.10 Kinetic Kudu then you download the daily build ISO from the website of Ubuntu. Ubuntu 22.10 will be available on October 20th, 2022.

                    • Its FOSSUbuntu 22.10 Daily Builds Available for Early Adopters – It’s FOSS News

                      It has been a few weeks since Ubuntu 22.04 LTS launched.

                      Without a surprise, we got the codename for the next version upgrade (non-LTS release) as “Kinetic Kudu” (Kudu referring to the African species of Antelopes, Kinetic hinting at the energy/movement).

                      Recently, the first daily build of Ubuntu 22.10 also went live for the early testers and developers.

                    • Ubuntu Core 22 Beta is now available

                      Ubuntu Core, the Ubuntu flavour optimised for IoT and edge devices, has now available a Beta version for the new UC22 release. You can start using Ubuntu Core 22 Beta if you’re interested in testing the new features of the upcoming GA release.

                • Devices/Embedded

                • Free, Libre, and Open Source Software

                  • Web Browsers

                  • Productivity Software/LibreOffice/Calligra

                    • Improving Calc support for 16384 columns

                      So I enabled support for up to 16384 columns in Calc by default some time ago, but just getting it to work was not necessarily the end of the work. Making Calc have 16 times more columns means that any operation that works on entire columns is suddenly 16 times slower, or even worse. Similarly this could easily lead to 16x more memory used. So the support not only needs to work, but it also needs to be usable.

                      It theory adding a number of empty columns to the end of a spreadsheet should not make a difference, but in practice it does. With 1024 columns it is not as necessary to ignore those empty columns as it is with 16k, and a lot of the code dates back to the times when Calc supported even fewer colums (256?), where a being little inefficient here or there didn’t show. But now it suddently did.

                      For example, if you protect or hide all unused columns until the end of the spreadsheet, then hitting the right arrow key on the last accessible cell makes Calc check all cells to the right for whether it’s possible to go into them. And checking whether a column is hidden requires searching the list of column information, which is not trivial (it’s compacted in order not to waste memory). The barely noticeable cost of this with 1024 columns got large enough to cause noticeable delays. Fortunately the ColHidden() function is smart enough to return the first and last column in the compacted range where the flag is equal, the code doing the cursor navigation just up until now didn’t bother using that information, but now it needed to do so.

                    • Document FoundationAnnual Report: TDF’s infrastructure in 2021 – The Document Foundation Blog

                      LibreOffice’s infrastructure team is responsible for maintaining the hardware, virtual machines and services that enable the wider community to develop, market, test, localize and improve the software. The public infrastructure is powered by around 50 kernel-based virtual machines (KVMs) spread across four hypervisors, plugged to an internal 10Gbps switch, hosted at Manitu in St. Wendel (Germany), and managed with libvirt and its KVM/QEMU driver. The virtual disk images are typically stored in GlusterFS volumes – distributed across the hypervisors – except for some transient disks (such as cache) where the IOPS requirement is higher and the redundancy less important.

                      As 2021 marked another “pandemic year” with only online events, the infrastructure team helped too make these a pleasant experience from home. Notably, they deployed a Pretalx instance to manage conference submissions and the schedule, and put in place a streaming backend based on Jitsi/Jibri/RTMP during the annual conference, thereby providing several participation options to chose from.

                  • Education

                    • Join upcoming hackathon “Get plugged into education!” with Moodle

                      ‘Get plugged into education!’ with Moodle will be the first project in a series of hackathons part of a joint initiative launched by The United Nations Office of Information and Communications Technology (OICT) and the Directorate-General for Informatics of European Commission (DG DIGIT). These hackathons will aim to improve and contribute to open source projects that have an impact on the UN Sustainable Development Goals (SDG).

                  • FSF

                    • GNU Projects

                      • GCC 12 Becoming Default Compiler in Tumbleweed

                        More than a month after preparing the default compiler for openSUSE Tumbleweed to be switched to GNU Compiler Collection 12, the latest snapshot passed openQA and is making GCC12 the default compiler for the rolling release.

                        A complete rebuild of snapshot 20220510 is syncing with the mirrors and should soon be a zypper dup away from users changing their rolling release’s default compiler. Being a complete rebuild, it might take some time to sync with the mirrors, but developers can soon have the newest GCC for their development.

                    • Licensing/Legal

                      • New Software Freedom Conservancy Introduction Video

                        We strive to make the concepts and impacts of software freedom accessible to everyone. We are thus so pleased to show you our new video! This video (deftly narrated by our own Executive Director, Karen Sandler) explains what we do. Our charity has a very specific focus — and so many outside of the FOSS community don’t know yet how our work defends their rights. Software freedom belongs to everyone, and we seek to reach all kinds of people.

                  • Programming/Development

                    • The Register UKFlutter development framework now stable across platforms • The Register

                      Google’s Flutter development framework finally achieved its cross-platform aspirations with a stable release of Linux and macOS support.

                      Flutter 3.0, announced at Google’s I/O developer conference, provides developers with a way to write apps for the six major consumer-facing platform targets using the Dart programming language. And that’s not to mention embedded devices.

                      “With Flutter 2.0, we shipped web support, and just recently we shipped support for Windows,” said Tim Sneath, director of product and user experience for Flutter and Dart, in an interview with The Register.

                      “And now with Flutter 3.0, we finally reached the point where we have completed that journey. We have all of the six major platforms – iOS, Android, web, Windows, macOS, Linux – all supported as stable parts of the Flutter framework.”

                      For macOS, that means Intel and Apple Silicon support, via Universal Binary builds, as well as Apple Silicon support in development. Thanks to Dart’s support for Apple Silicon, compilation is faster.

                    • Structured Bindings with Qt SQL

                      Some time ago, I wrote a post about integrating Qt’s associative containers with the fancy new C++ features, range-based for loops with structured bindings.

                    • Perl/Raku

              • Leftovers

                • Science

                  • IBM Old TimerIrving Wladawsky-Berger: How Can You Trust the Predictions of a Large Machine Learning Model?

                    Artificial intelligence has emerged as the defining technology of our era, as transformative over time as the steam engine, electricity, computers, and the Internet. AI technologies are approaching or surpassing human levels of performance in vision, speech recognition, language translation, and other human domains. Machine learning (ML) advances, like deep learning, have played a central role in AI’s recent achievements, giving computers the ability to be trained by ingesting and analyzing large amounts of data instead of being explicitly programmed.

                    Deep learning is a powerful statistical technique for classifying patterns using large training data sets and multi-layer AI neural networks. Each artificial neural unit is connected to many other such units, and the links can be statistically strengthened or decreased based on the data used to train the system. But such statistical methods are not equally suitable for all tasks. Tasks that are particularly suitable for machine learning, exhibit several key criteria, such as the availability of large data sets of well-defined input-output pairs for training ML classifiers, – e.g., carefully labeled cat, not-cat pictures for cat recognition classifiers, and english-french document pairs for machine translation algorithms.


                    The paper introduces LIME, – Local Interpretable Model-agnostic Explanations, – a novel method for explaining the predictions of any ML classifier in order to increase human trust and understanding. “By explaining a prediction, we mean presenting textual or visual artifacts that provide qualitative understanding of the relationship between the instance’s components (e.g. words in text, patches in an image) and the model’s prediction.”

                    Let me briefly summarize how LIME works.

                    Using LIME, you can approximate the behavior of any machine learning model, no matter how complex, with a series of simpler local models whose predictions are similar to those of the original model. And you can select the local models by perturbing or varying the inputs, seeing how the predictions change, and then selecting the simpler local models whose predictions are closer to the prediction of the original model. Being considerably simpler, the local models should be understandable and make sense to humans. Thus, while understanding the original machine learning model is a daunting task, it should be much easier to understand the simpler local models whose predictions are similar to the original.

                • Hardware

                  • CNX SoftwareMediaTek unveils Genio 1200 premium AIoT processor with 4.8 TOPS NPU – CNX Software

                    MediaTek has introduced the Genio platform for AIoT devices, and unveiled the first chip of the Genio family with the Genio 1200 Octa-core Cortex-A78/A55 processor with a 4.8 TOPS NPU, 4K video support, and designed for premium AIoT products.

                    The chip is manufactured with a 6nm processor, is said to consume less than 8W, supports dual 4Kp60 video output and up to 48MP @ 30 fps video capture, and WiFi 6, Bluetooth 5.2 and 5G connectivity can be added through add-in chips. Targets applications include Smart Home appliances, HMI, industrial IoT, robotics, and more.

                • Integrity/Availability

                  • Proprietary

                    • MakeTech EasierSay Goodbye to Both the iPod and Pixel Headphone Jack

                      For more than 20 years, the typical image of personal music included an Apple iPod and wired headphones. But that picture has slowly been changing. Now you’re more likely to see a smartphone and wireless earbuds. Apple and Google closed the coffin on two items this week to permanently change that picture. Apple announced it is discontinuing the iPod, and Google announced its new Pixel 6A smartphone will not have a headphone jack.

                    • Security

                      • LWNSecurity updates for Friday [LWN.net]

                        Security updates have been issued by Debian (chromium, postgresql-11, postgresql-13, and waitress), Fedora (curl, java-1.8.0-openjdk-aarch32, keylime, and pcre2), Oracle (gzip and zlib), Red Hat (subversion:1.10), SUSE (clamav, documentation-suse-openstack-cloud, kibana, openstack-keystone, openstack-monasca-notification, e2fsprogs, gzip, and kernel), and Ubuntu (libvorbis and rsyslog).

                      • NBCA cyberattack took down one of Russia’s largest video platforms for days
                      • CISAAdobe Releases Security Updates for Multiple Products

                        Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.

                      • Yahoo NewsThe Linux Foundation and Open Source Software Security Foundation (OpenSSF) Gather Industry and Government Leaders for Open Source Software Security Summit II [Ed: An odd version or vision of security]
                      • UNIX CopBasic Setup of AppArmor on Arch Linux

                        Apparmor is an LSM (Linux Security Module) that allows us to restrict applications’ capabilities with per-program profiles. It supplements the traditional Unix Discretionary Access Control (DAC) model by providing Mandatory Access Control (MAC). It can be seen as an easier alternative to NSA’s SELinux.

                        In this article, I go over the basic setup of apparmor. The credits for the documentation go to the Arch Wiki.

                      • Privacy/Surveillance

                        • TechRadarThis is how new Indian privacy law will have ‘negative impact on people’s privacy’ | TechRadar

                          In April, the Indian government dropped a hard pill to swallow for VPN services and their users.

                          According to India’s new data retention law, security software firms will be forced to keep users’ data for up to five years. What’s more, providers will need to be ready to hand over this information to authorities upon request, too.

                          The news sparked a chasm of discontent across the VPN industry, privacy advocates groups and internet users.

                          “One way or another, it will have a negative impact on people’s privacy and digital security,” Laura Tyrell, Head of PR at Nord Security – the company behind the popular NordVPN – told us.

                          While, in a tweet, digital rights NGO Access Now wrote: “VPNs are necessary in a country with rampant shutdowns and surveillance, and no data protection law. Authorities must stop what they’re doing, and consult with security researchers, civil society, and cybersecurity experts on what to do instead.”

                • AstroTurf/Lobbying/Politics

                • Civil Rights/Policing

                  • AccessNowThousands call on U.S. FTC to make privacy and civil rights rule on data protection – Access Now

                    Access Now, Free Press, and UltraViolet delivered nearly 5,000 petition signatures to the U.S. Federal Trade Commission (FTC) calling on the agency to initiate a privacy and civil rights rulemaking. With Alvaro Bedoya’s confirmation to the FTC, at long last the agency has the votes to create new data protection rules.

                    How data is collected, processed, and shared has a direct impact on economic opportunities and falls squarely within the FTC’s authority. Companies use personal data to enable and even perpetuate discriminatory practices against people of color, women, members of the LGBTQ+ community, religious minorities, people with disabilities, and other marginalized groups.

                    “Bedoya’s confirmation is a win for human rights,” said Willmary Escoto, U.S. Policy Analyst at Access Now. “He supports robust data minimization principles and understands how big data impacts vulnerable communities. For years we have called on Congress to protect our data, to no avail, and now the FTC can finally move forward with a rulemaking that defends the rights of marginalized people in the U.S. and around the world.”

                  • AccessNowThe EU AI Act: How to (truly) protect people on the move – Access Now

                    The European Union Artificial Intelligence Act (EU AI Act) aims to promote the uptake of trustworthy AI and, at the same time, protect the rights of all people affected by AI systems. While EU policymakers are busy amending the text, one important question springs to mind: whose rights are we talking about?

                    In the current proposal, the EU AI Act fails to address the impacts that AI systems have on non-EU citizens and people on the move, such as people fleeing from war. In fact, the proposal does not include the manifold uses the EU puts to AI systems in the migration context. From purported “lie detectors” to biometric identification systems, EU migration policies are more and more underpinned by the use of AI which the EU AI Act seeks to regulate.

                    In this blog post, we present three steps policymakers should take to make the AI Act an instrument of protection for people on the move. These steps are based on our proposed amendments on AI and migration developed by Access Now jointly with EDRi, PICUM, Petra Molnar, and Statewatch.

                • Internet Policy/Net Neutrality

                  • Public KnowledgePublic Knowledge Applauds Bill Creating Digital Regulator To Rein In Big Tech [Ed: Shiva Stella uses Microsoft lobbyists' term, "Big Tech", distracting from Microsoft's crimes. Well, Stella's "Public Knowledge" added a Microsofter to the Board. Maybe that's why...]

                    Today, Senator Michael Bennet (D-CO) introduced the “Digital Platform Commission Act.” The bill would create an independent agency to serve as a digital regulator for the technology sector in order to enhance competition, protect consumers, and promote civic discourse and democracy. The bill draws on regulatory concepts first articulated by Public Knowledge Senior Vice President Harold Feld in his 2019 book, “The Case for the Digital Platform Act,” as well as advocacy by Public Knowledge President and CEO Chris Lewis, Public Knowledge Policy Counsel Alex Petros, Competition Policy Director Charlotte Slaiman, and former Public Knowledge President Gene Kimmelman. Public Knowledge commends Sen. Bennet for creating a digital regulator to be the “cop on the beat” to serve the public interest and foster a healthier, more competitive digital marketplace.

                  • It’s been a minute
                    While I've still been active with elpher development, my phlog has
                    slipped off the radar a bit.  And that's okay!  Slow internet and all
                    Besides elpher, much of my hobby programming projects have taken a bit
                    of a back seat over the last few months.  Some of this is because of
                    work, which has been a bit more intense as we move back to the office;
                    but it's also due to the fickle winds that drive how I spend my free

              « Previous entries Next Page » Next Page »

              RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

              Home iconSite Wiki: You can improve this site by helping the extension of the site's content

              Home iconSite Home: Background about the site and some key features in the front page

              Chat iconIRC Channels: Come and chat with us in real time

              New to This Site? Here Are Some Introductory Resources




              Samba logo

              We support

              End software patents


              GNU project


              EFF bloggers

              Comcast is Blocktastic? SavetheInternet.com

              Recent Posts