Links 14/10/2021: DragonFly 6.0.1 Released and Red Hat Loses Another Top Executive

Posted in Site News at 3:55 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • What is the Linux Operating System?

        The Linux kernel is the main component of the Linux operating system. In general terms, the kernel is a software code that serves as a layer between the hardware and main programs that run on a computer. It was created by Linus Torvalds back in the early 1990s in Finland and licensed under the GNU General Public License (GPL). In other words, Torvalds was made the Linux kernel available to the world for free. There is an official website for the Linux kernel.

        The rest of the system consists of other programs, many of which were written by or for the GNU Project. These utilities were then added to the Linux kernel to create a complete system. The kernel is an essential part of an operating system, but useless by itself, because the Linux kernel alone does not form a working operating system. It can only function in the context of a complete operating system.

        The Linux kernel is used by Linux distributions alongside GNU tools and libraries that interact with it. This combination is sometimes referred to as GNU/Linux.

        So Linux is just a kernel, but the term Linux is far more commonly used by the public and media and that it serves as a generic term for systems that combine that kernel with software from multiple other sources. Therefore when most people say Linux, they’re really talking about a combination of the Linux kernel plus a lot of tools and libraries from the GNU Project.

        To put it more clearly, Linux and GNU/Linux refer to the same operating system and software. There is still a controversy over which term is more appropriate.

    • Audiocasts/Shows

    • Kernel Space

      • Linux 5.14.12
        I'm announcing the release of the 5.14.12 kernel.
        All users of the 5.14 kernel series must upgrade.
        The updated 5.14.y git tree can be found at:
        	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.14.y
        and can be browsed at the normal kernel.org git web browser:
        greg k-h
      • Linux 5.10.73
      • Linux 5.4.153
      • Linux 4.19.211
      • Moving Google toward the mainline [LWN.net]

        Two Google engineers came to Open Source Summit North America 2021 to talk about a project to change the way the company creates and maintains the kernel it runs in its data centers on its production systems. Andrew Delgadillo and Dylan Hatch described the current production kernel (Prodkernel) and the problems that occur because it is so far from the mainline. Project Icebreaker is an effort to change that and to provide a near-mainline kernel for development and testing within Google; the talk looked at the project, its risks, its current status, and its plans.

      • User-space interrupts [LWN.net]

        The term “interrupt” brings to mind a signal that originates in the hardware and which is handled in the kernel; even software interrupts are a kernel concept. But there is, it seems, a use case for enabling user-space processes to send interrupts directly to each other. An upcoming Intel processor generation includes support for this capability; at the 2021 Linux Plumbers Conference, Sohil Mehta ran a Kernel-Summit session on how Linux might support that feature.

      • How Red Hat uses GitLab for kernel development [LWN.net]

        Much of the free-software development world has adopted Git forges (such as GitHub, GitLab, or sourcehut) with enthusiasm. The kernel community has not. Reasons for that reticence vary, but one that is often heard is that these forges simply don’t work well at the scale needed for the kernel project. At a Kernel-Summit session during the 2021 Linux Plumbers conference, Donald Zickus and Prarit Bhargava sought to show how Red Hat has put GitLab to good use to support its kernel team. Not only can these forges work for kernel development, they said, but moving to a forge can bring a number of advantages.

      • How Windows NTFS finally made it into Linux • The Register

        Love it or hate it, Linux users in a Windows world must deal with Microsoft’s New Technology File System (NTFS). This has always been a pain in the rump. Even after Microsoft finally gave up on its anti-Linux rhetoric and released its patents to the open-source community and expressively opened up its exFAT patents, we still couldn’t get into NTFS.

        Things have changed. Starting with the Linux 5.15 kernel, NTFS is finally being fully supported in Linux. This journey hasn’t been easy.

        Microsoft introduced NTFS, a proprietary – naturally – journaling file system in Windows NT 3.1 in 1993. From there, it replaced 1977′s File Allocation Table (FAT) file system across Windows.

      • Rolling stable kernels [Ed: Microsoft wants Linux to become unstable like Windows]

        [Microsoft's] Sasha Levin, one of the maintainers of the stable kernels, gave a presentation at Open Source Summit North America 2021 on a proposal for a different way to handle the stable tree. He noted that throughout most of the kernel’s history, version numbers did not really mean anything, but that the versioning scheme suggests that they do, which leads to a disconnect between how the kernels are seen versus how they are actually maintained. He proposed making a “rolling stable” release that provides users what they need—timely fixes to their kernel—without forcing them to choose to switch to a new version number.

      • Graphics Stack

    • Applications

      • 5 markdown editors I recommend trying

        You can use markdown for anything—formatting websites, authoring books, and writing technical documentation are just some of its uses. I love how easy it is to create rich documents. Everyone has their favorite markdown editor. I have used several on my markdown journey. Here are five markdown editors I have considered.

    • Instructionals/Technical

      • Reasons to limit your stack size even in non-threaded environments

        One reaction to learning that 4BSD is where Unix started to have a stack size limit is to ask why you would bother with a stack size limit at all in an environment without threads (where a process will thus only ever have one stack). There are a number of reasons that operating systems have generally done this, and probably why it starts in Unix in the 4BSD line, which ran on 32-bit VAX systems instead of the 16-bit PDP-11s that V7 did.

      • An UPDATE without a WHERE, or something close to it

        Imagine what happens when you forget the WHERE. It’s the last thing on the line as shown, so you could send off the command early and it would totally work. It would look like this: [...]

      • How to Clone a Git Repository Into a Specific Folder – TecAdmin

        The process of git repository cloning is initiated on a daily basis in the DevOps world. But, if you simply issue a git clone command, the cloning process will create a new directory for the repository. In this tutorial, we will help you learn how to clone a git repository into a specific folder.

      • How to Download and Upload Remote Directory in sFTP

        sFTP or Secure File Transfer Protocol is a convenient upgrade from the traditional FTP (File Transfer Protocol). The sFTP program boasts of improved security layers since it mirrors encrypted SSH transport protocols in its file transfer operations.

      • How to Install Redis & Configure on AlmaLinux 8 – LinuxCapable

        Redis is an open-source (BSD licensed), in-memory key-value data structure store used as a database, cache, and message broker. Redis supports data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperlog logs, geospatial indexes, and streams. Redis also provides high availability with Redis Sentinel software logic, creating automatic partitioning across Redis nodes with Redis Cluster.

        At the end of the guide, you will know how to install and configure Redis on your AlmaLinux operating system.

      • How to Install Redis on Rocky Linux 8 or AlmaLinux 8

        Redis is a popular in-memory key-value store that can be used as a NoSQL key-value database, message broker as well as a caching solution. It is renowned for its flexibility, scalability, seamless replication, simplicity, and ease of use. Redis is widely used in various fields such as machine learning, real-time analytics, chat, messaging, and gaming leaderboards.

        On its own, Redis has no robust features, however, you can still tweak Redis to provide added security and ward off unauthorized users.

      • GNU Linux – network config madness – the (ever changing) basics – how to (try to) set fixed & dynamic ip & dns per interface
      • How to Install Telegram on Linux Mint 20

        Telegram is a popular free cross-platform, cloud-based instant messaging system. Telegram is famous for providing end-to-end encrypted video calling, VoIP, file sharing, amongst many other features. One of the main attractions of Telegram, it is unique in having no ties or shared interests with the big social media giants such as Facebook or Twitter. The application is also cross-platform, with versions of the app available for most operating systems for desktops and mobile/tablet devices.

        In the following tutorial, you will learn how to install the Telegram client on Linux Mint.

      • Toggle Light & Dark Mode for Flatpak Apps in Ubuntu 20.04+ / Linux Mint | UbuntuHandbook

        Using Flatpak apps in Linux? You may found that Flatpak app appearance does not change when toggling light & dark mode or switching to another app theme.

        As more and more apps publish Linux packages via Flatpak, I have a few of them installed in my Ubuntu laptop. However, the apps stick to the light theme whenever I switches to dark mode in Appearance settings.

        Since Flatpak runs in sandbox and does not have permission to access the “/usr” directory, it does not use system theme according to the document. So, some popular GTK themes are packaged as Flatpaks. And, it detects the current system app theme and tries to install the Flatpak version of the theme if available during app installation or update.

        I’m working with default Yaru theme in the most time, so it automatically installs Yaru theme flatpak package but leaves Yaru Dark not installed. When I switching to Yaru Dark, it can’t find the match theme so falls back to the default Adwaita.

      • How to connect Rocky Linux 8 via Windows RDP protocol – Linux Shout

        f you have Rocky Linux 8 desktop and Windows 7/10/11 in a local environment and want to access using the RDP- Remote desktop protocol, then here is the way.

        To connect Linux operating systems such as Rocky Linux, AlmaLinux 8, or CentOS, we can use the open-source implementation of Remote desktop protocol called XRDP. RDP is developed by Microsoft and has been an integral part of Windows operating systems. It allows the users to remotely control and use the GUI desktop systems just like a local one. Although, Windows can be operated over this protocol out of the box, for Linux we need to install some additional packages. Here we learn how to set up a remote desktop connect to Rocky Linux 8.

      • Automatically reassign your default printer – Fedora Magazine

        I run Linux,…or does it run me? Some computing paradigms are so ubiquitous, so ingrained, we rarely stop to think that things could work another way. When such a realization comes, we can exercise our freedom – one of Fedora’s four foundations – to improve the user experience. For that sentiment to be more than cliché, I needed to re-imagine the idea of the default printer and how it gets set. This article presents that implementation.

      • How to install Ubuntu on VirtualBox (Windows) [Ed: A lot better than WSL]
      • Proxmox VE Full Course: Class 12 – The Command-Line Interface – Invidious

        LearnLinuxTV’s Proxmox full course aims to get you up to speed with all the finer points of Proxmox Virtual Environment. In video #12, we take a look at the Command-Line interface.

      • [Older] Permanently add a directory to shell PATH

        When you type a command into a Linux terminal, what’s really happening is that a program is being executed. Normally, to execute a custom program or script, we need to use its full path, such as /path/to/script.sh or just ./script.sh if we’re already in its residing directory. Alternatively, we can execute a lot of commands without specifying paths, like uptime or date, etc.

      • 15 Super Useful Examples of Find Command in Linux

        The find command is used for searching for files and directories in the Linux command line.

        Find is one of the most powerful and frequently used commands. It is also one of the most extensive commands with over 50 options and this makes it a bit confusing, specially when it is paired with the exec or xargs command.

        It is impossible for a sysadmin or software developer to avoid the find command while working in the command line. Instead of being afraid of it, you should embrace its power.

        I am going to discuss some of the most common examples of the find command that you are likely to use. But before that, let me show you its syntax and how to use it.

      • Sending logs to Panther using syslog-ng – Blog – syslog-ng Community – syslog-ng Community

        Panther is an open-source log management system, which is also available as a service for a time-limited trial. It is still in beta phase, but it looks promising. You can see the “beta” sign on its opening page: https://app.panther.support/ I tested the time-limited cloud service version, but you can also install it locally, either from Dockerhub, or you can build the containers locally from the source.

        Even if it is still in beta phase, Panther comes with detailed documentation. There is a notable exception: while syslog-ng is shown on some of the figures, documenting it is still to be done. This blog helps you to get started with sending logs to Panther, using syslog-ng. You can use either legacy syslog with TLS encryption (still a bit problematic) or the http() destination to send logs to the Panther HTTP API.

      • 7 Important Linux Commands for Every Linux User

        Linux might sound scary for first-time Linux users, but actually, it isn’t. Linux is a bunch of open-source Unix operating systems based on Linux Kernel. These operating systems are called Linux distributions, such as Fedora, Debian, Ubuntu, and Mint.

        Since its inception in 1991, Linux has garnered popularity for being open-source. People can modify and redistribute Linux under their own brand. When using a Linux OS, you need a shell to access the services provided. Also, it’s recommended to run your Linux OS through a CLI or command-line interface. CLI makes time-consuming processes quicker.

        This article presents a guide to 7 important Linux commands for every Linux user to know. So, let’s begin.

      • How to Install Ubuntu MATE Desktop on Ubuntu 20.04

        For those not familiar with Ubuntu MATE, it is a free, open-source community-driven lightweight desktop environment and an official derivative of Ubuntu. One of the main differentiation from Ubuntu is that it uses the MATE desktop environment as its default user interface instead of the GNOME desktop environment that is the default user interface for Ubuntu.

        Ubuntu MATE is famous for being lightweight, fast, and stable, a community-driven project, and a great alternative to Ubuntu’s stock Gnome. At the end of the tutorial, you will have learned how to install Ubuntu MATE on your Ubuntu 20.04 system.

      • How to Install Vanila Forum on CentOS 8 – Unixcop

        Vanilla is a Canadian software company founded in 2009 in Montreal, Quebec, Canada. It is both a cloud-based (SaaS) community forum software and an open source community supported software. The company’s main product is Vanilla Cloud.

        Its open source product, Vanilla OSS, is a lightweight Internet forum package written in the PHP scripting language using the Garden framework. The software is released under the GNU GPL. Vanilla Forums is free software, standards-compliant, customizable discussion forums. Since 2009 there is also a cloud-hosted version (offered by Vanilla).

      • How to Set Environment Variables in Docker | RoseHosting

        Docker is an open-source application that provides lightweight operating-system-level virtualization through the use of containers. It is a kind of virtualization technology that is specially designed to easily develop and deploy applications inside of neatly packaged virtual containerized environments. Docker containers are in essence a set of software packages that run as one application that’s isolated from others. We can deploy it to any machine without any compatibility issues. By using this, the software stays system agnostic, simpler to use, less work to develop, and easy to maintain.

      • How to connect Rocky Linux 8 via Windows RDP protocol – Linux Shout

        If you have Rocky Linux 8 desktop and Windows 7/10/11 in a local environment and want to access using the RDP- Remote desktop protocol, then here is the way.

        To connect Linux operating systems such as Rocky Linux, AlmaLinux 8, or CentOS, we can use the open-source implementation of Remote desktop protocol called XRDP. RDP is developed by Microsoft and has been an integral part of Windows operating systems. It allows the users to remotely control and use the GUI desktop systems just like a local one. Although, Windows can be operated over this protocol out of the box, for Linux we need to install some additional packages. Here we learn how to set up a remote desktop connect to Rocky Linux 8.

      • How to install UTAU on a Chromebook

        Today we are looking at how to install UTAU on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to install Unreal Engine 4 on Ubuntu

        Are you looking to develop video games on your Ubuntu PC using the Unreal Engine? If so, you will need to install the latest Unreal Engine toolkit to your system. This guide will show how to set up the newest release of Unreal Engine 4 on your Ubuntu computer.

      • Install Gitlab CE on Debian 11 – kifarunix.com

        In this tutorial, you will learn how to install Gitlab CE on Debian 11. GitLab is an open source end-to-end software development platform with built-in version control, issue tracking, code review, CI/CD, etc. It is is a complete DevOps platform, delivered as a single application.

      • FreeIPA Server on Alma Linux 8/CentOS 8 – Unixcop

        We have 3 users, Jhon, Doe, Mike. Suppose you are at the IT department for a Software Company. You have to manage the identity of those 3 users. Easy right? You can easily manage their Identity Access. But how about 3 users become 300 or 3000? How can you manage them?

        Well things get pretty hard I guess, How about if we can have a system that has a central identity info, maybe that would be easier to solve our stated problem.No worries, FreeIPA is here to help you by solving the problem.

      • Add Client to the FreeIPA Server on CentOS 8 – Unixcop

        Hi Everyone ! In the previous article, we have seen how to set up freeIPA Server on centOS 8.

        In this write up, we will show how to add a client host to the freeIPA Domain. We will be configuring a CentOS 8 machine to authenticate against an existing FreeIPA server.

      • How to Install KDE Plasma Desktop Environment on Ubuntu 20.04 – LinuxCapable

        The name KDE comes from “K Desktop Environment”. For those not familiar with KDE Desktop, it is a free, open-source desktop environment. It provides Linux users on various distributions an alternative graphical interface to customize their desktop environment and applications for everyday use enhancement.

        Besides the graphical enhancements and changes, it is also a lightweight, fast, smooth environment with superior performance compared to native shipped desktops with some Linux Distributions. In Ubuntu’s case, this is Gnome.

        At the end of the tutorial, you will have learned how to install KDE Desktop Environment on your Ubuntu 20.04 system.

      • How to fix “Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock error – blackMORE Ops

        Quickest way to fix How to fix “Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post “http://%2Fvar%2Frun%2Fdocker.sock/v1.24/auth”: dial unix /var/run/docker.sock: connect: permission denied” error.

      • How To Install NVIDIA Drivers on Fedora – TecAdmin

        Fedora, the operating system of RHEL(Red Hat Enterprise Linux) does not have pre-installed exclusive Nvidia drivers in it for the users. Although it does have default Nouveau drivers which work in most conditions, you may face some problems while using them. If you encounter issues while using the Nouveau drivers you will have to install the official proprietary Nvidia drivers.

        The official Nvidia drivers can help you get the most out of your GPU by enhancing its performance. In this article, we will learn to install the official Nvidia drivers on Fedora

        However, before we start with the installation process, we need to do system configuration. The first configuration we need to do is stop the GUI from running and the second step is to disable the default nouveau drivers. From the GRUB boot menu, it is really easy and doable.

      • Securing your Kubernetes cluster with Kubewarden

        Kubernetes is fast becoming the operating system of the cloud. Every major cloud provider has a supported Kubernetes platform, Kubernetes can be run on-premises, and Kubernetes even has a package manager with Helm. And thanks to the operator pattern, Kubernetes has built-in support to describe and manage almost any kind of workload.

    • Games

      • DOOM Played By Tweet

        Getting DOOM to run on hardware it was never intended to run on is a tradition as old as time. Old cell phones, embedded systems, and ancient televisions have all been converted to play this classic first-person shooter. This style of playing games on old hardware might be passé now as the new trend seems to be the ability to play this game on more ethereal platforms instead. This project brings DOOM to Twitter.

      • Post-apocalyptic 4x strategy game Punk Wars releases November 11 | GamingOnLinux

        Strategy Forge S.A. and Jujubee S.A. have announced that their 4x strategy game Punk Wars will be releasing with Linux support on November 11.

        “Punk Wars tells the story of four new powers emerging from the ashes of a global cataclysm and fighting for domination of the ruins of a once magnificent megacity. Become the powerful leader of the messianic steampunk, tenebrous dieselpunk, militaristic steelpunk, or technocratic atompunk, with each faction holding the key to a different branch of industrial science, with a different set of unique skills. Explore the ruins of a bygone civilization, where resources are scarce and the dangers way too common. Develop your infrastructure and technology that will secure your triumph. Create a winning strategy and a playstyle for each faction, utilising their distinctive skills and units. Become the messiah of the new age and lead humanity towards the era of prosperity and happiness… as you see it.”

      • Fallout 3 removes Games for Windows Live, works well on Linux with Proton | GamingOnLinux

        Fallout 3 from Bethesda Game Studios received a surprise update recently where the developer finally removed Games for Windows Live which is great news.

        Released back in 2008, Fallout 3 is something of a classic and a game I thoroughly enjoyed before making the switch fully to Linux. Thanks to Steam Play Proton, you can play Fallout 3 easily on Linux and with this update no workarounds are needed – at all.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KDE’s 25th Anniversary

          You’ll find on the website − https://25years.kde.org/ − the full celebration of the event: videos, meeting, activities, old KDE distro ready to run on virtual machine, merch (Tee-Shirt/Stickers).

          But if you still wonder what is KDE; I’ll try to give you an overview: KDE is an international free software community that develops free and open-source software. KDE helps these projects to get common tools: bug trackers, software development forge, distributing the software, organizing in real life events like sprints,conferences, etc… Y

      • GNOME Desktop/GTK

        • More GNOME Software FAIL. Useless software reviews. – BaronHK’s Rants

          It’s come to my attention several times now that if you want information about a program for GNU/Linux, don’t bother reading the reviews that people put in GNOME Software.

          Some of it isn’t in English, which is the language that I speak, and GNOME Software doesn’t sort them out based on your preferred language.

          The GNOME Software application doesn’t collect basic information about what distribution of GNU/Linux. (Or if it even is GNU/Linux, as GNOME actually still does run on other *nix systems, but I can’t imagine there’s too many non-GNU/Linux users left).

          It doesn’t consider what package manager you installed the program from.

          It could be from Fedora, it could be from Debian, or Ubuntu, or Arch. It could be a Snap. It could be a Flatpak.

    • Distributions

      • BSD

        • DragonFly 6.0.1 released

          DragonFly version 6.0 has been released. DragonFly version 6.0 brings a revamped VFS caching system, significant dsynth updates, various filesystem updates including HAMMER2, and a long list of userland updates. 6.0.1 brings a Let’s Encrypt certificate fix for dport installation, plus other minor fixes

        • DragonFlyBSD 6.0.1 Released With AMD Zen 3 Temperature Monitoring, Fixes – Phoronix

          Released back in May was the shiny DragonFlyBSD 6.0 release while today a point release for it has been issued.

          The DragonFlyBSD 6.0.1 release appears to be primarily driven by the need to address a certificate issue for downloading dpkg binaries. Due to an expired Let’s Encrypt certificate, downloading dpkg binaries began failing. With DragonFlyBSD 6.0.1 that certificate has been renewed.

      • Screenshots/Screencasts

      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • Filezilla » PCLinuxOS

          Filezilla updated to 3.56.0. FileZilla is a fast and reliable FTP, FTPS and SFTP client with lots of useful features and an intuitive graphical user interface.

        • Chromium Browser » PCLinuxOS

          The Chromium Browser has been updated to 94.0.4606.81 and shipped to the PCLinuxOS Software Repository.

        • Dino » PCLinuxOS

          Dino 0.2.2 is a modern XMPP (“Jabber”) chat client using GTK+/Vala.

        • Blender » PCLinuxOS

          Blender 2.93.5 is the essential software solution you need for 3D, from modeling, animation, rendering and post-production to interactive creation and playback. Professionals and novices can easily and inexpensively publish stand-alone, secure, multi-platform content to the web, CD-ROMs, and other media.

      • SUSE/OpenSUSE

      • IBM/Red Hat/Fedora

        • ModelMesh and KServe bring eXtreme scale standardized model inferencing on Kubernetes

          One of the most fundamental parts of an AI application is model serving, which is responding to a user request with an inference from an AI model. With machine learning approaches becoming more widely adopted in organizations, there is a trend to deploy a large number of models. For internet-scale AI applications like IBM Watson Assistant and IBM Watson Natural Language Understanding, there isn’t just one AI model, there are literally hundreds or thousands that are running concurrently. Because AI models are computationally expensive, it’s cost prohibitive to load them all at once or to create a dedicated container to serve every trained model. Also, many are rarely used or are effectively abandoned.

          When dealing with a large number of models, the ‘one model, one server’ paradigm presents challenges on a Kubernetes cluster to deploy hundreds of thousands of models.

        • The Application Hierarchy of Needs for SREs and IT Operators – IBM Developer

          The Hierarchy of Needs was defined by the psychologist Abraham Maslow in his paper “A Theory of Human Motivation.” The base of the pyramid contains the most fundamental and most critical needs, with each subsequent layer representing needs that become important once those of the preceding layer have been satisfied.
          Maslow’s “Hierarchy of Needs” was used to represent the needs and behavioral motivation drivers for humans. This pyramid represented a series of basic psychological and self-fulfillment needs.

          Maslow’s hierarchy of needs has been adapted and adopted to represent the needs and motivations in other domains, including the needs of applications and services being managed by SREs and IT Operations teams.

        • A Red Hat validated pattern for Industrial Edge

          We’ve improved on the technology of our AI/ML Industrial Edge solution, designed to boost manufacturing efficiency and product quality with AI/ML, edge computing and Kubernetes. Let’s see what’s new!

        • Meet single node OpenShift: Our newest small OpenShift footprint for edge architectures

          Single node OpenShift is here, putting both control and worker capabilities into a single server to help fit into space-constrained environments.

        • Single node OpenShift at the manufacturing edge

          Where does it make sense to utilize single node OpenShift? Learn how it can help at the manufacturing edge!

        • Transitioning Red Hat’s Marketing leadership

          Today, we are sharing news that Tim Yeaton, Red Hat’s executive vice president and chief marketing officer (CMO) will retire in 2022. We’ve had the benefit of planning for Tim’s retirement for some time and using Red Hat’s succession planning process to identify and develop our next CMO. Long time Red Hat marketing communications and brand leader Leigh Day has been promoted to senior vice president (SVP) of Marketing and in January, she will assume the role of CMO. Until his retirement in mid-2022, Tim will become a senior advisor at Red Hat, helping with a smooth transition.

        • Customer experience (CX) plans: 5 questions to ask | The Enterprisers Project

          The pressure is on for companies to deliver a top-notch customer experience (CX). But to deliver a high-quality and holistic CX, you need to invest in the right data and technology. For IT leaders facing an abundance of options, investing in technology to enhance CX can feel like a gamble.

        • IBM Cheese Cutter Restoration | Hackaday

          For a while now, Mac Pro towers have had the nickname “cheese grater” because of their superficial resemblance to this kitchen appliance. Apple has only been a company since the 70s, though, and is much newer than one of its historic rivals, IBM. In fact, IBM is old enough to have made actual cheese-related computers as far back as the 1910s, and [Hand Tool Rescue] recently obtained one of these antique machines for a complete restoration.

        • Going to market with an open source product

          Many people with a long career in engineering, including me, have had misconceptions about sales and marketing. As an engineering community, we’ve viewed it as things like ordering swag, naming things, running ad campaigns, and creating white papers. There’s a joke in the marketing community about how engineers are always willing to provide their “opinions” on marketing decisions without fully comprehending the discipline, but marketers rarely—like never—make suggestions on code improvements. To work together, engineers and marketers must share a common definition.

          While product marketers do help drive those commonly recognized tasks, the role is so much richer. Product marketers, technical marketers, and evangelists have outbound responsibilities like creating content (e.g., blogs, press releases, white papers, demos), delivering roadmap sessions to customers (as well as analysts and journalists), building content for sales teams, and much more. Combined, these outbound functions are often referred to as getting a product to market, but just as importantly, product marketing also has inbound functions. They serve as another set of eyes and ears to listen for customer needs and provide input to the product strategy. There’s a saying in product management: nothing interesting happens within these four walls. Businesses must go out into the world, talk to customers, and more importantly, listen to them.

    • Devices/Embedded

  • Leftovers

    • Health/Nutrition

      • Deputy health minister proposes ban on all tobacco marketing

        Separately, he called on senators to reject a bill on the legalization of vapers and electronic cigarettes, and claimed that tobacco companies were deliberately obfuscating the issue. “If we go with this fallacy that the tobacco industry has put to us, that vapers are the alternative solution to the tobacco problem, we will once again be making a mistake because vapers and heated tobacco products are not an alternative to harm reduction,” he said.

      • COVID-19 could nudge minds and societies towards authoritarianism

        It is a little-known fact that humans have not one but two immune systems. The first, the biophysical immune system – the one we’ve all heard much about – responds to infections as they enter the body, detecting and eliminating intruders such as the coronavirus.

        The second is the behavioural immune system, which adapts our behaviour to preemptively avoid potentially infectious people, places and things. The behavioural immune system is the first line of defence against infectious disease. It prompts people to socially conform with known traditions and to avoid foreign, dissimilar and potentially infectious groups.

        In a recently published study, my colleagues and I at the University of Cambridge examined the impact of the behavioural immune system on our attitudes towards obedience and authority. We found that high rates of infectious diseases – and the disease-avoidance they promote – may fundamentally shape political opinions and social institutions.

    • Integrity/Availability

      • Proprietary

        • After Spike in Ransomware Attacks, U.S. Looks to Go on the Offensive [iophk: Windows TCO]

          The Biden administration has sought to rally its allies to help fight cyberthreats and ransomware attacks, pushing NATO to adopt a new cyber defense policy and launching talks on cyberthreats among G-7 nations. It also launched a series of initiatives in recent months to target cybercriminals and boost protection against ransomware attacks following several high-profile ransomware attacks against a major oil pipeline company and a meat-processing company earlier this year. The attacks laid bare how vulnerable elements of U.S. critical infrastructure, including its food and energy sectors, were to cyber incursions.

        • VirusTotal study finds 95% of 80m ransomware samples analysed aimed at Windows

          About 2% were Android-based, while one set, known as EvilQuest, targeted OSX, the study, titled Ransomware Activity Report, said. It took into account samples submitted all the way back to January 2020.

          Vicente Diaz of VirusTotal said in a short blog post accompanying the 14-page study that of the 140 countries which submitted ransomware samples, Israel was far and away an outlier with the highest number of submissions and nearly 600% rise in submissions compared to its baseline.

        • Insulin dump

          The student is allowed to keep a small purse with her at all times, as it contains a smartphone that runs an app that talks to, and controls her insulin pump. The teachers at the school were briefed about the smartphone. However, there’s one part of the setup that caused problems: the pump would occasionally issue a beeping noise.

          This beeping makes for a disastrous experience for a sixth grade girl. She’s at the age where social pressures really start to manifest. The pump gives something other students can latch onto to make fun of.

        • White House to host virtual ransomware summit with 30 countries — but not Russia [iophk: Windows TCO]

          The White House plans for at least 30 countries to attend a series of meetings to be held over Zoom. The summit will be the most concrete step it has taken so far to build an international coalition to address ransomware, an epidemic of cybercrime where hackers remotely lock victims’ computers and demand an extortion payment to fix them.

        • End of Life Google Chrome devices should be repurposed with GNU/Linux. – BaronHK’s Rants

          Of all companies, Lenovo gave me an idea.

          They mentioned GalliumOS as a potential Chrome OS replacement on some of their own Chrome devices.

          These are considered low end by PC standards, but they run Chrome OS fine because it’s a stripped down GNU/Linux system. Not some bloated 100 GB+ Windows horror that has to trap every file system call in case it’s a virus.

          The Intel-based ones, mostly, should run a normal GNU/Linux distro, but they occasionally have odd hardware in them that’s not well supported by the vanilla Linux kernel, and GalliumOS steps in to add those.

          Many years ago, there was a guy running a charity in Texas that took old computers that were not able to run Windows anymore, and re-imaged them with a minimum GNU/Linux distribution, which they were able to run okay.

          Somewhere, out of the blue, Texas sent the police in to enforce “environmental standards”.

        • macOS 11.6 makes the theme worse then ever. Free Software GUIs are whatever you want them to be. – BaronHK’s Rants

          Jamie Zawinski commented that his perfect Mac experience continues with light grey text on light grey backgrounds.

          These have been a problem for years, and it’s only getting worse.

          It’s why I use the Adwaita-Dark theme and Solarized Dark for Gedit and GNOME Terminal.

          I think they’re all making the default theme so unusable unless you jack up the display backlight to “IT BURNS US! IT BURNS US PRECIOUS!” so they can market “Dark Mode” as if it was a special feature, when I’ve always used them in one form or another.

          When I started using Solaris, I got hooked on one that Sun wrote for GTK2 called Nimbus. The icon pack was pretty sharp too. And even the light version was quite lovely.

        • Pseudo-Open Source

          • Openwashing

            • .NET Foundation admits it ‘violated the trust of project maintainers’ [Ed: Simon Sharwood at it again, relaying Microsoft talking points and face-saving statements]

              The beleaguered .NET Foundation has apologised, again, and reversed one of the policies that saw its members revolt.

              The Foundation’s had a tricky few weeks, after a board member resigned and complained the reasons for doing so were misrepresented. Members have also complained the organisation had made unauthorised changes to projects, and about the decision to move projects to a GitHub account the Foundation controlled without advance notice. Foundation executive director Claire Novotny stepped down as the controversies swirled.

        • Security

          • Russia excluded from virtual White House meeting on ransomware

            The White House on Wednesday will convene a virtual meeting on countering ransomware with senior officials representing 30 countries and the European Union, Biden administration officials said, as part of President Biden’s effort to work with global partners to address cyber threats.

            Ministers and senior officials from a range of countries will take part in the virtual meeting, though the attendees do not include representatives from Russia, which has been a key focus of the Biden administration in trying to root out criminal ransomware groups.

          • How does HTTPS protect you (and how doesn’t it?) – The Mozilla Blog

            It’s true that looking for the lock icon and HTTPS will help you prevent attackers from seeing any information you submit to a website. HTTPS also prevents your internet service provider (ISP) from seeing what pages you visit beyond the top level of a website. That means they can see that you regularly visit https://www.reddit.com, for example, but they won’t see that you spend most of your time at https://www.reddit.com/r/CatGifs/. But while HTTPS does guarantee that your communication is private and encrypted, it doesn’t guarantee that the site won’t try to scam you.

            Because here’s the thing: Any website can use HTTPS and encryption. This includes the good, trusted websites as well as the ones that are up to no good — the scammers, the phishers, the malware makers.

            You might be scratching your head right now, wondering how a nefarious website can use HTTPS. You’ll be forgiven if you wonder in all caps HOW CAN THIS BE?

            The answer is that the security of your connection to a website — which HTTPS provides — knows nothing about the information being relayed or the motivations of the entities relaying it. It’s a lot like having a phone. The phone company isn’t responsible for scammers calling you and trying to get your credit card. You have to be savvy about who you’re talking to. The job of HTTPS is to provide a secure line, not guarantee that you won’t be talking to crooks on it.

            That’s your job. Tough love, I know. But think about it. Scammers go to great lengths to trick you, and their motives largely boil down to one: to separate you from your money. This applies everywhere in life, online and offline. Your job is to not get scammed.

          • Security updates for Wednesday [LWN.net]

            Security updates have been issued by Debian (flatpak and ruby2.3), Fedora (flatpak, httpd, mediawiki, redis, and xstream), openSUSE (kernel, libaom, libqt5-qtsvg, systemd, and webkit2gtk3), Red Hat (.NET 5.0, 389-ds-base, httpd:2.4, kernel, kernel-rt, libxml2, openssl, and thunderbird), Scientific Linux (389-ds-base, kernel, libxml2, and openssl), SUSE (apache2-mod_auth_openidc, curl, glibc, kernel, libaom, libqt5-qtsvg, systemd, and webkit2gtk3), and Ubuntu (squashfs-tools).

          • Linux Foundation Raises $10M To Expand And Support Open Source Security Foundation
          • Open Source Security Foundation Raises $10 Million in New Commitments to Secure Software Supply Chains
          • Linux Foundation raises $10M to support open-source security project – SiliconANGLE

            The funding came from members of the foundation. The long lineup: Dell Technologies Inc., Telefonaktiebolaget LM Ericsson, Facebook Inc., Fidelity Investments Inc., GitHub Inc., Google LLC, International Business Machines Corp., Intel Inc., JPMorgan Chase & Co., Microsoft Corp., Morgan Stanley, Oracle Corp., Red Hat Inc., Snyk Inc., VMware Inc., Anchore Inc., Apiiro LLC, AuriStar Technologies Inc., Deepfence Inc., Devgistics, GitLab Inc., Nutanix Inc., Tidelift Inc. and Wind River Systems Inc.

          • The World’s Major Technology Providers and Converge to Improve the Security of Software Supply Chains

            Imagine you have created an open source project that has become incredibly popular. Thousands, if not millions, of developers worldwide, rely on the lines of code that you wrote. You have become an accidental hero of that community — people love your code, contribute to improving it, requesting new features, and encouraging others to use it. Life is amazing, but with great power and influence comes great responsibility.

            When code is buggy, people complain. When performance issues crop up in large scale implementations, it needs to be addressed. When security vulnerabilities are discovered — because no code or its dependencies are always perfect — they need to be remediated quickly to keep your community safe.

          • Privacy/Surveillance

            • I Lived Through the US Military’s Culture of Surveillance

              I know what it means to be watched all too carefully, a phenomenon that’s only grown worse in the war-on-terror years. I’m a strange combination, I suspect, being both a military spouse and an anti-war-on-terror activist. As I’ve discovered, the two sit uncomfortably in what still passes for one life. In this country in these years, having eyes on you has, sadly enough, become a common and widespread phenomenon. When it’s the government doing it, it’s called “surveillance.” When it’s your peers or those above you in the world of the military spouse, there’s no word for it at all.

            • Who should police the web?

              For an example of how private firms have become the digital police, consider the rules on [Internet] pornography being introduced by Mastercard on October 15th. In a bid to weed out illegal material, the card firm is demanding that porn sites take steps that go beyond what the law requires, including reviewing footage before publication and checking the identity of those who upload or feature in it. Sites that think these sorts of rules too onerous are under no obligation to work with Mastercard. But Visa is also cracking down, and the two firms handle 90% of card payments outside China, meaning that they are becoming the industry’s de facto regulators.

            • Microsoft Agrees to Human Rights Review in Deals With Law Enforcement, Government

              The move came in response to a June filing of a shareholder proposal asking the company to evaluate how well it sticks to its human rights statement and related policies. Microsoft committed to a review of any human rights impacts that its products have on those including communities of Black, Indigenous and People of Color in contracts for police, immigration enforcement and unspecified other government agencies, according to correspondence from the company viewed by Bloomberg.

            • Samsung is the worst phone for privacy in the Android market, and if you try to fix it, they will punish you. – BaronHK’s Rants

              A new report shows that Samsung is the worst Android vendor for invasions of privacy.

              Among the problems unique to Samsung is that they’ve foisted Microsoft spyware and Clown Computing that phones home to Microsoft into the stock ROM as system apps.

              Also, LineageOS could fix it, if you could get it to run. But Samsung’s “security system” will break your camera for no reason whatsoever if you do, in their newer phones. This isn’t “Oh, the other firmware has no driver.”. It’s Samsung Knox preventing the camera from ever working again.

    • Defence/Aggression

    • Environment

      • Environmental Justice Advocates Respond to Oil Spill: End Neighborhood and Offshore Oil Drilling Now

        Governor Newsom’s oil and gas regulators have continued granting offshore oil well permits also. As of October 1, 2021, there have been a total of 150 reported permits issued for offshore wells since January 1, 2019, according to a new analysis of permits approved through October 1, 2021 and posted at www.NewsomWellWatch.org by Consumer Watchdog and FracTracker Alliance.

        In the wake of another disastrous oil spill, CEJA and VISION provided the following statements:

      • Degrees of danger: What will the world look like if we miss our climate targets?

        In 2015, almost all of the world’s nations agreed to limit the temperature increase to 2 degrees Celsius (3.6 F) above preindustrial levels, and to aim for a limit of 1.5 C under the Paris Agreement.  So far, the actual commitments made to cut fossil fuel use and other measures to reduce emissions of greenhouse gases into the atmosphere — if carried through — will only get us down to 2.7 C of warming, the UN has warned.

      • EU Commission: Climate change ‘most comprehensive threat’ facing Arctic

        The Arctic region has reached an “unprecedented crisis point” due to climate change, a problem which is the “most comprehensive threat” facing the region, the EU Commission said in a joint statement on Wednesday.

      • Energy

        • [Old] Will PayPal’s adoption of bitcoin make cryptocurrency more mainstream?

          Cryptocurrencies are decentralised systems with no official oversight, so regulation is difficult. Registered companies that deal in them are finding themselves under increasing scrutiny. In June, the UK’s Financial Conduct Authority ruled that Binance Markets Limited, one of the world’s largest cryptocurrency exchanges, had to cease regulated trading in the UK.

        • Bitcoin Uses More Electricity Than Many Countries. How Is That Possible?

          We’ll explain how that works in a minute. But first, consider this: The process of creating Bitcoin to spend or trade consumes around 91 terawatt-hours of electricity annually, more than is used by Finland, a nation of about 5.5 million.

          That usage, which is close to half-a-percent of all the electricity consumed in the world, has increased about tenfold in just the past five years.

        • Anti-money laundering chief: Cryptocurrency licenses should be revoked

          Cryptocurrency operating licenses in Estonia should be revoked, and the system rebuilt from scratch, chief of the money laundering bureau (RAB) Matis Mäeker told investigative weekly Eesti Ekspress. Failure to do so may result in another Danske-style financial scandal. The news comes amid revelations that despite a cull of license-holders in 2020, over 400 cryptocurreny operators are still active in Estonia.

        • EU Pushing for Oil, Coal and Gas to Stay in the Ground

          The European Commission argues that oil, gas, and coal should not be extracted in the Arctic if the climate goals are to be met, in addition to its representing a risk for environmental pollution in vulnerable areas, and calls for an international moratorium on hydrocarbon extraction in the Arctic.

        • EU to push for an end to exploitation of Arctic gas, oil and coal

          The document has been drawn up by the European Commission and the bloc’s diplomatic service. It is due to be finalized and published this week. The strategy says Arctic fossil fuel extraction needs to stop so EU countries can meet targets in the 2015 Paris Agreement to limit temperature rises from global warming. It calls for a widening of the scope of existing curbs on Arctic fossil fuel exploration in the Arctic in areas of the U.S., Canada, and Greenland.

          EU member states would have to change their behavior sharply under the new policy, since they import Arctic fossil fuels including an estimated 87% of liquefied natural gas produced in the Russian Arctic. The new strategy would not have legal force, but it would create political pressure for member states to comply.

      • Wildlife/Nature

        • Wall Street’s Takeover of Nature Advances with Launch of New Asset Class

          Last month, the New York Stock Exchange (NYSE) announced it had developed a new asset class and accompanying listing vehicle meant “to preserve and restore the natural assets that ultimately underpin the ability for there to be life on Earth.” Called a natural asset company, or NAC, the vehicle will allow for the formation of specialized corporations “that hold the rights to the ecosystem services produced on a given chunk of land, services like carbon sequestration or clean water.” These NACs will then maintain, manage and grow the natural assets they commodify, with the end of goal of maximizing the aspects of that natural asset that are deemed by the company to be profitable.

          Though described as acting like “any other entity” on the NYSE, it is alleged that NACs “will use the funds to help preserve a rain forest or undertake other conservation efforts, like changing a farm’s conventional agricultural production practices.” Yet, as explained towards the end of this article, even the creators of NACs admit that the ultimate goal is to extract near-infinite profits from the natural processes they seek to quantify and then monetize.

          NYSE COO Michael Blaugrund alluded to this when he said the following regarding the launch of NACs: “Our hope is that owning a natural asset company is going to be a way that an increasingly broad range of investors have the ability to invest in something that’s intrinsically valuable, but, up to this point, was really excluded from the financial markets.”

    • Finance

      • Hampster Economics

        Something about the obnoxious, carefree version of the internet from my youth has always appealed to me. I remember exactly where I was when the Heaven’s Gate mass suicide went down and periodically check the cult’s still-functioning website. Even for a mass suicide cult, there’s something innocuous and joyful in the way the site’s displayed. The rainbow coloring, the dreamy night sky background, the welcoming tone. I love it. My love affair with the cutesy, silly part of the internet started there, but never seemed to end. In my teenage years, I must’ve watched every Homestar Runner episode at least ten times. More than anything though, Hampsterdance left an indelible mark on the way I see the internet. The focus of my own writing each week is branding and it’s impossible not to compare the notoriety of Heaven’s Gate and Homestar Runner against that of the dancing Hampsters. Today’s Tedium ponders the commercial viability of the Hampsterdance. — Jared @ Tedium

    • AstroTurf/Lobbying/Politics

      • Bullying Standard Practice for Right-wing Republicans
      • The View From Here: Rethinking What Local News Can and Should Be

        Local news organizations are rethinking their relationships with the communities they serve, from deploying new messaging platforms that deliver news to overhauling their reporting practices, editors told ProPublica in a series of recent conversations.

        Amid increased polarization and a pandemic in which misinformation has spread as fast as the virus, editors in Atlanta, Phoenix and Detroit told us in live virtual events that the notion of local news as a public good is more relevant than ever.

      • Facebook increasing protections for activists, journalists against harassment

        The platform’s policies surrounding how public figures are treated include generally allowing users to call for the death of a public figure so long as they are not tagged in the post. Users are not permitted to call for the death of private users, a policy that will now extend to journalists, Reuters reported.

      • Does This Ring A Bell?

        No matter your ultimate lean on politics, you have to admit it’s pretty strange to sit with the knowledge that OAN, a conservative news network, was effectively funded by AT∓T, right? This is a strange headline that kind of shakes through people’s heads in part because of what AT∓T used to represent, as the phone company that we all had to use. (Now, at least with the dust settled, we have something of a choice.) The irony of the company that currently owns CNN bankrolling something that is literally the opposite of CNN in every way that matters is too bizarre to ignore. Now combine this with the effect of Facebook’s many negative headlines this week (including its downtime), creating the real possibility that Facebook is the AT∓T of social media (down to the permissive approach around controversial content) and might need to be broken up, and you have some real knotty fodder to think about. Today’s Tedium considers the messy effects of AT∓T’s breakup with the Baby Bells in a modern context.

      • A second Facebook whistleblower says she’s willing to testify before Congress and that she’s shared documents with a US law agency

        Zhang also said on Twitter on Sunday that she had provided a US law-enforcement agency with “detailed documentation regarding potential criminal violations.”

        When asked by CNN, Zhang did not say which agency she gave documents to. An FBI spokesperson declined to comment when contacted by CNN.

      • Another Facebook whistleblower says she is willing to testify before Congress

        Central to Zhang’s allegations about Facebook is that it doesn’t do enough to tackle abuse of its platform in countries outside of the United States. Roughly 90% of Facebook’s monthly active users are outside the US and Canada, according to its most recent quarterly filing.

      • Sophie Zhang: Second Facebook whistleblower reports ‘potential criminal violations’ to authorities

        “I’ve found multiple blatant attempts by foreign national governments to abuse our platform on vast scales to mislead their own citizenry, and caused international news on multiple occasions. I have personally made decisions that affected national presidents without oversight, and taken action to enforce against so many prominent politicians globally that I’ve lost count.”

      • Facebook says it will ban content that sexually harasses celebrities

        As part of this new policy update, Facebook said that it would remove any profiles, pages, groups, or events dedicated to sexualizing public figures, including celebrities, politicians, and content creators. The new policy bans sexualized photoshops and drawings and any degrading content “in the process of bodily functions,” Antigone Davis, global head of safety at Facebook, said in a blog post on Wednesday.

        Facebook also said that it would remove “unwanted sexualized commentary” and repetitive attacks harassing an individual sexually.

    • Censorship/Free Speech

      • LinkedIn Caves Again, Blocks US Journalists’ Accounts In China

        LinkedIn — the business-oriented social media platform owned by Microsoft — has spent the last few years increasing its compliance with the Chinese government’s demands for censorship. A couple of years back, the network drew heat for not only blocking accounts of Chinese pro-democracy activists but also critics of the government located elsewhere in the world.

      • Oppose the right-wing, racialist attack on composer Bright Sheng at University of Michigan

        Sheng, the Chinese-born Leonard Bernstein Distinguished University Professor of Composition, is a world-class composer, who has been teaching at the University of Michigan since 1995. He was a Pulitzer Prize finalist and was given a MacArthur “genius” fellowship in 2001. The Foundation described him as “an innovative composer whose skillful orchestrations bridge East and West, lyrical and dissonant styles, and historical and contemporary themes to create compositions that resonate with audiences around the world.”

        The “crime” for which Sheng has been forced out of teaching the class has only been made possible by the whipping up of racialist frenzy on the university campuses and in the media. No honest or fair-minded individual could find anything remotely offensive about Olivier’s performance or the film as a whole.

    • Freedom of Information/Freedom of the Press

      • Lee Camp: Julian Assange’s Father, John Shipton, on the U.S. Government’s ‘Scandalous’ Plan to ‘Murder’ His Son
      • [Old] 3 arrested can challenge Louisiana pipeline trespass law

        The law “is part of a national effort to crack down on environmental activists across the U.S.,” the Center for Constitutional Rights, which represents White Hat, Savage and Mejia, said in Thursday’s news release. It said the first was passed in Oklahoma in 2017, and said similar bills have been introduced 23 times in 18 states since 2017, including 14 in 2019.

      • Covering Myanmar is Becoming Impossible, Say Local Journalists

        Access to social media and the [Internet] was blocked, at least five local media outlets had licenses revoked, and authorities detained dozens of journalists covering nationwide protests against the junta.

        In the months that followed, media outlets have been forced to restructure their operations by working online or from self-imposed exile.

        Win Zaw Naing, a journalist at the Yangon-based Red News Agency, says he has been stuck inside his house for seven months, having to work almost entirely online.

        “It is almost impossible to report on the ground now. I did not leave the house and I did not see anyone. I do it online, I make phone calls,” he told VOA.

    • Civil Rights/Policing

      • Minneapolis Police Caught on Video ‘Hunting’ Activists

        The extraordinary footage was released last week by the lawyer of a man who was caught up in an exchange of fire with police that night. (That man, Army veteran Jaleel Stallings, was exonerated by a jury in September for acting in self defense.) The footage, which was part of the evidence used in Stallings’ trial, also shows Minneapolis cops making racist comments, cursing protesters and journalists, slashing the tires of parked cars — in short, acting more lawless than the crowds they were supposed to be controlling that night.

      • Election workers accused of shredding voter applications

        Preliminary information indicates that the employees checked out batches of applications for processing, and they are alleged to have shredded some of the forms, the Fulton County statement says. Fellow employees reported the alleged actions to their supervisor Friday morning, and the two employees were fired that day.

      • The Government’s Secret ‘Google Search’ Warrant Trap

        Keyword warrants are not new, but they are rare, and they are little known by the broader public. The Forbes documents provide hard proof of the government’s judicial exercise of keyword warrant in a 2019 Wisconsin case tracking down men suspected of kidnapping and abusing a minor. Investigators asked Google for data on anyone who had searched for the victim’s name, her mother’s name, and her address over a period of 16 days.

        Other known uses of keyword warrants include demands for information on Google searches for the address of an arson victim who was a witness in the racketeering case against crooner R. Kelly in 2020 and Google searches for a fraud victim in Minnesota in 2017. It’s not just Google. Jennifer Lynch of the Electronic Frontier Foundation points out that keyword warrants were served to Microsoft and Yahoo for searches on things like “pipe bomb” and “low explosives” in the course of tracking down the 2018 Austin bombings. Additionally, Forbes was able to track down the existence of a fifth keyword warrant request in California in late 2020, but it was only noted in a court docket, so we don’t know the extent of the order.

      • The Boston Marathon bomber case reaches the Supreme Court

        “This case is the first case where the court is confronted with an almost unlimited amount of information through social media,” says George Kendall, a capital defense lawyer. “So it was really sort of surprising, to say the least, that when the judge decided, ‘OK, we can do this in Boston,’ that kind of question was not asked of everyone.”

      • Outrage Grows Over Jailing of Children as Tennessee University Cuts Ties With Judge Involved

        In the days after ProPublica’s investigation of the juvenile justice system in Rutherford County, Tennessee, one state lawmaker wrote that she was “horrified.” Another called it a “nightmare.” A third labeled it “unchecked barbarism.” A former Tennessee congressman posted the story about the unlawful jailing of kids and tweeted, “The most sickening and unAmerican thing I’ve read about in some time.” The NAACP Legal Defense and Educational Fund called for a federal civil rights investigation. A pastor, in his Sunday sermon in Nashville, said: “We can’t allow this madness to continue. These are our babies.”

        And on Tuesday evening, four days after the story published, the president of Middle Tennessee State University notified faculty and staff that Donna Scott Davenport, a juvenile court judge at the heart of the investigation, “is no longer affiliated with the University.” Davenport had been an adjunct instructor at the school, which is based in Murfreesboro, Tennessee. For many years, she taught a course on juvenile justice. In 2015, she was one of the university’s commencement speakers.

      • The General Strike of 2021
      • Origin and Meaning of Critical Race Theory

        In August 2021, the Brookings Institute reported that at least eight states had passed legislation banning the teaching of Critical Race Theory, although only Idaho actually uses the phrase.

        The modern iteration of Critical Race Theory begins in the 1980s when legal scholars followed by social scientists and educational researchers began to employ CRT as a way of understanding the persistence of race and racism in the United States. Kimberlé Crenshaw, who teaches law at UCLA and Columbia University and was an early proponent of critical race theory, described it as “an approach to grappling with a history of white supremacy that rejects the belief that what’s in the past is in the past, and that the laws and systems that grow from that past are detached from it.” Basically, Critical Race Theory rejects the idea of colorblindness or legal neutrality and argues that race and racism have always played a major role in the formulation of American laws and the practices of American institutions. It is a study of laws and institutions that sifts through the surface cover to look for underlying meaning and motivation. As an academic discipline it does not claim that everything about the United States is racist or that all white people are racist. The CRT lens examines laws and institutions, not people, certainly not individual people.

      • Ronald Deibert Provides Statement on behalf of Chelsea Manning – The Citizen Lab

        Citizen Lab founder and director, Dr. Ronald Deibert, recently provided a statement in the context of Chelsea Manning’s inadmissibility proceeding before the Immigration and Refugee Board of Canada.

        The statement proceeds in four parts. In the first section, Deibert provides background context regarding his professional experience and the Citizen Lab’s work. In the second section, he describes the Citizen Lab’s research activities in detail and the academic and public interest impacts of those activities. In the third section, he summarizes certain events that have threatened or aimed to chill the Citizen Lab’s research activities in the past. In the fourth section, he explains the chilling effects that a broad interpretation of section 342.1 of the Criminal Code and/or of subsection 16(2) of the Security of Information Act (“SOIA”) could have on the Citizen Lab’s scholarship and on related initiatives.

    • Internet Policy/Net Neutrality

    • Monopolies

      • Amazon copied products and rigged search results to promote its own brands, documents show

        Amazon.com Inc has been repeatedly accused of knocking off products it sells on its website and of exploiting its vast trove of internal data to promote its own merchandise at the expense of other sellers. The company has denied the accusations.

        But thousands of pages of internal Amazon documents examined by Reuters – including emails, strategy papers and business plans – show the company ran a systematic campaign of creating knockoffs and manipulating search results to boost its own product lines in India, one of the company’s largest growth markets.

      • Patents

        • Corner office podcast: Managing Salesforce’s diverse IP needs [Ed: Software patents propaganda and other nefarious agenda from Salesforce disguised as 'journalism' from the voice of patent trolls, Patrick Wingrove]

          David Simon, senior vice president of IP at Salesforce, shares his views on Section 101, Fintiv, the DMCA, and more

        • Europe’s IPR rules need to be strengthened to ensure they meet current and future challenges, explains Marion Walsmann [Ed: Europe does not have "IPR rules"; it has laws for patents, copyrights, etc. and they're not "rights; what we have here is lobbying that namedrops "SMEs" and shameless (massive) lies about UPC in the text below; What we basically have here is a German EPP MEP frontally attacking small businesses by lying about them while claiming to speak for them.]

          Filing a single application, rather than numerous national procedures, and obtaining a single patent that is valid throughout Europe will dramatically simplify the patent application process and greatly reduce corresponding costs. Pricey parallel lawsuits would also be prevented [sic] by the Unified Patent Court, while legal certainty would be increased. [sic]

        • Patent case: In re Juniper Networks Inc., USA [Ed: Texas run by corrupt judges who treat their courts like for-profit corporations; the higher patent courts belatedly tackle this corruption from the whackos of Waco]

          The federal district court in Waco, Texas abused its discretion in denying Juniper Networks’ motion to transfer six patent infringement actions filed by a Texas-based patent assertion entity to the Northern District of California, the U.S. Court of Appeals for the Federal Circuit has decided in granting Juniper’s motion for a writ of mandamus. The district court erred in its analysis of the relevant public and private public interest factors used for determining whether the transferor or the transferee district is the more convenient forum. For example, concerning the most important factor, the relative convenience of the transferee forum for the potential witnesses, Juniper identified 11 witness located in the Northern District of California, while the plaintiff—a company’s whose presence in Texas appeared to be both recent and ephemeral—identified only one witness (In re Juniper Networks, Inc., September 24, 2021, per curiam).

        • Opinion: Tired of Brexit? The exhaustion is still to come! [Ed: Misusing the words "IP" (which are both inappropriate for the subject at hand]

          The UKIPO has still to decide on a path forward for exhaustion after Brexit – but with IP taking a back seat in government circles, don’t hold your breath

        • Hanwha Q-Cells and Hoyng ROKH Monegier win cross-border injunction against Longi [Ed: Instead of journalism JUVE is now doing ads for law firms, puff pieces thinly disguised as nothing but "case studies"; JUVE is just a PR agency now]

          The ruling from Rotterdam District Court is interesting because the Hanwha patent is valid in 16 European countries, but not in the Netherlands. Nevertheless, the court issued a cross-border injunction for 9 countries. The court also ordered a penalty sum capped at €5 million.

          The Rotterdam court did have doubts as to whether the Dutch Longi company directly infringed EP 2220689 B1. It nevertheless ruled that the distribution and sale of the solar panels in Belgium, Bulgaria, Germany, France, Liechtenstein, Portugal, Spain, the UK and Switzerland is an unlawful act against Hanwha Q-Cells. Therefore, the judges granted the cross-border injunction for nine countries (case ID: C/10/621252 / KG ZA 21-563).

        • Restoring the America Invents Act: legislative measure to defend post-grant review of U.S. patents welcomed by tech industry, patent experts

          About a year ago I described a complaint by Apple, Google, Intel, and Cisco over then-USPTO Director Iancu’s PTAB rulemaking as “litigation to the rescue of legislation” because the case was brought in defense of the ideas underlying the Leahy-Smith America Invents Act (AIA). Essentially, Mr. Iancu had gutted the PTAB IPR (inter partes review) part of the AIA by establishing a discretionary-denial regime.

          By now there is also hope for the PTAB IPR process because of developments on other fronts. The next USPTO Director may undo some of Mr. Iancu’s rulemaking, and now there’s a proposal in the United Senate that amounts to “legislation to the rescue of (earlier) legislation”: the Leahy-Cornyn Restore AIA bill (“RAIA”). Sen. Patrick Leahy (D-Vt.), one of the sponsors of the original AIA, is now the President pro tempore of the Senate. Sen. John Cornyn (R-Tex.) has also taken an interest in patent policy for some time. Both have a reputation for balanced positions on patent enforcement: neither are they in the “Coons camp” (which favors ever stronger enforcement even of weak patents) nor could they be reasonably accused of seeking to weaken patent protection.

          Litigation, executive action, legislation–three ways to reverse Mr. Iancu’s PTAB rules, any single one of which could do the job. Executive action would potentially be quickest (as it won’t take that much longer until the new USPTO Director has been named). Durability is the most important quality of new legislation: the Restore AIA would not only solve the problem at hand but would also prevent it from reoccurring, unless and until Congress would decide otherwise.

        • Koenig & Bauer wins infringement case against Hebenstreit [Ed: This is framed as a shameless advertisement instead of actual reporting about a patent case. JUVE is a marketing company now, which occasionally lies for lobbyists.]

          Koenig & Bauer has won the second instance of the patent infringement case. However the breach of trade secrets dispute is still ongoing. The founders of Hebenstreit, based in Ludwigsburg, are former employees of the patent holder. Koenig & Bauer accuses them of having used the company’s technical drawings for their own business.

          Koenig & Bauer, based in Würzburg, sued Hebenstreit for patent infringement. Its EP 1 266 852 B1 protects a device for feeding and stacking tabular goods. The technology is used in metal pressing, where it stacks the pressed metal plates on top of each other at the end of the line. The speed of the stacking process in particular, as well as its precise coordination with the speed of the press, plays an essential role. The original patent applicant was LTG Mailänder, which was acquired by Bauer + Kunzi (later Koenig & Bauer-MetalPrint) in 2006.

        • Software Patents

          • Prior art found on Heritage IP patent

            Unified is pleased to announce prior art has been found on U.S. Patent 6,854,067, owned by Heritage IP, LLC, an NPE and subsidiary of IP Edge. The ’067 patent generally relates to a method and system for interaction between a processor and a power on reset circuit to dynamically control power states in a microcontroller. This patent has been asserted in district court against NXP, Resideo Technologies, Maytronics, Insulet Corp., August Home, and others.

      • Trademarks

        • Public Backlash Leads Tusla Park To Stop Bullying Coffee Shop Over Trademark

          A good public outcry and backlash can lead to many, many good things. We see it here at Techdirt all the time, particularly when it comes to aggressive bullying episodes over intellectual property. Some person or company will try to play IP bully against some victim, the public gets wind of it and throws a fit, and suddenly the necessity over the IP action goes away. Retailers, manufacturers, breweries: public outcry is a great way to end ridiculous legal actions.


Bug Tracking, Issue/Request Trackers, and Development/Collaboration (e.g. Git) Over Gemini Protocol

Posted in Free/Libre Software, Site News at 8:09 am by Dr. Roy Schestowitz

Video download link | md5sum f5fa92a17e57f56dc310a916bdf59fc7

Summary: Gemini protocol (gemini://) is very suitable for collaborative work; here in Techrights we already make extensive use of Gemini, even for internal work, as the video above explains

THE growth of Git has been phenomenal. In just a few years it overtook svn (Apache Subversion), which I still used about a decade ago after CVS had been left way behind (almost nobody used it anymore, so my knowledge of that became obsolete; last release was 13 years ago). But in the age of Mantis and Bugzilla a lot of developers turn to the Web (as in World Wide Web and Web browsers) for bug tracking, putting aside atrocious traps (Microsoft vendor lock-in) such as GitHub “issues”, among other bits of proprietary lock-in. The main issue is GitHub Issues, among other capitalised stuff that seeks to replace Git (new terminology and trademarks, even “PRs”… or “MRs” as GitLab calls them). Don’t allow them to do it… their vision is truly malicious as we noted yesterday. All those bloated frameworks, which tend to include proprietary JavaScript and unnecessary complexity (e.g. GitLab and JIRA) aren’t truly needed for most projects. At the same time, the command line is typically insufficient, as browsing interconnected pages can help navigation and orientation. Gemini/GemText would be versatile enough for almost anything; no need for Web browsers that use up 100-200MB of RAM for just one open tab. We should note that although GitLab advertises itself as an “open” (or “free” or “libre”) alternative to GitHub, the FSF has curtailed plans to rebuild Savannah based on it. Richard Stallman is increasingly unhappy about the direction GitLab has taken, both for technical reasons and for licensing reasons (it’s dual licensed, i.e. partly proprietary, but they give some projects a ‘free’ ride for promotional purposes, never mind that growing requirement/strict necessity for JavaScript sent from the server to the client). For a lot of people, Git has become a bloated mess of frameworks — consistent with what has been happening to GNU/Linux and Web browsers. It’s difficult to study what’s going on where there are so many moving parts, including ones that you cannot control/access, e.g. CDNs such as ClownFlare instead of local caching with Varnish.

“Richard Stallman is increasingly unhappy about the direction GitLab has taken, both for technical reasons and for licensing reasons (it’s dual licensed, i.e. partly proprietary, but they give some projects a ‘free’ ride for promotional purposes, never mind that growing requirement/strict necessity for JavaScript sent from the server to the client).”In the summer we started a transition to our custom-made Gemini interface/s for Git. It’s all publicly available right now under the terms of the AGPLv3. As it turns out, based on this message from today, there’s also work on bug tracking over Gemini. Remember that it’s possible to submit user input into Gemini capsules (it’s not sophisticated but it generally works), so prototypes for online chat over Gemini have already been implemented athough without UNIX/POSIX streams it is more suitable for non-interactive mode (not real-time, either). “I find using GitLab horrificly [sic] expedient,” Jonathan McHugh wrote this morning, and “it would be nice to not be dependent on it. I am currently working on creating a GemText based issue tracker, leveraging git repos and a simplified directory structure.”

We spent some time earlier this year studying Gitea, GitLab and other Web interfaces; they’re all very bloated with far too many dependencies (even databases!), which render them a potential maintenance nightmare for relatively small projects.

“If you are a software developer and you pursue self-hosting (akin to self-determination), Gemini is a useful skill to have. It scales well and it’s easy to configure/setup and then maintain.”As noted in the video above, more geeks and coders now realise that project documentation and other aspects of development are better off managed over Gemini. It’s just a matter of studying the protocols and reusing available code. gemini:// is very simple for transport and GemText is so simple that you can teach young children how to use it, as mentioned in the video.

GemText reduces the potential of security breaches (Apache has made headlines again for security concerns) and it’s easier to diagnose, knowing there’s no CSS or JavaScript embedded anywhere. It’s just the Web (re)done correctly, with a modernised and enhanced set of features previously found in Gopher (a bit of a prototype in this context).

If you are a software developer and you pursue self-hosting (akin to self-determination), Gemini is a useful skill to have. It scales well and it’s easy to configure/setup and then maintain. This year alone the number of Gemini capsules rose sharply; it will have quadrupled by some estimates. That’s exponential growth.


[Meme] Nicht Unser Bier

Posted in Site News at 6:06 pm by Dr. Roy Schestowitz

Taboo subject?

EPO: Danke Deutschland
Danke Deutschland

Summary: A timely joke to accompany Part 5 of the current series; as I myself discovered last month, the coalition government is (or was; there was an election recently) totally covering up EPO abuses and for two weeks already they refuse to even reply to my multiple polite and cordial E-mails (after initial interest, correspondence, and even phonecalls from them); so it certainly feels like someone up above said “NICHT!!!” and they’re instructed to no longer communicate on this matter


Links 4/10/2021: Linux 5.15 RC4, GNU automake 1.16.5

Posted in News Roundup, Site News at 4:08 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • Linux 5.15-rc4
        This release continues to look pretty normal after the initial
        hiccups. At least going purely by number of commits, we're right smack
        dab in the middle of the normal range for this time in the release
        cycle, and the diffstat looks fairly normal too. A bit less
        driver-heavy than usual, perhaps, but nothing big, and nothing that
        makes me go "that's strange".
        One thing standing out in the diffs might be the m68k 'set_fs()'
        removal - not really a regression fix, but it has been pending for a
        while, and it turned out that the problems attributed to it were due
        to an entirely unrelated m68k signal handling issue. So with that
        fixed, we could get rid of set_fs from another architecture. There's a
        few more architectures I'd like to see it removed from, but all the
        actively maintained ones have already removed it, so on the whole
        set_fs really is a thing of the past, only used by legacy
        Anyway, about a third of the diff is drivers (net, sound, rdma, gpu),
        with the rest being a mix of arch updates (the m68k set_fs stuff and
        some kvm patches), tooling (mostly selftest updates), filesystem code
        and core networking.
        The appended shortlog gives you more details, but if you really want
        to dig into it, go for the git tree.
        Go test,
      • Linux 5.15-rc4 Released – The Kernel Is Looking “Pretty Normal”

        Linus Torvalds has declared Linux 5.15-rc4 as the latest weekly release candidate of the maturing Linux 5.15 codebase.

      • Kernel prepatch 5.15-rc4

        The 5.15-rc4 kernel prepatch is out for testing.

    • Applications

      • Repo Review: Bookworm

        Bookworm is a lightweight eBook reader application that provides an easy way for you to organize and read your collection of eBooks. It has support for numerous common eBook formats, such as EPUB, MOBI, and PDF. The interface is quite simple and nicely designed, making Bookworm easy to use.

        Upon opening Bookworm, you’ll be presented with the library page, where you can view and load in your collection of eBooks. To import an eBook, click on the + button down in the lower left corner and select a file to load. To remove a book, simply click on the check mark button down in the corner, select the eBooks that you wish to remove, and then click on the – button. You can choose to arrange the books in list view or thumbnail view, and there’s also a handy search bar at the top to help you find books more easily. If you right-click on a book, you can then edit information such as the title and author, and you can also add a cover image for the book. Simply click on a book to begin reading.

    • Instructionals/Technical

      • Recording Audio Easily On PCLinuxOS

        Capturing audio and video on PClinuxOS (and any Linux for that matter) can be a frustrating task. Either the applications don’t work properly with the audio/video capture software, or, the sound server is not compatible with the capture application (or vice versa, a capture application that requires a sound server that is not the default of the installation).

        Java applications, for example, access the DSP directly and are not as flexible about routing audio as native PCLinuxOS applications.

      • Inkscape Tutorial: Common Inkscape Mistakes

        I’ve subscribed to several YouTube pages, just like many people have. One of the pages I’ve subscribed to is named Logos by Nick. In his channela he has many tutorials for GIMP and Inkscape. In this one, he describes five mistakes that new Inkscape users make. Let’s look:

    • Distributions

      • Screenshots/Screencasts

        • Lubuntu 21.10 Beta

          Today we are looking at Lubuntu 21.10 Beta. It comes with Linux Kernel 5.13, LXQt 0.17, and uses about 500-600MB of ram when idling. Enjoy!

          Please take note that this is a beta release, so there might be bugs.

        • Lubuntu 21.10 Beta Run Through – Invidious

          In this video, we are looking at Lubuntu 21.10 Beta. Enjoy!

      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • Welcome From The Chief Editor

          Furthermore, there’s ample evidence that Daylight Savings Time has a negative effect on people’s health. This article on Health.com lists seven ways Daylight Savings Time can have an impact on your health.

          In a way, we are fooling ourselves with the foolishness of thinking we are gaining more hours of sunlight by messing with the hands on the clock. On any given day, there are a certain number of hours of daylight available. If you want to avail yourself of that daylight, then get up when the sun rises, and go to bed when the sun sets, just like our ancestors did, and just as the other animals on this planet do.

          Daylight Savings Time has long outlived its usefulness. Let’s just pick one time, whether it’s “Standard Time” or “Daylight Savings Time,” and just stick to it. Personally, my vote is for just maintaining Standard Time all year round. Bouncing the hands back and forth on a clock introduces more chaos and havoc than the meager benefits we receive from doing so.

        • PCLinuxOS Screenshot Showcase
    • Free, Libre, and Open Source Software

      • FSF

        • GNU Projects

          • automake-1.16.5 released [stable]
            This is to announce automake-1.16.5, a stable release.
            Thanks to Karl for doing all the real work.
            See the NEWS below for a brief summary.
            There have been 18 commits by 6 people in the 10 weeks since 1.16.4.
            See the NEWS below for a brief summary.
            Thanks to everyone who has contributed!
            The following people contributed changes to this release:
              Akim Demaille (1)
              Dimitri Papadopoulos (1)
              Jan Engelhardt (1)
              Jim Meyering (6)
              Karl Berry (8)
              Nick Bowler (1)
            Jim [on behalf of the automake maintainers]
            Here is the GNU automake home page:
            Here are the compressed sources:
              https://ftp.gnu.org/gnu/automake/automake-1.16.5.tar.xz (1.6MB)
              https://ftp.gnu.org/gnu/automake/automake-1.16.5.tar.gz (2.3MB)
            Here are the GPG detached signatures[*]:
            Use a mirror for higher download bandwidth:
            Here are the SHA1 and SHA256 checksums:
            8B1YzW2dd/vcqetLvV6tGYgij9tz1veiAfX41rEYtGk  automake-1.16.5.tar.xz
            B70krQimS8FyUM4J7FbpIdY0OQOUPpnM9ju/BwXjRgU  automake-1.16.5.tar.gz
            Each SHA256 checksum is base64 encoded, instead of the
            hexadecimal encoding that most checksum tools default to.
            [*] Use a .sig file to verify that the corresponding file (without the
            .sig suffix) is intact.  First, be sure to download both the .sig file
            and the corresponding tarball.  Then, run a command like this:
              gpg --verify automake-1.16.5.tar.xz.sig
            If that command fails because you don't have the required public key,
            then run this command to import it:
              gpg --keyserver keys.gnupg.net --recv-keys 7FD9FCCB000BEEEE
            and rerun the 'gpg --verify' command.
            Please report bugs and problems to <bug-automake@gnu.org>,
            and send general comments and feedback to <automake@gnu.org>.
            * Bugs fixed
              - PYTHON_PREFIX and PYTHON_EXEC_PREFIX are now set according to
                Python's sys.* values only if the new configure option
                --with-python-sys-prefix is specified. Otherwise, GNU default values
                are used, as in the past. (The change in 1.16.3 was too incompatible.)
              - consistently depend on install-libLTLIBRARIES.
            * Distribution
              - use const for yyerror declaration in bison/yacc tests.
      • Programming/Development

        • “Static Linking Considered Harmful” Considered Harmful

          Most people install software through their package manager. If the package manager tracks the dependencies between static libraries and their dependents, the package manager could detect changes and run reassmblies as necessary.

          If we wanted to go further, we could. We could add a mechanism to the OS to be able to discover when the IR files for a library used by a program it launches has changed. We could even have the OS start the compiler and have it exec() into the new binary.

          This would make sure that even libraries and programs installed by hand are properly updated.

  • Leftovers

    • Opinion | Michael Albert’s ‘No Bosses’: A Review by Mark Evans
    • Science

      • ‘Mad’ Israeli quest to revive ancient dates bears fruit

        With lots of patience and care, she and project partner Elaine Solowey managed to grow date palms from seeds dating back to the Kingdom of Judah which emerged in the 11th century BC.

        The kingdom was “renowned for the quality and quantity of its dates”, praised at the time for their “large size, sweet taste… and medicinal properties,” the two wrote in an article for Science magazine.

        Bringing back the ancient variety with Solowey, a specialist in sustainable agriculture, was not just a novelty project, Sallon said, but offered “a beacon of hope” for a planet battling the climate crisis and mass species extinction.

    • Education

    • Health/Nutrition

    • Integrity/Availability

      • Proprietary

        • Baby’s Death Alleged to Be Linked to Ransomware [iophk: Windows TCO]

          Springhill has declined to name the ransomware that was behind the July 2019 attack, but given the timing and the lack of scruples in targeting a healthcare facility, there are plenty of possibilities.

        • Security

          • Privacy/Surveillance

            • A Simple Web of Trust for Tor Relay Operator IDs

              Tor users are facing persistent malicious actors repeatedly running large fractions of the tor network’s capacity to exploit them [1] [2] [3]. Detecting all malicious tor network capacity is not practically feasible using active scanners in many cases since attackers have moved from attacking all connections to more targeted approaches where only users of specific domains (that are not necessarily known to defenders) are exploited. Transport level encryption (HTTPS) can defeat many types of attacks by malicious exit relays and the global HTTPS availability has significantly increased over the past years but is still not ubiquitous yet, especially on the first connection. Therefore we propose to publish relay operator trust information to limit the fraction and impact of malicious tor network capacity.

            • [Old] Are people really finding jobs on LinkedIn?

              [...] I don’t need a Microsoft website to validate my previous professional experiences.

              The other thing, I wrote about, is the lack of great opportunities there. The copied/pasted sentences from headhunters that, sometimes, don’t even read your resume piss me off. How many times I got offers for jobs with Windows system when there is not a single line about that OS on my CV.

            • [Old] AirGuard – AirTag tracking protection

              With the app you can play a sound on AirTags and find it easily. Afterward, you can view at which locations the device has tracked you. For this we use background location access. All location data never leaves your device.

            • Short Topix: Epik Data Breach Impacts Millions, Customer & Non-Customers Alike

              AN EXPOSÉ BY PROPUBLICA details how Facebook has undermined “privacy protections” for its 2 billion WhatsApp users. Despite assuring users that no one can see their posts, Facebook runs an extensive monitoring operation, and even regularly shares personal information with prosecutors. It’s odd typing “Facebook” and “privacy” in the same sentence, as the two are as antithetical as any two words could possibly be. This just illustrates that point perfectly.

              PROTONMAIL HAS REMOVED “WE DO NOT KEEP ANY IP LOGS” FROM ITS PRIVACY POLICY, according to an article on ArsTechnica. Based in Switzerland, the privacy-focused email provider was forced by Swiss courts to log and disclose a French climate activist’s IP address and browser fingerprint to Swiss authorities. Being a Swiss-based company, ProtonMail was forced to comply with a Swiss court injunction ordering it to log the IP address and browser fingerprint of the particular ProtonMail account. Since then, ProtonMail has changed its privacy statement to users, removing “By default, we do not keep any IP logs that can be linked to your anonymous email account”. The replacement privacy statement is a bit muddier, and makes no mention of logging IP addresses.

              In more Facebook news, a lawsuit (PDF) by shareholders filed back in August 2021 and just made public against Facebook and Facebook upper management discloses that FACEBOOK PAID $4.9 BILLION MORE TO SETTLE A FEDERAL TRADE COMMISSION LAWSUIT FOR THE CAMBRIDGE-ANALYTICA SCANDAL than it had to. And why, you might ask? All to “protect” CEO and founder Mark Zuckerberg from being named as a defendant, or to keep him from even having to give a deposition in the case, according to an article on The Guardian.

              According to a blog entry from the internet security company called Expel, they HAVE IDENTIFIED THE TOP PHISHING KEYWORDS FROM THE LAST 10,000 MALICIOUS EMAILS THEY HAVE INVESTIGATED. Emails with the following words were associated with phishing attempts: Invoice, Message, Required, Request, and Action, among others. Believe it or not, even emails where the subject line was left blank made the list. If you’re concerned about phishing attempts (defined by Merriam-Webster’s online dictionary as a scam by which an Internet user is duped (as by a deceptive email message) into revealing personal or confidential information which the scammer can use illicitly), you might want to head on over to the blog entry to see the full article.

            • Customize Your Next Google Search [Ed: Oh, gosh. This is awful. Some people still recommend spying engines like Startpage and DDG.]
    • Defence/Aggression

      • Counter-Revolution in Arabia

        Following the taxonomy deployed by the legendary Ghanaian revolutionary, Kwame Nkrumah, the Arab states can be divided into two main camps: those which are under the effective control of the former colonial powers and their allies (which he termed ‘neocolonial’ states), and those which are not. In the former camp are states such as Saudi Arabia, Bahrain, Qatar, Kuwait, and the UAE, all of them creations of the British empire and to this day still controlled by the ruling families handpicked by Britain at the height of empire. The consolidation and reinforcement of the relationships between Britain and these families, and the shoring up of their power, is a core part of the role of the British royal family, and much of their time is taken up with hosting and visiting these families. This is especially important at times when their rule is under threat, providing an expression of solidarity at the highest level, an assurance that the British state will stand shoulder-to-shoulder with whatever repression is deemed necessary to hold onto power. To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • To Deter Israeli Strikes on Gaza, US House Reps Should Prepare Floor Fight
      • Opinion | When Will the US Acknowledge its Secret Torture Site in Poland?

        One of the longest-held prisoners in the U.S. global war on terror is finally getting a day in court. Sort of. The prisoner, Abu Zubaydah, who has never been charged with a crime, has been waiting 14 years for a federal judge to rule on his habeas corpus petition that challenges the legality of his detention. But next week, the Supreme Court will hear arguments on a separate case: Zubaydah’s request that he be permitted to take testimony from the two CIA contractors who oversaw his torture.

      • Ex-Facebook manager alleges social network fed Capitol [insurrection]

        Despite the enmity that the new algorithms were feeding, Facebook found that they helped keep people coming back – a pattern that helped the Menlo Park, Calif., company sell more of the digital ads that generate most of its advertising.

      • Whistleblower says Facebook put profit before reining in hate speech

        Haugen, who previously worked at Google and Pinterest, said Facebook has lied to the public about the progress it made to clamp down on hate speech and misinformation on its platform.

        She added that Facebook was used to help organize the Capitol [insurrection] on January 6, after the company turned off safety systems following the U.S. presidential elections.

      • Facebook whistleblower revealed on ’60 Minutes,’ says the company prioritized profit over public good

        The 37-year-old former Facebook product manager who worked on civic integrity issues at the company says the documents show that Facebook knows its platforms are used to spread hate, violence and misinformation, and that the company has tried to hide that evidence.

        “The thing I saw at Facebook over and over again was there were conflicts of interest between what was good for the public and what was good for Facebook, and Facebook over and over again chose to optimize for its own interests, like making more money,” Haugen told “60 Minutes.”

      • Facebook whistleblower reveals identity, accuses the platform of a ‘betrayal of democracy’

        The documents, first reported by the Journal, revealed that Facebook executives had been aware of negative impacts of its platforms on some young users, among other findings. For example, the Journal reported that one internal document found that of teens reporting suicidal thoughts, 6% of American users traced the urge to kill themselves to Instagram.

      • Facebook whistleblower reveals identity, accuses the platform of a ‘betrayal of democracy’

        Haugen pointed to the 2020 election as a turning point at Facebook. She said Facebook had announced it was dissolving the “Civic Integrity” team, to which she was assigned, after the election. Just a few months later, social media communications would be a key focus in the wake of the January 6 insurrection at the U.S. Capitol.

        “When they got rid of Civic Integrity, it was the moment where I was like, ‘I don’t trust that they’re willing to actually invest what needs to be invested to keep Facebook from being dangerous,’” Haugen told “60 Minutes.”

      • Whistle-Blower to Accuse Facebook of Contributing to Jan. 6 [Insurrection], Memo Says

        Facebook, which has been under fire from a former employee who has revealed that the social network knew of many of the harms it was causing, was bracing for new accusations over the weekend from the whistle-blower and said in a memo that it was preparing to mount a vigorous defense.

        The whistle-blower, whose identity has not been publicly disclosed, planned to accuse the company of relaxing its security safeguards for the 2020 election too soon after Election Day, which then led it to be used in the storming of the U.S. Capitol on Jan. 6, according to the internal memo obtained by The New York Times. The whistle-blower planned to discuss the allegations on “60 Minutes” on Sunday, the memo said, and was also set to say that Facebook had contributed to political polarization in the United States.

      • Facebook denies whistleblower’s claims it contributed to Capitol [insurrection]

        Why it matters: Facebook appears to be launching a pre-emptive strike against the whistleblower with the memo, also shared with Axios, ahead of her CBS “60 Minutes” interview airing Sunday and her scheduled appearance at a Senate hearing Tuesday.

      • Jan. 6 Was Worse Than We Knew

        The threats to a free and fair presidential election don’t come from Congress alone. Since Jan. 6, Republican-led state legislatures have been clambering over one another to pass new laws making it easier to reject their own voters’ will, and removing or neutralizing those officials who could stand in the way of a naked power grab — like Georgia’s secretary of state, Brad Raffensperger, did when he resisted Mr. Trump’s personal plea to “find” just enough extra votes to flip the outcome there.

      • Why Ethiopia wants to expel UN officials sounding the alarm on famine

        A civil war between Ethiopia’s federal government and the country’s northern Tigray region, which began late last year, has led to widespread atrocities and created famine conditions in parts of the country. Prime Minister Abiy Ahmed’s decision to expel UN officials from the country comes after they raised concerns about the worsening humanitarian situation.

        UN officials have repeatedly warned that Ethiopia’s government is blocking the movement of critical supplies — like medicine, food, and fuel — into the Tigray region, with as little as 10 percent of the needed humanitarian supplies being allowed in. Those accusations were echoed this week by the head of the UN’s humanitarian aid arm, as well as a report finding the region on the brink of famine.

      • Mexico Remembers 1968 Student Massacre On Oct. 2

        Around 6 p.m., two red flares were shot into the air. Dressed as civilians, soldiers and members of the Olympia Battalion — a secret security force assembled ahead of the 1968 Olympic Games — mixed with the crowd and opened fire.

      • 3,000 Yazidis Are Still Missing. Their Families Know Where Some of Them Are.

        Seven years after they were captured by the Islamic State, some members of the Iraqi religious minority are still being held captive by fighters in Syria. Others are with families of ISIS militants.

    • Environment

      • The case for a more radical climate movement

        Malm’s book — it’s titled How to Blow Up a Pipeline — is obviously meant to provoke. But embedded in the provocation is a morally serious challenge to how we think about, and act on, the crisis humanity faces. And to be perfectly honest, I’m not sure how I feel about it. For instance, I think his summons to violence vastly overstates our ability to “control” such violence once it’s unleashed. I’m also less confident in the strategic utility of violence (even if it’s limited to the destruction of property, as Malm recommends) considering the enormous blowback that might result from it.

        I reached out to him for this week’s episode of Vox Conversations to talk about how we got here, why he says it’s time to escalate, and the problems — both obvious and subtle — with such a radical approach.

        Below is an edited excerpt from our conversation and some additional material from a follow-up exchange over email. [...]

      • Facebook Becomes Advertising Battleground for Biden Climate Bill

        With the Biden administration’s US$3.5-trillion climate legislation hanging in the balance in the U.S. Congress, fossil lobbyists and environmental justice groups are duking it out via Facebook ads.

        Appearing on Facebook “millions of times a week,” writes The New York Times, are ads that “take aim at vulnerable Democrats in Congress by name, warning that the $3.5 trillion budget bill—one of the Biden administration’s biggest efforts to pass meaningful climate policy—will wreck the United States economy.”

      • New UN Mapping Tool Provides Street-Level View of Flood Risk

        With record-breaking floods becoming the new normal, experts at the United Nations University (UNU) have developed a new tool that generates instant, accurate street-level resolution maps of floods worldwide since 1985.

        The free online World Flood Mapping Tool will help all countries, but especially those in the Global South, where flood risk maps are rare and often badly out of date.

      • Energy

        • Revealed: Two Thirds of Online Posts from Six Major European Fossil Fuel Companies ‘Greenwashing’

          Nearly two thirds of social media posts put out by six major European fossil fuel and energy companies since the end of 2019 present a “green” image of the company, despite the majority of their business activity remaining in fossil fuels, reveals new analysis by Desmog. The findings add to campaigner concerns that fossil fuel companies are promoting a misleading image of their business models as the need to decarbonize the economy becomes increasingly urgent.

          DeSmog’s investigation shows a disproportionate focus on green or environmental efforts by the companies — including highlighting their net zero targets — compared to the share of their business that is made up of clean energy efforts compared to their continued extraction or use of fossil fuels.

        • We the Power | The Future of Energy is Community-Owned
        • South Africa to Tighten Its 2030 Emissions Cap by 1/3

          South Africa is accelerating its emissions reduction targets as renewable energy costs decrease, but climate experts say more is needed.

          The country’s new cap will restrict emissions to 420 megatonnes of CO2 equivalent by 2030, a full third less than the previous target of 614 Mt, writes Climate Home News. But while campaigners are calling the target “a step forward” and proof of the value of official climate advisory bodies like the country’s Presidential Climate Commission (PCC), they also warn that “that the target was still not compatible with 1.5°C of global warming.” 

        • U.K. Engineers Urge Incentives to Stop Knocking Down Old Buildings

          Pressure is building to rapidly decarbonize the United Kingdom’s construction sector, with 450,000 of the country’s engineers urging higher priority for low-carbon procurement and retrofits.

          “Making bricks and steel creates vast amounts of CO2, with cement alone causing 8% of global emissions,” writes BBC, reporting on a new paper just published by the National Engineering Policy Centre, a partnership of 43 of the country’s professional engineering organizations. 

        • B.C. Fossil Subsidies Threaten Critical Caribou Habitat, New Mapping Shows

          British Columbia is subsidizing oil and gas well drilling on the same land it has promised to protect for caribou, new research has found.

          “The B.C. government has made a lot of commitments to caribou habitat restoration and it’s not really working,” said Adriana DiSilvestro, a University of British Columbia graduate student and lead author on the project, which is published on the website of ARCGis Online, a cloud-based mapping software.

        • ‘Keep Oil and Gas in the Ground,’ Say Fossil Fuel Foes as Spill Ravages California Coast

          As cleanup crews on Sunday rushed to contain the damage from one of the largest oil spills in recent Southern California history, environmentalists stressed the necessity of ending offshore drilling—and ultimately, of keeping all fossil fuels in the ground. 

          At least 126,000 gallons of crude oil gushed from a ruptured pipeline off the coast of Huntington Beach into ocean waters and local wetlands, the Los Angeles Times reported late Saturday.

        • Analysis: As Fossil Fuel Prices Spike, Transition Off Carbon Can’t Happen Soon Enough

          From surging fuel costs in Europe and North America to rolling blackouts in China, a global spike in fossil fuel prices is raising concern that the shift off carbon could be uneven and messy—and feeding the argument that the transition can’t happen soon enough.

          Europe has seen a record-high increase in natural gas prices, “raising concerns that consumers will be hit hard by high energy bills this winter as global demand for fuel rises,” Euronews reports. In the UK, “average energy prices this past month were almost three times higher than in any other September in the past 10 years, with the average household expecting to pay nearly US$190 more this year,” Gizmodo adds. “Energy bills are set to increase even more steeply after Friday, when a price cap on bills is set to rise.”

        • Edelman’s Covert Pro-Fossil PR Work Revealed by Coding Error

          Only a few years after vowing to no longer act in the service of climate deniers, global PR behemoth Edelman has been caught in the act of doing just that. 

          Edelman’s stealth involvement in ExxonMobil’s year-long Facebook offensive against the Biden administration’s promise to get tough on carbon pollution has been revealed, courtesy of a coding error, reports Gizmodo. The error was uncovered by the watchdog Clean Creatives during its investigation of Exxchange, a web platform through which Exxon distributes its ads. 

        • Global Coal Plant Projects Down 76% Since 2015

          The global pipeline of new coal plant projects has shrunk 76% since 2015, a new analysis shows, putting many countries in a good position to carry out UN Secretary General António Guterres’s call for no new coal investment.

          “The economics of coal have become increasingly uncompetitive in comparison to renewable energy, while the risk of stranded assets has increased. Governments can now act with confidence to commit to ‘no new coal’,” reports climate think tank E3G in its analysis.

    • Finance

      • Pandora Papers: ‘Biggest-Ever’ Bombshell Leak Exposes Financial Secrets of the Super-Rich

        In what’s being called the “biggest-ever leak of offshore data,” a cache of nearly 12 million documents published Sunday laid bare the hidden wealth, secret dealings, and corruption of hundreds of world leaders, billionaires, public officials, celebrities, and others.

        The bombshell revelations—known as the Pandora Papers—were published by the International Consortium of Investigative Journalists (ICIJ) and include private emails, secret contracts, and other records obtained during a two-year investigation involving more than 600 journalists in 117 countries and territories.

      • Harvard and Other Schools Make a Choice on Fossil Fuels

        This month, the University of Minnesota, Boston University and Harvard, our own institution, announced that they’ll divest from the fossil fuel industry.

        These decisions are the latest wins for both the planet and for activism against the industry most responsible for the climate crisis. The three universities join over 1,300 schools and institutions — including foundations, pension funds, institutional investors and others — that have divested or announced plans to divest, at least in part, from fossil fuels. In doing so, they have affirmed that continued investment in fossil fuels is neither financially responsible nor morally defensible.

    • AstroTurf/Lobbying/Politics

    • Censorship/Free Speech

      • China Censors Every Digital Trace of Megastar Actress

        According to a report from the American Enterprise Institute, the Chinese Communist Party (CCP) oversees a slew of organizations dedicated to the censorship of various media in the People’s Republic of China. These include such divisions as the State Administration of Radio, Film, and Television as well as the Central Propaganda Department.

        One of the most remarkable examples of the government-led censorship witnessed in the country is in the irrelevant and convoluted search engine results pertaining to the Tiananmen Square Massacre of 1989.

      • How Chinese censorship reached Hollywood

        According to a government report last February, cited by Variety, there are currently more than 75,000 halls in China, of which nearly 20,000 were built between 2018 and 2019 and more than 5,700 built in 2020, despite the effects of the coronavirus pandemic. To give the idea, in the first weekend of its release in China, last May, Fast & Furious 9 it grossed the equivalent of $ 136 million (€ 115 million), nearly double the amount in the United States over the same period.

        Although China has created its own franchises in recent years and has become less and less dependent on American cinema, films produced and shot in the United States have continued to be highly viewed. For this reason, foreign film studios have begun to pay more and more attention to avoid content at risk of censorship: “they censor themselves in advance,” wrote James Tager, director of the NGO PEN America, which deals with freedom of expression in the media and published a extensive report on censorship in Chinese cinema.

      • China, Hollywood and the censorship debate

        The global economic centre of gravity is moving towards Asia, signaling the fast-paced consolidation of a China-led economic order. The most populous country in the world relies on its geo-economic preeminence to acquire geopolitical concessions from rivals and friends alike. And Hollywood is no exception to that.

        It took a lot of people by surprise when the professional wrestler turned movie star John Cena profusely apologized after calling Taiwan a country. “I made one mistake. I am very, very sorry for this mistake, my apologies,” he said in Mandarin. The apology came after the actor had provoked the wrath of mainland Chinese fans by inadvertently challenging China’s three Ts — Taiwan, Tibet, and Tiananmen — subject matters that are best left unaddressed if you wish to stay in the Chinese Communist Party’s good graces.

      • Why Marvel’s ‘Shang-Chi’ may not be released in China and what it means for Hollywood’s future

        Aynne Kokas, a media studies professor at the University of Virginia and the author of the book “Hollywood Made in China,” told Insider that the “Shang-Chi” controversy is happening “in parallel with widespread tightening” of China media and its film market.

      • Lars Vilks: Muhammad cartoonist killed in traffic collision – media reports

        Vilks, 75, lived under police protection after being subjected to death threats over the cartoon.

      • Book Review: Free Speech and Why You Should Give a Damn

        Censorship fixes the fight and provides a controlled habitat (of course, whatever the habitat the censor is comfortable with). If ideas are at their best when tested, evolved, and developed – so too our shared collective thought. And it’s not just that potentially good ideas are gagged, but the open market of idea exchange itself. Instead of rational deliberation where all are allowed to express their views – it removes the debate and our collective intellectual rigor. When the censors gags the opposing viewpoint, their motivations are now in question. Aren’t their ideas good enough to stand on their own merits?

    • Civil Rights/Policing

      • Opinion | 50 Years Later, Finally Justice for Brazil’s Indigenous Krenak People

        Half a century after Indigenous elder Jacó Krenak and dozens of fellow natives were bound and forcibly taken to concentration camps run by Brazil’s military dictatorship, a federal court has ordered the government to apologize and deliver reparations to the Krenak people.

      • If You Work in the U.S., You Don’t Know How Bad You Have It

        For example, most United Statesians remain blithely unaware that they have among the worst health care outcomes of any advanced capitalist country while paying by far the most money. A Commonwealth Fund report, for example, found that the U.S. “placed last among 16 high-income, industrialized nations when it comes to deaths that could potentially have been prevented by timely access to effective health care.” As one of the few countries on Earth without a national health care system, health care is a commodity for those who can afford it, not a right as it is almost anyplace else.

        To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.

      • This Abortion Fund Is at the Front Lines of the Struggle for Access in Texas
      • Tens of Thousands March Across US in Defense of Abortion Rights
      • Reconciliation Demands Just Transition for Indigenous Peoples: Thomas-Müller

        With a federal consultation into a Canadian just transition act now under way, a prominent Indigenous activist is challenging the Trudeau government to ensure the legislation doesn’t end up as little more than empty words. 

        “If Canada is to do what it takes to tackle both the violence of colonization against Indigenous Peoples along with the climate emergency, we need to fundamentally change our economy,” writes Clayton Thomas-Müller, a senior campaign specialist at 350.org and member of Pukatawagan Cree Nation, in a September 30 op-ed for the Globe and Mail.

      • Data Leak Reveals at Least 2 NYPD Officers Have Links to the Oath Keepers
      • Opinion | Britney Spears Conservatorship Shows How ‘Long Shadow of Eugenics’ Harms Disabled Women

        Britney Spears has been locked in a court battle 13 years in the making. While her father was suspended as conservator of her estate on September 29, 2021, her conservatorship might not be terminated until the next hearing on November 12.

      • Guns, Germs, and Steel is a Powerful Anti-Racist Book. So Why Doesn’t the Left Love It?

        Spurred perhaps by discussion and criticism of this conclusion, Diamond went on, six years later, to publish his best-known book, Guns, Germs, and Steel. It set out to explain in vivid detail, region by region, and era by era, how some branches of humanity came to dominate and even eradicate others. This was an ambitious undertaking, and one that would inevitably clash with established ideologies and political interests. Perhaps most significantly, it provided a scientific rebuttal of white supremacist beliefs—one that had previously been missing from the debate on race. In the introduction, Diamond writes of racist theories of history: “The objection to such explanations is not just that they are loathsome, but they are wrong.”

        On this basis alone, one might have expected the Left to have embraced the book; but in making its case, GGS steps on too many ideological toes. Where one encounters scepticism and hostility towards GGS or Diamond himself, it tends to come from people on the Left, rather than from white nationalists. By the time of the book’s publication, white nationalism had already retreated into the fringes. But it was not replaced by a new regard for scientific curiosity, but by dogmatic social science theories about “power” and “privilege,” built on a new set of mythologies, just as hostile to science as the old ones, and written from a thoroughly American perspective.

    • Digital Restrictions (DRM)

      • The Road Towards A Free Ebook Reader

        Yet even when you have a free ebook reader in your hands, you will still need to be vigilant about your freedom. Many ebooks on the market are laden with Digital Restrictions Management (DRM), which prevents you from exercising the freedom to read and share the books you buy and own. Consenting to the DRM that many ebooks are distributed with is a sure way to lose control of your digital autonomy, no matter what kind of device you have. Despite the Internet giving us the means to share textbooks or works of literature seamlessly and without cost, publishing companies still operate under old assumptions, meaning that libraries and storefronts alike ignore the “solved problem of lending” and distribute books under restrictive terms.

        Despite the technology behind ebooks having been with us for years, ebook DRM has only gotten more restrictive. It’s common for textbooks to now require a constant and uninterrupted Internet connection, and that they load only a discrete number of pages at a time. Such requirements, especially when placed on students in the global south, where connections aren’t as reliable, directly detract from the quality of their education. This is what motivated our decision to make textbook DRM (and one of its top peddlers, Pearson) our target for the International Day Against DRM (IDAD) in 2019. And though the pandemic may have prevented people from meeting, DRM was undeterred. Even libraries fell victim to “lending” services like Kanopy, putting an artificial lock on digital copies of books, the last place it makes sense for them to be.

    • Monopolies

      • Patents

        • CVC Files Reply to ToolGen’s Opposition to CVC Preliminary Motion No. 3 [Ed: It's a waste of any court's time to even debate whether patent monopolies should cover life and nature as if these were human "inventions" that merit patents]

          On May 20th, Junior Party the University of California, Berkeley; the University of Vienna; and Emmanuelle Charpentier (collectively, “CVC”) filed its Substantive Preliminary Motion No. 3 in Interference No. 106,127 (which names ToolGen as Senior Party), asking the Patent Trial and Appeal Board to add claims in ToolGen’s U.S. Patent No. 10,851,380* to this interference, pursuant to 37 C.F.R. §§ 41.121(a)(1)(i) and 41.208(a)(2) and Standing Order ¶ 208.3.2. On July 5th ToolGen filed its Opposition. On August 27th, CVC filed its Reply.

          In its Motion No. 3, CVC argued that the only difference between the language of the Count and the claims in the ’380 patent is that those claims require the addition of two guanine residues (“GG”) positioned before the crRNA portion of the sgRNA sequence. CVC argued that these species of sgRNA (the fusion of crRNA and tracrRNA) recited in the ’380 patent claims were solely a consequence of using the T7 phage RNA polymerase to produce sgRNA, and that in vitro RNA production using T7 RNAP promoters was well-known in the art (“for decades”; emphasis in brief) at the priority date of the ’380 patent; these arguments are supported by testimony from CVC’s expert, Dr. Scott Bailey and this method of producing sgRNA and relevant prior art disclosing the use of T7 RNAP and promoters recognized by the polymerase was set forth in the brief.

        • IPO Behind the IDEA Series Webinar [Ed: The Intellectual Property [sic] Owners [sic] Association (IPO), a front group for patent maximalism and software patents for racist IBM (really malicious entity, attacking the poor), pretends to care for Hispanics. Well, it’s what some call “virtue-signalling” and it’s very shallow in this case.]
        • Webinar on Patenting Green Technologies [Ed: Just more greenwashing of patent monopolies now by J A Kemp, talking about "greentech' (buzzwords)]
        • [Older] EU leaders blindsided on Biden proposal to suspend patents on COVID-19 vaccines, as industry reacts in anger [Ed: Notice how corrupt media, or EPO mouthpiece Science Business, attacked Biden for doing the right thing about vaccine equity]
        • Ratify new EU patent court or risk losing out on foreign investment billions, Ibec urges Government [Ed: This is a villainous lie interjected by lobbyists. UPC is already dead, but they’re desperate to pretend otherwise.]

          The business lobby group says the decision is even more pressing as a global corporate tax deal looms into view.

        • Software Patents

          • Focus On Software Patents & Copyright

            First, of all, the concept of software patents has been around for a long time (even since the 1960s), but the debate on the patentability of software became widespread when the Free Software Foundation was founded in the 1980s. While the FSF does not take a position on the impact of patents in other spheres, we consider them to be both unethical and counterproductive in the field of software. One of the most worrying effects of software patents is the way they prevent new software from being written, yet even if this weren’t the case, software patents would still be an inherently unethical restriction on individual freedom. Even in the 1980s, it was clear that the magnitude of the problem was such that Richard Stallman founded the (now defunct) League for Programming Freedom in 1989, an organization aiming to ally all developers (including those of proprietary software) against software patents.

            Today, few people are aware of the dangers behind software patents, and how the world is affected by them. To give a quick overview, in the US, patents are handled by the federal courts, while Europe has different, independent national laws on patents. Recently, however, the adoption of the Unitary Patent and the Unitary Patent Court are bound to replace regulations of individual EU member states with ones that are valid for the entirety of the EU, making (software) patent enforcement in Europe drastically easier. Globally, each country has unique patent laws and the patentability of software may differ considerably. But the general picture is that software patents are continuously granted.

            It is crucial to emphasize that software patents are enforced without ever going through a process of direct approval by the public. In 2002, a proposal was made to legitimize software patents in the EU, but it was defeated in the European Parliament by an overwhelming majority of 648 to 14 votes, thanks in part to a massive effort by the free software movement and its allies. The success of that campaign demonstrated that people are able to change the course of proposed life-affecting policies, provided that they are included in the process, and properly informed. Unfortunately, the course of events both then and now also proves that democracy requires the utmost vigilance, and any period of relaxation works against the will of the people. Despite the defeat of the software patent directive in 2002, the software industry has successfully pushed for new policies that will favor it. This is where the aforementioned Unitary Patent and Unified Patent Court come into play, since it is well known that the European Patent Office has a vested interest in expanding patent dominance in all fields, particularly in the software sector.

      • Trademarks

        • ASĀVA v. RAMPUR ASAWA: Bombay HC Sets the Record Straight on Deceptive Similarity

          A few months back, a Single Judge bench of the Bombay High Court delivered what has now been revealed to be a very problematic decision on deceptive similarity in alcoholic beverage trademarks. Brought to light upon being set aside by the Division Bench, this decision rendered findings that threatened to set dangerous precedents on what constitutes a trademark, and how deceptive similarity is evaluated. In this post, I revisit the Single Judge’s ruling and underscore the ways in which the Division Bench corrects the approach.


          When a defendant in an infringement suit applies for registration of the contested mark, it is deemed to be an acknowledgement of similarity and thus operates as estoppel. On this basis, the Defendant had argued that the reverse of this would also be true and the Plaintiff’s attempt to separately register the mark used by the Defendant amounts to admission of dissimilarity between the marks.

          Thoroughly unimpressed, the Division Bench cautioned that in the absence of any legal precedent or statutory provision, the converse of a statement could not be automatically accepted by substituting completely opposing concepts. It also refused to accept that because it was the Defendant who brought certain facts on record in the defence, the Plaintiff was guilty of suppressing facts.

          With this, the Division Bench set aside the Single Judge’s decision and remanded the matter back for reconsideration.

          While this appellate stage analysis did not bring about a conclusion to the interim application, it goes a long way in clarifying important principles in trademark infringement litigation. A common theme in all the issues is that it focuses on the various tests from the perspective of actual impact on consumers who would interact with the products in the market. While it remains to be seen what the outcome of the infringement suit would be, the Division Bench has cleared the air on what the adjudicating court must inquire into while deciding the case.

        • Around the IP Blogs

          SpicyIP reviewed a ruling from the Bombay High Court concerning the deceptive similarity between signs. The case at hand dealt with the names ‘ASĀVA’ and ‘RAMPUR ASĀVA’ in connection with whiskey, in light of an earlier trade mark, ‘THE ASWA’, registered under Class 33 for alcoholic beverages. The blog questioned the judge’s decision to rely solely on a phonetic comparison of signs, and to apply an Australian precedent directly to an Indian judicial proceeding.


          In the recent case of iCollege (Pty) Ltd (iCollege) v Excellence Skills Development and Mentoring (Expertease Skills) and ZA Central Registry NPC (Domain Name Registry), iCollege (Pty) Ltd sued Expertease Skills for trade mark infringement and passing off for their use of the mark ICOLLEGE, and requested the transfer of the domain name icollege.co.za from the Domain Name Registry. The citation of the Domain Name Registry is a mechanism for enforcement of the judgment, and they did not take part in proceedings.

          It is apparent from the decision that the High Court, in dismissing the claim, has still not got to grips with the proper application of the trade mark infringement tests, and this post will focus on these errors and omissions and once again appeal to the court and legal practitioners to adopt and follow the step-by-step approach used in Europe (see earlier posts here, here and here) as it will help reduce errors in application. The majority of the decision surrounds the trade mark infringement claim under S34(1)(a) and so this post focuses on that.

        • Timbs: Iconic Enough for Trademark Protection? [Ed: Did Timberland 'invent' the boot?]

          I previously wrote about the TTAB decision denying TBL’s attempt to register the shape of its Timberland Boots as a protectable trade mark. Crouch, Iconic Timberland Boots–Trade Dress Worthy? Now, the company has filed a civil action in the Eastern District of Virginia seeking a court order that TBL is entitled to a registration.


          This is apparently the same process used in other recent trademark civil actions. Booking.com B.V. v. Matal, 278 F. Supp. 3d 891, 900 (E.D. Va. 2017) (“The parties have ‘expressly agree[d] that if the Court determines after reviewing the briefs and evidence on summary judgment that any material issue of fact exists, the Court is authorized to resolve any such factual dispute.’”); Seacret Spa Intl. v. Lee, 1:15CV405(JCC/IDD), 2016 WL 880367, at *2 (E.D. Va. Mar. 8, 2016) (“The parties have agreed that . . . the Court may resolve those disputes on the basis of the record before it.”); Autodesk, Inc. v. Lee, 1:13-CV-1464 AJT/JFA, 2014 WL 5500799, at *1 (E.D. Va. Oct. 30, 2014) (parties “stipulated that the Court should resolve any material factual disputes without any further proceeding based on the summary judgment record.”).

        • Chile and the adherence to the Madrid Protocol – What can we expect [Ed: The subjugation through so-called 'IP', a neo-colonialist instrument that inevitably (by its desigh) makes the rich even richer and calls the poor "pirates"]

          A couple of months ago, the Chamber of Deputies & the Senate approved the adherence of Chile to the Agreement of the Madrid Protocol for the International Registration of Trade marks, which is expected to be in force in March of the next year 2022 (since the deposit of the instrument before the World Intellectual Property Organization WIPO should take place on January of 2022).

          With this adherence, Chile will be part of a small group of Latin American countries that have already implemented the System, such as Colombia (2012), Mexico (2013), and more recently Brazil (2019).

          In this context, it is important to analyze what can we expect for Chile with the incorporation of this System, and what could be the legal, social and economic implications, the advantages and challenges that this may represent for our country, which are closely related to the definition of public policies that Chile wishes to adopt.

        • Swiss Supreme Court invalidates the Nespresso Capsule 3D Mark

          Coffee capsules have turned out to be a revolution for how coffee is served in millions of homes … and also for case law on 3D trade marks. In a decision that has just been published (available here in French), the Swiss Federal Supreme Court invalidated the 3D mark of Nestlé’s related to the shape of the capsules. The decision echoes one by the German Federal Court of Justice given a few years ago (Katpost here).

          In the 1970s, Nestlé invented a hermetically-sealed capsule containing a dose of ground coffee, and a “Nespresso” coffee machine in which to insert the capsule. Nestlé had received several patents for various aspects of the machines and the capsules (all of which had expired by this point). The shape of the capsule compartment has changed over time, but the technology has essentially remained the same.

          Nestlé has become the largest supplier of single-serve coffee in Switzerland – and no doubt in many other countries. In 2000, Nestlé filed an application with the Swiss Trademark Office for registration of a 3D trade mark in class 30 for coffee, coffee extracts and coffee preparations. The Office registered the mark based on acquired distinctiveness.

          The respondent and counterplaintiff, Ethical Coffee Company, developed a biodegradable coffee capsule (based on vegetable fibers and starch) compatible with the Nespresso system.

          In 2011, Nestlé secured a preliminary injunction in Switzerland, based on its registered 3D mark, against Ethical Coffee Company’s capsules. This decision was eventually overturned by the Federal Supreme Court on procedural grounds and the lower court, in a second decision, rejected the request for preliminary injunction on the grounds that the shape of the capsule was technically necessary.

      • Copyrights

        • [Old] My Copy of The Times

          In days or yore, I would have spoken of ‘my copy of The Times.’ After all, it is a hard copy, I paid for it and I can port it around. It is, for all intents and purposes ‘mine.’ But in the digital age it isn’t ‘my copy,’ rather it is my temporary access so long as the subscription lasts.

          Of course, in the era of ‘my copy’ there was not assertion to a copy(right), much less copy(left), over the printed work. Just the joy that it was ‘mine’ to possess for as long the ink remained indelible.

        • Dynamic Blocking Injunctions – Lessons for the Egyptian Copyright Legislator

          The growing proclivity of issuing “dynamic injunctions” to block the online illegal diffusion and distribution of audio-visual copyrighted content has recently caught the attention of several scholars (see here, here and here). In fact, the preventive nature of the rights involved, the need to preclude imminent damage, and the fact that most IP addresses targeted by blocking injunctions are univocally dedicated to this type of illicit activity, has led to the issuance of ex parte blocking injunctions. In layman’s terms, these are issued without the participation of the respondent to the case. This is due to the fact that courts are often faced with situations in which delays could cause irreparable damage to the right for which protection is sought. Over the years this novel practice has given rise to “live”, “fast” and even “super” injunctions in various jurisdictions. The majority of these focus on the protection of major sports events, like the Italian Lega Calcio, the English Premier League and the UEFA Champions League (for a detailed analysis see here, here and here). Unsurprisingly, the rise of dynamic injunctions in that particular sector is largely due to the mammoth profits that these events yield for right holders.


          The Egyptian Copyright legislator addresses the issue of injunctive relief in the body of the Egyptian copyright law (ECL – law no. 82 of 2002) itself. By virtue of article 179 of the latter, any interested party, not only right holders, can request provisional and conservatory measures to put an end to any sort of infringement. Upon such request, and if deemed both urgent and necessary, the competent court possesses a wide range of non-exhaustive measures, including but not limited to the “suspension of production, exhibition, publication or reproduction of the work, performance, sound recording or broadcast program” (art. 179(2) ECL) and the seizure “of the original and infringing copies and any material used in republication or reproduction provided that such material can be used only for such republication” (art. 179(3) ECL). In any case, the plaintiff must deposit an adequate financial guarantee with the competent court, following which the latter issues its order within twenty-four hours. The competent court may also designate an expert to assist the bailiff in charge of the execution of any ordered measures.

        • Italian Broadcaster Uses Forensic Watermarks to Track Down Online Pirates

          Italian public broadcaster RAI will use the NexGuard watermarking technology to secure its content. The company is the first free-to-air broadcaster to implement NAGRA’s anti-piracy technology, which makes it possible to trace the source of online piracy so rightsholders can take appropriate action in response.

        • The 50 Greatest Singles: an Exercise in the Absurd

          What is a “single”, anyway? A long extinct 45? A song that charted? Something you first heard on the radio? A song that stays floating in the stream, long after it was released?  For me a single is a hit. Not in terms of sales, but a song that hits the gut. A singular experience. A song I heard a fragment of for the first time, probably on the radio or on Soul Train, and immediately wanted to hear again, rushed to track down in Obadiah’s head shop/record store on Meridian Street in 70s Indianapolis or Olsson’s Books and Records on Wisconsin Ave. in 80s Georgetown or Music Millennium on East Burnside in 90s Portland. A song with punch, that echoes in the head. A song you never forget, never tire of hearing again. A song that changed you in ways small and profound. A song that consoled you, made you want to screw or go out and smash something. To read this article, log in here or Subscribe here. In order to read CP+ articles, your web browser must be set to accept cookies.


IRC Proceedings: Thursday, September 30, 2021

Posted in Site News at 2:53 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 Qmd9ygn4gGEK7rTg8GZft7VHcYfkMJcEnPCXzhxipKxPh7 IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 Qmf8okkFW8ybyX61qSZi9pbQFb8UdyLxdNk1P9NXrb4sB3 IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmecFeoDDPtHJD7HYMkMzyCmWv9ixiB9kxFK8iaWZuWMsP IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmWExioLPiQ8iVYroH7HwaL7tEni4Mpr3HTWbTH4oQFi6p IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmZt8ZTaKy2TJeuLT7Gz3krB9FtkUAfM6Dsa7Mrhck3WKF IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmUWhsMaDi7Y4zNZYmALtj7167guEnrAWbZN44Vrs7Dv1L IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmZgMVVVp4zC9XoGgC9BYobrrRYQZNkyFV5tVaZBiDF1Mo IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmeAFyt44V5vahpGxwEogEbJMozJ9rdU1BmE7h5aSxU6YK IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmRXKRPosZ7Bz2MggcSzikrb6U91AxeDNghC3nQk4eD4fh


IRC Proceedings: Wednesday, September 29, 2021

Posted in Site News at 2:03 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmTT3cFkv2y2Di5qvSEFpun8gswpsnYBuVwjmBc8J5QK69 IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 Qmb4aFFUxg91HwZ9vRweB4nQ2afKZ1EDCaChFeXa4XZpxk IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmSvC3ZzgMcstCo3UCwkZUQiUvSLqgeAcC3raGm81hedN8 IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmQ5RriMrMBUKSfJuYo6d5vRCqkNUxFoPGRjvSG8eXsyBR IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 Qme2v1Zu7n8tGYYuwF1ekM6QRzf7D4EMWm84mUmzdWUyro IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmcW13pgPHedLpeaeuABGojRGcidmVi5csD1X9kAiiYXoi IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmVCSg3kjPQRiuTUhgRGti87z8HW9zamT2EtgnjSR9QT5U IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmSwKmEHeNo4FZYqAcPVcgwyZNTkJ9X3QQiC79pvkff1AU IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmSjHyfej3iKcBfRyB2EGPkqcfwQ3z51X2Qz89CbQ1D5GX


2021: The Year of Gemini on the Internet (From Around 500 Known Capsules to 2,000 or More, With Over 3 Months Left)

Posted in Site News at 6:19 am by Dr. Roy Schestowitz

Along with or along the lines of “Linux on the desktop” (PC Magazine claims 2021 Is the Year of Linux on the Desktop)

Gemini Lupa
Gemini Lupa stats as OpenDocument Format (ODF)

Summary: We’ve decided to chart or produce a graph with some of the publicly-available numbers from Lupa, the Gemini protocol spider of Stéphane Bortzmeyer (bortzmeyer.org)

THE investment we’ve put into Gemini paid off; more so than IPFS for reasons that we explained yesterday.

The numbers shown in the graph (and spreadsheet) above are not complete, but they’re the closest approximation we currently have because Geminispace (or Gemini space) is not centralised. The raw data comes from past stats and present stats. These do stress upfront: “There are several reasons why many URIs are not in the database: * the capsule may forbid retrieval, through robots.txt, * we do not know all the URIs and some cannot be found from the ones we know [...] 1186 (87.1 %) capsules are self-signed, 139 (10.2 %) use the Certificate Authority Let’s Encrypt, 37 (2.7 %) are signed by another CA (may be not a trusted one).”

CAs are part of the centralisation trap we’ve often spoken about. Web browsers actively encourage this centralisation if not monopolisation by issuing exceptionally nasty warnings to people (if not outright blocking access).

Here is what the monthly reports say or said.

Today (29th of September): “There are 1679 capsules. We successfully connected recently to 1362 of them.”

Start of September: “There are 1538 capsules. We successfully connected recently to 1289 of them.”

Start of August: “There are 1503 capsules. We successfully connected recently to 1210 of them.”

Start of July: “There are 1342 capsules. We successfully connected recently to 1149 of them.”

Start of June: “There are 1263 capsules. We successfully connected recently to 1062 of them.”

Start of May: “There are 1093 capsules. We successfully connected recently to 926 of them.”

Start of April: “There are 1028 capsules. We successfully connected recently to 850 of them.”

Start of March: “There are 825 capsules. We successfully connected recently to 712 of them.”

Start of February: “There are 606 capsules. We successfully connected recently to 519 of them.”

Start of January: “There are 531 capsules. We successfully connected to 441 of them.”

December 22nd: “There are 506 capsules. We successfully connected to 415 of them.”

We’ve been feeling this phenomenal growth ourselves, as traffic doubles every 2 months or so. In the month of September: (so far)

  21236 requests on September 1                  
  20951 requests on September 2                  
   8955 requests on September 3                  
   8087 requests on September 4                  
   7986 requests on September 5                  
   8876 requests on September 6                  
  29780 requests on September 7                  
  41844 requests on September 8                  
   8853 requests on September 9                  
   9048 requests on September 10                  
   9206 requests on September 11
  10052 requests on September 12                  
  13739 requests on September 13                  
   9981 requests on September 14 
  12974 requests on September 15                  
  10816 requests on September 16                  
  10497 requests on September 17 
  10056 requests on September 18                  
  12172 requests on September 19                  
  11829 requests on September 20                  
   8993 requests on September 21                  
  20090 requests on September 22                  
  11978 requests on September 23                  
  10986 requests on September 24 
  10649 requests on September 25                  
  15293 requests on September 26                  
  14994 requests on September 27                  
  13672 requests on September 28   

That’s about 13.8k page requests per day (0.16 per second) or more than double what we got last month. Most accessed URLs for the given day (or a prior day) can be seen here. Over the Web we average about 4.7 per second, i.e. 34 times higher than the above rate. But currently a lot more people use the Web than Gemini; that can change in the more distant future.

IRC Proceedings: Tuesday, September 28, 2021

Posted in Site News at 3:36 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmRt7RH5hXRP5T7J9DE1zD9TCHKyKVUKtTrvCmgKHTHSsQ IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmZGkBKaZv5oYmf4dnGVjKat9yrP2ej1mb2rAuyNMQ64XR IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmS811ARk5dAGQuzLFSJBBRpRSMGpXU6Qd9RQv5k1b7znZ IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmYqGN2gPtWJb9AtzXA3DbNBzoiSx1B8Lr7XXZ61TjG4oC IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmceB7KqW5XneysYfbtRDMCq9hkapCBGQwM4ws6TGgqvLG IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmRLWWsrGhnHWPXzcoStvtUJYjzWDbdYYXK8muugzE8Gze IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmYQ9mf2Va6YzCkj3BuXUJigs4V4hq7rrNxy8xT7gRN9uY IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmU6nTC3Cm1UyXUa3danhvipt4LvmqHL5XTQydZQk39HYc IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmZjNRnDnEWPhNuhKXBvuyovU32qnjESR1UG1T8emS6oy2

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts