Chromebooks are not for everyone, but for many home users, it is absolute perfection. If you live in the web browser -- as many people do nowadays -- laptops running Google's Linux-based Chrome OS are a godsend because they are maintenance free. No need for confusing OS upgrades or anti-virus software. It just works, and it works well. Since they can now run Android apps too, they could become a serious threat to Microsoft and Windows 10.
One of the most attractive aspects of Chromebooks is price -- they are often quite affordable. Today, Acer refreshes its 15.6 inch Chromebook 15 with a mind-boggling 12 hours of battery life. Best of all? It starts at $199. Yes, this model will get Android app support in a future update too.
Angel filed appeal after appeal only to be denied on every attempt. Texas is an "at will" employment state so being terminated for cause can mean anything. Over the next few weeks, Angel became more and more fearful of losing her house, as she had just purchased it a year before. On top of that, her HP desktop had taken a nose dive into severe brokeness and that made it extra difficult for her to look for work. I put together a decent desktop for her and installed it that day, and yes...it was a Linux computer.
Angel didn't have even the slightest problem with the new machine, and she wasn't particularly good at using one. So, let's put another slash in the falsehood that Linux is too hard for the everyday user. Most of them anyway. YMMV.
To her glee, the OS picked up and configured her Epson all in one without her lifting a finger to do so. She almost clapped for happiness, stating that in Windows, installing that printer had been a nightmare, even with the included driver CD. And just to pinpoint the time frame for you, it was the summer of 2006.
the quicker releases, I'll be away tomorrow and as they seem to have passed all of the normal testing, I figured it would be better to get them out earlier instead of later. And I like releasing stuff on this date every year...
All users of the 4.8 kernel series must upgrade.
The updated 4.8.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.8.y and can be browsed at the normal kernel.org git web browser: http://git.kernel.org/?p=linux/kernel/git/stable/linux-st...
One major criticism on private Blockchain development initiatives led by banks and financial institutions has been the ambiguity in the coding language and structure of permissioned ledgers. The R3 Consortium is attempting to neutralize it by open sourcing its technology.
R3 Corda, a private Blockchain platform specifically developed for financial establishments with massive transactional volumes by R3CEV, is officially rendered open source by the consortium after over 70 of its member financial institutions came to a consensus in setting a standard for the Blockchain technology.
Following a weekend of solution seeking, collaboration and competition, the highlight of the Hackenergy 2016 event was a blockchain-fueled peer-to-peer (P2P) energy trading system called EcoCoin, which grabbed top honors.
Linux 4.9 skips needing the perf.data file entirely, and its associated overheads. I wrote about this as a missing BPF feature in March. It is now done.
Following EXT4 file-system encryption and F2FS per-file encryption support, the UBIFS file-system is also bringing in encryption support built off this fscrypto framework used by EXT4/F2FS.
In making use of fscrypto, the UBIFS file-system encryption support is similar to the EXT4/F2FS implementations and supports not only encrypting the file contents but also the file name. In making use of this framework, it only took around one thousand lines of new code to make it happen from the kernel-side while the user-space changes for supporting UBIFS encryption are still baking. UBIFS for those out of the look is the Unsorted Block Image File-System that's built atop UBI and designed for raw flash memory media.
We reported the other day that an ancient bug, which existed in the Linux kernel since 2005, was patched in several recent updates, namely Linux kernel 4.8.3, Linux kernel 4.7.9, and Linux kernel 4.4.26 LTS.
One day later, the maintainers of other supported Linux kernel branches patched the bug, which is dubbed by researchers as "Dirty COW" and documented as CVE-2016-5195. As such, today we'd like to inform those of running GNU/Linux distributions powered by kernels from the Linux 3.16, 3.12, 3.10, and 3.2 series that new updates are available for their systems.
It's getting close now to the point where it can replace BFS in -ck releases. Thanks to the many people testing and reporting back, some other misbehaviours were discovered and their associated fixes have been committed.
Linux Raid is the de-facto way for decades in the linux-world on how to create and use a software raid. RAID stands for: Redundant Array of Independent Disks. Some people use the I for inexpensive disks, I guess that works too!
LWN's traditional development statistics article for the 4.6 development cycle ended with a statement that the process was running smoothly and that there were no process scalability issues in sight. Wolfram Sang started his 2016 LinuxCon Europe talk by taking issue with that claim. He thinks that there are indeed scalability problems in the kernel's development process. A look at his argument is of interest, especially when contrasted with another recent talk on maintainer scalability.
The original Prime Indicator hasn't been updated since February, 2015. André Brait forked the indicator (while also using code from the Linux Mint version), improving it with both new functionality and bug fixes, and the new app is called Prime Indicator Plus.
Using the nvidia-prime package, Ubuntu users can switch between Intel and Nvidia graphics by using Nvidia Settings (under PRIME Profiles), which then requires restarting the session (logout/login) to apply the changes. Prime Indicator makes this easier, by allowing you to switch graphics from the indicator menu, including triggering the logout.
While Mesa 13.0 is coming along for release next month with exciting features like OpenGL 4.5 for Intel, unofficial GL 4.4/4.5 for RadeonSI/NVC0, and the addition of the RADV Radeon Vulkan driver, there is some functionality that sadly won't be found in this release.
Below are some features/functionality not currently found in Mesa 13.0. Some of the mentioned items have patches floating on the mailing list that weren't merged in time while other items are more along the lines of pipe-dreams that would have been fun to see in Mesa for 2016.
i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client.
I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.
I2P client is a software used for building and using anonymous I2P networks. Such networks are commonly used for anonymous peer-to-peer applications (filesharing, cryptocurrencies) and anonymous client-server applications (websites, instant messengers, chat-servers).
I2P allows people from all around the world to communicate and share information without restrictions.
A review of Pixeluvo, a great photo editor available on Linux and Windows. Pixeluvo is not free or open source.
I’ve always been someone who’s liked art and programming. Especially combining the two. One of my favorite genres is pixel art, or sprites as they are also known. I’ve dabbled in making a few other art programs before, but nothing like this.
Originally Blit supposed to be only a sprite animation tool that had a modern look and feel, but my ideas for it grew greater (*sigh* feature creep). There are many other sprinting tools out there like GrafX2, Aseprite, (and other 2D animation programs like TVPaint). I’m not saying that it’s wrong that they make their own GUI toolkit, but it feels kind of odd. I really wanted to bring these types of programs out of the days of the Amiga. After doing some initial research, I settled on using Qt.
In two weeks time, on Wednesday November 2nd, we will release curl and libcurl 7.51.0 unless something earth shattering happens.
WMail is a free, open source desktop client for Gmail and Google Inbox, available for Linux, Windows, and Mac.
Yahoo retired its old Messenger protocol in favor of a new one, breaking compatibility with third-party applications, such as Pidgin, Empathy, and so on.
Eion Robb, the SkypeWeb and Hangouts developer, has created a replacement Yahoo prpl plugin, called FunYahoo++, that works with the new Yahoo Messenger protocol.
Note that I tested the plugin with Pidgin, but it should work with other instant messaging applications that support libpurple, like BitlBee or Empathy.
The latest GCC 7 development code has an optimization pass now for loop splitting.
Friday's GCC 7 status report indicates the feature freeze is coming up in just a few weeks.
Red Hat developer Jakub Jelinek wrote in the latest status report, "Trunk which will eventually become GCC 7 is still in Stage 1 but its end is near and we are planning to transition into Stage 3 starting Nov 13th end of day time zone of your choice. This means it is time to get things you want to have in GCC 7 finalized and reviewed. As usual there may be exceptions to late reviewed features but don't count on that. Likewise target specific features can sneak in during Stage 3 if maintainers ok them."
GNU Parallel 20161022 ('Matthew') [stable] has been released. It is available for download at: http://ftpmirror.gnu.org/parallel/
No new functionality was introduced so this is a good candidate for a stable release.
GNU Health 3.0.4 patchset has been released !
I am pleased to announce the release of guile-ncurses 2.0
guile-ncurses is a library for the creation of text user interfaces in the GNU Guile dialect of the Scheme programming language. It is a wrapper to the ncurses TUI library. It contains some basic text display and keyboard and mouse input functionality, as well as a menu widget and a form widget. It also has lower level terminfo and termios functionality.
Unifont 9.0.03 is released. The main changes are the addition of the Pikto and Tonal ConScript Unicode Registry scripts.
In today’s Internet we see an increasing deployment of middleboxes. While middleboxes provide in-network functionality that is necessary to keep networks manageable and economically viable, any packet mangling — whether essential for the needed functionality or accidental as an unwanted side effect — makes it more and more difficult to deploy new protocols or extensions of existing protocols.
For the evolution of the protocol stack, it is important to know which network impairments exist and potentially need to be worked around. While classical network measurement tools are often focused on absolute performance values, PATHspider performs A/B testing between two different protocols or different protocol extensions to perform controlled experiments of protocol-dependent connectivity problems as well as differential treatment.
Feral Entertainment has announced that Deus Ex: Mankind Divided will be launching on Linux in November. Feral Interactive is currently working on the Linux port of the game.
In September the game development studio announced that Deus Ex: Mankind Divided would make its way to two additional platforms: Linux and Mac. The Linux version of the game will most likely make use of OpenGL or Vulkan to power its graphics engine.
First of all, let me get one thing straight out of the way, so you know where I come from. I did not like the recent Mad Max movie. Like, not at all. Not that I mind the post apocalyptic theme. I used to like the older Mad Max’s just fine (probably the first one the best). The new one…meh. The Max character had virtually no back story (as thin as a sheet of paper) and he was just acting like a crazy person from beginning to end. The story’s premise was boring and just an excuse for endless and not so impressive action scenes. So there was nothing redeeming it. I know this is not the mainstream opinion of the movie (everyone apparently thought it was the best thing ever since sliced bread) so I can only attribute this phenomenon to either mass hysteria or simply a clear decrease in movie expectations. The Force Awakens‘ success, despite being a mediocre movie and certainly underwhelming compared to the original trilogy, certainly echoes the same trend. I guess you cannot beat nostalgia. Just tag a Millennium Falcon on and you get a free ride no matter how incoherent the story or the characters are.
Team Fortress 2 [Steam] has a big halloween update, and with it a well needed fix for the Linux version to do with textures.
KDE turned twenty recently, which seems significant in a world that seems to change so fast. Yet somehow we stay relevant, and excited to continue to build a better future.
Lydia asked recently on the KDE-Community list what we were most proud of.
Which is already great in itself! But now it's also possible to install it via the super popular Windows package manager for Windows, Chocolatey.
Last official stable release was done more than 3 years ago, it was based on Qt/KDE 4 tech, after that a few fixes got in what would be 0.4.0 but as I needed to change my priorities it was never released.
Thanks to Lukáš Tinkl it was ported to KF5, on his port he increased the version number to 0.5.0, still without a proper release distros rely on a git checkout.
As many of you know, since 2012 we organize the Lakademy, a sort of Latin American Akademy. The event brings together KDE Latin American contributors in hacking sessions to work on their projects, promo meetings to think KDE dissemination strategies in the region and other activities.
The FreeBSD packages of KDE software — the KDE 4 desktop, and soon KDE Frameworks 5 and Plasma 5 Desktop and KDE Applications — have traditionally been shipped pretty much as delivered from the upstream source. We compile, we package, and there is very little customization we do as a “distro”. The KDE 4 packages came with a default wallpaper that was a smidgen different from the one shipped with several Linux distro’s. I think Ivan Cukic did that artwork originally. For Plasma 5 Desktop, we also wanted to do a tiny bit of branding — just the default wallpaper for new users, mind.
So on the weekend I also worked on updating Qt 5.6.1 to Qt 5.6.2 on FreeBSD, which involves using new and scary tools as well. Power tools, they can be really useful, or they can take off a finger if you’re not careful. In this case it was Phabricator, which is also used in KDE — but not everywhere in KDE. For FreeBSD, the tool is used to review updates to ports (the packaging instructions), so I did an update of Qt from 5.6.1 to 5.6.2 and we handled the review through FreeBSD’s Phab. The ports infrastructure is stored in SVN, so the review is relatively straightforward: update the ports-tree checkout, apply your changes, use arc to create or update a review request. I was amazed by how painless it was — somehow I’d been frightened. Using the tool once, properly, makes a big difference in self-confidence.
The Krita 3.1 beta come with a full features and fixes. The linux version to download your krita-3.0.91-x86_64.appimage.
We’re still fixing bugs like madmen… And working on some cool new features as well, but that’s for a later release. In any case, here is the second Krita 3.1 beta! Yes, you’re reading that correctly. Originally, we had planned to use 3.0.2 as the version for this release, but there is so much news in it that it merits a bigger version bump.
I used to do install parties in order to promote the use of FEDORA and GNOME project since five years ago. As you can see more details in the Release Party FEDORA 17 for Fedora, and Linux Camp 2012, GNOME PERU 2013, GNOME PERU 2014...
With the GNOME 3.24 desktop that's currently in development the latest GNOME Shell code has support for easily letting the user launch an app on a dedicated GPU when applicable for handling NVIDIA Optimus use-cases of having integrated and discrete GPU laptops.
When a dual-GPU system is detected, a menu item will be added to opt for "Launch using Dedicated Graphics Card", per this commit. The GNOME Shell change for supporting discrete GPUs was made and when the user opts to launch on the dedicated GPU, the DRI_PRIME=1 environment variable will automatically be set for that new program/game.
Elementary OS 0.4 LOKI was released on last month 09 Sep, 2016 almost one and half year of development, after succeeds Freya which was released in April of 2015. Elementary OS 0.4 LOKI based on Ubuntu 16.04 LTS (Long Term Support).
Elementary is one of the beautiful Linux distribution based on Ubuntu LTS release with power of Pantheon flagship desktop environment. Loki is clean, elegant, polish, perfect and best designed Linux distributions for beginners, Mac & windows users, it looks similar to Mac OS.
The previous release of elementary OS Freya was downloaded more than 1.2 million times, which is the biggest achievement on FOSS as per elementary founder, Daniel Foré reports.
I’ve been using Windows since Windows 95 until the current version, Windows 10 but nn personal usage, I am not using any Windows operating system since Windows Vista. I have enough with Windows and fully switch to Ubuntu since 2010. I started with Ubuntu for a couple of releases till I fed up with it’s release cycle that i need to update distro by re-installing the it in every 6 months. Most of Linux enthusiast will advise me to stick with Long Term Support releases if I do not want to keep updating the OS. Somehow I am the person who constantly chasing for the latest software which the open source world is able to provide to the end user.
The cloud rivals both announce new telco alliances as competition in the cloud market heats up. Red Hat and Mirantis both announced large agreements this week that bring their respective OpenStack technologies to carrier partners. The news comes ahead of the OpenStack Summit that kicks off in Barcelona, Spain, on Oct. 24.
Red Hat announced on Oct. 19 that it has a new OpenStack partnership with telco provider Ericsson.
"Ericsson and Red Hat recognize that we share a common belief in using open source to transform the telecommunications industry, and we are collaborating to bring more open solutions, from OpenStack-based clouds to software-defined networking and infrastructure, to customers," Radhesh Balakrishnan, general manager of OpenStack at Red Hat, told eWEEK.
In this presentation I will introduce Flatpak and how it changes the software distribution model for Linux. In short it will explain the negatives of using packages, how Flatpak solves this, and how to create your own applications and distribute them for use with Flatpak. This presentation was given at the GNOME 3.22 release party, organized by the Beijing GNOME User Group.
The job is like many other roles called “Community Manager” or “Community Lead.” That means there is a focus on metrics and experiences. One role is to try ensure smooth forward movement of the project towards its goals. Another role is to serve as a source of information and motivation. Another role is as a liaison between the project and significant downstream and sponsoring organizations.
In Fedora, this means I help the Fedora Project Leader. I try to be the yen to his yang, the zig to his zag, or the right hand to his right elbow. In all seriousness, it means that I work on a lot of the non-engineering focused areas of the Fedora Project. While Matthew has responsibility for the project as a whole I try to think about users and contributors and be mechanics of keeping the project running smoothly.
Fedora is the fast-paced bleeding-edge distribution of Red Hat. Fedora 25 is the second release of 2016 the other being Fedora 24. Let’s discover what lies in the future of this popular Linux distribution especially among developers.
Updating a Linux distribution has historically been done from the command line (using tools like Debian's apt-get, openSUSE's zypper, or Fedora's yum—or its successor dnf). A series of crashes during system updates on Fedora 24 led Adam Williamson to post a note to fedora-devel and other mailing lists warning people away from running "dnf update" within desktop environments. It turns out that doing so has never truly been supported—though it works the vast majority of the time. The discussion around Williamson's note, however, makes it clear that the command is commonly run that way and that at least some users are quite surprised (and unhappy) that it isn't a supported option.
The Debian project can be accused of many things, but jumping too quickly on leading-edge technology is not one of them. That can be seen in, among other things, the fact that there is still not a version of the distribution that supports the UEFI secure boot mechanism. But, as Ben Hutchings explained during his 2016 Kernel Recipes talk, such support is in the works, and it will be implemented in a uniquely Debian-like manner.
Samsung has unveiled the latest details of his stunning, next-generation TV. Named SUHD Qualmark Red TV, it’s based on the proprietary technology Samsung has pioneered: QLED, long for Quantum dot Light-Emitting Diode.
According to sources from Samsung Electronics, the product will cover the high-end spectrum of the market, proposing itself as the top premium TV produced by the South Korean company. This move, which confirms Samsung’s continuos attention to innovation, proves the drive of the enterprise on delivering the highest quality products with consistency while maintaining a strong focus on research and development.
The Samsung Z2 launch which was initially planned for the month of September in Indonesia, however that didn’t turn out to be true. Samsung Indonesia have finally launched the Z2 in the country at an official launch event. The launch took place at the country’s capital Jakarta on Wednesday that is the 19th of October. The smartphone has been priced at 899,000 Indonesian Rupiah ($70 approx.). Samsung are also bundling a free Batik back cover with the smartphone for the early customers. This is also the first Tizen smartphone to be launched in Indonesia.
Here is another puzzle type game that has recently hit the Tizen Store for you to enjoy. “Candy Funny” is brought to you by developer Julio Cesar and is very similar to Candy Crush.
You have 300 levels available to play and all levels have 3 stars , the number of stars shows how good or bad you actually are. You don’t have much time to accumulate the highest score you can and unlock further screens.
Games2Win India Pvt. Ltd. (www.games2win.com) an Indian app development company has more than 800 proprietary apps and games in all smartphone and tablet platforms. Now, they have 51 million downloads of their apps and games in all platforms. They have already got 8 games in the Tizen Store and today they added a new cricket game “Master Blaster T20 Cup 2016”.
For this review I spent a week with the Android version of Lenovo’s slick new backflipping laptop. Guts-wise it’s identical to the Windows 10 variant. They both feature Intel Atom x5-Z8550 processors, 4GB of RAM, 64GB of on-device storage, and 1920 x 1200 resolution displays. The Android version starts at $500 and the Windows version starts at $550.
In late 2013 I bought a Nexus 5 for my wife [1]. It’s a good phone and I generally have no complaints about the way it works. In the middle of 2016 I had to make a warranty claim when the original Nexus 5 stopped working [2]. Google’s warranty support was ok, the call-back was good but unfortunately there was some confusion which delayed replacement.
Once the confusion about the IMEI was resolved the warranty replacement method was to bill my credit card for a replacement phone and reverse the charge if/when they got the original phone back and found it to have a defect covered by warranty. This policy meant that I got a new phone sooner as they didn’t need to get the old phone first. This is a huge benefit for defects that don’t make the phone unusable as you will never be without a phone. Also if the user determines that the breakage was their fault they can just refrain from sending in the old phone.
The Huawei Mate 9 has once again been leaked in render form by Evan Blass on Twitter. The device is to be unveiled officially at an even in Munich on November 3, but the leaks just keep a-comin’, this time in a nice lilac hue.
Alcatel has made some impressive handsets over the past couple of years, and the most notable thing about all of them is the price. Most of the company’s devices are very affordable without sacrificing too much. Now the company has debuted four new devices and they’re all under $170.
Android Wear launched in 2014 with three hero smartwatches - the Motorola Moto 360, LG G Watch and the Samsung Gear Live. These three watches are now obsolete, taken over by fancier models that are far more appealing, far better looking and far more fashionable.
The platform has had several big updates since it originally launched, all of which have pushed several new features, including iOS compatibility. Despite still needing some improvements, which will hopefully come with Android Wear 2.0, the platform has become increasingly more appealing, not just to Android users, but iPhone users too if the Apple Watch doesn't float their boat or sit in their budget.
In light of the world of smartwatches becoming much more fashionable than they were originally, we have rounded up the best Android Wear smartwatches currently out there. We have a separate feature that presents the best smartwatches on all platforms including Android Wear, Pebble and Apple, but here we are focusing on Android Wear and only those we've lived with and reviewed in full.
Open source depends on a sustainable community to develop code rapidly, debug code effectively, and build out new features. Because community involvement is voluntary, people's skills, levels of involvement, and time commitments can vary. Given the variable nature of these factors, along with the fact that open source often relies on a philosophy of "release early, release often," quality assurance can be become challenging.
Running our own Heroku… It shouldn't be that hard, right?
We have a small set of servers we use to run our internal applications. Nothing too complex, just monitoring, our ELK stack, Jenkins, and a few internal services.
Given our rather modest requirements it may seem obvious that our first attempt at deployment automation, Chef, was a bit overkill for our needs. Not only that, we also wanted our engineers to be able to easily deploy applications to our servers without having to set up a Chef recipe — like the role Heroku plays in many of our client projects. We could have decided to run our internal applications on Heroku as well, but their pricing model wasn’t compatible with our relatively small-scale requirements.
The Free Software movement is about personal and social liberties. Giving the owner and user of a computer control over it. But most people don't see the problem with a small number of multinational mega-corporations having control over everyone's computers. They think: “Apple and Microsoft know what they're doing, and they do a good job, so why would I need Free Software?”
Accepting that most people reject the Free Software message, what can the Free Software movement contribute to the world?
There is a wide range of devices and platforms one needs to account for when developing a mobile app. An automation app for Mobile Testing can save development and testing time. Here are 5 top open source automated mobile testing frameworks to use, including the likes of Appium, Robotium, and Selendroid.
Open Source Day is one of the most popular events at the Grace Hopper Celebration of Women in Computing. This year, a day-long open-source hackathon was devoted to participants developing open-source projects for humanitarian causes.
Neetu Jain, product manager at SoftLayer, an IBM Company, and Daniela Dorneanu, solution developer and product trainer at Appway, joined Rebecca Knight (@knightrm), co-host of theCUBE, from the SiliconANGLE Media team, during the Grace Hopper event to discuss the mission of Open Source Day and the goal of the hackathon for humanity.
Embattled former darling of the search wars Yahoo has open sourced its neural network porn detector software.
The firm has explained that it is in fact tremendously difficult to automatically identifying that an image is not suitable/safe for work (NSFW).
The Kernel Recipes conference is, unsurprisingly, focused on kernel-related topics, but one of the potentially most useful talks given there was only marginally about the kernel. Applications that deal with the acquisition or display of video data must be aware of color spaces, but few developers really understand what color spaces are or how they work. Media subsystem maintainer Hans Verkuil sought to improve this situation with an overview of the color-space abstraction.
The "small" criterion can be a bit of a problem since it, naturally, limits the number of people who can participate in this kind of event. The Linux Plumbers Conference (now just a few weeks away) is always trying to find the right balance between size and quality of the event, and there, too, tickets tend to sell out quickly. The nice thing about an event like Kernel Recipes, though, is that it ought to be reproducible in other parts of the world. We have a ready supply of good speakers and interesting things to talk about in our community, and it doesn't take that many speakers to make an event like this work.
In the end, it was a privilege to be able to attend both events. Your editor's only regret was being unable to stay in Berlin for the Embedded Linux Conference Europe the following week. Conferences are an opportunity to get a sense for what is happening in our community and to renew one's enthusiasm and energy; both LinuxCon and Kernel Recipes succeeded on all of those fronts. A diverse community needs a diverse range of events; happily, that is just what was in store in Europe during these weeks.
I was really impressed with All Things Open last year and have subsequently become friends with the principle organizer, Todd Lewis. I loved how the team put together a show with the right balance of community and corporation, great content, exhibition and more.
As part of Mozilla’s Test Pilot program, three new experimental features have been launched. Mozilla’s test pilot program gives users early access to some amazing features which is still in development phase and would be launched in future as part of official installers.
Collabora Productivity, the driving force behind putting LibreOffice in the Cloud, and Seafile, a leading open source file sharing vendor, announce the availability of Collabora Online in the newly released Seafile pro edition 6.0.
In LibreOffice we've long supported Microsoft Office's "Office Binary Document RC4 Encryption" for decrypting xls, doc and ppt. But somewhere along the line the Microsoft Office encryption scheme was replaced by a new one, "Office Binary Document RC4 CryptoAPI Encryption", which we didn't support. This is what the error dialog of...
The phrase "Open Source CMS" lingers in the minds and hearts of many developers. CMSes are today's talk of the Internet, and you won't miss the discussion in local schools and private offices either. I don't remember for how long I have used Open Source Content Management Systems (CMS) to manage local and international websites. However, I have implemented CMS-based solutions long enough, and I can tell you from experience these tools did become the big digital craze for many professional reasons.
Last week, on October 11th, RMS received an honorary doctorate from the Université Pierre et Marie Curie, in Paris, France. In anticipation of the merger between the UPMC and the Université Paris-Sorbonne, which will be finalized in January 2018, the two institutions organized, in the great amphitheater of the Sorbonne, a joint ceremony that recognized both achievers in the sciences and in medicine, as well as ones in the arts and the humanities.
Smartisan Technology, a prominent Chinese mobile hardware producer, has introduced a new operating system, Smartisan OS 3.1, with over 200 new features and improvements, delivering a more enjoyable and efficient user experience. Smartisan Technology plans to open source two of OS 3.1's innovative features – "Big Bang" and "One Step" – which it hopes will become the new standard for the next generation of Android phones and secure its future as a solid contributor to the Android community.
The gap between the computational science and open source software communities just got smaller – thanks to a collaboration among national laboratories, universities and industry.
“This is awesome!”, this was my first reaction when I boarded my first flight to Delhi. I was having trouble in finding a proper accommodation Kushal, Sayan and Chandan helped me a lot in that part, I finally got honour of bunking with Sayan , Subho and Rtnpro which I will never forget. So, I landed and directly went to JNU convention center. I met the whole Red Hat intern gang . It was fun to meet them all. I had proposed Pagure for Dev Sprint and I pulled in Vivek to do the same.
The dev sprint started and there was no sign of Vivek or Saptak, Saptak is FOSSASIA contributor and Vivek contributes to Pagure with me. Finally it was my turn to talk about Pagure on stage , it was beautiful the experience and the energy. We got a lot of young and new contributors and we tried to guide them and make them send at least one PR. One of them was lucky enough to actually make a PR and it got readily merged.
In writing the most recent Hack This ("Scrape the Web with Beautiful Soup") I again found myself trapped between the competing causes of blog-brevity and making sure everything is totally clear for non-programmers. It's a tough spot! Recapping every little Python (the default language of Hack This) concept is tiring for everyone, but what's the point in the first place if no one can follow what's going on?
This post is then intended then as a sort of in-between edition of Hack This, covering a handful of Python features that are going to recur in pretty much every programming tutorial that we do under the Hack This name. A nice thing about Python is that it makes many things much clearer than is possible in almost any other language.
Here’s one way to put it: to me, Bryan Cantrill is the opposite of another person I admire in operating systems (whom I will leave unnamed). This person makes me feel excited and welcome and safe to talk about and explore operating systems. I’ve never seen them shame or insult or put down anyone. They enthusiastically and openly talk about learning new systems concepts, even when other people think they should already know them. By doing this, they show others that it’s safe to admit that they don’t know something, which is the first step to learning new things. They are helping create the kind of culture I want in systems programming – the kind of culture promoted by Papers We Love, which Bryan cites as the inspiration for Systems We Love.
By contrast, when I’m talking to Bryan I feel afraid, cautious, and fearful. Over the years I worked with Bryan, I watched him shame and insult hundreds of people, in public and in private, over email and in person, in papers and talks. Bryan is no Linus Torvalds – Bryan’s insults are usually subtle, insinuating, and beautifully phrased, whereas Linus’ insults tend towards the crude and direct. Even as you are blushing in shame from what Bryan just said about you, you are also admiring his vocabulary, cadence, and command of classical allusion. When I talked to Bryan about any topic, I felt like I was engaging in combat with a much stronger foe who only wanted to win, not help me learn. I always had the nagging fear that I probably wouldn’t even know how cleverly he had insulted me until hours later. I’m sure other people had more positive experiences with Bryan, but my experience matches that of many others. In summary, Bryan is supporting the status quo of the existing culture of systems programming, which is a culture of combat, humiliation, and domination.
[...]
He gaily recounts the time he gave a highly critical keynote speech at USENIX, bashfully links to a video praising him at a Papers We Love event, elegantly puts down most of the existing operating systems research community, and does it all while using the words “ancillary,” “verve,” and “quadrennial.” Once you know the underlying structure – a layer cake of vituperation and braggadocio, frosted with eloquence – you can see the same pattern in most of his writing and talks.
Fletcher Previn could be one of the funniest IBM vice presidents the company employs.
Before achieving what he jokes as his "true life-long ambition of middle management at IBM" he worked as an intern on the "Late Show with David Letterman" and did a stint for Conan O'Brian, too, he told attendees at the Jamf tech conference.
I've had this terminal sitting under my desk gathering dust for... close to two decades, I think. This is an Ann Arbor Ambassador 60, manufactured in 1982 or 1983. It is a terminal. You probably think that word means "a GUI window that runs a command line shell in it". You think this thing must be a computer because it looks like what computers used to look like. But it is not a computer, it is a peripheral. This object consists of a keyboard, a serial port, and a CRT screen, and that's about it. A screen, I must emphasize, that is capable of displaying only text, and that text can be in any two colors you like, as long as those colors are green and black.
Look at the sustain on that phosphor. Just look at it! The video is a little long, but it's moody.
You plug the serial port on the back into the serial port of your mainframe, or into a modem, and boom, Thus We Go Forth Into Cyberspace.
If you’re just a little irked that gasoline prices have edged up recently, maybe this will cheer you up: Groceries are a bargain.
Average supermarket prices fell 2.2% in September from a year ago, the most since late 2009, and they’ve been down on an annual basis for 10 straight months, the longest such streak since 1959-60, Labor Department figures this week showed.
But while that breakfast of eggs, toast and bacon may not be putting as big of a dent in your wallet, falling prices at the checkout are spreading hardship across the nation’s farm belt and hammering the earnings of grocery chains.
Even now, the people of Flint, Mich., cannot trust what flows from their taps.
More than one year after government officials finally acknowledged that an entire city’s water system was contaminated by lead, many residents still rely on bottled water for drinking, cooking and bathing.
Parents still worry about their kids. Promised aid has yet to arrive. In ways large and small, the crisis continues to shape daily life.
However, the EPA Scientific Advisory Panel (SAP) meetings were "postponed," just four days before they were suppose to meet, after intense lobbying by the agrichemical industry, including Monsanto. The industry first fought to keep the meetings from being held at all, and argued that if they were held, several leading international experts should be excluded from participating, including "any person who has publicly expressed an opinion regarding the carcinogenicity of glyphosate."
As the meetings drew near, CropLife America, which represents the interests of Monsanto and other agribusinesses, specifically took issue with at least two scientists chosen for the panel, alleging the experts might be unfavorably biased against industry interests. On Oct. 12, the group sent a letter to the EPA calling for Dr. Kenneth Portier of the American Cancer Society to be more deeply scrutinized for any "pre-formed conclusions" about glyphosate. More notably, CropLife called for leading epidemiologist Dr. Peter Infante to be completely disqualified from panel participation.
"EPA should replace Dr. Infante with an epidemiologist without such patent bias," CropLife told the EPA. The chemical industry group said Infante was unlikely to give industry-sponsored research studies the credibility the industry believes they deserve. CropLife said Infante has testified in the past for plaintiffs in chemical exposure cases against Monsanto.
Janine Jackson: “Police Arrest More People for Marijuana Use than for All Violent Crimes Combined” is the headline in the Washington Post. In the New York Times, it’s “Marijuana Arrests Outnumber Those for Violent Crimes, Study Finds.”
Turris Omnia WiFi Router, the world’s first hack-proof router with open source firmware launched yesterday at the CES Unveiled Show in Prague, Czech Republic.
Routers are the gateway of every home internet network. Yet, while many computers run antivirus software, little has been done thus far to protect routers against cyber threats. A new device, described as the world’s first hack-proof router, was launched on Thursday at the CES Unveiled Show in Prague.
The main strength of the Turris Omnia router, a spin-out of a cyber security research project by Czech Republic’s domain administrator NIC.cz, is the fact that it automatically updates and patches vulnerabilities as they become known.
Recently, account takeovers, email hacking, and targeted phishing attacks have been all over the news. Hacks of various politicians, allegedly carried out by Russian hackers, have yielded troves of data. Despite the supposed involvement of state-sponsored agents, some hacks were not reliant on complex zero-day attacks, but involved social engineering unsuspecting victims. These kinds of attacks are increasingly likely to be used against regular people. This recently happened to a friend of mine:
Two weeks ago, an ex-colleague (actually, my officemate at Google way back in 2002)ââ¬Å —ââ¬Å let’s call him Bobââ¬Å —ââ¬Å had his Google account compromised while on vacation in Hawaii. With his primary email account compromised, the attacker could have:
Red Hat, the leading open source software developer firm, has revealed that Linux Kernel has been infected with a serious bug for the past 9 years. The bug has been dubbed as Dirty Cow. It is deemed dangerous because through this bug, an attacker can get write access to read-only memory.
The huge attack on global internet access, which blocked some of the world’s most popular websites, is believed to have been unleashed by hackers using common devices like webcams and digital recorders.
Among the sites targeted on Friday were Twitter, Paypal and Spotify. All were customers of Dyn, an infrastructure company in New Hampshire in the US that acts as a switchboard for internet traffic.
Outages were intermittent and varied by geography, but reportedly began in the eastern US before spreading to other parts of the country and Europe.
Users complained they could not reach dozens of internet destinations, including Mashable, CNN, the New York Times, the Wall Street Journal, Yelp and some businesses hosted by Amazon.
Cyber attacks targeting a little known internet infrastructure company, Dyn, disrupted access to dozens of websites on Friday, preventing some users from accessing PayPal, Twitter and Spotify.
It was not immediately clear who was responsible for the outages that began in the Eastern United States, and then spread to other parts of the country and Western Europe.
The outages were intermittent, making it difficult to identify all the victims. But technology news site Gizmodo named some five dozen sites that were affected by the attack. They included CNN, HBO Now, Mashable, the New York Times, People.com, the Wall Street Journal and Yelp.
A massive botnet of hacked Internet of Things devices has been implicated in the cyberattack that caused a significant internet outage on Friday.
The botnet, which is powered by the malware known as Mirai, is in part responsible for the attack that intermittently knocked some popular websites offline, according to Level 3 Communications, one of the world’s largest internet backbone providers, and security firm Flashpoint.
“We are seeing attacks coming from a number of different locations. We’re seeing attacks coming from an Internet of Things botnet that we identified called Mirai, also involved in this attack,” Dale Drew, chief security officer at Level 3 Communications, said on a livestream on Friday afternoon.
A massive DDoS attack against a major DNS service likely using a botnet of IoT devices resulted in Internet issues across the eastern United States Friday, making it hard for many users to access their favorite sites.
Phew. That’s a lot of acronyms.
This title is a bit click baity, but it's true, not for the reason you think. Keep reading to see why.
If you've ever been involved in keeping a software product updated, I mean from the development side of things, you know it's not a simple task. It's nearly impossible really. The biggest problem is that even after you've tested it to death and gone out of your way to ensure the update is as small as possible, things break. Something always breaks.
If you're using a typical computer, when something breaks, you sit down in front of it, type away on the keyboard, and you fix the problem. More often than not you just roll back the update and things go back to the way they used to be.
A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT) devices, such as CCTV video cameras and digital video recorders, new data suggests.
Earlier today cyber criminals began training their attack cannons on Dyn, an Internet infrastructure company that provides critical technology services to some of the Internet’s top destinations. The attack began creating problems for Internet users reaching an array of sites, including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix.
At some point this morning, one of the US’s critical internet infrastructure players was hit with a staggering distributed denial of service (DDoS) attack that has taken out huge swaths of the web. Sites like Twitter, Netflix, Spotify, Reddit, and many others — all clients of a domain registration service provider called Dyn — have suffered crippling interruptions and, in some cases, blanket outages.
Details are now emerging about the nature of the attack. It appears the cause is what’s known as a Mirai-based IoT botnet, according to security journalist Brian Krebs, who cited cyber-threat intelligence firm Flashpoint. Dyn’s chief strategy officer Kyle Owen, who spoke with reporters this afternoon, later confirmed Flashpoint’s claim, revealing that traffic to its servers was clogged with malicious requests from tens of millions of IP addresses in what the company is calling a "very sophisticated and complex attack."
A large part of the internet became inaccessible today after a botnet made up of IP cameras and digital video recorders was used to DoS a major DNS provider. This highlighted a bunch of things including how maybe having all your DNS handled by a single provider is not the best of plans, but in the long run there's no real amount of diversification that can fix this - malicious actors have control of a sufficiently large number of hosts that they could easily take out multiple providers simultaneously.
To fix this properly we need to get rid of the compromised systems. The question is how. Many of these devices are sold by resellers who have no resources to handle any kind of recall. The manufacturer may not have any kind of legal presence in many of the countries where their products are sold. There's no way anybody can compel a recall, and even if they could it probably wouldn't help. If I've paid a contractor to install a security camera in my office, and if I get a notification that my camera is being used to take down Twitter, what do I do? Pay someone to come and take the camera down again, wait for a fixed one and pay to get that put up? That's probably not going to happen. As long as the device carries on working, many users are going to ignore any voluntary request.
Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they are presented with are trustworthy, i.e., the parameters implement cyclic groups where the discrete logarithm problem is assumed to be hard. An informal and widespread justification for this seemingly exists that says validating parameters at run time is too computationally expensive relative to the perceived risk of a server sabotaging the privacy of its own connection. In this paper we explore this trust assumption and examine situations where it may not always be justified.
We conducted an investigation of discrete logarithm domain parameters in use across the Internet and discovered evidence of a multitude of potentially backdoored moduli of unknown order in TLS and STARTTLS spanning numerous countries, organizations, and protocols. Although our disclosures resulted in a number of organizations taking down suspicious parameters, we argue the potential for TLS backdoors is systematic and will persist until either until better parameter hygiene is taken up by the community, or finite field based cryptography is eliminated altogether.
When Dorothy discovers fraud in the land of Oz, she is told by the Wizard, "Don't look behind the curtain." But she does. In America, we demand truth and accountability in so many aspects of our daily lives, and yet somehow there's little public outcry for transparency within voting, the sacred cornerstone of our democracy. For the most part, we sleep soundly under the blanket of assurances from government officials. FBI Director James Comey even attempted a spin of irony recently, noting that our "clunky" voting process actually makes wholesale rigging more difficult. However, Comey misses the bigger picture.
[...]
Hardly anyone uses the same computer from 12 years ago, yet large sections of the country currently vote on aging electronic systems which utilize proprietary software that cannot be publicly examined. Unverifiable technology remains deployed in 29 states – including Pennsylvania, Ohio, Florida – and other key battleground states, which may determine our next president. Races in these areas are not evidence based, and consequently, we cannot be certain ballots reflect voter intent. Bereft of such knowledge, how can we put faith in the legitimacy of our government?
Last month, we wrote about Bruce Schneier's warning that certain unknown parties were carefully testing ways to take down the internet. They were doing carefully configured DDoS attacks, testing core internet infrastructure, focusing on key DNS servers. And, of course, we've also been talking about the rise of truly massive DDoS attacks, thanks to poorly secured Internet of Things (IoT) devices, and ancient, unpatched bugs.
Willem de Groot published a list of web stores that contain malware. He first hosted this list on GitHub but it was deleted. Then he hosted it on GitLab where it was also deleted. The reason we gave him for the deletion was "GitLab views the exposure of the vulnerable systems as egregious and will not abide it.". Willem wrote about his experience in a blog post.
Rich Salz and Tim Hudson started off their LinuxCon Europe 2016 talk by stating that April 3, 2014 shall forever be known as the "re-key the Internet date." That, of course, was the day that the Heartbleed vulnerability in the OpenSSL library was disclosed. A lot has happened with OpenSSL since that day, to the point that, Salz said, this should be the last talk he gives that ever mentions that particular vulnerability. In the last two years, the project has recovered from Heartbleed and is now more vital than ever before.
Philippines President Rodrigo Duterte has clarified his comments that seemed to call for a split from the United States, saying he was advocating a "separation of foreign policy" rather than "a severance of ties." Addressing a press conference in Davao City after his return from a state visit to China, Duterte said:
"It is not severance of ties. You say severance of ties, you cut the diplomatic relations. I cannot do that. "Why? It is in the best interest of my country that we maintain that relationship. Why? Because there are many Filipinos in the United States. Well, Americans of Filipino ancestry. "Why? Because the people of my country [are] not ready to accept. I said separation -- what I was really saying was separation of a foreign policy."
It’s a tragic death of 17 year old Hindu schoolgirl, Mou Rajak on Tuesday in NRS Hospital in Kolkata after her eight day’s long struggle for life since she was admitted here for a critical care being a victim of acid attack. Her lungs were almost damaged as the acid thrown by a Muslim man Imran entered into lung through trachea.
Release International urges Pakistan to take a stand against intimidation and release Asia Bibi, following the Supreme Court appeal setback. Release calls for courage to confront intolerance and repeal the blasphemy law. Pakistan’s Supreme Court has adjourned Asia Bibi’s appeal against her death sentence, following the decision of a leading judge to withdraw from the trial.
Justice Muhammad Iqbal Hameed Ur Rehman stepped back from the case on the grounds that he had been a judge in the case of the Punjab governor Salmaan Taseer who was murdered for taking a stand against the blasphemy laws.
“It seems strange to pull out on the day of the appeal,” says Paul Robinson, Chief Executive of Release International. “Surely any potential conflict would have been known in advance? What is clear is that it will take immense courage to withstand intimidation and release Asia Bibi — a fact underlined by the presence of so many riot police at the court.”
The head of France’s national police force on Tuesday ordered an internal investigation after hundreds of police officers held an unauthorized protest in central Paris overnight.
Angry police officers marched on the iconic Champs Elysées boulevard in the French capital after dark on Monday, complaining that they are understaffed and ill-equipped.
The rebel police officers, who held the demonstration without permission or backing of their labour unions, accused Prime Minister Manuel Valls and Interior Minister Bernard Cazeneuve of grandstanding while failing to provide the resources they need to do their jobs.
The Wake County school system and the Cary Police Department say they haven’t found evidence that a 7-year-old Muslim student was assaulted by classmates on a school bus last week.
Zeeshan-ul-hassan Usmani says his son Abdul Aziz was bullied and beaten by classmates at Weatherstone Elementary School in Cary while riding home on the bus last Friday because the first-grade student is Muslim.
Usmani’s Facebook post, with the words “Welcome to the United States of America of Donald Trump” and a picture of Abdul Aziz’s left arm in a sling, has sparked worldwide social media and news media attention about Islamophobia.
School and law enforcement officials say they’ve taken the allegations seriously and don’t tolerate bullying. But they say their investigations don’t confirm an assault even occurred.
The Saudi Air Force is being trained by the British Government amid accusations that it is carrying out atrocities in neighbouring Yemen, it has emerged.
The Liberal Democrats – who uncovered the instruction being given, in both Saudi Arabia and the UK itself – described the revelation as “shameful”.
Tom Brake, the party’s foreign affairs spokesman, called on the Ministry of Defence (MoD) to end the training immediately and for much stricter controls on arms exports to the oil-rich kingdom.
Short of troops to fight in Iraq and Afghanistan a decade ago, the California National Guard enticed thousands of soldiers with bonuses of $15,000 or more to reenlist and go to war.
Now the Pentagon is demanding the money back.
Nearly 10,000 soldiers, many of whom served multiple combat tours, have been ordered to repay large enlistment bonuses — and slapped with interest charges, wage garnishments and tax liens if they refuse — after audits revealed widespread overpayments by the California Guard at the height of the wars last decade.
Investigations have determined that lack of oversight allowed for widespread fraud and mismanagement by California Guard officials under pressure to meet enlistment targets.
It has become crystal clear.
For the record, here it is.
She has big ambitions, which she does not spell out for fear of frightening part of the electorate, but which are perfectly understood by her closest aides and biggest donors.
She wants to achieve regime change in Russia.
She enjoys the support of most of the State Department and much of the Pentagon, and Congress is ready to go.
The method: a repeat of the 1979 Brezinski ploy, which consisted of luring Moscow into Afghanistan, in order to get the Russians bogged down in their “Vietnam”. As the Russians are a much more peace-loving people, largely because of what they suffered in two World Wars, the Russian involvement in Afghanistan was very unpopular and can be seen as a cause of the collapse of the Soviet Union.
This led to the temporary reign of the drunken Boris Yeltsin who – as recounted in Strobe Talbott’s memoirs – was putty in the hands of Bill Clinton. Hillary would like to renew that sort of relationship. Putin is an obstacle.
Muammar Gaddafi was the most progressive political leader in the world. Gaddafi used Libya’s oil wealth for the benefit of the Libyan people. He lived in a tent, a nice tent, but not in a palace, and he did not have collections of European exotic cars or any of the other paraphernalia associated with the ruling families in Saudi Arabia and the oil emirates that are Washington’s Middle Eastern allies.
In Libya, education, medical treatment, and electricity were free. Gasoline was practically free, selling for 14 US cents per litre. Women who gave birth were supported with cash grants and couples received cash grants upon marriage. Libya’s state bank provided loans without interest and provided free startup capital to farmers.
[...]
Washington organized mercenaries, termed them “rebels” as in Syria, and sicced them on Libya. When it became clear that Gaddafi’s forces would prevail, Washington tricked naive and gullible Russian and Chinese governments and secured a UN no-fly zone over Libya to be enforced by NATO. The express purpose of the no-fly zone was to prevent Gaddafi from attacking civilian targets, which he was not doing. The real reason was to prevent a sovereign state from using its own air space so that the Libyan Air Force could not support the troops on the ground. Once the gullible Russians and Chinese failed to veto the Security Council’s action, the US and NATO themselves violated the resolution by using Western air power to attack Gaddafi’s forces, thus throwing the conflict to the CIA-organized mercenaries. Gaddafi was captured and brutally murdered. Ever since, Libya, formerly a prosperous and successful society, has been in chaos, which is where the Obama regime wanted it.
The site WikiLeaks asked its “supporters” on Friday to stop taking down the internet in the U.S. following a massive distributed denial of service (DDoS) attack that disrupted a number of major sites.
“Mr. Assange is still alive and WikiLeaks is still publishing,” the site tweeted. “We ask supporters to stop taking down the US internet. You proved your point.”
MacFadyen has a long history as a journalist who’s friendly to WikiLeaks. He was the director of the Centre for Investigative Journalism in London, an adviser to The Whistler, and focused much of his work on discussing and protecting whistleblowing activities. He even created the Julian Assange Defence Committee to raise funds to help pay for Assange’s legal expenses.
WikiLeaks had been releasing a series of emails from Hillary Clinton’s campaign manager, John Podesta. Just this past week, Julian Assange’s Internet connection was cut, leading to speculation as to whether Assange is even still at the embassy. These rumors and conspiracy theories, combined with other rumors about WikiLeaks’ Twitter account itself, led to a lot of questioning about why WikiLeaks tweeted MacFadyen’s photo without an explanation.
For 18 months, Republican strategists, political pundits, reporters and Americans who follow them have been pursuing Hillary Clinton’s personal email habits, and no evidence of a crime has been found. But now they at least have the skills and interest to focus on a much larger and deeper email conspiracy, one involving war, lies, a private server run by the Republican Party and contempt of Congress citations—all of it still unsolved and unpunished.
Prof. Solomon Lumba of the UP College of Law, who is working with the Philippine Center for Investigative Journalism in conducting research on FOI, reported a brief analysis on the issue of exceptions. According to Atty. Lumba, one way to simplify the plethora of exceptions included in the initial exception inventories from the Department of Justice and the Office of the Solicitor General is to group them into conceptual categories, as was done in jurisdictions such as the US and Australia.
Lastly, Atty. Eirene Jhone E. Aguila, co-convenor of R2KRN, delivered the Coalition’s Statement on the state of FOI in President Duterte’s first 100 days in office. The Coalition acknowledges the issuance of EO No. 2 as significant step towards guaranteeing the people’s right to know, but stresses the huge amount of work left to be done, particularly: completing the People’s FOI Manuals and implementing details of EO No. 2 for each agency, clarifying the issue of exceptions, and passing a long sought-for Freedom of Information law by the Congress.
This was supposed to be the election where climate change really mattered. Only, anyone watching the presidential debates wouldn’t have a clue that 1) 2016 has been history’s hottest year on record, and 2) our future leaders give any sort of crap about it.
Climate change was mostly ignored during the last three debates, mentioned only in passing, and never discussed directly or at length. In fact, I’m fairly sure that Americans know more about Donald Trump’s sexual proclivities than his environmental policies (hint, hint: he doesn’t have any).
But should we really feign surprise? Surely even the most hopeful of us didn’t expect global warming to compete with jobs, the border, or national security on the campaign trail. After all, this has been an election based on political identity, and when Americans can’t even agree on whether climate change is real, what’s incentivizing our candidates to fight for it?
Just one question, posed during a town-hall by Ken Bone, a coal industry worker, shed any sort of light on the climate agendas of our two vastly different candidates. (And even then, Bone was criticized for not asking anything of real substance, as if energy policy, which lies at the heart of our climate change catastrophe, matters less than whether a candidate is a fan or not of science.)
With the growing threats due to climate change – rising sea levels, devastating storms and tidal flooding – it's no mystery why some of the world's most iconic cities and natural wonders are at risk. And while there's no clear-cut answer on the rate at which many cherished places the world over will be underwater, with the impending long-term effects of climate change – including the melting polar ice cap – we have a very narrow window before there will be dramatic repercussions, says Costas Christ, Chairman of the National Geographic World Legacy Awards and sustainable travel expert. "We have a window of 10 or 20 years at most before we set in motion the temperatures that we can't turn back," he says.
Happily, the outlook isn't all bleak. Our travel choices and actions make a difference, Christ says. "What can we do as travelers? We can choose those companies that are practicing and embracing sustainability," he explains. By rewarding companies that are substituting plastics, generating less waste, offsetting their carbon footprint, using renewable energy and supporting national parks and fragile ecosystems, among other sustainable practices, we can advance conservation efforts, travel responsibly and have a positive long-term impact. With that in mind, here are six cities starting to submerge, and expert-endorsed tips for limiting your carbon footprint and aiding conservation efforts on your next trip.
The Finnish Broadcasting Company (Yle) announced on Thursday that it plans to cut more than a third of current staff in its production unit. That will free up resources to spend more on outside acquisitions, which is a key goal of a parliamentary report published earlier this year. Employee representatives say that these lay-offs are only the beginning of an extended period of change for the company.
The European Parliament president says he is optimistic that a free-trade deal between the EU and Canada can be signed soon despite last-minute obstacles.
Objections by a Belgian region, which opposes the deal, "are for us Europeans to solve", Martin Schulz said.
He was speaking after meetings in Brussels with Canadian Trade Minister Chrystia Freeland and the head of Belgium's Wallonia region.
Ms Freeland said: "It's time for Europe to finish doing its job."
After seven years of negotiations on the Comprehensive Economic and Trade Agreement (Ceta), talks broke down on Friday.
The Left Alliance political party has proposed that employers found guilty of paying a wage below the lowest acceptable level agreed upon in Finland’s collective wage agreements should be subject to criminal charges.
Also on the show: Explosive entitlement spending! Runaway national debt! These are familiar bogeymen for elite media, but how much there is there? Dean Baker will join us to unpack the oft-heard media phrase “debt and entitlements,” and explain what it really means to call for cutting them. He’s co-director of the Center for Economic and Policy Research and writes the blog Beat the Press.
Anti-CETA campaigns and mass protests have put the EU-Canada deal under constant pressure. Daniel Caspary MEP asks: What are we going to do if the European Union buries its common trade policy?
Daniel Caspary is a German MEP and is the EPP group’s coordinator on the Committee on International Trade (INTA) in the European Parliament and Parliamentary Secretary (Chief-Whip) of the German CDU/CSU Delegation.
A conversation between Clinton campaign chairman John Podesta and political consultant Erick Mullen leaked by WikiLeaks suggests that Tim Kaine — and Hillary Clinton — lied to the American people about the Virginia senator’s selection as Clinton’s running mate.
In the email, Mullen complains to Podesta that attorney Bob Glennon “won’t stop assuring Sens Brown and Heitkamp (at dinner now) that HRC has personally told Tim Kaine he’s the veep.” The email was sent on July 15, 2015 — over one full year before the campaign’s official announcement.
Clinton announced Kaine's selection on July 22, 2016. The Clinton campaign behaved as if it were still sifting through possible VP picks until practically that very day. "Just got off the phone with Hillary. I’m honored to be her running mate. Can’t wait to hit the trail tomorrow in Miami!" Kaine tweeted.
A stone-faced Hillary Clinton refused to comment tonight on an email a top aide sent calling a Clinton Foundation quid pro qou a 'mess' of the former secretary of state's own making.
'I have nothing to say about Wikileaks, other than I think we should all be concerned about what the Russians are trying to do to our election and using Wikileaks very blatantly to try to influence the outcome of the election,' Clinton said.
The Democratic nominee was responding to a question posed by DailyMail.com during a question and answer session with reporters riding on her campaign plane.
Interim Democratic National Committee chair Donna Brazile accused Megyn Kelly of "persecution" Wednesday evening when the Fox News anchor asked Brazile about an email, published by WikiLeaks, that indicated Brazile provided Hillary Clinton's campaign with a question in advance of a CNN town hall.
"As a Christian woman, I understand persecution, but I will not sit here and be persecuted because your information is totally false," Brazile said during an interview conducted shortly after the third presidential debate.
"Since I play straight up and I'll play straight up with you, I did not receive any questions from CNN," she said. "First of all, what information are you providing to me that will allow me to see what you're talking about?"
Kelly cited an email made public by WikiLeaks last week that indicated Brazile had informed high-level Clinton campaign aides that she sometimes received "questions in advance" before relaying a question about the death penalty that closely matched a question later asked during the CNN town hall. Roland Martin, a TV One host who partnered with CNN for the event, sent CNN a question containing the same language the day after Brazile sent it to the Clinton campaign.
It is disconcerting to be praised by a website whose next article warns of a “plague of sodomites”. Sometimes truth-telling is a difficult act because truth is a simple matter of fact; who might seek to exploit that truth is a different question. I almost certainly have little in common with the anti-gay people who chose to commend me.
It is however incumbent on those who know truth to reveal it to the best of their ability, particularly if it contradicts an untruth being put about widely. The lie that WikiLeaks is acting as an agent of the Russian state is one that needs to be countered. Wikileaks is much more important than a mere state propaganda organisation, and needs to be protected.
Political lying is a sad fact of modern life, but some lies are more dangerous than others. Hillary Clinton’s lies that the Podesta and Democratic National Congress email leaks are hacks by the Russian state, should be countered because they are untrue, and because their intention is to distract attention from her own corrupt abuse of power and money. But even more so because they recklessly feed in to a Russophobia which is starting to exceed Cold War levels in terms of open public abuse.
Clinton has made no secret of her view that Obama has not been forceful enough in his dealings in Syria, and within her immediate circle she has frequently referred to the Cuban missile crisis as the precedent for how she believes Russia must be faced down. It is her intention to restore US international prestige by such a confrontation with Putin in Syria early in her Presidency, and perhaps more to the point to restore the prestige of the office of POTUS and thus enhance her chances of getting her way with a probable Republican controlled senate and congress.
[...]
It is worth noting that Hillary’s claim that 17 US Intelligence Agencies agree that Russia was the source of the leaks is plainly untrue. All they have said is that the leaks “are consistent with the methods and motivations of Russian-directed attacks.” Under extreme White House pressure to state that the Russians did it, that extremely weak statement was the only thing that the US Intelligence chiefs could cobble together. It is very plainly an admission there is no evidence that Russia did it, but the appalling corporate media have reported it as though it “proves” Hillary’s accusation of Russia is true.
Bill Binney is like myself a former recipient of the Sam Adams Award – the World’s foremost whistleblowing award. Bill was the senior NSA Director who actually oversaw the design of their current mass surveillance software, and Bill has been telling anybody who will listen exactly what I have been telling – that this material was not hacked from Russia. Bill believes – and nobody has better contacts or understanding of capability than Bill – that the material was leaked from within the US intelligence services.
Russia, ISIS and taxes overwhelmed all other topics during the four presidential and vice-presidential debates, totaling 429 mentions from both candidates and questioners.
Russia (and Putin) alone came up in the four debates 178 times, more than national debt/entitlements, Social Security, the Supreme Court, race/racism, education, abortion, drugs, poverty, LGBTQ people, climate change, campaign finance/Citizens United and the environment combined, with the latter topics totaling 164 mentions.
Clinton’s emails were mentioned less than half as often as Trump’s tax returns (30 vs. 80 mentions), but still more than topics such as Social Security, the Supreme Court and education.
Domestic issues that were mentioned somewhat frequently were immigration, police brutality/race, and Obamacare. Immigration is obviously a hot button issue given Trump’s calls to forcefully cleanse 11 million largely Latino immigrants from the United States.
Over half of American voters surveyed in a recent poll disagree with the FBI’s decision not to prosecute Hillary Clinton over her emails scandal.
A survey of 1,000 likely voters was conducted on October 18 and 19 by the polling company Rasmussen Reports. Voters were asked whether they agreed with the FBI’s decision not to file criminal charges against Hillary Clinton, despite acknowledging that she had been reckless and potentially exposed classified information to hostile countries. The results were released on Friday.
It is an obvious fact that the oligarchic One Percent have anointed Hillary, despite her myriad problems to be President of the US. There are reports that her staff are already moving into their White House offices. This much confidence before the vote does suggest that the skids have been greased.
The current cause celebre against Trump is his conditional statement that he might not accept the election results if they appear to have been rigged. The presstitutes immediately jumped on him for “discrediting American democracy” and for “breaking American tradition of accepting the people’s will.”
What nonsense! Stolen elections are the American tradition. Elections are stolen at every level—state, local, and federal. Chicago Mayor Richard J. Daley’s theft of the Chicago and, thereby, Illinois vote for John F. Kennedy is legendary. The Republican US Supreme Court’s theft of the 2000 presidential election from Al Gore by preventing the Florida vote recount is another legendary example. The discrepancies between exit polls and the vote count of the secretly programmed electronic voting machines that have no paper trails are also legendary.
So what’s the big deal about Trump’s suspicion of election rigging?
On Wednesday evening during the final presidential debate of the campaign, Hell did not freeze over. Moderator Chris Wallace of Fox News, where climate denial plays nothing but home games, passed on the final opportunity to ask Donald Trump and Hillary Clinton about climate change.
This presidential campaign has been a catastrophe for American democracy and for American political journalism.
Amid the relentlessly tawdry campaign news, most Americans haven’t even noticed the absence of virtually any high-level campaign discussion of environmental issues, let alone what many have called the biggest challenge of the 21st century.
For now.
But I invite you to think ahead to that “oh crap” moment that awaits us all, five, ten or 25 years from now, when America looks back to reckon with our self-imposed climate silence in the debates.
Journalism—and the memes of our day—have failed us.
I don’t mean to condemn all journalists, or even all political journalists. This campaign has seen Pulitzer-worthy investigative work, notably by old-media giants like the New York Times and Washington Post, on both major party candidates and their respective problems with veracity and transparency. But the horse-race coverage, driven by Twitter, bluster and clickbait, has predictably left important issues in the lurch.
Donald Trump’s true gift is his uncanny ability to capture the attention of the news media.
His declaration during Wednesday night’s third and final presidential debate that he may not accept defeat in three weeks captured global headlines, once again making him the lead story in the world, even as his chances of winning are essentially vanishing.
But this is nothing new. There are countless other examples of successful attention-getting in Trump’s past, including his crusade against the Central Park Five in 2005, and the six weeks in 2011 where he monopolized TV news with his quest to find Barack Obama’s birth certificate.
In fact, one way to look at Trump’s run for the presidency is as an attention-getting, brand-building exercise from start to finish. And in that context, this latest twist makes even more sense: It turns his otherwise sputtering campaign into a sort of dystopian season of “The Apprentice” where viewers watch for the cliffhanger: Will Trump bow out gracefully, or will he rally his supporters to declare his loss the result of a grand conspiracy?
Not coincidentally, a half hour before the start of Wednesday’s debate, his campaign launched #TrumpTV, a livestream on his Facebook featuring Trump surrogates — leading to speculation that this served as a sort of a beta test for a rumored Trump-helmed television network. With that network, Trump could seek to monetize a panicked support base.
On November 9, when Trump likely loses the presidential election in a big way, the news media will face a moment of truth: Will they continue to obsessively cover him and his post-election antics? Or will they ignore him?
They should ignore him.
Moreover, in so far as the change substantially broadens criminal liability, one might question how far this represents good policy. Shouldn’t criminal liability (leading potentially to a 10 year prison sentence) be targeted at the obvious wrongdoers – the Kim Dotcoms, Megauploads and The Pirate Bays of the Internet-world? The criminal law, it should be remembered, can be deployed by way of private prosecution, so can become a very significant weapon in the hands of those involved in “speculative invoicing” or similar forms of harassment. Where prosecutions are launched (rather than threatened), the Crown Prosecution Service can in some circumstances take over the prosecution and discontinue proceedings, but there is no system in place for ensuring this occurs. Perhaps the solution would be to abandon the slippery notion of “prejudice” with the more concrete notion of “loss” and “gain”, but to introduce a threshold, for example, a requirement that any loss/gain is 'commercially substantial' or ‘on a commercial scale’ to clarify that the criminal law is not to be used as a weapon with which to harass those committing trivial acts of infringement.”
Pakistan's media regulation authority said Thursday it was imposing a blanket ban on Bollywood films and other Indian content on its television networks and radio stations amid increasing tension between the two nuclear-armed rivals on the issue of the disputed region of Kashmir.
Facebook employees pushed to remove some of Republican presidential candidate Donald Trump's Facebook posts — such as one proposing the ban of Muslims from entering the U.S. — from the service as hate speech that violated the giant social network's policies, the Wall Street Journal reported Friday.
The decision not to remove the Trump posts was made by Facebook CEO Mark Zuckerberg, the newspaper reported.
Employees complained that Facebook was changing the rules for Trump and some who review content on Facebook threatened to quit.
Images and posts of cultural importance sometimes fly in the face of conventional standards of offense, a fact that online services haven't always fully parsed. As a social-media gatekeeper, Facebook acknowledged some of its failures in this regard on Friday by announcing that it had begun easing up on banning images and posts that violate the site's guidelines—while simultaneously contending with allegations that it had previously bent those rules in favor of Donald Trump.
The guideline-related announcement follows an early September dust-up over the site banning and removing a Pulitzer Prize-winning photo taken during the Vietnam War. The photo shows a crowd of crying, screaming children, including a fully nude nine-year-old girl, running away from a napalm strike. At the time, Facebook had summarily banned all posts of the image, even by those protesting its removal from the site. In some cases, Facebook issued temporary site bans to users who had uploaded the image. The social media giant eventually relented and allowed those original posts to reappear as they had originally been posted.
Actor James Woods is an asshole. Let's just put that front and center. As you may recall, a little over a year ago, Woods sued a random Twitter user who went by the pseudonym "Abe List." "List" frequently mocked Woods, including calling him "clown-boy" and a "cocaine addict." Woods then sued for defamation, demanding $10 million, and tried to unmask List. This was ridiculous for any number of reasons, not the least of which is calling much more attention to what a thin-skinned jackass Woods is from anonymous Twitter users. But, more importantly, such hyperbolic statements in an internet forum are not defamation -- rhetorical hyperbole certainly doesn't meet the standard for defamation of a public figure. On top of that, trying to unmask an anonymous speaker is really, really sketchy, and there's a very high bar.
Oh, and did we mention that Woods himself has a long history of similar rhetorical hyperbole on Twitter, including making statements about others smoking crack?
As we are quite likely in some kind of golden age for pure snark, a golden age probably in part super-charged by these here internets, it would be nice if the general public likewise had a firm grasp on the protections afforded to us by free speech rights to partake in parody and mockery. Sadly, too often the targets of such parody would rather try to silence speech than address what might be legitimate concerns. But it's when government does so that any forgiveness for this should end, as government should be particularly aware both about the free speech rights in place regarding parody and of the consequences of trying to silence criticism in any sort of ham-fisted manner.
Which brings us to the city government of Atlanta, Georgia, which appears to be trying to apply trademark law to harass a comedian whose "City of Atlanta" parody page uses a city logo, with predictably laughable results. This episode started when Ben Palmer, a local comedian, became frustrated at the machinations of city government and started a parody Facebook page, adorning it with one of the city's official seals.
The Militant plans to challenge the impoundment of its Oct. 3 issue by New York State prison authorities at the Attica Correctional Facility.
The issue featured an article on the 1971 Attica prison rebellion titled, “Fight Continues 45 Years After Attica Rebels Said, ‘We Are Men, Not Beasts,’” as well as an article on several protest actions that took place in prisons in the U.S. this year demanding higher wages for labor and better conditions.
Prison officials claim that the front page and inside coverage “incite rebellion against government authority.”
Dozens of other periodicals published articles on the anniversary of the Attica rebellion, including the New York Times, Washington Post, Time magazine, Ebony magazine, the Rochester Democrat and Chronicle and the Wall Street Journal, along with widespread reports on television.
For better or worse, Milwaukee can claim to have one of the earliest and longest-lived censor boards, lasting several years after the Motion Picture Code ratings system was introduced. “Local censorship was pretty unique in terms of how they were able to build power when most of these boards were dying off,” Prigge says.
Ben Zimmer called the dissemination of Donald Trump’s recorded conversation with Billy Bush a “watershed moment in public profanity,” since major news outlets such as CNN and the New York Times presented Trump’s remarks without bowdlerization. Even Times subscribers who avoid the internet and cable news had to confront the words pussy and fuck on Page One, above the fold and before the jump, on their way to the Saturday crossword.
Today, the National Lawyers Guild (NLG), in conjunction with the ACLU of North Dakota, sent Freedom of Information Act (FOIA) and North Dakota Open Records Act requests to multiple state and federal agencies in response to the surveillance and arrests of the Native-led Water Protectors attempting to stop construction of the Dakota Access Pipeline (DAPL). In an affront to First Amendment rights, Water Protectors and allies have been continuously surveilled by low-flying planes, helicopters, and drones, and have had local cell phone communications jammed and possibly recorded. Dozens of local and out-of-state law enforcement have been called in, maintaining a heavily militarized presence at the site in an effort to intimidate activists and chill dissent.
A few weeks back, we wrote about the arrest of Harold Martin, an NSA contractor working at Booz Allen, for apparently taking "highly classified information" from the NSA and storing it electronically and physically in his home. There were a lot of questions about whether or not Martin was connected to the Shadow Brokers release of NSA hacking tools, though as more info comes out, it sounds like perhaps Martin was just found because of an investigation into Shadow Brokers, but not because he was connected to them. Soon after the arrest was made public (after being kept sealed for a little over a month), reports came out suggesting that Martin was basically a digital hoarder, but not a leaker (or a whistleblower).
And it's time for yet another story of copyright being used for out and out censorship. Remember Geofeedia? That's the creepy company that was selling its services to law enforcement agencies and school districts promising to spy on social media feeds to let law enforcement/schools know when people are planning bad stuff. After a big ACLU investigative report, basically all the major social media companies cut ties with Geofeedia, claiming that it was violating their terms of service. I'd imagine that the various law enforcement agencies and school districts who paid tens of thousands of dollars for this data may be asking for their money back.
So what does Geofeedia do? Well, for starters, it abuses the DMCA to try to take down information. The Daily Dot's Dell Cameron had actually written about how the Denver police spent $30k on Geofeedia back in September, a few weeks before the ACLU report dropped (nice scoop and great timing). Cameron then followed up with a detailed story following the ACLU report as well, noting that there were still plenty of other Geofeedia competitors on the market. At the end of that post, Cameron included a brochure that Geofeedia had apparently sent to a police department last year. But you can't see it now, because (yup) Geofeedia issued a DMCA takedown to Scribd, the company that was hosting it.
The French Constitutional Council has censored this morning the article of the 2015 French Surveillance Law on radio wave surveillance. Following a Priority Preliminary ruling on the issue of constitutionality (QPC) tabled by the Exegetes Amateurs (FDN Federation, FDN and La Quadrature du Net and the Igwan.net NGO), this is a clear victory for advocates of privacy against disproportionate surveillance promoted by Manuel Valls' government. La Quadrature du Net is glad with this decision which effects are to be applied immediately (although regretting the extended time given to the legislator to conform to this decision in the long term) and calls on all citizens concerned with civil rights to support the tireless judicial and technical work accomplished with our friends of FDN and the FDN Federation.
When Google announced its new Allo messaging app, we were initially pleased to see the company responding to long-standing consumer demand for user-friendly, secure messaging. Unfortunately, it now seems that Google's response may cause more harm than good. While Allo does expose more users to end-to-end encrypted messaging, this potential benefit is outweighed by the cost of Allo's mixed signals about what secure messaging is and how it works. This has significance for secure messaging app developers and users beyond Google or Allo: if we want to protect all users, we must make encryption our automatic, straightforward, easy-to-use status quo.
The new messaging app from Google offers two modes: a default mode, and an end-to-end encrypted “incognito” mode. The default mode features two new enhancements: Google Assistant, an AI virtual assistant that responds to queries and searches (like “What restaurants are nearby?”), and Smart Reply, which analyzes how a user texts and generates likely responses to the messages they receive. The machine learning that drives these features resides on Google’s servers and needs access to chat content to “learn” over time and personalize services. So, while this less secure mode is encrypted in transit, it is not encrypted end-to-end, giving Google access to the content of messages as they pass unencrypted through Google servers.
Allo’s separate “incognito” mode provides end-to-end encryption, using a darker background to distinguish it from the default mode. Messages sent in this mode are not readable on Google’s servers, and can be set to auto-delete from your phone after a certain period of time. The Assistant and Smart Reply features, which depend on Google having access to message content, don’t work in “incognito” mode.
If you’re already worried about the growth of the surveillance state, a new study may give you pause. Researchers from Georgetown Law’s Center on Privacy and Technology have found that half of Americans have photos in facial recognition networks used by law enforcement around the country—and many are likely unaware of it. The resulting report notes that the study is “the most comprehensive survey to date of law enforcement face recognition and the risks that it poses to privacy, civil liberties, and civil rights.”
Study authors Alvaro Bedoya, Jonathan Frankle and Clare Garvie queried more than 100 police departments across the nation over the course of a year to come to their conclusions. They found that more than 117 million adults—overwhelmingly law-abiding citizens of these United States—have pictures in these systems. Amassing such a large number of photos of American adults is a result of interagency collaboration. In addition to mugshot photos taken following arrests, “26 states (and potentially as many as 30) allow law enforcement to run or request searches against their databases of driver’s license and ID photos.” They also write that big-city police departments—Chicago, Dallas and Los Angeles among them—are looking into real-time recognition on live street surveillance cameras, which allow “police [to] continuously scan the faces of pedestrians walking by a street surveillance camera.”
A peculiar legal workaround might give federal authorities the right to access an individual's phone data.
Investigators in Lancaster, Calif., were granted a search warrant last May with a scope that allowed them to force anyone inside the premises at the time of search to open up their phones via fingerprint recognition, Forbes reported Sunday.
The government argued that this did not violate the citizens' Fifth Amendment protection against self incrimination because no actual passcode was handed over to authorities. Forbes was able to confirm with the residents of the building that the warrant was served, but the residents did not give any more details about whether their phones were successfully accessed by the investigators.
"I was frankly a bit shocked," said Andrew Crocker, a staff attorney at the Electronic Frontier Foundation (EFF), when he learned about the scope of search warrant. "As far as I know, this warrant application was unprecedented."
If local police showed up at your door requesting fingerprints and DNA samples, would you passively and unquestioningly comply? Or would you ask what crime you're suspected of committing and demand probable cause for making the request or proof of a search warrant?
The fact is, there's a 50 percent chance your photo is already part of a biometric database. And law enforcement agencies across the country are using facial recognition software to regularly search this "virtual lineup" with little to no regulation or limits, according to an eye-opening 150-page report, "The Perpetual Line-Up: Unregulated Police Face Recognition in America," published this week by the Georgetown Center on Privacy & Technology.
The European Supreme Court rules that the subscriber identity behind an IP address is personal data, making such data protected by privacy laws. However, the court rules in a very narrow context of a web site operator, and says that the protection of personal data takes second place to a so-called “legitimate objective”. This may be an important verdict for future case law, but right now, it looks rather narrow.
The European Court of Justice, the highest court in the EU, has ruled that the information about who was allocated a certain IP address at a certain time is personal data. This is a very important key word in European legislation, which means the data’s availability and use is protected by a mountain and a half of regulations and laws.
The case was brought to the European Court of Justice by Patrick Breyer, a Pirate Party MP in the German State Parliament of Schleswig-Holstein, who is also a lawyer. Mr. Breyer was suing the Federal Government of Germany to prevent them from storing and recording his every visit to federal authorities’ websites.
Since this summer, new users are now being tracked to Google’s fullest potential unless they opt-out. Google has bought many tech companies over the last few decades. One such purpose, in 2007, of DoubleClick, prompted many concerns. Google, which had the promising slogan “Do no evil,” back then, promised that they would not combine Google’s already monolithic stack of user internet browsing history data with new acquisitions such as DoubleClick. DoubleClick is an extensive ad network that is used on half of the Internet’s top 1 million most popular sites. Now, Now that DoubleClick’s data is available to Google, Google can easily build a complete profile of you, the customer. This profile could include name, search history, and keywords used in email, all of which will expressly be used to target you for advertising or handed over to the government at the drop of a rubber stamp.
After we published this story, Google reached out to say that it doesn’t currently use Gmail keywords to target web ads. We’ve updated the story to reflect that.
When Google bought the advertising network DoubleClick in 2007, Google founder Sergey Brin said that privacy would be the company’s “number one priority when we contemplate new kinds of advertising products.”
And, for nearly a decade, Google did in fact keep DoubleClick’s massive database of web-browsing records separate by default from the names and other personally identifiable information Google has collected from Gmail and its other login accounts.
But this summer, Google quietly erased that last privacy line in the sand – literally crossing out the lines in its privacy policy that promised to keep the two pots of data separate by default. In its place, Google substituted new language that says browsing habits “may be” combined with what the company learns from the use Gmail and other tools.
How do you solve a problem like blood-thirsty football hooligans? According to one Buenos Aires-based football club, just stick microchips in spectators’ arms and scan the bad apples away.
Back in April, first division club CA Tigre proposed surgically implanting microchips—or “passion tickets,” as they called them—into fans’ bodies to expedite their access to the stadium and curb violence during games. The initiative was rejected after a brief trial period, CA Tigre informed Motherboard, and though the club wouldn’t say why, we expect public outrage had something to do with it.
“Passion ticket allows fans to enter the stadium without anything else, just their passion for their team, and allows the club to maintain a trustworthy level of control over fans,” CA Tigre tweeted at the time to explain the initiative.
Imprisoned Saudi blogger Raif Badawi, whose public flogging in the kingdom last year generated a global outcry, now risks a new round of lashes, a co-founder of a Canadian foundation advocating his release said on Tuesday.
Evelyne Abitbol, who founded the Raif Badawi Foundation with Badawi's wife, said a "reliable source" in Saudi Arabia claims he faces a new flogging after being sentenced to 10 years imprisonment and 1,000 lashes in 2014 for breaking the kingdom's technology laws and insulting Islam.
Saudi embassy officials in Ottawa and Saudi government officials in Riyadh were not immediately available for comment.
Saudi blogger Raif Badawi is facing a new round of lashes, according to his supporters.
A Canadian foundation campaigning for his release said a “reliable source” in Saudi Arabia told them he faces a renewed threat of flogging.
The 32-year-old was handed 1,000 lashes and a ten-year jail term in 2014 for insulting Islam online.
When the youngster went to the showers, Amir A. allegedly followed him, pushed him into a toilet cubicle, and violently sexually assaulted him.
Following the attack, the accused rapist returned to the pool and was practising on the diving board when police arrived, after the 10-year-old raised the alarm with the lifeguard.
The child suffered severe anal injuries which had to be treated at a local children's hospital, and is still plagued by serious post-traumatic stress disorder.
In a police interview, Amir A. confessed to the crime; telling officers the incident had been "a sexual emergency", as his wife had remained in Iraq and he "had not had sex in four months".
I have just finished giving evidence to the Intelligence and Security Committee of Parliament on torture and extraordinary rendition. I am dashing off now and will give a fuller account later of what I said only. But I will just say that I was very happily surprised by how genuine the committee were, by the acuity of their questioning and by what was revealed of the general trend of their thinking. I perceived no hostility at all. I rather hope, and believe I have grounds to hope, that their eventual report will contain more of both truth and wisdom than is generally expected.
ACLU policy paper explains why detaining fewer immigrants must be part of the plan to stop using private prisons.
This August, the Justice Department made history when it announced that the Bureau of Prisons would curtail — and eventually end — its use of private prisons. As the Justice Department noted, this change was made possible by criminal justice reforms that reduced its prison population. Now the ACLU is releasing a policy paper that calls on the Department of Homeland Security to follow suit by reducing its detention population and then ending its own use of private prisons.
The paper, “Shutting Down the Profiteers: Why and How the Department of Homeland Security Should Stop Using Private Prisons,” provides a concrete plan for how ICE can and should phase out its reliance on private prisons. The number of immigrants in detention has skyrocketed in the past two decades, and without these unnecessary detentions, there would be no need for private prison beds. The paper describes the human toll of over-detention and privatization and lays out ICE’s dangerously close relationship with the private prison industry.
I’ll unpack the Constitutional issues in a bit, but first, the technology. Michigan State University professor who holds six U.S. patents for fingerprint recognition technology was asked by police to help catch a murderer. The cops scans of the victim’s fingerprints and thought that unlocking his phone might provide clues as to who killed him.
On any given day in the United States, at least 137,000 people sit behind bars on simple drug-possession charges, according to a report released Wednesday by the American Civil Liberties Union and Human Rights Watch.
Nearly two-thirds of them are in local jails. The report says that most of these jailed inmates have not been convicted of any crime: They're sitting in a cell, awaiting a day in court, an appearance that may be months or even years off, because they can't afford to post bail.
"It's been 45 years since the war on drugs was declared, and it hasn't been a success," lead author Tess Borden of Human Rights Watch said in an interview. "Rates of drug use are not down. Drug dependency has not stopped. Every 25 seconds, we're arresting someone for drug use."
While we cover a lot of silly intellectual property disputes here, none has the potential to upend our society into a circus of hilarious litigious stupidity as much as publicity rights do. This barely-arrived form of intellectual property has been the star of all kinds of legal insanity, with one needing only to note its use by such upstanding denizens of our reality as Lindsay Lohan and the brother of Pablo Escobar. But I have to admit I had reserved a special place in my humor-heart for Harris Faulkner, the Fox News anchor that sued toy-maker Hasbro for making a a hamster figurine that shared her name. Because the sharing of a name isn't sufficient to arise to a publicity rights violation, the IRL-non-hamster-Faulkner had to claim that the ficticious-hamster-Faulkner also borrowed from her physical likeness, an argument which her legal team actually made. As a reminder, here are images of both.
The purpose of registered trademarks is to protect people. When you buy a bottle of Club-Mate, the trademark affords you some certainty that what you’re buying is the product you already know and love and not that of a sneaky impostor. But when the U.S. Patent and Trademark Office (USPTO) issues overly broad or generic trademarks, those trademarks do just the opposite: they can expose us to the risk of legal bullying. One recent round of bullying over a trademark on “invisible disabilities” has shown how a bad trademark can even be used to threaten people’s right to assemble and express themselves online.
It started in late 2015 when a group called Invisible Disability Project (IDP) applied for a trademark on its name. A lawyer representing the Invisible Disabilities Association (IDA) sent IDP a letter threatening to sue it over the use of the term “invisible disability.” (IDA had received a trademark on the term in 2013). In July 2016, IDA used Facebook’s trademark report form to have IDP’s Facebook page—the main place where IDP’s members and supporters congregate—taken down. IDA even registered the domain names invisibledisabilityproject.com and .net and directed visitors to those sites to its own website.
Government officials and representatives from anti-piracy outfits from the United States, Europe and Russia met up in Brussels this week. The roundtable, “Combating Internet Piracy: International Practice”, focused on the need for international cooperation and the strengthening of copyright legislation.
With the Internet and therefore online piracy having developed into a truly global phenomenon, anti-piracy groups everywhere are expanding their reach.
What was once a semi-isolated affair has become a multi-agency, cross-continent operation, with governments and rights holders alike striving to share information and pool resources.
Birgitta Jónsdóttir is a poet, a Web developer and a former WikiLeaks activist. She’s also founder and leader of Iceland’s Pirate Party, which has been at or near the top of polls ahead of national elections Oct. 29.
Washington Post London Bureau Chief Griff Witte sat down with Jónsdóttir for an interview at her office in Reykjavik on Oct. 19. The following are excerpts from their conversation.
Cisco says it has developed a system to disable live pirate streams . The network equipment company says its Streaming Piracy Prevention platform utilizes third-party forensic watermarking to shut down pirate streams in real-time, without any need to send takedown notices to hosts or receive cooperation from third parties.
Welp, it looks like another bad day for Team Prenda. The law firm that went around uploading its own porn films and then shaking down people on the internet has had a bad few years in terms of courts blasting them for abusing the court system and ordering them to pay up for all sorts of awful things. Every few weeks it seems like we read about another loss for John Steele and Paul Hansmeier (the third "partner" in this mess, Paul Duffy, passed away). The latest is not only a pretty big hit, it's also a complete "own goal" by Team Prenda. This one wasn't in one of their crappy shakedown lawsuits where a defendant hit back. No, this was in the case where Prenda tried to sue all of its critics for defamation in both Illinois and Florida. The Florida case, filed by John Steele, was quickly dismissed once Steele realized it broke all kinds of rules. But the Illinois cases moved forward. There was some bouncing around between state and federal court, before the case was dismissed and some sanctions were added.
After a few years suing Internet users over piracy claims, the lawyers behind the Prenda law copyright-trolling operation had made millions. But beginning in 2013, they were hit with repeated sanctions from federal judges. Now, their careers are in shambles—Paul Hansmeier had his law license suspended, John Steele is facing a bar complaint, and both may be facing an FBI investigation. (A third lawyer who was involved, Paul Duffy, passed away last year.)
Even as their scheme collapses, they continue to be hit with sanctions. This week, Hansmeier and Steele got hit with a big one. US District Judge John Darrah oversaw litigation related to one of Prenda's most audacious moves—their defamation lawsuit against their critics. They sued Steele's former housekeeper, Alan Cooper, and his lawyer, Paul Godfread, for accusing Steele of identity theft. For good measure, they also sued anonymous blog commenters who called Prenda attorneys "brain-dead" and "assclowns."