Bonum Certa Men Certa

Links 29/09/2022: Linuxfx 11.2 and Progress on GNOME 43

  • GNU/Linux

    • Desktop/Laptop

      • GamingOnLinuxSystem76 gives the Oryx Pro a big refresh with an OLED 4k display

        The Linux flagship NVIDIA laptop from System76 has been given a major overhaul, making it something of a beast. Pricey though, with you needing to dig deep into your wallets with a base price of $2,199.

      • Unicorn MediaSystem76 Upgrades Its Oryx Pro Linux Laptops

        The July upgrade also brought the option for purchasers to configure Oryx Pro with either NVIDIA RTX 3070 Ti with 6144 CUDA Cores or NVIDIA RTX 3080 Ti with 7424 CUDA Cores dedicated graphics cards, configured so that users can switch between the laptop’s integrated Intel GPU and the dedicated NVIDIA graphics directly through the graphics profiles in Pop!_OS, the Linux distribution that System76 builds in-house, and which is installed by default on its machines (although purchasers can opt for the latest and greatest LTS Ubuntu release if they wish).

      • Real Linux UserComing soon - my book Linux for the rest of us - Real Linux User

        In recent blog posts, I have hinted that I have been writing my own book for quite some time. My goal for this book has always been, much like through this website, to bring Linux closer to normal users by providing easy-to-understand tutorials and background information in an accessible way. Because of the many articles I have written for, I had a lot of material at my disposal as a good foundation for writing this book. And now it is almost time that, after about 2 years of research and writing, I can proudly share that I have completed my book.

        In the coming weeks, my book “Linux for the rest of us” will be available through Amazon KDP in paperback and Kindle eBook format. I am now busy with the final preparations and administrative actions to be able to publish the book. In approximately 370 pages in 6 by 9 inches format, the book helps novice Linux users, doubters, and potential switchers, to understand what Linux is, what choices to make and how, to properly choose the right distribution, where to find Linux distributions, how to create a Linux live USB media, how to make sure you have a secure download to start with, how to install Linux, how to get the system working optimally for different hardware types, how to find and install beautiful applications, and it also offers many more interesting topics that will help you further in your Linux journey. The book will help anyone who is not really interested in the most in-depth technical aspects but wants to use a computer for productive purposes, to understand, set up, and use their new Linux system in an effective way, according to a logical step-by-step approach.

    • Audiocasts/Shows

    • Kernel Space

      • Linux 0.0.1 compiling on Ubuntu 64

        You might need some packages first

      • Data SwampAvoid Linux locking up in low memory situations using earlyoom

        Within operating system kernels, at least for Linux and the BSDs, there is a mechanism called "out of memory killer" which is triggered when the system is running out of memory and some room must be made to make the system responsive again.

        However, in practice this OOM mechanism doesn't work well. If the system is running out of memory, it will become totally unresponsive, and sometimes the OOM killer will help, but it may take like 30 minutes, but sometimes it may be stuck forever.

        Today, I stumbled upon a nice project called "earlyoom", which is an OOM manager working in the user land instead of inside the kernel, which gives it a lot more flexibility about its actions and the consequences.

    • Graphics Stack

      • GamingOnLinuxNVIDIA put out new Vulkan Beta Driver with Vulkan Video updates

        NVIDIA has released a new version of their Vulkan Beta Driver, with new extensions supported and updates to their support of the newer Vulkan Video. What is Vulkan Video? It's the attempt to add in hardware accelerated video compression and decompression into the Vulkan API.

    • Applications

      • Linux LinksBest Free and Open Source Alternatives to Apple Photo Booth - LinuxLinks

        Photo Booth is a software application for taking photos and videos with an iSight camera. iSight is a brand name used by Apple to refer to cameras on various devices. The software offers live filters and the ability to replace backgrounds.

        Photo Booth is not available for Linux. We recommend the best free and open source alternatives.

    • Instructionals/Technical

      • UNIX CopHow To Install KeePassXC on Ubuntu 20.04 | 22.04 LTS

        In this guide, we will show you how to install KeePassXC on Ubuntu systems.

        KeePassXC is a free and open-source password manager. It started as a community fork of KeePassX (itself a cross-platform port of KeePass).

      • Linux CapableHow to Install Code::Blocks IDE on Fedora 36 Linux

        Code::Blocks is free and open-source software highly extensible Integrated Development Environment (IDE) for the C, C++, and Fortran programming languages. It features support for a wide range of compilers, parallel builds, and multi-target projects and also provides an interface with GNU GDB. The code editor in Code::Blocks features syntax highlighting, code folding, a tabbed interface, code completion, a class browser, and smart indenting.

        In the following tutorial, you will learn how to install Code::Blocks on Fedora 36 Linux desktop with either DNF or Flatpak package manager using the command line terminal and instructions on how to update and remove the software in the future if required.

      • CitizixHow to Setup Metabase and Nginx to proxy traffic on Rocky Linux 9

        Metabase is an open-source business intelligence tool. Metabase lets you ask questions about your data, and displays answers in formats that make sense, whether that's a bar chart or a detailed table. You can save your questions, and group questions into handsome dashboards.

      • markaicode by MarkHow to Modify Ban Time Fail2ban | Mark Ai Code

        Fail2ban is an open-source log parsing program that guards against brute-force assaults on your system. It parses log files and blacklists IP addresses with a high number of authentication failures.

        This commonly happens when a person tries to log in through trial and error. Fail2ban then takes action, such as modifying the firewall rules to ban that IP address for a set amount of time, which is usually 10 minutes or 600 seconds. To avoid locking off innocent users who may have frequently mistyped their passwords, the blocked IP address is automatically unbanned after 10 minutes.

        This post will teach you how to adjust the ban time in fail2ban and, if desired, how to permanently ban an IP address.

      • UNIX CopHow To Install OpenToonz on Ubuntu 20.04 | 22.04 LTS

        OpenToonz is a 2D Animation Program based off of Toonz Developed by Digital Video in Italy. It’s open source animation production software to develop and create all together.

        OpenToonz has been customized by Studio Ghibli, and used for the creation of its works for many years. Dwango has launched the OpenToonz project in cooperation with Digital Video and Studio Ghibli.

      • UNIX CopHow To Install Peek on Ubuntu 20.04 | 22.04 LTS

        In this tutorial, we will show you how to install Peek in Ubuntu systems.

        Peek is a computer software program for Linux to create simple animated GIF file based on the GIF89a file format. A screencast is created from a user-defined screen area. Peek is optimized for generating animated GIFs, but can also directly record to WebM or MP4.

        Peek is not a general purpose screencast app with extended features but rather focuses on the single task of creating small, silent screencasts of an area of the screen for creating GIF animations or silent WebM or MP4 videos.

      • UNIX CopHow To Install Code Blocks on Ubuntu 20.04 | 22.04 LTS

        Code::Blocks is a free, open-source cross-platform IDE that supports multiple compilers including GCC, Clang and Visual C++. It is developed in C++ using wxWidgets as the GUI toolkit. Using a plugin architecture, its capabilities and features are defined by the provided plugins. Currently, Code::Blocks is oriented towards C, C++, and Fortran. It has a custom build system and optional Make support.

      • UNIX CopInstall OpenShot on Ubuntu 20.04 | 22.04 LTS

        In this guide, we will show you how to install OpenShot on Ubuntu systems

        OpenShot Video Editor is a free and open-source video editor for Windows, macOS, Linux, and Chrome OS. The project started in August 2008 by Jonathan Thomas, with the objective of providing a stable, free, and friendly to use video editor.

        The program supports Windows, macOS, and Linux ever since version 2.1.0 (released in 2016). OpenShot added support for Chrome OS in version 2.6.0 (released in 2021). There is an unofficial portable version beginning in 2020.

      • Its FOSSHow to Use Picture in Picture Mode in Brave Browser

        Brave is an excellent Chrome-like and yet Chrome alternative web browser.

        Firefox and Brave are two browsers I like using on my Linux system. Both have different advantages.

        There is one thing that Firefox does better than Brave and it is the picture-in-picture (PIP) mode that works on YouTube, Netflix and most streaming sites.

        Brave too has picture-in-picture mode but it’s so hidden that you feel like there is no PIP support at all.

        The built-in picture-in-picture works on some websites (like YouTube) but may not work on others (like Prime Video). Worry not! you can use a dedicated extension for that.

        Let me show both methods in this tutorial.

      • List all packages in Ubuntu/Debian that no package depends on
      • RoseHostingHow to install and Secure Redis on Ubuntu 22.04 - RoseHosting

        In this tutorial, we are going to explain in step-by-step detail how to install and secure Redis on Ubuntu 22.04.

        Redis is a shortcut for a remote dictionary server and an in-memory data structure store. It is used as an option for a distributed in-memory key-value database with durability. Redis server is written in C language and supports a huge range of data types such as strings, hashes, lists, and many more.

        Installing and securing Redis on Ubuntu 22.04 is a straightforward process that may take up to 15 minutes. Let’s get things working!

      • Jay LittleThe Siren Song of Set It and Forget It

        The truth is I work with a lot of clients, many of which should know better, whom rely almost exclusively on legacy applications, operating systems and platforms to handle their work on a day to day basis. What makes matters worse is that these legacy tools have been integrated into workflows that they now consider to be sacrosanct despite the fact that over the last decade or two, far superior and far more efficient replacements have been developed.

        But replacing these tools generally requires that end users change or adapt their workflows and they really don't want to do that as I discussed back in 2021's post "Spock Was Wrong: In Tech is is Easier to Create than to Destroy": [...]

      • uni TorontoReaching past our firewalls with WireGuard (some thoughts)

        The appeal of WireGuard for this is that it's a lightweight service that requires little configuration or operation, and is now supported across all of our Ubuntu fleet. This creates two obvious options, depending on how much work we want to do on these external machines. The first option is to run WireGuard in a non-routed, "point to point" mode on each of the internal machines that have services we want to provide access to. The internal machine would expose its service(s) on an private WireGuard network as well as its normal IP address (in many cases this requires no service changes), and external machines would reach the service by talking to the internal machine's private WireGuard IP address. The one drawback to this is that it requires configuring each external machine to use the appropriate magic WireGuard IPs for these services, instead of the hostnames we normally use.

      • Manuel MatuzovicDay 2: logical properties

        Logical properties are a new way of working with directions and dimensions, one that allows you to control layout through logical, rather than physical mappings. This is especially useful, if you’re dealing with websites that are presented in different languages and writing modes, like right-to-left.

      • Manuel MatuzovicDay 3: logical property shorthands

        If you use a shorthand property like margin with all 4 values, the properties will always be applied in the direction top - right - bottom - left, no matter the reading direction.

      • Matt RickardSimple Group Theory

        The formal definition of a group and a short proof: A group is a set G with a binary operation on G that satisfies these four axioms1:

        Associativity: For all a,b,c in G (a ● b) ● c = a ● (b ● c)

        Identity: There exists an element e in G such that, for each a in G e ● a = a and a ● e = a

        Inverse: For each a in G there exists an element b in G such that a ● b = e and b ● a = e, where e is the identity element.

        Closure: For each a, b in G, a ● b and b ● a are contained in G.

      • Linux HandbookGetting Started With Rootless Container Using Podman

        Are you deploying software using containers? Are you using Podman? Do you want to up your security game by running containers with as little privilege as possible? Boy, do I have an article for you!

      • ID RootHow To Install Audacity on Fedora 36 - idroot

        In this tutorial, we will show you how to install Audacity on Fedora 36. For those of you who didn’t know, Audacity is a free and open-source digital audio editor and recording application. The software includes many features that allow users to edit and record quickly, mix audio files, and support a variety of audio file formats, as well as VST plug-ins. It is available for Windows, macOS, Linux, and other Unix-like operating systems

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Audacity audio editor on a Fedora 36.

      • HowTo ForgeHow to Install Docker Swarm on Debian 11

        Docker Swarm is a container orchestration built on Docker Engine. It allows you to create and deploy a cluster of Docker nodes with multiple servers.

      • ByteXDHow to Transfer Files from a Remote Server to Local Machine - ByteXD

        This tutorial walks you through transferring files from a remote server to a local machine using...

      • Linux Made SimpleHow to install Scartchin' Melodii on a Chromebook

        Today we are looking at how to install Scartchin' Melodii on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Linux.orgTCP/IP Basics by Math |

        The TCP/IP Protocol is essential for accessing the Internet. This is the only protocol used for the Internet, so it is important to have some understanding.

        Before we get to the math, let’s look at some basics.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Nate GrahamKDE: Making it easier to submit bug reports

           A persistent complaint KDE faces is that it’s too hard to submit bug reports. One obstacle was the giant scary list of products at Well, no longer! This page is now organized into logical categories with user-friendly text, so it should be much easier to find the right place for your bug report if that’s your entry point. This has been rolled out already and is available immediately...

          There are also other entry points; for example all KDE apps have a “Report a bug” menu item that will take you to the right place automatically. However two prominent ones did not: System Settings and Plasma. In System Settings, the menu item took you to the generic product, not the specific component for the page you’re on. And Plasma had no functionality like this at all.

      • GNOME Desktop/GTK

        • Progress Update For GNOME 43 - Chris’s Design - Development

          GNOME 43 is out the door now, and I want to use this post to share what I’ve done since my post about my plans.


          Since my post in April, Loupe has received many changes. Allan Day provided a new set of mockups for me to work from, and I’ve implemented the new look and a sidebar for the properties. There are some open questions about how the properties should be shown on mobile sizes, so for now Loupe doesn’t fit on phones with the properties view open.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Linuxiac5 Best Free Self-Hosted Music Streaming Software

      This article shows you the five best music streaming services you can install for free and fully control your music collection.

      If you’re a music lover looking for free and open-source music server software to build your own self-hosted live streaming audio server for your extensive music collection, you’ve come to the right place.

      Setting up your own music server with media server software is simple. But services like Spotify already offer similar functionality. So, why build your own?

    • Jussi PakkanenNibble Stew: "Why is it that package managers are unnecessarily hard?" - or are they?

      At the moment the top rated post in In the C++ subreddit is Why is it that package managers are unnecessarily hard?. The poster wants to create an application that uses fmt and SDL2. After writing a lengthy and complicated (for the task) build file, installing a package manager, integrating the two and then trying to build their code the end result fails leaving only incomprehensible error messages in its wake.

      The poster is understandably frustrated about all this and asks a reasonable question about the state of package management. The obvious follow-up question, then, would be whether they need to be hard. Let's try to answer that by implementing the thing they were trying to do from absolute scratch using Meson. For extra challenge we'll do it on Windows to be entirely sure we are not using any external dependency providers.

    • James Bottomley: Paying Maintainers isn’t a Magic Bullet

      Open Source is often portrayed as a “disrupter” of the market, but it’s not often appreciated that a huge part of that disruption is value destruction. Consider one of the older Open Source systems: Linux. As an operating system (when coupled with GNU or other user space software) it competed in the early days with proprietary UNIX. However, it’s impossible to maintain your margin competing against free and the net result was that one by one the existing players were forced out of the market or refocussed on other offerings and now, other than for historical or niche markets, there’s really no proprietary UNIX maker left … essentially the value contained within the OS market was destroyed. This value destruction effect was exploited brilliantly by Google with Android: to enter and disrupt an existing lucrative smart phone market, created and owned by Apple, with a free OS based on Open Source successfully created a load of undercutting handset manufacturers eager to be cheaper than Apple who went on to carve out an 80% market share. Here, the value isn’t completely destroyed, but it has significantly reduced (smart phones going from a huge margin business to a medium to low margin one).

      All of this value destruction is achieved by the free (as in beer) effect of open source: the innovator who uses it doesn’t have to pay the full economic cost for developing everything from scratch, they just have to pay the innovation expense of adapting it (such adaptation being made far easier by access to the source code). This effect is also the reason why Microsoft and other companies railed about Open Source being a cancer on intellectual property: because it is. However, this view is also the product of rigid and incorrect thinking: by destroying value in existing markets, open source presents far more varied and unique opportunities in newly created ones. The cardinal economic benefit of value destruction is that it lowers the barrier to entry (as Google demonstrated with Android) thus opening the market up to new and varied competition (or turning monopoly markets into competitive ones).

    • DizietHippotat (IP over HTTP) - first advertised release

      The result is that, in practice, currently Hippotat has to be built with (a) a reasonably recent Rust toolchain such as found in Debian unstable or obtained from Rust upstream; (b) dependencies obtained from the upstream Rust repository.

    • Web Browsers/Web Servers

    • SaaS/Back End/Databases

      • PostgreSQLPostgreSQL: PostgreSQL Anonymizer 1.1: Privacy By Default For Postgres

        PostgreSQL Anonymizer is an extension that hides or replaces personally identifiable information (PII) or commercially sensitive data from a PostgreSQL database.

        The extension supports 3 different anonymization strategies: Dynamic Masking, Static Masking and Anonymous Dumps. It also offers a large choice of Masking Functions such as Substitution, Randomization, Faking, Pseudonymization, Partial Scrambling, Shuffling, Noise Addition and Generalization.

      • Linux HintData Visualization Tools for SQL

        SQL is a high-in-demand programming language used in domains like business analytics to interact with relational data. Professionals widely use it for tasks such as data manipulation, data analysis, and data visualization.

        Interacting with data is one thing, but to be able to translate that data into meaningful information is a challenge in itself.

        Data visualization is the art of converting information from data into visual contexts to make it easier and understandable for the human brain. Data visualization may include creating maps, graphs, and charts so that it is easy to pull meaningful insights from the data.

      • Stacey on IoTSurprise! People are shelling out for IoT subscriptions

        IFTTT, which lets users link connected devices and web services to other connected devices and web services, has achieved $6 million in annual recurring revenue from 150,000 subscribers two years after it announced a subscription plan. Linden Tibbets, the CEO and co-founder of IFTTT, told me the company has reached break even on its revenue and that, going forward, it plans to focus solely on paid subscriptions from users.

    • Education

      • Walled CultureWalled Culture, the book, now freely available: what that means, and how you can help

        Much of the book draws on the interviews that have appeared on the blog over the last year, and on blog posts. But it is supplemented by a huge array of additional material. Testimony to that are the book’s 750 references to further information online. For all the digital versions, there are live hyperlinks to allow readers to check details and pursue further research on topics and ideas of interest.

    • Programming/Development

      • Linux HintBreak Statement in C

        “To remove the program control from the loop, we utilize the C language term “break.”The loop’s iterations cease as immediately after the break statement is detected inside the loop, and control is instantly handed onto the first statement following the break.

        In this tutorial, we will practically implement the break statement to execute various example codes in C.”

      • Linux HintHow to Declare Variables in C

        “A variable is simply a name that is assigned to a storage space so it will be easy for users to access or read in the program. The size, layout of a variable’s memory, and the range of values or set of different operations that can be implemented on the variable are all recognized by the type of variable, and each variable is unique in C programming language. It is understandable that the variable declared in a program can be edited anywhere in the code. You can assign the variable names as any number, letter, or character. Because C is a case-sensitive language, so the uppercase and lowercase characters are separate.

        C programming language allows us to define various data types such as Integer, float, char, string, etc., which we will learn with various examples.”

      • Light Blue TouchpaperTalking Trojan: Analyzing an Industry-Wide Disclosure

        Talking Trojan: Analyzing an Industry-Wide Disclosure tells the story of what happened after we discovered the Trojan Source vulnerability, which broke almost all computer languages, and the Bad Characters vulnerability, which broke almost all large NLP tools. This provided a unique opportunity to measure software maintenance in action. Who patched quickly, reluctantly, or not at all? Who paid bug bounties, and who dodged liability? What parts of the disclosure ecosystem work well, which are limping along, and which are broken?

      • TeX

        • Linux HintHow to Make a Multiline Equation in LaTeX

          Sometimes, we need to break some long equations in a document into multiple lines to make it easy to understand. In lengthy derivations, breaking the equations is essential to explain everything step by step.

          That’s why LaTeX also provides some ways to break the equations. Still, many new users don’t know how to create multiline equations. In this tutorial, we will give you a complete information on how to write the multiline equations in LaTeX.

        • Linux HintHow to Underline a Text in LaTeX

          Underlining a text is not limited to only showing a website hyperlink. We underline a text to make the reader notice some specific words in a document. Underlined text attracts the reader’s attention to it. If you write any technical paper, underlining a text can highlight it for the readers.

          That’s why LaTeX provides a simple way to highlight the text. However, many users don’t know the ways to underline a text. If you want to learn the approach to underlining a text, read this tutorial thoroughly.

        • Linux HintHow to Use a Box Text in LaTeX

          A text box can be useful when you want to move a text around in the document. It can emphasise the specific text on a research paper. We can use the \makebox to create a boxed text on a page in LaTeX.

          However, many LaTeX users are still unaware of the ways to add a boxed text in the technical document. If you don’t know how to do it, read this tutorial thoroughly. We will explain the various ways to add and use a boxed text in LaTeX.

        • Linux HintHow to Write and Use a Floor Symbol in LaTeX

          Mathematically, the floor function is denoted by the floor ⌊x⌋ symbol and the floor (x). The shape of the floor symbol looks like a square bracket ⌊x⌋ with no tops. From programming to mathematics, the floor symbol plays a vital role in showing a specific function.

          Many users add the floor function while creating the technical document in any document processor. However, a floor function requires the correct use of the source code to create it. If you want to learn how to write and use a floor symbol in LaTeX, this tutorial is for you. Let’s get started!

      • Python

        • Linux HintFibonacci Numbers in Python Language

          Fibonacci numbers are a particular sequence where the first value is pre-declared as 0 and the second value is pre-declared as 1. The rest of the numbers are produced from these two by adding the previous two numbers. All Fibonacci numbers are positive integers, beginning from 0.

        • AdafruitICYMI Python on Microcontrollers Newsletter: Retrofitting old computers, Pinguin and much more! #CircuitPython #ICYMI @micropython @Raspberry_Pi

          In about a month, there will be a new yearly release of Python: version 3.11. The main feature for this version is a significant increase in speed. People are testing the new version and their results are stunning. Extrapolating keeping at this pace, Python 3.14 will be faster than C++. To be exact, the loop time will be -0.232 seconds, so it will be done just before you want to do the calculation – Towards Data Science.

        • Nicholas Tietz-SokolskyRounding in Python

          In software engineering, there are two principles that often come into conflict. The first one is the principal of least surprise. The second one is doing the right thing. These come into conflict when the usual thing that people do is in fact the wrong thing. A particular example of this is the behavior of rounding.

          In school we were taught that rounding is always done in one particular way. When you round a number it goes toward the nearest hole number, but if it ends in 5, than it goes toward the higher one. For example, 1.3 rounds to 1, and 1.7 rounds to 2. And we were taught that 1.5 rounds to 2, and 2.5 goes to 3.

          Because this is the way that we were taught rounding works, it can be quite surprising when rounding works differently. In fact, there are a number of different ways to round numbers. The Wikipedia article on rounding gives no fewer than 14 different methods of rounding. Fortunately, with computers, we expect fewer: The IEEE 754 standard for floating point numbers defines five rounding rules.

      • Java

        • Alexandru NedelcuThe Trouble with Checked Exceptions: Part 2

          Java’s Checked Exceptions are problematic, and it’s not due to their ergonomics, but rather because they are in conflict with abstraction and OOP. Also, few people care about typed exceptions (unless they are happy path results, not errors).

      • Rust

  • Leftovers

    • HackadayMining And Refining: Sulfur

      When you think of the periodic table, some elements just have a vibe to them that’s completely unscientific, but nonetheless undeniable. Precious metals like gold and silver are obvious examples, associated as they always have been with the wealth of kings. Copper and iron are sturdy working-class metals, each worthy of having entire ages of human industry named after them, with silicon now forming the backbone of our current Information Age. Carbon builds up the chemistry of life itself and fuels almost all human endeavors, and none of us would get very far without oxygen.

    • HackadayThe 1337 PNG Hashquine

      A hashquine is a fun way to show off your crypto-tricks — It’s a file that contains its own hash. In some file types it’s trivial, you just pick the hash to hit, and then put random data in a comment or other invisible field till you get a collision. A Python script that prints its own hash would be easy. But not every file type is so easy. Take PNG for instance. these files are split into chunks of data, and each chunk is both CRC-32 and adler32 checksummed. Make one change, and everything changes, in three places at once. Good luck finding that collision. So how exactly did [David Buchanan] generate that beautiful PNG, which does in fact md5sum to the value in the image? Very cleverly.

    • Telex (Hungary)Hungarian girl completes most brutal trail in the United States
    • Science

      • HackadayAI Dreaming Of Time Travel

        We love the intersection between art and technology, and a video made by an AI (Stable Diffusion) imagining a journey through time (Nitter) is a lovely example. The project is relatively straightforward, but as with most art projects, there were endless hours of [Xander Steenbrugge] tweaking and playing with different parts of the process until it was just how he liked it. He mentions trying thousands of different prompts and seeds — an example of one of the prompts is “a small tribal village with huts.” In the video, each prompt got 72 frames, slowly increasing in strength and then decreasing as the following prompt came along.

      • Democracy NowAsteroid Diversion? Earth Is Still “Careening Headlong into Climate Catastrophe,” Says NASA Scientist

        NASA successfully crashed a robotic spacecraft into an asteroid this week, a first-of-its-kind test of technology that could prevent a comet or asteroid from hitting the Earth, though the chances of such a catastrophe are low. We speak with NASA climate scientist Peter Kalmus, who calls the successful mission “bittersweet.” “We’re doing these amazing missions like redirecting asteroids, and yet with all that technology, with all that knowledge, somehow it’s not translating into stopping what is clearly the biggest threat facing humanity, which is global heating,” says Kalmus.

      • Omicron LimitedArtificial intelligence reduces a 100,000-equation quantum physics problem to only four equations

        The formidable problem concerns how electrons behave as they move on a gridlike lattice. When two electrons occupy the same lattice site, they interact. This setup, known as the Hubbard model, is an idealization of several important classes of materials and enables scientists to learn how electron behavior gives rise to sought-after phases of matter, such as superconductivity, in which electrons flow through a material without resistance. The model also serves as a testing ground for new methods before they're unleashed on more complex quantum systems.

    • Education

      • TruthOutLos Angeles Teachers Are Burned Out and Priced Out of Living in Their City
      • The Telegraph UKInside the dark world of student sex work

        University students have been supporting their studies with sex work for decades. Jay-Z rapped about ‘chicks wishin’ they aint have to strip to pay tuition’ in Hard Knock Life in 1998 (the year tuition fees were first introduced in the UK). Belle de Jour (Brooke Magnanti), a research scientist, wrote a best-selling book, The Intimate Adventures of a London Call Girl, in 2005, about her secret life as an escort after she ran out of money in the final stages of her PhD thesis at Sheffield University.

        But the subject really came to the fore last November when Durham University was identified as offering training sessions to support students involved in sex work.

    • Hardware

      • CNETWhat Intel Learned When an Elevator Smashed Into Its Supercomputer Chips

        He didn't say how many were ruined, but the loss stung because they were initial samples used to test performance and look for problems. "Every one of them at that stage is expensive," Koduri said in an interview. With hundreds of manufacturing steps, it takes months to make a single advanced chip.

        The elevator door wasn't just a one-off bummer. It actually revealed a problem that stood in the way of Intel's effort to reclaim its processor manufacturing leadership: human error.

      • Andre Alves GarziaThe appeal of small computers

        I just read an article about the MNT Pocket Reform at the IEEE Spectrum website and the comments about it at HN. Often when I dive deep into threads about small devices, my attention is drawn to bad comments. People asking who would want such device?, or $SOME_PAST_DEVICE did it first and failed, etc. You get the gist: people projecting their dislike about someone else’s vision disguised as unquestionable facts.

      • HackadayRecycling Junk E-tags Into A LoRaWAN AQI Sensor

        [Aduecho] had seen those cheap eBay deals of e-paper-based pricing tags, and was wondering if they could be hacked to perform some other tasks. After splitting the case open, the controller chip was discovered to be a SEM9110, with some NFC hardware support but little else. [aduecho] was hoping to build some IoT-connected air quality indicator (AQI) units€ but the lack of a datasheet for SEM9110 plus no sensors in place meant the only real course of action was to junk the PCB and just keep the E-paper display and the batteries. These units appeared to be ‘new old’ stock, so there was a good chance that both would be fresh and ripe for picking.

      • HackadayThe First Microcomputer: The Q1

        Quiz time, what was the first commercially available microcomputer? The Altair 8800? Something obscure like the SCELBI? The Mark-8 kit? According to [The Byte Attic], it was actually the Q1, based on the Intel 8008 processor. The first Q1 microcomputer was delivered in December of 1972, making it the first, as far as he can tell. Later revisions used the Z80 processor, which is the model pictured above that [The Byte Attic] has in his possession. It’s a beautiful little machine, with a striking orange plasma display.

      • HackadayA Look Inside An Old-School Synchroscope

        There’s nothing quite like old-school electrical gear, especially the stuff associated with power distribution. There’s something about the chunky, heavy construction, the thick bakelite cases, and the dials you can read from across the room. Double points for something that started life behind the Iron Curtain, as this delightful synchroscope appears to have.

    • Health/Nutrition/Agriculture

    • Pseudo-Open Source

    • Security

      • KritaOnly Download Krita From Trusted Places

        Third party download sites are outside our control, and can be compromised!

      • Never-before-seen malware has infected hundreds of Linux and Windows devices [Ed: So the problem is bad passwords and stolen keys, not "Linux"]

        SSH infections using password brute-forcing and stolen keys also allow Chaos to spread from machine to machine inside an infected network.

      • IT WireOptus CEO's spin not exactly the best way to handle breach

        One wonders what exactly drove Optus chief executive Kelly Bayer Rosmarin to front a media session last Friday, in a bid to spin her way through a damaging development at the telco.

        Had she been proficient in the technical aspects of data breaches and was willing to level with people, then it may have done a world of good. Or she could have brought along a technically competent person and let him/her explain things correctly.

        But Bayer Rosmarin tried to paint the breach as a sophisticated attack, something that even a politician like Home Affairs Minister Clare O'Neil was able to shoot it down.

      • The Hill[Crackers] breach tech magazine, send racist push notifications to iPhones

        [Attackers] breached the content management system of Fast Company, a monthly business and tech magazine, on Tuesday evening.

        The [crackers] reportedly sent two obscene and racist push notifications to followers of the magazine in Apple News.

      • Integrity/Availability/Authenticity

        • GeorgeUnique Identifier

          As more and more things are moving online, two problems became apparent to our collective consciousness:

          1. How do you know someone is really a person?

          2. How do you know someone is who they say they are?

          Initially, the “person” thing wasn’t a big issue, the [Internet] was used for low-stake amicable activities, and impersonation, bots, and alternative accounts weren’t a big deal. As for the second issue, well, we used usernames and passwords.

      • Privacy/Surveillance

        • AccessNowDigital identity: What the World Bank won’t talk about - Access Now

          On October 10, the World Bank and the International Monetary Fund will hold an annual summit to discuss the challenges and opportunities that will determine the course of their work on inclusivity and sustainable development all over the world. Unfortunately, this is the second year in a row that they have kept digital identity programs off the agenda, even as civil society organizations continue to press for answers about their responsibility in developing systems that further human rights abuse, exclusion, marginalization, and surveillance.

          The push to implement digital identification systems remains a priority for the World Bank and other international organizations, as it is viewed as integral for reaching UN Sustainable Development Goal (SDG) 16.9, “legal identity for all.” However, attempting to reach that goal this way is both short-sighted and treacherous, as many different digital identity programs the World Bank has funded or promoted demonstrate.

        • AccessNowU.S. Congressional briefing: what overturning Roe v. Wade means for digital rights - Access Now

          Today, September 28, Access Now hosted the U.S. Congressional Briefing, Your body, your data: data-veillance and reproductive rights in a post-Roe world to unpack what the Supreme Court ruling means for human rights and digital safety, and what’s next for collective action.

          “When the U.S. Supreme Court reversed Roe v. Wade, it didn’t only obliterate reliable access to abortion services for women and people who birth — and demolish any sense of agency we had over our own bodies — it threw the right to privacy of all people across the country into jeopardy,” said Willmary Escoto, U.S. Policy Analyst at Access Now. “The threat to privacy is even more dangerous for Black and Latina women, the disabled, immigrants, LGBTQ+, low-income people, and other communities that have been historically discriminated against and exploited.”

        • India TimesDoT mandates IMEI registry before 1st sale or import of mobiles

          The Department of Telecommunications (DoT) has mandated smartphone manufacturers and importers to register the IMEI number of smartphones before the first sale or before the import of the device on a new portal in operation from 2020.

          In a gazette notification, the DoT on Monday, amended the prevention of tampering of the Mobile Device Equipment Identification Number, Rules, 2017 to enforce smartphone manufacturers to register the IMEI number of every mobile manufactured in India with the Indian Counterfeited Device Restriction Portal (ICDR) maintained by the DoT.

        • Site36Plans for more data exchange: EU agreement with Interpol delayed

          So far, only EU states and Europol are allowed to access databases at Interpol, but soon Frontex and the new public prosecutor’s office will be allowed to do so as well. The EU Parliament has drawn red lines for the negotiations.

        • Stacey on IoTAmazon doesn’t need a phone. Alexa will be everywhere.

          Amazon launched a profusion of sensor-filled speakers, cameras, and televisions as well as services from its Eero Wi-Fi business and Ring security business on Wednesday as it doubled down on its idea of ambient intelligence. Basically, Amazon is making sure everything it releases can act as a sensor providing as much information about the environment to Alexa, its digital assistant.

        • YLEProsecutors charge ex-CEO of [cracked] therapy firm Vastaamo [iophk: Windows TCO]

          The Helsinki-based company's database was breached on at least two separate occasions — in November 2018 and March 2019 — leading to extortionists demanding payment of nearly half a million euros for the data's return in October 2020.

          When the company refused to pay, the sensitive patient information was leaked onto the dark web.

        • [Old] The HillDHS planning to collect social media info on all immigrants

          Homeland Security’s inspector general published a report earlier this year concluding that DHS pilot programs for using social media to screen immigration applicants “lack criteria for measuring performance to ensure they meet their objectives.”

        • EFFAutomated License Plate Readers Threaten Abortion Access. Here's How Policymakers Can Mitigate the Risk

          Police can also attach ALPRs to their patrol cars, then capture all the cars they pass. In some cities police are taught to do "gridding," where they drive up and down every block of a neighborhood to capture data on what cars are parked where. There is also a private company called Digital Recognition Network that has its own contractors driving around, collecting plate data, and they sell that data to law enforcement.

        • EFFEFF Urges FTC to Address Security and Privacy Problems in Daycare and Early Education Apps

          “Parents find themselves in a bind: either enroll children at a daycare and be forced to share sensitive information with these apps, or don’t enroll them at all,” EFF’s letter to Khan said. “Paths for parents to opt a child out of data sharing are, with rare exception, completely absent.”

    • Defence/Aggression

    • Transparency/Investigative Reporting

    • Environment

      • The AtlanticThe Senate Just Quietly Passed a Major Climate Treaty

        What if the Senate passed an international climate treaty—a pact so powerful that it could avert nearly 1 degree Fahrenheit of global warming—and nobody noticed?

        That’s more or less what happened a week ago. Last Wednesday, the Senate ratified the Kigali Amendment, a treaty that will phase out the world’s use of hydrofluorocarbons, or HFCs, a climate pollutant used as an industrial refrigerant and in sprayable consumer products. Because HFCs are hundreds of thousands of times more potent at capturing heat in the atmosphere than carbon dioxide, the Kigali Amendment, which has already been adopted by 137 countries, is the most significant environmental treaty that the United States has joined in at least a decade.

      • NBC‘I’ve always wanted to be a tree’: Human composting starts to catch on

        California Gov. Gavin Newsom this month signed a bill that requires state regulators to create a program allowing “natural organic reduction” by 2027. It will become the fifth state to pass legislation permitting what providers often call “human composting” or “terramation.”

        The process, which is essentially the controlled decomposition of a human body by a funeral service provider, takes about two months. Processing a person’s remains creates 1-2 cubic yards of compost — enough to nearly fill the bed of a pickup truck, which can then be used in gardens or conservation projects.

      • TruthOutManchin’s Big Oil Deal Scrapped From Budget Bill in Victory for Climate Movement
      • Common DreamsOpinion | Defeat of Manchin's Dirty Deal Is a Win for Environmental Justice and Health Equity

        Facing fierce resistance from frontline communities and concerned citizens across the country, Senator Joe Manchin (D-W.Va.) withdrew his so called “permitting reform” provision from the must-pass government funding bill Tuesday.

      • Common Dreams'We'll Beat You Again,' Say Climate Advocates as Biden Eyes New Path for Manchin's Dirty Deal

        In a statement after Manchin (D-W.Va.) asked Senate Majority Leader Chuck Schumer (D-N.Y.) to remove the permitting overhaul from the government funding bill, White House Press Secretary Karine Jean-Pierre made clear that President Joe Biden doesn't intend to let the measure die despite fresh warnings over its potentially disastrous emissions impacts.

      • ScheerpostBen & Jerry’s Pilot Project Aims to Halve Ice Cream Emissions by 2024

        Christopher Bonasia reports that the iconic ice cream maker Ben & Jerry’s will work with 15 dairy farms to halve greenhouse gas emissions by 2024.

      • Common DreamsFresh Demands for 'Climate Emergency Declaration' as Monster Hurricane Ian Comes Ashore

        The hurricane, which killed at least two people in Cuba and left the entire country without power before causing major flooding in the Florida Keys Tuesday night, approached the state's coast as a Category 4 storm and was expected to strengthen to a Category 5 before making landfall.

      • Democracy NowTampa Update on Hurricane Ian: Millions Prepare for Cat. 5 Storm Fueled by the Climate Crisis

        As Hurricane Ian is set to strengthen into a Category 4 or 5 storm and make landfall Wednesday afternoon south of Tampa Bay, the storm already knocked out power in Cuba and killed at least two people Tuesday. Communities across Central Florida are preparing for a “very strong storm,” says Seán Kinane, news and public affairs director at Tampa community radio station WMNF, and many acknowledge the strength of the hurricane is “definitely impacted by climate disruption.”

      • DeSmogHydrogen Lobby Targeting Labour Conference with ‘False Solutions’, Say Campaigners

        Labour has made climate and energy its central policy agenda, and its conference in Liverpool this week has touted the slogan “A Fairer, Greener Future”. However, the hydrogen industry has had an outsized presence at the event compared to cleaner alternatives.

      • Hackaday2022 Hackaday Prize: Congratulations To The Winners Of The Climate-Resilient Communities Challenge

        Holy humanitarian hacking, Batman! We asked you to come up with your best climate-forward ideas, and you knocked it out of the ionosphere! Once again, the judges had a hard time narrowing down the field to just ten winners, but they ultimately pulled it off — and here are the prize-winning projects without much further ado.

      • Energy

        • Cambridge Bitcoin Electricity Consumption Index

          Note: monthly consumption figures are the sum of daily consumption figures calculated by assuming constant power usage over 24 hours at the daily best-guess estimate of Bitcoin’s network power demand. The cumulative consumption is the sum of monthly totals since the start of the model on July 18th 2010. A separate analysis that ignores profitability considerations suggests that the cumulative consumption for the period between January 2009 and July 2010 has only amounted to 4.74 megawatt-hours (MWh), or 0.00000474 TWh – a mere rounding error. It is therefore safe to assume that the cumulative consumption figure listed above provides a robust estimate of Bitcoin’s total consumption since its inception in 2009.

        • VarietyInside the Fight Over the ‘Pulp Fiction’ NFT

          January was a heady time for the Secret Network. The two-year-old platform had launched a cryptocurrency – SCRT – and was preparing to make a big splash in Hollywood. Teaming up with Quentin Tarantino, the network was preparing to auction an NFT based on the screenplay for “Pulp Fiction.”

        • Matt RickardIs Ethereum a Dumb Pipe?

          Commoditized protocols (especially decentralized ones) often create value but have a different entity capture most of it. See examples of email (Gmail) or git (GitHub). Who captures the value? Scaling layers? On-ramps/off-ramps? Regulated exchanges?

        • CS MonitorWhat is ‘dead pool’ and what does it mean for Colorado River?

          The Colorado River supports more than two dozen tribes, seven U.S. states, and Mexico, but Americans living outside the Western region benefit, too. The river preserves national parks and produces winter vegetables, shipped countrywide.

          Yet a long-term rise in demand – and increasingly arid conditions linked to climate change – have resulted in a dire river reality. Lake Mead and Lake Powell, major reservoirs, could reach “dead pool,” with levels of water so low that the river can’t flow below the dams.

        • Cory DoctorowOil is Bankrupt (If We Want It) : Alberta’s Oil Companies Are the Walking Dead.

          Albert’s oil-patch is a zombie, the walking dead. The companies that extract oil there owe more money than they can pay, more than they can borrow, more than they can earn. If they were made to pay their lawful debts, they would all go bankrupt, and, in so doing, would end the extraction of one of the dirtiest, worst sources of oil…

        • TruthOutBill McKibben: The End of Manchin's Pipeline Deal Is a Grassroots Victory
        • Democracy NowBill McKibben: Victory Over Big Oil as Sen. Manchin Forced to Drop “Hideous Deal” on Energy

          Democratic Senator Joe Manchin abandoned his own energy permitting proposal Tuesday that would have fast-tracked the federal review of energy projects, including the contested Mountain Valley Pipeline. Following intense pressure from a range of climate justice and Appalachian organizers, Manchin asked Senate Majority Leader Chuck Schumer to drop the permitting reforms from a funding bill after it became clear he did not have the votes to pass the proposal. founder Bill McKibben says Manchin may try to partner with the GOP to revive the proposal later this year, but still says the news represents an “impressive win by grassroots environmentalism.”

        • Common DreamsApparent Sabotage of Nord Stream Pipelines Risks 'Unprecedented' Climate Nightmare

          One early estimate from Jean-Francois Gauthier, vice president of measurements at the satellite firm GHGSat, indicates that the Russian gas pipelines were unleashing more than 500 metric tons of methane per hour when they were first damaged.

        • Common Dreams11 Million Without Electricity in Cuba as Hurricane Ian Knocks Out Power Grid

          Around a million people lost power Tuesday as Hurricane Ian lashed the island with heavy rain and wind, tearing off people's roofs, devastating farms, and reportedly killing at least two people. By late Tuesday, Cuba's entire power grid had collapsed, leaving roughly 11 million without electricity.

        • ScheerpostExplosions Cause Major Damage to Both Nord Stream Pipelines

          A Polish member of European Parliament suggested the US was responsible.

        • IT WireiTWire - On World EV Day, Victoria is proudly taxing owners of EVs

          On World Electric Vehicle Day, Victoria can celebrate the fact that it charges people who use EVs a tax. The same Victoria that calls itself the education state. It also touts itself as progressive.

          When most of the world is trying to push the use of electric vehicles, Victoria has its foot firmly on the brake. No, make that both feet on the brake.

      • Wildlife/Nature

    • Finance

    • AstroTurf/Lobbying/Politics

    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

      • Common DreamsOpinion | Policies That Center Community Voices Are Key to Solving the Local-News Crisis

        Over the past 15 years, the United States has lost more than half the newspaper reporters covering state and local beats. Runaway media consolidation, mismanagement, new technologies and changing consumer habits have led to widespread job losses and newsroom closings. The decimation of local news has disproportionately harmed low-income communities, people of color, rural communities, and immigrants. And as news deserts expand, disinformation proliferating online has filled the void.

    • Civil Rights/Policing

      • Ali Reza HayatiNobody survives with oppression

        It has been more than ten days since my people in Iran have started protesting against injustices they are suffering from, triggered by the death of Mahsa Amini, a young girl reportedly killed by morality police.

        The government has shut down the [Internet] again and killed almost all messengers and communication services people used and access to any server located outside the country is very much restricted. This has been a common way for the regime to oppress protesters.

      • VOA NewsIran Riot Police Confronting Protesters in Tehran Over Death of Woman

        The protests have spread to at least 80 cities and towns throughout Iran. Security police have used tear gas, clubs and, in some cases, live ammunition to quell the protests calling for the end of the Islamic establishment's more than four decades in power.

      • The NationIran’s Brutal Crackdown on “Women, Life, Freedom”

        Iran’s “morality police” murdered Jîna Emînî, a 22-year-old Kurdish woman, for wearing an “improper hijab.” They killed her because she was Kurdish and because she was a woman. The hashtag #MahsaAmini is trending, but we should address this injustice appropriately: by the name Jîna’s family gave her. Mahsa is the name imposed on her by the Islamic Republic, a government that oppresses minority groups such as the Kurds and bans the use of Kurdish names in many cases. Jîna’s identity as a Kurdish woman should not be erased. “Jin Jîyan Azadî,” or “Women, Life, Freedom” in Kurdish, has become the slogan of the movement in Iran, but Western media has failed to honor its full significance. It’s a demand for women’s liberation emerging from the Kurdish Freedom Movement.

      • ScheerpostIn Iran, Women Are at the Vanguard of Transformative Change Once Again

        Vrinda Narain and Fatemeh Sadeghi unravel the roots of women's uprisings in Iran in the wake of Mahsa Amini's death.

      • The Economist“I’m the same as Mahsa. And I want my freedom”: anger at Iran’s regime spills onto the streets

        What happened to Mahsa has happened to many girls. Often they come for girls who are alone in the street and put them in their vans. Then no one knows where they are. That has happened to so many friends of mine. It doesn’t matter to the police if your hijab is problematic or not. They just get you and then ask you to pay them money. And you have to pay them. If they catch me in the market, they can ask me for 3m rial (about $70). If they question me and I don’t answer, I’ll have to pay more. Once they stopped me in Isfahan and asked me for my phone number. They warned me that if they caught me three times, I’d end up in prison. And I wasn’t even wearing a “bad” hijab. I’d just come from university where we have to wear a proper black hijab.

      • Frontpage MagazineThe Islamic Republic: Shaken to its Core

        The government has ended Internet service in parts in Tehran, and ended access to WhatsApp and Telegram. Despite this, the protesters still manage somehow to meet up and come out in force, and in ever larger numbers, across the country.

      • MedforthFrance: Islamists spread photos of Muslim women not wearing headscarves in schools on social networks to put them under social pressure

        Screenshots of these accounts and quotes from the social networks support this finding. One user wrote: “School is not a legitimate excuse for taking off the veil and delaying prayer.” On August 23, 2022, an Islamist influencer with 47,500 followers posted a video on TikTok urging young women of the Muslim faith to ” (…) put a sash over the abaya [long dress worn over the regular dress, note]”.[…]Le Point

      • BBCMyanmar OnlyFans model sentenced to six years jail

        In such areas - and under state of emergency laws renewed by the Myanmar junta government earlier this year - those charged with crimes are tried in a military court where they're denied rights like access to a lawyer.

      • Common DreamsDemanding Broad Reforms, Thousands of Inmate Workers on Strike at Alabama Prisons

        The work stoppage began Monday after about three months of planning and organizing by inmates, with help from groups including Alabama Prison Advocacy and Incarcerated Families United.

      • ScheerpostThe U.S. Sees an Unprecedented Investment in Policing Alternatives

        Since 2021, around $500 million in new federal, state, and philanthropic funding has been directed toward initiatives that fall under the umbrella of so-called “community violence intervention,” or CVI

      • ShadowproofIn Washington State, Incarcerated Organizers Build Community With Youth To Fight For Releases

        At Washington’s Stafford Creek Corrections Center, a group of incarcerated organizers have built community with local youths to fight for sentencing reforms, grappling with what it means to organize through an abolitionist lens from inside.

      • Democracy Now“Lady Justice”: Dahlia Lithwick on Women Who Used the Law to Fight Racism, Sexism Under Trump & Won

        We speak with Dahlia Lithwick, who covers the courts and the law for Slate, about women who fought the racism, sexism and xenophobia of Trump’s presidency. She profiles many of them in her new book, “Lady Justice: Women, the Law, and the Battle to Save America.” “Law is slow and takes a long time, but at its best, it really can make us all freer and safer and restore dignity to those that have been harmed,” says Lithwick.

    • Internet Policy/Net Neutrality

      • The NationWho Owns the Internet?

        What is the Internet, and who owns it? These are not simple questions; their boundaries are muddy. Most people would agree that the Internet encompasses physical infrastructure and physical networks—the satellites, radio towers, and fiber-optic cables, aboveground and underwater, that connect our devices—but does it not also refer to the content they carry? And how can one meaningfully distinguish between that content and the servers that host it; the software that translates it into legible form; the eyes and ears that consume it; the hands that build and maintain it? US Senator Ted Stevens was once mocked for describing the Internet as “a series of tubes,” but his metaphor was about as accurate as one could hope for in so few words. The only trouble is that it’s hard to say where the tubes begin and end.

      • India TimesFive things to know about the UN telecoms agency

        Here is a look at the oldest agency in the United Nations fold, which behind the scenes sets the global standards underlying mobile phones, television and the [Internet].

      • TechdirtUS Treasury Department Moves To Protect Internet Access For Iranian Citizens

        Information wants to be free and it is never freer than when it traverses the internet. That’s why so many autocratic leaders strive to shut down this essential connection. It allows governments to control narrative and control citizens. Limiting their communication options means it will be the government’s view that prevails.

    • Monopolies

      • Computer WorldMozilla: Apple, Google, and Microsoft lock you into their browsers

        Mozilla researchers found each platform maker “wants to keep people within its walled garden” by steering mobile and desktop users to Apple Safari, Google Chrome, or Microsoft Edge. “All five major platforms today (Google, Apple, Meta, Amazon, Microsoft) bundle their respective browsers with their operating systems and set them as the operating system default in the prime home screen or dock position,” Mozilla wrote in a 66-page report.

      • Five Walled Gardens: Why Browsers are Essential to the Internet and How Operating Systems Are Holding Them Back

        Mozilla has published new research into how consumers across a number of different countries and continents install and use browsers. It shows the importance of web browsers to consumers, with the vast majority of people surveyed using them each day. It also shows that although many people report knowing how to install a browser in theory, lots of people never actually install an alternative browser in practice. A similar trend can be seen between the number of people reporting to know how to change their default browser versus the number who do this in practice. Crucially, people raise concerns about privacy and security, but they similarly fail to act on these concerns.

      • Five Walled Gardens: Why Browsers are Essential to the Internet and How Operating Systems are Holding Them Back [PDF]

        This report has two purposes: first, to present Mozilla’s research (both recent surveys and years of knowledge) into consumer interaction with browsers. Secondly, to highlight the foreclosure of browser engines and independent browsers by operating systems. Part 1 of the paper is about operating systems, browsers, browser engines and how consumers behave. Part 2 highlights the online choice architecture practices by operating system providers which we believe have shaped consumer browser usage away from independent browsers.

        The research we are releasing with this report paints a complex picture with many paradoxes: people say they know how to change their browser, yet many never do. Many people believe they can choose their browser, yet they have a bias towards software which is pre-installed, set to default and difficult to change. In fact, their browser choice on desktop computers has been thwarted for many years, and it has never truly existed on mobile devices. Our research corroborates what many regulators have already noticed: software can be designed to influence or even manipulate consumer outcomes. And operating systems are designed to maximize usage of their affiliated browsers.

      • TechdirtRep. Ken Buck’s Irrational Spite Of Tech Companies May Have Screwed Up Another Antitrust Bill

        It’s kinda weird how the GOP’s pure hatred and spite towards tech companies, and their desire to exact maximum punishment rather than make good policy, keeps blowing up bills that might otherwise pass. We’ve talked plenty about how Republicans have effectively torpedoed the big tech antitrust bill by insisting that it must include provisions that will be used to sue tech companies over antitrust for… suppressing disinformation. And then there was Ted Cruz (at least temporarily) blowing up a (terrible) journalism antitrust bill by bringing content moderation into it.

      • TechdirtGoogle Tries To Fend Off Telecom Backed ‘Big Tech Tax’ In EU

        We just got done noting how the European Union, prompted by regional telecom monopolies, has been seriously pushing for a new tax on big tech to fund broadband. For decades, telecom giants have lustfully eyed big tech ad revenues. They’ve then convinced politicians that the best way to fix the “digital divide” (lack of broadband) is by taxing tech giants, which telecom giants (falsely) claim get a “free ride.”

      • Copyrights

        • The AtlanticHollywood Learned All the Wrong Lessons From Avatar

          That is a myopic reaction considering the fact that the biggest hit of all time was a wholly original film. Sure, Avatar’s story of a human interloper ingratiating himself with an alien tribe is reminiscent of earthbound epics like Dances With Wolves or The Last of the Mohicans, but Cameron’s movie isn’t directly adapted from any prior work. And yet Hollywood has mined every avenue of intellectual property imaginable over the past decade-plus, surely thinking that the better-known the title, the less risk there is sinking hundreds of millions into making and marketing it. I’ve always been amused at the ironic notion that Avatar had no cultural impact because nobody can name its main character; maybe that’s because the story hasn’t been crammed down viewers’ throats year after year since its release.

        • Torrent FreakTeen's Destiny 2 Cheat Strategy Gifts Bungie Unlimited Lawsuit Ammo

          A teenager who allegedly threatened staff at Bungie and cheated in Destiny 2 is facing fierce opposition as he attempts to dismiss a lawsuit filed by the developer. Bungie says the defendant doesn't understand the scope of the DMCA and by declaring Bungie's software license void due to his age, even more copyright claims are on the way.

        • Torrent FreakLiverpool and Manchester United Team Up to Beat Counterfeiters

          Liverpool and Manchester United are arch rivals on the field but in U.S. federal court they have teamed up to fight a common enemy. Together with Tottenham Hotspur, the English football clubs are taking a stand against counterfeiters selling infringing products through Alibaba, Amazon, eBay, Wish, and other stores, seeking millions in damages.

        • Creative CommonsUNESCO MONDIACULT2022: A Starting Point for Open Culture

          It was in 1982 that the Mexico City Declaration on Cultural Policies defined a path for culture to become a fundamental pillar of development. 40 years on, culture now underpins all 17 of the United Nations Sustainable Development Goals (SDGs), and calls are being made to make culture a sustainable development goal in itself. We agree with UNESCO that “culture is the bridge between peoples and countries… and the key to unlocking mutual understanding and reinforcing global action based human rights and respect for diversity.”

  • Gemini* and Gopher

    • Politics

      • My Chrissy Teigen Moment

        I have no idea who Chrissy Teigen is and I’m not interested to know. As Saayaa put it, it’s the whole point of calling this kind of moment : realizing you have missed some news and that you are happy about it!


        I’m a knowledge freak. I want to know it all about everything. All the time. As soon as I learn about a subject that I didn’t know previously, I will spend at least one hour exploring it, reading wikipedia pages about it just to get a big picture of said subject, trying to find a reference book and ordering it.

      • The Party of Fiscal Responsibility

        The GOP a.k.a. Republicans are lying about being “small government” and “fiscally responsible”.

        “Fiscal” means related to managing a country’s financial resources.

        The GOP is the party of enriching the ultra-rich at the expense of the working poor and even the middle class (and while, contrary to the “working class MAGA” popular perception, GOP-voting households average higher income than supposedly “elite” Democrat voting households, the difference is only around 15% meaning that these families are getting just as exploited by the lobbyists and PACs).

    • Technical

      • A Mod For OpenTTD

        Thankfully this can be amended by writing a mod of a type called NewGRF (New Graphic Resource File). There are several tools available for doing this. The first I tried was TrueGRF, which is a web based tool with a lovely and usable interface. It really was a joy to work with.

      • Internet/Gemini

        • Re: Re: Sneakernets

          I read ew0k's post about Sneakernets and it made me think about the wonderful time I happened to grow up in.

          In middle school I was connecting to a local BBS (Cherryland BBS in Sturgeon Bay, Wi). I had to sneak over to my grandfather's construction company at night to get access to his better phone system, he had free long distance while we did not. Dialed in, read some posts, sent some messages and started the download of a game or app and let the system run through the night as it was sloooooow.

* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.

Recent Techrights' Posts

Google, FSFE & Child labor
Reprinted with permission from the Free Software Fellowship
[Video] Trainline Finally Issues a Refund, But It Took 9 Days and Showed How 'Modern' Systems Fail Travelers
They treat people like a bunch of animals or cattle, not like valuable customers
Links 13/04/2024: Whistleblowers, OpenAI and Microsoft Leakers
Links for the day
'Our' Technology Inside the Home is Becoming Less Reliable and It Implements the Vision of Orwell's '1984' (Microphones and Cameras Inside Almost Every Room)
Technology controlled by who exactly?
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, April 12, 2024
IRC logs for Friday, April 12, 2024
Links 13/04/2024: Huawei and Loongson PCs, IBM Layoffs
Links for the day
Gemini Links 13/04/2024: Specification Changes and Metaverse Newbie
Links for the day
Links 12/04/2024: Big Brother in the Workplace and Profectus Browser Alpha 0.3
Links for the day
WIPO UDRP D2024-0770 Debian vendetta response
Reprinted with permission from Daniel Pocock
Links 12/04/2024: Reporters Without Borders Rep Kicked Out of Hong Kong
Links for the day
Gemini Links 12/04/2024: Funny Thing, Manual Scripts, and More
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 11, 2024
IRC logs for Thursday, April 11, 2024
DebConf22 Kosovo segregation of women exposed
Reprinted with permission from
Links 11/04/2024: Web Diversity and More Crackdowns in Russia
Links for the day
Gemini Links 11/04/2024: Activity and Motivation in Geminispace, gwit Implementations
Links for the day
First They Came for Iranian Developers...
Red Hat/IBM and 'cancel culture'
[Video] A Debian Project Leader Needs to Also be a Technical Project Leader
We do not vouch for one (or none) horse in this race
Aggressive Efforts (and Threats) for Those Who Speak About What Happened in the Balkans
Acting in this way in an effort to censor people typically results in a second scandal on top of the original scandal
How Kosovo won DebConf21
Reprinted with permission from Daniel Pocock
[Video] How the Media Blamed SSH and Linux (for Nearly a Whole Fortnight!) Instead of Microsoft's GitHub and Systemd
Microsoft-connected sites have said a whole bunch of lies
Anzacathon: a hackathon for Anzac day at home
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, April 10, 2024
IRC logs for Wednesday, April 10, 2024
On Julian Assange, Now 5 Years in Belmarsh Prison: The Good News, the Bad News, and Ugly Noise
Some time this spring (or summer) we'll revisit the Appelbaum case