11.17.15
Posted in Microsoft, Security, Windows at 7:32 am by Dr. Roy Schestowitz
“If you (Senator Wellstone) vote against the war in Iraq, the Bush administration will do whatever is necessary to get you. There will be severe ramifications for you and the state of Minnesota.” –Vice President Dick Cheney to Senator Paul Wellstone (D), October, 2002, just days before Wellstone’s death in an airplane accident
Summary: The involvement of Microsoft Windows in mission-critical systems (where many lives are on the line) shows extreme negligence and lack of foresight
FRANCE appears to have had problems other than terrorism. Headlines today serve to confirm, with Russia’s acceptance too, that its plane was recently taken down by terrorists, killing about twice as many people as died in Paris on Friday. Days ago the British media ran some scare stories about a French person in a British airport (a lot of misreporting about that, see our daily links for more), but how about basic technological errors? Remember what happened to a Spanair flight and also the poor judgment of British aviation. More planes crash due to technical malfunction than due to terrorism.
“Microsoft seems to be good at nothing these days, perhaps other than back doors and back room deals.”Based on a new report, France is still running mission-critical systems with Windows, even really ancient versions of it, as ancient as 3.1 (see “Windows 3.1 Is Still Alive, And It Just Killed a French Airport” in [1] below). What are they thinking? This is just nuts! It’s not from The Onion and it’s definitely no satire.
Microsoft seems to be good at nothing these days, perhaps other than back doors and back room deals. Recall Microsoft’s new body cameras partnership with TASER, which we mentioned a few times, then see [2,3] below. Conficker, a Windows virus, is now being preinstalled on body cameras. How many lives will likely be sacrificed as a result of this? Police brutality too needlessly kills a lot of people.
“Haven’t Snowden’s leaks shown enough to convince everyone that genuine security is not the goal at Microsoft but actually somewhat of a foe?”Windows is not suitable for anything that requires security because Windows is simply not designed to be secure. It’s designed for “national security” (meaning back doors and bogus encryption that the state can crack). Proprietary software in general is bad, including firmware [4], based on new reports. Microsoft is now silently modifying its patches after it bricked Outlook, which has back doors. To quote the British media: “Many IT managers and normal folks held off on last week’s patching cycle after one Microsoft fix – KB 3097877 – broke several versions of Outlook. The error came in how the software handled fonts, and resulted in the email client crashing as soon as some emails were scrolled through.”
We have already covered this here the other day, in relation to back doors in Microsoft data encryption. It is unthikable and rather unbelievable that some people still get away with putting Windows in mission-critical systems, even in governments and businesses. Haven’t Snowden’s leaks shown enough to convince everyone that genuine security is not the goal at Microsoft but actually somewhat of a foe? █
Related/contextual items from the news:
-
A computer glitch that brought the Paris airport of Orly to a standstill Saturday has been traced back to the airport’s “prehistoric” operating system. In an article published Wednesday, French satirical weekly Le Canard Enchaîné (which often writes serious stories, such as this one) said the computer failure had affected a system known as DECOR, which is used by air traffic controllers to communicate weather information to pilots. Pilots rely on the system when weather conditions are poor.
DECOR, which is used in takeoff and landings, runs on Windows 3.1, an operating system that came onto the market in 1992. Hardly state-of-the-art technology. One of the highlights of Windows 3.1 when it came out was the inclusion of Minesweeper — a single-player video game that was responsible for wasting hours of PC owners’ time in the early ’90s.
-
US-based iPower Technologies has discovered that body cameras sold by Martel Electronics come pre-infected with the Conficker worm (Win32/Conficker.B!inf).
-
At the end of October this year, 14,000 police officials from around the world gathered in a Chicago conference center for the International Association of Chiefs of Police conference. It was equal parts political convention and trade show, with panels on crisis response splitting time with hundreds of small companies selling bomb-disposal robots and guns.
There were more than a dozen body camera companies on the show floor, but Taser made the biggest splash, constructing a Disney-style amphitheater called the USS Axon Enterprise. The show began with a white-jacketed captain, who announced he had traveled back in time from the year 2055, where lethal force has been eliminated and police are respected and loved by their communities. To explain how to get there, he ran through a history of policing tech. Approaching the present moment, he fell into a kind of disappointed sadness.
-
This is really no surprise: embedded system vendors aren’t good at carrying out quality assurance on their firmware images, and their embedded Web server software is what you’d expect from something written in the last 20 minutes of Friday afternoon.
Permalink
Send this to a friend
Posted in News Roundup at 6:53 am by Dr. Roy Schestowitz

Contents
-
Desktop
-
Users of Linux-based operating systems often buy Windows-powered computers, format the hard drive and install their favorite distro. This can sometimes be a fine experience, although, quite often, it comes with annoyances such as non-working hardware (usually Wi-Fi). Not to mention, the keyboard will likely house a “Windows” key, which taints the experience.
The holy grail for many Linux users — besides building their own computer — is to get a desktop or laptop that comes pre-loaded with a Linux-based operating system. One of the most popular such manufacturers, System76, sells computers pre-loaded with Ubuntu, including a lifetime of telephone tech support. Obviously the company has accumulated many fans over the years, so this past Thursday and Friday, it held its first-ever superfan event. Fans were flown to its Denver headquarters. I was honored to be given the opportunity to cover it.
-
She was using a Dell Optiplex with Windows Vista installed, and it was a mess. It wasn’t virus-laden, it was I-love-all-of-these-toolbars-they-make-life-so-easy laden. She mentioned that Claude said I could put a program on her computer that was better than what she had, and I said, yes, I did have such a program and would she like to see how it worked before I put it on her computer. She said she would be thrilled to do that.
-
Server
-
There’re also a wide variety of special purpose distros out there in the market which may play an important role in the deployment, if the dedicated server’s purpose matches that of the distro. Some good examples are the Boot2docker or the CoreOS, which are so small distros that are mainly designed for just launching the Docker containers, and such containers might include more standard Linux distros.
-
Kernel Space
-
Some of the highlights of today’s Linux news includes Brian Fagioli’s tour of the headquarters of System76, manufacturer of Linux laptops and Matt Hartley discussing the problems with using Linux. Elsewhere, Kevin Fenzi shared some thoughts on recent Rawhide and Jeff Hoogland released some new applications built using the Moksha desktop toolkit.
-
Today Linus Torvalds don’t need PR or advertising – he is popular programmer, charismatic leader in Linux community and cult figure in modern IT. Yes, Linus has no such popularity like a Bill Gates and Steve Jobs – his work isn’t looks so big without the Microsoft’s and Apple’s PR managers.
-
Graphics Stack
-
The poll ended with 57% saying they use a closed-source driver while 43% stated to using the open-source driver for their graphics processor.
-
Applications
-
I’m pleased with the way that Lumail2 development is proceeding, and it is reaching a point where there will be a second source-release.
I’ve made a lot of changes to the repository recently, and most of them boil down to moving code from the C++ side of the application, over to the Lua side.
-
Instructionals/Technical
-
Games
-
Steam Machines have gotten a lot of attention in the media over the last year, and now it’s finally possible to buy one. Alienware, Syber, and ZOTAC all have models available for you to buy. And you can also buy the Steam Link and the Steam Controller right now from Amazon.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDE developer Bhushan Shah writes on his blog about the latest work done by him for the KDE Plasma desktop environment, especially related to the porting to the next-gen Wayland display server.
-
GNOME Desktop/GTK
-
We reported last week that the GNOME Project announced the general availability of the second and last maintenance release of the current stable GNOME 3.18 desktop environment, which brought updates for many GNOME apps and core components.
-
-
Reviews
-
I heard there’s been a change of management with the Kubuntu community or some sort like that. Well, perhaps it’s for the greater good. I am quite close to abandoning Kubuntu forever. Much like PCLinuxOS, it’s slowly creeping toward irrelevance, offering none of the love and fire that you’d want and expect. It’s exhausted, it’s defeated. It just doesn’t try to win you in any way. It’s there because it exists. Nothing more.
Moreover, there’s the matter of inconsistency. I mentioned this before, and I will mention it again. I absolutely loathe when things break in between releases. Small, simple things. Like Samba or printing or codecs. Why? WHY? WHY! How difficult is it to try to offer a sane, steady user experience? Why do I have to dread every single update? You can never really know. One version, things work, and then they don’t. Samba sharing. Year 2015. How difficult can it be to copy files from one frigging computer to another without problems? It’s not like sending probes to Mars. Just a bloody copy operation, source destination. Simple.
On top of that, Kubuntu 15.10 Wily Werewolf literally fails in every aspect. It’s totally useless, it’s buggy, it’s crashy, and it offers nothing that would make it even remotely interesting. Nothing useful or practical about it really. Nothing. I’m sad. And angry. Avoid at all costs. 0/10. Bye bye now.
-
Screenshots/Screencasts
-
Arch Family
-
Today, November 17, Arne Exton informs Softpedia about the release and immediate availability for download of a new build of his Arch Linux-based ArchEX computer operating system based on the latest GNU/Linux technologies.
-
Red Hat Family
-
The latest Red Hat Bug Fix Advisory (RHAB) informs users of the Red Hat Enterprise Linux Server (RHEL) 5.x and Red Hat Enterprise Linux Desktop 5.x operating system about a new kernel update that fixes multiple vulnerabilities.
-
Open source will play a big part in this evolution. It is, after all, the foundation of many of these technologies. Solution providers will need to become intimately familiar with how open source works and the benefits it provides.
-
-
Fedora
-
The Fedora 23 release has been a huge success and now it’s time for Fedora Elections!
-
During Fedora 23 release cycle as part of Two week atomic image, we have developed, and deployed a new service in Fedora Infrastructure, called Autocloud. In simple words this services listens to fedmsg messages for successful koji builds of cloud base, and atomic images. When found, it downloads those images, and test them locally using Tunir. It tests the standard qcow2 images, and also the box files for vagrant. Yes, we test both libvirt, and Virtualbox based vagrant images (using tunir).
-
Network World recently published an article review comparing three major distributions: Fedora, Ubuntu, and OpenSUSE. What did they have to say about Fedora?
-
The python 3.5 rebuild has landed. The vast majority of it was done in a side tag by Peter Robinson, Kalev Lember and Robert Kuska (and others!), then merged back into rawhide on friday (the 13th). There are still a number of packages that need fixes to build against python 3.5, expect most of them to get fixed up this week. If you have some of those installed, dnf may well hold back python3 and all the newly rebuilt packages until the ones you have installed are all fixed or you remove them.
-
Back to work after Django Girls workshop and attending PyconCZ! It was all super exciting and I’m for sure going to write a separate blog post just about those events, as soon as all the pics and videos are out. But while we wait, it’s high time I posted about all the design clinics I had in past couple months. So let’s get to it!
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical’s Łukasz Zemczak has just sent his daily report on the work done by the Ubuntu Touch developers in preparation for the soon-to-be-released OTA-8 software update for Ubuntu Phones, as well as some initial details about the next major update, OTA-9.
-
Details about a number of libxml2 vulnerabilities that have been found and fixed in Ubuntu 15.10 Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS were published in a security notice.
-
Today, November 16, HP had the great pleasure of announcing a new release of its open source and freely distributed HPLIP (HP Linux Imaging and Printing) driver for GNU/Linux operating systems.
-
After previous successful launches of the Aquaris E4.5 and E5 HD Ubuntu Editions, BQ will now release Ubuntu Phones in Russia. Devices will be available for purchase through a host of local distributors such as Ozon.ru. The Aquaris E5 HD Ubuntu Edition will be sold at a price of 15,499 ₽ with the soon to be launched Aquaris E4.5 at a price of 12,499 ₽.
-
Flavours and Variants
-
We reported earlier about the immediate availability for download of the Beta build of the forthcoming Linux Mint 17.3 (Rosa) computer operating system, which is distributed as Cinnamon and MATE flavors.
-
It appears that the Linux Mint developers have published the initial Live ISO images of the Beta builds of the upcoming Linux Mint 17.3 Cinnamon and Linux Mint 17.3 MATE editions.
-
Sergio Schneider, the creator of a few GNU/Linux distributions, informs Softpedia about the immediate availability for download of new builds of his UUMATE and Manjaro Mate GNU/Linux computer operating systems.
-
As of this afternoon we have some new applications in the Bodhi repositories that utilize the EFL / Elementary toolkit – the native toolkit for Moksha. We are looking for folks to help test these applications and provide some feedback on them on our user forums. Those that have a positive reception we will be adding to our AppCenter page.
-
-
FUZE BASIC is an advanced, modernised version of the BASIC programming language, which was first developed at Dartmouth College back in 1964 and is widely accepted as the easiest beginner language to teach and learn. Featuring a redesigned interface and advanced graphics support, including sprite and image scaling, angle and alpha controls and rotation, FUZE BASIC is fully configured to run with all models of the Raspberry Pi. The whole FUZE system is slick and intuitive, and more than capable of programming web and mobile games.
-
Phones
-
Tizen
-
Android
-
Most of the wearable device nowadays with Android integration has a lot of added features than its earlier launched device. Before it only acts as a notifier. It vibrates whenever the user has an incoming call, message or an email received. However, today there are a lot of more features that this wearable device offers to the public.
-
My, oh my, how things have changed in five months. The first time we told you what the best Android phone was that you can buy today, we easily picked the Galaxy S6, even saying that it would be difficult for anyone to top it throughout the year. In our new list of the best Android phones (that you are about to read), surprisingly, it didn’t even show up.
-
Every year, Google announces a slightly revised version of its mobile OS, but Android Marshmallow offers the biggest improvement in ages. Alongside bigger features such as Doze and Now on Tap, Android M – or Marshmallow – also introduces a range of less glamorous but important tweaks that add to the user experience.
So what are Marshmallow’s killer features, and why do we think it’s the ultimate version of Android?
-
-
-
-
-
-
-
It’s not enough to mitigate this ban on open source by partial mitigation to allow secret disclosure to governments. Our perspective is that simply having source made available for viewing by select parties is not sufficient. Source code related to public regulatory matters should be released under an OSI approved license and thus made available to all those who use the software. Doing so allows them to study, improve and share the software as well as to check that their lives are not negatively impacted by its defects. Ideally, all software written using public funds should also be made available as open source.
There’s much else in TPP to be concerned about, as the EFF notes, but this clause is especially regressive and is cause alone to reject the agreement. The clock is ticking — President Obama notified Congress on November 5 that he intends to ratify TPP on behalf of the USA — so the time to protest is now.
-
Open source innovation is a phrase we tend to associate with post-millennial creativity, but it’s actually a 300-year-old idea. Benjamin Franklin famously did not patent his lighting rod, his bifocals, his stove, and many other of his inventions because he thought that these ideas were simply too important not to share.
This is the same mindset behind today’s open source movement: unrestricted access to designs, products, and ideas to be used by an unlimited number of people in a variety of sectors for diverse purposes.
-
I am a user of open source software. My earliest experiences with open source software was with the Minecraft server software Bukkit as a kid, when I was attempting to make a cool game server for friends. I started using Fedora in December 2013 with my first laptop, ending a lifetime of using Apple devices. I like to believe that I am familiar and experienced with open source software as an everyday user.
-
Watching Tim Bray talk to an audience is a little intimidating. He talks fast and every word counts. And he wants action – he wants his audience to change the world. After founding companies, co-authoring the XML specification, working at Sun Microsystems and then Google (leaving because he famously didn’t want to leave Canada for Silicon Valley), Tim has seen, thought and talked about most things to do with technology. He’s even making his own security contributions to the amazing open source Android email application, K-9. His keynote at OSCON 2014 was about threats – threats to our privacy, threats to our online freedoms and threats to our data, and “Now is the time for sensible, reasonable, extreme paranoia,” as he puts it. Which is exactly what we wanted to talk about when we met with him.
-
Open source is a software or a set of instructions that can be used for free and modified without having to worry about copyright issues. People like Arora are a growing species in the city, thanks to its ever blossoming tech culture.
-
Pseudo-/Semi-Open Source (Openwashing)
-
-
Described as an out-of-the-box setup, Spinnaker is accessible on GitHub now. Netflix clarified there is no need to migrate assets between Asgard and Spinnaker as all changes are compatible between both platforms.
-
-
-
Public Services/Government
-
After India, it seems the French public are the next in queue favouring open source for government administrative offices. The results of a public consultation on France’s Digital Republic bill came out after 20 days of public voting and debate. 147,710 votes were cast, 8501 proposals received and 21,330 participants took part.
The proposal was submitted by April, France’s free software advocacy group and the one relevant to open source software usage in administrative offices is in the third spot in the results.
-
Programming
-
Profiling a Python program is doing a dynamic analysis that measures the execution time of the program and everything that compose it. That means measuring the time spent in each of its functions. This will give you data about where your program is spending time, and what area might be worth optimizing.
-
Two early Apple designers have written a piece on Co.Design chastising Apple’s new design direction, which they claim puts elegance and visual simplicity over understandability and ease of use. Bruce “Tog” Tognazzini, who was Apple’s 66th employee and the writer of its first human interface guidelines, and Don Norman, Apple’s user experience architect from 1993 to 1996, aren’t holding back in the least.
-
Health/Nutrition
-
There’s another place to watch for antibiotic overuse: the meat your children are eating, whether beef, pork, turkey or chicken. As a result, the country’s leading pediatrics group is calling for farmers to stop using antibiotics to help livestock grow faster.
In a report Monday, the American Academy of Pediatrics detailed the overuse of antibiotics in animals, which can make bacteria such as salmonella, E. coli and Campylobacter stronger and resistant to drugs previously able to fight them off. The federal government has been warning Americans about the dangers of overusing antibiotics in hospitals and of asking doctors to prescribe them when they aren’t necessary, but what hasn’t received as much widespread attention is the danger that can occur when these medicines are overfed to animals, the academy wrote.
-
In a new technical report, the American Academy of Pediatrics (AAP) argues that unnecessary use of antibiotics in livestock is fueling drug-resistant, life-threatening infections in humans, particularly young children. The report, published Monday in Pediatrics, recommends limiting the use of antibiotics on farms.
As Ars has reported before, the vast majority of antibiotics used in the US go to agriculture and aquaculture—about 80 percent of total tonnage, to be exact. Those drugs are often given to livestock to fatten them up or prevent future illness. Such doses of drugs, many of which have crossovers in human medicine, can spur drug-resistant microbes that may make their way off the farm and spread to food or share their drug-resistant genes with other microbes, the AAP noted.
-
Security
-
During October 2015 the curl web site sent out 1127 gigabytes of data. This was the first time we crossed the terabyte limit within a single month.
[...]
The downloads came from what appears to be different locations. They don’t use any HTTP referer headers and they used different User-agent headers. I couldn’t really see a search bot gone haywire or a malicious robot stuck in a crazy mode.
-
Except even with as new as this technology is, we are starting to see reports of how many security flaws exist in docker images. This will only get worse, not better, if nothing changes. Almost nobody is paying attention, containers mean we don’t have to care about this stuff, right!? We’re at a point where we have guys building cars in their barns. Would you trust your family in a car built in some guy’s barn? No, you want a car built with good parts and has been safety tested. Your containers are being built in some guy’s barn.
-
TLS must be fast. Adoption will greatly benefit from speeding up the initial handshake that authenticates and secures the connection. You want to get the protocol out of the way and start delivering data to visitors as soon as possible. This is crucial if we want the web to succeed at deprecating non-secure HTTP.
-
Defence/Police/Secrecy/Aggression
-
The mid-air explosion of a Russian jetliner over the Sinai desert last month that killed all 224 people on board was the result of a terrorist attack, Russia’s chief intelligence officer said Tuesday.
At a meeting with President Vladimir V. Putin, Federal Security Service head Alexander Bortnikov said that traces of explosives found in the plane’s wreckage indicated that an improvised explosive device had been detonated on board.
-
A group of revellers queuing up to into the club watch on in concern as the same man goes on a three-minute rant about their fury over the venue hosting “galas to raise fund for the Israeli army” adding “and we can’t continue to accept that”.
-
Transparency Reporting
-
WikiLeaks says its latest release adds weight to allegations billions of U.S. taxpayer dollars have been illegally funneled to defense contractors through a disability scheme.
-
Tapes reportedly provide evidence that a programme intended to encourage the hiring of disabled people was mired in corruption
-
The Committee to Protect Journalists, an international press freedom organization, is writing to alert you to the harassment of journalists at the independent news website Bivol. In recent weeks a reporter has been followed and his home was broken into, and the website’s journalists have been warned they are at risk of retaliation for their reporting.
-
Environment/Energy/Wildlife
-
Palm oil and paper pulp companies illegally set fire to forests to clear land to plant more trees in the cheapest and fastest way possible. Authorities are investigating more than 300 plantation companies and 83 suspects have been arrested, according to national police chief Gen. Badrodin Haiti. The licenses of three plantation companies have been revoked and those of 11 others have been suspended.
-
Thousands of fires have been lit to clear land simply because it is 75% cheaper than other methods. By burning down forests companies can get access to the land and can commence industrial pulp and palm oil plantations.
-
The worst climate crisis of the year is happening right now in Indonesia due to slash-and-burn deforestation that sends up as much carbon dioxide as the U.S. does. It’s all for the sake of palm oil.
Each day in Indonesia, forest fires release as much carbon dioxide as the entire United States. The fires have been burning since July, thanks to a combination of slash-and-burn land clearing, flammable peat soil, and El Nino. And the worst part is, although your and my consumption habits are largely to blame, there’s almost nothing we can do about it.
-
Analysis of the Bill and Melinda Gates Foundation health charity, and 13 other major funds, reveals moving investments out of coal, oil and gas and into green companies would have generated billions in higher returns
-
Privacy
-
Well, as you already know, on Friday there was a tragic and horrifying terrorist attack in France that killed over 100 people. And it took basically no time at all for defenders of the surveillance state to start… blaming Snowden and encryption? It started with the usual talking heads, such as former George W. Bush press secretary and current Fox News commentator, Dana Perino, who seriously seemed to blame Snowden for the attacks based on… who knows what.
-
Lord Carlile’s call for the investigatory powers bill to be rushed through parliament in the wake of the Paris attacks is a misjudged knee-jerk reaction
-
On Friday evening, a group of terrorists launched a string of simultaneous attacks in Paris, killing at least 129 people, according to media reports.
Very little information is known about how the terrorists, who allegedly had links to ISIS, planned the attacks. Yet, that hasn’t stopped commentators and the media from speculating the group likely avoided surveillance by using messaging apps that use encryption, and even by communicating over PlayStation 4.
Belgian interior minister Jan Jambon ignited the speculation over the weekend when he complained that communications over PlayStation 4 are extremely hard to spy on. His comments were not related to the Paris attacks, however; in fact, they came three days before they even happened, during a talk at a POLITICO event.
-
Update: Home secretary Theresa May may have ruled out any fast-tracking of the bill in a statement made to the House of Commons on the UK’s response to the Paris attacks. May said it is: “important that this landmark legislation undergoes proper Parliamentary scrutiny”.
-
Interior Minister Petteri Orpo has called for a speedy reform of intelligence regulations, saying that amendments to existing legislation could take years to implement. Orpo said that it is possible to conduct online intelligence gathering without violating fundamental rights or individual privacy.
-
It’s not surprising that in the wake of the Paris terrorist attacks last Friday, US government officials would renew their assault on encryption and revive their efforts to force companies to install backdoors in secure products and encryption software.
-
I was going to write a definitive refutation to the meme that it’s all Snowden’s fault, but Glenn Greenwald beat me to it.
-
…Paris attackers were already known to authorities
-
Moscow has warned Twitter that it must store Russian users’ personal data in Russia, under a new law, the national communications watchdog told AFP on Wednesday.
Legislation that came into force on September 1 requires both Russian and foreign social media sites, messenger services and search engines to store the data held on Russian users on servers located inside the country.
-
Whenever terrorists strike, governments respond. It is in the quality and wisdom of those responses that the future of our society rests. David Gewirtz looks at the question of encryption, and how we should think about policy and security in light of the Paris attacks.
-
Civil Rights
-
A dad was shot several times and died in an officer-involved shooting in Spring Lake Sunday morning, witnesses said.
-
The interior minister of France has reportedly said he will begin the dissolution of “mosques where hate is preached” following a series of terror attacks across Paris, which have killed at least 129 people.
Bernard Cazeneuve made the announcement during an interview with French television, according to MSNBC.
He is reported as saying: “I don’t expect the state of emergency for me to attack preachers of hate but the state of emergency should allow us to act more rapidly.”
-
Right-wing media figures are bolstering calls from Republican presidential candidates following the attacks in Paris to limit Syrian refugees entering the United States to Christians only, claiming it will stop terrorists from entering the U.S.
-
Right-wing media seized on the November 13 terror attacks in Paris to make at least five false or misleading claims about Syrian refugees, past statements from Hillary Clinton, President Obama’s strategy against ISIS, the release of Guantanamo Bay detainees, and how guns in civilian hands could have supposedly changed the outcome of the attacks.
-
The point is not to minimize the horror. It is, instead, to emphasize that the biggest danger terrorism poses to our society comes not from the direct harm inflicted, but from the wrong-headed responses it can inspire. And it’s crucial to realize that there are multiple ways the response can go wrong.
-
We’ve talked a lot in the past few years about the desperate need to reform the CFAA — an absolutely horrible “anti-hacking” law that has been stretched and broadened and twisted by people over the years, such that it’s frequently used to “pile on” charges when nothing else will stick. If you want to go into a lot more detail, you can listen to the podcast we recently did about the CFAA, or listen to this wonderful podcast that Reply All did about the CFAA (where I also make a brief appearance). But one of the biggest problems with it is that it considers you to be a dangerous hacker if you access a computer/network “without authorization” or if you merely have “exceeded authorized access.” It’s that latter phrase that often causes trouble. What does it even mean? Historically, cases have been brought against employees who use their employer’s computers for non-work related things, against someone for supposedly failing to abide by MySpace’s terms of service and for downloading too many academic journals that were freely available for downloading on MIT’s campus network.
-
At the end of October this year, 14,000 police officials from around the world gathered in a Chicago conference center for the International Association of Chiefs of Police conference. It was equal parts political convention and trade show, with panels on crisis response splitting time with hundreds of small companies selling bomb-disposal robots and guns.
There were more than a dozen body camera companies on the show floor, but Taser made the biggest splash, constructing a Disney-style amphitheater called the USS Axon Enterprise. The show began with a white-jacketed captain, who announced he had traveled back in time from the year 2055, where lethal force has been eliminated and police are respected and loved by their communities. To explain how to get there, he ran through a history of policing tech. Approaching the present moment, he fell into a kind of disappointed sadness.
-
Arab American Association Of New York’s Linda Sarsour: They Are “Bar[ing] The Very People Who Are Running Away From The Same Terrorism That We’re Talking About”
-
It feels callous to question the allocation of outrage; empathy is in such short supply in this world that one hesitates to question it when it emerges. But as a long-time citizen of New York City, I’m all too aware of the weaponization of grief. The outpouring of no-context, ahistorical sympathy after 9/11 helped pave the way for a violent reaction that killed in Iraq alone roughly 150 times as many people as died in Lower Manhattan that day—an opportunistic catastrophe that did more to mock than avenge those deaths.
-
-
Intellectual Monopolies
-
Copyrights
-
The diary of Anne Frank is just six weeks away from entering the public domain in most of Europe—but it might not happen. The Basel-based Anne Frank Fonds, which owns the copyright, has a plan to retain ownership until 2050.
Anne Frank and her family famously hid from the Nazis in occupied Amsterdam during World War Two. They were ultimately discovered, and Anne died in the Bergen-Belsen concentration camp in 1945. Her father, Otto Frank, survived the Holocaust and published her diaries and notebooks.
Most European copyrights end 70 years after the author’s death, meaning that on Jan. 1, 2016, the diary becomes public domain in much of the continent. But the Anne Frank foundation has a new legal strategy to keep its most valuable copyright: declare that Otto Frank is actually a “co-author” of the diaries, not merely an editor. Since Otto Frank died in 1980, anything he authored will stay under copyright until 2050. (The book was first published in the US in 1952, so copyright stateside will last until 2047 regardless of what happens in Europe.)
This weekend’s New York Times carried the news that the foundation is issuing an “early warning” to publishers that they aren’t allowed to freely publish the diary. That’s led to criticism of the foundation, including some who have threatened to begin publishing the diary online, whether the foundation likes it or not.
-
U.S. Internet provider Cox Communications is scheduled to go to trial soon, defending itself against copyright infringement claims from two music companies. In a new motion Cox asks the court to prohibit the use of any material claiming that BitTorrent equals piracy. BitTorrent has plenty legitimate uses and equating it to infringement would mislead the jury during trial, the ISP argues.
Permalink
Send this to a friend
11.16.15
Posted in Microsoft, Novell, Patents, Red Hat at 5:18 pm by Dr. Roy Schestowitz
Systemd to be used for technical and support leverage in the same way Mono was?

Credit: unknown (Twitter)
Summary: Red Hat’s current management, which technically liaises (more deeply over time) with Microsoft, agrees on patents, works with the NSA, and increasingly deviates from the UNIX way (while becoming more secretive, except the openwashing), inevitably reminds us of Novell
Microsoft and the board- or shareholders-driven Red Hat now seem more and more like Microsoft and Novell, based on some of the latest reports and even press releases like this one [PDF]
.
“The Microsoft/Red Hat partnership calls for a Red Hat engineering team to actually move to Redmond,” to quote a new report. [1]
“And don’t forget the patent agreement that they still refuse to tell us more about.”Mirroring the Microsoft-Novell ‘special relationship’, there is a lot of technical integration too. The men in suit “said that in the coming months Red Hat Enterprise Linux images will be enabled for on-demand billing directly in its marketplace.” Billing by who? Microsoft? Red Hat? It’s complicated. And don’t forget the patent agreement that they still refuse to tell us more about [1, 2, 3, 4, 5, 6, 7, 8, 9, 10].
Jono Bacon, from GitHub and Red Hat’s “Open Organization” [sic] marketing campaign, defends the companies’ new relationship (as he would defend his former employer, Canonical, as well). Citing a sort of Microsoft proxy and a new Red Hat partner (Black Duck), he frames this relationship as necessary and recalls that “Microsoft went a step further with then-CEO Steve Ballmer describing the poster-child of the open source revolution, Linux, as “a cancer that attaches itself in an intellectual property sense to everything it touches.”
“Red Hat is living in a dream if it genuinely believes that a deal with Microsoft will leave them better off than Linspire or Novell.”Well, based on Nadella’s actions against Samsung, Kyocera, and Dell (there are more examples), he too views Linux as “a cancer that attaches itself in an intellectual property sense to everything it touches.” Nadella insists on still using patents against Linux, and against Android in particular (using patents pertaining to the kernel, Linux).
Under Nadella’s management, Microsoft is even trying to delete Android from phones (we first took note of this at the beginning of this year and later on) or even absorb its software into Windows — a strategy which Microsoft reportedly did in fact consider [2]. It’s like a derivative of the famous “embrace, extend, extinguish” strategy. Under Nadella there was also further lockdown of UEFI, impeding or making impossible installation of GNU/Linux on PCs that come with Microsoft’s unpopular spyware.
Red Hat is living in a dream if it genuinely believes that a deal with Microsoft will leave them better off than Linspire or Novell. Or maybe it can leave Red Hat just better off than everyone else in the GNU/Linux world. Red Hat’s patent agreement with Microsoft, concurrent with Microsoft attacking Android (with software patents), is truly problematic and we will escalate if Red Hat does not respond to us or becomes transparent by the end of this month. A lot of people want answers. The “Open Organization” [sic] ignores these people. It’s inherently antithetical to players in a community of developers. █
Related/contextual items from the news:
-
The Microsoft/Red Hat partnership calls for a Red Hat engineering team to actually move to Redmond to provide joint technical support for Red Hat Enterprise Linux workloads running in the Microsoft Azure public cloud and on its hybrid cloud offerings. That ensures that the companies will have closely tied cloud computing goals.
-
Microsoft has sidelined its plan to allow Windows 10 devices to run Android apps before it could do any serious damage, according to a report.
Daniel Rubino at the Windows Central blog gathered some convincing evidence that Microsoft’s Project Astoria has been wound down, while the runtime allowing the Android-on-Win10 magic to work has disappeared.
Permalink
Send this to a friend
Posted in Europe, Patents at 4:24 pm by Dr. Roy Schestowitz
Summary: An investigation of the notorious connections between different well-paid members of the EPO’s management, including some who are family members and former colleagues
THE EPO coverage continues with a series focusing on dubious appointments inside this organisation (which quickly morphed into what we called "Team Battistelli").
“For your information,” told us a reader, “according to the rumour mill at the EPO, John Martin who is the current Principal Director of Internal Audit and Oversight at the EPO is close to retirement.” It’s him who militiarised the EPO (against its very own staff).
“Since October 2012, her direct superior and reporting officer has been the Vice-President of Directorate General 4 (VP4), Mr Željko Topić.”
–Anonymous“This is fuelling speculation as to who his successor might be,” this reader added. “Two of the names being bandied about are those of Ms Elodie Bergot and her husband Mr Gilles Requena.”
Bergot already sends threatening letters to staff, so she would not be a misfit here.
Our reader gave us some background information about this duo, starting with Elodie Bergot (warning: don’t click this link if tracking by epo.org can unmask a meaningful — mappable to ID — IP address, use this archive instead). Ms Bergot is currently the Principal Director of Human Resources at the EPO (PD 4.3). We have learned, based on numerous sources, that staff isn’t particularly fond of her, in part because of how she reached her current position.
“She was recruited as an administrator at the EPO in Munich,” told us one source, indicating that this happened on the 1st of December 2010, “and started off her career at grade A3 in Department 4.3.1 (Regulations and Change Management).
“Such an extraordinary “promotion” is without precedent at the EPO.”
–Anonymous“Shortly before the completion of the normal one-year probation period foreseen for category A staff, Ms Bergot was transferred to Department 4.3 on 1 October 2011.
“Since October 2012, her direct superior and reporting officer has been the Vice-President of Directorate General 4 (VP4), Mr Željko Topić.” That’s the man who faces criminal charges and also intimidates EPO staff.
Here comes the interesting part. According to ours source, Bergot achieved the unthinkable. “On 30 January 2013,” we were told, “Ms Bergot was promoted to grade A6 with effect from 1 February 2013.
“Such an extraordinary “promotion” is without precedent at the EPO.”
In the next part we are going to look into complaints about this promotion. We will take a closer look into possibly reasons why such a magical promotion could be facilitated. It’s not purely speculative, so facts will be presented and readers will be left to reach their own conclusions. █
Permalink
Send this to a friend
Posted in News Roundup at 3:13 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
Mom was finding this computer frustrating because the hardware was very old and slow to start with, so I built her a computer in about 2000 that had Linux on it. She liked the Linux computer very much, in part because I had provided her with written instructions about how to perform the basic tasks she wanted to do.
-
I have been using various Linux distros for many years now. One of the benefits is that I’ve seen many things improve and have been there to celebrate each success as it happened. Unfortunately, like any modern operating system, even the most modern Linux distributions are not without their challenges.
In this article, I’m going to share the biggest issues I’ve experienced over the years. At no time am I disparaging Linux on the desktop. Rather, I hope to start a dialog so that some of these issues can be addressed.
-
Server
-
This malware relies on a security hole in the Magento web e-commerce platform, not Linux.
-
-
At some point, applications, whether they run on containers or otherwise, need to run on physical hardware. That’s one of the reasons why container startup Rancher Labs is announcing a partnership with Redapt, to develop and build a hyper-converged server infrastructure platform optimized for container delivery.
Rancher Labs is developing a purpose built Linux operating system for containers called RancherOS…
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Kernel Space
-
Just a few moments ago, Linus Torvalds had the great pleasure of announcing the start of the Linux kernel 4.4 development cycle with the immediate availability for download and testing of the first RC (Release Candidate) build.
-
-
So it’s Sunday, two weeks has passed, and so 4.4-rc1 is out there and the merge window is closed.
As usual, the full shortlog is much too big to post, so appended is the usual shortlog of just my merges, which just shows who I did pulls from, with a very short comment on each merge.
-
Many people are familiar with the impact that The Linux Foundation has had on the Linux community itself, as well as several notable open source projects. Now, the company is setting its sights on the high performance computing environment.
-
-
-
-
-
LINUX IS already past the point when, in theory, Skynet should have created a T-800 Terminator to save John Connor, and Linux puppetmaster Linus Torvalds has released the first release candidate for kernel version 4.4.
“Just looking at the patch itself, things look fairly normal at a high level, possibly a bit more driver-heavy than usual with about 75 percent of the patch being drivers, and 10 percent being architecture updates,” said Torvalds in a release statement.
-
Graphics Stack
-
-
Early this morning I wrote a brief article about AMD working on an LLVM-based Heterogeneous Compute Compiler and since then more details have come to light.
-
Applications
-
As you may know, Brackets, the open-source editor created by Adobe is now available for Linux systems. It is very usefull for web designers and developers, because it has support for HTML, CSS and JavaScript.
-
Mailur aims to become the future open source replacement for Gmail.
-
As a hobbyist Python programmer, over the years I have tried a variety of different editors. Back in the day I used to use Eclipse with the PyDev plugin. I then moved on to use GEdit with a few extensions switched on. After that I moved to Geany. I have to admit, much to the shock of some of you, I never really stuck with Sublime, despite a few attempts.
-
-
The second update in the 0.12.* series of Rcpp is now on the CRAN network for GNU R. As usual, I will also push a Debian package. This follows the 0.12.0 release from late July which started to add some serious new features, and builds upon the 0.12.1 release in September. It also marks the sixth release this year where we managed to keep a steady bi-montly release frequency.
-
Instructionals/Technical
-
Wine or Emulation
-
Discworld Noir was a superb adventure game, but is also notoriously unreliable, even in Windows on real hardware; using Wine is just not going to work. After many attempts at bringing it back into working order, I’ve settled on an approach that seems to work: now that qemu and libvirt have made virtualization and emulation easy, I can run it in a version of Windows that was current at the time of its release. Unfortunately, Windows 98 doesn’t virtualize particularly well either, so this still became a relatively extensive yak-shaving exercise.
-
Games
-
-
If you like your silly arcade games for when friends come around then Hyperdrive Massacre might just be what you need. Fancy flying around a space-car and blowing up others? This is the game for you.
-
On November 15, Guild Software announced the immediate availability of a new update for its cross-platform massively multiplayer online role-playing game (MMORPG) Vendetta Online 1.8 game for all supported operating systems.
-
The developers themselves emailed both Age of Fear: The Undead King & Age of Fear 2: The Chaos Lord in for me to take a look at. They told me the games don’t look like much, but offer a lot, and they were right.
-
-
Falcon Northwest is one of the companies that wanted to release Steam Machines, but it looks like that’s not happening anymore.
-
High-end PC maker Falcon Northwest has decided against rolling out any Steam Machines this year powered by Valve’s Debian-based SteamOS, due to problems with the operating system.
-
StarBreak has somewhat captured my interest, as we don’t have many good MMO games, and even an MMO platformer like this looks pretty sweet. You can actually try it out right now in your browser, and it seems to work reasonably well.
-
-
Linux has crossed another hardware frontier with the announcement by Valve that Steam Machines based on the open source operating system are finally shipping.
-
Will I be putting Ubuntu back on it? Probably not. SteamOS certainly has its annoyances, and niggling issues, but it is still far nicer to use from across the room. I am hoping due to the very nature of Steam updates that these issues will be sorted quickly.
-
Desktop Environments/WMs
-
The development of the open source Enlightenment desktop environment used in numerous GNU/Linux operating system by default, or available from the default software repositories, announced the release of Enlightenment 0.19.13.
-
K Desktop Environment/KDE SC/Qt
-
Neofytos Kolokotronis of the Chakra GNU/Linux project has had the pleasure of announcing earlier today, November 15, the immediate availability of the latest KDE technologies in the default software repositories of Chakra GNU/Linux.
-
Since last few weeks I was working on the Lockscreen integration with KWin Wayland session, this is most important bit of the Plasma on Wayland session. Currently in X11 lockscreen is managed by ksmserver (KDE’s session manager). It suffers from various security problems which are mentioned on blog post by Martin Gräßlin. This blog post also mentions that in Wayland lockscreen functionality should be moved in kwin_wayland, so that compositor is aware that screen is locked, what windows are owned by greeter, and what should get input events.
-
About two months ago I blogged about clazy, a Qt oriented static analyser.
Since then it has moved to an official KDE repo http://anongit.kde.org/clazy, got an IRC channel (#kde-clazy @ freenode) and also many fun new checks.
-
It’s only been a couple of days since our 2015.11-Fermi ISO release, but it is already time for new updates!
KDE’s Plasma 5.4.3, Applications 15.08.3 and Frameworks 5.16.0 are now available in Chakra. These releases contain mostly bugfixes and translation updates, so they should be safe to update for everyone.
-
Bhushan Shah has shared the recent work he’s been doing on KDE’s KWin to have proper screenlocker integration on Wayland.
-
GNOME Desktop/GTK
-
As reported earlier this week, the GNOME Project announced the release of the second and last maintenance version for the current stable GNOME 3.18 desktop environment, bringing updates to numerous GNOME apps and core components.
-
Part of the GNOME 3.18 stack, Nautilus 3.18.2 brings impressive new features. GNOME’s default file manager brings a new features that displays external disk drives and SD cards in the sidebar instead of the Other Places menu, better support for Samba shares has been implemented and improved support for opening a new window via command-line has been added as well.
-
-
-
The rewrite of Budgie has seen some considerable progress and development that has been accelerated by the need to resolve issues that arose during the GNOME 3.18 Stack upgrade.
-
We were at SUSECon 2015 earlier in the month, where the company announced the release of OpenSUSE Leap 42.1. (We’ll have more on the event and a review of the distro in Linux Voice issue 23!) Richard Brown, Chair of the OpenSUSE board, made an interesting statement at the show: rolling releases are the future of distros. And not just hobbyist desktop distros, but enterprise ones as well (somewhere far down the line).
-
New Releases
-
Franceso Milesi, the creator of the Birds Linux open source operating system based on the latest GNU/Linux technologies and designed for students, informs Softpedia readers about the release and immediate availability for download of Birds Linux 6.0.
-
The Solus developers have announced a few important changes, improvements, and updates that have landed for their distribution. There are quite a lot of items that have landed over the past few days, so users do have a lot to look out for.
-
We reported a week ago that the developer of the 4MLinux project informed us about the Beta release of the 4MLinux Core 15.0 distribution. Today, November 15, Zbigniew Konojacki announces the immediate availability of 4MLinux 15.0 Beta.
-
Chapeau 23 is on it’s way, in the meantime enjoy Chapeau 23 Beta!
This build is a feature-complete release of the next major version of Chapeau built from Fedora Workstation 23, packages from the RPMFusion’s pre-release testing repos and packages from Chapeau’s 23 repo.
If you love having the latest software and don’t mind the odd issue that may crop up go ahead and check it out.
If you find an undocumented issue it would be appreciated if you report it either in the the support forum or if you can figure if a particular Chapeau package is to blame for an issue then you can also log & track issues on Github.
-
Vince Pooley of Chapeau Linux has had the great pleasure of announcing the release and immediate availability for download and testing of the Beta build of the future Chapeau 23 Linux operating system.
-
Notable Changes:
ZFS kernel modules were added in preparation for ZFS support in Cnchi v0.14
Fixed issue that caused a 20+ second delay in booting the ISO images
-
Like many of you, dear BetaNews readers, I use various operating systems throughout the day, such as iOS, Windows and Ubuntu. On the desktop, Linux is my true love. While Ubuntu is the reliable friend that is always there for me, I love other distros too, such as Fedora.
-
Screenshots/Screencasts
-
Ballnux/SUSE
-
Of the three distributions, I think Fedora is closest to the cutting edge, with openSUSE and Ubuntu both fairly close behind. However, Fedora and Ubuntu have relatively short support cycles with Fedora releases usually supported for about 14 months, Ubuntu 15.10 for just nine months and openSUSE 42.1 will receive three years of support.
The best distribution for the job will depend on the person and, of course, the role the distribution is to play. I think Fedora is aimed mostly at more technical users and people who like to tinker. Ubuntu is aimed squarely at Linux newcomers who generally want to just use their computer and openSUSE appears to be aiming at a sort of middle ground: people who have a little Linux experience and want options, but also want reliability and longer support cycles.
-
SUSE’s Douglas DeMaio has announced that OpenSUSE Tumbleweed has received major updates for both the kernel and the app stack. Kernel 4.3 has been installed by default, Firefox has been updated to version 42.0, Wine 1.7.54 has been released, video decoding enhancements have been implemented and the the Btrfs file system has received multiple updates.
-
Slackware Family
-
In one of my previous articles, where I wrote about the upcoming Slackware Live edition, I added some premature screenshots of the Plasma 5 packages I am announcing today. Just when I was preparing for upload, Pat released his big November 14th batch of updates to Slackware-current (including new kernel, compilers and X.Org), dubbing it “almost a beta”. That delayed the release process for my November Plasma 5 packages because I needed to check the impact of these updates to my already compiled packages.
-
-
Red Hat Family
-
The Koozali SME Server development team, through Terry Fage, announced the release and immediate availability for download and testing of the first Release Candidate (RC) version of the upcoming SME Server 9.1 server-oriented operating system.
-
OpenShift Enterprise 3.1 and Red Hat Atomic Enterprise Platform provide a comprehensive, modular solution for developing, delivering and managing container-based applications across the open hybrid cloud
-
Red Hat, Inc. (NYSE:RHT) has dropped 3.94% during the past week, however, the bigger picture is still very bullish; the shares have posted positive gains of 0.27% in the last 4 weeks. The counter has underperformed the S&P 500 by 0.32% during the past week but Red Hat, Inc. (NYSE:RHT) has outperformed the index in 4 weeks by 0.77%.
-
-
-
Fedora
-
fedmsg has a few Meetbot-related topics corresponding to Meetbot commands which I gathered daily, weekly, and monthly IRC meeting data from. You can construct queries for a time period by specifying the start and end parameters for the query. Using count variables from JSON data dump, I found the total number of messages pertaining to our query. You can also use Datagrepper Charts API for some basic visualizations.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
There are some less known features in Ubuntu, but they are usually announced or presented at some point during the development cycle. There is a really nice feature that allows users to change the volume in the OS, but it’s not advertised.
-
Canonical’s Michael Vogt informs us about the release and immediate availability for download of the tenth image of the stable Snappy Ubuntu Core 15.04 operating system for embedded and IoT (Internet of Things) devices.
-
Ubuntu still provides one of the best and most intuitive desktops for Linux.
Installing Ubuntu is simple and hardware support is handled brillliantly.
The repositories are full of great applications and the default applications within Ubuntu whilst small in number are well thought out and fully featured.
Unfortunately the one let down is the Software Centre. The software is old, tired, confused, unintuitive and fails to do the one thing for which it is designed to do.
My advice is to install Ubuntu and then get Synaptic. After you have done that replace Totem with VLC and Firefox with Chrome.
-
Michael Vogt, one of the Canonical developers, has announced that Snappy Ubuntu Core 15.04 for Internet of Things devices has been updated, a lot of interesting features and enhancements being implemented.
-
Submitting a bug is not on anyone’s list of favorite things to do in a day, but that doesn’t mean that you can’t make it fun. Someone notified the Ubuntu devs about a potential problem in the login screen, but it requires a cat to replicate the bug.
-
-
Minibian “Jessie,” a Linux distribution developed for all the available Raspberry Pi devices, has arrived and is now ready for download.
There are a lot of Linux distributions for the Raspberry Pi (first and second generation), so you might think that there is not a lot of room for another one, although this pun is intended as you’ll immediately see.
-
In the modern era, it seems to be aboug getting as much bang for the buck as possible, and although the Raspberry Pi itself is rather budget friendly, another board barges in to take the Cheapest title, and the specs are not to be dismissed.
The C.H.I.P, created by Net Thing Co, costs $9 USD, and runs a slim version of Debian, on a 1GHz Allwinner ARM SOC, coupled with 512MB of Ram and 4GB of flash storage, Wi-Fi and Bluetooth connectivity, standard and micro USB ports, and a composite AV jack and can also be extended with snap-on “shield” modules such as VGA and HDMI connectivity.
-
Phones
-
Android
-
-
-
Moto X 2013 devotes can jump for joy as Sprint has just released the Android 5.1 upgrade over-the-air. This upgrade should soon arrive on all Moto X 2013 smartphones running stock Android, it is only a matter of patience.
-
The Android Wear update to version 1.4 brings support for a number of watch gestures. While they are turned on by default after the update, you can double check this by waking up your watch face with a touch. Swipe left, and scroll down until you see Settings. Tap on it, and touch Wrist Gestures. Not only will you be able to enable or disable wrist gestures, there is also a tutorial in the settings. Keep in mind that having the gestures on will negatively affect your battery life. With gestures, your watch will respond to the speed and direction that you move your wrist.
-
While Android is what XDA is mostly about today, we have a rich history of tweaking beyond (and prior to) Android. You likely had a phone before your Android devices, too. Which devices did you own prior, and back then, did you tinker and tweak those at all?
-
Android Wear has been around for over a year, and despite numerous software iterations and two generations of hardware filled with alternatives, the smartwatch game still hasn’t trickled down into the mainstream, and it has certainly not matched the prediction that analysts have been putting forth for years now.
-
If you’ve only recently started to get deeper into the whole smartphone tech thing, immersing yourself in the layers of geeky information that lie beneath the shiny surface, you’ve probably encountered the terms “stock Android” and / or “vanilla Android” more than a couple of times by now. What do they mean? They are basically used to describe phones that run a version of the Android operating system that looks, feels, and acts as close as possible to how Google — Android’s creator — designed it to be.
-
-
BlackBerry has rolled out a new BlackBerry Priv emulator to help Android developers build apps for its latest smartphone. The tool could help developers who want to take advantage of Priv’s unique physical keyboard, which isn’t available on other popular Androids.
-
-
-
-
-
Sometimes you’re in the market for a super cheap phone. Whether you’re just looking for a stopgap replacement, a backup or a burner, having a cheap and cheerful smartphone around is something worth considering.
Today, Motherboard spotted a TracFone on WalMart’s website, developed in partnership with LG, that has pushed the price of an Android smartphone down to less than $10.
-
Specifically, the Open Sequencer Project is an attempt to design and build an automated DNA sequencer costing under $1,000. But it’s more: The goal is to introduce students to the world of genetics by providing access to capabilities normally found only in well-funded commercial and academic labs, and to achieve this using open source and open design methods.
-
ersonally, this whole business weighs on my heart and mind. There are software titles I use daily and I cannot understand their lack of widespread usage. Open source developers work tirelessly on their craft and, in the end, get little in return. It’s time something is done about that.
What’s the solution?
-
Based in Pune, India, Srikanth owes a lot of OpenSpecimen’s ease of use to its open-source software, which he views as the key to several of the firm’s successes. Open-source software, as opposed to software like Microsoft’s or Apple’s, is free to download and use. Examples include the Firefox web browser and the Libre Office suite. It allows for more creativity, because once it is downloaded, the user is free to modify the software for his or her personal needs. Sure enough, OpenSpecimen made some updates to the project, then turned around and made the software available for the international market.
-
-
Stickers are a big part of open source culture, but what are the rules for designing and collecting them? In this article, open source community members share what they like (or don’t like) in a sticker, their “rules” for collecting and displaying them, and their sticker wish lists.
-
If you value image quality and accuracy, calibration of your monitor will be important. Anyone involved in digital photography, graphic design or artwork will recognise the importance that their monitor is producing the best results, showing true colors and black levels. The objective when calibrating a monitor is to ensure the monitor has color references known by everyone (humans and software). This will mean the colours are represented accurately on your monitor.
-
Events
-
I got an idea to create conference management system. We have created an project in Red Hat faculty lab. With Petr and Standa we have decided to create something from scratch and now we have some proof of concept result.
The project is hosted at github and it is targeted to OpenShift deployment.
-
Web Browsers
-
Mozilla
-
For those with FFmpeg present on their system, Mozilla developers have finally enabled FFmpeg support to be used by default.
Firefox on Linux has relied upon GStreamer for media support, but with the patches merged last month is support for Libav 9 or FFmpeg 1.2 or newer by default.
-
Firefox has released an experimental app in the form of ‘Developer preview’version of its web-based Firefox OS for Android users. It is now available as an 88MB APK and works any launcher you will see in Google Play store.
-
The Mozilla developers have announced that Firefox 43.0, scheduled for release on December 15 2015, will be replacing GStreamer with FFmpeg. This is not surprising at all, since FFmpeg is available on the most popular Linux systems by default, or make it available via the default repos.
-
FFmpeg is present in most Linux distributions, so it’s not really surprising that Mozilla finally decided to make an important change to Firefox and allow it to use the latest FFmpeg packages that are present in a system.
-
SaaS/Big Data
-
-
Question: what’s better than predictive analytics?
Answer: predictive analytics and anomaly detection with pipeline aggregation intelligence, of course… so here’s an argument for why.
Elastic, the company behind the open source projects Elasticsearch, Logstash and Kibana, finished its European developer-focused tour this month.
-
-
Pseudo-/Semi-Open Source (Openwashing)
-
-
-
-
-
Taking a significant step toward making it simpler to deploy multiple types of application environments on top of a common set of IT infrastructure, VMware at the DockerCon Europe 2015 conference today fulfilled a pledge to open source a Photon Controller project through which organizations can invoke a common set of loosely coupled components and services.
-
BSD
-
AMD has been open-sourcing several components of their Linux HSA (Heterogeneous System Architecture) stack for the past several months including the AMDKFD kernel driver and HSAKMT run-time. In cooperation with SUSE, they also hope to have HSA accelerator support in GCC 6. Besides the GCC support, AMD is apparently planning to publish a Heterogeneous Compute Compiler.
-
GPUCC is their name for an open-source GPGPU compiler built atop LLVM. They call it “the first fully-functional, open-source high performance CUDA compiler” that is up to 51% faster on internal end-to-end benchmarks, on par with open-source benchmarks, compile time is 8% faster on average and 2.4x faster for pathological compilations compared to NVIDIA’s official CUDA compiler (NVCC).
-
FSF/FSFE/GNU/SFLC
-
I’m relatively proud of my track record of being a staunch advocate for improved security in text editor package installation. I’d like to think I contributed a little to the fact that MELPA is now available over HTTPS and instructs you to use HTTPS URLs.
But the situation still isn’t very good in Emacs-land. Even if you manage to get your package sources from an authenticated source over HTTPS, it doesn’t matter, because Emacs won’t verify TLS.
-
Licensing
-
-
-
-
-
-
-
A few months ago, the FCC proposed regulations that theoretically banned the use of open source firmware on your WiFi router. Needless to say, that rubbed a lot of enthusiasts the wrong way — how were you supposed to improve features or security on your own terms, especially on routers that were designed to be hacked? Well, you needn’t fear any longer.
-
Openness/Sharing
-
Standards/Consortia
-
The IEEE Standards Association (SA) said “development work” has already started on the new standard. It said the aim of the standard is to “improve the availability, accessibility and affordability of first-level screening for hearing-impaired people”.
-
A computer glitch that brought the Paris airport of Orly to a standstill Saturday has been traced back to the airport’s “prehistoric” operating system. In an article published Wednesday, French satirical weekly Le Canard Enchaîné (which often writes serious stories, such as this one) said the computer failure had affected a system known as DECOR, which is used by air traffic controllers to communicate weather information to pilots. Pilots rely on the system when weather conditions are poor.
DECOR, which is used in takeoff and landings, runs on Windows 3.1, an operating system that came onto the market in 1992. Hardly state-of-the-art technology. One of the highlights of Windows 3.1 when it came out was the inclusion of Minesweeper — a single-player video game that was responsible for wasting hours of PC owners’ time in the early ’90s.
-
Just over the border from New Hampshire in the Massachusetts city of Lowell, a woman identifying herself as a follower of the Church of the Flying Spaghetti Monster (FSM), otherwise known as Pastafarianism, has been approved by the state’s Registry of Motor Vehicles (RMV) to wear a spaghetti strainer on top of her head in her state issued driver’s ID.
The approval to wear the helmet was initially denied. However, citing religious grounds, Lowell resident Lindsay Miller filed an appeal. Following intervention by the American Humanist Association’s Appignani Humanist Legal Center, the RMV reversed their decision and allowed her to put on her colander and get her driver’s license picture taken.
-
It’s that time of year when technology predictions start to infiltrate your social networks, inbox, and news feeds. To kick off prediction season, ZME Science reminds us of perhaps the most accurate tech prediction of all time, coming from Ray Kurzweil in 1908. He says, “An inexpensive instrument, not bigger than a watch, will enable its bearer to hear anywhere, on sea or land, music or song, the speech of a political leader, the address of an eminent man of science, or the sermon of an eloquent clergyman, delivered in some other place, however distant.”
-
Security
-
US-based iPower Technologies has discovered that body cameras sold by Martel Electronics come pre-infected with the Conficker worm (Win32/Conficker.B!inf).
-
This is really no surprise: embedded system vendors aren’t good at carrying out quality assurance on their firmware images, and their embedded Web server software is what you’d expect from something written in the last 20 minutes of Friday afternoon.
-
Defence/Police/Secrecy/Aggression
-
The White House correspondent for French television network Canal+, Laura Haim, reported an interesting tidbit during a live report with MSNBC’s Brian Williams Friday evening.
Haim stated that Central Intelligence Agency director, John O. Brennan, recently met with his counterpart, French intelligence (DGSE) director Bernard Bajolet.
-
-
The French authorities will face serious problems in detecting additional terrorist plots despite the current state of emergency after the attack in Paris, former US Central Intelligence Agency (CIA) officer Paul Pillar told Sputnik.
-
The series of apparent Islamic State attacks in Paris can be compared to the 2001 destruction of the WTC towers in the US, says Jack Rice, a former CIA officer. The French capital is an iconic European city, and terrorists target icons.
-
Documents released by the CIA show details of over a dozen investigations into serious allegations of misconduct by agency employees, including child pornography, torture and war crimes. In many cases, the Justice Department decided not to prosecute.
Redacted records of the investigations, part of the 111 probes conducted by the CIA Office of the Inspector General (OIG) between January 2013 and May 2014, were obtained by Vice News under a Freedom of Information Act (FOIA) request.
-
This may be one of the more interesting ways to describe an airstrike against ISIS and it comes courtesy of former CIA Director Michael Hayden.
Friday on MSNBC’s “Morning Joe,” Hayden was talking about how airstrikes are being used to go after the terror organization’s infrastructure.
-
Then General Hayden made an unexpected comparison that seemed to temporarily stun Brzezinski and elicit a too-eager response from Deutsch. Hayden continued, “Airstrikes without ground power is a lot like casual sex: it offers gratification without commitment!”
Deutsch hopped in unabashedly, “Sign me up for that!”.
“Oh, my god,” responded Brzezinski.
As Mediaite reported over a year ago, General Hayden has made similar suggestions to this military approach before.
-
The CIA urged Turkey and Saudi Arabia to provide certain Syrian rebels with anti-aircraft weapons capable of shooting down airplanes, including high-flying passenger jets, Hildegard von Hessen am Rhein wrote for Boulevard Voltaire.
The fact that Syrian rebels fighting against Bashar al-Assad, a Russian ally, had CIA-sponsored weapons capable of downing a commercial airliner flying above 10,000 meters, makes a very uncomfortable situation for the US government amid the crash of the Airbus A321 operated by the Russian airliner Kogalymavia on October 31, the author said.
-
This all comes at a time when opinion polls in the West show a majority favor Russia’s Syria intervention.
-
The CIA’s targeted killing program has long been shrouded in secrecy. Recent leaks given to the Intercept, as well as thorough reporting by the Bureau of Investigative Journalism, have shed light on the execution of such attacks, but interviews with former CIA directors for an upcoming documentary puts the ethical quandaries of the program, which has few regulations, in stark relief.
“We do not know what the rules of engagement are,” former CIA director Porter Goss, who resigned under George W. Bush due to frustration, told Chris Whipple for the documentary The Spymasters: CIA in the Crosshairs. “Are we dealing with enemy combatants? Are we dealing with criminals? Are the rules shoot first? Do we only shoot when we get shot at? Can we ask questions? Do we have to Mirandize people?”
-
The UN Special Envoy to Libya became involved in conflict of interest after he was offered a high-paying job by the UAE while still a supposedly impartial head of dialogue talks to forge a peace agreement between the two rival Libyan governments.
-
Ali Awad, 14, was chopping vegetables when the first bomb struck. Adel Tormous, who would die tackling the second bomber, was sitting at a nearby coffee stand. Khodr Alaa Deen, a registered nurse, was on his way to work his night shift at the teaching hospital of the American University at Beirut, in Lebanon.
All three lost their lives in a double suicide attack in Beirut on Thursday, along with 40 others, and much like the scores who died a day later in Paris, they were killed at random, in a bustling urban area, while going about their normal evening business.
-
Could we please skip the empty bravado? This is a time for grief above all else, and a time to refrain from soundbites and posturing. France – our closest neighbour, oldest friend, beloved rival, what Philip Sidney called ‘that sweet enemy’ – France is stricken, and we should weep with her.
Over the past 40 years or so, most of us have heard quite enough politicians and others pledging to stand firm against terror, hunt down the vile perpetrators, ensure that it never happens again, and the rest.
Then there have been the emergency meetings of grandly titled committees, the crackdowns, the increased surveillance, the billions spent on spying and snooping, not to mention the various wars on terror which have certainly killed a lot of our troops, but never seem to make us any safer. It is remarkably hard to defend yourself against an enemy whose language few of us speak, yet who speaks ours and can move freely in our world, and who is willing, even happy, to die at our hands – or his own – if he can kill us first.
-
The hacker collective Anonymous released a video message on YouTube Sunday declaring war on the Islamic State in the wake of Friday’s bloody terror attacks in Paris.
The video, posted in French, announces the beginning of #OpParis, a coordinated campaign to neutralize ISIS’s social media channels.
“Anonymous from all over the world will hunt you down,” an (anonymous) Anonymous spokesperson, his face shrouded in the group’s signature Guy Fawkes mask, says in French. “Expect massive cyber attacks. War is declared. Get prepared.”
-
Transparency Reporting
-
On October 21, 2015, WikiLeaks (1) posted emails that were supposedly taken from the hacked AOL account of CIA Director John Brennan. The private email account was hacked by a supposed teenager who allegedly posed as a Verizon agent in order to gain access (2).
According to The Wall Street Journal (WSJ), some of the information that’s been released is correct. The journal attempted to contact many on the contact list as well as verify other pieces of information leaked. The WSJ also reported that some of the people whose addresses appeared on the list were actually contacted “by intelligence officials telling them their information had been compromised” (3).
-
PR/AstroTurf/Lobbying
-
Privacy
-
For example, France already has more extensive surveillance laws than UK, and the atrocities still happened.
-
The Interior, Justice and Defence ministries are considering constitutional changes to facilitate more effective civilian and military intelligence operations. Web surveillance powers for the security and intelligence police Supo are among the reforms on the table. Meanwhile President Sauli Niinistö says it’s time to raise the level of Finnish intelligence work to meet European standards.
-
The German government plans to make it illegal for the country’s intelligence agency, the Bundesnachrichtendienst (BND), to spy on citizens or institutions in EU countries. This follows revelations that the BND has been helping the NSA to snoop on European politicians and companies, as Ars reported in April. More recently, it has emerged that the BND’s own spying extended far more widely than thought: those kept under surveillance included the interior ministries of EU member states, the Vatican, and non-governmental organisations such as Care International, Oxfam and the International Committee of the Red Cross.
-
The French authorities are just a day into investigating the horrid events in Paris on Friday. We’ll know, over time, who did this and how they pulled it off. For that reason, I’m of the mind to avoid any grand claims that surveillance failed to find the perpetrators (thus far, French authorities say they know one of the attackers, who is a French guy they had IDed as an extremist, but did not know of people identified by passports found at the Stade — though predictably those have now been confirmed to be fake [update: now authorities say the Syrian one is genuine, though it’s not yet clear it belonged to the attacker], so authorities may turn out to know their real identity). In any case, Glenn Greenwald takes care of that here. I think it’s possible the terrorists did manage to avoid detection via countersurveillance — though the key ways they might have done so were available and known before Edward Snowden’s leaks (as Glenn points out).
-
Unfortunately, given recent political statements, we fear that the only response will lie in further bombings in the Middle-East and the escalation of security measures evermore harmful to fundamental rights. But when will we take the time to carefully analyse the failed policies carried on for the past fifteen years on a global scale, and through dozens of laws in France?
In the light of the declaration of the state of emergency and of political statements made over the weekend, La Quadrature du Net solemnly asks political leaders to take the time to reflect and engage in a rigorous, critical and transparent evaluation of France’s international, diplomatic, military, geo-strategic and commercial commitments; to think about the strategy of intelligence services and to complete a thorough examination of their workings; to defeat a warmongering rhetoric drive us towards a “clash of civilisations” doubled with an internal civil conflict within our society; to also address the tensions that ripple through French society, the discriminations stirred by a part of the political and media elite, the shared responsibilities into the largely misunderstood phenomenon of violent radicalisation, the dissolving of perspectives for social progress.
-
Ben Wizner, who is perhaps best known as Edward Snowden’s lawyer, directs the American Civil Liberties Union’s Speech, Privacy & Technology Project. Wizner, who joined the ACLU in August 2001, one month before the 9/11 attacks, has been a force in the legal battles against torture, watch lists, and extraordinary rendition since the beginning of the global “war on terror.”
On October 15, we met with Wizner in an upstate New York pub to discuss the state of privacy advocacy today. In sometimes sardonic tones, he talked about the transition from litigating on issues of torture to privacy advocacy, differences between corporate and state-sponsored surveillance, recent developments in state legislatures and the federal government, and some of the obstacles impeding civil liberties litigation. The interview has been edited and abridged for publication.
-
The FBI is denying that it paid $1 million to Carnegie Mellon University to exploit a vulnerability in Tor.
“The allegation that we paid [Carnegie Mellon University] $1 million to hack into Tor is inaccurate,” an FBI spokeswoman told Ars in a Friday morning phone call.
Two days ago, the head of the Tor Project accused the FBI of paying Carnegie Mellon computer security researchers at least $1 million to de-anonymize Tor users and reveal their IP addresses as part of a large criminal investigation.
-
Civil Rights
-
Matt DeHart, the former U.S. airman and Anonymous hacktivist who made a failed asylum bid in Canada — claiming torture over his access to secret U.S. government documents — has accepted a plea deal in a Tennessee court, avoiding a possible 70-year prison term but admitting to having explicit photos of under-aged teenagers.
-
According to Investigative journalist Will Potter, the secret prisons emerged during the last Bush administration in response to the 9/11 destruction of the New York Twin Towers.
-
A Senate security officer stepped out of the December chill last year and delivered envelopes marked Top Secret to the Pentagon, the C.I.A., the State Department and the Justice Department. Inside each packet was a disc containing a 6,700-page classified report on the C.I.A.s secret prison program and a letter from Senator Dianne Feinstein, urging officials to read the report to ensure that the lessons were not lost to time.
-
The report tells the story of how, in the months after the Sept. 11, 2001, terrorist attacks, the C.I.A. began capturing people and interrogating them in secret prisons beyond the reach of the American judicial and military legal systems. The report’s central conclusion is that the spy agency’s interrogation methods — including waterboarding, sleep deprivation and other kinds of torture — were far more brutal and far less effective than the C.I.A. acknowledged to policy makers, Congress and the public.
-
As the complicity of US allies in CIA torture comes to light, New Zealand has become the next nation to investigate its own possible ties to the secretive programs and illegal tactics that found favor with Washington in a post-9/11 frenzy.
New Zealand’s spy watchdog is acting on information disclosed in last year’s controversial US Senate Intelligence Committee Report, which outlined both the torture methods used and the countries that made it all possible; although “the names of those countries have been redacted,” according to Cheryl Gwyn, New Zealand’s Inspector-General of Intelligence and Security.
-
On the strength of a claimed turnover of $1 billion, the Australian Financial Review reported in early February 1978: “At this sort of growth rate Nugan Hand will soon be bigger than BHP.”
But two years later, on January 27, 1980, one of the bank’s two founders, Frank Nugan, was found dead near Lithgow in NSW from a gunshot wound to the head. An inquest found it was suicide. Meanwhile, the other founder of the bank, Michael Hand, was busy shredding documents, including “files identifying clients regarded as sensitive”.
-
Most of us who recall the extraordinary story of the Nugan Hand Bank never expected to live to hear an explanation for some of its notorious activities, never mind see anyone prosecuted for their conduct.
But now, thanks to Sydney investigative journalist Peter Butt, one of the bank’s co-founders, Michael Hand, has been found and we might at last get some answers.
Hand slipped out of Australia in June 1980 following the apparent suicide of his partner, Frank Nugan.
Butt, researching his book, Merchants of Menace, discovered him living under the name Michael Jon Fuller in the small US town of Idaho Falls where Channel Nine’s Sixty Minutes confronted him
After the body of Nugan was found in his Mercedes-Benz on a deserted road outside Lithgow on January 27, 1980, the bank collapsed, costing Australian investors millions of dollars.
-
Last month, the ACLU filed a civil action in the Eastern District of Washington on behalf of Suleiman Abdullah Salim, Mohamed Ahmed Ben Soud and Gul Rahman. They assert that the CIA secretly detained them in Afghanistan and subjected them to torture. Two of the plaintiffs, Suleiman Abdullah Salim and Mohamed Ahmed Ben Soud, survived their time in CIA detention, were eventually released and now reside in Libya and Tanzania. The third plaintiff, Gul Rahman, died in CIA custody in November 2002. The complaint names as defendants James Mitchell and John Jessen, former military psychologists. Plaintiffs claim that while serving as CIA contractors, defendants helped design and implement the CIA’s “enhanced interrogation techniques.” Mitchell and Jessen are both described in the controversial December 2014 report from the Senate Select Committee on Intelligence.
-
The Senate’s 6,700 page, $40M report on the CIA’s participation in torture has apparently never been read by a single member of the Executive Branch of the US Government, because the Department of Justice has ordered them all to stay away from it.
Why does the DoJ want to keep the Executive from finding out about the CIA’s use of torture? Because Senate documents are not subject to Freedom of Information Act requests, but Executive documents are, and the DoJ is so pants-wettingly afraid of the public discovering official wrongdoing that they have banned anyone subject to FOIA from touching the document, lest it become subject to transparency rules.
-
CIA whistleblower John Kiriakou and psychologist Bradley Olson will headline two free events Thursday bringing torture into the spotlight.
-
My drive was worth it. Kiriakou’s revelations in 2007 led to exposure of crimes, lies and cover-up all the way to the top of the Bush White House. It also brought the full weight of the federal government down on Kiriakou. We knew then that torture was illegal (against U.S. and international law), ineffective (yielding no actionable intelligence), and immoral (brutally sadistic). We know now from the Senate Intelligence Committee Summary Report, American Psychological Association’s Hoffman Report, flight logs of extraordinary rendition flights (many from Johnston County airport), and personal testimony that torture was widespread, systematic, orchestrated from the top, falsely justified by White House legal counsel, and counterproductive to fighting terrorism. Yet, no one except the person who spoke truth to power is being prosecuted. Even Bush and Cheney boast in their memoirs that they endorsed torture.
-
Multiple government agencies are doing their best to ignore a 6,900-page elephant in the room: a mammoth report, authored by the Senate Intelligence Committee, detailing the horrors of the CIA’s post-9/11 torture programme.
-
-
Internet/Net Neutrality
-
Why is Mark Zuckerberg so concerned about his ‘charity’ initiative that he had to re-jig it in the face of opposition, star in another breathless video about it, and start a misleading campaign about it among users in India? Bear with me, it’s an interesting story.
Facebook is in a bit of a jam, and opposition to this one pet project in India is probably pointing to the seams of a larger story worldwide. But it all starts with a simple pair of numbers.
-
-
Intellectual Monopolies
-
Copyrights
-
The seminal Anne Frank’s Diary is elevated to public domain in a month and a half. But the foundation holding the copyright is trying legal trickery to extend its monopoly by decades, and almost nobody reports it as the fraud it is.
Permalink
Send this to a friend
Posted in Europe, Patents at 7:27 am by Dr. Roy Schestowitz
Some people might actually believe them…
Summary: The EPO’s selfish expansion of the scope of patents comes under fire, as it not only serves to proliferate toxins and carcinogens but also gives state-enforced monopolies on forms of life (and basic foods)
SEPARATION between law-making regarding patents and actual patent examination (and grants) is absolutely necessary because one branch should never be tempted to practically expand the law so as to give more power and money to itself. The EPO has make a mockery of this separation when it turned into a part-time lobbyist, as we have shown here over the past few months.
How does the EPO plan to artificially elevate the number of patents and pretend there is ‘business’ expansion or more ‘innovation’? Well, one obvious way is to broaden the scope pf patents, including for instance software patents and patents on life. We wrote a great deal here about Monsanto (and patents on life) several years ago, e.g. [1, 2, 3, 4, 5, 6, 7, 8, 9] (we dedicated a whole series of articles to this subject), but now it’s the EPO that’s at the centre of this kind of controversy, not prominent supporters from bogus charities.
“Retarding innovation seems to be the goal now, in the interests of worldwide monopolies and oligopolies.”The EPO is nowadays monopolising everything for profit, irrespective of the impact of these monopolies on science and technology, not just in Europe but in the entire world. Facts-based analysis does not matter to the EPO. Retarding innovation seems to be the goal now, in the interests of worldwide monopolies and oligopolies.
As a lobbyists’ Web site (it often has lobbyists in there) put it, “European fruit and vegetables threatened by patent” and it “was quite a shock for plant breeders when the European Patent Office decided this spring to allow the patenting of natural plant properties. Since then, multinationals such as Syngenta and Monsanto have bought so many patents that we are on the brink of a dangerous monopoly of plant patents.”
This has also just been covered by IP Kat, which wrote:
The biggest problem created by the patenting of plant characteristics is that further innovation is blocked in the breeding sector [is there any evidence to support this assertion?]. The development of new plant varieties stops [does this mean that Monsanto, Syngenta and the other multinationals are no longer competing with one another]. After all, the holder of a patent has the exclusive right to a certain plant characteristic, so other breeders cannot use that property without permission and financial compensation [if that were the case, would we not have an instance of "essential facilities" with the European Commission already getting excited about this?]. This is a serious matter because by doing so, big companies are now pushing small businesses out of the market.
Surely we are going to hear a lot more about this in weeks or months to come. We welcome input on the subject, including related news links (we focus on software, so we often overlook news relating to this).
We are going to cover many more (and relatively new) EPO scandals in the week to come, so stay tuned and protect our right to free speech. There is actually a backlog of EPO articles, due to personal reasons (we’ll be away in Yorkshire with relatives this week).
Those who still don’t know what’s wrong with Monsanto can make a start by watching this informative video. █
“The antitrust litigation currently in the federal courts in the U.S. against Monsanto will be the test case in the life sciences, just as the Microsoft case was the test case in the information sciences.”
–Jeremy Rifkin
Permalink
Send this to a friend
11.15.15
Posted in News Roundup at 4:11 pm by Dr. Roy Schestowitz

Contents
-
Let’s just get this out of the way: this isn’t the year of Linux on the desktop. That year will probably never arrive. But Linux has gotten just about everywhere else, and the Linux community can take a bow for making that happen. Android, based on the Linux kernel, is so prevalent on mobile devices that it makes the longstanding desktop quest seem irrelevant. But beyond Android there are a number of places where you can find Linux that are truly odd and intriguing, and by “places” we mean both strange devices and weird geographical locations. This slideshow will show you that it’s always the year of Linux pretty much everywhere.
-
Desktop
-
Google has many side initiatives, and one of them is the Cultural Institute that digitizes works of art from museums and archives around the world and puts them online.
Today, their Art Project released an app for Chrome OS that updates the wallpaper of your device to a different piece of art from their collection every day. Expect “masterpieces ranging from Van Gogh and Monet, all the way to contemporary works from street artists around the world,” according to Chrome evangelist François Beaufort in announcement post. If today’s piece doesn’t jive with your artistic taste, you can skip to the next wallpaper in the app.
-
Chromebooks have been red hot sellers on Amazon for some time now. But if you’re someone who has had a boring desktop on your Chromebook, you can now spice it up with Google’s new Wallpaper Art app. The app will refresh artwork every day and features many different wallpapers from noted artists from the past and present.
-
Server
-
CoreOS, the company behind the popular lightweight Linux distribution for data center deployments with the same name, has recently made a big bet on containers. Today, the company is launching Clair, an open-source tool for monitoring the security of containers — and it’s also integrating Clair into its paid Quay container registry service as a beta feature (with support for Quay Enterprise coming at a later date).
-
Most users don’t know if there are vulnerable components inside of containers; Clair will help solve part of that challenge.
Containers offer users a new more optimized way to run virtualized applications at scale, but what about security? Any user can pull down a container application from an image repository without knowing if the application is safe. A new open-source project from CoreOS called Clair is aiming to solve part of the challenge by providing a security system that scans containers’ images for known vulnerabilities.
-
-
CoreOS’s new open-source project Clair, monitors containers security. Since it’s so easy for security holes to hide in containers this is no small matter.
-
-
-
On the final semester of my MSc program at Columbia SEAS, I was lucky enough to be able to attend a seminar course taught by Alfio Gliozzo entitled Q&A with IBM Watson. A significant part of the course is dedicated to learning how to leverage the services and resources available on the Watson Developer Cloud. This post describes the course project my team developed, the PaperTrail application.
-
Audiocasts/Shows
-
While I was initially attracted to the notion of sharing some of these thoughts in an audio format, I have decided to focus instead more on writing. This was partially informed by my back of the napkin research, but also in thinking about how we best present thoughts.
-
Every two weeks Bad Voltage delivers an amusing take on technology, Open Source, politics, music, and anything else we think is interesting, as well as interviews and reviews.
-
Kernel Space
-
-
THE LINUX FOUNDATION has launched its latest initiative to bring the tech sector closer together. This time, its sights are set on supercomputing or high-performance computing (HPC) if you’re not into the whole brevity thing.
-
The project will provide a new open source framework to meet HPC’s unique application demands and parallel runtime requirements, the organization said.
The framework will provide upstream project components, tools and interconnections to enable the software stack. The HPC components will contribute to a full-featured reference software stack for developers, system administrators and users.
-
-
With the Linux 4.3 Git tree at around 20.6 million lines of code, documentation, and utilities, I was curious to see whether the Linux 4.4 merge window was heavy enough to bump it over 21 million lines…
With the Linux 4.4 merge window ending this weekend, I ran GitStats on the latest mainline Linux Git code-base as of Saturday afternoon. It reports 20,851.092 lines at the moment made up of 560,344 commits from 14,557 authors. The 20.85 million lines is distributed amongst 52,184 files.
-
-
With the Linux 4.4 kernel the Lenovo Yoga 3 laptop owners out there will finally have support for using their ESC key.
Darren Hart sent in the x86 platform driver updates for Linux 4.4 already but he ended up sending in a second pull request as we near the end of the 4.4 merge window. This second platform-drivers-x86 update has “support for the unfortunately rather unique ESC key on the Ideapad Yoga 3″ plus fixes and DMI list additions.
-
If all goes according to plan, the Linux 4.4 kernel merge window will end today with the release of the 4.4-rc1 kernel. As all of the major subsystem updates have already landed for Linux 4.4, here’s my usual look at the highlights for this kernel cycle.
-
Con Kolivas has released the BFS scheduler v0.465 with support for the Linux 4.3 kernel.
It’s been a while since last having anything to report on BFS while this week he released a new version that seems primarily just about adding Linux 4.3 kernel compatibility. This is significant as he didn’t end up releasing a BFS update for Linux 4.2.
-
After months of continually trying out different methods of cheap yet effective cooling for the 60+ systems running daily Linux benchmarks, I’m finally happy with now having been one week of the room maintaining an ambient temperature of 68~72F (20~22C).
-
Graphics Stack
-
Just one week after Mesa Git received Nouveau NVC0 compute support, the NV50 Gallium3D driver for pre-Fermi GPUs has also received basic compute support.
-
Benchmarks
-
Yesterday AMD finally posted power management support for the AMDGPU DRM kernel driver when it comes to supported discrete graphics cards like Tonga and Fiji. I’ve been testing these PowerPlay Linux patches since yesterday to great success. In this article are results from a Radeon R9 285 and Radeon R9 Fury when testing these kernel patches along with the latest Mesa 11.1-devel Git drivers.
These AMDGPU PowerPlay patches are working out well so far in my tests. See the two aforementioned articles for more details on this AMDGPU power management code that lands more than 45000 lines of new code into this Direct Rendering Manager driver for the latest AMD graphics processors. It’s just a pity that the code is too late for making it into the Linux 4.4 kernel merge window and thus won’t be mainlined for a few months until the Linux 4.5 kernel. Up to now, the newer AMD graphics cards on the open-source AMD Linux driver have been limited to whatever (low) frequencies the core and memory clocks are initialized to at boot time. With PowerPlay, they can finally (and dynamically) ramp up when to their rated specifications.
-
Applications
-
As you may know, Mailnag is an open-source email notification daemon available for both GNOME 3 and Unity, which checks the POP3 and IMAP email servers.
-
QEMU 2.5 is underway as an important piece of the open-source Linux virtualization stack. Some of the highlights for QEMU 2.5 include the Xen support code now supporting pass-through of Intel integrated GPUs, VirtIO-GPU now supports the 3D mode, Vhost-user now supports live migration, support for multi-queue in Vhost-user, support for network filters, TCG has improved system emulation performance for targets with software TLBs, record/replay support for TCG, and a variety of other changes including many x86 and ARM specific additions. An in-progress listing of all the QEMU 2.5 changes can be found via this QEMU Wiki page.
-
-
Kodi, a media player and entertainment hub that carried the XBMC name, has been upgraded and moves closer to the final version of the 16.0 branch.
-
-
As you may know, Rexloader is an open-source download manager, developed in C++ and Qt. Among others, it has support for downloading files via ftp or torrent, it allows the users to manage the download of multiple files and has support for setting the maximum download speed.
-
FFmpeg, a complete solution to record, convert and stream audio and video, has been upgraded to version 2.8.2 and is now ready for download and testing.
-
-
As you may know, Komodo Edit is an IDE for coding in various web languages: Python, PHP, Ruby, Perl, HTML, CSS and JavaScript.
-
Instructionals/Technical
-
Wine or Emulation
-
Wine (Wine is not an emulator) 1.7.55 is now out, and it comes with quite a few major fixes that are sure to draw some serious attention.
-
-
-
-
-
Games
-
-
-
Football fans rejoice! We have a day one release of Football Manager 2016 for Linux & SteamOS. It’s a very popular game series, and great to see another on Linux.
Not one I’m going to pick up personally, as I much prefer the FIFA-type games than being a manager myself.
-
Sublevel Zero is a great looking and well received first-person roguelike six-degree-of-freedom shooter (wow, what a mouthful!).
-
Football Manager 2016, the latest installment of the most complex football simulator developed by Sports Interactive and published by Sega, has been released today for Windows, Mac OS X, and Linux.
-
Legends of Eisenwald an adventure game with tactical battles, RPG and strategy elements that was funded on Kickstarter. They wanted to do a Linux release, but they didn’t hit the goal to do it right away, and now due to finances it’s on hold.
-
Valve this week rolled out the hardware phase of its road map from bedrooms and basements to living rooms and lounge areas with its long-awaited video game controller, PC link box and Steam boxes.
-
Ars Technica today published a benchmark story that’s of note to SteamOS developers — using the same PC with a dual-boot setup, the site found that the same games performed worse, across the board, under Linux than they do under Windows 10. Framerates across a variety of games, including Valve-developed titles like Team Fortress 2 and Dota 2, suffered.
-
For years, game support on Linux has seriously lagged behind Windows, to the point that the OS was basically a non-option for anyone who wanted to game on a PC. In recent years, that’s begun to change, thanks to increased support for the OS via Valve and SteamOS. From the beginning, Valve claimed that it was possible to boost OpenGL performance over D3D in Windows, and it’s recently put a hefty push behind Vulkan, the Mantle-based API that’s a successor to OpenGL.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDE announced the monthly release of the KDE Frameworks project, a set of add-on libraries for the Qt5 GUI (Graphical User Interface) toolkit, which is now at version 5.16.0.
-
-
-
-
A new widget called KNewPasswordWidget has been added to the KWidgetsAddons framework, starting from 5.16. I decided to create this widget because sometimes you cannot just use KNewPasswordDialog to ask the users for a new password. This is the case when you need to add further options to the same dialog. This widget is meant to be easily embedded in such a custom password dialog, without having to code it from scratch.
-
As some of you might know, I started the application Cantor in KDEedu a couple of years ago, since I didn’t want to rely on comercial computer algebra systems during my studies, and because all the free alternatives seemed to lack a decent graphical interface. Since then Cantor has grown to support all kinds of different mathematical languages due to numerous contributors from all over the world.
-
GNOME Desktop/GTK
-
Once all this new code has settled down I’m going to be re-emailing a lot of the vendors who were unwilling to write vendor-specific code in fwupd. I’m trying to make the barrier to automatic updates on Linux as low as possible.
-
-
New Releases
-
Netrunner Rolling 2015.11 has been updated with packages from KDE Plasma and KDE Applications.
The desktop is at Plasma 5.4.2 together with KDE Applications 15.08.2 and many more applications and libraries updated to their latest versions.
-
Clemens Toennies informs us today about the immediate availability of the new Netrunner Rolling 2015.11 computer operating system, build around the latest KDE technologies.
-
4MLinux 15.0 is ready for testing. Create your documents with LibreOffice 5.0.3.2 and share them using DropBox 3.10.11, surf the Internet with Firefox 42.0 and Chrome 46.0.2490.80, stay in touch with your friends via Skype 4.3.0.37 and Thunderbird 38.3.0, enjoy your music collection with Audacious 3.6.2 and aTunes 3.1.2, watch your favorite videos with MPlayer SVN-r37544 and VLC 2.2.1, play games with Xorg 1.17.2/Mesa 11.0.2 support enabled. You can also setup the 4MLinux LAMP Server (Linux 4.1.10, Apache 2.4.17, MariaDB 10.1.8, and PHP 5.6.14). Perl 5.22.0 and Python 2.7.10 are also available.
-
Screenshots/Screencasts
-
Arch Family
-
Ringo de Kroon, the maintainer of the Manjaro Linux MATE and Cinnamon editions, has had the great pleasure of announcing the immediate availability for download and testing of the first Preview release of the Manjaro Linux Cinnamon 15.12 distribution.
-
Ballnux/SUSE
-
GeckoLinux is a Linux spin based on the openSUSE distribution, with a focus on polish and out-of-the-box usability on the desktop. Unlike its parent distribution, GeckoLinux is available as a live DVD that can be tested before installing. It has a number of unique features compared to its parent distribution.
-
Slackware Family
-
There is Porteus and SLAX, but no real Slackware live. Perhaps that’s about to change. Should Linux users live in fear of viruses and malware as Windows users do? Mel Khanlichi answered today. SteamOS was found to be lagging behind Windows performance for gaming and Josh Fruhlinger found 10 odds places for Linux. All this and more in today’s Linux news.
-
Yet another 200+ lines of updates in the ChangeLog.txt of slackware-current. It’s obvious that Pat has been watching the LinuxQuestions threads closely. And we are again very bleeding edge, with the Gnu Compiler Collection 5.2.0!
-
Red Hat Family
-
As of November 10, 2015, Red Hat (RHT) has generated returns of 31.8% for the trailing 12 months (or TTM) and 5.7% in the trailing one-month period. The company’s share price has fallen by 0.06% in the trailing five-day period.
-
-
-
Red Hat, Inc. (NYSE:RHT): 17 Analyst have given the stock of Red Hat, Inc. (NYSE:RHT) a near short term price target of $85.06. The standard deviation reading, which is a measure by which the stock price is expected to swing away from the mean estimate, is at $5.09. The higher price target estimate is at $92 while the lower price estimates are fixed at $72.
-
Fedora
-
The regcfp conference software project provides registration, payment, and talk submission features for community conferences. The project is available in Github. It was originally designed for GUADEC, the GNOME users and developers conference. Now a set of new features allow it to serve other conferences, too.
-
I pretty much followed Robert Gadsdon’s instructions here, except I had to compile mkbootimg by hand from the CyanogenMod sources as it doesn’t seem to be available in Fedora.
-
Okay here is a useful tip to all Fedora lovers like me, there are addict to NVIDIA binary drivers, for there GNOME-Shell to run in a way that they can work with it. Don’t install Fedora 23 yet. When it was released on the 3th of November 2015 it was released with a release candidate of xserver 1.18. The Official announcement of a stable xserver first came Mon Nov 9 13:17:40 PST 2015. This is resulting in NO drivers yet from nVidia I just used an entire day to hack around to understand what was wrong, just to realize, there is no way to make it work with Fedora 23 without downgrading to Fedora 22 there is running xserver 1.17.99.902 . I do have to point out that today is the 13th of November and there is still no driver from nVidia.
-
Debian Family
-
Derivatives
-
We reported two months ago that the Parsix GNU/Linux 7.5 (Rinaldo) operating system will reach its end of life on November 14, 2015, urging all users of the distribution to move to the recently released Parsix GNU/Linux 8.0r0 (Mumble) OS.
-
The developers of the Debian-based Robolinux computer operating system powered by open source and free GNU/Linux technologies have had the great pleasure of announcing the release and immediate availability for download of the Robolinux 8.2 LXDE Edition (Raptor).
-
-
Canonical/Ubuntu
-
Canonical’s open source OS, already runs on PCs, servers, phones and tablets. Now, a small company named Erle Robotics wants to bring Ubuntu to drones, too.
Erle Robotics is a start-up in Spain whose goal is to develop Linux-based “brains” for robots and drones. The company already offers products that run Snappy Core Ubuntu, the transactionally updated version of Ubuntu designed for embedded devices.
-
Unity 8 is being worked on for Ubuntu 16.04 LTS and a lot of progress has been made. One of the features that are expected to land, in more stable form, is platform convergence. Canonical is not the only company that’s working towards this goal, but it’s the only one that’s doing it right.
-
I’ve just published the most recent Community Donations Report highlighting where donations made to the Ubuntu community have been used by members of that community to promote and improve Ubuntu. In this report I’ve included links to write-ups detailing how those funds were put to use.
-
Flavours and Variants
-
Earlier today, November 14, Linux AIO’s Željko Popivoda informs Softpedia about the immediate availability for download of the Linux AIO Ubuntu 15.10 Live ISO images, which include some of the most popular Ubuntu 15.10 (Wily Werewolf) releases.
-
Linux AIO is a project to package multiple flavours of a distribution in one ISO within a DVD size limit. Users can try each flavour live or install on their systems. In essence the difference lies mostly in the desktop environments. This is an invaluable source of distributions for distro hoppers. Note that there are issues, some of which are unresolved due to distro dependencies. However, for most of it, the stuff works.
-
-
Mikroprojekt’s Linux-based “Kondor AX” development board for IoT gateways and small basestations combines a Lattice ECP5 FPGA with an i.MX6 Solo SoC.
Mikroprojekt and Lattice Semiconductor jointly announced Mikroprojekt’s FPGA-enabled Kondor AX as a Linux-supported platform for use in a variety of communications and industrial applications at the network edge. It is principally designed to meet the growing market for small LTE basestation cells found in HetNets (heterogeneous networks), which often combine macro basestations, small cells, WiFi hotspots, and distributed antenna systems (DASs). Other applications are said to include industrial IoT gateways, microservers, millimeter wave backhaul applications, IP cameras, and HMI displays.
-
Qnap’s TAS-168 and dual-bay TAS-268 NAS devices run both Linux and Android on a dual-core ARM SoC, and offers private cloud and media player capabilities.
Qnap is positioning the single HDD-bay TAS-168 and dual-bay TAS-268 at the bottom of its Home NAS line below the faster, dual-bay TS-231 and the higher-end, dual-bay TS-251 launched in 2014. Like these systems, the new TAS devices are mini-towers and run Qnap’s Linux-based NAS OS. In addition, Qnap claims the devices are the first home network-attached storage devices that also run Android.
-
Now these first prototypes will be put on heavy testing before we run the board in production. We want to see if they will be able to run Linux yet or just Android.
-
Phones
-
Android
-
A rather critical Exploit has been uncovered in Google’s own ‘Chrome for Android’ app which allows malicious programs to be installed without user intervention.
-
When it comes to smartwatch sales, Apple Watch has well and truly embarrassed the entire Android Wear ecosystem, even though it hasn’t spent anywhere near as long on the market. But with Google’s platform getting a high-profile supporter this week, is it time for change?
-
Word on the street is that Google is in talks with chip manufacturers in an effort to gain more control over the chip design process. Clearly the company is striving to patch up the fragmented Android ecosystem, but is this a step toward becoming more like Apple? And would such standardization be a good thing?
If Google succeeds in convincing microchip producers to start building their chips based on Google’s specs, this could bring a lot of uniformity to Android smartphones. On the one hand, this may make Android more competitive with iOS and make developing for the operating system simpler. On the other, the Android ecosystem stands to lose the very thing that originally defined it: diversity.
-
-
-
-
-
-
-
-
The Android probe was prompted by complaints from small European ad blockers, app stores and the like, along with the Microsoft-backed FairSearch. Yandex, a company with a $4.8 billion market cap, weighed in in April, too. But now, buoyed by its success in Russia, Yandex is sharing its involvement publicly and ramping up its complaints in Brussels.
-
-
That big Android Wear update isn’t just about allowing cellular data on smartwatches — it’s also really helpful if you don’t have a hand free. Google has quietly revealed that Android Wear 1.4 has a ton of new wrist gestures beyond the usual flicks to navigate cards. You can take action on a card by pushing your arm down, for instance, or go back to your watch face by wriggling your wrist. You’re probably going to look silly if you use nothing but wrist gestures, but this beats dropping a bag (or freezing your hands) just to touch your watch for a brief moment.
-
The BlackBerry resurgence continues apace. Mere days after the launch of the Priv slider, a second BlackBerry smartphone running on Android has leaked: the Vienna.
-
Google just might decide to design its own chipsets to power Android devices. If it can pull this off Android might give even stronger competition to iOS, but this is easier said than done.
-
-
There are a lot of valid reasons why someone would want to run Android emulators on their PC. App developers may be trying to test their application before shipping it out. Gamers may want to use a mouse and keyboard on their games. Maybe you just want it there to have it. In any case, Android emulation on PC is possible and we’re going to take a look at the best Android emulators for PC.
-
-
So should you shell out your hard-earned money for the Nexus 6P? If you call yourself an Android lover, I would say the new Nexus 6P is worth the upgrade.
It’s got a premium body, a stunning camera, one that is perfect for snapping memories of your get togethers without any low-light worries and yes it comes with latest version of Android. As far as premium goes, the Nexus 6P offers the entire experience, and unlike other premium devices, does not cost a bomb.
-
Focus on community and technology will follow. That’s a fundamental principle for successful open source projects, according to the Apache Software Foundation’s Jim Jagleski, a self-described and self-evident “graybeard” of open source communities.
Apache is one of the great open source success stories. First released 20 years ago, Apache serves 56% of websites worldwide. Jagleski serves on the board of the Apache Software Foundation, which incorporated in 1999, and is its most senior still active contributor.
-
In the era of mobile and cloud, we are becoming consumers of our own data and the companies whose services we use are becoming the owners.
These five technologies or projects ensure that we remain in charge of our digital lives.
-
On a desktop computer, you think of an operating system as a big piece of complex software. For small systems (like an Arduino) you might want something a lot simpler. Object Oriented State Machine Operating System (OOSMOS) is a single-file and highly portable operating system, and it recently went open source.
OOSMOS has a unique approach because it is threadless, which makes it easy to use in memory constrained systems because there is no stack required for threads that don’t exist. The unit of execution is a C++ object (although you can use C) that contains a state machine.
-
Last year, a pair of creators crowdfunded OpenBCI — an open source software suite and interface board that made biosensing — taking readings of electricity in the human body, especially the brain — far more affordable and accessible. Now, the same people are back with the pushes this even further with new, even more affordable gear.
-
Earlier this week, Google made a splash when it released its TensorFlow article intelligence software on GitHub under an open-source license. Google has a sizable stable of AI talent, and AI is working behind the scenes in popular products, including Gmail and Google search, so AI tools from Google are a big deal.
Today on GitHub, TensorFlow, primarily written in C++, is the top trending project of the day, the week, and the month, having accrued more than 10,000 stars in about one week.
-
Events
-
-
FOSSCOMM (Free and Open Source Software Communities Meeting) is a Greek conference aiming at Open Source enthusiasts, developers, and communities. It has been hosted in various cities around Greece and its goal is to promote the use of FOSS in Greece and to bring FOSS enthusiasts together.
-
Web Browsers
-
Mozilla
-
Freedom and privacy go hand in hand. In an ideal world, we wouldn’t have to worry about who was looking over our shoulders. None of us would have anything to hide, and we would have ulterior motives. As citizens of the real world though, we have to take measures to protect ourselves.
Building privacy features into the software we use makes that protection easier to accomplish. And, that’s why Mozilla has extended Firefox’s private browsing feature with a new option to prevent third-party sites from tracking your on-line activity.
-
Firefox OS Smart TVs are televisions that run based on the Firefox OS platform from Mozilla. It was announced in early 2015 on the Panasonic VIERA series, It has now been fully launched and is available across the world.
-
There are many possible ways to download URL lists to the browser and check against that list before loading anything. One of those is already implemented as part of our malware and phishing protection. It uses the Safe Browsing v2.2 protocol.
-
It was all the way back in 2012 when we covered the news of Mozilla’s Firefox browser arriving for Android. At the time, there were some compelling reasons to use the browser on Android, too. For example, it worked seamlessly with Flash content, while Apple’s iOS devices didn’t.
-
SaaS/Big Data
-
For organizations wanting to run data sets and perform quick data analytics without having to use statistical software packages, IBM Cloud Infrastructure for Analytics offers a secure, cloud-based analytics platform that is now backed by a feature called Secure Hadoop. Secure Hadoop protects data that is moving to and from a cloud platform and data at rest, which gets encrypted and remains protected when moved to IBM’s SoftLayer object storage or the Hadoop Distributed File System (HDFS).
-
Pseudo-/Semi-Open Source (Openwashing)
-
AGCO Corp. announced that its AgCommand Application Programming Interface now is open to approved third-party developers and service providers of farming applications, such as management dashboards and mobile apps.
This new capability will enable AGCO customers to access their machine data through their other farm and fleet management tools.
-
Machine Learning
-
BSD
-
Today, the US Department of Energy announced that it had established a partnership with Nvidia that would be enhancing the LLVM compiler collection. The goal will be to port an existing Fortran compiler that targets massively parallel GPUs. The results are expected to be released as open source in late 2016.
-
The US Department of Energy’s National Nuclear Security Administration has teamed up with NVIDIA’s PGI compiler division to create an open-source Fortran compiler atop LLVM.
-
As some extra benchmarks to toss out there this weekend are some Clang 3.8 SVN compiler benchmarks when trying out different optimization levels.
LLVM Clang 3.8 SVN was tested as of a few days ago atop an Ubuntu 15.10 x86_64 system. The Clang 3.8 tests were done when the CFLAGS/CXXFLAGS set separately to -O3 -march=native, -O3, -O2, -O1- and -O0. These numbers are just being put out there for reference purposes and using just a random selection of tests… Basically there was free time on one of the test systems and I was just running some extra benchmarks for testing some different code paths of the Phoronix Test Suite prior to its Hammerfest release.
-
-
Today the NNSA and its three national labs announced they have reached an agreement with Nvidia’s PGI software to create an open-source Fortran compiler designed for integration with the widely used LLVM compiler infrastructure.
-
FSF/FSFE/GNU/SFLC
-
Remove FTP passive to active fallback due to privacy concerns.
Add support for –if-modified-since.
Add support for metalink through –input-metalink and –metalink-over-http.
Add support for HSTS through –hsts and –hsts-file.
Add option to restrict filenames under VMS.
Add support for –rejected-log which logs to a separate file the reasons why URLs are being rejected and some context around it.
-
The Freeciv project was founded on November 14 1995, by Peter Joachim Unold, Claus Leth Gregersen and Allan Ove Kjeldbjerg. The three Danish students created this open source strategy game while studying computer science at Aarhus University. Today, 20 years later we have interviewed the founders of the project to find out about the early history of Freeciv.
-
GNU Pem is a handy tool to help you keep track of your personal income and expenses. It is portable across all platforms GNU Linux, MS Windows, Apple OS X, FreeBSD, you name it.
-
Public Services/Government
-
The council of the Swiss capital of Bern on 12 November ordered the IT department to end its dependence on proprietary software. The council halved the city’s request for a six-year licence contract, and insisted on an exit plan. A majority of councillors wants the city to replace proprietary software by open source solutions, such as Linux and LibreOffice.
-
I don’t know why FLOSS should have to be voted in a council but here we have it again. IT departments should just announce smaller budgetary requests and make it happen. Bern, like many jurisdictions in Europe will have Free Software sooner or later.
-
After one year, the UK Open Government Forum now has over 600 members. The platform was established by Involve in November 2014 on behalf of the UK Open Government Network (OGN). It aims to help coordinate work on the Open Government Partnership (OGP), and build and support the open government movement in the UK.
-
Openness/Sharing
-
Programming
-
With PHP 7.0 RC7 being the final development version of PHP 7, which is expected to be officially release at the end of the month, I’ve carried out some fresh benchmarks of PHP using our in-house benchmarking software. Compared in this latest PHP 7 benchmarking comparison is PHP 5.5 as packaged on Ubuntu 14.04 LTS and then comparing fresh builds of PHP 5.6.15 and PHP 7.0.0 RC7. On the HHVM side was using Facebook’s HHVM 3.10.1 release as packaged for Ubuntu 14.04 LTS.
-
Not only is this is a great opportunity to make an impact on the software that the community uses every day, but it’s also a chance to gain one of the more rare and exclusive Fedora badges, Parselmouth! To help show how you can help, Fedora Python maintainer Matej Stuchlik answered some of the Community Operations team’s questions on the Community Blog.
-
Standards/Consortia
-
OpenMP 4.5 was formerly known as OpenMP 4.1 but was renamed due to the massive changes for this popular parallel programming API.
-
-
“Every time you don’t clean up after yourselves, we’ll add another Justin Bieber song to the playlist.”
-
Police were called on Saturday morning to reports of “suspicious actions” on the man’s part. They said explosives ordinance disposal specialist officers at the airport but that it was too early to determine what the item was.
-
Police said they were called at around 9.30am on Saturday morning following ‘suspicious actions by a man who discarded an item at the airport’.
In a statement they said that the man was arrested and EOD (explosive ordnance disposal) specialists have been called to the airport to investigate the item.
Eyewitness Tim Unwin tweeted that the terminal is in a ‘shutdown situation’.
-
GATWICK’S North Terminal has been evacuated this morning.
There are unconfirmed reported of a “suspicious package” at the site.
-
It was a role he relished and he often returned to it over a period of four decades.
He was a consummate character actor who took on a wide variety of roles on stage, screen and television.
And despite playing Johnny Speight’s infamous creation for such a long time, he managed to avoid being typecast as Britain’s favourite bigot.
Warren Mitchell was actually born as Warren Misell on 14 January 1926 in north London.
-
There were sixty technicians on board the high speed TGV train on Saturday when it crashed near Eckwersheim, leaving ten people dead. Local authorities said the train appeared to have “derailed because of excessive speed.”
The train derailed and caught fire at about 6:15p.m. local time (1700 UTC) according to local press reports. The wreckage fell into a canal.
The crash happened on the second section of the Paris to Strasbourg high-speed TGV line, which is due to open in April 2016.
-
Five people died and at least seven were injured when a high speed train derailed in France during the country’s highest ever terror alert.
Early reports suggest the TGV 2369 test train caught fire before overturning and smashing onto its side in Eckwersheim, near to Strasbourg this afternoon.
The train is thought to have been undergoing a trial run when witnesses said it hit a nearby bridge just before setting fire.
Crash scene investigators are probing whether the derailment was caused by “excessive speed”.
-
Science
-
American computer architect and high-tech entrepreneur Gene Myron Amdahl died Tuesday at the age of 92.
Amdahl’s wife Marian said he had suffered from Alzheimer’s disease for about five years, before succumbing to pneumonia. “We are thankful for his kind spirit and brilliant mind. He was a devout Christian and a loving father and husband. I was blessed with having him as my husband and my best friend. I praise God for His faithfulness to us for more than 69 years.”
-
Security
-
Zoho, California-based online productivity and SaaS company said that the site has seen disruption in services as it has become subject to a cyber attack that began on Wednesday. Hackers issued threats and also tried blackmailing as well.
-
In other words, the point of stealing information from millions of JPMorgan Chase customers? To spam them with messages about penny stocks.
-
-
-
-
A few years ago, it was difficult to browse the web without coming across a site using Flash.
Released in 1996, the browser plug-in enabled animations, interactivity and streaming video on what was a largely static web.
But the software has been plagued by security problems, and has been criticised for affecting computer performance and battery life.
Now many experts say the media plug-in’s days are numbered. Watch the video to find out more.
-
Canonical published details in a security notice about a number of Kerberos vulnerabilities that have been found and fixed in Ubuntu 15.10, Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.
-
Some of the most popular continuous integration tools used by software development teams have not been designed with security in mind and can open a door for attackers to compromise enterprise networks.
Some of the most popular automated software building and testing tools used by developers have not been designed with security in mind and can open the door for attackers to compromise enterprise networks.
-
Linux.Encoder.1 is targeting websites deployed on servers running Linux and created on various content management systems, including WordPress and Magento.
-
Defence/Police/Secrecy/Aggression
-
Remember the mood in America just after 9/11? The surge of super-patriotism (dare we say jingoism)? The pall of political correctness (you’re fired, Bill Maher). The phrases that so resonated: “Let’s roll.” “You’re either with us or against us.” “Bring ‘em on.” Something like that is taking hold in France right now after Friday night’s horror, one of the worst terrorist attacks on Western soil since that terrible day 14 years ago.
-
-
Meanwhile, an explosion also occurred near the Stade de France, where the French national soccer team was playing against Germany. Hollande, who was attending the game, was evacuated according to French television station iTELE. The explosion could be heard clearly during the game, as captured by the live feed of the match.
-
Mohammed Emwazi was blown up as he climbed into a car near a clock tower in Isis’s Syrian stronghold city of Raqqa where its jihadists have staged hundreds of brutal public executions.
Last night US officials were “99 per cent sure” the 27 year old from London – branded the world’s most wanted man for the videoed beheadings of at least seven prisoners including two Brits – had been killed.
-
We are all France. Apparently. Though we are never all Lebanon or Syria or Iraq for some reason. Or a long, long list of additional places.
We are led to believe that U.S. wars are not tolerated and cheered because of the color or culture of the people being bombed and occupied. But let a relatively tiny number of people be murdered in a white, Christian, Western-European land, with a pro-war government, and suddenly sympathy is the order of the day.
“This is not just an attack on the French people, it is an attack on human decency and all things that we hold dear,” says U.S. Senator Lindsey Graham. I’m not sure I hold ALL the same things dear as the senator, but for the most part I think he’s exactly right and that sympathy damn well ought to be the order of the day following a horrific mass killing in France.
I just think the same should apply to everywhere else on earth as well. The majority of deaths in all recent wars are civilian. The majority of civilians are not hard to sympathize with once superficial barriers are overcome. Yet, the U.S. media never seems to declare deaths in Yemen or Pakistan or Palestine to be attacks on our common humanity.
-
China is ready to join France and the international community in stepping up security cooperation and combating terrorism, President Xi Jinping told French President Francois Hollande on Saturday, after attacks in Paris that killed about 120 people.
-
As terrorists murdered scores of people in Paris on Friday, Americans watching in horror from afar immediately began to show solidarity with the French people. Many harkened back to the September 11, 2001, terrorist attacks, when Le Monde declared, “Nous sommes tous Américains,” and French President Jacques Chirac issued repeated expressions of his country’s solidarity with the United States.
“I have no doubt for a single moment that terrorism, which is always fanatical, mindless, and mad, clearly represents the evil in today’s world. And so we must combat it with the greatest energy,” he told CNN in a representative interview. “The Americans are currently making a great effort, a very effective one, it seems to me, with the search for all the clues and then those to blame, so that they can determine who is at the origin of this murderous folly. And when subsequently it comes to punishment for this murderous folly, yes France will be at the United States’ side.”
-
In the annals of shame and hypocrisy, few things match America’s duplicity toward its veterans.
For their troubles, they earn lip service from politicians, are allowed to board some airplanes first, receive a few bucks off at restaurants and, once a year, get their own holiday on which everybody expresses support for them. They are also honored at sporting events in ceremonies that, despite appearances, are actually paid for with taxpayer dollars.
But step away from these feel-good exercises, and you get a bucket of cold water in your face. Let’s take a frank look at the serious problems that veterans are facing every day — and what is or isn’t being done about them.
-
Relationship can be described as a paradox, where cooperation is more about the US’s own interests
In an interview with German weekly Der Spiegel, Thomas Drake, a former employee for the US’s National Security Agency (NSA), described the NSA’s relationship with Germany by saying, “It’s a sort of paradox in that relationship.”
Drake was drawing attention to the fact that, while Germany and the NSA are partners, the NSA does not hesitate to spy on Germany when the US’s national interest is on the line.
-
When it comes to the whistleblowing on the NSA, Edward Snowden is not the first one. According to NGO ‘GAP(Governmental Accountability Project)’, Thomas Drake has dedicated his life to safeguarding his country. He served in the Air Force specializing in intelligence, and then worked as a CIA analyst and contractor for the National Security Agency (NSA)for 12 years before joining the NSA full time in 2001. Drake worked at the agency as a software contractor until 2008. When he saw abuse in the billions of dollars spent on the allegedly illegal surveillance program, he took his concerns to his superiors at NSA, to Congress and to the Department of Defense Inspectors General, but nothing changed. Finally, Drake made legal disclosures of unclassified information to a Baltimore Sun reporter. He was prosecuted by Department of Justice under the Espionage Act. He faced the possibility of decades in prison. NGOs and media made this issue public. The DOJ finally dropped all of the Espionage Act charges. Drake pled guilty to a misdemeanor and was sentenced to one year of probation and community service, but lost his pension. The Hankyoreh interviewed with Drake on Oct. 12 for one and half hours through video chat. He declined to disclose specific declassified information but provided worthwhile insight.
-
South Korea and the South Korean public have been under complete surveillance from every possible direction. The scope of wiretapping around the world revealed by Edward Snowden, former contractor for the US’s National Security Agency (NSA) and the results of the Hankyoreh’s investigative reporting into the documents he leaked bring about that feeling of shock and horror.
The “Five Eyes” intelligence-sharing group that was led by the US and included four other English-speaking countries was able to monitor online information for anyone, anywhere in the world, at any time. South Korea was no exception.
This snooping took place at any time that these countries deemed it necessary for their national interest, even when there was no legitimate excuse.
-
-
Xkeyscore is a key program used by the US National Security Agency (NSA) to collect, organize, and search data. Internal NSA documents released by the Intercept describe it as a “DNI [digital network intelligence] exploitation/analytic framework.” It can be used by the NSA to search for information through specific email addresses or keywords. A document stating that the candidate names, genders, email addresses, and the term “candidacy” were used as keywords to search for information during the 2013 election for World Trade Organization director-general gives a hint of the program‘s capabilities.
-
-
The Venezuelan president will resort to various international organizations to denounce Washington’s recent violation of the country’s territory.
Venezuelan President Nicolas Maduro said he will denounce Washington’s new threats against the South American country to international organizations after a United States intelligence plane violated the country’s airspace twice on Friday.
-
The sound of an apparent explosion can be heard on the flight recorder of the Russian-operated plane that came down over the Sinai peninsula, killing all 224 people on board, adding to the evidence that a bomb was smuggled aboard, French media sources said on Friday.
Giving further credence to the idea that the plane crash was a terrorist act rather than because of structural failure, Russia, which for a week has been resistant to speculation about a bomb, suspended flights to all Egyptian airports.
An Egyptian-led international team of aviation experts, including some from France, successfully recovered the black box, the flight recorder, from the crash site. Several French media outlets, including the television station France 2, reported that the investigators had listened to it and concluded that a bomb had detonated, which would seem to rule out structural failure or pilot error. The pilots can be heard chatting normally, including contact with airport controllers, up until the apparent explosion.
-
“Patients burned in their beds, medical staff were decapitated and lost limbs, and others were shot by the circling AC- 130 gunship while fleeing the burning building. At least 30 MSF staff and patients were killed,” the introduction to the report says. The dead include 10 patients, 13 staff and seven more bodies that were so badly burned they have not yet been identified.
-
Transparency Reporting
-
EFF has long fought for the public’s right to use federal and state public records laws to uncover controversial and illegal law enforcement techniques. That’s why we filed an amicus brief in a federal appellate court case this week asking it to reconsider a decision that makes it much easier for law enforcement agencies such as the FBI to conceal their activities.
-
Environment/Energy/Wildlife
-
Consumers for Smart Solar, the group promoting an anti-home-solar constitutional amendment in Florida, has collected half a million dollars from the 60 Plus Association, a group that has itself received at least $34 million since 2010 from organizations financially backed by the Koch brothers.
Unlike most states, Florida does not allow homeowners to enter into contracts for the no-upfront-cost installation of solar on their homes. In other states, this freedom has contributed to the dramatic 80% increase in home solar installations across the US in 2014, and seen large financial investments from corporations like Google.
Rival constitutional amendments are being proposed for the Florida ballot in 2016.
One of these would allow homeowners increased rights to install solar energy; that one is backed by consumer and environmental organizations.
-
-
A tsunami advisory was issued for parts of southern Japan on Saturday after a magnitude 7.0 earthquake struck off the coast of Kyushu.
-
A magnitude 7.0 earthquake has struck off Japan’s south-western coast, triggering a small tsunami.
The Japan Meteorological Agency (JMA) said a 30cm (1ft) tsunami was registered on the southern Nakanoshima island, part of Kagoshima prefecture.
There were no immediate reports of damage or injuries.
A tsunami warning issued for Kagoshima and Satsunan islands was later lifted. The quake happened at a depth of about 10km (six miles).
-
Over the years, President Obama has repeatedly called on Congress to kill the sizable subsidies the federal government annually grants to oil companies. “It’s outrageous,” he said in a 2012 speech. “It’s inexcusable. I’m asking Congress: Eliminate this oil industry giveaway right away.”
-
Toxic fumes from the Indonesian fires that have spread a choking haze across Southeast Asia may be doing more harm to human and plant health than officials have indicated, scientists measuring the pollution say.
Farmers are expecting a poor harvest because plants have too little sunlight for normal photosynthesis, while government figures of half a million sickened by the smoke are only the “tip of the iceberg”, said Louis Verchot, a scientist with the Center for International Forestry Research (CIFOR).
-
Indonesia’s forest fires, which this year sent vast plumes of smoke across the region described by climate officials as a “crime against humanity”, could return as early as February, the forestry minister said on Friday, but on not such a large scale.
Slash-and-burn agriculture, much of it clearing land for palm oil crops, blanketed Singapore, Malaysia and northern Indonesia in a choking “haze” for months, pushing up pollution levels and disrupting flights, as it does every year.
But this year was unusually severe.
-
Major Indonesian conglomerate Sinar Mas Group, in a tie-up with the central government, conducted a forest-fire extinguishing test on Nov. 5 using a product developed by several small Japanese companies. The exercise puts Japan’s technology into practical use as Indonesia struggles to cope with forest fires and the smoke emanating from them, which pose an ever-worsening problem for Indonesia and neighboring countries.
The test took place on the outskirts of Palembang, a city on Sumatra Island, in a forest plantation owned by Asia Pulp and Paper Group, where a fire had continued to burn. Asia Pulp and Paper is a member of Sinar Mas Group, which is run by ethnic Chinese.
-
Finance
-
The New Zealand government released the final text of the Trans-Pacific Partnership agreement, the White House followed suit hours later. The massive trade deal, which includes 12 countries and 40% of the world’s economy, has been shrouded in secrecy until now. Parts of the deal have been leaked along the way, but it’s the first time the public has had a chance to read what may become the the most broad reaching trade deal in history if all the interested countries ratify the treaty. The agreement has enormous implications for global labor, food and product safety, access to affordable medications, the environment and much more. For a look at how the TPP agreement would affect the internet and what access to redress would look like under the corporate-driven agreement, FSRN’s Shannon Young spoke with Evan Greer, Campaign Director of Fight for the Future, a group best known for its advocacy of an open and neutral internet.
-
The US faces lots of issues right now, from being sucked into a war in Syria to stagnating salaries and a shrinking middle class – and ahead of the upcoming presidential elections, people are looking for a candidate who can actually bring change to the way the country’s been going on in domestic and foreign policies. But what games are the candidates playing? Is the choice of candidates wide enough, or too limited? We ask the former mayor of Salt Lake City and founder of the U.S. Justice party.
-
Though careful never to mention Clinton by name, Sanders has drawn a series of contrasts with the former secretary of state on issues that include her backing of the war in Iraq, trade and the minimum wage.
-
When State Senator Virginia Lyons thought it would be wise to develop legislation to reduce harmful electronics waste in her state of Vermont, the last complaint she expected to receive was from the People’s Republic of China. The Chinese it seemed, had issue with how new E-Waste reduction measures for Vermont would impact their sales of electronics to the USA.
-
The European Commission has formally presented its proposed reforms on the controversial investment protection and dispute resolution for the Transatlantic Trade and Investment Partnership (TTIP).
The ‘more transparent’ investment court system will replace the so-called investor state dispute settlement (ISDS) mechanism. It aims to safeguard the right to regulate and create a court-like system with an appeal mechanism based on clearly defined rules, with qualified judges and transparent proceedings.
-
-
In a bipartisan bid to encourage commercial exploitation of outer space, the U.S. Senate this week unanimously passed the Space Act of 2015, which grants U.S. citizens or corporations the right to legally claim non-living natural resources—including water and minerals—mined in the final frontier.
The legislation—described by IGN’s Jenna Pitcher as “a celestial ‘Finders Keepers’ law”—could be a direct affront to an international treaty that bars nations from owning property in space. The bill will now be sent back to the House of Representatives, which is expected to approve the changes, and then on to President Barack Obama for his anticipated signature.
-
The bill would prohibit companies from hiring H-1B employees if they employ more than 50 people and more than 50 per cent of their employees are H-1B and L-1 visa holders.
-
PR/AstroTurf/Lobbying
-
There’s a reason Sanders’ online fundraising operation has caught the eye of Democratic Party leaders nationwide: He raised $3.2 million in just the two days after the last debate — roughly as much as O’Malley raised over June, July, August, and September combined.
-
Lott is a well-known pro-gun advocate and frequent source of conservative misinformation about gun violence. He rose to prominence during the 1990s with the publication of his book, More Guns, Less Crime, although his conclusion that permissive gun laws reduce crime rates was later debunked by academics who found serious flaws in his research. (Reputable research indicates that permissive concealed carry laws do not reduce crime and may actually increase the occurrence of aggravated assault.)
-
When civilians are killed, media reaction is often contingent upon who did the killing and why. Instead of blanketly condemning such attacks, the bombing of civilians can be implicitly justified if those civilians were in the wrong place at the wrong time—say, in a Doctors Without Borders hospital in Afghanistan, or, more recently, in a neighborhood in Lebanon.
Two ISIS suicide bombers killed at least 43 people and wounded more than 230 in attacks on a heavily Shia Muslim community in Beirut on November 12. This was the worst attack on the city in years.
-
After President Obama condemned the attacks in Paris, France, calling the attacks “terror” and an “attack on all humanity,” right-wing media personalities immediately attacked Obama, in particular for not criticizing Islam.
-
Probably because he’s ahead in the polls, attention is currently focused on Ben Carson’s distant relationship with the truth, most interestingly his story of getting offered a scholarship to West Point. It’s a ridiculous tale given the fact that many young Americans try to get into the military academies (I applied to Annapolis), so a lot of people know the real deal. If you gain acceptance after a grueling application process — I remember a battery of physicals that took all day and having to obtain a sponsorship from a member of Congress — tuition, room and board is free. But you’re committed to serving as a junior officer for six years after graduation.
-
-
Censorship
-
The Government of Quebec has introduced new legislation that requires Internet service providers to block access to unlicensed online gambling sites. The provisions are contained in an omnibus bill implementing elements of the government’s spring budget, which included a promise to establish website blocking requirements. The bill provides that “an Internet service provider may not give access to an online gambling site whose operation is not authorized under Québec law.” The government’s lottery commission will establish the list of banned websites:
-
Earlier this week, an administrator for a private Facebook group called “Winchester, MA Residents” received a notification from Facebook that a comment made on the group’s site had been removed.
The comment was made beneath a controversial post about a local high school not using the pledge of allegiance, but what was unusual was that the comment in question neither incited violence nor was it harassing—in fact it seemed quite measured in its tone.
”Yeah that’s an unfortunate conflation of government and religion,” the commenter wrote. “I’m in favor of removing all references to god from all governmental documents and instruments, including our legal tender.”
In the notification to the group administrator, Facebook said only that the post had been removed because it didn’t “follow the Facebook Community Standards.”
-
The ISP under legal pressure to block The Pirate Bay in Sweden has criticized efforts to make the provider an accomplice in other people’s crimes. In a joint statement two key executives of Telenor / Bredbandsbolaget warn that folding to the wishes of private copyright holder interests could mark the beginning of the end for the open Internet.
-
Blocking The Pirate Bay and other file-sharing or torrent sites is glaring example of severe censorship that a Swedish internet service provider or ISP said will eventually curtail the free flow of information that users enjoy. Sweden denying access to TPB will doom the Open Internet concept, a new report said.
-
Can an internet service provider (ISP) be requested to block access to a torrent site like The Pirate bay?
-
When we look at the number of resolved crimes against journalists, it turns out that in more than 90 percent of murder cases, those killings are left unresolved, which keeps the executioners safe while the killing of journalist becomes one of the cheapest form of establishing censorship, along with blocking investigative journalism, preventing distribution of progressive ideas and opening the space for debate, etc.
-
Conservative alumni, already suspicion of Nichol, saw this as the long-feared first strike against their heritage and the school’s rightfully Christian identity. They launched a grassroots campaign to pressure the college to reinstate the cross and, if necessary, fire Nichol.
One of the organizers of this campaign was a former college board member. While writing for the student paper, I once found that she had been ghostwriting student op-eds criticizing Nichol, passing them off to conservative students and encouraging them to publish them in the school paper under their own names. When I asked her about it, she told me that if I reported what she’d done she would use her “connections” in Washington media to make sure I was “toxic” and thus would never find work as a journalist. I mention this not to insert myself into the story, but rather to illustrate that this larger campaign was not some high-minded intellectual debate but rather was experienced on campus as a bitter fight in which activist alumni were not above threatening students.
-
Members of the Portage High School Thespians had been rehearsing Bad Seed for two weeks when they received word from administrators that the play would have to be rewritten to expurgate references to drugs, alcohol, and sex. The students would have none of that.
-
The best way to address censorship is to resist it, veteran Indonesian writer Goenawan Mohamad said.
-
-
It was just another lazy afternoon when I was watching a rerun of one of the episodes of my favourite sitcom, Friends, when I heard the beeping of the word ‘boobies’ throughout the entire episode. In the 21st century, it is hard to believe that the ‘watchdogs’ of our Indian society would believe the audience to be this easily excitable when exposed to this word. Not only is it inconvenient for the viewers to watch the same, but it also downrightly rejects their level of intelligence.
-
The truth is, religious groups are granted a unique concession when it comes to the right to be offended. This is not so much about the battle between believers and non-believers, this is a battle between censorship and freedom of speech.
-
Yale and the University of Missouri both made headlines last week after students who started out passionately protesting allegations of racism and cultural insensitivity wound up attacking professors’ speech rights and freedom of the press.
-
The recent debates over free speech and “safe spaces” in the academy may have reached a watershed with last week’s debacle at Yale University, where a group of students had a meltdown over an email defending culturally “insensitive” Halloween costumes. Several video clips of a confrontation in which protesters mobbed a beleaguered administrator went viral on the Internet — serving, one hopes, as a wake-up call for the nation.
-
-
The pre- and post-election period in Turkey has seen a mass of violations meted out against media workers. Here are just five examples of how press freedom is on the wane in Turkey
-
In recent weeks, Iran’s powerful hardline Islamic Revolutionary Guards Corps (IRGC) has rounded up a number of artists, journalists and U.S. citizens, citing fears of Western “infiltration”.
-
Over the past few years, there has been an interesting debate going on regarding how Bitcoin should position itself in the regulatory landscape. While the opinions are divided as to how the solution should look like, there may be a third solution hardly anyone has ever thought of. Sometimes it’s not about picking sides, but trying to collaborate with every party involved.
-
Three days ago a petition popped up on the website Change.org urging Mark Zuckerberg to “support freedom of expression in India” by unblocking an atheist Facebook group there with over 13,000 members.
Facebook, the petition said, had not given any reason for the blockade. One day users in India who tried to visit the site were simply hit with a message that the content was “unavailable.” This was not the first time a Facebook page for atheists had been censored in the secular state. In June, another atheist Facebook group was reportedly labeled “unsafe” and its members were unable to share its content.
-
-
A video from The Rubin Report discussing the growing culture of censorship on U.S. campuses was recently censored by a moderator on Reddit, despite its popularity among users.
-
Last night Stephen Colbert showed a penis on CBS’s The Late Show. Don’t worry, he showed it for only two seconds, the maximum length of time that the network’s censors would allow. He also attempted to show numerous sets of female primary and secondary sex organs, but they were blurred out. For those getting their knickers in a twist and preparing to complain to the FCC about how Colbert is corrupting your children (but, seriously, what were your kids doing up at 11.30pm on a school night?) all of these organs were on works of art. Yes, Colbert can show the statue of David, but only at far remove and only for two whole seconds because that is the country we Americans live in.
-
It’s no secret that TV censors can be arbitrary, bewildering, and sometimes downright goofy. But on Thursday’s Late Show, Stephen Colbert demonstrated just how bizarre—and specific—some of these policies can be. As he discussed the recent sale of Modigliani’s “Nu Couché” (“Reclining Nude”), Colbert noted that several networks, CBS included, won’t display the painting without blurring out, as Colbert put it, “both Hootie and the Blowfish.”
-
-
-
-
-
-
-
-
-
-
-
-
Turkey’s government has blocked Reddit under its Internet censorship law 5651. Under this law, the country’s officials are allowed to ban sites that contain content that is pirated, is pornographic in nature or contains criticism of the current President Mustafa Ataturk.
-
-
It was the scrawl of red ink snaking around paragraphs that told novelist Sheng Keyi how much things had changed. Just over a decade ago, Sheng’s best-selling breakthrough novel, Northern Girls, was published uncensored in mainland China to critical acclaim.
But last month, as editors prepared to launch a third edition of the book, the author was informed that parts of her text were no longer publishable.
“It is ridiculous,” Sheng complained, pointing to an editors’ manuscript on which a red ballpoint pen had been used to highlight sections that now needed excising. “It doesn’t feel like something that could happen in real life and it makes me quite angry.”
-
Don’t get me wrong, my favorite comedian is Louis CK, probably one of the most offensive, least politically correct comedians ever. I personally love his jokes, but maybe others don’t, and guess what? That’s okay. I will not attempt to convince people otherwise. Not everyone likes what everyone else has to say, but labeling criticism of speech as an attack on freedom of speech is a bit overzealous. You can’t tell people what they can and cannot say, but you also can’t mandate how they should respond. We all come from differing backgrounds, which means some buttons are a bit easier to push than others. You might think a rape joke is “funny,” but a sexual assault survivor will not. (I would sincerely hope anyone reading thing does not find rape jokes funny, but, I don’t know, different strokes).
-
Details of the TPP (Trans-Pacific Partnership) agreement were finally released late last week following a secretive, seven-year negotiating process. The purported trade deal’s 6,194 pages of mind-numbing legalese actually cover a wide range of policy questions that have little to do with tariffs, imports, or exports — including a chapter on intellectual property that will likely dismay supporters of an open Internet.
President Obama may boast that the trade bill eliminates more than 18,000 taxes that countries impose on U.S. exports, but TPP also enshrines the very measures sought by SOPA, a controversial copyright infringement bill that failed in Congress three years ago.
-
-
Quebec Finance Minister Carlos Leitao tabled legislation on Thursday to implement the provincial budget that was announced in March, including amendments to the province’s Consumer Protection Act that direct Internet service providers (ISPs) to “block access” to a list of “unauthorized gambling sites” to be drawn up by Loto-Québec. Failure to comply could lead to a fine of up to $100,000 and twice that for subsequent offences.
-
Myanmar’s government has been notorious for its censorship.
-
American musicians have it tough, but try making it work in Myanmar. To be an artist in the isolated Southeast Asian country is to face nearly impossible barriers. The Internet is spotty, the music scene virtually nonexistent and every original song must still be approved for release by a government-affiliated censorship board.
-
Privacy
-
The search field would make it easier to find content on specific profile pages. For instance, a user could type the name of a publication or website to find any links from that particular site that have been posted on that profile. Typing in the word “cat” would pull up any posts containing that word.
-
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person’s online behavior across a range of devices, including phones, TVs, tablets, and computers.
The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. While the sound can’t be heard by the human ear, nearby tablets and smartphones can detect it. When they do, browser cookies can now pair a single user to multiple devices and keep track of what TV commercials the person sees, how long the person watches the ads, and whether the person acts on the ads by doing a Web search or buying a product.
-
Gurgaon and San-Francisco based startup Silverpush has secured 8.2 crore funding from Hiro Mashita led Japanese early-stage investment firm, M&S Partners. IDG Ventures India and Dave McClure-led incubator and investor 500 Startups which are among the existing investors also participated in the funding round.
These fresh funds will be used in the development of a new platform by the company called PRISM which would help brands to measure their television ratings of their ad commercials.
Initially, in April last year the company raised INR 9 crore in funding IDG Ventures India and Ronnie Screwvala’s Unilazer Ventures and was also a part of incubation batches of GSF Accelerator and 500 Startups and received $100K from both the incubators. Now with the latest round of funding, its latest product PRISM aims to solve the most pressing concern of advertisers to gauge the ratings of their ads.
Traditionally, it takes days and sometimes even months after the ad has been relayed to measure its effectiveness on brand awareness, website traffic and other data. With PRISM, the companies would be able to get quick insights about their ads being run on TV.
-
A research project conducted by Carnegie Mellon University’s (CMU) Software Engineering Institute (SEI) could have unmasked newly-launched Tor hidden services in just two weeks, according to a source familiar with SEI’s work. The method used by the SEI may have also let other observers of the Tor network “hijack” SEI’s information and de-anonymize Tor sites or users themselves.
SEI “had the ability to deanonymize a new Tor hidden service in less than two weeks,” the source said. “Existing hidden services required upwards of a month, maybe even two months.”
-
-
The Obama administration may have punted for now on the topic of encryption, but Kentucky Sen. Rand Paul said he’ll ensure Americans can securely protect th
-
Police said Quartavious Davis was part of a stunning crime spree. Armed and masked, Davis, with a group of others, robbed a string of businesses in the Miami area: witnesses put him at stick-ups at Little Caesar’s, a gas station, a Walgreens, an auto parts store, a beauty salon, a Wendy’s, and a jewelry store. One witness claimed Davis pointed a gun at his head and robbed him. Another witness said, when he attempted to write down the plates on the getaway car, Davis opened fire. The witness fired back.
Davis was eventually found guilty and sentenced to 1,941 months in prison — nearly 162 years. At the trial, prosecutors called on an array of evidence. DNA tied Davis to the car, and surveillance video put someone matching his description at multiple robberies. Others involved in the robberies testified against him. And then there was Davis’ phone: through a controversial use of records, known as cell site location data, police were able to place Davis’ mobile device near the location of six of seven robberies when they occurred.
-
Earlier this year, a research paper presented a new attack against the Diffie-Hellman key exchange protocol. Among other things, the paper came with a reasonable explanation of how the NSA might be able to read a lot of the Internet’s VPN traffic. I wrote a blog about this in May.
Last month, the paper was presented at the ACM CCS 2015 conference and thus made the news again. While the research does have serious implications, it did not signal the end of the use of the Diffie-Protocol as some suggested.
-
Facebook on Saturday sought to tamp down criticism that it had rolled out its widely-used Safety Check feature amid the terrorist attacks in Paris when the social network had not done so during a recent attack in Beirut.
-
UK ISPs have warned MPs that the costs of implementing the Investigatory Powers Bill (aka the Snooper’s Charter) will be much greater than the £175 million the UK government has allotted for the task, and that broadband bills will need to rise as a result. Representatives from ISPs and software companies told the House of Commons Science and Technology Committee that the legislation greatly underestimates the “sheer quantity” of data generated by Internet users these days. They also pointed out that distinguishing content from metadata is a far harder task than the government seems to assume.
Matthew Hare, the chief executive of ISP Gigaclear, said with “a typical 1 gigabit connection to someone’s home, over 50 terabytes of data per year [are] passing over it. If you say that a proportion of that is going to be the communications data—the record of who you communicate with, when you communicate or what you communicate—there would be the most massive and enormous amount of data that in future an access provider would be expected to keep. The indiscriminate collection of mass data across effectively every user of the Internet in this country is going to have a massive cost.”
-
-
A common misconception, Olsen says, is that the NSA began collecting the data without giving any thought to how controversial the program would be if word got out. “For all the time I worked on all of these issues, this was a constant discussion,” Olsen says. “How do we calibrate what we’re trying to do for the country with how to protect civil liberties and privacy?”
-
-
-
-
-
“If the Internet is being used against us, that is something we should know,” he said. “We have to know what is going on.”
-
-
-
“I am just a citizen. I was the mechanism of disclosure. It’s not up to me to say what the future should be — it’s up to you,” NSA whistleblower Edward Snowden told a packed house in Grant Hall.
-
One of the most wanted men in the U.S. just found a new ally. On Oct. 29, the European Union voted in favor of granting Edward Snowden, the whistleblower behind the infamous 2013 National Security Agency (NSA) leaks, political rights within member states. According to The Huffington Post, the parliament voted 285-281 on the proposed legislation which requested that member states “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistleblower and international human rights defender.” Snowden would later Tweet that the EU vote should not be seen as an attack against the U.S., but rather as a form of international friendship extended towards him.
-
The message is loud and clear: we have no fear!
“This mobile phone was used to call the personal number of William Binney, a former technical director of the US National Security Agency who quit in protest in 2001 and later became one of the first whistleblowers on illegal NSA programs,” reads a bright yellow poster pasted to around 200 advertising columns in Cologne.
“Since [the phone] was used to call Binney, we must also assume that the number +49 174 276 6483 is now also under direct surveillance,” the poster says.
All clear so far. But then presents you with what it calls an “opportunity” – and implores you to dial the number!
-
Only weeks before the US Patriot Act will be replaced with the USA Freedom Act a federal judge ruled that National Security Agency (NSA) Bulk Telephone Metadata Program which was revealed by Edward Snowden in 2013 that systematically collects Americans’ domestic phone records in bulk “likely violates the Constitution.” After waiting 2 years on the Circuit Court to rule, on November 9, 2015 US District Judge Richard J. Leon (District of Columbia) issued a 43 page Memorandum Opinion 20 days before the NSA Bulk Telephone Metadata Program was to end to cease collecting metadata calls of a California lawyer and his law firm as the Judge stated “…because of the loss of constitutional freedoms for even one day is significant harm.”
-
The reassurances may be misleading, because the NSA often uses the vulnerabilities to make its own cyber-attacks first, according to current and former U.S. government officials. Only then does NSA disclose them to technology vendors so that they can fix the problems and ship updated programs to customers, the officials said.
-
US tech giant Microsoft will be unable to evade the long reach of the National Security Agency (NSA) by relocating customer data to Europe, NSA whistleblower J. Kirk Wiebe told Sputnik on Friday.
-
This past week began with a federal judge handing a big win to privacy advocates opposed to the U.S. government’s warrantless dragnet collection of domestic call records, and ended with an attorney straining to see that victory implemented before the clock runs out on the entire program.
-
A US federal court ordered the halt to the NSA’s bulk metadata collection programme, citing the Constitution and confirming a previous ruling. In a 43-page ruling, Judge Richard Leon of the Washington DC District Court writes “This court simply cannot, and will not, allow the government to trump the Constitution merely because it suits the exigencies of the moment.”
-
The ruling “says you can’t just sort-of comply with the law, which is what the government had been saying it was going to do”.
Leon noted the government’s position: that “the immediate cessation of collection of or analytic access to metadata associated with plaintiffs’ telephone numbers … would require the NSA to terminate the program altogether”.
-
A U.S. appeals court Tuesday temporarily blocked the ruling of a federal judge who this week called the National Security Agency’s bulk collection of Americans’ telephone records almost certainly unconstitutional, just weeks before the program’s scheduled phase-out.
-
US District Judge Richard J. Leon ordered the National Security Agency or NSA to stop its spying program immediately. He calls he phone data collection by the agency is as unconstitutional, the second federal judge to do so.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The police have been questioning a number of party leaders in Parliament regarding a leak from the Committee for the Intelligence and Security Services that ended up with a NRC journalist, the Telegraaf reported on Tuesday.
According to the newspaper, this investigation is related to the affair surrounding Internal Minister Ronald Plasterk and the 1.8 million telephone details shared with American service NSA early last year. Plasterk gave speculative information about this on television before informing the Tweede Kamer, lower house of parliament, which resulted in him narrowly surviving a vote of no confidence in February 2014.
-
-
-
Encryption service Tor was designed to keep its users anonymous, but early last year, it was compromised, handing reams of information about people who used the software to view the “dark web” to an unknown party. Now the non-profit Tor Project that develops and maintains the anonymity software thinks it has its culprit. The group says that Tor was cracked by the FBI, with the help of researchers from Carnegie Mellon University, who were allegedly paid $1 million for their work.
-
-
Stingrays are the best known of a class of devices known as “cell-site simulators”. Roughly the size of a suitcase, such devices operate by pretending to be cellphone towers, then stripping data and metadata from phones which connect to them.
Use of the devices does not require a warrant. A bill introduced by Chaffetz last week aims to change that.
In the letters sent out on Monday, Chaffetz, with the committee’s ranking Democrat, Elijah Cummings, and the chair and ranking member of the information technology subcommittee, Will Hurd and Mike Kelly, demanded agencies provide all documented policies and guidelines regarding Stingray use, as well as related memoranda, non-discl
-
The NRO, which costs the US taxpayer roughly $10 billion a year, is responsible – criminally irresponsible would be a better term – for the global satellite and air-breather constellation of collection platforms, and well as the delivery of that digital data from point of collection to point of processing.
-
It’s the hottest trend in spooking: Take law-abiding citizens, usually business owners, and use the justice system to compel them into being your enthusiastic deputies. People pitch in by opening their doors, both physically and digitally, so the government can make use of any supposedly private user data they might have. The seeming enthusiasm of the collaboration comes from the fact that these same orders make it a crime to reveal the collaboration, so service providers must also actively deceive their own users about the true level of privacy they provide.
Now the UK is getting in on the action, as it’s been revealed that under the upcoming Investigatory Powers Bill it will have the ability to order companies to build software “backdoors” into their products, and revealing that collaboration could result in up to a year in prison. More than that, the government is also empowering itself to enlist the services of talented individuals like hackers, and to also legally restrain these people from revealing the work they’ve done — even in open court. In the US, these orders are called as National Security Letters (NSLs), and they have come to be routinely served to everyone from a small business owners to major corporate executives.
-
Underwater cables. Surveillance drones. Reconnaissance satellites.
California artist and geographer Trevor Paglen photographs the things we “don’t understand how to see” — like the military infrastructure that quietly shapes our lives.
Today Paglen joins guest host Tom Power to discuss the surprising beauty of troubling things, why we shouldn’t trust our eyes, and how his work has changed his online behaviour.
“The internet is quite hostile. It is preying on the fact that we are telling it our most intimate secrets.”
-
It seems more and more apparent that all of the people waiting for federal courts to protect their privacy will decay into cobweb covered skeletons before the courts actually limit the power of the federal surveillance state.
On Monday, the U.S. Supreme Court rejected what Reuters called “a test case on privacy in the digital age.” The nine justices declined to weigh in on whether police need to obtain search warrants to examine cellphone location information held by wireless carriers.
The case revolves around a Florida man named Quartavious Davis. A court convicted him in a string of 2010 robberies in the Miami area. Police used Davis’ cell phone information to place him in the area of the crimes. He challenged his conviction because the police did not obtain a warrant before accessing his location information.
The SCOTUS declined to take up the case after the 11th U.S. Circuit Court of Appeals ruled in May that the failure to obtain a warrant did not violate Davis’ right to be free from unreasonable searches and seizures under the Fourth Amendment to the U.S. Constitution.
-
But Thomas Drake, a former employee for the US’s National Security Agency (NSA) argued that attention should be paid to how technology is changing. While intelligence organizations have always had the instinct to snoop on people, he said, the fact that they are now able to carry out indiscriminate surveillance online not on specific targets but on the public as a whole is a different story altogether.
They aren’t perfect, but there are some ways to go about protecting your personal information.
An increasing number of people are using PGP, a program that encrypts emails and files. The name of the program stands for “Pretty Good Privacy.” Basically, the program seals messages in an envelope that is hard for third parties to open.
-
Think of how often sit with your phone, tablet, or computer, quietly shopping or reading the latest headlines. Browsing the internet certainly feels like a solitary activity, but as a new study in the International Journal of Communication reveals, you may be surprised by just how many companies are observing.
Tim Libert, a doctoral student at the Annenberg School for Communication at the University of Pennsylvania analyzed the Alexa top one million websites, finding that 88 percent leak user data to third parties — sites that would be unfamiliar to most users.
-
As more commerce moves online, encryption technology is not only securing the digital economy, it’s helping to grow it, according to economists.
Though difficult to quantify, there’s no doubt encryption has been a significant boon to the online economy, according to a Monday report from libertarian think tank the Niskanen Center.
“The problems of online security and the non-economic benefits of encryption are well understood, but there has yet to be a comprehensive analysis of the economic benefits created by the spread of encryption,” Niskanen Center policy analyst Ryan Hagemann and research associate Josh Hampson wrote.
-
-
The ECJ’s recent decision will certainly increase the already-existing legal insecurities relative to data transfer from Europe to the United States. The newly negotiated agreement between Brussels and Washington on the transatlantic transfer of personal data will most likely have little impact on this legal un-certainty, as the judges expressly doubted the European Commission’s authority to enact binding rules for member states’ data protection authorities.
-
Brett Lempereur is a lecturer at Liverpool John Moore’s University, and to help make the abstract notion of surveillance more concrete, he’s built a tool called “Icreacharound” (a play on the NSA’s top-secret search engine ICREACH) that displays all of his Web data so that you can imagine what’ll be like the agents of the government can have this kind of access to your browsing habits.
-
For the past two and a half years, many have hoped that the mass surveillance programs revealed by U.S. National Security Agency whistleblower Edward Snowden would inspire serious reform of Western intelligence agencies, nudging the post-9/11 national security pendulum back in the direction of privacy and civil liberties. Unfortunately, the opposite is occurring.
With few exceptions, the past year has seen governments around the world double down on intrusive mass surveillance. Unprecedented and draconian new laws crafted in the name of fighting crime and terrorism have emerged in France, Australia and many other countries. Last month the U.S. Senate passed the Cybersecurity Information Sharing Act, a deceptively named bill that has nothing to do with security and everything to do with having companies give more of their customers’ data to U.S. government agencies. And last week, U.K. Home Secretary Theresa May presented a long-awaited draft of the new Investigatory Powers Bill, a collection of sweeping reforms that would give more powers to British police and spy agencies, including the Government Communications Headquarters (GCHQ), the NSA’s close ally and longtime collaborator.
-
-
-
-
-
-
Legislation governing surveillance powers has appeared on both sides of the Atlantic: the draft Investigatory Powers bill has just been published in the UK while the US senate has voted through a proposed Cybesecurity Information Sharing Act. Following Edward Snowden’s revelations about the extent of government surveillance and communications interception, these proposed laws reflect the UK and US governments’ attempts to clarify their legal powers and address their citizens’ significant privacy and security concerns.
-
Surveillance powers outlined in the the Investigatory Powers Bill represent a gross invasion of privacy which would create an outcry about if the Bill used clearer language.
That’s what Dr Joss Wright, Research Fellow, Oxford Internet Institute, told the House of Commons Science and Technology Committee whilst presenting evidence on the Investigatory Powers Bill.
-
A SECRETIVE BRITISH POLICE INVESTIGATION focusing on journalists working with Edward Snowden’s leaked documents has been designated the code name “Operation Curable,” according to details newly obtained by The Intercept under the U.K.’s Freedom of Information Act.
The counterterrorism unit within the London Metropolitan Police’s Specialist Operations division has been conducting the criminal probe for more than two years.
The Metropolitan Police first announced it had launched a criminal investigation related to the Snowden documents in August 2013. About four months later, in December 2013, the force’s then-assistant commissioner Cressida Dick acknowledged the investigation was looking at whether reporters at The Guardian had committed criminal offenses for their role in revealing British surveillance operations exposed in the leaked files.
Since 2013, few new details about the case have been revealed, with police officials attempting to withhold information about the investigation. Earlier this year, the Metropolitan Police repeatedly refused to disclose the status of the investigation on the grounds that doing so could be “detrimental to national security.” But following an intervention from the authority that enforces the U.K.’s freedom of information laws, the force reversed its position in late July and admitted that the probe remained ongoing.
-
If there’s one person that knows how to dodge electronic detection, it’s Edward Snowden.
The ex-NSA contractor remains one of the most controversial figures in American privacy policy — and a prolific commentator on cybersecurity issues.
Snowden eluded U.S. officials, fleeing the country in 2013 after leaking information on the NSA’s warrantless collection of individuals’ phone metadata to the press. Now living Russia, he has repeatedly lobbed criticisms at the U.S. intelligence community for its approach to individual privacy.
-
Whistleblowers are always accused of helping America’s enemies (top Nixon aides accused Daniel Ellsberg of being a Soviet spy and causing the deaths of Americans with his leak); it’s just the tactical playbook that’s automatically used. So it’s of course unsurprising that ever since Edward Snowden’s whistleblowing enabled newspapers around the world to report on secretly implemented programs of mass surveillance, he has been accused by “officials” and their various media allies of Helping The Terrorists™.
Still, I was a bit surprised just by how quickly and blatantly – how shamelessly – some of them jumped to exploit the emotions prompted by the carnage in France to blame Snowden: doing so literally as the bodies still lay on the streets of Paris. At first, the tawdry exploiters were the likes of crazed ex-intelligence officials (former CIA chief James Woolsey, who once said Snowden “should be hanged by his neck until he is dead” and now has deep ties to private NSA contractors, along with Iran–obsessed Robert Baer); former Bush/Cheney apparatchiks (ex-White House spokesperson and current Fox personality Dana Perino); right-wing polemicists fired from BuzzFeed for plagiarism; and obscure Fox News comedians (Perino’s co-host). So it was worth ignoring save for the occasional Twitter retort.
But now we’ve entered the inevitable “U.S. Officials Say” stage of the “reporting” on the Paris attack – i.e. journalists mindlessly and uncritically repeat whatever U.S. officials whisper in their ear about what happened. So now credible news sites are regurgitating the claim that the Paris Terrorists were enabled by Snowden leaks – based on no evidence or specific proof of any kind, needless to say, but just the unverified, obviously self-serving assertions of government officials. But much of the U.S. media loves to repeat rather than scrutinize what government officials tell them to say. So now this accusation has become widespread and is thus worth examining with just some of the actual evidence.
[...]
By itself, the glorious mythology of How the U.S. Tracked Osama bin Laden should make anyone embarrassed to make these claims. After all, the central premise of that storyline is that bin Laden only used trusted couriers to communicate because Al Qaeda knew for decades to avoid electronic means of communication because the U.S. and others could spy on those communications. Remember all that? Zero Dark Thirty and the “harsh but effective” interrogation of bin Laden’s “official messenger”?
-
Last week in the UK, the draft Investigatory Powers Bill was published outlining proposals for ISPs to retain user’s browsing histories for a full year. Governments want to weaken encryption. The FCC ruled that Do Not Track requests are essentially meaningless. The NSA finds and takes advantage of vulnerabilities. It’s little wonder that privacy groups are up in arms — the erosion of online rights continues with terrifying speed. But all is not lost. There are still things you can do to help maintain your privacy. If you’re concerned, here’s what you can do.
-
-
Ad blocking tools are rarely out of the news these days. In times of heightened awareness about online privacy, more and more people are turning to things like Adblock Plus to banish ads and clean up their web browsing experience. For many people an ad blocker is seen as essential.
Edward Snowden goes further. The former NSA contractor says that it is a web user’s duty to protect their computer by blocking potential attack vectors such as Flash and JavaScript-riddled advertisements.
In an interview with The Intercept, Snowden reveals what he believes everyone should be doing to keep themselves safe online. He recommends using encrypted communication app Signal, and to encrypt the contents of hard drives. A password manager should be used to create ‘unbreakable’ passwords, and two-factor authentication should be used whenever it is available.
-
Civil Rights
-
Days after the head of the largest police union in the country issued a threat to filmmaker Quentin Tarantino, warning that “something is in the works” after the director dared to speak out against police brutality, Fox News Eric Bolling followed suit, reminding Tarantino that “everyone thinks they don’t need a cop until they do.”
Bolling, co-host of “The Five,” has repeatedly railed against Tarantino for supporting the Black Lives Matter movement. Tarantino has recently come under conservative fire after speaking at an anti-police brutality protest last month.
“Remember the two guys who were executed over here in Brooklyn? In days after that, that protest. People, as Dana [Perino] points out, people look up to Quentin Tarantino,” Bolling asked during a recent show. “They look up to Hollywood actors and directors, and it feeds into that narrative. Cop violence is going up.”
-
The hacker culture, and STEM in general, are under ideological attack. Recently I blogged a safety warning that according to a source I consider reliable, a “women in tech” pressure group has made multiple efforts to set Linus Torvalds up for a sexual assault accusation. I interpreted this as an attempt to beat the hacker culture into political pliability, and advised anyone in a leadership position to beware of similar attempts.
-
The CIA was relentless in their pursuit of CIA whistleblower John Kiriakou, who confirmed the name of an undercover operative to a reporter and was successfully prosecuted and jailed by the Justice Department. However, at least one CIA employee and one CIA contractor committed similar breaches of classified information and were not put on trial by the United States government.
VICE News journalist Jason Leopold obtained documents from the Office of the Inspector General at the CIA, which show the OIG completed 111 investigations of alleged crimes between January 2013 and 2014.
The Justice Department, according to Leopold, “declined to prosecute a case in lieu of CIA administrative action involving a CIA Special Activities Staff employee who ‘misused government systems by conducting unauthorized, non-official searches on sensitive Agency databases.’ The employee was warned “on more than one occasion to cease [the] behavior but [the employee] continued to conduct unauthorized searches.’”
-
-
The U.S. government’s elite interrogation unit, formed in the aftermath of the al-Qaeda suspect torture scandal, has been providing extensive training to local police, other federal agencies and friendly foreign governments.
Since its creation in 2009, the High-Value Detainee Interrogation Group, overseen by the FBI with members drawn from the bureau, Defense Department and CIA, has sponsored instruction and research for at least 40 agencies, including the Los Angeles and Philadelphia police departments.
While members of the so-called HIG have been involved in controversial encounters with terror suspects, including interrogations aboard U.S. war ships, HIG Director Frazier Thompson asserted that the group’s techniques bear no resemblance to the abusive treatment exposed following the capture of al-Qaeda suspects wanted for their alleged involvement in the 9/11 attacks and during the Iraq War.
-
Another week has gone by, and the White House still has not rolled out its long-awaited plan to close the detention facility at Guantánamo Bay, Cuba.
Chatter that the release was imminent picked up over the past week after defense and White House officials said they expected the Obama administration to deliver the document to Congress soon, likely by Friday. But several defense officials confirmed to Foreign Policy on Friday that the plan will not come this week, and they are unsure when President Barack Obama will sign off on it.
-
According to a recent article in the Wall Street Journal, while the federal government is pushing local and state law enforcement agencies to use body cameras for their law enforcement officers, federal law enforcement officers are not using such cameras when performing their own LE duties. According to the article, this is because the federal government hasn’t adapted policies for the use of body cams and the storage of the video.
-
A Secret Service officer attached to the White House has been arrested on suspicion of soliciting a child for sex, CNN reported Thursday afternoon.
Lee Robert Moore turned himself in to federal authorities in Maryland on Monday and has admitted his guilt.
According to a criminal complaint filed in U.S. District Court in Delaware, Mr. Moore, 37, sent nude pictures of himself and lewd messages to a “14-year-old girl” who was actually an undercover cop. He also asked to meet the “girl” in person for sex.
-
Though President Obama touts America as a nation of laws and evenhanded justice, there is a blatant double-standard regarding how people are punished for national security breaches – whistleblowers are harshly punished but the well-connected get a pass, writes John Hanrahan.
-
Internet/Net Neutrality
-
T-Mobile has just announced “Binge On,” a deal that gives customers unlimited access to Netflix, HBO Go, ESPN, Showtime, and video from most other huge media brands (but not YouTube!). It’s just like T-Mobile’s “Music Freedom” promotion, which gives customers unlimited high-speed data, as long as they’re listening to music from Spotify, Google Play Music, or one of T-Mobile’s other partners. It sounds like a sweet deal, and many customers will benefit! But it’s dangerous for the internet. When John Herrman writes that the next internet is TV — and you should believe him — this is part of how we get there. You know that viral picture that shows ISP internet bundles being sold as cable packages? That’s basically what’s happening here, except it’s more difficult to stop because, as the FCC might say, there’s “no obvious consumer harm” in giving people free stuff.
-
Intellectual Monopolies
-
Copyrights
-
A possible release of Megaupload’s servers, containing millions of files of former users as well as critical evidence for Kim Dotcom’s defense, is still far away. Responding to questions from the federal court, the MPAA says that it’s gravely concerned about the copyrighted works stored on there. The U.S. Government, meanwhile, doesn’t want Megaupload to use ‘illicit’ money to retrieve any data.
-
This reference originated in the context of litigation between Hewlett-Packard (HP) and collective management rights organisation Reprobel.
In 2004 the latter informed HP that the sale of multifunction devices entailed payment of a levy of EUR 49.20 per printer, and – from what this Kat understands – this should apply retrospectively.
In 2010 HP summoned Reprobel before the Court of First Instance of Brussels, seeking a declaration that no remuneration was owed for the printers which it had offered for sale, or, in the alternative, that the remuneration which it had paid corresponded to the fair compensation owed pursuant to the Belgian legislation, interpreted in the light of the InfoSoc Directive.
Permalink
Send this to a friend
11.14.15
Posted in Google, Microsoft, Patents, Red Hat, Servers at 12:06 pm by Dr. Roy Schestowitz
On carving out parts of the market using patent monopolies…
“Inventive people [at Novell] write more software patents per capita than anywhere else.”
–Jeff Jaffe, Novell’s CTO before these patents got passed to CPTN (Linux foes)
Summary: The use of a patent portfolio in the Free software world for divisive and discriminatory purposes, as demonstrated by Red Hat in servers and BlackBerry in phones
IN OUR previous articles which mentioned Microsoft’s patent agreement with Red Hat [1, 2, 3, 4, 5, 6, 7, 8, 9] we noted that:
- The patent “standstill” (implies temporary and falsely insinuates there was a two-way war) applies only to Red Hat and its customers, unless Red Hat can prove otherwise;
- The deal does not shield Red Hat and and its customers from satellites of Microsoft.
“We both know we have very different positions on software patents. We weren’t expecting each other to compromise.”
–Paul Cormier, Red HatWell, we are still waiting for Red Hat’s lawyers to speak out (Tiller and Piana were involved in this) or for Red Hat’s management to get back to us (if it decides to). They need to go “open” (like an “Open Organization” [sic]), or at least clarify in some other way what exactly Red Hat did with Microsoft regarding patents. The FAQ is far too vague and it raises more questions than it answers. If we don’t hear some time later this month, we shall assume that Red Hat is hiding something and we’ll rally Free software people (urging them to comment on this subject), set up a public petition, etc. Transparency is extremely important here. This new article quotes Paul Cormier, Red Hat’s president for products and technologies, as saying: “We both know we have very different positions on software patents. We weren’t expecting each other to compromise.”
Well, both are applying for software patents, so it’s not clear what he meant by that. Also, they compromised only among themselves; what about other entities that use the same software as Red Hat does? Are they too enjoying a patent “standstill”? Probably not. Only says ago Microsoft extorted — using patents — yet another company that was using Linux (Android was mentioned in the announcement).
“Nothing prevents Intellectual Ventures from going after Red Hat just like Acacia repeatedly did, so it’s a fool’s settlement.”What has Red Hat really achieved here? It was a selfish deal and the inclusion of patents in it was totally spurious; it does a lot more harm than good. Ian Bruce, Novell’s PR Director, once said that the Novell/Microsoft package “provides IP peace of mind for organizations operating in mixed source environments.”
Meanwhile, the Microsoft-friendly media gives a platform to the world’s biggest patent troll, Intellectual Ventures, without even calling it “patent troll”. This troll recently sued a lot of companies that distributed Linux. Nothing prevents Intellectual Ventures from going after Red Hat just like Acacia repeatedly did, so it’s a fool’s settlement.
“Remember that BlackBerry habitually speaks about using patents for revenue and for market advantage.”Speaking of potential patent dangers to Linux, recall that BlackBerry pays Microsoft for patents (including FAT, which relates to TomTom/Linux) and recall our articles about BlackBerry potentially becoming a troll [1, 2, 3, 4]. Some people’s loyalty to this Canadian brand and its newfound support for Android can blind them to the risk which BlackBerry remains, especially because of its patents stockpile.
This new article [1, 2] serves to remind us that BlackBerry still has “Software And Patent Monetization” in mind (we covered this some weeks ago, quoting the CEO). This means that, failing the strategy with Priv and Venice (BlackBerry’s Android devices and Linux-centric strategy), it could end up like Sony-Ericsson, suing Android players whilst also selling their own (unsuccessful) Android handsets.
“BlackBerry is proprietary to the core.”Remember that BlackBerry habitually speaks about using patents for revenue and for market advantage. Also remember that BlackBerry is not — at least not yet — an Android company. BlackBerry is proprietary to the core. “The QNX division could also face higher competition from open source software such as Linux,” wrote a financial site, “which many customers find more flexible and economical, limiting its potential in the burgeoning IoT and connected device market. For instance, Tesla reportedly uses Linux for its Model S sedan.”
Don’t be too shocked if BlackBerry eventually sells its patents to hostile actors, asserts them against competitors that use Android, or uses aggressive lawyers to compel various OEMs to remove features from their Android devices (both hardware and software features). █
“I’ve heard from Novell sales representatives that Microsoft sales executives have started calling the Suse Linux Enterprise Server coupons “royalty payments”…”
–Matt Asay, April 21st, 2008
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- 2017: Latest Year That the Unitary Patent (UPC) is Still Stuck in a Limbo
The issues associated with the UPC, especially in light of ongoing negotiations of Britain's exit from the EU, remain too big a barrier to any implementation this year (and probably future years too)
- Links 7/1/2017: Linux 4.9.1, Wine 2.0 RC4
Links for the day
- India Keeps Rejecting Software Patents in Spite of Pressure From Large Foreign Multinationals
India's resilience in the face of incredible pressure to allow software patents is essential for the success of India's growing software industry and more effort is needed to thwart corporate colonisation through patents in India itself
- Links 6/1/2017: Irssi 1.0.0, KaOS 2017.01 Released
Links for the day
- Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)
A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone
- The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO
In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"
- Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern
The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)
- Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3
Links for the day
- Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released
Links for the day
- Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents
Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress
- New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)
To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies
- Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials
One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end
- Links 31/12/2016: Firefox 52 Improves Privacy, Tizen Comes to Middle East
Links for the day