10.16.13
Posted in Action at 11:29 am by Dr. Roy Schestowitz
Summary: Newest stories about the NSA and its allies
THE NSA saga is far from over. There are new revelations all the time and the corporate press is trying to distract us by speaking about China [1] and Russia [2]. Don’t take this hypocritical bait.
As an MI5 whistleblower puts it, “US/UK spy chiefs cover up NSA surveillance scandal” [3] while Glenn Greenwald, a US citizen living in Brazil, finds independence by forming a new media outlet with help from eBay’s founder [4]. He will hopefully help nations which are victims of NSA espionage [5] without getting censored by The Guardian.
Tor, which is a project that came from the US military and is run by pseudonyms, is getting more attention from the NSA [6] and is becoming less safe to use [7], despite Edward Snowden’s promotion of it.
Snowden, the whistleblower who shamed the NSA, has his father visit him in Russia (despite or because of warnings about collaborations with the FBI) [8] and personal awards are being granted [9], with more possibly on the way [10]. Snowden is a hot target for the US government right now [11].
Richard Stallman has just published a long article about surveillance [12] and the EU Parliament, a famous victim of espionage managed by the NSA, is now turning its back on privacy [13,14].
Moves are being made to decentralise the US-centric Internet [15,16] as the NSA’s mischiefs go deeper and deeper [17,18], with complicity from US tech giants [19-22]. Lavabit is in the headline again, mostly for being the exception when it comes to selling customers down the river, only to be hunted down by the US government [23,24].
More interesting revelations come out of Britain, the US’ ally in espionage [25-28], with similar actions seen in Canada (also “Conservatives” [29]).
The NSA is fortunately having some growing pains [30]. The leaks can’t be helping Big Brother. █
Related/contextual items from the news:
-
-
Russia used its embassy in Canberra to intercept Australian intelligence and political communications, targeting the capital’s main telecommunications tower, the Defence Department, Australian electronics firms and the Tidbinbilla space tracking station, according to confidential accounts of ASIO counter-espionage in the Cold War obtained by Fairfax Media.
-
The disparity in response to Edward Snowden’s disclosures within the USA and the UK is astonishing. In the face of righteous public wrath, the US administration is contorting itself to ensure that it does not lose its treasured data-mining capabilities: congressional hearings are held, the media is on the warpath, and senior securocrats are being forced to admit that they have lied about the efficacy of endemic surveillance in preventing terrorism.
Just this week General Alexander, the head of the NSA with a long track record of misleading lying to government, was forced to admit that the endemic surveillance programmes have only helped to foil a couple of terrorist plots. This is a big difference from the previous number of 54 that he was touting around.
Cue calls for the surveillance to be reined in, at least against Americans. In future such surveillance should be restricted to targeted individuals who are being actively investigated. Which is all well and good, but would still leave the rest of the global population living their lives under the baleful stare of the US panopticon. And if the capability continues to exist to watch the rest of the world, how can Americans be sure that the NSA et al won’t stealthily go back to watching them once the scandal has died down — or just ask their best buddies in GCHQ to do their dirty work for them?
-
Journalist who broke stories about widespread NSA surveillance leaving to pursue ‘once-in-a-career journalistic opportunity’
-
-
The agency has attacked other software, including Firefox, in order to compromise the anonymity tool, according to documents
-
-
-
Though former NSA contractor Edward Snowden has been indicted for leaking secrets about the U.S. government’s intrusive surveillance tactics, he was honored by a group of former U.S. intelligence officials as a courageous whistleblower during a Moscow ceremony, reports ex-CIA analyst Ray McGovern who was there.
-
Today, 23 European non-governmental organisations released an open letter to the Conference of Presidents of the European Parliament in support of Edward Snowden’s nomination for the Sakharov Prize for Freedom of Thought 2013.
-
-
The current level of general surveillance in society is incompatible with human rights. To recover our freedom and restore democracy, we must reduce surveillance to the point where it is possible for whistleblowers of all kinds to talk with journalists without being spotted. To do this reliably, we must reduce the surveillance capacity of the systems we use.
Using free/libre software, as I’ve advocated for 30 years, is the first step in taking control of our digital lives. We can’t trust non-free software; the NSA uses and even creates security weaknesses in non-free software so as to invade our own computers and routers. Free software gives us control of our own computers, but that won’t protect our privacy once we set foot on the internet.
-
A crucial vote for EU Citizens fundamental right to privacy will take place on October 21st, in the “Civil Liberties” committee (LIBE) of the European Parliament. The future of the EU Regulation on the protection of individuals to the processing of their personal data will be decided by a vote on “compromise amendments”1. The rapporteur seems willing to request a mandate to enter closed-doors negotiations to severely cut short any chance of public debate. La Quadrature du Net calls on all citizens to contact the members of the LIBE committee to urge them to refuse this obscure hijacking of the democratic debate.
-
-
-
The unexpected disclosures of NSA activities by Edward Snowden presents a splendid example of U.S. government, as well as popular, indifference to world opinion. As part of its efforts to control the political damage of the embarrassing revelations, the Obama administration repeatedly stressed that only foreign nationals had been the targeted. As the breathtaking breadth of the data accessed and analyzed became clear, this rationale raised the question of how the foreign citizens – and even leaders – of U.S. allies might feel about being considered to be fair game for the NSA’s attention.
The answer to that question is that they weren’t happy. Nor, as we will see, were a group of NGOs that had no reason to think they were targeted at all.
Some foreign governments doubtless communicated their concerns privately through diplomatic channels. But others made their displeasure very public indeed. Brazil’s President Dima Rouseff, for one, cancelled a bilateral summit with President Obama after it was reported that her telephone calls and email had been intercepted. Late last week, she went a step further, announcing that Brazil will host a global summit to oppose U.S. surveillance.
-
But TAO doesn’t just spy on America’s rivals. In 2012, the group reportedly compromised the encryption system used by an important G8 country to transmit sensitive diplomatic communications via satellite to its embassies around the world. The same is true with a number of countries in the Middle East and South Asia, including Egypt, Syria, Iran, and Pakistan, although the details of these successes are not yet known. And finally, sources report that TAO has successfully compromised the privacy protection systems currently used on a range of 4G cell phones and hand-held devices, thanks in large part to help from a major American telecommunications company.
-
In yet another bit of fallout from the NSA surveillance efforts — and, specifically, the NSA’s covert takeover of security standards to insert vulnerabilities — it appears that there’s suddenly much more skepticism towards well-known security offerings. This is a good thing. There have already been some revelations concerning attempts to compromise Tor, and security researcher Matthew Green has now called for a thorough security audit of TrueCrypt, the (very) popular disk encryption tool. Green and some others have kicked off the project on the aptly named website IsTrueCryptAuditedYet.com.
-
-
-
Yahoo plans to make encryption a default setting for all Yahoo Mail users in January — four years after rival Google took what is considered a basic security step.
-
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.
The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.
-
-
While there’s plenty of attention being paid to Lavabit’s temporary re-opening for the sake of letting people export their accounts, a much more interesting issue is the recent development in the legal case. Lavabit has filed its latest brief, and there are some interesting discussions about the details of the case. From my reading, Lavabit makes a very strong argument that the government has no right to demand the production of Lavabit’s private SSL keys, as it’s an overreach way beyond what traditional wiretapping laws allow. Lawyer Orin Kerr’s analysis argues that Lavabit’s case is weak, mainly arguing that the federal government can subpoena whatever the hell they want, and just because it conflicts with your business model: too bad. Lavabit argues that complying with the government’s order is oppressive because it would effectively mean it would be committing fraud on all its customers…
-
-
Sir Andrew Parker, the recently elevated Director General of the UK’s domestic security Service (MI5) yesterday made both his first public speech and a superficially robust defence of the work of the intelligence agencies. Reading from the outside, it sounds all patriotic and noble.
-
David Cameron speaks during prime minister’s questions, where he said: ‘The plain fact is that what has happened has damaged national security.’ Photograph: PA
-
Shortly after Lord Macdonald, the former director of public prosecutions, condemned the way the new head of MI5 had dismissed calls for greater scrutiny several senior figures involved in the scrutiny of the draft communications data bill have said that Britain’s spy agencies may be operating outside the law in the mass internet surveillance programmes uncovered by Edward Snowden.
-
-
This week we were treated to the surprising news (not) that the NSA has been going after users of TOR. We also learned that the opening of the huge data center the agency is building in the Utah desert has been again delayed, this time due to power surges that have been burning out about $100,000 in equipment with each incident. Meanwhile, as more items revealed by Edward Snowdon are released, companies offering online anonymity find their business booming.
Permalink
Send this to a friend
Posted in Deception, GNU/Linux, HP, Microsoft at 11:05 am by Dr. Roy Schestowitz
Meg Whitman talks nonsense

Author: Max Morse
Summary: HP says Microsoft is a rival, but evidence suggests that HP is being occupied by Microsoft managers and that it attacks GNU/Linux, not Windows
People should not be taking HP’s claims at face value. Realising what the cash cows are, HP is trying to sell as many servers as possible (many will use GNU/Linux), so it tries to appeal to system administrators while quietly spreading Microsoft’s anti-GNU/Linux FUD [1, 2] to derail government migrations to GNU/Linux. Perhaps the inefficiently of Windows helps sell more such servers (for the same task).
Either way, HP sure is suffering from the decline of Microsoft’s desktop empire, but publicly HP wants us to think that “Microsoft Is At War With Its OEM Partners” (such as HP). More “sock puppetry,” calls it iophk, saying that “Microsoft Hilf is still inside HP, Ray Ozzie is still on the board, so this is just noise.” There are more such examples, including Vice Presidents. HP is gradually becoming somewhat of a proxy to Microsoft — a bit like Nokia.
Microsoft is hardly a competitor of HP; those two are partners and actions at the management level show this. Here is another article which blindly repeats HP’s claims:
APPARENTLY NOT CONTENT with making her employees draw lots or arm-wrestle for desks by banning telecommuting, HP CEO Meg Whitman has decided to let loose the hounds on Microsoft, declaring that it and Intel have changed from being “partners to outright competitors”.
HP is still using x86 and Windows, so how are Intel and Microsoft competitors really? Sheer nonsense.
Speaking of Microsoft and pretense, the company pretended to be “nice” to FOSS while essentially banning particular FOSS licence — an action which it quietly steps away from:
With little fanfare, Microsoft — or at least one part of it — has gone from considering the GNU General Public License v.3 (GPLv3) “evil” to “acceptable.”
That’s because this licence is popular, unlike Microsoft. “A company spokesperson didn’t provide a direct answer,” says Microsoft Mary, whose inquiry helps show just how Microsoft really feels about the GPLv3. Public statements are the area controlled by marketing people and professional spinners. In order to find out what’s true we need to investigate actions — not words — for ourselves. █
Permalink
Send this to a friend
Posted in GNU/Linux, Kernel, Security at 10:43 am by Dr. Roy Schestowitz
Claude Elwood Shannon, the man who introduced entropy
Summary: An anonymous backdooring attempt against Linux goes a decade back, but a randomisation problem in today’s Linux also seems possible (subverting encryption)
Jonathan Allen wrote this article about an incident mentioned also by Freedom to Tinker. Slashdot’s summary goes like this, documenting news from one decade ago:
“Ed Felton writes about an incident, in 2003, in which someone tried to backdoor the Linux kernel. Back in 2003 Linux used BitKeeper to store the master copy of the Linux source code. If a developer wanted to propose a modification to the Linux code, they would submit their proposed change, and it would go through an organized approval process to decide whether the change would be accepted into the master code. But some people didn’t like BitKeeper, so a second copy of the source code was kept in CVS. On November 5, 2003, Larry McAvoy noticed that there was a code change in the CVS copy that did not have a pointer to a record of approval. Investigation showed that the change had never been approved and, stranger yet, that this change did not appear in the primary BitKeeper repository at all. Further investigation determined that someone had apparently broken in electronically to the CVS server and inserted a small change to wait4: ‘if ((options == (__WCLONE|__WALL)) && (current->uid = 0)) …’ A casual reading makes it look like innocuous error-checking code, but a careful reader would notice that, near the end of the first line, it said ‘= 0′ rather than ‘== 0′ so the effect of this code is to give root privileges to any piece of software that called wait4 in a particular way that is supposed to be invalid. In other words it’s a classic backdoor. We don’t know who it was that made the attempt—and we probably never will. But the attempt didn’t work, because the Linux team was careful enough to notice that that this code was in the CVS repository without having gone through the normal approval process. ‘Could this have been an NSA attack? Maybe. But there were many others who had the skill and motivation to carry out this attack,’ writes Felton. ‘Unless somebody confesses, or a smoking-gun document turns up, we’ll never know.’”
Backdoors in Linux are a subject for jokes in Torvalds' mind, but given the above we should take this subject very seriously. In any system, for example, having no mechanism for randomness (like in some embedded devices) typically means that strong encryption (with high entropy) is not possible. Given new alleged “insecurities in the Linux /dev/random,” as Bruce Schneier put it, Linux backdoors seem possible again. David Benfell said:
I’m guessing Schneier knows what the fuck he’s talking about. If it is the same vulnerability, then Torvalds’ defense is that the vulnerable source of entropy is only one of many. But if I read Schneier correctly, the result was still too predictable.
“On the other hand,” says Benfell, “here’s Theodore T’so from the comments:”
So I’m the maintainer for Linux’s /dev/random driver. I’ve only had a chance to look at the paper very quickly, and I will at it more closely when I have more time, but what the authors of this paper seem to be worried about is not even close to the top of my list in terms of things I’m worried about.
First of all, the paper is incorrect in some minor details; the most significant error is its (untrue) claim that we stop gathering entropy when the entropy estimate for a given entropy pool is “full”. Before July 2012, we went into a trickle mode where we only took in 1 in 096 values. Since then, the main way that we gather entropy, which is via add_interrupt_randomness(), has no such limit. This means that we will continue to collect entropy even if the input pool is apparently “full”.
This is critical, because *secondly* their hypothetical attacks presume certain input distributions which have an incorrect entropy estimate —| that is, either zero actual entropy but a high entropy estimate, or a high entropy, but a low entropy estimate. There has been no attempt by the paper’s authors to determine whether the entropy gathered by Linux meets either of their hypothetical models, and in fact in the “Linux Pseudorandom Number Generator Revisited”[1], the analysis showed that our entropy estimator was actually pretty good, given the real-life inputs that we are able to obtain from an actual running Linux system.
[1]http://eprint.iacr.org/2012/251.pdf
The main thing which I am much more worried about is that on various embedded systems, which do not have a fine-grained clock, and which is reading from flash which has a much more deterministic timing for their operations, is that when userspace tries to generate long-term public keys immediately after the machine is taken out of the box and plugged in, that there isn’t a sufficient amount of entropy, and since most userspace applications use /dev/urandom since they don’t want to block, that they end up with keys that aren’t very random. We had some really serious problems with this, which was written up in the “Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices” [2]paper, and the changes made in July 2012 were specifically designed to address these worries.
[2]https://www.factorable.net/paper.html
However, it may be that on certain systems, in particular ARM and MIPS based systems, where a long-term public key is generated very shortly after the first power-on, that there’s enough randomness that the techniques used in [2]would not find any problems, but that might be not enough randomness to prevent our friends in Fort Meade from being able to brute force guess the possible public-private key pairs.
Speaking more generally, I’m a bit dubious about academic analysis which are primarily worried about recovering from the exposure of the state of the random pool. In practice, if the bad guy can grab the state of random pool, they probably have enough privileged access that they can do many more entertaining things, such as grabbing the user’s passphrase or their long-term private key. Trying to preserve the amount of entropy in the pool, and making sure that we can extract as much uncertainty from the system as possible, are much higher priority things to worry about.
That’s not to say that I might not make changes to /dev/random in reaction to academic analysis; I’ve made changes in reaction to [2], and I have changes queued for the next major kernel release up to make some changes to address concerns raised in [1]. However, protection against artificially constructed attacks is not the only thing which I am worried about. Things like making sure we have adequate entropy collection on all platforms, especially embedded ones, and adding some conservatism just in case SHA isn’t a perfect random function are some of the other things which I am trying to balance as we make changes to /dev/random.
T’so, who is the former CTO of the Linux Foundation, at least acknowledges the possibility that there is a real issue here. █
Permalink
Send this to a friend
10.14.13
Posted in GNU/Linux at 10:05 am by Dr. Roy Schestowitz
Summary: The erosion of accurate historical record when it comes to the free (as in freedom) operating system
EARLIER today I found yet another article which claims to give the history of GNU/Linux but talks only about Linux, pretending everything started in 1991 [1]. This is a common mistake, found in other articles that I found today [2], but nothing is as upsetting as the Linux Foundation, which cannot claim ignorance, brushing GNU out of the record, even when it comes to supercomputing [3]. The historical record is important and language is too. To use an analogy that I used a fortnight ago, calling native Americans (or Americans) “Indians” legitimises a view where these are foreigners rather than First People (“American Indian” means Indian citizen living in the US), so to say that European conquerors “discovered” America and are now the real “Americans” is like claiming that GNU is somehow the ugly little brother of Linux when it fact it’s a distortion of the truth. Google takes it a step further by calling GNU/Linux “Chromebook” and just never attributing anything which is Free software. In the latest episode of TLLTS (probably the longest-running Linux podcast) one of the hosts did not even know that Chromebook had GNU/Linux in it. Lack of proper attribution and intentional blurring of history leads to this. █
Related/contextual items from the news:
-
Bangalore: Enterprises are the home for Linux operating systems. They are mostly used across servers, for connecting databases and clients and for other purposes. Yet, presently, these operating systems have turned out to be so user-friendly that they have become a common sight throughout houses. So, how did this transition happen? How was this operating system even born? In the next couple of pages, we are taking you to a journey in time. Read on to know about the history of the most popular operating system.
-
The main difference between Linux and Windows is the way these are developed. Windows is a proprietary system built by a single company – Microsoft. Linux is built by a global community of users under an open source license – a framework that encourages
sharing and collaboration.
-
Earlier this summer, The Linux Foundation released the report 20 years of Top500.org, which marked the 20th anniversary of the Top 500 supercomputer ranking, and (quite naturally) highlighted Linux’s dominance on systems within the Top 500 over time.
-
Permalink
Send this to a friend
Posted in Microsoft at 9:45 am by Dr. Roy Schestowitz
Summary: Realisations about Skype, which is now under investigation by Luxembourg’s data protection commissioner
YEARS ago we warned that Skype had become a surveillance tool like never before. A year and a half ago we explained how Skype had become a tool for NSA eavesdropping on calls all around the world, not just calls within the United States (or routed through US allies like the UK), potentially engaging in espionage against nations outside the EU and Russia (Sweden has been used as an outpost for such eavesdropping).
In a way, Techrights was right about Skype falling into the NSA’s hands 2 years ago. Given the NSA’s very strong relationship with Microsoft, the acquisition may as well be taxpayers-funded. Now there is a formal investigation into it in Europe, where politicians got bugged by the NSA:
A EUROPEAN DATA PROTECTION WATCHDOG is investigating Microsoft’s voice over IP (VoIP) and chat service Skype about its suspected links to the US National Security Agency (NSA).
According to a report in the Guardian newspaper Skype is being investigated by Luxembourg’s data protection commissioner. Since the firm is based in Europe it might find itself under strict inspection and facing criminal proceedings and possible sanctions.
Here is more. We wrote about it years ago, but back then people considered that “paranoid”, despite evidence existing (not evidence as hard as what Snowden later leaked). █
Permalink
Send this to a friend
Posted in DRM at 9:29 am by Dr. Roy Schestowitz
Time to fork HTML?

Source: Original from John S. and James L. Knight Foundation, modified by Techrights
Summary: The Web’s founder, Tim Berners-Lee, now actively defends the copyright cartel, only to find loud opposition even from his biggest and more prominent fans
Tim Berners-Lee is quickly losing credibility and he has nobody else to blame. He actively echoes Hollywood talking points or at least Hollywood’s apologists, to whom a copyright monopoly or cartel is perfectly acceptable if not essential.
“It’s that time of the year again,” writes iopkh.” Time to remind the media that there are no such things as Nobel prizes in astrology, professional wrestling or economics.” Here is Cory Doctorow speaking out his mind again, urging Mozilla to tackle DRM like it already tackles Flash, namely:
Mozilla’s Shumway project, an attempt to create a replacement Flash plug-in that uses HTML5, might ever so slightly placate those barracking for the latter. Previously Shumway has only been available as a separate extension, but it recently made its way into Firefox’s nightly builds, hinting at the prospect of mainline inclusion somewhere down the line.
Glyn Moody, a vocal fan of Tim Berners-Lee, has become quite a notable opposer of his stance of DRM in HTML5. He raises some very good points:
Tim Berners-Lee on Why HTML5 “Needs” DRM
[...]
That’s an extremely odd comment, since it divides up the online world up into active creators and passive consumers. That’s precisely the framing that the copyright industry adopts in an attempt to minimise the rights of Internet users, and to belittle their role.
[...]
Putting users first is great, but this sets up a false dichotomy between those who “like to watch big-budget movies at home” and those who want an open Web, as if the former must lose if the latter win. But it’s ridiculous to suggest that companies like Netflix will stop streaming video over the Internet if the Web does not include DRM. It may do it with proprietary Web plugins, or it might even insist that people use standalone code, but that’s not a problem – it is exactly how it’s been done in the past.
Moreover, the open Web will exist and thrive even if some people choose to use proprietary code, just as open source thrives despite the existence of some closed-source applications. The only people who might conceivably lose out if DRM isn’t included in HTML is the W3C, who won’t be able to control exactly how those non-Web parts operate. But that’s true now, anyway, and I can’t believe that the W3C is so power crazed that it wants to sacrifice the open Web solely to extend its empire a little further.
The longer this goes on for, the worse Tim Berners-Lee’s reputation will get. He hopefully understands this by now. The NSA already threatens forking of the Web. Tim Berners-Lee might do the same with his stance. If not a fork, then an alternative might be put forth. There were several Web-like prototypes preceding Tim Berners-Lee’s. Although some were better, they never quite caught on. Tim Berners-Lee and the W3C may feel like they have no competition, so they think that they can get away with DRM. █
Permalink
Send this to a friend
10.13.13
Posted in IRC Logs at 5:56 am by Dr. Roy Schestowitz
IRC Proceedings: September 29th, 2013
IRC Proceedings: September 30th, 2013
IRC Proceedings: October 1st, 2013
IRC Proceedings: October 2nd, 2013
IRC Proceedings: October 3rd, 2013
IRC Proceedings: October 4th, 2013
IRC Proceedings: October 5th, 2013
Enter the IRC channels now
Permalink
Send this to a friend
Posted in IRC Logs at 4:37 am by Dr. Roy Schestowitz
IRC Proceedings: September 22nd, 2013
IRC Proceedings: September 23rd, 2013
IRC Proceedings: September 24th, 2013
IRC Proceedings: September 25th, 2013
IRC Proceedings: September 26th, 2013
IRC Proceedings: September 27th, 2013
IRC Proceedings: September 28th, 2013
Enter the IRC channels now
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)
A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone
- The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO
In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"
- Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern
The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)
- Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3
Links for the day
- Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released
Links for the day
- Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents
Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress
- New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)
To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies
- Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials
One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end
- Links 31/12/2016: Firefox 52 Improves Privacy, Tizen Comes to Middle East
Links for the day
- Korea's Challenge of Abusive Patents, China's Race to the Bottom, and the United States' Gradual Improvement
An outline of recent stories about patents, where patent quality is key, reflecting upon the population's interests rather than the interests of few very powerful corporations
- German Justice Minister Heiko Maas, Who Flagrantly Ignores Serious EPO Abuses, Helps Battistelli's Agenda ('Reform') With the UPC
The role played by Heiko Maas in the UPC, which would harm businesses and people all across Europe, is becoming clearer and hence his motivation/desire to keep Team Battistelli in tact, in spite of endless abuses on German soil
- Links 30/12/2016: KDE for FreeBSD, Automotive Grade Linux UCB 3.0
Links for the day
- Software Patents Continue to Collapse, But IBM, Watchtroll and David Kappos Continue to Deny and Antagonise It
The latest facts and figures about software patents, compared to the spinmeisters' creed which they profit from (because they are in the litigation business)