03.24.14
Posted in News Roundup at 12:28 pm by Dr. Roy Schestowitz
-
Want to play a game about the tumultuous life of a street shop vendor? Well, you can’t right now, as the website hosting it is currently drowning under heavy bandwidth load. But when it returns, you’ll find Cart Life, the indie small business simulation from Richard Hofmeier, available free of charge and completely open source for tinkerers to slot in custom characters and stall types.
-
You all love free games right? Good news as it is free games Thursday here at GOL and we bring you news that H-Craft Championship has been unshackled from its price-tag and is FREE.
-
-
-
Planetary Annihilation has some more spit and polish now as they work through their Gamma phase of development, they have recently improved art, the lobby, the AI and more!
-
-
CRYENGINE one of the most advanced game engines around powering a ton of games has finally announced official Linux support, so Crytek how about some Crysis on Linux?
-
-
AlienVault has emerged to be a leader in the security information and event management (SIEM) space in recent years, thanks to its open-source and commercial offerings.
-
-
-
Linux gaming is getting better, slowly but surely, and it looks like The Witcher 2: Assassins of Kings might be the next shot in the arm for the open source operating system.
-
-
Develop investigates how recent changes and support from gaming’s biggest companies is making Linux a viable option for developers
-
Before Valve began greenlighting games by the bucketload, busting onto Steam was seen as a massive accomplishment for an indie developer. So it always raises one’s curiosity when a game’s creator decides to leave the berth of the all-mighty digital distributor for the lands of open source. In this case, it’s Richard Hofmeier and his IGF prize-winning title Cart Life.
-
Permalink
Send this to a friend
Posted in News Roundup at 12:27 pm by Dr. Roy Schestowitz
-
Piriform Software has released Recuva 1.51 and Recuva Portable 1.51, new versions of its popular Windows freeware data-recovery tool.
-
-
We at Yorba are pleased to announce the release of Geary 0.6.0, a new stable version of our IMAP mail client.
-
-
Calibre 1.29, the eBook reader and management software developed for multiple platforms, including Linux, has been released with even more features for the editing function.
-
-
Trove is the National Library of Australia’s online database. It contains almost 400 000 000 digital items, including Australian newspaper articles from 1803 to 1954.
Permalink
Send this to a friend
Posted in News Roundup at 12:26 pm by Dr. Roy Schestowitz
Permalink
Send this to a friend
03.23.14
Posted in News Roundup at 12:32 pm by Dr. Roy Schestowitz
Drones
-
Opposition to the deadly US drone strikes in Yemen has gained momentum after the death of a boy who was psychologically affected by a strike in 2012 in the port city of Shiher in Hadramout province.
-
That war technology has uses beyond war doesn’t justify the funding of technologies whose core mission is war.
-
Global human rights violators have found a large loophole in International Law and International Humanitarian Law. Exploiting this loophole they have developed armed drones to kill civilians with impunity. For the sake of the continuation of the human race, these vile killers must be condemned and stopped.
-
President Obama said last May that he was placing limits on the use of drones in foreign countries, and senior administration officials have said the United States cannot exist in an inchoate state of war against terrorists everywhere (the sort President George W. Bush fantasized about) But there’s still no cut and dry, publicly available legal framework setting out when and where the government can launch drone strikes.
-
-
The United States is refusing to participate in UN Human Rights Council talks about greater accountability for human rights violations in covert drone wars.
-
-
Censorship
Civil Rights
-
Ford was quickly convicted. At the sentencing phase of his trial, the lack of competent defense counsel again played a factor. The best mitigation witnesses who might have testified for him lived out of state—but Ford’s lawyers were unsure about the process for subpoenaing them to testify in Louisiana. It took that all-white jury less than three hours to recommend a sentence of death for the man they believed murdered Isadore Rozeman.
[...]
Just before Glenn Ford walked out of prison late Tuesday afternoon, the state of Louisiana—which had wrongfully charged, convicted, and incarcerated him for 30 years—gave him a $20 dollar debit card for his troubles. (As recently as 2011, the state gave only $10 to inmates leaving prison.) When you combine the debit card with the balance in Ford’s prison account, the total he received upon his departure from Angola was $20.04. He left, too, with some photographs and with his medicine, all in two small boxes. He left behind his headphones.
Venezuela
-
Images forge reality, granting a power to television and video and even still photographs that can burrow deep into people’s consciousness without them even knowing it.
I thought that I, too, was immune to the repetitious portrayals of Venezuela as a failed state in the throes of a popular rebellion. But I wasn’t prepared for what I saw in Caracas this month: how little of daily life appeared to be affected by the right-wing protests, the normality that prevailed in the vast majority of the city.
Ukraine
-
Russia and the United States have each imposed new sanctions on the other over the crisis in Ukraine. President Obama made the announcement on Thursday.
-
Espionage Against China
-
The new portion of revelations from the former NSA contractor Edward Snowden, published by Der Spiegel and The New York Times, has exposed the great interest of the US secret service in obtaining data from China.
-
-
-
-
Chinese telecom and internet company Huawei defended is independence on Sunday and said it would condemn any infiltration of its servers by the U.S. National Security Agency if reports of such activities by the NSA were true.
-
The U.S. National Security Agency has infiltrated servers in the headquarters of Chinese telecommunications and internet giant Huawei Technologies Co, obtaining sensitive information and monitoring the communications of top executives, the New York Times reported on Saturday.
The newspaper said its report on the operation, code-named “Shotgiant,” was based on NSA documents provided by Edward Snowden, the former agency contractor who since last year has leaked data revealing sweeping U.S. surveillance activities. The German magazine Der Spiegel also reported on the documents.
Privacy
-
-
Executives from Facebook, Google and Yahoo invited to Oval Office discussion amid continued frustration over lack of action
-
-
Do read the press cover on the launch of the new Google Chromecast TV dongle . In my blog entry on the breaking of the “Social Contract” that underpins public acceptance of the way the Internet works, I mentioned the reaction at a CTF meeting when we learned that smart TV licenses require you to give permission to transmit data on your viewing habits to anywhere in the world. The gathering pace of the convergence of the worlds of the TV, mobile phone, personal computer and Internet, often with no off-switch to protect against 24 by 7 surveillance, is now truly transformative.
-
US President Barack Obama has reassured internet and tech CEOs that his government is committed to protecting the people’s privacy, as he tried to allay their growing concern about the surveillance practices of the National Security Agency.
-
With the troves of extremely valuable personal information collected by social media giants, it’s likely—if not already occurring—that foreign spies have infiltrated several Silicon Valley companies in the hopes of accessing your/our data, according to leading cyber security strategist Menny Barzilay.
-
Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.
-
Federal Magistrate Judge John M. Facciola denied a US government request earlier this month for a search and seizure warrant, targeting electronic data stored on Apple Inc. property.
-
Internet firm is known to be unhappy about snooping and would be under no obligation to hand over material under Irish laws
-
Australia’s Attorney-General’s department wants new laws to force users and providers of encrypted internet communications services to decode any data intercepted by authorities.
The proposal is buried in a submission (pdf) by the department to a Senate inquiry on revision of the Telecommunications Interception Act.
-
A parking ticket, traffic citation or involvement in a minor fender-bender are enough to get a person’s name and other personal information logged into a massive, obscure federal database run by the U.S. military.
-
-
She points out that she is not alone in suffering from the UK government’s absurdly broad definition of “terrorism”: Glenn Greenwald’s partner David Miranda was detained for nine hours at London’s Heathrow airport, and Snowden’s lawyer, Jesselyn Radack, was interrogated there too. But the knock-on effects for journalism in the UK are particularly serious:
If Britain is going to investigate journalists as terrorists take and destroy our documents, force us to give up passwords and answer questions — how can we be sure we can protect our sources? But this precedent is now set; no journalist can be certain that if they leave, enter or transit through the UK this will not happen to them.
One likely consequence of this is that international journalists will avoid passing through the UK on the way to their final destinations. More seriously, they may be unwilling to enter the UK to visit. Sadly, given the UK’s increasingly besmirched reputation as a beacon of civilization with a free and effective press, that’s likely to be viewed by the government there as more of a feature than a bug.
-
A PETITION that asks for the entire US government to be removed and replaced with technical people and Eric Schmidt as CEO is not very close to its 100,000 target.
-
Journalist Shubhranshu Choudhary is the winner of the 2014 Google Digital Activism Award. Choudhary is the mind behind CGNet Swara (Voice of Chhattisgarh), a mobile phone service allowing people to post and listen to local reports in their local language using basic cellphones.
Permalink
Send this to a friend
03.21.14
Posted in News Roundup at 11:30 am by Dr. Roy Schestowitz
-
After Web inventor Tim Berners-Lee’s keynote talk at SXSW, he answered a question about the controversial plan to add DRM to next version of HTML. HTML 5, a standard currently under debate at the World Wide Web Consortium (W3C) is the latest battleground in the long-running war over the design of general-purpose computers. Berners-Lee defended the proposition, and claimed that without it, more of the Web would be locked up in un-searchable, unlinkable formats like Flash.
Some in the entertainment industry have long harboured fantasies about redesigning computers to disobey their owners, as part of a profit-maximisation strategy that depends on being able to charge you piecemeal for the right to use the files on your hard-drive.
-
Apple does not support the Trusted Platform Module [9] that Microsoft will require all PC makers to support starting next year…
-
Keurig is setting itself up to attempt a type of coffee “DRM” on the pods used in its coffee-making machines, according to a report from Techdirt. Keurig’s next-gen machines would be unable to interact with third-party coffee pods, thus locking customers into buying only the Keurig-branded K-cups or those of approved partners.
-
Nintendo fans, mark your calendars for May 20, 2014. As Nintendo announced yesterday, that’s the last day you’ll be able to use the Nintendo Wi-Fi Connection to play hundreds of online games on the Wii and Nintendo DS. Single-player modes for those games will still work, of course, but any parts of the games that require an Internet connection will be completely non-functional in a matter of months.
-
The Unlocking Consumer Choice Act (H.R. 1123), which was introduced in March by Rep. Robert W. Goodlatte (R-Va.), chairman of the House Judiciary Committee, was widely supported by members on both sides of the aisle.
-
Humble feel it would harm their reputation to ask a developer to sit out and wait for the next bundle for the sake of a Linux version.
Permalink
Send this to a friend
Posted in News Roundup at 11:29 am by Dr. Roy Schestowitz
Censorship
Traffic
-
While Google Fiber has managed to get ISPs to compete in the areas it’s deployed, the project has also managed to spawn a new, misleading but entertaining phenomenon I’ve affectionately labeled “fiber to the press release.” In a fiber to the press release deployment, a carrier (usually one with a history of doing the bare minimum on upgrades) proudly proclaims that they too will soon be offering 1 Gbps broadband. The announcement will contain absolutely no hard specifics on how many people will get the upgrades, but the press will happily parrot the announcement and state that “ISP X” has suddenly joined the ultra-fast broadband race. Why spend money on a significant deployment when you can have the press help you pretend you did?
-
Europe
-
In what some industry observers are calling a “Back-to-the-Future” moment, the need for faster and wider pipes to deliver video and other data-intense applications is driving a raft of tie-ups between mobile and cable operators that is only expected to accelerate.
-
- iophk: “It’s not so much that it would create a fast lane, but that it creates artificially slow lanes which make once normal service look fast in comparison. Can the proposal be pruned of noxious riders or is it a poison pill for the otherwise consumer-friendly proposal?”
-
- iophk: “Looks like certain interests are learning now to use riders on legislation.”
Control
-
Community leaders in Lexington are the latest to stand at a fork in the broadband road. In September, the franchise agreement between the Lexington-Fayette Urban County Government (LFUCG) and Time Warner Cable expired, resulting in a month-to-month agreement continuation. As they negotiate a new contract, local citizens have called for consideration of a municipal network.
-
On a sleepy Friday afternoon last week, the U.S. Department of Commerce dropped what seemed, to many, like a bombshell: It intends to transition its coordinating role over the Internet’s domain name system—those web addresses you type into your browser—to the global Internet community.
Permalink
Send this to a friend
Posted in News Roundup at 11:24 am by Dr. Roy Schestowitz
Mass Surveillance
-
In breaking the cycle, the implications of a true decentralized social network are profound.
-
-
The debate Edward Snowden envisioned when he revealed the extent of National Security Agency (NSA) spying on Americans has taken a bad turn. Instead of a careful examination of what the NSA does, the legality of its actions, what risks it takes for what gains, and how effective the agency has been in its stated mission of protecting Americans, we increasingly have government officials or retired versions of the same demanding — quite literally — Snowden’s head and engaging in the usual fear-mongering over 9/11. They have been aided by a chorus of pundits, columnists, and present as well as former officials offering bumper-sticker slogans like “If you have nothing to hide, you have nothing to fear,” all the while claiming our freedom is in direct conflict with our security.
-
Ledgett said the NSA’s core problem was that it was lousy at PR, rather than that it was invading innocent people’s privacy. The bigwig said that the former US President James Madison, one of the key writers of the US Constitution, “would be proud” that the checks and balances he helped install still worked in today’s digital age.
-
-
Staff at the United States’ National Security Agency reportedly “hunted” system administrators because they felt doing so would yield passwords that enabled easier surveillance.
So says The Intercept, which claims this document came its way thanks to one E. Snowden, late of Moscow.
-
The latest revelation from the cache of Snowden documents shows that the NSA targets sysadmins to gain access to the infrastructure that they are responsible for.
-
A new report from The Intercept reveals that the NSA has been hunting and hacking system administrators the world over in order to gain access to the networks they control.
-
NSA general counsel Rajesh De says big tech companies like Yahoo and Google provided ‘full assistance’ in legally mandated collection of data
-
The National Security Agency has built a surveillance system capable of recording every phone call made in a foreign country, according to new leaks by Edward Snowden.
-
-
-
I’m seeing a bunch of folks passing around a story by Spencer Ackerman at The Guardian, claiming that tech companies lied about their “denials” of PRISM. The story is incredibly misleading. Ackerman is one of the best reporters out there on the intelligence community, and I can’t recall ever seeing a story that I think he got wrong, but this is one. But the storyline is so juicy, lots of folks, including the usual suspects are quick to pile on without bothering to actually look at the details, insisting that this is somehow evidence of the tech companies lying.
-
The deputy head of the NSA spying agency accused fugitive intelligence contractor Edward Snowden on Thursday of displaying “amazing arrogance” in revealing US eavesdropping techniques.
-
The German Bundestag announced it will investigate surveillance conducted by the US National Security Agency and its foreign partners, as well as whether any German officials knew of the spying that targeted the likes of German Chancellor Angela Merkel.
-
Germany’s Bundestag is taking a close look at Western spying activities in Germany. Spectacular results are not expected from the parliamentary inquiry, as witnesses are likely to stonewall.
-
-
Orange has been cooperating allegedly illegally for years with France’s main intelligence agency (the DGSE). According to a newly found report by Edward Snowden and an investigation by Le Monde, the DGSE was given access to all of Orange’s data (not just metadata).
-
-
-
Thankfully, there are some Americans willing to stand up and do something to slow the National Security Agency’s (NSA) construction of the surveillance state.
In Utah, for example, a group of activists is working to cut off the supply of water to the NSA’s massive Utah Data Center located near Bluffdale.
Drones
-
The United States apparently wants nothing to do with a United Nations Human Rights Council discussion on whether the country’s drone strikes may violate international human rights law.
-
The revelation comes from a high-level review of a complaint that the £23m BT communications line supported drone missions that had accidentally killed between 426 and 1005 civilians in the last decade in the course of strikes on suspected insurgents, according to estimates of the Bureau of Investigative Journalism.
-
A woman dressed in a black hijab is highlighted by the glare from a computer screen as she works with forensic architects in digitally recreating her home, the scene of a drone strike in Mir Ali, North Waziristan, Pakistan where five men, one of them her brother-in-law, were directly hit and killed on Oct. 4, 2010. This is the spot where she had laid out a rug in the courtyard, she explains, and where her guests sat one evening when the missile dove into their circle, leaving a blackened dent in the ground and scattering flesh that later, she and her husband had to pick up from off of the ground so they could bury their dead. Morbidly, the reconstruction of a drone strike is similar – the gathering of flecks of information when nothing else is available: through satellite imagery and video, the length of a building’s shadow, the pattern of shrapnel marks on a wall, and the angle of a photo, can help forensic architects determine where a missile struck and determine how it led to civilian deaths.
-
With drone strikes, not only is collateral damage recognized as a possible likelihood; it has become an accepted part of our foreign policy. Not only is America firing on citizens of sovereign nations, but they do so knowing that innocent people who had the misfortune of being at the wrong place at the wrong time are going to die. The old saying about the path of good intentions comes to mind.
-
As the weekly – sometimes daily – news stories never tire of telling us, domestic drones are coming. And as ABC News reported on March 17, they are arriving faster than the Federal Aviation Administration (FAA) can suss out the rules over their use. Though it’s technically illegal, and the FAA may issue fines if they catch you, ABC reports that commercial use of drones is starting to happen whether or not the government approves – as long as it doesn’t notice.
-
-
The Pakistani draft, which was obtained by Foreign Policy, urges states to “ensure transparency” in record-keeping on drone strikes and to “conduct prompt, independent and impartial investigations whenever there are indications of any violations to human rights caused by their use.” It also calls for the convening of “an interactive panel discussion” on the use of drones.
-
For all of the nonchalant assurances that he is neither a “dictator” nor an “emperor,” Barack Obama is certainly trigger-happy with the power jokes.
-
-
Lucien rises from bed in the early morning. He dresses quietly, careful not to awaken his wife and infant son. He walks briskly across the city of Algiers in the pre-dawn light to a square that is already thick with people, their gaze fixed on a wooden platform and rising from it the stark outline of a guillotine.
[...]
Camus’ essay on the barbarity of the death penalty was written in 1956, against the backdrop of the executions of hundreds of dissidents during the Soviet crackdown in Hungary, as well as the execution of Algerian revolutionaries condemned to death by French tribunals. He notes that by 1940 all executions in France and England were shielded from the public. If capital punishment was meant to deter crime, why hold the killings in secret? Why not make them a public spectacle?
Venezuela
-
Images forge reality, granting a power to television and video and even still photographs that can burrow deep into people’s consciousness without them even knowing it. With a wide variety of sources and people on the ground to talk to, I thought I was immune to the repetitious portrayals of Venezuela as a failed state in the throes of a popular rebellion. But even I was not prepared for what I saw in Caracas: how little of daily life appeared to be affected by the protests, the normality that prevailed in the vast majority of the city. I, too, had been taken in by media imagery.
Secrecy
-
SAC Capital Advisors, the hedge-fund firm that agreed to pay a record fine to settle insider-trading charges, moved to boost surveillance by hiring Palantir Technologies, a Central Intelligence Agency-backed software maker.
-
The Freedom of Information Act (FOIA) is a critical law for making sure the public has a fighting chance to get copies of records the government might not want it to see. For more than 40 years, people have used the FOIA to uncover evidence of government waste, fraud, abuse and illegality. More benignly, FOIA has been used to better understand the development and effects – positive and negative—of the federal government’s policies.
-
Sen. Mark Udall called on the White House again Thursday to declassify a report on the Central Intelligence Agency’s interrogation program during the war on terror.
-
-
Senate staffers say the agency tortured prisoners in ways that went beyond what the Bush-era DOJ approved, according to an Al-Jazeera America report.
-
House Minority Leader Nancy Pelosi’s remarks in support of fellow legislator Dianne Feinstein, who is embroiled in a dispute with the CIA, ought to be the sort of thing that alarms everyone. After all, another powerful member of Congress claims that the spy agency she is charged with overseeing illegitimately resists checks on its autonomy.
-
Both the Central Intelligence Agency and the Senate Intelligence Committee believe that laws may have been broken in their bitter dispute over top secret documents relating to the C.I.A.’s detention program and who has the right to read them.
-
In the nine days since Senator Dianne Feinstein revealed that the Central Intelligence Agency had spied on Senate Intelligence Committee staffers investigating CIA torture programs, the issue has been all but dropped by the political establishment and the media.
Ukraine
-
Putin was strongest in his accusations of western hypocrisy. His ironic welcoming of the West having suddenly discovered the concept of international law was very well done. His analysis of the might is right approach the West had previously adopted, and their contempt of the UN over Iraq and Afghanistan, was spot on. Putin also was absolutely right in describing the Kosovo situation as “highly analogous” to the situation in Crimea. That is indeed true, and attempts by the West – including the Guardian – to argue the cases are different are pathetic exercises in special pleading.
The problem is that Putin blithely ignored the enormous logical inconsistency in his argument. He stated that the Crimean and Kosovo cases were highly analogous, but then used that to justify Russia’s action in Crimea, despite the fact that Russia has always maintained the NATO Kosovo intervention was illegal(and still refuses to recognize Kosovo). In fact of course Russia was right over Kosovo, and thus is wrong over Crimea.
[...]
The attempt to downplay Russia’s diplomatic isolation was also a bit strange. He thanked China, though China had very pointedly failed to support Russian in the Security Council. When you are forced to thank people for abstaining, you are not in a strong position diplomatically. He also thanked India, which is peculiar, because the Indian PM yesterday put out a press release saying Putin had called him, but the had urged Putin to engage diplomatically with the interim government in Kiev, which certainly would not be welcome to Putin. I concluded that Putin was merely trying to tell his domestic audience Russia has support, even when it does not.
-
-
Ukraine’s breakaway region of Crimea will ask Tatars to vacate part of the land where they now live in exchange for new territory elsewhere in the region, a top Crimean government official has said.
Permalink
Send this to a friend
03.20.14
Posted in News Roundup at 11:40 am by Dr. Roy Schestowitz
Genode OS
-
The Genode Operating System Framework has been one of the more interesting and successful open-source OS research projects of recent times. Genode OS is becoming increasingly usable to enthusiasts and is also proving to be an interesting environment for developers. A lot of headway was made for Genode OS in 2013, but there’s already a list of TODO items for the community-based operating system in 2014.
MINIX
-
MINIX 3.2.1 can successfully power-up on the BeagleBoard-xM with a working frame-buffer and is “off to discover the world.” While there is a frame-buffer, networking support doesn’t yet work on MINIX. MINIX 3.2.1 has been advertised as a great fit for ARM since its small, BSD licensed, and reliable.
Plan 9
ReactOS
OpenBSD
-
The OpenBSD Foundation would like your help to meet our fundraising goals for 2014. Our 2014 Fundraising goal is $150,000. This amount will ensure the continued health of the projects we support, and will enable us to help them do more, and we can avoid the distractions of financial emergencies that could potentially spell the end of the project.
-
-
PC-BSD
-
-
With FreeBSD 10.0 having been released and the final release of the PC-BSD 10.0 coming this week, I decided to try out the PC-BSD 10.0-RC5 ahead of the final release. While I intended to run some benchmarks of FreeBSD/PC-BSD 10.0 against its predecessor and compared to Linux distributions, this initial PC-BSD 10.0 encounter was cut short after about ten minutes.
FreeBSD
-
Linux isn’t the only open-source operating system, and it isn’t the only one with both server and desktop components either. The FreeBSD Project is one of the earliest open-source operating system projects, with roots connecting it to the original open-source BSD Unix work performed at the University of California at Berkeley. On Jan. 20, FreeBSD 10 debuted, providing server users with multiple performance and virtualization improvements. While FreeBSD itself could potentially be used as a desktop system, the PC-BSD open-source project is the home base for FreeBSD as a desktop operating system.
BSD (General)
-
EuroBSDcon is the European technical conference for users and developers of BSD-based systems. The conference will take place September 25 to 28 at InterExpo Congress Center in Sofia (see http://iec.bg/en/). Tutorials will be held on Thursday and Friday, while the shorter talks and papers program is on Saturday and Sunday.
-
This is a feature-focused release. New features: * ssh(1), sshd(8): Add support for key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein’s Curve25519. This key exchange method is the default when both the client and server support it.
-
-
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »