02.11.15
Posted in News Roundup at 8:04 am by Dr. Roy Schestowitz
Contents
-
Hiring top Linux and open source talent isn’t as easy as initiating a search with your favorite recruiter. Linux and open source developers and SysAdmins are among the most sought after talent in tech; companies like IBM, Twitter, Facebook and many more understand that to attract these folks, they have to do things differently. I’ve been working in open source since the late 90s and have seen first hand many of these changes.
-
No matter. Millions of servers will not be properly migrated to M$’s next release on time so they might as well migrate to GNU/Linux and take charge of their futures rather than be dependent on M$’s schedule and desire for cash. Why should your organization uproot itself because another organization wants a fresh influx of cash? Do the right thing. Go to Debian GNU/Linux and FLOSS. It will work for you, not M$.
-
While some Windows users are quite satisfied with Microsoft’s desktop operating system, others are not. Does it make sense for Windows users make the jump to Linux or Mac?
-
You can answer three questions to choose between Linux or Windows, and you can gripe about how Windows is killing the traditional desktop, but all that is fluff. The purpose of an operating system is to put forth an environment where you can get things done—where you can get things done. You are what matters and everything else is bullshit.
-
Server
-
-
The Docker project team wanted to start the new year out right with something awesome; that’s why we’re super excited to announce the first Docker release for 2015. We’ve smashed many long-standing, annoying bugs and merged a few awesome features that both the community and maintainers are excited about. Let’s check out what’s in Docker 1.5.
-
Notably, though, 49 percent of survey respondents pointed to a lack of operational production tools and problems with Docker’s security as the biggest obstacles to adoption.
-
IBM announced a new 10-year services agreement with Shop Direct to move the multi-brand digital retailer to a hybrid cloud model.
Shop Direct said it will tap IBM’s outsourcing capabilities and the IBM Cloud for analytics, mobile, social and security services that will enable greater customer satisfaction and workforce productivity.
-
Kernel Space
-
Linus Torvalds announced the first new Linux kernel of 2015 on February 9, with the debut of Linux 3.19. It took seven release candidates to hit the final 3.19 release, which is about average.
-
-
So nothing all that exciting happened, and while I was tempted a couple of times to do an rc8, there really wasn’t any reason for it.
-
The Internet of Things is already a reality — thousands of devices, from home appliances and consumer electronics, to smartwatches and cars already connect to the Internet. The problem is that they don’t easily, or simply can’t, connect to each other to form an Internet of Everything, says Philip DesAutels, senior director of IoT at the AllSeen Alliance, a Linux Foundation Collaborative Project.
-
A collaboration between SUSE and Red Hat is going to bring relief to Linux users the world over: they’ll be able to patch their systems without reboots.
-
The changes going in through Ingo Molnar’s branches aren’t incredibly exciting this round, but it looks like the scheduler tree updates have the potential to be semi-exciting. In particular, the kernel scheduler changes have minor micro-optimizations, various fixes and enhancements, and a idle-poll handler fix that has the potential to result in power-savings.
-
-
Benchmarks
-
If you’re wondering about any file-system performance changes for XFS/EXT4/Btrfs/F2FS when operating on a single SSD, I ran the vanilla Linux 3.18 vs. 3.19 benchmarks this weekend on an ASUS Zenbook UX301LAA with Intel Core i7 4558U Haswell processor and the file-system tests targeting the secondary 128GB SanDisk SATA3 SSD with this ultrabook. A development snapshot of Ubuntu 15.04 x86_64 was used for this kernel/file-system comparison with its updated file-system user-space utilities. For this testing, the stock mount options of each file-system was used.
-
Applications
-
As you may or may not know, I have been working on this project for quite some time, but actually really started the most critical parts a couple months ago. After having looked for (and chosen) a new name for what was a prototype project, it’s now time for a very first release.
-
-
Proprietary
-
Opera Software, though Ruarí Ødegaard, has announced today, February 10, that the developer channel of the amazing Opera web browser is now open and updated to version 29.0.1770.1, based on the Chromium 42.0.2287.0 web browser.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
I will try again (as in this issue) to explain why we decided to slowing that feature. Slowing means that it will be done later, not never, as it was stated. It is just that we think that other things benefit the whole idea of ownCloud more. That has plain technical reasons. Let’s dive a bit into.
-
From almost every app being on the command line to doing everything through the web browser, GNU/Linux has come a long way towards user-friendliness. But in always using that ever-present Firefox or Chromium session, something has been lost along the way.
-
Wine or Emulation
-
With Wine 1.7.36 having been released on Friday, the Wine-Staging crew released their respective updated version of Wine patched with experimental features.
-
Games
-
I took a look at the game a little while ago and was impressed by the ambition and vision of the game. If the game lives up to the promise and has a good launch, I could see myself sinking in a lot of hours. It’s been a while since there’s been a good city builder available and it’s even nicer that we look set to get a same-day release on Linux.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
A few years ago I used to regularly publish videos, so back then I started with an evaluation of FOSS video editors available for Fedora. At the time I decided the “winner” to be Kdenlive (at the time PiTiVi was useless, OpenShot unavailable and Blender unknown for its video editing capabilities), despite all the drawbacks of its KDE interface and sudden crashes.
-
In Plasma 5.3 some of the things that were lost along the way of the port to Plasma 5 due to the massive architecture change will be back.
-
GNOME Desktop/GTK
-
-
New Releases
-
The second beta release of elementary OS ‘Freya’ is now available for download, and arrives some six months after the first beta was released to much excitement.
-
-
Screenshots
-
Red Hat Family
-
With more than 600 branches across 30 countries, UAE Exchange has a large, and growing customer base. However, rapid expansion caused performance and availability concerns about the company’s distributed IT systems, previously comprised of servers running various versions of UNIX . To better support its fast growing portfolio of web-based applications for new services such as payment for credit cards, utility bills, subscriptions, airline tickets and others, the company needed to consolidate its environment on a single platform.
-
The joint solution will leverage NEC’s infrastructure offering and Red Hat’s cloud solution to help service providers quickly adopt NFV.
Red Hat and NEC want to make it easier for communications service providers to embrace network-functions virtualization in their data centers.
-
As 2015 begins, we’re seeing a lot of action from telecom players and the open source community surrounding Network Function Virtualization (NFV) technology. Now, Red Hat and NEC Corporation have formed a partnership to develop NFV features in he OpenStack cloud computing platform, with the goal of delivering carrier-grade solutions based on Red Hat’s OpenStack build.
-
Fedora
-
The Korora 21 screenshot tour series ends with the Xfce edition, which is built around the lightweight and fast Xfce 4.10.1 graphical desktop environment and targeted at users of low-end machines or computers with old/semi-old hardware components.
-
I’ve had Fedimg spin up some fresh Fedora 21 Cloud AMIs on Fedora’s official AWS account. I’ve done this for a couple of reasons.
First, the AMIs linked to by the official download page were created on the Fedora Cloud SIG community account. In production, Fedimg registers the AMIs with the official Fedora AWS account, but I had triggered these uploads from a machine configured with the community account credentials. Registering these AMIs from the official Fedora AWS account (to which few people have access) provides additional security. You can further verify uploads by checking out the associated fedmsgs. For instance, here are the latest upload messages. In this example, you can see information about the AMI, including its ID and the name of the image it was created from.
-
The famous Network Security Toolkit (NST) computer operating system used by many network administrators and security specialists to analyze and monitor networks, as well as to tighten the security of computer networks, received an update on February 9, 2015. The version is now Network Security Toolkit 20 SVN 6535.
-
Debian Family
-
Yesterday, however, I’ve seen an experienced Linux person frustrated because the shutdown function of the desktop was doing nothing whatsoever. Today I found John Goerzen’s post on planet.
-
Derivatives
-
The Elive Team proudly announced the immediate availability for download and testing of a new Beta version of their Elive computer operating system, based on the highly acclaimed Debian GNU/Linux distribution.
-
The Univention Corporate Server (UCS) enterprise-ready Linux server distribution based on the Debian GNU/Linux operating system has been updated today, February 11, to version 4.0-1, a minor release that includes an updated Debian base and various tweaks.
-
Canonical/Ubuntu
-
-
For those of you who don’t know me, I am an open source community management and leadership dork. I spent just under eight years as Ubuntu community manager at Canonical, leading a team of six and providing community management consultancy via my own practice. I then moved on to join XPRIZE last year. I wrote “Art of Community,” “Dealing With Disrespect,” and a few other books, founded the Community Leadership Summit, which takes place just before OSCON in Portland each year, co-founded a technology podcast called Bad Voltage, and record some music from time to time.
-
After years of development, the first Ubuntu phone is finally here (Europe only) and while the hardware is average at best, the OS is a breath of fresh air, bringing innovations like scopes and “magic edges”, designed not just to be different, but in many ways, better than the current trends.
-
Some news sites claimed earlier that the Ubuntu Phone Aquaris E4.5 smartphone will ship today, February 9. It turns out that the information is completely false, as BQ immediately posted on their Twitter account that the device will be available this week, but not today.
-
We have some amazing news for you guys if you’re in the market for an Ubuntu Phone, as both Canonical and BQ have confirmed a few minutes ago on their Twitter accounts that limited Ubuntu phones will be available for you to buy tomorrow, February 11, 2015, between 9am and 6pm CET (Central European Time).
-
As we announced yesterday, Ubuntu Phone’s flash sale happens today, February 11, 2015, right now. Therefore, if you are desperate to get one today, forget about reading this article and go get yours from BQ’s online store.
-
Videos of the first Ubuntu-based phone to be released in the UK show that the low-budget handset may struggle in terms of performance. The BQ Aquaris E4.5 Ubuntu Edition will be released this week, and marks the end of a two-year journey for Ubuntu to find a manufacturer willing to ship its smartphone OS.
-
-
Open-source technology is one solution to this challenge, especially where it allows the tight integration of software with a range of hardware options.
An important aspect of this is the creation of open-source platforms around the Linux operating system, which has a growing software infrastructure that OEMs can take advantage of to develop and debug designs.
-
Phones
-
Tizen
-
Today we are excited to see that the source code for Tizen 2.3 has been finally released. The last code drop for mobile was back in November 2013, so this is seen as something quite overdue by platform developers. We hope more OEMs will now stop sitting on the sidelines and join Samsung in developing Tizen based Smartphones and wearables, that will further enrich the Tizen ecosystem.
-
Samsung recently launched its first Tizen OS smartphone in India and although initial reports said that the Korean tech giant managed to sell 50,000 units in the first 10 days, concerns were raised over Tizen’s skimpy app ecosystem.
-
We are excited to announce the availability of Node.js v0.12! It has been a long process, and we want to thank contributors and all of the community who waited patiently for this event. Node.js has such a vibrant and enthusiastic community, and we’re very lucky to have you all supporting us.
-
In a bid to quell an uprising within the Node.js ranks, vendor sponsor Joyent has announced an independent foundation to provide an open governance structure for the project.
Though big players including IBM, PayPal and Microsoft will be involved, CEO Scott Hammond said the foundation will help ensure all voices are heard.
-
Node.js, the popular server-side JavaScript framework, is getting its own open-source foundation and will no longer be governed by Joyent, the cloud-infrastructure provider plans to announce on Tuesday. It should take around two to three months before the foundation is formally established, and until then, Joyent will remain the corporate steward of the Node.js open-source project, according to Joyent.
-
Events
-
It’s been one of those years, and with 2015 being the 13th year for the Southern California Linux Expo — hence SCALE 13x — you might expect that superstition would be rearing its ugly head.
-
OSDC Nordic is an upcoming open-source friendly community-oriented xevent, held May 8th – 10th in Oslo.
-
Web Browsers
-
In the past, Microsoft’s Internet Explorer was the go-to Web browser for Internet users. But end-user confidence in Internet Explorer appears to be waning.
Last summer, Google Chrome passed Internet Explorer in combined U.S. desktop and mobile Internet market share for the first time. Chrome now holds 31.8 percent of total market share compared to Internet Explorer’s 30.9 percent share. Furthermore, Chrome has been growing at a rate of 6 percent year over year from 2008, while Explorer has been decreasing at a rate of 6 percent during the same time frame.
-
Mozilla
-
The Firefox OS-based “Matchstick” media player has been delayed a half year to August, and will receive an overhaul to move to a quad-core SoC and add DRM.
-
One thing I am trying to convince folks though is that working in the open is not so hard that we ignore the principles of working in the open and avoid trying to build a good foundation of open processes. One thing I am finding when I have these discussions though is people do not always feel empowered to speak out about working in the open. Simply put teams and organizations will get in these status quos where they put off this hard work and nobody really comes around often to challenge the status quo because often the debates that pursue of working in the open are filled with disagreement.
-
SaaS/Big Data
-
OwnCloud Server 8 has been released this morning and with it comes improved sharing and collaboration between clouds and other features.
-
ownCloud Server 8 has been released and come full with features to make browsing and sharing the contents of your cloud quicker. The search interface has been updated to provide a simpler and easier user experience by introducing: enhanced result set reporting which speeds up access to searched siles, additional search parameters and other general usability improvements to make finding files easier. To aid your search, the new release comes with the ability to assign a favourite icon to files and folders.
-
ownCloud, a free software alternative to proprietary web services such as Dropbox, Google Drive and others that you can install on your own server, has reached version 8.0.0.
-
-
CloudStack is an open source cloud software platform which is designed to deploy networks of scalable virtual machines in an Infrastructure-as-a-Service environment. It is often likened to OpenStack, and provides on-premises cloud computing as part of a hybrid cloud solution.
-
Public Services/Government
-
A new open source, online collaboration tool will allow Defense Department employees to easily and securely web conference and instantly chat from anywhere around the world.
The Defense Information Systems Agency is expanding the capability called Defense Collaboration Services, or DCS, across the department, according to a Feb. 6 press release from the Air Force.
-
An NHS open source community interest company (CIC) has been set up to guide the development of an electronic patient record system, which NHS England hopes will ignite the open source digital health and care services markets to better serve clinicians and patients.
-
-
Openness/Sharing
-
Are you the kind of drone pilot that wants to do things with your aircraft no one’s thought of before? If so, then Tower, the new open-source flight control app from 3D Robotics, could well be for you.
-
3D Robotics, the largest U.S.-based drone manufacturer, today announced the launch of its open-source Tower flight control app for drone copters and planes on Android phones and tablets. The app gives users a few new ways to talk to their drones, but far more importantly, it offers developers a new way to build new features for drones into the app without having to reinvent the wheel by starting from scratch.
-
Modelling energy usage is not enough, so an energy measurement board (the ‘MAGEEC Wand’) has been created, which can be applied to a range of embedded architectures. MAGEEC was presented at GNU Tools Cauldron – the annual gathering of GNU tools developers (CC- licensed video and slides at gnu.org) – this July in Cambridge, on the Atmel AVR. Since this, further work has completed the “proof of concept” framework, which fits both GCC and LLVM compilers – a working system that currently awaits further optimisations.
-
Open Hardware
-
Open Source Virtual Reality (OSVR), the initiative from Razer and Sensics to connect multiple VR software and hardware partners together, had a good handful of partners at CES 2015, and 13 more have been announced today. The new partners include Jaunt — a maker of cinematic VR experiences that already has apps for Google Cardboard — plus a few game developers, audio and interface accessory companies.
-
Open Source Virtual Reality, a Razer-spearheaded coalition that was introduced at CES 2015 in January, has announced 12 new partners.
OSVR aims to build an open source VR platform that developers and hardware makers can use to create virtual reality devices and experiences across multiple operating systems
-
Health/Nutrition
-
Every six months, like clockwork, I fly home to the UK for three days for one reason: to pick up my supply of prescription medication.
I consider myself lucky—drugs are cheap there, where a national health service exists that I can partake of as a UK citizen. The very vast majority of Americans are not as fortunate. John Oliver, fellow Brit, comedian, and host of Last Week Tonight, said Sunday in a skit about Big Pharma that the cost of drug spending in the U.S. last year “works out to be about a thousand dollars per person.”
-
Radical right-wingers in a series of red states are punishing hundreds of thousands of low-income people by blocking efforts by Republican governors to expand Medicaid—state-run health care—by modifying Obamacare to include Republican ideas.
-
Security
-
Cybercrooks have cooked up a Linux backdoor boasting multiple malicious functions.
The Swiss Army Knife-style malware – dubbed Xnote.1 by Russian anti-virus company Doctor Web – can be used as a platform to mount DDoS attacks and other malicious tasks.
To spread the new Linux backdoor, criminals mount a brute force attack to establish an SSL connection with a target machine.
-
-
The Core Infrastructure Initiative (CII), which was formed last year to identify open-source projects in need of extra support, expects to name the projects that will receive its backing within a few months, said Jim Zemlin, executive director of the Linux Foundation, which oversees the CII.
-
Administrators of tens of thousands of MongoDB databases around the world failed to enforce any security mechanisms, allowing access outside the backend and exposing information of millions of customers to unauthorized parties.
-
Managed cloud hosting provider SingleHop hopes to stand out from the pack with new security tools that outsource data protection and DDoS-attack mitigation to the cloud. Its solution, Shield Plus Advanced Security, debuted this week.
-
Defence/Police/Secrecy/Aggression
-
Enormous Gender Disparity Present Across All Three Outlets. Fox News featured women in roughly 25 percent of recorded segments, while MSNBC and CNN each featured female guests in just over 20 percent of segments discussing foreign affairs and national security.
-
On January 26, the New York Times claimed that “a CIA drone strike in Yemen. . . . killed three suspected Qaeda fighters on Monday.” How did they know the identity of the dead? As usual, it was in part because “American officials said.” There was not a whiff of skepticism about this claim despite the fact that “a senior American official, speaking on the condition of anonymity, declined to confirm the names of the victims” and “a C.I.A. spokesman declined to comment.”
That NYT article did cite what it called “a member of Al Qaeda in the Arabian Peninsula” (AQAP), who provided the names of the three victims, one of whom was “Mohammed Toiman al-Jahmi, a Yemeni teenager whose father and brother were previously killed in American drone strikes.” The article added that “the Qaeda member did not know Mr. Jahmi’s age but said he was a member of the terrorist group.”
In fact, as the Guardian reported today, “Mr. Jahmi’s age” was 13 on the day the American drone ended his life. Just months earlier, the Yemeni teenager told that paper that “he lived in constant fear of the ‘death machines’ in the sky that had already killed his father and brother.” It was 2011 when “an unmanned combat drone killed his father and teenage brother as they were out herding the family’s camels.” In the strike two weeks ago, Mohammed was killed along with his brother-in-law and a third man.
-
Mohammed Tuaiman becomes the third member of his family to be killed by what he called ‘death machines’ in the sky months after Guardian interview
-
At least part of the reason for this is that many American officials have continued in Bush’s tradition of defining the U.S. conflict with extremist Middle Eastern groups as a grand civilizational and religious battle, thus playing in to the same sharply polarizing narrative those groups seek to promote.
-
On Sunday night, a series of YouTube videos appear to show a large explosion in Donetsk, Ukraine (several can be watched here). However, it wasn’t a “tactical nuclear weapon,” as some social media users claimed, but just a big blast–reportedly Ukrainian army artillery fire hitting an ammunition depot held by the rebel Donetsk People’s Republic.
-
Transparency Reporting
-
…in-depth look at the vital role of whistleblowers in ensuring public safety and government accountability.
-
British police are reviewing the operation to guard WikiLeaks founder Julian Assange, the UK’s most senior officer has said.
Metropolitan Police Commissioner Sir Bernard Hogan-Howe told LBC radio that the force is assessing its options due to the pressure the operation at the Ecuadorian embassy in London is putting on resources.
“We won’t talk about tactics but we are reviewing what options we have. It is sucking our resources,” he said.
-
Environment/Energy/Wildlife
-
Harper, who assumed office in 2006 and who has been a staunch supporter of Canada’s tar sands industry, has tried to silence activists who speak out against the industry. But he hasn’t stopped there: his administration has been accused of muzzling its scientists and meteorologists in an attempt to stop certain information on climate change or environmental issues from reaching the public. Under Harper, Canada withdrew from the Kyoto Protocol — which the prime minister once referred to as a “socialist scheme” — in 2011 and cut about 500 jobs from the Department of Fisheries and Oceans in 2013. The government also closed seven scientific libraries in 2014.
-
Finance
-
Given this lopsided distribution of income gains, it’s not irrational for people who make quite a bit more than the median income to identify with the middle class and applaud policies that are aimed at curbing the accumulation of wealth by the super-wealthy. But Edsall’s argument for the failure of middle-class populism depends on better-off voters who think of themselves as middle class not really being middle class–and knowing somehow that when politicians talk about the “middle-class,” they aren’t talking about them.
-
-
McKinsey, one of the world’s preeminent business consultants, released a sobering new report this week detailing that, worldwide, total debt has risen by 40.1 percent — or $57 trillion — since the financial crisis of 2008. “Debt,” here, can mean many things: debt to other countries and international institutions, as in Greece and Italy, which were bailed out by the troika; it also means debt to financial institutions, or household and personal debt of the kind those of us paying off mortgages, medical debt or student loans here in the states know all too well. It all means bad news for the economy.
-
On Wednesday, the European Central Bank announced that it would no longer accept Greek government debt as collateral for loans. This move, it turns out, was more symbolic than substantive. Still, the moment of truth is clearly approaching.
-
Half of our nation, by all reasonable estimates of human need, is in poverty. The jubilant headlines above speak for people whose view is distorted by growing financial wealth. The argument for a barely surviving half of America has been made before, but important new data is available to strengthen the case.
-
PR/AstroTurf/Lobbying
-
An upcoming House Oversight Committee hearing features two conservative media darlings infamous for their anti-immigrant rhetoric and peddling misinformation about voter fraud and election law.
-
I don’t know that there’s anyone who seriously argues that there’s any actual doubt that Israel has nuclear weapons; if there were any lingering questions, they were resolved by the revelations of Mordechai Vanunu, a whistleblower who exposed details of Israel’s nuclear warhead lab in 1986 and was imprisoned by Israel for 18 years as punishment. Later on in the piece, in fact, the Times notes that “the Arms Control Association, a research group in Washington, says Israel is believed to have 100 to 200 warheads.”But it’s still treated as claim to be attributed to a source rather than a verified fact.
-
A hundred and fifty plus 72 is 222 congressmembers, or 51 percent of the House of Representatives. That’s a pretty big “fringe.”
-
Censorship
-
Mr Galloway has used his Twitter account to claim he was the victim of a “lynch mob”. He encouraged his supporters to call the BBC and complain about the treatment he received.
-
Galloway has complained about the BBC and Freedland’s behaviour, accusing the broadcaster of setting him up. He has written a scathing piece about his experience here.
-
Privacy
-
Fitness trackers and even Samsung televisions are becoming more advanced, and that data can inadvertently reveal sensitive things we never meant to make public
-
On Tuesday, former Florida governor Jeb Bush published Volume 1 of an e-book detailing all of his official correspondence while in gubernatorial office. Although the e-book is edited and e-mail addresses have been redacted, the Governor’s Office also published six Outlook files full of all of Bush’s unredacted correspondence—creating a trove of full names connected with personal e-mail addresses, home addresses, phone numbers and even social security numbers, as The Verge first reported.
[....]
The scope of the e-mails is vast and includes everything from automated messages to brief summaries of the state of Cuban refugees who arrived on Florida’s shores to oddly personal e-mails from constituents. Some e-mails include correspondence that had not been addressed to Bush originally but showed up when part of an e-mail was forwarded to him. Other e-mails include personal information about people who aren’t involved in the e-mail thread at all. “Did you get this? Eric’s wife is being induced tomorrow a.m. so we’ll be out of town for a while. Merry Christmas and Happy New Year to you and your family!” one cheerily reads.
-
The Electronic Frontier Foundation filed a lawsuit Monday in order to learn more about the United States Marshals Service’s use of airborne cell-site simulators.
The San Francisco-based advocacy group filed a Freedom of Information Act (FOIA) request with the Department of Justice (DOJ), the USMS’ parent agency, shortly after the revelations came to light in November 2014. However, the DOJ has not produced any responsive documents and has long exceeded the 30-day deadline as defined under the FOIA law.
In the suit, which was filed in federal court in Washington, DC, the EFF asks the court to compel the DOJ to immediately produce the documents. The DOJ did not immediately respond to Ars’ request for comment.
-
Mark Zuckerberg isn’t the only one in Silicon Valley with Craigslist envy. A decade ago, Google tried to meld classified ads with other crowdsourced content in a website called Google Base. The service never took off, and it now redirects to a site soliciting retailers to list on Google’s shopping search engine. Along with the big companies, countless startups have set out to make prettier, more functional versions of Craigslist, only to fail.
-
If you’ve ever filed a public records request with your local police department to learn more about how cell-site simulators are used in your community—chances are good that the FBI knows about it. And the FBI will attempt to “prevent disclosure” of such information.
Not only can these devices, commonly known as “stingrays,” be used to determine a phone’s location, but they can also intercept calls and text messages. During the act of locating a phone, stingrays also sweep up information about nearby phones. Last fall, Ars reported on how a handful of cities across America are currently upgrading to new hardware that can target 4G LTE phones.
-
The U.S. Government often warns of increasingly sophisticated cyberattacks from adversaries, but it may have actually contributed to those capabilities in the case of Iran.
A top secret National Security Agency document from April 2013 reveals that the U.S. intelligence community is worried that the West’s campaign of aggressive and sophisticated cyberattacks enabled Iran to improve its own capabilities by studying and then replicating those tactics.
The NSA is specifically concerned that Iran’s cyberweapons will become increasingly potent and sophisticated by virtue of learning from the attacks that have been launched against that country. “Iran’s destructive cyber attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers, was the first such attack NSA has observed from this adversary,” the NSA document states. “Iran, having been a victim of a similar cyber attack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others.”
-
Civil Rights
-
Aftenposten, one of the largest newspapers in Norway, today report that three of the nude body scanners now is put to use at Gardermoen, the main airport in Norway. This way the travelers can have their body photographed without cloths when visiting Norway. Of course this horrible news is presented with a positive spin, stating that “now travelers can move past the security check point faster and more efficiently”, but fail to mention that the machines in question take pictures of their nude bodies and store them internally in the computer, while only presenting sketch figure of the body to the public. The article is written in a way that leave the impression that the new machines do not take these nude pictures and only create the sketch figures. In reality the same nude pictures are still taken, but not presented to everyone. They are still available for the owners of the system and the people doing maintenance of the scanners, as long as they are taken and stored.
-
Manning was sentenced to 35 years in prison in 2013 after being convicted of leaking classified national security documents to WikiLeaks.
-
Newly declassified documents from the FBI reveal how the US federal agency under J Edgar Hoover monitored the activities of dozens of prominent African American writers for decades, devoting thousands of pages to detailing their activities and critiquing their work.
-
Internet/Net Neutrality
-
Google has decided to mothball its home-grown SPDY internet application-layer protocol in future versions of its Chrome browser, in favor of the Internet Engineering Taskforce’s HTTP/2 spec.
-
Intellectual Monopolies
-
Copyrights
-
Today it was revealed that a Swedish prosecutor is trying to force the .SE registry, via a court case, to ban ThePirateBay.se and PirateBay.se from being in use. He even wants to go so far as to claim the domains for the state in order to put up a ‘stop’ logo on them.
-
RapidShare, once the most popular file-hosting service in the Internet, has announced that it will shut down next month. The company doesn’t cite a reason for the surprising shutdown, but losing the majority of its users in recent years after the implementation of tough anti-piracy measures is likely to be connected.
[...]
RapidShare fought many legal battles with entertainment companies seeking to hold the company liable for the actions of its users, and to top it off the site was called out by the U.S. Government as a “notorious market.”
-
Andrus Nomm, one of the seven Megaupload employees indicted by the United States, has been arrested. The U.S. authorities have yet to comment on the arrest of the programmer but Megaupload lawyer Ira Rothken believes that he may have cut a deal with the FBI.
Permalink
Send this to a friend
02.10.15
Posted in News Roundup at 7:47 am by Dr. Roy Schestowitz
Contents
-
Desktop
-
There’s been a lot of interesting Linux news of late. Not just GNU/Linux, but all types of Linux, Android, Chrome OS, Firefox OS, embedded (IoT), cloud computing, cars, TVs, just about anything you can think of. But truth be told, I’d like to see more Linux on the desktop — just as Linus Torvalds said he would like to see that.
The recent purchase of a Chromebook for my son got me thinking about a new opportunity for Linux on the desktop. This is not an idea for getting a standard GNU/Linux desktop to automagically replace all existing Windows desktops, but to leverage the cloud computing paradigm with a bulked-up Chromebook-like system that would be workable for 80 to 90 percent of personal, school, and business needs.
-
Kernel Space
-
The latest open-source desktop program making optional use of systemd is the popular VLC media player.
As of this morning, there’s now a native logger module for the systemd journal within VLC.
-
Last Sunday when releasing Linux 3.19-rc7, Linus Torvalds mentioned he was looking at doing the official 3.19 release in one week. It seems to have been a relatively calm week to end out 3.19 development with no nasty regressions turning up, so chances are in a few hours he’ll have the new release out the door.
-
The Linux 3.19 kernel was tagged in Git close to an hour ago now. Surprisingly, as of writing this news post, Linus Torvalds has yet to issue any Linux 3.19 release announcement but things went according to plan as per last week with the plans for 3.19 final.
-
News of the release emerged in a typically economical Sunday evening post to the Linux Kernel Mailing List, in which Torvalds noted there are still a couple of bugs in this release but they were pretty obscure so “… while I was tempted a couple of times to do an rc8, there really wasn’t any reason for it.”
-
Good news for all users of a GNU/Linux operating system, as Linus Torvalds announced the immediate availability for download of the Linux 3.19 kernel, which brings interesting features, the usual bugfixes, and general performance improvements.
-
As the AllSeen Alliance’s senior director of IoT, Philip DesAutels (shown) works with Alliance members to advance the Internet of Everything by building out an open source software framework, AllJoyn, to seamlessly connect a range of objects and devices in homes, cars and businesses. He oversees and guides all aspects of the Alliance, from governance and technology, to the developer community and marketing efforts.
-
It looks like the infrastructure to facilitate live kernel patching will be added to the Linux 3.20 kernel, the result of collaboration for SUSE’s kGraft and Red Hat’s Kpatch.
Last year SUSE and Red Hat introduced their own live kernel patching mechanisms after not knowing each company was independently working on a solution for patching running versions of the Linux kernel against basic security/bug fixes. In the months since the unveiling of kGraft and Kpatch, the kernel developers have been working together to come up with a common base that addresses the needs of each implementation. That common work for supporting Kpatch and kGraft is now what’s ready for merging into Linux 3.20.
-
-
Today in the Linuxsphere the systemd controversy doesn’t seem to be subsiding as the main reason for it is no more. Jim Zemlin blogged about The Linux Foundation’s efforts to save small but key projects from starving to death as well as contributing to the security process. Speaking of security, a new trojan has been identified that can open backdoors on Linux servers that can, among other things, participate in DDoS attacks. Matt Hartley shares his list of the best software ever for Linux and Leif Lodahl declares LibreOffice better than the competitors.
-
The HID subsystem work for Linux 3.20 includes improvements to the Logitech HID++ protocol implementation, support for composite RMI devices, a new driver for the BETOP force feedback controller, new hardware support in the Wacom driver, and various fixes. The fixes and new device ID additions are “all over the place” for HID drivers.
-
Benchmarks
-
While my full Linux review of the NUC5i3RYH / Core i3 5010U will come in the days ahead on Phoronix, this weekend I uploaded some preliminary benchmark data for those curious. The Intel Core i3 5010U features a dual-core processor with Hyper Threading and is clocked at 2.1GHz for its frequency without Hyper Threading. The i3-5010U has a 15 Watt TDP, 3MB cache, and supports DDR3L/LPDDR3 1600/1333MHz memory. The graphics processor is Intel HD Graphics 5500 with a maximum frequency of 900MHz.
-
For any Intel Haswell Linux users with Iris Graphics thinking of switching to the Linux 3.19 kernel when it’s released in what might just be a few hours, be forewarned as testing this weekend revealed there looks to be an OpenGL performance regression attributed to this new kernel.
-
Applications
-
Version 7.6.0 of the powerful MKVToolNix software is now available for download, still providing computer users with one of the best collection of tools for analyzing, converting, merging, and splitting Matroska (popularly known as MKV) files on GNU/Linux, Mac OS X, and Microsoft Windows operating systems.
-
For hardcore geeks, Common UNIX Printing System or simply CUPS is an open-source printing layer for UNIX-like operating systems, including GNU/Linux, BSD (FreeBSD, OpenBSD), Solaris, Mac OS X, and Microsoft Windows. For end users, CUPS is that piece of software that lets them add printers, manage printers, as well as print documents on their computers.
-
The Oyranos library became quite slower during the last development cycle for 0.9.6 . That is pretty normal, as new features were added and more ideas waited for implementation letting not much room for all details as wanted. The last two weeks, I took a break and mainly searched for bottlenecks inside the code base and wanted to bring performance back to satisfactory levels. One good starting point for optimisations in Oyranos are the speed tests inside the test suite. But that gives only help on starting a few points. What I wished to be easy, is seeing where code paths spend lots of time and perhaps, which line inside the source file takes much computation time.
-
Over the years, there have been a number of claims that the Linux desktop is lacking in terms of good, highly useful software. Today, I’m aiming to put this myth to bed once and for all. Continue reading for my list of the top ten best applications for Linux.
-
It is my pleasure to finally release Icemon 3.0 to the public. If you don’t know it — Icemon is a GUI monitor for Icecream, a distributed compiler system.
-
-
Instructionals/Technical
-
-
-
-
-
-
Under a superficial examination, the Pebble doesn’t exactly look like an ideal device for gaming. If we look at its puny 80MHz processor, which is paired up with a monochrome e-paper screen, the display does not only lack the ability to display colour but is furthermore not particularly well suited to frequently updating content. The Pebble also interacts with its user via a grand total of four buttons, one of which cannot be accessed easily by third-party applications.
-
Years ago, I worked for an automotive IT provider, and occasionally we went out to the plants to search for rogue Wireless Access Points (WAPs). A rogue WAP is one that the company hasn’t approved to be there. So if someone were to go and buy a wireless router, and plug it in to the network, that would be a rogue WAP. A rogue WAP also could be someone using a cell phone or MiFi as a Wi-Fi hotspot.
-
One of the most popular articles on this site shows how to install Ubuntu and Minecraft on the HP Chromebook.
Some people have found the guide difficult to follow and so I have decided to rework it and I also retested all the steps to make sure they work correctly.
This guide shows how to install Ubuntu with the Unity desktop on a HP Chromebook using Crouton.
-
Recently I have spent a lot of time with Linux iSCSI Target software solutions. After using iSCSI Enterprise Target (IET) (not active), the Linux SCSI Target framework (TGT), and the generic SCSI Target Subsystem (SCST), I have come to the realization that SCST definitely stood out as the most superior of the bunch and with good reason. It is also the most storage industry supported of iSCSI Target solutions.
-
Games
-
Within a short period, two people showed up with proposals for games for inclusion with GNOME 3.16. One is a 2048 clone, the other is a revival of Atomix (last maintenance was GNOME 2.14). Both proposals seem to be maintained by just one person.
-
As a story-based adventure it’s a decent attempt, even if it has some omissions or streamlining that work against its overall purpose. It’s not the finest thing ever to grace the screen of my lowly Pentium 4, but I wouldn’t mind trying it again, just for fun.
-
Dead Island has been patched to fix multiple issues in the Linux version, so it looks like it’s properly playable now months after release. It may have taken over 3 months for the game to get these fixed, but it’s good to see the port wasn’t forgotten about as we thought previously.
-
Desktop Environments/WMs
-
LXQt 0.9.0 has been released, dropping compatibility with Qt 4 and setting the minimum version required to be Qt 5.3. This release features lots of internal cleanups and refactorings which should make it faster. The release also utilise KDE Frameworks for the first time, KWindowSystem replaces the XFitMan library, KGuiAddons replaces a dependency on xlib in lxqt-panel.
-
Version 0.9 of the lightweight LXQt desktop environment was released this Sunday. LXQt is the next-generation, lightweight desktop derived in part from the LXDE and Razor-Qt desktops. LXQt 0.9 is the release that begins to enforce Qt5.
LXQt 0.9 abandons Qt4 compatibility and now requires Qt 5.3 or newer. LXQt 0.8 that was released last October had full Qt5 support while maintaining Qt4 compatibility, but this new version focuses exclusively on modern Qt5 library support.
-
Three days after the official announcement of Manjaro Linux 0.8.12, a point release that brings only a couple of changes, such as out-of-the-box support for Microsoft’s exFAT filesystem and Pacman 4.2 package manager, the Manjaro community released today the LXQt edition of the acclaimed Arch Linux-based computer operating system. At the moment of writing this article, only the 32-bit Live image was available for download, but that’s more than enough for us to take a quick screenshot tour of the release.
-
After three months of development work we are proud to announce the release of version 1.13 of EFL, Elementary, Evas Generic Loaders and Emotion Generic Players.
In this 12 weeks we got over 700 commits from 68 authors in EFL alone. Doing 111275 line insertions and 28292 line deletions. Elementary has another 370 commits by 48 authors.
-
-
K Desktop Environment/KDE SC/Qt
-
I started off my Project under Season of KDE 2014 with a motive to design and revamp KDE’s own blog aggregator, PlanetKDE. Initiated by my mentor Jonathan Riddell, back in 2008, this website did an amazing job of scraping off content from KDE’s bloggers.
-
Plasma 5 has the potential to revitalize the Linux world, it’s that important and meaningful. Of course, we must not forget that applications play their critical role, but if you need to sell your product, the first look, the very first impression is important. And in that regard, Plasma has everything to gain and lose. After what happened with Gnome, it’s the one remaining bastion of sanity in the Linux desktop world. And so we begin.
-
A 15 minute review of the forthcoming Plasma 5 distro
-
I’ve never really had the time to explore KDE Plasma 5 since it was released back in July 2014. I’ve played with it a bit, but not much.
Now that it’s at version 5.2 and at that stage when its deemed almost ready for primetime, that is, ready to replace all aspects of KDE Plasma 4, I decided to kick the tires a little bit harder.
To do that, I had to download and install an ISO image of a release candidate of KaOS – KaOS-kf5 ISO 2015.01.25.
KaOS is a KDE-centric Linux distribution that uses a rolling release development model. It was inspired by Arch Linux and uses that distribution’s package manager. Tt also makes use of the Calamares graphical installer, which I wrote about recently (see Calamares will be the graphical installer on the next OpenMandriva edition).
-
GNOME Desktop/GTK
-
Dear GNOME community, you all owe Krzesimir Nowak, Andrea Veri, and Olav Vitters some icecream and drinks: The Bugzilla software running on bugzilla.gnome.org has been upgraded to the latest stable version available.
-
-
We’ve had some fairly high profile Linux distros fold up their tents and move along. Whether due to a lack of financial support or the project growing larger than a one man dev team can manage, distros do go away. It’s never for a good reason but the fact remains: When a distro ceases to exist, a lot of people get left in the lurch.
-
Reviews
-
It has been a while since I reviewed Manjaro Linux. In fact, my last review of it was almost 2 years ago. Since then, I have seen a lot of news about how much it has grown and how good it has gotten. I figured I should give it another review.
For those who don’t remember, Manjaro is a distribution that based on Arch Linux. It maintains a rolling-release base, and it is compatible with most Arch repositories, though some of its repositories are its own. It officially supports KDE and Xfce, though community editions exist for other DEs as well.
-
From a practical point of view, I’m sure most people will stick with running either Arch Linux or vanilla FreeBSD. However, as an experiment into what is possible, ArchBSD does provide us with something interesting, something a little different. With some work to flesh out the documentation and more volunteers to keep the base operating system up to date, I think ArchBSD could be a viable server operating system.
-
New Releases
-
After two years of development, Offensive Security, the creator of the famous BackTrack Linux distribution, has announced today, February 9, that the first point release for its Kali Linux computer operating system designed for penetration testing and digital forensics operations is now available for download.
-
PCLinuxOS/Mageia/Mandriva Family
-
News from OpenMandriva has it that the next release of the distribution will feature the Calamares graphical installer.
Calamares is a “distribution independent installer framework” that features a modular design with 25 modules already implemented. It has plugin interfaces for C++, Python and a generic process, and an advanced partitioning tool with support for DOS and GPT partition tables.
-
Red Hat Family
-
-
-
Fedora
-
The short story is that I didn’t do many tweaks to my GNOME 3.14 desktop and it’s going well. Fedora 21 with GNOME 3.14 is running well for my X1 Carbon connected to this affordable 4K monitor. The only tweaks made were enabling icons on the GNOME Shell desktop (to get closer to my original workflow) and allowing thumbnails on images greater than 10MB (with the many original DSLR photos for Phoronix articles being 15MB+).
-
Derived from Fedora 21 and powered by the pursuit of perfection, dedication and freedom, the final version of Korora 21 computer operating system is here, available for download in four separate editions with the Cinnamon, KDE, GNOME, and Xfce graphical desktop environments, as announced by its developer Chris Smart on the project’s website.
-
It has taken a few weeks longer than we had hoped, but we’re finally happy to announce that the final release of version 21 (codename “Darla”) is now available for download (we strongly recommend using BitTorrent).
-
-
-
-
-
-
Debian Family
-
The issue is the same as I have with the boot-times for my desktop PC, systemd makes assumptions that break Debian systems. In my case, systemd insists on every other service starting and running before attempting to start X, the thing I want up ASAP. In the case of the bug reported above, how the system time was handled over a reboot is changed with systemd. The old behaviour was that the clock was stored and retrieved so things survived reboots nicely. No more. Poettering et al have decided that time should be set by NTP or other means and systemd should not have anything to do with that although systemd is replacing the old init that did… BREAKAGE!!! Now I know why Linus swears so much! If a change to systemd breaks user’s systems, it’s a bug in systemd, not that the world needs to change to be the way Poettering wants. Putting folks who break things in charge of millions of systems is a tragedy of huge proportions. People should not have to rewrite init scripts to switch to systemd. Otherwise, systemd should get the Hell out of our way… or go away…
-
For years, I used to run Debian sid (unstable) on all my personal machines. Laptops, workstations, sometimes even my personal servers years ago ran sid. Sid was, as its name implies, unstable. Sometimes things broke. But it wasn’t a big deal, because I could always get in there and fix it fairly quickly, whatever it was. It was the price I paid for the latest and greatest.
-
Derivatives
-
Philip Newborough, aka @corenominal, posted his decision to stop work on the distro last Friday.
“I’m leaving it behind because I honestly believe that it no longer holds any value, and whilst I could hold on to it for sentimental reasons, I don’t believe that would be in the best interest of its users, who would benefit from using vanilla Debian,” he wrote.
CrunchBang’s a Debian variant optimised for the desktop and back in 2009 we rated it a contender for use on Netbooks. Newborough wanted it that way: his aim was to create a lightweight distro at a time few existed.
-
-
Canonical/Ubuntu
-
After nearly two years of development, Canonical has confirmed that the first Ubuntu smartphone is scheduled to go on sale in Europe starting next week.
-
Two years after its initial announcement, Canonical will finally release its Ubuntu Phone in Europe during the coming week.
-
Remember the Indiegogo campaign that popped up back in 2013 for the Ubuntu Edge smartphone? If not, it’s okay; it’s just important to know that it happened. At the time, Ubuntu for phones and a Ubuntu smartphone was a pretty big deal. Ubuntu, an already popular open-sourced operating system for computers, had arguably the best potential to become the “fifth” major operating system in the smartphone industry. Unfortunately, the goal needed for the Ubuntu Edge crowdfunding campaign, which was $32 million, was never reached (although it did manage to earn a staggering $12.8 million).
-
-
Canonical is all set to release its first Ubuntu-based smartphone in partnership with Spain’s BQ, a company known for making ebook readers, smartphones and tablets in Europe. The smartphone, named Aquaris E4.5, has till date been available with Android 4.4 KitKat OS, and will now be released in a new version running Ubuntu OS for phones, which has previously also been called Ubuntu Touch OS. The smartphone is dubbed the BQ Aquaris E4.5 Ubuntu Edition.
-
As you may know, Folder Color is an open-source app that allows the users to easily color their folder icons, initially created for Nautilus.
-
The already crowded mobile operating system market has a new entrant—Ubuntu. The open-source Linux operating system, which has been running on PCs and servers for years, is now available in a smartphone known as the BQ Aquaris E4.5 Ubuntu Edition. The Aquaris E4.5 is not necessarily an impressive device. The smartphone looks like most other devices on the mobile market shelves and comes with standard components one would expect from midrange handsets. But that might not matter. It’s the operating system that makes the smartphone unique in the marketplace. The Aquaris will only be available in Europe, and it’s not expected to be a huge seller even on that continent, but it will be viewed as a test that prompts other smartphone makers to think about using Ubuntu Linux as their mobile operating system. They will want to see how customers respond to the first model to see if there is a future for Canonical’s operating system on mobile devices. This slide show takes a look at the Aquaris E4.5 to see how it might fare in the market and to see what is in the device that could potentially attract buyers in an increasingly crowded mobile space.
-
The “age of Aquaris” is now here as a long-awaited Linux mobile device becomes reality with the BQ Aquaris E4.5 Ubuntu Edition smartphone.
-
-
-
-
-
-
-
-
-
THE first Ubuntu smart phone goes on sale in Europe in the next few days, but early reports suggest that very few people outside the continent will get to see or buy one any time soon. This is a bit of a disappointment for dyed-in-the-wool Ubuntu users who have waited eagerly to see how well their operating system of choice runs on a mobile device.
-
Flavours and Variants
-
Six months after the first beta, elementary OS Freya beta 2 was released yesterday. Based on Ubuntu 14.04 LTS (which is supported until April 2019), Freya beta 2 comes with various UI improvements, UEFI/SecureBoot support along with other interesting changes as well as almost 600 bug fixes.
-
-
After six months of hard work, the development team behind one of the most beautifully designed GNU/Linux operating system in the world, elementary OS, happily announced on February 8 the immediate availability for download of the second Beta for the forthcoming Freya (version 0.3) release with over 600 fixes, but still based on Ubuntu 14.04 LTS (Trusty Tahr).
-
The Elementary OS team has announced the release of second beta of their upcoming Feya. The release comes six months after the first beta and packs a lot of features such as UI improvements, new apps and 600 bug fixes.
This is the last beta. Elementary OS team says that the next release will be a release candidate, which will be a ‘cleanup and details release’ where amongst other things, translators will help ready the release for worldwide consumption.
-
-
-
-
Merrii announced a high end, Android- and Linux-ready “H88 Hummingbird” SBC based on the octa-core Cortex-A15/-A7 Allwinner A80 SoC.
The second-generation Raspberry Pi 2 managed to maintain its $35 price despite moving to a quad-core Cortex-A7 system-on-chip, but faster, pricier quad- and octa-core ARM SoCs haven’t seen as much traction in the single board computer scene. Yet, just as we’ve seen a lot of SBCs based on the Cortex-A7 based Allwinner A20 or Cortex–A9 based Allwinner A31, several companies and community projects are now trying out the octa-core Allwinner A80. The A80 combines four Cortex-A15 and four Cortex-A7 cores in a Big.Little configuration.
-
-
Linaro has launched an open-source spec for ARM SBCs called “96Boards,” first available in a $129 “Hikey” SBC, featuring a Huawei octa-core Cortex-A53 SoC.
Linaro, the ARM-backed not-for-profit engineering organization that has aimed to standardize open source Linux and Android software for Cortex-A processors, is now trying to do the same thing for hardware.f Linaro, which is owned by ARM and many of its top system-on-chip licensees, has launched 96Boards.org, a cross between a single board computer hacker community and an x86-style hardware standards organization.
-
Phones
-
Tizen
-
-
Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has announced that his administration is to support the development of open-source IT software by awarding grants to developers who produce applications which run on platforms other than Google’s Android and Apple’s iOS.
-
-
-
-
-
-
-
-
-
Samsung has been arguably the most popular Android manufacturer over the past few years, which would make sense given that the South Korean company has several different lines of Android devices. You have the Samsung Galaxy S, Samsung Galaxy Note, Samsung Galaxy Alpha, Samsung Galaxy Zoom, Samsung Galaxy Mega… the list goes on (and on, and on…) The bottom line here is that Samsung and Google make a pretty good team when you look at the numbers.
-
South Korea-based Samsung has just begun domestic sales of high-end televisions with a smart interface powered by its own Tizen operating system.
It is part of a wider push by the consumer electronics firm to incorporate the software in a wide range of its home products – everything from fridges and washing machines to robotic vacuum cleaners.
-
Android
-
It would be something of an understatement to say that the smartphone market is hot: it has clearly taken over from the desktop sector as the mainstream that defines the direction of computing. That’s good news for open source, since it means Windows is increasingly irrelevant as far as the future is concerned. Android, of course, is dominating this sector, but nothing stays still: there will, one day, be an “after Android” – so who will be the key player(s) there?
Not, I fear, Tizen. Although to begin with I hoped this might develop into a strong alternative to Android, that is clearly not to be. I’ve not written much about it here, since it seems to spend most of its time merging with other projects and re-branding itself. This article has an excellent representation of how Tizen has evolved over the years; it also reviews the first Tizen phone, from Samsung, concluding.
-
But companies are indeed bothering to make new designs and try different approaches to the tried and true tablet formula. The latest of which is Dell, which recently launched the clumsily named Venue 8 7000 Series (I’m just going to call it the Venue 8). The $399 Venue 8 is part of a design renaissance at Dell (along with the new XPS 13 laptop), showcasing premium materials and killer displays. It also acts as a vehicle for some never-before-seen mobile technologies from Intel. There are really two things that matter with the Venue 8, and they’re why anyone is spending time talking about it: its design and its camera array.
-
Dave Hakkens is the founder of Phoneblocks, an initiative that supports and pursues the creation of modular hardware for cellular phones to reduce electronic waste (e-waste) and increase efficiency. In this interview, Dave shares the story of what brought him to this mission and what he believes the future holds for one of our most treasured devices, the phone.
-
Netflix has developed a platform, using soon-to-be open source tools, that probes for vulnerabilities and monitor data leakage.
One initiative dubbed the “Dirty Laundry Project” monitors for Netflix assets unintentionally exposed by its staff.
-
Network monitoring is a key component in making sure your network is running smoothly. However, it is important to distinguish between network monitoring and network management. For the most part, network monitoring tools report issues and findings, but as a rule provide no way to take action to solve reported issues.
-
We found all four products to be capable network monitoring tools that performed well in our basic tasks such as checking for host availability and measuring bandwidth usage. Beyond the basics, there were quite a few differences in terms of features, granularity and configuration options.
-
I’ve been designing and developing commercial software for more than 30 years, and I’m pleased to announce that for the first time, some of my software has been released as a new open source project. For open source at Dell, it’s a Java project called Mensa.
-
Events
-
SaaS/Big Data
-
-
ownCloud reached version 8 today, February 9, 2015. We’re talking about the ownCloud Server, a powerful, open-source, free, and self-hosted file sharing solution that offers easier and faster file syncing and sharing functionality, along with numerous other attractive features. ownCloud Server is considered by many a Dropbox replacement and it is distributed in two editions, ownCloud Community Edition and ownCloud Enterprise Edition.
-
When you put your data in the public cloud — whether it be Dropbox, Google Drive, OneDrive, iCloud, or other services. It’s dictated by the terms and services of the service provider and is subject to laws that may give the government full access to your data without giving you the slightest hint of any compromise.
-
VMware has remained in the news cycle since its announcements on the cloud computing front last week. In a blog post, the company announced the launch of VMware Integrated OpenStack, which, notably, is available for use, free of charge, with VMware vSphere Enterprise Plus, vSphere with Operations Management Enterprise Plus and all editions of vCloud Suite. The company is also pushing its vision of “one cloud, any app, any device.”
-
Oracle/Java/LibreOffice
-
With the recent release of LibreOffice 4.4 there was a significant bump in compiler requirements in order to begin allowing LibreOffice developers to use basic C++11 functionality. Going forward, the compiler requirements will continue to rise as the developers of this open-source office suite seek to utilize more modern C++ features.
-
Let’s have a look at some of the areas where LibreOffice is actually BETTER than the competitor Microsoft Office.
-
CMS
-
It goes without saying that WordPress is big — the Goliath of free and open source content management systems (CMS). WordPress is the number 1 CMS system currently in use, and increased its usage on more than 2 million domains since June 2014.
-
Funding
-
This past week the person who manages one of the world’s most important cryptography projects, Werner Koch, went from going broke to raising more than $100,000 for his project, GNU Privacy Guard. This is in addition to the $60,000 The Linux Foundation’s Core Infrastructure Initiative (CII) dedicated to Werner last month. GnuPG is used not just to encrypt and authenticate email but provides the confirmation that software packages and releases are what they claim to be. Facebook, Stripe and others are answering the calls to support the individuals who are developing the world’s most critical digital infrastructure.
-
In 2014, OpenSSL had a gigantic security problem: Heartbleed. Its root cause? A combination of blind trust in the open-source programming method and a shoe-string budget. Less than a year later Werner Koch, author and sole maintainer of the popular Gnu Privacy Guard (GnuPG) email encryption program, revealed he was going broke supporting GnuPG.
Koch’s story had a happy ending. First, The Linux Foundation, via its Core Infrastructure Initiative (CII), donated $60,000 to GnuPG. Then, e-payments vendor Stripe and Facebook agreed to sponsor the program’s development to the tune of $50,000 a year.
-
-
-
BSD
-
With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.
-
FSF/FSFE/GNU/SFLC
-
We provide “patchsets” to stable releases. Patchsets allow quick bug fixes and updates for production systems.
-
Project Releases
-
-
The Postfix open-source mail server software reached the big 3.0 milestone on Sunday with various improvements to this Sendmail alternative.
The release of Postfix 3.0.0 stable brings SMTP UTF8 support for internationalized domain names and address local parts, support for Postfix dynamically-linked libraries and database plug-ins, support for operations on multiple look-up tables, support for pseudo-tables, table-driven transformations of DNS lookup results, an improved configuration file syntax, and per-session command profiles.
More details on Postfix 3.0 can be discovered from Postfix.org.
-
A new releases of the RPushbullet package (interfacing the neat Pushbullet service) arrived on CRAN today.
It brings several weeks of extensions, corrections and cleanups—with key contributions by Mike Birdgeneau and Henrik Bengtsson.
-
Public Services/Government
-
The Greek region of Attica, encompassing Athens, is considering a switch to free and open source solutions. Representatives of the regional authority discussed the move with the Greek Free/Open Source Software society. GFOSS has offered to help modernise Attica’s ICT policies.
-
A new open source, online collaboration tool will allow Defense Department employees to easily and securely web conference and instantly chat from anywhere around the world.
The Defense Information Systems Agency is expanding the capability called Defense Collaboration Services, or DCS, across the department, according to a Feb. 6 press release from the Air Force.
-
Openness/Sharing
-
Open Hardware
-
With the rise of distributed manufacturing of 3D printing, hardware designs released under open source licenses are increasing exponentially. These designs—for everything from phone cases to prosthetic hands for children—can have an enormous value for those who need and want them.
[...]
The results of Pearce’s case study analysis were shocking. “Millions of dollars of value can be created by designers if they share their work under open licenses, says Pearce. “For individuals or funding organizations interested in doing the most good and maximizing value for the public it is clear that supporting open designs should be a top priority.”
-
Makers, developers and hobbyists looking to add networking functionality to their projects in the form of NAS, VPN and Firewall features may be interested in a new piece of open source hardware called the ONetSwitch developed by MeshSr.
-
One day the robots may rebel against humans, taking control of the world and turning us into a relatively green source of energy. But today is not that day, even if one such robot did “attack” its owner in South Korea.
-
To most outside observers, the collapse of RadioShack Corp. was set in motion years, if not decades, ago.
-
Security
-
Seen on an ATM in Hong Kong airport.
-
If you’re one of the unlucky 80 million Anthem customers whose Social Security number, salary, and other sensitive data were stolen by hackers, the most basic step to protect yourself is to set up a fraud alert with the three major credit agencies: Experian, Equifax, or TransUnion.
-
Xnote a new multi-purpose backdoor Linux trojan authored by ChinaZ, converts Linux systems into botnets
[...]
The malware will only be installed in a system if it has been launched with superuser (root) privileges. During installation, the malware creates a copy of itself in the /bin/ directory in the form of a file called iptable6. The malware then tries to hide itself by deleting the original launch file.
-
The backdoor contains a list of control servers within its body, and tries to contact them one by one. Once a connection to one of the servers is established, information is exchanged between them in compressed packets.
-
-
Defence/Police/Secrecy/Aggression
-
• If the video of a prisoner being burned to death displays “a level of brutality shocking even by the standards” of Islamic State, how should we describe the actions of the US and UK around the world? According to a 2012 joint report from the NYU and Stanford University law schools on US drone strikes in Pakistan, “the missiles fired from drones kill or injure in several ways, including through incineration”. Similarly barbaric, in 2008 the Sunday Times reported British forces were using Hellfire missiles in Afghanistan, creating “a pressure wave which sucks the air out of victims, shreds their internal organs and crushes their bodies”.
-
‘I am convinced that there was a direct line between at least some of the terrorists who carried out the Sept. 11 attacks and the government of Saudi Arabia,’ says former senator and commission member
-
Transparency Reporting
-
Michael Ratner says that US government is still pursuing criminal investigations against Wikileaks Editor and staffers, not just because of what they have already released to the public but because of what they still continue to release
-
The man who stole the trove of secret files that sparked a global scandal over banking giant HSBC’s alleged assistance to wealthy tax dodgers called Monday for more protections for whistleblowers.
Herve Falciani, the former HSBC employee behind the so-called SwissLeaks revelations, said far more needed to be done to protect whistleblowers like himself, including financial support.
-
Ecuador prepares a side event for March 19 or 20 in the framework of the 28th Session of the Human Rights Council to deal with the case of WikiLeaks founder Julian Assange who is wanted in Sweden and the US.
-
Environment/Energy/Wildlife
-
Australia’s hottest year on record would not have happened without climate change, according to a new report.
The country experienced its hottest day, month, season and calendar year in 2013, registering a mean temperature 1.2C above the 1961-90 average.
The Climate Council says recent studies show those heat events would have occurred only once every 12,300 years without greenhouse gas emissions from human activities.
-
The UK government has broken a key pledge to support green energy abroad over “dirty” energy projects by spending more than three hundred times as much backing fossil fuel energy compared with clean energy projects via the government’s export credit agency.
-
The sharp decline in honeybees has been linked with a change in the foraging behaviour of young bees brought on by some kind of environmental stress such as parasitic attacks or pesticides, a study has found.
-
One of the biggest jokes in conservation is the Japanese government’s claim to be engaged in “scientific whaling”. All the killing by its harpoon fleet takes place under the guise of “research”, as this is the only justification available, under international rules.
-
Finance
-
Hervé Falciani’s long, strange journey from bank computer expert to jailed fugitive to candidate for office to spokesman for whistleblowers
They almost had him.
On December 22, 2008, Swiss federal police handcuffed 36-year-old Hervé Falciani, a systems specialist they suspected of stealing data from HSBC Private Bank (Suisse), his employer, and trying to sell it to banks in Lebanon. They seized his computer, searched his Geneva home and interrogated him for hours.
Then – on the condition that he return the next day for more questioning – they let him go.
-
According to a report released on Sunday, files analyzed by 140 reporters in the International Consortium of Investigative Journalists (ICIJ) have revealed that British banking giant HSBC provided accounts to international criminals, corrupt businessmen, politicians and celebrities.
“HSBC profited from doing business with arms dealers who channeled mortar bombs to child soldiers in Africa, bag men for Third World dictators, traffickers in blood diamonds and other international outlaws,” ICIJ reported.
-
Britain’s biggest bank helped wealthy clients cheat the UK out of millions of pounds in tax, the BBC has learned.
Panorama has seen thousands of accounts from HSBC’s private bank in Switzerland leaked by a whistleblower in 2007.
They show bankers helped clients evade tax and offered deals to help tax dodgers stay ahead of the law.
HSBC admitted that some individuals took advantage of bank secrecy to hold undeclared accounts. But it said it has now “fundamentally changed”.
-
Secret documents reveal that global banking giant HSBC profited from doing business with arms dealers who channelled mortar bombs to child soldiers in Africa, bag-men for Third World dictators, traffickers in blood diamonds and other international outlaws.
-
HSBC found itself under fire again on Monday after news reports over the weekend provided more details about long-running accusations that its Swiss private banking arm helped clients hide billions of dollars in assets from international tax authorities before 2007.
In a report released on Sunday, the International Consortium of Investigative Journalists, an organization based in Washington, said that secret documents revealed that bank employees had reassured clients that HSBC would not disclose details of their accounts to tax authorities in their home countries and discussed options to avoid paying taxes on those assets. Also contributing to the report were the newspaper Le Monde in France, The Guardian in Britain, the BBC program “Panorama” and CBS News’s “60 Minutes.”
-
The US government will come under intense pressure this week to explain what action it took after receiving a massive cache of leaked data that revealed how the Swiss banking arm of HSBC, the world’s second-largest bank, helped wealthy customers conceal billions of dollars of assets.
The leaked files, which reveal how HSBC advised some clients on how to circumvent domestic tax authorities, were obtained through an international collaboration of news outlets, including the Guardian, the French daily Le Monde, CBS 60 Minutes and the Washington-based International Consortium of Investigative Journalists.
The files reveal how HSBC’s Swiss private bank colluded with some clients to conceal undeclared “black” accounts from domestic tax authorities across the world and provided services to international criminals and other high-risk individuals.
-
Prominent Australian political and business figures are among thousands of people identified as Swiss bank account holders, a cache of leaked documents from the Swiss arm of the HSBC bank shows.
They include the late media mogul Kerry Packer and the former ANZ Bank chairman Charles Goode.
The International Consortium of Investigative Journalists (ICIJ) and the Guardian has accessed data on the accounts, which reveal unprecedented insights into offshore banking with the Swiss arm of the bank.
-
Secret documents reveal that global banking giant HSBC profited from doing business with arms dealers who channelled mortar bombs to child soldiers in Africa, bag-men for Third World dictators, traffickers in blood diamonds and other international outlaws.
-
Team of journalists from 45 countries unearths secret bank accounts maintained for criminals, traffickers, tax dodgers, politicians and celebrities
Secret documents reveal that global banking giant HSBC profited from doing business with arms dealers who channeled mortar bombs to child soldiers in Africa, bag men for Third World dictators, traffickers in blood diamonds and other international outlaws.
The leaked files, based on the inner workings of HSBC’s Swiss private banking arm, relate to accounts holding more than $100 billion. They provide a rare glimpse inside the super-secret Swiss banking system — one the public has never seen before.
-
HSBC’s Swiss banking arm helped wealthy customers dodge taxes and conceal millions of dollars of assets, doling out bundles of untraceable cash and advising clients on how to circumvent domestic tax authorities, according to a huge cache of leaked secret bank account files.
-
Some projections endorsed by the European Commission point to positive, though negligible, gains in terms of GDP and personal incomes. Others make greater claims, asserting that the deal will add over £100 billion to the UK and European economies every year.
-
The EU and the US are negotiating their proposed free trade agreement behind closed doors. Third countries, for instance in Africa, have no say in these talks, although the deal could have a far-reaching impact on them.
-
With a new ‘HSBC list’ of Swiss bank accounts revealing over 1,000 Indian names, Switzerland today said these are from “stolen data” — an assertion that might make it difficult for India to get details on these accounts without any additional evidence.
-
An international collaboration of media outlets have leaked HSBC files which prove the Bank has actively sought to undermine domestic tax laws and keep millions of pounds from reaching the UK Treasury – but what is truly remarkable, it the complicity of the UK government in helping the 1% avoid paying their dues.
-
The only countries that held more money in the HSBC branch were 11,235 Swiss with $31 billion, 8,844 Britons with $21.7 billion, 1,138 Venezuelans with $14.7 billion, 4,193 Americans with $13.4 billion and 9,187 French with $12.5 billion.
-
Hundreds of South Africans have stashed more than $2-billion (about R23-billion) in accounts at Swiss banking group HSBC, details of which have now emerged in a leak that shines a new spotlight on the secretive world of Swiss banking.
-
Last year more than 200,000 people were prosecuted for not having a TV licence.
More than fifty – many of them women – went to prison for it.
But HMRC say it is not in the public interest to prosecute tax criminals and the bankers and accountants who set arrangements for them.
-
Censorship
-
KickassTorrents has lost access to its Kickass.so domain name and is currently offline. The Somalian domain of the most-visited torrent site on the Internet is now listed as “banned” by the .SO registry, forcing the site’s operators to find a new home.
-
Privacy
-
Part of the Samsung Smarttv EULA: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.”
-
My name is Alison, and I’m the founder of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. It’s a partnership among librarians, technologists, attorneys, and privacy advocates to teach librarians about surveillance threats, privacy rights, and privacy-protecting technology tools. So far, we’ve been all over Massachusetts and parts of New England, and we have been awarded a generous grant from the Knight Foundation to bring privacy training to libraries across the United States.
We teach librarians three things. Kade Crockford of the ACLU of Massachusetts teaches the current state of digital surveillance. Jessie Rossman, an attorney and surveillance law expert also from the ACLU of Massachusetts, offers a privacy-focused “know your rights” training. I teach technology tools – like Tor and Tails .
-
Campaigning group Privacy International is preparing to help “potentially millions” of people request that their GCHQ records be deleted, following a landmark ruling by the Investigatory Powers Tribunal on Friday.
The IPT ruled that the intelligence-sharing relationship between the US and UK had been unlawful prior to December 2014, because the rules governing the UK’s access to the National Security Agency’s PRISM and UPSTREAM programmes had been kept secret.
-
The recent ruling that mass surveillance of UK citizens’ internet communications by the UK intelligence services was unlawful until the end of 2014 does not go far enough, according to Open Rights Group.
The Investigatory Powers Tribunal (IPT) ruled that UK intelligence agency GCHQ had breached the Human Rights Act by using intelligence on UK residents from the US National Security Agency (NSA).
-
For the state of Iowa to step forward, alongside others, in mitigating the powers of the NSA comes as a pleasant surprise. The federal agency has shown that it has no intention of reining in their surveillance.
-
The UK government slipped out consultation documents on “equipment interference” and “interception of communications” (read: computer hacking by police and g-men) on Friday.
They were made public on the same day that the Investigatory Powers Tribunal ruled that the spying revelations exposed by master blabbermouth Edward Snowden had accidentally made British spooks’ data-sharing love-in with the NSA legal.
-
A documentary about NSA whistleblower Edward Snowden has won the prestigious Directors Guild Award as best movie in the category. Laura Poitras, the director of Citizenfour, received her award at a ceremony in Los Angeles on Saturday.
-
The Counter-Terrorism and Security Bill 2014-15, having been rushed through the House of Commons with alarming speed and ease, has passed its second reading in the House of Lords. It is now in the final committee stages and on course to become law within a matter of weeks.
-
The unresolved fallout between the U.S. and Germany over espionage and mass surveillance has slid to the background ahead of a visit today by Chancellor Angela Merkel to Washington, according to her top aide.
-
As Chancellor Merkel visits President Obama on Monday, the US sees Europe as a continent in crisis. Two experts take on the roles of Germany and the US to tease out the countries’ views on key international issues.
-
Polarizing divisions will color President Barack Obama’s discussions with German Chancellor Angela Merkel when the supposedly staunch allies meet at the White House on Monday for talks expected to primarily address the ongoing crisis in Ukraine.
The meeting comes after a year of lingering tensions in a relationship that, at least publicly, was tested by reports of CIA spying and National Security Agency surveillance of the phone calls of Merkel and other European leaders.
-
Altegrity Inc, owner of the company that carried out background checks on former NSA contractor Edward Snowden and Navy Yard shooter Aaron Alexis, filed for Chapter 11 bankruptcy protection on Sunday as it implements a restructuring deal with its lenders.
Altegrity, which owns USIS Investigations Services, listed assets and liabilities of more than $1 billion, according to court documents.
The company said some of its lenders, including funds managed by Third Avenue Management, Litespeed Management LLC and Mudrick Capital Management LP, have committed to provide $90 million in debtor-in-possession financing.
-
These enhanced minimization procedures collectively represent a response to heavy criticism that Section 702 constitutes a “backdoor” that would allow the intelligence community to monitor the communications of American citizens, without a warrant, if these communications were incidentally collected as a result of surveillance on foreign persons.
-
Let’s go to another room so that the telly can’t hear us! Samsung’s smart TVs don’t just respond to your spoken commands any more – they also tell unspecified third parties what you’re saying while you sit in from of them.
-
Indonesians surveyed by Galpaya told her that they didn’t use the internet. But in focus groups, they would talk enthusiastically about how much time they spent on Facebook. Galpaya, a researcher (and now CEO) with LIRNEasia, a think tank, called Rohan Samarajiva, her boss at the time, to tell him what she had discovered. “It seemed that in their minds, the Internet did not exist; only Facebook,” he concluded.
-
Not long ago, the sharing economy seemed to have taken over. Privacy was dead, and no one cared. But that was until revelations about government spying and worse came to light. Today, it seems just as many people are sharing…but many do so with more caution.
For some of us, the need to go truly anonymous is more important than ever. But when you go to a service online and its first three choices for signup are to use your existing Google, Facebook, or Twitter account credentials, it’s almost like a subtle background check. Other services—like Google—expect you to share a phone number and older email address—to sign up (and if not at initial signup, you’ll need them for activations later). So you’re not exactly hiding your tracks.
-
The e-mail was blunt: Mark Zuckerberg had no interest in playing nice with the guy from next door.
“How do we make this go away?” a Zuckerberg adviser wrote to his real estate agent. “MZ is not going to take a meeting with him … ever.”
Now that 2013 e-mail, and others like it, are at the center of property war gone rogue. On one side is Zuckerberg, the billionaire founder of Facebook Inc. On the other is the businessman from next door, a real estate developer who hoped to profit from Zuckerberg’s desire for privacy.
-
Guess who’s eavesdropping on you now? It’s not some nefarious government agency (although, rest assured, there has been no downturn in surveillance). Nope, it’s that smart TV you paid good money for and invited into your home.
-
The new privacy policy for Samsung’s smart TVs allows the company and its partners to listen in on everything their users say.
The policy has drawn the ire of internet users, who compared it with George Orwell’s dystopian fiction 1984.
-
A Texas teenager has been fired from her job at a pizza parlor before she even started after she sent out a tweet complaining about the gig and her new boss saw it.
-
Some folks have taken issue with this, going so far as to call Tor employees “government contractors.” On the one hand, this is pretty sensational talk: In much of Europe, for example, public funding of advocacy isn’t uncommon. On the other hand, there are real issues with implicitly supporting what is ultimately an imperialist agenda by taking US government funds.
-
Backed by a number of tech companies, California is eyeing state legislation to protect its citizens from warrantless government surveillance of e-mails, text messages and cellphone communications. The proposed legislation is being backed by state senators Mark Leno, a Democrat, and Joel Anderson, a Republican.
-
The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software that allows anonymous, untraceable use of the web, to gather the evidence against him.
The development of anonymising software such as Tor and Bitcoin has forced law enforcement to develop the expertise needed to identify those using them. But if anything, what we know about the FBI’s case suggests it was tip-offs, inside men, confessions, and Ulbricht’s own errors that were responsible for his conviction.
This is the main problem with these systems: breaking or circumventing anonymity software is hard, but it’s easy to build up evidence against an individual once you can target surveillance, and wait for them to slip up.
-
A German-Arab web of companies advertises a new government spyware “made in Germany” at international surveillance industry trade shows. In a lengthy investigation, we gathered background information on companies and actors involved. It remains unclear, whether the company even has a finished product for sale, nevertheless they continue to promote the product – directly to law enforcement and intelligence agencies.
-
Civil Rights
-
During widespread protests in New York last summer after the killing of Eric Garner by police officer Daniel Pantaleo (who was not charged in Garner’s killing), New York City Police Commissioner Bill Bratton had this message for protesters: “You must submit to arrest, you cannot resist …The place to argue your case is in the courts, not in the streets.”
-
-
A 74-year-old man is dead and an officer is on administrative leave pending an investigation into the fatal shooting. Police say Officer Josh Lefevers shot and killed James Howard Allen after Allen pointed a gun at the officer in his home and refused to drop the weapon.
-
It took nearly two years, but a North Carolina judge dismissed a case against a man who was arrested for drinking a can of Arizona Iced Tea in a parking lot of a liquor store.
And only because it was captured on video.
Otherwise, the cop’s word would have been treated as gospel, resulting in a conviction of trespassing and resisting arrest against Christopher Lamont Beatty, a former soldier who is also a hip hop musician known as Xstravagant.
But even despite the video evidence, prosecutors along with his own lawyer, tried to get him to agree to a plea deal where he would accept probation and community service.
In other words, they wanted him to admit to a crime he did not commit without even having the chance to be tried for that crime.
-
CIA whistleblower John Kiriakou, who was released from a federal prison in Loretto, Pennsylvania, last week, after serving about 23 months in jail, called for CIA case officers to be prosecuted for “flouting” the law when they tortured detainees.
In an interview for “Democracy Now!”, Kiriakou addressed the shocking details in the executive summary of the Senate intelligence committee report on the CIA’s torture program. He said he understood that President Barack Obama was not going to pursue the prosecution of CIA officials who carried out torture. Obama was not going to prosecute officers who carried out the “day-to-day torture program.” Lawyers at the Office of Legal Counsel in the Justice Department were going to get a pass too. However, there are officers, who clearly violated the law, when they carried out interrogations.
-
In a broadcast exclusive interview, we spend the hour with John Kiriakou, a retired CIA agent who has just been released from prison after blowing the whistle on the George W. Bush administration’s torture program. In 2007, Kiriakou became the first CIA official to publicly confirm and detail the agency’s use of waterboarding. In January 2013, he was sentenced to two-and-a-half years in prison. Under a plea deal, Kiriakou admitted to a single count of violating the Intelligence Identities Protection Act by revealing the identity of a covert officer involved in the torture program to a freelance reporter, who did not publish it. In return, prosecutors dropped charges brought under the Espionage Act. Kiriakou is the only official to be jailed for any reason relating to CIA torture. Supporters say he was unfairly targeted in the Obama administration’s crackdown on government whistleblowers. A father of five, Kiriakou spent 14 years at the CIA as an analyst and case officer, leading the team that found high-ranking al-Qaeda member Abu Zubaydah in 2002. He joins us from his home in Virginia, where he remains under house arrest for three months while completing his sentence. In a wide-ranging interview, Kiriakou says, “I would do it all over again,” after seeing the outlawing of torture after he came forward. Kiriakou also responds to the details of the partially released Senate Committee Report on the CIA’s use of torture; argues NSA whistleblower Edward Snowden did a “great national service,” but will not get a fair trial if he returns to the United States; and describes the conditions inside FCI Loretto, the federal prison where he served his sentence and saw prisoners die with “terrifying frequency” from lack of proper medical care.
-
-
A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan.
In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos.
-
Are you, your family or your community at risk of turning to violent extremism? That’s the premise behind a rating system devised by the National Counterterrorism Center, according to a document marked For Official Use Only and obtained by The Intercept.
The document–and the rating system–is part of a wider strategy for Countering Violent Extremism, which calls for local community and religious leaders to work together with law enforcement and other government agencies. The White House has made this approach a centerpiece of its response to terrorist attacks around the world and in the wake of the Paris attacks, announced plans to host an international summit on Countering Violent Extremism on February 18th.
-
Ethan Czahor’s tweets began disappearing today after news broke that he had been hired by Jeb Bush. A spokesperson for Bush told BuzzFeed News: “Governor Bush believes the comments were inappropriate. They have been deleted at our request. Ethan is a great talent in the tech world and we are very excited to have him on board the Right to Rise PAC.” Czahor also apologized in a tweet on Monday.
-
The 9/11 trial judge abruptly recessed the first hearing in the case since August on Monday after some of the alleged Sept. 11 plotters said they recognized a war court linguist as a former secret CIA prison worker.
Alleged plot deputy Ramzi bin al Shibh, 42, made the revelation just moments into the hearing by informing the judge he had a problem with his courtroom translator. The interpreter, Bin al Shibh claimed, worked for the CIA during his 2002 through 2006 detention at a so-called “Black Site.”
-
In early 2003, James Risen, an investigative reporter in the Washington bureau of The New York Times, prepared a story about a covert CIA effort to undermine Iran’s nuclear program. Before publishing it, he informed the CIA of his findings and asked for comment. On April 30, 2003, according to a subsequent Justice Department court filing, CIA Director George Tenet and National Security Adviser Condoleezza Rice met with Risen and Jill Abramson, then the Times’s Washington bureau chief. Tenet and Rice urged the Times to hold Risen’s story because, they said, it would “compromise national security” and endanger the life of a particular CIA recruit. (The agent is referred to in the Justice filing as “Human Asset No. 1.”) Eventually, the Times informed the CIA that it would not publish Risen’s story. Abramson said recently that she regrets the decision.
-
A US defense contractor that provided interrogators to Abu Ghraib prison in Iraq sought to have a federal judge dismiss a lawsuit because its employees were working under military control in wartime.
Four former inmates of the notorious prison, where horrific abuses took place during the Iraq war that damaged US credibility, have sued CACI International Inc. for torturing them ahead of interrogations.
-
I do think there have been some very significant changes as a result of [our] reporting. There hasn’t been a lot of legislation passed. But I never thought that the place to look for restrictions on the power of the U.S. government would be the U.S. government itself, because human beings generally don’t walk around thinking about ways to restrict their own power.
I think the much more significant changes are the changes in consciousness that people have, not just about surveillance but about privacy, the role of government, their relationship to it, the dangers of exercising power in the dark and the role of journalism as well.
There are all kinds of ways that surveillance is now being curbed, from other governments acting in coalition to impede U.S. hegemony over the Internet to technology companies like Facebook, Yahoo and Google knowing that, unless they make a real commitment to protecting their users’ privacy, they’re going to lose a generation of users to other countries’ companies.
-
It wasn’t former director Leon Panetta, who was ultimately responsible for the actions of his agency. It wasn’t any number of agents, officials or supervisors who directly or indirectly participated in the ultimately useless torture of detainees. It wasn’t the private contractors who profited from these horrendous acts committed in the name of “national security.”
-
Internet/Net Neutrality
-
In the excitement following FCC chairman Tom Wheeler’s announcement that he would propose Title II classification for Internet service providers, it’s important that we understand a few things. First, this is not a done deal yet, though it looks likely to pass. Second, this is only the first step in a long and arduous journey.
-
Intellectual Monopolies
-
Since the gains for this industry are expected to be so large, and those for other industries so small, why not drop all the contentious stuff that threatens to derail the whole deal, and concentrate on cars? In any case, it would be more honest to rename the TTIP proposal as the “Atlantic Car Trade Agreement,” since that’s what it is really about. We could even call it “ACTA” for short.
Permalink
Send this to a friend
02.08.15
Posted in News Roundup at 12:55 pm by Dr. Roy Schestowitz
Contents
-
Applications
-
In our connected world, the traditional UNIX privilege separation is not enough anymore. Security models are changing in order to provide a higher level of protection expected by users. We start with seccomp-bpf, a software techniques introduced in 2010 that seems to gain more and more popularity as networked application grow and expand. After a short introduction and a look at some of the software packages using seccomp-bpf, we continue with the list of the projects released during January.
-
If you’re new to FreeBSD and PC-BSD, you might not yet be aware of all their package manager’s many commands. Nobody expects you to, at least not initially.
Pkg is that package manager and one of the its many commands I think you should get to know asap is the audit command. It’s used to audit installed packages against known vulnerabilities. I could be wrong, but I don’t think your favorite Linux distribution’s package manager has an equivalent command.
-
Instructionals/Technical
-
-
-
-
-
On a secret cloud server, with ssh key access only, I like to keep a encrypted text file with passwords that I can never remember e.g. because I seldom use some of them, and/or have too many of them.
-
Games
-
I’ve had a rotten time trying to update this site over the past couple days. My home network has been exceptionally flaky since Friday afternoon, and on top of that, I spent the precious little time I had yesterday testing and prodding a program, only to find when I was done writing, that I had already seen it a year ago.
[...]
That’s tornado. As I understand it, tornado is a remake of a classic C64 game called Weatherwar, with the object being to destroy your opponents house by controlling the elements. It’s a variation on the catapult game theme, since your success at tornado will depend a little on your ability to calculate the target given information on wind speeds.
-
duelcommander got lumped into my “game” category but I almost hesitate to call it that. It appears to me to be more a framework for a combat system, much like you might expect in larger, more complex games.
-
Desktop Environments/WMs
-
Xfce 4.12 is running about two years behind its original schedule but there’s now a concerted effort underway to get out this lightweight GTK+ desktop environment out around the end of February or early March.
-
Fluxbox 1.3.6 was released last month after this lightweight window manager went two years without a new release. It looks like the rate of development of Fluxbox is ticking back up as Fluxbox 1.3.7 was just tagged this morning.
-
K Desktop Environment/KDE SC/Qt
-
Ever since we introduced our ideas the next version of akonadi, we’ve been working on a proof of concept implementation, but we haven’t talked a lot about it. I’d therefore like to give a short progress report.
-
System Settings is a strange part of Plasma; it composes of umpteen modules gradually written over the last 15 years by a lot of different people.
-
-
Screenshots
-
Red Hat Family
-
Fedora
-
Yup, I just got bored of running Spotify on my cellphone when working on computer. Unfortunately there is no native support for Spotify on Fedora just like in Debian / Ubuntu (which are preferred distros by Spotify for Linux today).
-
There are so many Linux-based operating systems nowadays, that it can be maddening to try and settle on one. For many home users, sticking with Ubuntu or Mint is probably for the best. Why? These distributions are beginner-friendly while also be powerful for experts too. In other words, you can grow with them without fear of hitting a ceiling.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
The Aquaris E4.5 Ubuntu Edition will retail for €169.90 and be sold via BQ.com through a series of flash sales.
-
Canonical and BQ want to make this release memorable so they have planned a bunch of Flash Sales, available via the BQ.com official website, and will cost about 169.90 Euros (~ $193 / £127).
-
The Telegram application is now ready for daily usage and has been added to the Ubuntu App Store, so that the users can install it easily. This messenger service is among the most popular ones in its category because it has good encryption and via the Telegram API, a lot of Telegram clients for Linux have been developed.
-
-
Almost a year after Ubuntu developer Canonical joined hands with Meizu and BQ to manufacture handsets with the Linux-based OS installed on them, the company has now announced its plans to release the world’s first Ubuntu smartphone – the Aquaris E4.5 Ubuntu Edition.
-
-
Phones
-
Tizen
-
He was replying to a lad, telling him that they are going to help developers to port their applications from iOS and Android Monopoly to Sailfish OS and Tizen.
-
Events
-
The Lenovo ThinkPad T430s is now the latest laptop to be running atop Coreboot as an alternative to its proprietary UEFI/BIOS.
-
BSD
-
The last PC-BSD release I reviewed was PC-BSD 10.1. And that was actually just late last year. You may read that review at PC-BSD 10.1 review.
It was the worst edition of any distribution I have even reviewed.
An installation of the Cinnamon desktop, which shipped with Cinnamon 2.2, was especially bad. Out of the box, it was unusable. When PC-BSD 10.1.1 was released (on February 2 2015), I knew I had to take another look at a Cinnamon installation.
So that’s what this article is about – a cursory review of an installation of PC-BSD 10.1.1 Cinnamon.
-
FSF/FSFE/GNU/SFLC
-
GNU lightning is a library to aid in making portable programs that compile assembly code at run time.
-
Pictures have emerged showing the Sochi Olympics Winter Park standing empty and neglected just a year after Russian president Vladimir Putin pumped billions into the venue.
Many of the custom built stadiums, which cost an estimated $51 billion in total, now appear deserted and unused.
The companies that maintain the facilities are reportedly struggling to stay afloat as tourist numbers plummet.
-
The Deputy Prime Minister is found to be trailing Labour by 10 points in his Sheffield Hallam constituency, according to a survey for the trade union Unite.
-
Health/Nutrition
-
-
Is the Central Intelligence Agency partially culpable for bringing crack cocaine to US streets, especially to the black neighborhoods of South Central, Los Angeles, and hence supporting its spread like an epidemic among the forgotten children of the “American Dream”? Yes it is, perhaps to the surprise of younger generations; and Kill The Messenger, a film released in November 2014, reminds us of this.
-
Security
-
Britain’s security services have acknowledged they have the worldwide capability to bypass the growing use of encryption by internet companies by attacking the computers themselves.
The Home Office release of the innocuously sounding “draft equipment interference code of practice” on Friday put into the public domain the rules and safeguards surrounding the use of computer hacking outside the UK by the security services for the first time.
The publication of the draft code follows David Cameron’s speech last month in which he pledged to break into encryption and ensure there was no “safe space” for terrorists or serious criminals which could not be monitored online by the security services with a ministerial warrant, effectively spelling out how it might be done.
-
The Obama administration has accused North Korea of hacking Sony in retaliation for “The Interview,” a goofball comedy about assassinating the country’s real-life leader, but the case may be another politicized rush to judgment by the U.S. government, writes James DiEugenio.
-
Defence/Police/Secrecy/Aggression
-
The government of Niger claims it killed over 100 fighters from Islamic militant group Boko Haram when the fighters attacked within the borders of the country for the first time.
-
President John F. Kennedy increased U.S. involvement, and the CIA encouraged the assassination of South Vietnam President Ngo Dinh Diem, which led to a succession of unstable and short-lived juntas.
Fifty years ago, President Lyndon Baines Johnson embarked upon the massive escalation that would bring us the Vietnam War as we came to know it and that would bring an end to his presidency.
-
So Barack Obama has killed at least 2,500 in drone strikes during the six years of his presidency, not including those killed in Iraq or Afghanistan. The Spanish Inquisition reportedly killed 2,250 over 350 years. For comparative purposes, I would note, as I reported here at PJ Media last month, that Boko Haram reportedly killed 2,000 over several days in a massacre in Northern Nigeria.
-
Nothing good so far has come out of all the high-level meetings in Kiev and Moscow. US-NATO continue to threaten Russia with more and wider war in Ukraine. Russia is basically told they have to accept the US-NATO backed onslaught in eastern Ukraine. Russia must stop supporting eastern self-defense forces or expect even more of the west’s Strategy of Tension.
-
A Green Beret officer who was stripped of a prestigious valor award and dropped from the Special Forces fell out of favor with Army officials after the CIA shared information it gathered about him while he was going through screening for a potential job, according to officials familiar with the case.
-
If a decision is made to honor Poroshenko’s request for aid in the escalating conflict in Ukraine, action will not be taken right away. An anonymous official said that a public effort to arm Poroshenko’s troops could cause tension between the United States and its allies in NATO and the EU. The official also said that it would take time to decide what to send. In the past, the government has sent Soviet-made weapons from a CIA warehouse in North Carolina. The official said that this could be a viable option in this case, if the United States decides to offer support.
-
These were largely courtesy of the CIA, which reportedly devised no fewer than 638 plots to kill him, ranging from your typical poisoned handkerchief scheme to fungus-infected diving suits and exploding molluscs.
-
While watching the film, I kept waiting for something to be said or even suggested, about the deeper reason our military was in Iraq other than the film’s repetitive message: “They are the bad guys and we are the good guys.”
I kept hoping to at least see a Chevron Oil rig burning in the distance.
One scene was quite effective in portraying even the women and children as evil, showing a veiled mother and child in an almost Madonna and child way, beautiful but evil and carrying a grenade. The message here was that all Iraqis were evil, men, women and children, and all of the American troops there were the good guys.
-
Obama and Washington had a very different response to the March 2013 death of Hugo Chavez, the democratically elected president of Venezuela who used his nation’s also remarkable oil wealth to reduce poverty and inequality in his nation. Chavez won respect and even adoration from much of his nation’s citizenry, including especially the poor, even as he offered remarkable tolerance and freedom to wealthy elites who hated him and his egalitarian agenda.
Surely, then, the president of the world’s self-proclaimed greatest democracy, the United States, reacted to Chavez’s death with words of sympathy and respect that went beyond the reverence and compassion he expressed for the deceased king of an absolutist, arch-repressive, and ultra-reactionary dictatorship, right? Hardly. The White House responded with the following dismissive and disrespectful statement: “At Venezuela begins a new chapter in its history, the United States remains committed to policies that promote democratic principles, the rule of law, and respect for human rights” – a commitment that finds curious expression in Washington’s longstanding support for the Saudi dictatorship.
-
The brouhaha about possible Saudi Arabian funding of Al Qaeda in the run-up to the September 11, 2001, attacks is being fueled from two directions. It is being pushed by Zacarias Moussaoui, sometimes called the “twentieth hijacker,” now serving a life sentence in a federal supermax penitentiary. There are also allegations of Saudi funding in a congressional report on 9/11, a portion of which has not been released. That Saudi Arabia or its royal family were complicit in an attack on New York and Washington is completely implausible. The Saudi ruling class long ago decided that they would trade foreign policy independence for an American security umbrella, given that they preside over a small country with enormous petroleum wealth and resources, and could not protect themselves from external threats. Moreover, they are heavily invested in the New York stock market, and took an enormous bath on September 12 and after, as the latter suddenly lost half its value. The whole idea is a nonstarter.
-
-
A CIA leak and the a reading of the 28 pages by two US senators had revealed that there was enough evidence to show the involvement of the Saudis in the attack. A CIA leaked memo had gone on to show that it was not the Al-Qaeda or the Taliban that carried out this attack, but it was Saudi Arabia.
Further the memo also went on to read that wealthy Saudis, diplomats and intelligence officials employed by the Saudi Royal family had helped the hijackers with both logistics and finances.
The pages which had been blacked out by the Bush administration suggest that the Saudi consulate in Los Angeles had facilitated the arrival of two hijakers Khalid al-Mihdhar and Nawaf al-Hazmi in 2000.
A Saudi intelligence official named Osama Bassnan and a spy Omar Bayoumi established a base in San Diego which housed the hijackers. This was the same place where al Qaeda cleric Ankar Al-Awlaki met with the hijackers.
[...]
Some of the pages even indicate that a huge amount of money had been sent to the hijackers. Specific information suggests the Saudi Arabian ambassador to the US, Prince Bandar had sent $130,000 to Saudi intelligence agent Osama Bassnan.
Although Prince Bandar had claimed that this money was a donation made to Bassnan who had an ailing wife, the US had managed to track that this money had infact reached the hijackers. There was also a trail that Prince Bandar had paid for the establishment of an Islamic Centre in Virgina which was incidentally close to the Pentagon.
-
Zacarias Moussaoui, the so-called ‘20th hijacker’ in the 9/11 plot, has alleged that Saudi diplomat discussed plans to shoot down Air Force One
-
A convicted al-Qaeda operative has claimed that members of the terrorist network received extensive financial support from members of the Saudi royal family throughout the late 1990′s and into 2000, the New York Times reported Wednesday.
-
There is a coup underway in Venezuela. The pieces are all falling into place like a bad CIA movie.
At every turn, a new traitor is revealed, a betrayal is born, full of promises to reveal the smoking gun that will justify the unjustifiable. Infiltrations are rampant, rumours spread like wildfire, and the panic mentality threatens to overcome logic.
Headlines scream danger, crisis and imminent demise, while the usual suspects declare covert war on a people whose only crime is being gatekeeper to the largest pot of black gold in the world.
-
The fallout in Argentina from the mysterious death of a prosecutor in January has exposed to the public a power struggle at the highest levels of the state.
On February 1, a Buenos Aires newspaper reported that prosecutor Alberto Nisman—who was found dead on January 18 with a suspicious gunshot wound to the head—had prepared draft warrants for the arrest of President Cristina Fernandez de Kirchner, Foreign Minister Hector Timmerman, and Congressman Andres Larroque preceding his death.
-
-
The founder of Stratfor, the “private CIA” firm, says that the overthrow of Viktor Yanokovych in Ukraine in February 2014 was “the most blatant coup in history.” The President of the Czech Republic contrasts that coup versus Czechoslovakia’s authentically democratic 1968 “Velvet Revolution,” and he says that “only poorly informed people” don’t know that the governmental overthrow in Ukraine in 2014 was a coup. America’s liberals, then, are indeed poorly informed, and they are so partly because they don’t want to know the truth about Obama; America’s conservatives, by contrast, simply hate Obama, merely because he’s a black Democratic politician (and any President who has been so good to Wall Street would be loved by them if he were a white Republican); they don’t mind (and they actually support) that Obama hates Russia and institutes an ethnic cleansing campaign in his aggressive war against Russia. Whereas conservatives don’t mind Obama’s ethnic-cleansing campaign to get rid of pro-Russians in Ukraine, liberals don’t want to know about it. The result is actually conservatives reigning in both Parties, not just in one: we now have one-party government, in all but name.
-
Clashes took place in Benghazi where pro-government forces led by CIA-linked General Khalifa Haftar have been trying to retake the city from an umbrella group of Islamist militias opposed to the Tobruk governent.
-
The cowardly NATO assassinations of Hezbollah’s top commander Imad Mughniyeh (2008) and his son Jihad Mughniyeh (2015) which both took place outside any battlefield, highlights the criminal nature of colonial militarism which does not recognize ‘military rules of engagement’ because it has never had any legal grounds for being in the Middle East.
-
In 2008, Lebanese terrorist overlord Imad Mughniyeh was killed by a car bomb in Damascus, Syria. Twisted metal wreckage was all that remained of his Mitsubishi Pajero. And according to a report from the Washington Post, the CIA built and tested the entire system at a secret facility, somewhere in North Carolina.
-
NBC’s new show Allegiance, debuting tomorrow night, starts out with a scene of a man being burned alive, which appears to be a case of very unfortunate timing, given what’s been in the news this week.
-
When word recently leaked that the CIA inspector general was preparing to step down, agency Director John Brennan issued a glowing statement about his watchdog’s work.
Left unsaid was the role CIA Inspector General David Buckley had in refereeing one of the most acrimonious disputes between a spy director and his congressional overseers in decades.
-
A member of the panel that investigated JFK’s death now worries he was a victim of a “massive cover-up.”
-
Lee Harvey Oswald may have been part of a conspiracy, according to investigative reporter Philip Shenon, whose book “A Cruel and Shocking Act: The Secret History of the Kennedy Assassination,” has just been issued in paperback.
-
However, David Slawson was a young lawyer who became a part of the Warren Commission in January, 1964. He is now 83-years of age. The retired law professor now believes that he and the other members of the commission victims of a ‘massive cover-up.’
Slawson’s individual assignment within the Warren Commission was to investigate whether there was any involvement from a foreign nation in the assassination of President Kennedy. Until last year, he was certain that his reported findings were accurate. Recently he discovered that the CIA and other agencies withheld large amounts of information from his investigation. He has now determined that others were aware of Oswald’s plans before the shooting occurred. With the definition of ‘conspiracy,’ when at least two people conspire to commit a wrongful act, Slawson now is certain that a conspiracy did exist.
-
-
A former CIA contractor says since the Ukrainian forces are using cluster bombs and illegal weapons against civilians, Washington’s decision to provide Kiev with further lethal aid does not make any difference.
-
-
A series of recent setbacks underlines this point. The United Arab Emirates (UAE) has quietly withdrawn from strike missions in Syria, with questions emerging about how far any country other than the US is now operating over it.
-
It’s no secret that the mid-20th century was a dirty time for U.S. intelligence agencies. J. Edgar Hoover’s FBI was waging personal wars through the government, infiltrating social movements and encouraging civil rights leaders to commit suicide. The CIA was working with the Mafia to assassinate foreign leaders, and had gotten into the business of overthrowing foreign governments, leaving a trail of fractured regimes through Africa and the Middle East.
-
In most countries controlled by the Emperor the most important “asset” are the military.
-
Kadyrov also suggested the West was backing IS in order to distract public attention from numerous problems in the Middle East, in the hope of destroying Islamic nations from inside.
-
Transparency Reporting
-
Risen has published many important stories, and two books, about secret and often illegal practices at the National Security Agency (NSA) and the CIA. I’ve heard many Lovejoy addresses, but rarely has there been a statement as startling as Risen’s assertion, in response to a question, that President Obama “hates the press.”
-
Americans tend to believe in government that is transparent and accountable.
-
Environment/Energy/Wildlife
-
It was the Newman government’s great hope for Queensland’s economy: a proposal for Australia’s biggest coal development, unprecedented in scale.
Indian billionaire Gautam Adani’s mammoth Carmichael mine, in central Queensland, is pledged to bring with it 10,000 jobs and $22 billion in taxes and royalties.
-
Some North Dakota companies have shut down 40 percent of their operations as plummeting oil prices render their industry far less economic than it became during the boom of the past five years.
-
Finance
-
Rashia Wilson bought a $92,000 Audi, proclaimed herself a millionaire, and announced on her Facebook page that she was “the queen of IRS tax fraud,” as prosecutors told the story.
But even more than her flamboyance, it was the seeming ease of her crime that was most stunning: She and an accomplice were alleged to have hijacked the identities of other taxpayers to get fraudulent refunds. They used stolen Social Security numbers, a computer, and basic knowledge of how to file a tax return, according to the government.
-
With advice from more than 200 policy experts, Hillary Rodham Clinton is trying to answer what has emerged as a central question of her early presidential campaign strategy: how to address the anger about income inequality without overly vilifying the wealthy.
Mrs. Clinton has not had to wade into domestic policy since before she became secretary of state in 2009, and she has spent the past few months engaged in policy discussions with economists on the left and closer to the Democratic Party’s center who are grappling with the discontent set off by the gap between rich and poor. Sorting through the often divergent advice to develop an economic plan could affect the timing and planning of the official announcement of her campaign.
-
Business tycoon and former Fidesz insider Lajos Simicska, speaking out as the key editors of his media group resigned, apparently in protest against Simicska’s threat to launch a “media war” against Orbán’s government.
-
PR/AstroTurf/Lobbying
-
William Colby, ex-director of the Central Intelligence Agency, is a man who should know Western media: “The CIA (Central Intelligence Agency) owns everyone of any significance in the major media.” Not long after becoming a whistle-blower Colby died in a freak canoeing accident.
-
Not only did Williams lie just one time about the incident, he’d done it numerous times over the years.
-
Further scrutiny of NBC News anchor Brian Williams’ other past statements began to surface Friday when the New Orleans Advocate reported that the newsman’s account of his experience covering Hurricane Katrina may not be entirely accurate.
In a 2006 interview with former Disney CEO Michael Eisner, Williams said he witnessed a body floating in the French Quarter area of the city. “When you look out of your hotel window in the French Quarter and watch a man float by face down, when you see bodies that you last saw in Banda Aceh, Indonesia, and swore to yourself that you would never see in your country,” Williams told Eisner, who suggested in the interview that Williams emerged from former NBC News anchor Tom Brokaw’s shadow with his Katrina coverage.
-
But the caustic media big shots who once roamed the land were gone, and “there was no one around to pull his chain when he got too over-the-top,” as one NBC News reporter put it.
-
You don’t have to be North Korean to be annoyed by this film.
-
There’s a whole host of people that’ll tell you that comedy can’t be insulting – by its very nature, it’s a joke, therefore it’s not an insult. What they forget is, if it’s not funny, it’s just sort of sad and offensive.
-
-
As the South Korean government, which has executed hundreds of thousands of leftists and suspected leftists, now bans the Unified Progressive Party (UPP), which got 10% of the vote in the last election, so too the U.S. imperialists are ratcheting up their economic sanctions and cyber attacks on North Korea. They are doing this partially on unsubstantiated accusations of terrorist threats flowing from the idiotic movie “The Interview”.
Korea was divided by the U.S. imperialists after WW II who imposed a far right capitalist dictatorship on South Korea that carried out mass executions of hundreds of thousands of leftists and suspected leftists. While in the south the new government employed the torturers and murderers of the Japanese occupation, in the north a new government was born out of the leadership that fought against Japanese occupation. Through social revolution they established a planned socialist economy that greatly benefitted the working class. In the 1950s the United States sent troops to Korea and carried out a brutal war against the Korean people in an attempt to destroy the social revolution in the north and protect the brutal capitalist dictatorship in the south. In that war, conservative estimates are that the U.S. murdered 3,000,000 people. North Koreans, perhaps more accurately, estimate 5,000,000 people.
Korea is one country and discussion of reunification is popular. Leninist -Trotskyists also call for Korean reunification, but only through a social revolution in the South. Kim Il Sung’s illusions in a peaceful reunification after the imperialists murdered 5,000,000 people is a deadly pipe dream. The only reunification the imperialists and the capitalist government in the South will agree to is one that annexes the north and destroys the gains of the North Korean Revolution, much as was done to East Germany. For any useful reunification to occur, the brutally repressive capitalist state of South Korea must be smashed in a proletarian socialist revolution. In addition, the highly deformed Stalinist government in the DPRK that promotes these kinds of deadly illusions really needs to be swept away in a political revolution as well. That is a revolution that overthrows the Stalinist bureaucracy and establishes workers democracy and an internationalist revolutionary program, while at the same time maintaining the social gains of the revolution including the socialist planned economy, socialist food distribution, free education to higher grade levels than the South, and guaranteed free socialized healthcare.
-
JAMES FRANCO and Seth Rogen reteam for this infamous comedy romp that’s finally released after generating global headlines for all the wrong reasons.
[...]
VERDICT: An abomination of a comedy, pitched to the lowest common denominator, with some seriously questionable intent to boot.
-
Censorship
-
Last week, students at Goldsmiths College in London banned a performance by the fantastic feminist comedian Kate Smurthwaite in an act of neurotic prudery that bordered on the insane. Her show was on freedom of speech – yes, yes, I know. She told me that Goldsmiths did not close it because of what she had planned to say, but because she had once said that the police should arrest men who go with prostitutes and that she was against patriarchal clerics forcing women to wear the burqa. In the demonology of campus politics, these were not legitimate opinions that could be contested in robust debate. They marked her as a “whoreophobe” and “Islamophobe”, who must be silenced.
-
Online magazine Spiked has published a ranking of the attitudes of British universities towards free speech, placing Oxford in the “red” category. The website states that universities in this category, the “most censorious” one, have “banned and actively censored ideas on campus”.
-
Spiked’s Free Speech University Rankings, which launched this week, shows that many of the day-to-day restrictions on campus free speech emanate not from universities but rather from students themselves. This free-speech league table came out in the same week as a debate about the impact of the government’s proposed anti-terror legislation on higher education really took off. Vice chancellors have taken to the airwaves, started petitions, and penned letters to national newspapers in defence of academic freedom. It would be easy to get the impression that students have created an environment in which banning things on a whim is the new normal, while academics look on in horror and champion the cause of free speech.
-
This isn’t about your photos or public messages violating Facebook’s own rules, like posting pornography. This is Facebook (FB, Tech30) acting as a government censor on that country’s behalf.
It’s worst in India, Turkey and Pakistan, where thousands of pages and photos get pulled down every year for “blasphemy,” criticizing the government or posting something that’s religiously offensive.
-
Mihir Joshi, an Indian musician recording his first album last year, needed a word to rhyme with today in one of his songs and found one that he thought fit perfectly. But India’s Central Board of Film Certification disagreed, and replaced it with a beep when the music video debuted on TV over the weekend.
-
-
“As a correspondent, I just shared a piece of news that was true with my followers. Sharing this kind of news with people is my job,” Yazıcı said. Her colleague, Taraf’s political editor Dicle Baştürk, received a similar notification and did not delete her tweet. She says it’s still visible. Days later, Baştürk received another email from Twitter informing her that the company may still have to remove it.
-
Dennis Toeppen, the owner of the Illinois bus company Suburban Express, has become something of a legend for the way he manages his company’s reputation online and deals with customers who fail to play by his rules. Still facing a trial in Lake County for misdemeanor charges of electronic harassment, Toeppen has continued to police reviews of Suburban Express on Yelp and other services, using his company’s website as a way to call out those who he believes have wronged him. From his perspective, this is just digital self-defense; from the perspective of his targets, it’s Internet intimidation and an attempt to damage the reputations of anyone who complains about how Toeppen does business.
-
The US Department of Defense has been given a week to explain why it has not yet complied with a federal court order to list the individual exemptions for the disclosure of over 2,000 photographs depicting military abuse of detainees in Afghanistan and Iraq.
-
-
Privacy
-
Appear in a photo taken at a protest march, a gay bar, or an abortion clinic, and your friends might recognize you. But a machine probably won’t—at least for now. Unless a computer has been tasked to look for you, has trained on dozens of photos of your face, and has high-quality images to examine, your anonymity is safe. Nor is it yet possible for a computer to scour the Internet and find you in random, uncaptioned photos. But within the walled garden of Facebook, which contains by far the largest collection of personal photographs in the world, the technology for doing all that is beginning to blossom.
-
The Obama administration requested $53.9 billion for its spy agencies in the year beginning Oct. 1, up sharply from its request of $45.6 billion last year.
The money would be used to fund operations spread across six federal departments, as well as the Central Intelligence Agency and the Office of the Director of National Intelligence.
-
In 1991, Senator Daniel P. Moynihan (D-N.Y.) introduced The End the Cold War Act that would have abolished the Central Intelligence Agency and transferred all of its functions to the Department of State. The Act declared that “the creation of the Central Intelligence Agency as a separate entity during the Cold War undermined the role of the Department of State as the primary agency of the United States Government formulating and conducting foreign policy and providing information to the President concerning the state of world affairs.”
-
The German magazine Focus says Britain has threatened to cease cooperation with Germany’s BND intelligence service. The BND in turn has been accused by a Berlin inquiry panel of withholding documents.
-
Germany’s Parliament is getting ready to review the NSA with a Parliamentary inquiry. Both Britain and the U.S. are threatening to discontinue sharing intelligence with Germany as a result. This ‘threat’ has not been verified. However, with tensions as they are and a crisis meeting to discuss intelligence in Germany’s intelligence sharing, the threat may be genuine.
-
-
This shouldn’t come as much of a shock, but your Smart TV is probably spying on you. This doesn’t mean it is out to do something malicious or that the machine has become self-aware, but it does mean that advertisers and third parties have another route to figure out how to reach you.
-
Director Johanna Hamilton talks about her latest documentary, “1971.” On March 8, 1971, The Citizens’ Commission to Investigate the FBI, as they called themselves, broke into a small FBI office in Media, Pennsylvania, took every file, and shared them with the American public. These actions exposed COINTELPRO, the FBI’s illegal surveillance program that involved the intimidation of law-abiding Americans and helped lead to the country’s first Congressional investigation of U.S. intelligence agencies. Never caught, forty-three years later, these everyday Americans – parents, teachers and citizens – publicly reveal themselves for the first time and share their story in this documentary. Hamilton is joined by two members of The Citizens’ Commission, Bonnie Raines and John Raines. The film opens at Cinema Village February 6.
-
For more than 18 months the response from the security services to the disclosure by Edward Snowden of the mass harvesting of personal data of British citizens has been to say: “Trust us, nothing we are doing is unlawful.”
-
Civil Rights
-
Yesterday, an important committee in the Virginia House of Delegates passed a bill to take action against federal indefinite detention powers. The unanimous tally was 20-0.
-
A bill introduced in the Washington state legislature would prohibit the state from assisting the federal government in the indefinite detention without due process under provisions of the National Defense Authorization Act of 2012 (NDAA) or any other federal acts purporting to authorize such powers.
-
A bill up for consideration in the Mississippi Senate would prohibit the state from assisting the federal government in the indefinite detention without due process under provisions of the National Defense Authorization Act of 2012 (NDAA), or any other federal acts purporting to authorize such powers.
-
The United Kingdom’s costs for its embassy “siege” against Julian Assange, who has not been charged with an offence, has hit 10 million pounds, Scotland Yard confirmed today.
-
We’re all braced for another grotesque video clip from the fundamentalist nutters of the so-called Islamic State, because they’ve released a primer on the likely beheading of two Japanese hostages – unless Tokyo will hand over a $US200 million ransom in the coming days.
IS’s video production values are sickeningly creepy – the prisoners in orange jumpsuits; their would-be executioner in black, wielding a knife and spewing bile.
-
The real breeding ground for extremism stems from the treatment of immigrant groups within Europe. Racial, ethnic, and religious discrimination have driven a generation of young migrants to radical movements as a solution to an absence of job prospects, poor education, deteriorated neighborhoods, lack of respect, and repeated bouts in jail. Ironically, the crackdown on these communities in the aftermath of the attacks could potentially escalate the problem.
-
So, what if I told you that an internationally known American – a 75-year-old Army veteran and a longtime official at the Central Intelligence Agency, someone who had famously questioned the imperious Defense Secretary Donald Rumsfeld about his Iraq War lies in a public event that led evening newscasts in 2006 – was recently denied entry to a public speech by another Iraq War icon, Gen. David Petraeus, and – despite having paid for a ticket – was brutally arrested by the police and jailed?
Wouldn’t that be a story? Wouldn’t that be something that the news media, especially the “liberal” news media, should jump all over? Wouldn’t a newspaper like the New York Times just love something like that?
But what if I told you that the New York Times wasn’t interested at all? You might think that perhaps the event occurred in some distant hamlet, maybe a small college town where there wasn’t much media, so it just fell through the cracks.
Yet, this story actually played out in New York City, the media capital of the world, on the Upper East Side at the 92nd Street Y in full view of hundreds of New Yorkers on the night of Oct. 30, 2014. Former CIA analyst Ray McGovern was roughly arrested, with the police ignoring his howls of pain as they pulled his arms behind his back. (McGovern had recently suffered a painful shoulder injury from a fall.}
-
-
-
CIA whistleblower John Kiriakou, who has been serving a prison sentence at the federal correctional institution in Loretto, Pennsylvania, has written a letter reporting that a correctional officer committed suicide in January. How the prison officials handled the death stood in stark contrast to the treatment prisoners experience when an inmate dies or an inmate needs to go to a funeral for an immediate family member.
For much of Kiriakou’s prison sentence, Firedoglake has published his “Letters from Loretto.” He was the first member of the CIA to publicly acknowledge that torture was official US policy under President George W. Bush’s administration. In October 2012, he pled guilty to violating the Intelligence Identities Protection Act (IIPA) when he confirmed the name of an officer involved in the CIA’s Rendition, Detention and Interrogation (RDI) program to a reporter. He was sentenced in January 2013 and reported to prison on February 28, 2013.
Kiriakou writes in the letter dated January 22, 2015, that he did not know the officer or ever “have any contact with him,” however, it is his understanding that the man was a “nice guy,” someone “friendly, reasonable and honest.” He feels very sorry for his family, but the response from staff was “fascinating.”
As a CIA officer, when he lost a colleague, a star would go up on the agency’s Wall of Honor. Everyone would move on. That is not how the prison chose to handle the death.
-
-
-
-
-
-
John Kiriakou was the first whistleblower to reveal that torture was the official policy of the the Goerge W. Bush Administration.
-
-
-
“I knew I was not guilty, and my attorneys knew I was not guilty, but a jury would convict a ham sandwich given a chance,” he said.
The government pursued the prosecution on the leak because of the 2007 television interviews, he said.
“I’ve maintained from the very beginning, as did my attorneys, that my case was not about a leak. My case was about torture,” he said.
A Justice Department spokesman said Kiriakou has made the whistleblower retaliation claim since he was indicted.
-
It is a scandal stretching across six decades: the forced removal of hundreds of native people from a British overseas territory to make way for a US military base. That Diego Garcia, the main island in the Chagos archipelago – seven atolls in the Indian Ocean – has played a part in the CIA’s torture programme has only added to Britain’s sense of shame.
-
The United Nations, which is the legal guardian of scores of human rights treaties banning torture, unlawful imprisonment, degrading treatment of prisoners of war and enforced disappearances, is troubled that an increasing number of countries are justifying violations of UN conventions on grounds of fighting terrorism in conflict zones.
-
The ex-CIA officer who first blew the whistle on the agency’s waterboarding practice says the 30-month prison sentence he got for revealing classified information was “worth it.”
“It’s been a terrible three years, and it’s ruined me financially and personally, but in the greater picture it’s all been worth it,” John Kiriakou told Fusion over the phone from Arlington, Virginia, where he just began serving an 85-day house arrest sentence. It was his first interview since leaving a federal prison in Pennsylvania on Tuesday.
“I’m proud I had a role in seeing that torture is now banned in the United States,” he said.
For now, he’s only able to leave his home to go to a halfway house or to church, so Kiriakou, 50, is struggling to wrap his head around everything that happened while he was behind bars—namely the release of the Senate’s torture report less than two months ago.
-
The Obama Administration is pledging that it won’t destroy or return copies of the full-length Senate Intelligence Committee report on CIA detention and interrogation practices without permission from the federal courts.
In a court filing Friday night, the Justice Department asked U.S. District Judge James Boasberg not to grant an American Civil Liberties Union motion seeking to block the government from returning the unabridged versions of the so-called torture report to the Senate as new Senate Intelligence Committee Chairman Richard Burr (R-N.C.) has requested.
However, Justice Department lawyers agreed not to send the report back to the Hill while the ACLU’s Freedom of Information Act lawsuit is pending, unless they seek Boasberg’s okay to do so.
-
When conservative Christians claim that the Bible God condones torture, they’re not making it up. A close look at the good book reveals why so many Christians past and present have adopted an Iron Age attitude toward brutality.
-
When the hijacked airplanes hit the World Trade Towers on 9/11, John Yoo was working in his Justice Department office in Washington, D.C. At the time, he was assigned to one of the most crucial legal departments in the federal government, the Office of Legal Counsel (OLC). Although he was an important lawyer in the administration of President Bush, Yoo himself was not well known outside of a close circle of Washington bureaucrats and policy wonks. He wasn’t famous. But all of that would change very quickly.
Yoo had taken a leave of absence from Berkeley Law School to work for the Bush administration. His academic work had focused on constitutional law and foreign affairs, and he had earned a reputation for being a strong supporter of presidential war powers. According to Yoo, the president of the United States has virtually unlimited power as the constitutionally appointed commander in chief of the armed forces. Although Congress can play some role in times of war, Yoo had insisted in a series of law review articles that this role was secondary at best. In times of crisis, presidential power always trumps congressional deliberation.
-
Everybody gets upset by the anti-democratic acts, the shelving of the Constitution, the non-compliance with judicial decisions and the pressure on the business world, civil society and opposition parties.
Maybe we should just be sad about people who, after being humiliated in the past and imprisoned for exercising fundamental rights, embraced democratic reforms and standards, only to abandon this democratic stance. Maybe we should be just sad about a person or a group of people who have been against a single-party regime for many years but have started to implement one. We should be sad about people who, after arguing that they would subscribe to religious and ethical principles, violated all ethical rules and considerations once they acquired power.
-
An 8-year-old boy in Nice, a small city on France’s Mediterranean coast near Italy, was hauled out of school to the police station. The boy’s father was called, television crews were summoned and headlines blared about the boy allegedly not respecting the minute of silence for Charlie Hebdo victims. An atmosphere of frenzied overreaction was created. (TV2, Jan. 28)
-
The US leadership role in the world is undermined by political dysfunction and polarization in the country, the US National Security Strategy released on Friday stated.
[...]
A CIA torture report released in December detailed a wide range of practices used by the agency, including waterboarding, mock executions, prolonged sleep deprivation and threats of sexual abuse in the wake of the September 11, 2001 attacks on New York and Washington.
-
Last year, government lawyers made inquires into allegations that CIA personnel and Senate Intelligence Committee staffers broke federal laws in connection with the committee’s work on the Senate torture report. But the Department of Justice has classified dozens of pages of documents related to that investigation.
[...]
VICE News filed a Freedom of Information Act (FOIA) request for those criminal referrals as well as all documents that “refer” to it. In a letter dated January 26, the Justice Department’s National Security Division said it identified about 85 pages — and that it was withholding all but two pages on grounds that disclosure would threaten national security, result in an unwarranted invasion of privacy, and reveal behind-the-scenes deliberations.
-
Many in Congress and the news media were surprised by a recent CIA Accountability Board report that cleared CIA personnel of wrongdoing in last year’s spying-on-Congress scandal, a finding that contradicted a July 2014 report by the CIA Inspector General. However, a close reading of both reports — which were released in unclassified form last month — indicates that the fault in this affair lies almost entirely with the Senate Intelligence Committee, whose staff appeared to have engaged in serious misconduct, including trying to smuggle a camera into a secure CIA facility, hacking into a CIA computer system, and stealing and misusing classified documents subject to attorney-client privilege.
-
Mr Krongard was Executive Director of the CIA from 2001 to 2004 and a former chairman of Alex. Brown and Sons, a Baltimore investment bank.
After being recruited, Hale says he helped run a fake company created under a legitimate corporation the Agency created.
The fake company included shipping and trucking companies which Hale ran whilst leading the bank.
Hale travelled extensively to countries such as Saudi Arabia, Israel, Poland, Denmark, and Norway. This was in order to provide cover to operatives supposedly working for the company.
-
“History, despite its wrenching pain, cannot be unlived,” wrote Maya Angelou, “but if faced with courage, need not be lived again.” We call on U.S. Sen. Richard Burr to stop trying to unlive our nation’s ugly torture program, and face it with courage.
-
Last Saturday, January 31, CIA Inspector General David Buckley resigned after a little more than four years in office. His departure came at the end of the same month his office published a scathing report that found the agency committed serious wrongdoings in connection to its rendition, detention, and torture program. It was also the same month that his report was swept aside by a parallel investigation conducted by a CIA “Accountability Board” that was hand-picked by agency leadership. Unsurprisingly, the Accountability Board recommended holding no one accountable for any failings.
-
-
Winston-Salem’s own Sen. Richard Burr is at the center of an epic struggle over whether we will be allowed to know the truth about the taxpayer-funded torture that stains our nation’s soul. He has taken an astonishing action that appears at odds with both law and morality.
Sen. Burr, now chair of the Senate Intelligence Committee, recently wrote to the White House insisting that all copies of his committee’s 6,900-page report on CIA torture be “returned immediately.” The report had been distributed to many agencies and departments within the executive branch, and the idea of its being totally wrapped in secrecy again is ludicrous.
-
The FAIR study reviewed the guests of several popular news shows in the week when the report was most prominently discussed. The surveyed programs included the five Sunday talk shows (NBC’s Meet the Press, CBS’s Face the Nation, ABC’s This Week, Fox News Sunday, and CNN’s State of the Union) along with four weekday news shows (MSNBC’s Hardball, Fox’s Special Report, CNN’s Situation Room, and the PBS NewsHour).
[...]
Only 18 guests articulated clear opposition to the CIA’s torture practices. That’s just half the number who spoke up in support.
-
British prime minister David Cameron has hinted that UK will launch an investigation by an independent inquiry into the country’s involvement in CIA torture.
The Intelligence Security Committee (ISC) is already investigating whether British officials were complicit in torture overseas.
Revelations were made recently that British overseas territory of Diego Garcia had been used to interrogate terrorist suspects.
-
He also has expressed concern at the “disproportionate” number of young black Americans who die in encounters with police officers and the high rate of blacks in U.S. prisons and on death row.
-
The article continues with a condemnation of a petition from Nobel Peace Prize winners Adolfo Perez Esquivel and Mairead Corrigan Maguire, with 129 other signatories, which criticized HRW for having “close ties to the U.S. government which call into question its independence.” There has been plenty of mudslinging back and forth about this, but in essence, the authors of the petition contend that Human Rights Watch employs too many former American officials, including veterans of the CIA and a former NATO Secretary General, thus compromising the independence of the group. They think this influence causes Human Rights Watch to go easy on American violations.
-
According to Wikidpedia, “An expatriate (often shortened to expat) is a person temporarily or permanently residing in a country other than that of the person’s upbringing. The word comes from the Latin terms ex (“out of”) and patria (“country, fatherland”).”
Defined that way, you should expect any person going to work outside of his or her country for a period of time would be an expat regardless of his skin color, country, etc.
That is not the case in reality: expat is a term reserved exclusively for western White people going to work abroad.
Africans are immigrants.
Arabs are immigrants.
Asians are immigrants.
However Europeans are expats because they can’t be at the same level as other ethnicities. They are superior. Immigrants is a term set aside for inferior races.
-
Internet/Net Neutrality
-
After waffling for months on the question of Net neutrality, who would have guessed that former telecom lobbyist Tom Wheeler would argue such a strong case for reclassifying broadband as a Title II common carrier? Though the FCC steered clear of onerous regulation, the reaction from telecoms has been largely a howl of distress.
-
There’s been plenty of propaganda concerning the net neutrality fight, but with FCC boss Tom Wheeler finally making it official that the FCC is going to move to reclassify broadband, it’s kicked into high gear of ridiculousness. An astroturfing front group that’s anti-net neutrality is trying to make a “viral” anti-net neutrality video, and it did so in the most bizarre way, by making an attempted parody porno video, based on the classic “cable guy” porno trope.
-
DRM
-
A year ago, the largest video site on the net ditching Flash would have been a blow for Internet freedom. Today, it’s a bitter reminder of how the three big commercial browser vendors—Apple, Microsoft and Google—Netflix, the BBC, and the World Wide Web Consortium sold the whole Internet out.
Permalink
Send this to a friend
02.07.15
Posted in News Roundup at 8:12 pm by Dr. Roy Schestowitz
Contents
-
The upcoming PapyrOS is trying to build an entirely new Linux distro (based on Arch Linux) which will have Android 5.0′s now famous material-design inspired look and feel.
-
Server
-
Oracle puts its official mark on Oracle Linux and MySQL images on the Docker Hub registry.
-
Kernel Space
-
Greg Kroah-Hartman has released stable kernels 3.10.68, 3.14.32, and 3.18.6, each with important fixes and updates throughout the tree.
-
Graphics Stack
-
While all exciting work going into Mesa Git is for Mesa 10.5, Mesa 10.4.4 is out for stable users sticking to tagged releases. Mesa 10.4.4 fixes just a handful of bugs rangingg from core Mesa to the i965 driver and DRI3.
-
A set of fourteen patches were published today for the Intel Mesa DRI driver for implementing glMemoryBarrier() as needed by OpenGL 4.2 and newer.
-
Benchmarks
-
As the latest Linux benchmark numbers to deliver for Intel Broadwell and the new ThinkPad X1 Carbon ultrabook, here’s a nine-way Linux laptop/ultrabook comparison. All nine devices in this article were tested against the latest snapshot of Ubuntu 15.04 while running a big set of benchmarks and also monitoring the CPU temperatures and battery power consumption while testing for a nice look at Clarksfield/Nehalem, Sandy Bridge, Ivy Bridge, Haswell, and Broadwell mobile hardware on Linux.
-
Applications
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
Wireless printing has made it possible to print to devices stored in cupboards, sheds and remote rooms. It has generally shaken up the whole process of printing and enabled output from smartphones, tablets, laptops and desktop computers alike. But you don’t have to own a shiny new printer for this to work; old printers without native wireless support don’t have to end up in the bin, thanks to the Raspberry Pi.
-
Wine or Emulation
-
Wine (Wine is not an emulator) 1.7.36 is now out and comes with quite a few improvements and new features, not to mention the fixes for various applications and games that have been added.
-
Wine 1.7.36 has been released and it brings a few new features while correcting 44 outstanding bugs over the past two weeks.
-
Wine development team was able to produce a new experimental release today. 1.7.36 bringing many new features and as many as 44 bugfixes.
-
Games
-
Feral Interactive, a game publisher and developer that historically focused on bringing AAA games to Mac OS X, is now looking to do more Linux game ports.
-
While LZHAM 1.0 was recently released, the former Valve engineer behind the compression library targeting game assets, Rich Geldreich, is already targeting more post-1.0 improvements to this library.
Rich Geldreich blogged today about some upcoming LZHAM decompressor optimizations that improve the speed by up to around 2%, which can become significant when dealing with game assets of several gigabytes.
-
Feral Interactive are looking to expand their team to help out with the Linux (and Mac) porting, so this could be a great opportunity for a few of you. Feral are responsible for the excellent Linux ports of XCOM Enemy Unknown and Empire: Total War.
-
Apotheon is an indie game based on the concept of taking the ancient Greek mythological pottery art-style and story; incorporating it with a 2D metroidvania (platform adventure), heavy physics driven, open world. Wow, what a mouthful description. I hope I didn’t butcher it because it’s one hell of an adventure I want to embark on!
-
Red Goddess, an upcoming platformer projected for release this month, now has a new trailer showing off some more action as well as introducing the plot of the game.
-
Deadnaut is Screwfly Studios’ second game and follow up to cult hit, Zafehouse: Diaries. Deadnauts, so named because they’re unlikely to return, must explore, investigate and fight their way through the derelict ships of dead civilisations. Every mission is unique and no two locations are the same.
-
Desktop Environments/WMs
-
The Elive Team is proud to announce the release of the beta version 2.5.4
-
-
Linux Questions — the place you go where you really need a Linux or FOSS question answered because, well, most of the smart FOSS folks are there answering them — released the results of its Members Choice Awards for 2015.
So when the membership of LQ speaks — or at least votes on FOSS programs — you should probably listen. Don’t take my word for it: Steven J. Vaughn-Nichols thinks so, too.
There were some expected results: For example, LibreOffice wins the Office Suite category by a ton, garnering 86 percent of the vote. To break this down, that’s nearly 9 in 10 folks favoring LibreOffice to the second-place finisher, Apache OpenOffice, and the others.
Same with categories like Browser of the Year — Firefox, need we say more? — with the blazing vulpini taking 57 percent in a crowded field. Same for Android, the Mobile Distribution of the Year which finished 40 percentage points ahead of the second-place finisher. Even vim, at 30 percent in a crowded field, heads up the Text Editor category with three times the votes of Emacs.
-
New Releases
-
Looking for a bit of mystery from your Linux distribution? 4MLinux delivers just that—and much more. In fact, the four M’s in its name stand for maintenance, miniserver, multimedia and mystery—the four elements that the distribution delivers. The “mystery” actually refers to gaming, which is a component of 4MLinux. This is not your average Linux distribution in other areas as well. Many Linux distributions in the market today are based on larger community Linux distributions. For example, many distributions use Ubuntu as a base, and Ubuntu itself is based on the upstream Debian Linux project. That’s not the case with 4MLinux, however, as it’s not based on another Linux distribution. Many Linux distributions also tend to favor GNOME or KDE as the default desktop, but not 4MLinux. 4MLinux leverages Joe’s Window Manager (JWM) as its default desktop environment. 4MLinux is available in several editions, including an Allinone Edition and 4MRescueKit, which focuses on the maintenance capabilities. 4MLinux 11.0 Allinone and 4MRescueKit were released on Jan. 24, while 4MLinux 11.1 beta Allinone was released on Feb. 1. In this slide show, eWEEK examines the key features in the new 4MLinux 11.1 Allinone update.
-
Arch Family
-
We’re happy to announce the 0.8.12 release of Manjaro Linux installation media, including images for the Xfce and KDE4 desktop environments, and our minimal ‘Net’ edition. This release is predominantly a maintenance release and includes very few changes to system defaults relative to the previous 0.8.11 ISOs, with some notable exceptions, such as out-of-the-box support for the exFAT file system and the change to pacman 4.2. Otherwise all the usual upstream updates are included, along with the latest from the Xfce 4.11 development series and the KDE 4.14 series.
-
Manjaro, a Linux distribution based on well-tested snapshots of the Arch Linux repositories and powered by the Xfce and KDE desktop environments, has been upgraded to version 0.8.12 and is now ready for download.
-
Slackware Family
-
Repeat message: Widevine is a Content Decryption Module (CDM) used by Netflix to stream video to your computer in a Chromium browser window. With my chromium and chromium-widevine-plugin packages you no longer need Chrome, or Firefox with Pipelight, to watch Netflix. The chrome-widevine-plugin is optional. If you don’t need it, then don’t install it. It is closed-source which for some is enough reason to stay away from it. The Chromium package on the other hand, is built from open source software only.
-
Red Hat Family
-
Fedora
-
It has taken a few weeks longer than we had hoped, but Korora 21 images are now available. I strongly recommend downloading with BitTorrent if you can.
The 21 beta was quite successful and we were able to make some minor changes to help improve the overall experience. Users who are currently on the beta need not re-install, updates are provided via the package manager. Users who are on 20 may consider upgrading, however this is not necessary as version 20 is supported for another 6 months or so.
-
Debian Family
-
It’s the end of an era, lightweight Linux fans. Philip Newborough has decided that it’s time to move on, and he’s ceasing development of #! — CrunchBang, for the uninitiated.
-
Derivatives
-
By now, most if not all of you have seen Philip Newborough’s announcement that he is moving on. First things first: Thank you, Philip, for providing sensible and solid leadership over the past several years. And, of course, all of us are grateful for your bringing CrunchBang — a simple and solid distro that works on a wide range of hardware — into the world.
-
Philip Newborough today announced the end of his Linux project that produced the fairly popular CrunchBang distribution. A few years back it seemed like a post would pop up every few days praising CrunchBang but Newborough said today that it was time to call it quits. “When progress happens, some things get left behind, and for me, CrunchBang is something that I need to leave behind.” He said his users would be better off using vanilla Debian nowadays. Once upon a time CrunchBang filled a niche but today there are other more popular choices according to Newborough. He said of CrunchBang, “I honestly believe that it no longer holds any value.” So the community bids adieu to yet another favorite…
-
Canonical/Ubuntu
-
-
-
-
The BQ Aquaris E4.5 Ubuntu Edition smartphone has been announced and will begin shipping in the days ahead.
-
Canonical and BQ are launching the first Ubuntu Touch phone — the dual-SIM, quad-core, 4.5-inch “Aquaris E4.5 Ubuntu Edition” — for 170 Euros unlocked.
Starting on Monday, Spanish mobile manufacturer BQ will begin selling the world’s first Ubuntu-based phone, the Aquaris E4.5. The long-awaited Ubuntu phone will initially be sold in a series of limited volume “flash sales” across Europe that will be announced in the coming week. You can buy the dual-SIM phone unlocked for 169.90 Euros (about $190) and then purchase SIM bundles from 3 Sweden, amena.com (Spain), giffgaff (UK), and Portugal Telecom.
-
Canonical announced today that the first Ubuntu phone, made in partnership with BQ, called Aquaris E4.5 Ubuntu Edition, will go on sale in Europe starting next week on BQ.com, through a series of “flash sales”, and it will cost 169.90 Euros (~ $193 / £127).
-
Jane Silber, CEO at Canonical comments; “The launch of the first Ubuntu smartphones is a significant milestone. The new experience we deliver for users, as well as the opportunities for differentiation for manufacturers and operators, are a compelling and much-needed change from what is available today. We’re excited that a rising star like BQ has recognised this opportunity and is helping us make it a reality.”
-
-
-
-
-
-
-
-
-
-
-
-
Let’s face it, if you’re going to buy a new smartphone, you’re probably looking at the iPhone and Android first, because almost everyone you know has either one or the other, You may also be inclined to try other things such as Windows Phone and BlackBerry, which may better suit your current smartphone needs. But don’t forget that there are plenty of other mobile operating systems to choose from, although they’re not very popular.
-
-
-
-
-
Unity 8 is coming to the Ubuntu desktop and it’s bringing with it the Mir display server, Qt implementation, and a host of other core modifications. That doesn’t mean that traditional GTK+ apps won’t work anymore and there is proof of that.
-
Following the announcement of the BQ Aquaris E4.5 Ubuntu Edition that will begin going up for sale next week, the first real hands-on videos of the Ubuntu Phone in action are starting to come out…
-
BQ and Canonical announced the Aquaris E4.5 Ubuntu Edition yesterday, which will available for purchase very soon, but only in Europe. The rest of the world will have to wait, but there is good news. The United States haven’t been forgotten and plans are in motion to have a hardware partner for those territories as well.
-
-
The Creator 120 and the Raspberry Pi 2 are single-board computers designed for developers and hobbyists.
The Creator C120 was announced in late 2014, but started shipping at about the same time that the Raspberry Pi 2 was announced/starting shipping, which was just last week.
-
Phones
-
Tizen
-
The Tizen based Samsung Z1 has now gone on sale in India, and now has also began its rollout in Bangladesh, but there is one major problem that faces overseas linux enthusiasts / early Tizen adopters that have purchased the Z1, namely being you can only access the Tizen Store using the Samsung Z1 from the country that this product is currently being sold in.
-
Android
-
Samsung is losing ground, and that has allowed iOS to overtake Android in the US. But with the flagship Samsung Galaxy S6 now on the horizon, will it have what it takes to win back the fans.
-
Over the past year some excellent Android tablets have been released to rival Apple’s popular iPad lineup, and choosing the right one can sometimes be difficult. These days consumers have a lot of choices and making a decision isn’t going to be easy. This is especially true for the average buyer that doesn’t keep up with the latest and greatest device announcements, or know about budget options released during the year.
-
-
Part of the allure of Android One was that it would bring faster, almost Nexus-like updates to lower end phones, promising an affordable offering that would still provide a decent Android experience. With the slow update to Lollipop and the fact that sale numbers are reportedly not all that high, is Android One delivering on this promise? That’s exactly what we wish to discuss for this week’s Friday Debate. Can Android One prove to be a success, despite a somewhat slow start, or with so many other affordable devices is it a largely unnecessary program?
-
-
Cloud has become one of the buzzwords in modern computing; there are so many advantages of cloud that it can’t be ignored. It is becoming an integral part of our IT infrastructure. However cloud poses a serious threat to the ownership of data and raises many privacy-related questions. The best solution is to ‘own’ your cloud, either though an on-premise cloud running in a local network disconnected from the Internet or one running on your own secure server. Seafile is one of the most promising, open source-based cloud projects.
-
Last week I was in Italia at the Cisco Live! Milano event where I also had the opportunity to speak about OpenDaylight (ODL) and Software-Defined Networking (SDN). What stood out for me the most during my time there was the tremendous progress being made on technologies that are really disrupting the networking space
SDN and NFV have been advancing innovation in the networking industry over the past few years, but it’s still early, and not many of the technologies have made it out of the lab and into the networks – until now.
-
Events
-
-
The calls for proposals (CFPs) for Linux Plumbers Conference microconferences and refereed track presentations are now up. The conference will be held August 19-21 in Seattle, WA, co-located (and overlapping one day) with LinuxCon North America.
-
The X.Org Board of Directors have decided on Toronto, Canada as the location for this year’s annual X.Org Developers’ Conference.
-
The second release candidates to Wayland 1.7 and the reference Weston compositor is now available.
Wayland 1.7 RC2 fixes a regression on older systems (Ubuntu 12.04 ea) and a fix for a test failure on systems with the Yama Linux Security Module enabled. Wayland 1.7 RC1 was released last week.
-
SaaS/Big Data
-
Encouraged by the promise of cost savings and better efficiency, early adopters are wading into Hadoop as a central reservoir for their analytics data.
-
I recently taught an MBA course at the University of San Francisco titled the “Big Data MBA.” In working with the students to apply Big Data concepts and techniques to their use cases, I came away with a few observations that could be applied by any entrepreneur.
-
Pivotal, the cloud computing spinoff from EMC and VMware that launched in 2013, is preparing to blow up its big data business by open sourcing a whole lot of it.
Rumors of changes began circulating in November, after CRN reported that Pivotal was in the process of laying off about 60 people, many of which worked on the big data products. The flames were stoked again on Friday by a report in VentureBeat claiming the company might cease development of its Hadoop distribution and/or open source various pieces of its database technology such as Greenplum and HAWQ.
-
Though the open-source OpenStack cloud platform only has two major releases in any given year, each release is preceded by a steady cadence of incremental milestone updates.
-
FSF/FSFE/GNU/SFLC
-
In recent times Red Hat has proven, through their political maneuvering and control over the GNU/Linux community, the need to rethink the definition of “Software Libre”. The violent and absurd landing of systemd over 99% of the GNU/Linux distributions is proving that it is not enough that the source code of the software is free for users to be free. We have lost the freedom of choice, control, and decisions made on our systems.
In the times we live is not enough that the source code is released under the GPL license to ensure that software is free. Some years ago, when words GNU and Linux perhaps were known to few, and the companies behind them were not competing for the millions of dollars generated today, perhaps this was true. But today there are other variables at play such as freedom of developers and users.
Whoever controls the free software developers will be able to control his users. It has become clear that even though the source code is free, if the user loses his ability to choose freely and hasn’t resources (knowledge, time and money) to adapt the code to your needs and/or preferences, ” freedom “is an empty word.
-
Richard Stallman has come out against support for basic LLVM debugger (LLDB) support within Emacs’ Gud.el as he equates it to an attack on GNU packages.
-
The GNU C Library version 2.21 is now available.
-
Project Releases
-
After Opera 27 stable, Opera 28 beta released with new features and improvements. The new major features are regarding bookmarks, syncing bookmarks with multiple devices is very useful feature added to this beta release.
-
Public Services/Government
-
“Our nation’s elections systems and technology are woefully antiquated. They are officially obsolete,” says Greg Miller of the TrustTheVote Project, an initiative to make our voting system accurate, verifiable, transparent, and secure. He adds: “It’s crazy that citizens are using twentieth-century technology to talk to government using twentieth-century technology to respond.”
Miller and others are on a mission to change that with an entirely new voting infrastructure built on open-source technology. They say open source, a development model that’s publicly accessible and freely licensed, has the power to upend the entire elections technology market, dislodging incumbent voting machine companies and putting the electorate at the helm.
-
Licensing
-
You’ve found an amazing open source project that you think will enhance your proprietary software. But before you and your team of developers can get to work incorporating someone else’s code into your own product, there are some basic steps that you need to take.
-
Openness/Sharing
-
This week the team at Raspberry Pi unvieled the Raspberry Pi 2. Its increased horsepower means that emulation of the Nintendo 64 and Playstation 1 are possible, as the Raspberry Pi team shows us with some gameplay footage of Mario Kart 64 and Spyro the Dragon.
-
Free and Open Source software has revolutionized how the world consumes software. Linux, BSD, httpd, nginx, MySQL, PostgreSQL, and thousands of other software products are consumed voraciously. But almost universally people are only consuming. And generally that’s okay. Sharing is one of the key tenets and strengths – that we are able to freely share code to help our neighbor.
-
Health/Nutrition
-
According to the World Health Organization, they have a higher measles immunization coverage among 1-year-olds than the United States. And, as this interactive map shows, they are far from alone.
-
The agency’s new inspection model is a threat to food safety, federal whistleblowers allege
-
Security
-
We’re addicted to Adobe Flash, and it’s time to break the habit. In the last three months, multiple Flash security holes have been found and exploited. In the last two weeks alone, security expert Brian Krebs has reported that Adobe has released three emergency Flash security patches. Enough already.
-
A while back I wrote about John McAfee saying that North Korea had nothing to do with the Sony breach, now Taia Global a US security firm is stating that Russian hackers could have been the ones behind the attack and that they could still have access to Sony’s servers.
-
-
There’s a new twist in the already tangled tale of the Sony Pictures mega-hack: it’s now claimed Russians possibly broke into the company’s computers.
-
The insurer acknowledged that data accessed by hackers had not been encrypted, as is the normal practice at many companies.
-
Defence/Police/Secrecy/Aggression
-
In other words, Kissinger blames the U.S. and Europe for the current catastrophe in Ukraine. Kissinger does not begin at the point where there is military conflict. He recognizes that the problems in Ukraine began with Europe and the U.S. seeking to lure Ukraine into an alliance with Western powers with promises of economic aid. This led to the demonstrations in Kiev. And, as we learned from Assistant Secretary of State Victoria Nuland, the U.S. spent $5 billion in building opposition to the government in Ukraine.
-
For years, some current and former American officials have been urging President Barack Obama to release secret files they say document links between the government of Saudi Arabia and the Sept. 11 attacks.
-
Questions over the 28-page section of the congressional report have been raised this week following the deposition of imprisoned former al-Qaeda operative Zacarias Moussaoui in which he claimed major Saudi figures were donors to his group in late 1990s.
Saudi officials have denied this.
According to White House spokesman Josh Earnest, US intelligence last year began reevaluating the decision to classify the section following a request from congress, though no timescale for the decision was given.
-
Although U.S. drones firing missiles at suspected bad guys in faraway places — such as Pakistan, Yemen, and Somalia — have gotten much publicity in recent years, it was recently revealed that the CIA assassinated top Hezbollah terrorist Imad Mugniyah with a good old-fashioned car bomb in Damascus, Syria with President George W. Bush’s strident approval in 2008. Because of an executive order, signed in 1975 by President Gerald Ford, prohibiting assassinations by the CIA, presidents usually get around that order by using the military to kill an enemy bigwig and then make the disingenuous claim that it was merely taking out a “command and control” target rather than an assassination. In this case, Bush, never one to observe constitutional or legal niceties, became incensed that the CIA director was being too timid in carrying out the hit using the exploding car. The real issue in such cases is not whether it is more dangerous to liberty to kill the enemy using a high-tech drone or a more traditional car bomb, but whether it constitutional to do either.
-
But despite their vaunted precision, there are reports the latest strike in Somalia, on January 31, killed or injured civilians.
-
At least 45 suspected al-Shabaab militants have been killed in drone strikes in Southern Somalia on Saturday, a government official said.
-
A commander of Islamist militant group al-Shabaab was killed in a US drone attack in Somalia, the East African nation’s National Intelligence and Security Agency said Wednesday.
“The killed al-Shabaab commander is called Abdinur Mahdi, also known as Yusuf Dheeg,” NISA said in a statement.
Dheeg, who was killed on Saturday, was in charge of coordinating attacks inside and outside of Somalia, as well as assassinations and suicide bombings, the statement added.
-
At least 2,464 people have now been killed by US drone strikes outside the country’s declared war zones since President Barack Obama’s inauguration six years ago, the Bureau’s latest monthly report reveals.
-
This week Women Against War and members of several other Capital District peace groups joined in a Statewide lobbying initiative of our two Senators, Kirsten Gillibrand and Chuck Schumer, after having to re-schedule our Monday appointments due to the foot of snow and more that fell on the area.
-
According to Peter Singer, a Senior Research Fellow at the Brookings Institute, “The first predator drones were used in 1995 during the Balkan conflicts in Bosnia and Kosovo. By 2000, the Air Force was developing ways to weaponize predator drones, as they were previously used exclusively in spy missions. When the US started the war in Iraq, back in 2003, there were a handful of drones in the air. By 2010, there were over 5,300 drones operating in Iraqi airspace. Additionally, the US went into Iraq with zero unmanned ground systems. By 2010, there were over 12,000 operating in the combat zone.”
-
Three BBC journalists have been questioned by Swiss police for breaching high-level security protocols by using a drone at the World Economic Forum in Davos last month.
-
My fear is that some of the dishonest people in government will abuse drones and push for drone strikes on U.S. soil. Food for thought.
-
It was recently reported that $400 million worth of US military weapons went missing in Yemen over the past several years. The equipment includes helicopters, night-vision gear, surveillance equipment, military radios and airplanes.
-
Chaos in the functionally leaderless country has seen Houthi rebels reportedly take control of Yemeni military’s arms depots and bases
-
America’s war machine breeds enemies faster than the US can kill them, argues Larry Beck.
-
As Europe still reels from the Charlie Hebdo and Hyper Cacher attacks in Paris, something far more profound to Western security is happening largely unnoticed—the failure of remote-control warfare. Open Briefing’s remote-control warfare briefing for January, commissioned by the Remote Control project, identified and analysed several trends, which taken together indicate the tactics and technologies deployed are coming back to haunt those Western powers that have embraced them in recent years.
-
President Obama is being urged to supply Ukraine with “defensive lethal assistance”, which sounds almost like a contradiction in terms. James Morgan asks what people mean by “defensive” weapons – and finds out it’s what a hedgehog has.
It’s widely believed in the US, and in other Nato countries, that Russia is not only arming the rebels but sending soldiers to fight alongside them, so the pressure is increasing on the White House to ramp up military supplies to the Ukrainian government to help it resist a new offensive.
Currently the US only provides non-lethal equipment, such as gas masks, night-vision goggles and radar. How much further can it go without escalating the conflict or being seen as an aggressor?
-
The leaders of Germany and France fly to Kiev and Moscow with new Ukraine peace plan as Nato bolsters eastern Europe against Russia and EU agrees new sanctions. Follow the latest developments
-
Vladimir Putin has restarted his war against Ukraine, and the U.S. and Europe are unsure how to respond. While Europe has apparently decided that no toughening of economic sanctions is called for, some in Washington are calling for equipping Ukraine with lethal weapons.
Yet arming Ukraine is likely to backfire: It risks misleading the country — which is now pressing to join the North Atlantic Treaty Organization — into believing the U.S. will do what it takes to defeat Russia. It also risks encouraging Russia to expand the war, because it knows the U.S. and its NATO allies don’t have sufficient interests at stake to go all the way. The parallels often drawn with the war in Bosnia, where a U.S. arms and training program eventually turned the war and forced a peace, aren’t helpful: Serbia was a military minnow next to Putin’s nuclear-armed Russia.
-
Video gamers are more prepared for military service than people the same age were in previous generations.
“We don’t need Top Gun pilots anymore, we need Revenge of the Nerds,” said Missy Cummings, former US Navy pilot, Assoc. Prof. of Aeronautics, MIT in Drone Wars: The Gamers Recruited To Kill, a documentary film about gamers and drone operators.
-
Many who are praising the film say the movie is about him, not about the politics of the Iraq war. “It’s a movie about a man, a character study,” said lead actor Bradley Cooper. “The hope is that you can somehow have your eyes opened to the struggle of a soldier, as opposed to the specificity of the war.” Others argue American Sniper is “both a tribute to the warrior and a lament for war,” as the Associated Press reviewer wrote.
Bullshit. Regardless of the intentions of those making these claims, bullshit.
This is a profoundly reactionary movie. American Sniper humanizes and glorifies Chris Kyle, an unrepentant Christian fundamentalist mass murderer, who killed 160 Iraqis (supposedly the most “kills” by any U.S. soldier in history). Meanwhile, the movie demonizes and dehumanizes every single Iraqi (with the possible exception of one family), portraying them as evil terrorists and “savages” who deserve to die.
By telling this story through Kyle’s eyes and purported experience (and prettifying that story), American Sniper weaves a fable about the U.S. invasion of Iraq and its role in the world: America is a force for good. Whatever its mistakes, the U.S. sends its military to places like Iraq to try to protect the innocent and destroy evil. It promotes the outlook that only America and American lives count and anything goes to “defend” them. This is the big lie on the big screen.
-
The Pentagon is doubling down on the development of a new arsenal of stealth fighters, bombers, and drones in its newly unveiled budget for next year.
Never mind the “fifth generation” stealth jets currently rolling off defense contractor assembly lines. The Pentagon is starting to pour money into three different projects to research and develop “sixth-generation” stealth fighters, plus funding for a new Air Force stealth bomber and new Navy carrier-based stealth drone.
-
Brussels. Ottawa. Sydney. Paris. “Terrorist” attacks in these western cities in the last one year have claimed 29 lives. Add to this the beheadings of western citizens by the Islamic State. The horror evoked by these has led to an outcry against Islam and fierce debates about the necessity of reform in Islam. In France, 3.7 million people marched in solidarity — in the largest public rally since the Second World War — with the victims of Charlie Hebdo to show that western civilisation cannot be defeated by Islamic fanatics.
We are back to the days of 9/11 and other terror events in the West, and the debate assumes familiar directions: freedom of speech versus violent threats to it and the enlightened West versus barbaric Islam. We are presented this black and white world even by non-Muslim and non-western nations who have joined the project of moderating and domesticating Islam. Of course, there have been nuanced positions which have affirmed the right to free speech while at the same time calling out Charlie Hebdo for its racist portrayals of Islam. But the issue is larger than this.
-
The Pentagon would get $585 billion next year under the Obama administration’s proposed budget, reversing a five-year decline in military spending and blowing past mandatory spending caps imposed by Congress.
-
The Pentagon has said it has killed 6,000 fighters since coalition strikes began five months ago; the intelligence community estimates 4,000 foreign fighters have entered the fray since September. (A higher estimate, made by The Washington Post, holds that 5,000 foreign fighters have flowed into the two countries since October.)
-
New Zealand’s contribution to oppressed peoples’ fighting US imperialism will be high on the agenda of his talks in Wellington today with British Foreign Secretary Philip Hammond.
-
Agonizing as it may be, we need to stand humbly before all these fraught, painful questions because the problem in Mindanao is neither just a military, a legal, or an institutional problem—something that could be solved by increased firepower, policy formulation or institutional reengineering. It is ultimately and inescapably a moral problem: something that could only be solved by resolving broader questions of power and justice—and thus, something, that could only be solved through politics in the broader sense of the term: politics not as wheeling and dealing, but politics as the struggle over how we should live with our fellow human beings, over how should organize our society so we can live the “good life”—the kind of politics that people will kill and die for.
-
They were not alone. Big Brother was up there monitoring their every move.
“Kasalukuyan pong nag-e-encounter ang 5th Battalion sa Maguindanao para sa misyon kay Marwan” (The 5th Battalion is right now engaged in a mission in Maguindanao against Marwan), an officer from the assault team said, recording what was happening on the ground about 8 in the morning of Jan. 25 in Mamasapano, Maguindanao.
-
A drone sent by the United States was key in locating pinned Philippine National Police Special Action Force units during the recent Mamasapano operation where 44 elite lawmen were killed, “24 Oras” reported on Wednesday.
According to the GMA News source, the US sent a drone to Mamasapano, Maguindanao after the PNP-SAF asked for support.
-
Relatives describe Mohammed as a joyful 12 year old, enjoying school. When he was killed in a latest drone strike in Yemen, authorities listed him as a ‘militant’. The family previously lost Mohammed’s father and brother in a similar attack.
Mohammed Saleh Qayed Taeiman had been among the three killed in the drone strike last week, according to the Yemeni National Organization for Drone Victims (NODV). It also said that previous US drone strikes had killed Mohammed’s father and his brother in 2011, and in a separate attack, another brother had been injured.
-
The Islamabad High Court (IHC) has summoned Islamabad Police Inspector General (IG) Tahir Alam Khan on February, 9 in contempt of court case against Islamabad Secretariat Police station house officer (SHO) for not registering murder case of two people killed in a drone attack in the area of Mir Ali at South Waziristan in 2009.
As the case came up for hearing before IHC Monday, Mirza Shahzad Akbar, counsel for petitioner Karim Khan, Assistant Sub-Inspector (ASI) Nawaz Bhatti from Secretariat Police Station and legal counsel Abdul Rauf appeared in the court.
-
While it is unclear if they were drone strikes versus another type of aerial assault, BIJ notes that 2014 saw the highest number of confirmed U.S. drone strikes in the east African nation of any year despite the administration’s praise of Somali government reforms.
-
This is the first attack since Monday, when the US similarly destroyed a car in Maarib and similarly labeled all of the slain “al-Qaeda” only for one to turn out to be a 12-year-old student.
-
A 12-year-old Pakistani boy who lost his grandmother in a U.S.-led drone strike says he is afraid of the blue sky; he would rather see the gray sky because he knows then that the drones will not fly. Unmanned Aerial Vehicles (UAV’S), commonly known as drones, and particularly armed drones, are most effective when weather conditions provide for clear visibility, hence the better ability to hit identified targets. Drones aren’t flown on overcast days due to cloud cover and lack of visibility.
-
A policy of targeted extrajudicial assassination is by its very nature immoral.
[...]
Once extrajudicial killing was policy reserved for rogue nations like Nazi Germany and communist Russia. Rep. Barbara Lee, the only member of Congress to vote against the AUMF, said in her dissenting vote, “Let us not become the evil we deplore.” We now know that drone warfare, no matter how it is managed, is in fact a deplorable evil.
-
Jordan executed two Iraqi prisoners Wednesday, in answer to the Islamic State group’s killing of a Jordanian hostage in Syria.
Jordanian officials hanged an Iraqi woman sentenced to death for her role in a 2005 suicide bombing in Amman. It also executed another Iraqi who had ties to al-Qaida.
-
When ISIS beheaded two American journalists, there was outrage and denunciation throughout the West, but when the same ISIS beheaded hundreds of Syrian soldiers, and meticulously filmed these war crime, this was hardly reported anywhere. In addition, almost from the very beginning of the Syrian tragedy, al-Qaeda groups have been killing and torturing not only soldiers but police, government workers and officials, journalists, Christian church people, aid workers, women and children, as well as suicide bombings in market places. All this was covered up in the mainstream media, and when the Syrian government correctly denounced this as terrorism, this was ignored or denounced as “Assad’s propaganda.”
So why weren’t these atrocities reported in the western media? If this was reported it would have run counter to Washington’s proclaimed agenda that “Assad has to go,” so the mainstream media followed the official line. There is nothing new in this. History shows that the media supported every Western-launched war, insurrection and coup – the wars on Vietnam, Afghanistan, Iraq, Libya, Syria, and coups such as those on Iran, Guatemala, Indonesia, Chile, and most recently in Ukraine.
-
If Yemen is any kind of model, it is a model of how badly U.S. interventionism has failed.
-
From record ticket sales to major media accolades, from the halls of Congress to the White House, the nation has spoken: “American Sniper” is all-American. Chris Kyle—the most lethal killer in U.S. military history, a true hero, a brave warrior—has been anointed as a role model for all that America has come to stand for.
-
Over the weekend, The Washington Post reported on a joint U.S.-Israeli operation that killed Imad Mughniyah—Hezbollah’s reported chief of international operations—on the streets of Damascus in 2008. The account raises questions about whether the killing violated international law, and central to the Post’s story is the assessment that these actions “pushed American legal boundaries.”
-
Consider the staggering number of murders of innocent human beings committed by the United States government — and ask yourselves how many Auroras those murders represent. I have tried to make calculations of this kind before: using conservative estimates of the deaths in Iraq, the murders in that country alone represent a 9/11 every day for five years. An equivalent number of Auroras would be much higher. modified from Arthur Silber
-
So what happened? The Arab Spring didn’t go as hoped — and the United States began to lose the war. An al-Qaida offshoot shockingly conquered large swaths of Iraq and Syria. Libya descended into civil war. Yemen, which Obama cited just last year as proof of his successful strategy, is on a similar downward spiral. The Taliban is gaining ground in Afghanistan. Boko Haram is carving out another space for barbarism in Nigeria.
-
We’ve been trained to think of war preparations — and the wars that result from being so incredibly prepared for wars — as necessary if regrettable. What if, however, in the long view that this book allows us, war turns out to be counterproductive on its own terms? What if war endangers those who wage it rather than protecting them? Imagine, for a moment, how many countries Canada would have to invade and occupy before it could successfully generate anti-Canadian terrorist networks to rival the hatred and resentment currently organized against the United States.
-
The U.S. spends nearly $1 trillion on national security programs and agencies annually, more than any other nation in the world. Yet despite this enormous investment, there is not enough evidence to show the public that these programs are keeping Americans any safer – especially in the intelligence community. Excessive government secrecy prohibits the public and oversight agencies alike from determining whether our expensive intelligence enterprise is worth the investment.
-
Transparency Reporting
-
The UK government has now spent £10 million keeping Wikileaker Julian Assange holed up in the Ecuadorian Embassy in London.
A website set up by Wikileaks supporters, called govwaste.co.uk, has a counter on the front page that has just creeped past the £10,000,000 mark. The website reads: “Julian Assange has been effectively detained without charge since December 2010.
-
Nick Clegg could face legal action following remarks made about WikiLeaks founder Julian Assange. Speaking on LBC on Thursday, the deputy prime minister commented on Assange’s long stay at the Ecuadorian embassy in London and the £10 million cost of policing the building – comments Assange believes could be defamatory.
-
In SILENCED: The War on Whistleblowers, three Americans reveal the persecution they’ve faced after they dared to question U.S. National Security policy in post 9/11 America. Everyone knows the name Edward Snowden, the fugitive and former intelligence contractor, but Academy Award nominated documentarian James Spione introduces us to three other whistleblowers of the era, speaking for the first time in one film, who discuss in dramatic and unprecedented detail the evolution of the government’s increasingly harsh response to unauthorized disclosures.
-
Finance
-
The funding round, which comes from Quest Venture Partners, Crypto Currency Partners and the AngelList Bitcoin Syndicate, among others, is a step towards creating a scoring system for addresses on bitcoin’s network.
-
-
President Obama has unveiled his $4 trillion budget proposal for next year, asking Congress to raise taxes for the wealthy and corporations to help fund education and fix crumbling infrastructure. The plan includes tax cuts for some poor and middle-class families. It also seeks to recoup losses from corporations that stash an estimated $2 trillion overseas by taxing such earnings at 14 percent, still less than half of the 35 percent rate for profits made in the United States. The budget takes aim at the high cost of prescription drugs, proposes a new agency to regulate food safety, and seeks $1 billion to curb immigration from Central America. It also calls for a 4.5 percent increase in military spending, including a $534 billion base budget for the Pentagon, plus $51 billion to fund U.S. involvement in Syria, Iraq and Afghanistan. Speaking at the Department of Homeland Security, Obama said across-the-board cuts known as sequestration would hurt the military.
-
PR/AstroTurf/Lobbying
-
I’ll save you the trouble of writing a rejection letter, because I know why you wouldn’t run cartoons like these: You would recognize that lumping people together who have nothing in common but their religion is straight-out bigotry. You wouldn’t take it seriously as a defense if I pointed out that the Lord’s Resistance Army and McVeigh really were bad guys.
-
Mitt Romney definitely had his down sides as a candidate: the retread factor, and, as I noted two weeks ago, the fact that he made all those dramatic and (apparently) wrong predictions about the future of the economy. But I will say this for him. He did pass the this-guy-looks-and-sounds-like-a-plausible-president test. I always thought that was his greatest strength. He’s central casting.
-
Brian Williams said he is temporarily stepping away from the “NBC Nightly News” amid questions about his memories of war coverage in Iraq, calling it “painfully apparent” that he has become a distracting news story.
In a memo Saturday to NBC News staff that was released by the network, the anchorman said that as managing editor of “NBC Nightly News” he is taking himself off the broadcast for several days. Weekend anchor Lester Holt will fill in, Williams said.
-
Censorship
-
We’ve been talking a lot lately about how the new school of website design (with ReCode, Bloomberg, and Vox at the vanguard) has involved a misguided war on the traditional comment section. Websites are gleefully eliminating the primary engagement mechanism with their community and then adding insult to injury by pretending it’s because they really, really love “conversation.” Of course the truth is many sites just don’t want to pay moderators, don’t think their community offers any valuable insight, or don’t like how it “looks” when thirty people simultaneously tell their writers they’ve got story facts completely and painfully wrong.
-
An official of the Hong Kong Democratic party says Chinese authorities have seized about 8,000 rolls of toilet paper printed with the image of the territory’s pro-Beijing chief executive, Leung Chun-ying.
Lo Kin-hei, a vice-chairman of the liberal party, said on Saturday that police seized the toilet paper and another 20,000 packages of tissue paper from a factory in the Chinese city of Shenzhen where a friend of the party placed the order to obscure the party as the true buyer.
-
Agency brass tried to spike a story implicating the CIA in the killing of a top Hezbollah terrorist. Newsweek complied. The Post didn’t.
-
Privacy
-
It is a rare thing to bring truth to bear on the most powerful and secretive arm of the state. Never before has the Investigatory Powers Tribunal – the British court tasked with reviewing complaints against the security services – ruled against the government. Not once have the spooks been taken to task for overstepping the lawful boundaries of their conduct. Not a single British spy has been held accountable for mass surveillance, unlawful spying or snooping on private emails and phone calls.
-
In its first ruling against an intelligence agency since it was set up in 2000, the Investigatory Powers Tribunal (IPT) declared today that GCHQ’s access to information intercepted by the US National Security Agency (NSA) breached human rights laws.
-
GCHQ, the UK intelligence agency, unlawfully accessed millions of personal communications collected by the NSA, the Investigatory Powers Tribunal (IPT) has ruled today.
The Tribunal is the only UK court with the power to oversee GCHQ, Mi5 and Mi6. This is the first time it has ever ruled against one of the intelligence and security services.
-
The Investigatory Powers Tribunal (IPT) has declared British intelligence services acted unlawfully by accessing the personal communications data gathered by the US National Security Agency (NSA).
The IPT, set up 15 years ago to oversee the activities of GCHQ, MI5 and MI6, ruling follows a complaint made by several civil liberties organisations, including Amnesty International, Privacy International, Bytes for All and Liberty.
The Tribunal said the way intelligence was shared between GCHQ and the NSA’s Prism surveillance programme was unlawful up until December 2014, because the rules governing the practice were kept secret.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The Investigatory Powers Tribunal (IPT) has ruled that GCHQ illegally spied on British citizens.
The tribunal, which was created in 2000 to keep Britain’s intelligence agencies in check, stated that GCHQ’s access to intercepted information obtained by the US National Security Agency (NSA) breached human rights laws.
It marks the first time that the IPT has ruled against an intelligence agency in its 15-year history.
-
The sharing of mass surveillance data between U.S. and U.K. intelligence services was unlawful before December 2014, but since then it has become legal, a U.K. tribunal has ruled.
-
-
The British government and its intelligence agencies have successfully fended off the privacy lobby for more than a year and a half since the first of the Snowden revelations, engaging in the time-tested tactics of attack, obfuscation and setting up sham inquiries.
That strategy worked until Friday when the ruling of the investigatory powers tribunal (IPT) blasted a hole through it.
-
In a bizarre twist of events the Tribunal declared that intelligence sharing between the United States and the United Kingdom had been unlawful prior to December 2014, because the rules governing the UK’s access to the NSA’s PRISM and UPSTREAM programmes were kept secret.
Prior to December last year, the secret policy breached Article 8, the right to a private life, and Article 10, the right to freedom of expression without State interference, the tribunal said.
-
-
-
-
-
-
A COURT HAS RULED THAT AN UNDER-THE-COUNTER information sharing pact between the US National Security Agency (NSA) and GCHQ was unlawful.
-
The U.S. National Security Agency and its intelligence partners are reportedly sifting through data stolen by state-sponsored and freelance hackers on a regular basis in search of valuable information.
Despite constantly warning about the threat of hackers and pushing for their prosecution, the intelligence agencies of the U.S., Canada and the U.K. are happy to ride their coattails when it serves their interests, news website The Intercept reported Wednesday
-
-
With that new equipment in place in January 2013, the state was seeing an average of 50,000 a day with spikes up to 20 million, Squires told The Associated Press. In February 2013, the number rose to an average of 75 million attacks a day, with up to 500 million on some days.
-
Paranoid about the National Security Agency spying on you via your webcam? Don’t be. It’s safe to webchat again. Well, at least if you’re Keith Alexander, former director of the National Security Agency. That is, unless he’s watching you.
Alexander was spotted on Tuesday on a train from Washington to New York by the principal technologist of the American Civil Liberties Union (ACLU), Chris Soghoian. The four-star general turned top paid security consultant was working away on his Apple Macbook with the webcam uncovered.
-
New initiatives on data collection by the US Government will set certain limitations on the use of signals intelligence collected in bulk.
-
-
-
The US Intelligence community has proposed to limit the length of time it can hold information on citizens and hide secret data collections.
The proposals are in response to President Barack Obama‘s statement a year ago, in which he said that reform was needed for American surveillance practices in the wake of the Edward Snowden revelations about NSA snooping.
-
A recently launched website that tracks and lists transparency reports from across the web has already received over 20 submissions since its launch on Monday, co-founder Nadia Kayyali told the Sputnik international news service.
Kayyali, who is also an activist at the Electronic Frontier Foundation (EFF), said that EFF became involved in the project because they thought it was important to provide information to people about what companies have so-called ‘canaries.’
-
-
-
Oregon Senator Ron Wyden is calling on President Barack Obama to immediately end the National Security Agency practice of scooping up huge amounts of data from innocent Americans.
He said that data includes phone calls that start and end in America.
“The president has the authority to end this dragnet surveillance immediately,” Wyden said. “The idea of collecting millions of phone records on law-abiding Americans doesn’t make any sense.”
-
Turns out, not even the head of the Senate Judiciary Committee can figure out what’s happened to the National Security Agency (NSA) staffers who were involved in the LOVEINT spying scandal.
-
Personal data sent to Canadian websites is often routed through the United States where the National Security Agency collects it, according to Andrew Clement, a University of Toronto professor.
-
-
After two terrorist attacks on Canadian soil, the federal government proposed new anti-terror laws. Although it’s released details on its bill, many questions remain. Will these laws affect our privacy? How about our freedom of speech? Will they improve security? Considering the experiences of our southern neighbours with mass surveillance programs and the controversial National Security Agency (NSA), these questions seem crucially important.
-
Personal data sent to Canadian websites is often routed through the United States where the National Security Agency collects it, according to Andrew Clement, a University of Toronto professor.
The professor is part of the team of University of Toronto and OCAD University students and professors that has created IXmaps , an online interactive tool that lets Canadians to see how their web traffic moves around the Internet.
-
Germany’s foreign intelligence agency has been using its sophisticated electronic systems to collect 220 million bits of metadata a day from satellites and Internet sources and shares that information with U.S. intelligence agencies, according to Zeit Online. Once it crosses the Atlantic, the National Security Agency (NSA) and Central Intelligence Agency (CIA) use it for their own spying and anti-terrorism activities.
-
Die Zeit claims the BND scoops up 220m metadata every day, through satellites and internet cables. This is just the phone-related surveillance, with the extent of web-based surveillance as yet unknown.
-
-
-
The piece, which appears to be based on official leaks ahead of a Tuesday announcement, suggested foreigners will get for the first time get limited rights regarding how their personal data is treated after it’s been scooped up by agencies such as the NSA. Whereas the data of Americans would be deleted after incidental collection, foreigners’ data would be deleted after five years.
-
The Obama administration has announced changes to the surveillance operations conducted by the United States intelligence community, but critics are already using words like “weak” to describe the so-called reform.
Adjustments to how US intel agencies collect and hold bulk data on Americans and surveillance records concerning foreigners are outlined in a report published on Tuesday this week by the Office of the Director of National Intelligence.
-
Last month, the National Research Council concluded there is no technological replacement for the National’s Security Agency’s mass surveillance and therefore should not be fully replaced.
“No software-based technique can fully replace the bulk collection of signals intelligence,” the report stated.
But there may in fact be a viable alternative — and it’s been around for more than a decade, according to J. Kirk Wiebe, a former NSA analyst.
Wiebe, who created this alternative surveillance technique, spent three decades at NSA and received its second-highest award, the Meritorious Civilian Service Award.
The idea behind Wiebe’s alternative is simple. It boils down to “connect the dots,” he said Saturday at an event sponsored by the Newseum and the Washington, D.C. Public Library.
-
-
As Obama tightens surveillance guidelines, uncertainty lingers on NSA program. “The Obama administration on Tuesday announced a series of modest steps to strengthen privacy protections for Americans and foreigners in U.S. intelligence-gathering, including an end to the indefinite gag order on certain subpoenas issued to companies for customers’ personal data,” writes the Post’s Ellen Nakashima. “At the same time, U.S. intelligence officials said they were still hoping to fulfill a goal President Obama set a year ago: ending the National Security Agency’s collection of millions of Americans’ phone records.”
-
The new rules “clearly show that the government continues to stand by a number of its troubling mass surveillance policies, despite mounting evidence that many of these programs are ineffective,” said Neema Singh Guliani of the ACLU.
-
RSA, with its noted BSafe encryption technology, was bought by EMC in 2006 for $2.1bn, with Coviello in the RSA CEO chair. Its reputation as a trusted security technology supplier was tarnished by allegations from whistleblower Edward Snowden that it was paid $10m by the NSA to use encryption tech with a backdoor for the g-men (and, by extension, world+dog).
-
British spies have warned the government they may cut off ties with their German counterparts over a parliamentary inquiry into spying by the U.S. National Security Agency (NSA).
-
The new law, set to go into effect later this year, will store data in Australian servers for two years. This data will be provided to Australian authorities, who can perform direct warrantless searches of potential criminals.
-
Resisting a campaign for greater transparency, the White House has decided to keep American taxpayers in the dark about how much they’re likely to spend on government spy agencies.
President Barack Obama unveiled his fiscal 2016 budget requests Monday with the continued omission of proposed spending levels for specific intelligence agencies, which are funded with a so-called “black budget” supplement debated and voted upon behind closed doors by congressional appropriators.
-
Zimmermann, creator of the PGP email privacy package, countered Cameron’s argument that encryption is creating a means for terrorists and child abusers to communicate in private, arguing instead that intelligence agencies such as GCHQ and the NSA have “never had it so good”.
-
As the wearable technology industry explodes, security experts warn that the data collected could be stolen or misused.
-
Following EFF’s victory in a four-year Freedom of Information Act lawsuit, the government released an opinion (pdf), written by the Office of Legal Counsel (OLC) in 2010, that concluded that Section 215—the provision of the Patriot Act the NSA relies on to collect millions of Americans’ phone records—does have a limit: census data.
-
Exploitation, either political or personal can occur from the mass information gathered in intelligence operations…
[...]
While the laws that have created this system were passed in the interest of public safety, in protection from risks of terrorism, the post-9/11 world had led to military and cyber exploitations of power that have killed many in wars and drone attacks, as well as ruining lives due to racial and radical profiling. It is vital to consider how much of our private spheres should the government be allowed to have access to. The failures of honouring American rights and dignity thus far must be rectified by transparent and honest accounts from the National Service Agency about their mechanisms of tracking potential threats and treatment of unrelated personal data. Ultimately, no government should have the authority to ubiquitously and opaquely conduct their surveillance. The people should be informed before supporting beyond intent to include the implementation.
-
The conflict between privacy and security is a long-running one, often inflamed by global threats, but always present. In a 2008 Wired article, the extent to which individual privacy should be sacrificed for matters of national security was laid bare by the then-director of national intelligence Michael McConnell.
“In order for cyberspace to be policed, Internet activity will have to be closely monitored. Ed Giorgio, who is working with McConnell on the plan, said that would mean giving the government the authority to examine the content of any e-mail, file transfer, or Web search. ‘Google has records that could help in a cyber-investigation,’ he said. Giorgio warned me, ‘We have a saying in this business: Privacy and security are a zero-sum game.’”
-
ProPublica has the details on this story, which traces Koch’s work on Gnu Privacy Guard and the Windows secure email client, GPG4Win. Since 1997, Koch has maintained and improved his own secure email software. He credits a talk by Richard Stallman for giving him the idea — at the time, the Pretty Good Privacy software package wasn’t available for export, which led RMS to challenge European programmers to create their own implementation.
-
During a 10-minute period one day in November 2008, British spies vacuumed up 70,000 e-mails to and from journalists at major media outlets in the United States and the U.K. And they did it with the blessings of Washington.
Thanks to the Snowden leaks, many Americans are familiar with the surveillance that the NSA and other agencies are conducting on American citizens and citizens of other nations. It is not only U.S. agencies that are spying on our communications; GCHQ, the U.K. equivalent of the NSA, has been conducting is own comprehensive surveillance for quite some time now. The Guardian reported last month that the British agency “has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations.” While not really a revelation in itself, this is bold, specific confirmation of what many have known since Edward Snowden came forward. We are being spied on, not only by nosy corporations and our own government, but by our “allies” as well.
-
House and Senate lawmakers are expected to reintroduce bipartisan legislation on Wednesday that would require law enforcement to obtain a search warrant before accessing the content of private emails.
The Email Privacy Act, sponsored by Reps. Jared Polis and Kevin Yoder, is landing with more than 220 cosponsors, meaning it already has the backing of more than half of House members. Sens. Patrick Leahy and Mike Lee are also slated to reintroduce their mirror version of the bill, though it was not immediately clear how many cosponsors they had on board.
-
It’s only days, a few weeks at most, into the 2015 season for state legislatures, and already there are hundreds of bills looming that challenge the power of Washington on issues ranging from Common Core to marijuana and the National Security Agency, according to a new report.
-
Another reason the Snowden affair is interesting is that it crosses the typical, dismal political categories that infect American politics. Some on both the right and the left consider Snowden a traitor. Other people from all corners of American politics deplore the invasive snooping of the NSA. Other fascinating questions are who is Edward Snowden and why is he doing this?
-
‘How do you get the audience to feel it? Not just to know it in their brains, but to walk out of the theatre and think twice as they use their phones or their email.’
She believes that telling Snowden’s story and questioning the practices of her own government was an obligation.
While she can’t say whether Snowden, still living in exile with his girlfriend in Moscow, is happy, she is confident of at least one thing.
‘I’m pretty sure he doesn’t have any regrets.’
-
When film director Laura Poitras calls from New York, she warns that our conversation is likely to be monitored by the US Government.
Since 2006, after she released the first documentary in her trilogy about America post 9/11, she has been stopped and detained by federal agents at US airports every time she enters the country.
-
Edward Snowden is the fourth most admired man among Germans, according to a new YouGov poll. The NSA whistleblower, whose leaks exposed US spying on German officials – including Angela Merkel’s mobile phone, came in just ahead of racecar driver Michael Schumacher.
-
-
Mass surveillance isn’t the security blanket that politicians are holding it up to be. For many people surveillance makes them less safe.
-
NIS agents were found to have meddled in the 2012 presidential election in the form of an online smear campaign targeting the opponent of the eventual winner, conservative Park Geun-hye. Last year, Won Sei-hoon, the agency’s then-director general, was found guilty of overseeing the operation and sentenced to two years in jail.
-
On February 4, 2015 Rep. Ted Poe of Texas asked for permission to address the United States House of Representatives:
The SPEAKER pro tempore. “Under the Speaker’s announced policy of January 6, 2015, the Chair recognizes the gentleman from Texas (Mr. Poe) for 30 minutes.”
Mr. POE of Texas. “Mr. Speaker, just a few weeks ago, this Chamber was filled with Members of the House of Representatives, and all of us stood up and raised our right hands, and we took an oath to support and defend the Constitution of the United States. It is the same oath the President takes and that others take–the military. We do that for a lot of reasons, but the main reason is that, in this country, the Constitution is paramount to all other law. I agree with that philosophy. The Constitution, I think, is a marvelously written document, as well as the Declaration of Independence, which justified the reason for us to start our own country.
-
Almost two-thirds of investigative journalists (64 percent) polled in a recent survey said they believe that the U.S. government has probably collected data about their phone calls, e-mails, or online communications. Furthermore, 80 percent of those surveyed believe that being a journalist increases the likelihood that their data will be collected.
-
NSA whistleblower Edward Snowden’s revelations of mass surveillance by government agencies has made a big impact on investigative journalists, according to a new study.
The survey of 671 journalists, conducted by the US-based Pew Research Center and Columbia University’s Tow Center for Digital Journalism, found that 64% believe that the US government has probably collected data about their communications.
-
Civil Rights
-
This is the first article in a five part series examining the US legal system. The series collectively argues that corporate media and political rhetoric have made Americans acquiescent toward corruption in the US legal system. This piece examines how discourse regarding law enforcement related issues in the US has been constructed to justify abuse by the police.
-
Conservative media lashed out at President Obama for mentioning the Crusades and Inquisition at the National Prayer Breakfast after condemning the Islamic State (ISIS or ISIL) as a “death cult” that distorts Islam.
-
Guest Attacked Obama For Not Letting Company His Firm Represents Sell Drone To Jordan
-
Anyone paying attention knows that 9/11 has been used to create a police/warfare state. Years ago, NSA official William Binney warned Americans about the universal spying by the National Security Agency, to little effect. Recently, Edward Snowden proved the all-inclusive NSA spying by releasing spy documents, enough of which have been made available by Glenn Greenwald to establish the fact of NSA illegal and unconstitutional spying, spying that has no legal, constitutional, or “national security” reasons. Yet Americans are not up in arms. Americans have accepted the government’s offenses against them as necessary protection against “terrorists.”
-
Former pro cyclist Lance Armstrong was issued two traffic citations in January for allegedly hitting two parked vehicles in Aspen’s West End and leaving the scene — with his girlfriend apparently telling police initially that she had been behind the wheel in order to avoid national headlines.
-
Messrs. Petraeus and O’Hanlan are unconcerned about the nation’s alarmng liberty and justice deficit. The President plays prosecutor, judge, jury, and executioner to kill any American citizen he decreees based on secret evidence is a threat to the national security. Thousands of innocent civilians abroad are killed by predator drones. The National Security Agency conducts surveillance against the entire United States population without suspicion that even a single target has been complicit in crime or international terrorism.
Individuals are detained indefinitely without accusation or trial at Guantanamo Bay. Eighteenth century British legal scholar William Blackstone — who was gospel to the Founding Fathers — wrote: “[T]o bereave a man of life, or by violence to confiscate his estate, without accusation or trial, would be so notorious an act of despotism, as must at once convey the alarm of tyranny throughout the whole kingdom.”
-
In the dead of night, they swept in aboard V-22 Osprey tilt-rotor aircraft. Landing in a remote region of one of the most volatile countries on the planet, they raided a village and soon found themselves in a life-or-death firefight. It was the second time in two weeks that elite U.S. Navy SEALs had attempted to rescue American photojournalist Luke Somers. And it was the second time they failed.
-
The imperial presidency persists. Look at Obama and his drones. Look at George W. Bush. Bush, who lost the popular vote, stole the 2000 election with the Electoral College’s help. As for the Senate, it is surely the world’s most undemocratic legislative body. Since every state gets two senators, one Californian voter has some 1.5 percent of a Wyoming voter’s power. Wyoming’s population is smaller than NJ’s Bergen or Middlesex counties. Senators from Mississippi or Utah can then filibuster and kill reforms voters from demographic mega-states like California or New York demand. These states are less urbanized and diverse in general. With growing inequality between the classes and races, and growing repression in the form of mass incarceration, we need to radically reform and amend our Constitution. As political scientist Daniel Lazare said, the alternative would be, “the old pre-reform Mississippi state legislature stamping on democracy — forever.” I’m sorry Lincoln’s ghost, but that’s not a Union worth saving. But hey, maybe Hillary can save us.
-
Under the terms of his house arrest, Kiriakou is unable to give media interviews at this time.
Radack said he eventually hopes to be an anti-torture and prison reform advocate.
Kiriakou’s official release date is May 1, according to the Federal Bureau of Prisons website.
-
On Monday, BBC Four screened a remarkable film in its Storyville series. The Internet’s Own Boy told the story of the life and tragic death of Aaron Swartz, the leading geek wunderkind of his generation who was hounded to suicide at the age of 26 by a vindictive US administration. The film is still available on BBC iPlayer, and if you do nothing else this weekend make time to watch it, because it’s the most revealing source of insights about how the state approaches the internet since Edward Snowden first broke cover.
-
Internet/Net Neutrality
-
Net neutrality propaganda is starting to get weird. A brand new interest group showed up this week with a confusing porn parody that seems to equate Title II reclassification of the internet with dragnet surveillance, among other fallacies. It’s a good chance to talk about what the Federal Communications Commission’s new open internet policy is — and what it isn’t.
An anti-big government campaign backed by a US Senator released this godawful video that looks like a tasteless ripoff of the age-old “cable guy” porn cliché — except you know not to actually expect any sex because it’s YouTube.
Permalink
Send this to a friend
02.06.15
Posted in News Roundup at 6:49 pm by Dr. Roy Schestowitz
Contents
-
Now what is linux, it is just an Operating System which is used worldwide. Linux for a common man would mean something used in different devices basically for research purposes in NASA, in particle accelerators, also used by Scientists for their studies eg Antartic. Linux is also a vital tool in automobile industry as in car manufacture and also being used by Engineers to build humanoid robots, by security researcher or hackers. Linux is preferred due to its basic properties of being flexible, reliable system and safe. US Navy is now using the Linux Kernel to built their most powerful DDG-1000 Zumawat Class Destroyer.
-
Desktop
-
2015 has been a great year for GNU/Linux on the desktop in India.
-
Audiocasts/Shows
-
Join Aaron Newcomb and Randal Schwartz this week to speak with Boudewijn Rempt about Krita. Krita is a FREE digital painting and illustration application. Krita offers CMYK support, HDR painting, perspective grids, dockers, filters, painting assistants, and many other features.
-
Kernel Space
-
The fact that 75 % of the fastest HPC systems in the world use Lustre, demonstrates an on-going belief in the future of Lustre and its continued development. Lustre contains a number of components, that together, allow for efficient and fast storage and retrieval of large amounts of data. Lustre is based on Linux and uses kernel-based server modules to obtain the high performance I/O that these users require. In terms of capacity, the theoretical limits on the Lustre file system allows for storage of over 512 Petabytes (PB) in total. That is equivalent to 1,000,000of the 1 TB drives in your latest laptop.
-
The OpenDaylight Project, a community-led and industry-supported open source platform to advance Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), today announced the availability of 14 internships — up from seven in 2014 — for people who want to obtain real-world development experience from leading networking technologists while contributing to the industry’s largest SDN and NFV platform.
-
-
Yet another educational opportunity for developers interested in open source software appeared this week with the OpenDaylight’s announcement of an expanded software-defined networking (SDN) summer internship program. It’s not a training program per se, but it’s another way to keep open source expertise coming down the pipeline.
-
Graphics Stack
-
Libinput continues advancing greatly primarily for Wayland and X11 systems as shown by the latest libinput 0.10 release while more surely is on the way.
-
Applications
-
Calibre, an application that can be used as an eBook reader, converter, and editor, among other numerous features, has been updated once more and a few new interesting features have been added.
-
Writing can be hard. One of the main obstacles that people encounter when sitting down to write something is all the distractions that a modern desktop throws at you such as cats on the internet, cats on twitter, and cats on reddit. Focuswriter is a neat word processor available in Fedora that provides a user experience to minimize all these cat-related distractions, allowing you to focus on what you need to write.
-
Bluefish 2.2.7 is mostly a bug fix release. It fixes rare crashes in the autocompletion, the filebrowser, the htmlbar plugin preferences, in file-load-cancel, and fixes a rare case of broken syntax highlighting after multiple search/replace actions. It furthermore displays better error/warning output when parsing language files. It also finally fixes javascript regex syntax highlighting. The loading of files with corrupt encoding or non-printable characters (such as binary files) has been improved, and project loading over sftp has been improved. Various HTML5 tags have been added, and HTML5 is the default now for php, cfml and other languages that can include html syntax. Saving and loading of UTF-16 encoded files was broken and has been fixed. Various languages have better syntax support, such as javascript, css, html, pascal/deplhi, and html has improved autocompletion. On OSX the charmap plugin is finally included, the keys for tab switching no longer confict with some keyboard layouts, and behavior at shutdown was improved. The upload/download feature has a new option to ignore backup files. The home/end keys now work better on wrapped tekst. And finally the search and replace dialog correctly shows the number of results when searching in files on disk.
-
Before I release the final 1.1.0 I wanted to make a release candidate with COPR repos for Fedora 20 and 21. This should be less painful than compiling everything from source so I am hoping to get more feedback and testing that way.
-
-
-
Plenty of people use encrypted email services to protect their identities and information online. But, that could all be coming to an end soon for many folks because the man behind the most popular free email encryption technology out there is going broke.
-
-
-
Werner Koch is looking at a big payday after pulling in over $150,000 to fund the continuing development of his crucial open-source GNU Privacy Guard encryption tools.
-
-
-
-
-
GnuPG is a piece of cryptographic software embedded in numerous online solutions in the world, including email clients, and it’s an indispensable part of our online experience. That also means that it’s underfunded and maintained by a single guy who is ready to give up. Fortunately, the online community has responded to his plea and that reaction was amazing.
-
Werner Koch is a hero, and we owe him so much for selflessly carrying on his work despite that lack of money, because he recognised that it was more important than ever. Fortunately, I am not the only one to think so, and to be ashamed that I/we have allowed this situation to arise. Yesterday, when the article by Julia Angwin appeared on the Pro Publica site, people across the world started donating on a massive scale. As an update by Angwin explains:
-
-
-
-
Proprietary
-
The new Opera 28 Beta has been released and the developers have implemented a number of features from the development version, which includes bookmark syncing and new default themes.
-
2014 showed big growth in the proportion of Linux users downloading CAD Schroer’s free software, and Brazil has joined the top 10
-
“We’re working on Linux support—hang tight!” said Google nearly three years ago. And despite that claim and more repeated promises over those many years, Google Drive for Linux still hasn’t been released.
-
Instructionals/Technical
-
Games
-
Linux is highly lacking in decent 3D RPG games, and let’s not even get into the near drought of MMORPG games, but Shroud Of The Avatar looks like it could fill the gap eventually. The reason we say eventually, is that the game is in Early Access, and they consider it pre-alpha.
-
Astro Emporia is a new turn-based strategy title developed and published on Steam by Squirrelbot Games. A Linux version was made available right from the start by the makers of this rather interesting RTS.
-
The company has scheduled a session for March 5 at the Games Developer Conference where it will talk about the new release of the graphics API in a presentation called glNext: The Future of High Performance Graphics.
-
I had a chance to speak to the developers of Divinity: Original Sin who confirmed the Linux version is being worked on right now.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
So finally Season of KDE has come to an end but I am sure my relation with KDE especially Kubuntu is far from over. I hope to contribute more in future.
-
I usually don’t blog about what I do in my day-time job in my personal blog but since this may affect some of the KDE/Qt developers I will do this time.
-
With Plasma 5 our lock screen architecture changed significantly. For example we do no longer support screen saver hacks or widgets on top of the locked screen. Both are very unlikely to make a return in future releases. This means that bug reports against the old infrastructure might no longer apply to our current code base. Two weeks ago I went through all bug reports and feature requests to evaluate whether they still apply to our new infrastructure or should be closed.
-
-
The KDE community has created some of the best of the breed open source software and they continue to win user’s hearts, according to a new LinuxQuestions survey.
-
GNOME Desktop/GTK
-
While Unity 8 is written in Qt5, GTK+ is still very important to Ubuntu even with their ongoing transition from running the desktop on an X.Org Server to instead using their own Mir display server technology within the next year on the desktop. Landing today in GTK+ Git ahead of GNOME 3.16 is a number of Mir back-end improvements.
-
Do you love Gnome Shell but hate the way it looks? Don’t worry, the Internet is chock full of better-looking themes to choose from. There are so many in fact that we’ve had to filter it down to just eight awesome themes.
-
-
-
Reviews
-
Fedora 21 Cinnamon is a fedora 21 spin featuring with Cinnamon Desktop environment 2.4.5 as default desktop. it also included with kernel 3.18 and default application such as firefox 35, nemo 2.4, libreoffice 4.3, shotwell 0.2, yum extender as default sotware manager and cinnamon system settings.
-
New Releases
-
4MLinux Allinone Edition, a Linux operating system built from scratch that wants to provide a complete desktop experience and manage to keep the size to a minimum, has reached version 11.1 Beta.
-
Jeff Hoogland announced the release of Bodhi Linux 3.0 RC3, proving he is back. This release brings a new wiki and new blog section to the community as well. In other news Evolve OS is winning Jack Wallen away from Ubuntu and Michael Larabel has a report on GNU Guix, that started as a package manager but is turning into a distribution.
-
Bodhi Linux 3.0 ships with just a few applications by default such as Midori 0.5.9 as web browser, nm-applet (connection manager applet) 0.9.8 and of course, a few Enlightenment-specific applications like Enlightenment File Manager, Terminology (terminal emulator) 0.7.0, ePad (text editor) 0.5, ePhoto (picture viewer) 20150116 build, eepDater (update manager) 0.11.
-
-
Arch Family
-
We’re happy to announce the 0.8.12 release of Manjaro Linux installation media, including images for the Xfce and KDE4 desktop environments, and our minimal ‘Net’ edition.
Great progress is being made with our new 0.9 series installation media that uses the Calamares installer, along with our new KDE Plasma 5 installation media, but since neither is quite ready yet we’re providing updated 0.8 series installation media that uses our legacy installer, Thus.
-
Red Hat Family
-
Red Hat Inc, the world’s largest pure-play open-source software company, is ramping up its cloud-based subscription service in Asean to capitalise on the rapid adoption of cloud computing in the region.
Its new cloud service is aimed at competing directly with Microsoft’s cloud platform and provide another alternative for enterprises, said Damien Wong, senior director and general manager of Red Hat Asean.
-
Fedora
-
Corebird 0.9 was released a few months ago, and it is now finally available in the official Fedora repos. Check out my previous post for details on some of the new features in this update.
-
Debian Family
-
-
Back in December 2014 I won a Creator C120 single board computer from Imagination Technologies, a technology outfit based in Hertfordshire (UK).
The Creator C120 is a development board for Linux and Android.
It’s powered by a dual-core MIPS32 CPU (1.2 GHz) and a PowerVR SGX540 GPU. Add to that 1 GB of RAM, 8 GB NAND Flash, two USB ports, an HDMI port up to 2k resolution, a full size SD card slot, 10/100 Mbps Ethernet and WiFi connectivity (with Bluetooth 4) and what you’ve got is a very powerful single-board computer.
-
Derivatives
-
Philip Newborough, the lead developer behind the CrunchBang Linux distribution, has tossed in the towel.
The lead developer of CrunchBang Linux has decided to halt development of this Linux distribution that’s based on Debian but known for its choice of using the Openbox window manager.
-
The Linux world is in mourning following the stunning announcement of the death of CrunchBang Linux. The developer of CrunchBang has decided that it’s time to move on.
-
-
I have decided to stop developing CrunchBang. This has not been an easy decision to make and I’ve been putting it off for months. It’s hard to let go of something you love.
-
-
Canonical/Ubuntu
-
Canonical has published details about a Django regression in Ubuntu 12.04 LTS and Ubuntu 10.04 LTS operating systems, which has been identified and fixed.
-
The mobile market is saturated. Any new entrants are doomed from the start. And if you need proof, just look at Windows Phone or BlackBerry. The problem is that you need an app ecosystem to gain market share, but you need market share in order to entice developers to your platform.
-
-
Ubuntu Touch already has a large number of native apps and more are added every day. The platform needs as many applications as possible and now it’s Telegram’s turn to land in the Ubuntu Store.
-
It’s been a long time coming, but finally Canonical is ready to release its first Ubuntu phone. After teaming up with Meizu and BQ almost a year ago, we’re getting a (sort of) new handset from the latter; it’s actually a repurposed version of its Aquaris E4.5, a mid-range smartphone that normally ships with Android. The new “Ubuntu Edition” keeps all of the same hardware, which is nothing to write home about. It has a 4.5-inch, 540×960 resolution display, a 1.3GHz quad-core MediaTek Cortex A7 processor, 1GB of RAM and 8GB of internal storage. For shutterbugs, there’s also a 8-megapixel rear-facing camera and a 5-megapixel snapper on the front. At €169.90 ($195), the specs are pretty unremarkable.
-
Canonical is launching the first Ubuntu smartphone after a year of promises, though it’s unclear why anybody but hardcore Ubuntu aficionados would want one.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The Ubuntu launch date are usually set in stone, but from time to time we might see some of them delayed. The same happened with the Ubuntu 14.04.2 LTS release which is delayed for a couple of weeks.
-
A promotional video for the first Ubuntu phone, BQ’s Aquaris E4.5, is now live and it shows just what are some of the capabilities and features of the operating system.
-
-
A “Deep-SCINI” submersible with Linux-based Elphel cameras discovered surprisingly diverse life under the Antarctic ice shelf — and rapidly melting ice.
-
TechNexion and Freescale launched an IoT Gateway that runs Linux on a dual-core, Cortex-A7 QorIQ SoC, offers six GbE ports, and expands via Arduino Shields.
The $429 LS1021A-IoT Gateway Reference Design, which is built by TechNexion and co-branded with Freescale, is the first product we’ve seen to run the first ARM-based versions of Freescale’s previously PowerPC-only QorIQ processor line. QorIQ has always been focused on networking, and that’s no different with the low-power QorIQ LS1 system-on-chip announced in Oct. 2013.
-
Phones
-
Tizen
-
Samsung unveiled their Tizen based TVs at CES 2015, and today they have gone on-sale in South Korea. This initial batch comes in four sizes — 55, 65, 78 and 88 inches. The 55-inch version is priced at 5.49 million won (US$5,038), with SUHD TV’s having the capability of display over 1 billion colors, 64 times more than the existing models.
-
This is the Samsung Z1—the world’s first Tizen phone. After one of the bumpiest pre-launch situations in recent memory, Samsung’s home-grown OS has finally hit smartphones.
-
Android
-
We rightly laud Apple for its ability to get us to pay a premium, but the world owes more to Google for making mobile computing a commodity.
-
My feeling is that we ought to be grateful that people have a choice. I can’t imagine anything worse than one platform dominating any particular market completely. We saw what that looked like on the desktop when Microsoft ruled the roost with Windows back in the 90s, and it wasn’t pretty.
I wouldn’t want Android or iOS to completely dominate the mobile phone market. In fact, I’d much rather there were a strong third or fourth choice available as well. It’s never a good idea for one or two companies or platforms to have too much power or control over consumers.
-
Chinese smartphone manufacturer Xiaomi launched its 2014 flagship, the Mi 4, in India last week, and the device is set to on sale on Tuesday in the country for about $325.
While the phone isn’t exactly new, it does come with the latest version of MIUI, the company’s own flavor of Android. The Mi 4 is Xiaomi’s first device to get the update in English.
-
Today, 6 February, is the third birthday of the Lumicall app for secure SIP on Android.
-
Open source scares people. And tossing them into the deep end usually doesn’t help dampen that fear. Instead, we need to help ease people into using open source. Scott Nesbitt, technology coach and writer, shares some advice to help you do that.
First, curb the urge to get on open source soapbox. Instead, go for the heart of it—show them how they can do their work with it.
Open source is not only for the techie. So, explain to people they don’t have to be a coder. They can learn to code, but it’s not required.
-
The Coreboot project has now ported over the XGI Z9s frame-buffer support from the Linux kernel.
-
-
FOSDEM doesn’t get the ra-ra headlines or (thankfully) the “booth babes” but the conference does get networking and top technologists (and Belgian beer). I saw a couple of my tech heroes and big cheeses here a few minutes apart just before writing this, for example, and got some top advice for a specific tech issue a breath later.
I also saw photos of RMS (Richard Stallman) at large a few paces away, though I didn’t get to meet him in person and buy one of his badges, alas…
Man-flu and technicolour yawning on the second day didn’t stop me having riotous fun with geekery, champers and IP lawyers this year!
-
If you use Linux, most likely Apache is your web server of choice. Apache is a great choice. It’s incredibly powerful, very reliable, and secure. There may, however, be certain deployments that either do not need all of the features found in Apache, do not have the resources to support Apache (such as in the case of an embedded system), or need something easier to manage. If that’s the case, fear not ─ there are plenty of light weight, open source, web servers out there ready to meet and exceed your needs.
-
Salesforce’s new Lightning platform aims to make it easier for ordinary folks to build apps, and leverages open source tech to do so.
-
A year ago, Pivotal announced its intent to set up a foundation for the open source Cloud Foundry project, but issues lurk in the bylaws and ownership of the name
-
Events
-
DevConf.cz, in the beautiful city of Brno, Czech Republic is one of the most popular free software conferences in the region. It brings together hundreds of developers, enthusiasts, and engineers to discuss and collaborate on new technology.
-
-
-
-
SaaS/Big Data
-
Trying to learn more about what OpenStack, the open source cloud infrastructure project, might have to offer? Need some help figuring something out, or inspiration for a new approach to try? We’re here to help. We have gathered some of the best how-tos, guides, tutorials, and tips published over the past month into this handy collection.
-
Lately we’ve been covering tools that orbit Hadoop in the Big Data ecosystem, ranging from Elastic Search to Qubole, which offers analytics on Hadoop data as a service (HaaS), to the Apache Spark project. In this arena, Kafka and YARN are much talked about. YARN is a sub-project of Hadoop at the Apache Software Foundation that takes Hadoop beyond batch to enable broader data-processing. Kafka allows a single cluster to serve as the central data backbone for a large organization. With it, data streams are partitioned and spread over a cluster of machines to allow data streams larger than the capability of any single machine.
-
-
Databases
-
Oracle/Java/LibreOffice
-
Oracle sometimes seems to be a bit miffed by enthusiasm for Linux container darling Docker because its own Solaris “Zones” have done containers for ages.
Big Red also knows in its heart of hearts that Solaris isn’t for everyone, but reckons its own Linux is for anyone who fancies robust, well-supported Torvalds-spawn. And given that Docker needs an OS in which to run containers, Oracle has therefore decided to make Oracle Linux available in the Docker repository. The company will also package an Oracle-maintained version of MySQL and pop it in the same place.
-
FSF/FSFE/GNU/SFLC
-
-
Version 2.21 of the GNU C Library is now available. Glibc 2.21 fixes a lot of issues while also adding some new functionality.
Glibc 2.21 has many bug fixes, several security fixes, a port to the Altera Nios II platform, a new sempahore algorithm, support for TSX lock elision on PowerPC, optimized string functions for AArch64, support for new MIPS ABI extensions, and many other changes.
More details on glibc 2.21 can be found via the mailing list release announcement. Other GNU C Library 2.21 details can be found via the Sourceware.org Wiki.
-
Over the last few months, Webmail provider Posteo has been working with the FSF to license and tag all JavaScript on their Web site and Webmail system so that it is immediately identifiable as free software. They have also done everything possible to ensure that it is 100% compatible with the GNU LibreJS browser extension, which automatically blocks any potentially nonfree JavaScript, making it easy to browse the Web in freedom. This is an outstanding effort in defense of the freedom of Posteo’s users, and the company deserves recognition for it. We hope others will follow their lead.
-
Public Services/Government
-
This year half of all the software applications at the Diputación Foral de Bizkaia (the provincial council of Bizkaia, Spain) will be open source, up from 25 percent in November 2014. The goal was announced on 12 November at the start of the LibreCon software conference. “Open-source technology offers competitiveness and savings, boosts the economy, promotes knowledge and makes us more transparent”, a press statement quotes Counsellor of the Presidency, Unai Rementeria, as saying.
-
Openness/Sharing
-
Science
-
Innovation makes things cheaper, which frees up cash for consumers to buy other things. That drives the virtuous cycle of economic growth. We dug into the inflation data, more formally known as the personal consumption expenditures price index, to highlight some of the items that have seen the biggest discounts.
-
Health/Nutrition
-
The imperative to improve mental health in the UK is primarily a moral one. That said, even a hard-nosed economist, insensible to the suffering of individuals, should appreciate the benefits that better mental healthcare can bring. Unsurprisingly given its prevalence, mental illness has a huge economic impact: a 2010 report by the Centre for Mental Health estimated the aggregate costs in 2009-10 as £105.2 billion – rather more than the total NHS budget for the same year, £95.8 billion. As for the benefits of treatment, a report just released by the same Centre finds that, for every £1 invested in group cognitive-behavioural therapy for adolescents suffering from anxiety, £31 is saved in wider costs.
-
Security
-
Sharyl Attkisson’s lawyer told the Daily Beast that an investigation that found no evidence her personal computer was hacked is “irrelevant” because it reviewed the wrong computer, despite her own repeated claims that the desktop in question had been compromised. He also falsely claimed her lawsuit against the federal government for alleged hacking was focused solely on a separate work computer.
-
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.
-
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.
-
We know that the NSA likes taking unsolicited action inside the computers of others. We know the FBI is also very much into hacking.
Now, the UK government is telling the world that its spies and cops are hackers too — and has asked the public what they think about it
In a new unprecedented document released on Friday, the UK government released the guidelines and rules that all British spy and law enforcement agencies have to follow in their “equipment interference” activities.
-
-
Defence/Police/Secrecy/Aggression
-
-
When Kenneth Jarecke photographed an Iraqi man burned alive, he thought it would change the way Americans saw the Gulf War. But the media wouldn’t run the picture.
-
A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan.
In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos.
-
Thirteen years ago they were just a few men, disaffected students and farmers, shouting outside a rural mosque in the north Yemeni highlands. Today, they are in charge. They’re known popularly as the Huthis; the U.S. believes they are an Iranian proxy and Saudi Arabia has already fought one war with them.
-
The privatization of America’s wars swells the ranks of armies for hire across the globe.
-
The Middle East today is the last place anyone in mainstream western thought would think to look for progressive political thought, and even less to see those thoughts translated into action. Our image of the region is one of dictatorships, military juntas and theocracies built on the ruins of the former Ottoman Empire, or hollow states like Afghanistan, and increasingly Pakistan, where anything outside the capitol is like Mad Max. The idea of part of the region being not just free, but well on its way to utopian, isn’t one that you’re going to find on mainstream media.
-
Transparency Reporting
-
Prosecutors in the Eastern District of Virginia began investigating WikiLeaks in 2010 after the site posted some of the quarter-million State Department cables leaked by Chelsea Manning.
Last month, an official from the Department of Justice publicly confirmed the investigation is still ongoing. It was the first time anyone, including WikiLeaks’ own defense team, has gotten such confirmation since April 2014.
-
Whistleblower laws exist because government officials do not always act in the nation’s best interests.
The Obama administration, in its war on whistleblowers, just lost a major battle. Major in its venue — the Supreme Court — and major in its implications for future whistleblower cases.
-
As Attorney General Eric Holder is about to leave office, Senator Ron Wyden has sent him a letter more or less asking if he was planning to actually respond to the various requests that Wyden had sent to Holder in the past, which Holder has conveniently ignored. Wyden notes, accurately, that the government’s continued secrecy on a variety of issues “has led to an erosion of public confidence that has made it more difficult for intelligence and law enforcement agencies to do their jobs.”
-
WikiLeaks co-founder Julian Assange is considering suing UK Deputy Prime Minister Nick Clegg for defamation over comments made regarding Assange’s legal situation.
Speaking on LBC radio on Thursday (5 February), Clegg said that Assange should go to Sweden to “face very serious allegations and charges of potential rape.”
Assange has been accused of sexually assaulting two women in Stockholm in 2010, however no formal charges have been made and Assange denies the allegations.
-
-
Scotland Yard have spent more than £10 million on policing the Ecuadorian Embassy where Wikileaks founder Julian Assange has been avoiding extradition.
Mr Assange was granted asylum by the government of Ecuador and has been holed up in the building in Knightsbridge since 2012.
The Metropolitan Police have posted round-the-clock police officers outside the building ever since, costing an estimated £10,500 a day.
-
Finance
-
For his 50th birthday, Jim Tananbaum, chief executive officer of Foresite Capital, threw himself an extravagant party at Burning Man, the annual sybaritic arts festival and all-hours rave that attracts 60,000-plus to the Black Rock Desert in Nevada over the week before Labor Day. Tananbaum’s bash went so well, he decided to host an even more elaborate one the following year. In 2014 he’d invite up to 120 people to join him at a camp that would make the Burning Man experience feel something like staying at a pop-up W Hotel. To fund his grand venture, he’d charge $16,500 per head.
-
PR/AstroTurf/Lobbying
-
NBC Nightly News anchor Brian William has apologized for falsely claiming (NBC, 1/30/15) that “during the invasion of Iraq…the helicopter we were traveling in was forced down after being hit by an RPG.”
-
After a January 30, 2015 ruling from Milwaukee-based federal Judge Charles Clevert, some declared that the “John Doe” probe into alleged campaign finance violations by Governor Scott Walker’s campaign was dead.
The Franklin Center’s Wisconsin Reporter website claimed that Judge Clevert’s decision “effectively pulled the life support plug” on the investigation. The Milwaukee Journal Sentinel’s right-wing columnist Christian Schneider repeated his erroneous “zombie law” claim, declaring that the ruling “almost certainly means the end of the most recent John Doe investigation.”
-
Censorship
-
Google’s lawsuit against Mississippi State Attorney General Jim Hood is a crucial case for the future of SOPA-like Internet filters in the U.S. This week Digital Citizens Alliance, Stop Child Predators and others voiced their support for the Attorney General, suggesting that Google Chrome should be censored as well.
-
After review by the French Cabinet last Wednesday, the implementation decree for the administrative blocking of pedopornographic and terrorist websites was published today.
-
Privacy
-
A security problem in WhatsApp means that anyone can see users’ profile photos, even if they have been set to be viewable to friends only, according to security researchers.
-
US intelligence community issues limited list of tweaks to data collection and surveillance at end of year-long effort to respond to Snowden revelations
-
Director of National Intelligence James Clapper this morning released a report detailing new rules aimed at reforming the way signals intelligence is collected and stored by certain members of the United States Intelligence Community (IC). The long-awaited changes follow up on an order announced by President Obama one year ago that laid out the White House’s principles governing the collection of signals intelligence. That order, commonly known as PPD-28, purports to place limits on the use of data collected in bulk and to increase privacy protections related to the data collected, regardless of nationality.
-
Three Democratic lawmakers on the influential Senate Committee on Commerce, Science and Transportation are calling on federal regulators to investigate Verizon for its practice of using unique customer codes to track the online activities of its wireless subscribers.
-
So for the past three months I’ve been using Tor Browser to surf the Web, not as a primary browser, but as a secondary browser. Firefox is my primary browser.
Together with using StartPage as my search engine, I feel much better about my privacy while surfing the Internet. Using Tor Browser leads to a tad slower browsing experience, but I knew that going in, so no complaints there.
-
The Drug Enforcement Administration (DEA) is using license-plate reader technology to photograph motorists and passengers in the US as part of an official exercise to build a database on people’s lives.
According to DEA documents published on Thursday by the American Civil Liberties Union (ACLU), the agency is capturing images of occupants in the front and rear seats of vehicles in a programme that monitors Americans’ travel patterns on a wider scale than previously thought.
-
About two-thirds of investigative journalists surveyed (64%) believe that the U.S. government has probably collected data about their phone calls, emails or online communications, and eight-in-ten believe that being a journalist increases the likelihood that their data will be collected. Those who report on national security, foreign affairs or the federal government are particularly likely to believe the government has already collected data about their electronic communications (71% say this is the case), according to a new survey of members of Investigative Reporters and Editors (IRE) – a nonprofit member organization for journalists – by the Pew Research Center in association with Columbia University’s Tow Center for Digital Journalism
-
Leonid Levin, the head of the Duma’s committee on public communications policy, wants to grant police the extrajudicial power to block access to Internet anonymizers and “the means of accessing anonymous networks, such as Tor.”
-
-
Regulations governing access to intercepted information obtained by NSA breached human rights laws, according to Investigatory Powers Tribunal
-
-
Spy agency could now be forced to reveal whether it spied on civil rights groups after watchdog human rights ruling
-
A British tribunal ruled on Friday that some aspects of intelligence-sharing between security agencies in Britain and the United States were unlawful until December 2014, in a ground-breaking case brought by civil liberties groups.
The Investigatory Powers Tribunal ruled that Britain’s GCHQ had acted unlawfully in accessing data on millions of people in Britain that had been collected by the U.S. National Security Agency (NSA), because the arrangements were secret.
Campaign groups Liberty, Privacy International, Amnesty International and others brought the case following revelations about mass surveillance made by former NSA contractor Edward Snowden.
-
The court that oversees intelligence agencies in Britain ruled on Friday that the electronic mass surveillance of cellphone and other online communications data had been conducted unlawfully.
The legal decision, the first time the court has ruled against the British intelligence services since the tribunal was created in 2000, relates to information that was shared between British security agencies and the National Security Agency of the United States before December 2014.
Although privacy campaigners claimed the decision as a victory, many experts said the British and American intelligence agencies would continue to share information obtained with electronic surveillance, even if they had to slightly alter their techniques to comply with human rights law.
-
The United Kingdom’s top surveillance agency has acted unlawfully by keeping details about the scope of its Internet spying operations secret, a British court ruled in an unprecedented judgment issued on Friday.
Government Communications Headquarters, or GCHQ, was found to have breached human rights laws by concealing information about how it accesses surveillance data collected by its American counterpart, the National Security Agency.
-
Civil Rights
-
Once the items were deemed harmless, Vanderklok says, he told Kieser that if someone had only told him what “organic matter” meant, he could have saved everyone a lot of trouble. Kieser then became confrontational. Vanderklok says he calmly asked to file a complaint. He then waited while someone was supposedly retrieving the proper form.
Instead, Kieser summoned the Philadelphia Police. Vanderklok was taken to an airport holding cell, and his personal belongings – including his phone – were confiscated while police “investigated” him.
Vanderklok was detained for three hours in the holding cell, missing his plane. Then he was handcuffed, taken to the 18th District at 55th and Pine and placed in another cell.
He says that no one – neither the police officers at the airport nor the detectives at the 18th – told him why he was there. He didn’t find out until he was arraigned at 2 a.m. that he was being charged with “threatening the placement of a bomb” and making “terroristic threats.”
Vanderklok’s Kafkaesque odyssey finally ended at 4 a.m., when his wife paid 10 percent of his $40,000 bail.
When I heard this story, my first thought was that Vanderklok had to have said or done something outrageous for others to respond with such alarm. In fact, Kieser said as much at Vanderklok’s trial on April 8, 2013.
[...]
But here’s the thing: Airport surveillance videos show nothing of the sort.
-
On a quiet weeknight among the stately manors of Great Falls, ten men sat around a table in the basement of a private home last November playing high stakes poker. Suddenly, masked and heavily armed SWAT team officers from the Fairfax County Police Department burst through the door, pointed their assault rifles at the players and ordered them to put their hands on the table. The players complied. Their cash was seized, including a reported $150,000 from the game’s host, and eight of the ten players were charged with the Class 3 misdemeanor of illegal gambling, punishable by a maximum fine of $500. The minimum buy-in for the game was $20,000, with re-buys allowed if you lost your first twenty grand.
[...]
“It’s crazy,” said the regular, looking back on the night of the raid. “They had this ‘shock and awe’ with all of these guys, with their rifles up and wearing ski masks.” He noted that the Justice Department recently revamped its guidelines for civil forfeiture cases, following reports by The Post about abuses of the seizure process by police around the country, including Fairfax. But in Virginia, the seizure law remains the same, and agencies may keep what they seize, after going through a court process.
-
Looking west from the scrub and boulders of the Sandia Mountains, the city of Albuquerque, New Mexico, sprawls across the valley of the Rio Grande, surrounded by the vast openness of the high desert. On the city’s eastern edge, the winding roads and cul-de-sacs of tony subdivisions in the Northeast Heights abruptly give way to the foothills of the mountains, whose sharp red peaks tower over the city.
-
Coca-Cola has been forced to withdraw a Twitter advertising campaign after a counter-campaign by Gawker tricked it into tweeting large chunks of the introduction to Hitler’s Mein Kampf.
For the campaign, which was called “Make it Happy” and introduced in an ad spot during the Super Bowl, Coke invited people to reply to negative tweets with the hashtag “#MakeItHappy”.
The idea was that an automatic algorithm would then convert the tweets, using an encoding system called ASCII, into pictures of happy things – such as an adorable mouse, a palm tree wearing sunglasses or a chicken drumstick wearing a cowboy hat.
In a press release, Coca-Cola said its aim was to “tackle the pervasive negativity polluting social media feeds and comment threads across the internet”.
-
A top U.S. defense official said it was “no coincidence” that recent Islamic State videos of the savage executions of Jordanian and Japanese hostages showed the victims wearing orange jumpsuits, “believed by many to be the symbol of the U.S. detention facility at Guantanamo Bay.”
-
Fox News Radio host Tom Sullivan is backtracking and brazenly lying about his controversial remarks calling bipolar disorder “made up” and “the latest fad.” While Sullivan now claims his remarks were taken “out of context,” this defense is preposterous. He repeatedly dismissed the validity of bipolar disorder and the clip used by Media Matters was the same one posted by his employer with the headline “(AUDIO) Bipolar Woman Says She DESERVES Disability Benefits. Tom Tells Her She’s WRONG!”
-
Few in public life are as contemptuous of privacy as Stewart Baker, an attorney whose career has included stints at the NSA and Department of Homeland Security. He is a staunch defender of most every U.S. government surveillance effort. As Americans expressed alarm at the scope of spying revealed by Edward Snowden, he delivered a speech asserting that they were engaged in an irrational moral panic.
But even this man, who believes that bulk, warrantless surveillance is fine under the Fourth Amendment, acknowledges that the Drug Enforcement Administration deserves censure for secretly operating surveillance programs. In fact, he believes that the DEA’s behavior was egregious enough that the public’s failure to respond more forcefully calls the value of transparency itself into question.
Yet he isn’t personally condemning the DEA.
-
-
Witness after witness in the Jeffrey Sterling trial made claims about how closely held the program was. “More closely held than any other program,” Walter C, a physicist who worked on the program described. “More closely held,” David Shedd, currently head of the Defense Intelligence Agency and head of Counterproliferation Operations until just after the Merlin op.
Of course, Bob S’ admission that — when FBI showed him a list, in 2003, of 90 people cleared into the program, he said it was incomplete — suggests all those claims are overstated.
-
Internet/Net Neutrality
-
Michael Powell tried to do for broadband Internet what his father did for Iraq.
One of the first things George W. Bush did after he was installed in the Oval Office was to put the younger Powell, who was fond of saying things like “the oppressor here is regulation” (Washington Post, 1/23/01), in charge of the agency that regulates media. His blithe attitude toward the consequences of his beloved market was perhaps best expressed by his dismissal of concerns over the digital divide (Chicago Tribune, 2/7/01): “You know, I think there’s a Mercedes divide. I’d like to have one; I can’t afford one.”
-
MSNBC’s Harold Ford, Jr. used air time to push net neutrality myths without disclosing his relationship to the telecom industry, which has contributed millions of dollars to lobbying against net neutrality regulations.
-
Now that FCC boss Tom Wheeler has made it official that he’s going to present rules to reclassify broadband under Title II for the purpose of implementing stronger net neutrality rules (details still to come…), the opponents to this effort have come out of the woodwork to insist, over and over again, that reclassifying is “treating the internet as a utility.” The cable industry’s main lobbyists, NCTA, decried “Wheeler’s proposal to impose the heavy burden of Title II public utility regulation….” and AT&T screamed about how “these regulations that we’re talking about are public-utility-style regulations…” Former Congressman Rick Boucher, who is now lobbying for AT&T whined that “subjecting broadband to public utility regulation under Title II is unnecessary.”
-
Intellectual Monopolies
-
-
It appears that, even though I am past 50, my opportunities to become a spy have not expired. This is because, as an MEP, I have now been granted privileged access to the European parliament restricted reading room to explore documents relating to the Transatlantic Trade and Investment Partnership (TTIP) deal. But before I had the right to see such “top secret” documents, which are restricted from the gaze of most EU citizens, I was required to sign a document of some 14 pages, reminding me that “EU institutions are a valuable target” and of the dangers of espionage. Crucially, I had to agree not to share any of the contents with those I represent.
-
Copyrights
-
Australia’s current Prime Minister Tony Abbott has asked the Opposition to back data retention laws by mid-March, playing the security card to try and pressure Labor leader Bill Shorten.
But, as I’ve pointed out on more than one occasion, this rush to retain data of internet users is for other reasons. One, to satisfy big American media companies who want to use retained data to threated those whom they deem to be copyright violators.
Australian ISPs have been given until April by the government to agree on a scheme for preventing what the big film and music companies call copyright theft. The mid-March deadline for passing data retention laws fits into that scheme neatly.
Permalink
Send this to a friend
02.05.15
Posted in News Roundup at 4:49 pm by Dr. Roy Schestowitz
Contents
-
David Both recently discussed how the Linux philosophy empowers users and yesterday he demonstrated. Elsewhere Silviu Stahie said Windows 10 won’t kill Linux because it’s a failed OS model and Jim Lynch discusses why some Mac owners choose to run Linux. Red Hat’s Eric Christensen today blogged on the life-cycle of security vulnerabilities and users are reporting on the good, bad, and ugly of Dell XPS 13 Linux support.
-
People usually hear about Linux being found in all sorts of devices and rather peaceful enterprises, but there are exceptions. DDG-1000 Zumwalt Class Destroyer is one of those.
-
Desktop
-
When and if Eric reads this he’s just going to shake his head. For two years in a row now I’ve been lured by the wonders of new laptops announced at CES, and in both years I’ve been disappointed. He tells me I’m stupid for ordering the “new shiny” and expecting it to work, but I refuse to give up my dream.
Luckily this isn’t a huge issue for me since my main machines are desktops, but my second generation Dell XPS 13 “sputnik” is getting a little old. I am really looking forward to a slightly larger screen. The pixel density isn’t great on my laptop, especially compared to what is out now, and I am finding myself a little cramped for screen real estate.
-
-
Audiocasts/Shows
-
Kernel Space
-
As the first update to supplement the System V ABI in nearly two decades, version 1.0 of the Intel386 psABI was announced today.
The Intel386 psABI effort is a processor-specific ABI to supplement the System V ABI with changes relevant to newer processors like SSE4 and Advanced Vector Extensions (AVX). The Intel386 psABI release is based on the x86_64 psABI and is designed for modern x86 architectures and current compiler tool-chains.
-
Applications
-
Wireshark 2.0 has stepped closer to being released with the new Wireshark 1.99.2 development release. This new Wireshark release continues work on porting its UI to Qt.
-
RAID is awesome, and LVM is incredibly powerful, but they add a layer of complexity to the underlying hard drives. Yes, that complexity comes with many benefits, but if you just want to spread your files across multiple storage locations, there’s a much easier way.
-
Instructionals/Technical
-
Wine or Emulation
-
Besides covering the shortcomings of Gallium3D’s Direct3D 9 implementation for Wine, Stefan Dösinger of CodeWeavers also provided a look at the overall state of Wine’s Direct3D/graphics support while he was in Brussels at FOSDEM.
-
Games
-
As someone who doesn’t have a gaming rig, the idea of a streamlined, Linux-powered box that I can plug into my television console-style is really appealing. However, as time as gone on, my excitement for such a device is diminishing rapidly. As the months roll on without Steam Machines lining the store shelves of major electronics retailers, the window of opportunity for Valve to get SteamOS into gamers’ living rooms is shrinking at an increasing rate.
-
Kingdom Come: Deliverance does sound like it will be amazing, but sadly the Linux version is far off, and will be quite a wait after the Windows version.
-
Rust from Facepunch Studios (notable for Garry’s Mod) should once again work on Linux thanks to some more Unity engine updates, I’ve tested it and it works for me.
It may not work for all of you, but it now works for me. They are using the bleeding-edge Unity 5 game engine, and with it comes constant breakage.
-
Lords of Xulima, a complex and interesting RGP developed and published by Numantian Games on Steam, has just received a patch enabling Linux users to play the game as well.
-
Crimsonland is finally on Linux after 11 years of being on other platforms (originally released in 2003), so is it any good? We take a look and create a bloody mess.
-
Freaking Meatbags by WildFactor is finally launching out of Early Access on Steam with a day one Mac and Linux release as their first indie title. I would assume their second game in-production, Machiavillain, will follow suit in a similar fashion when it is ready.
-
It’s a great time to be alive if you’re a fanatic about the particulars of various performance-boosting graphics APIs. AMD’s Mantle is here, Microsoft’s DirectX 12 is coming with Windows 10, and at GDC in early March we’ll hear the first news about a successor to the open-source, cross-platform OpenGL API.
-
Valve has released a fresh Steam Beta client and the devs have made quite a few improvements to the application and they have implemented a couple of Linux-specific features.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
The KDE Project developers announced that KDE Applications 14.12 has been released and is now ready for download and implementation. This is a maintenance update and it’s mostly about fixes.
-
it’s my pleasure to announce the immediate availability of KDevelop 4.7.1. This release contains many improvements and bug fixes – everyone is urged to upgrade.
-
-
GNOME Desktop/GTK
-
Ozon is a new OS in the making that uses a custom shell called Atom ES. It’s based on Fedora and it looks like the developers are making some great progress with it.
-
-
Q4OS, a Linux distribution built to offer a similar desktop experience as Windows OSes, has been upgraded once again and it looks like the developers are getting real close to the mythic 1.0 release.
-
There are so many Linux distributions, each one claiming that they are the one flavor best designed for the new user in mind. Ubuntu, Linux Mint, PCLinuxOS — all outstanding distributions and very much ready for users who want a platform built on the premise that Linux isn’t nearly as challenging as many people assume.
In 2014, a new distribution appeared out of nowhere, one that cut straight to the heart of the matter and promised to deliver a Linux distribution like no other. That distribution is Evolve OS. For the longest time, the distribution was in a state of limbo, and the best you could do was download an alpha and hoped it would run. I tried a number of times and finally opted to just install the Budgie desktop on a Ubuntu distribution. That attempt gave me an idea of how Evolve OS would look, but not much more.
-
Black Lab BriQ rev4 is a new mini PC put together by the same guys who are also working on the Black Lab Linux distro. This is not their first attempt, as the version number shows, and it’s actually a pretty powerful solution.
-
Reviews
-
HandBrake’s Linux version is not perfect. But it is getting there. The audio and subtitle controls now support default behaviors, which you can store in presets. This simplifies the workflow for many batch encoding scenarios. Two other nice refinements are the improvements to the Auto-Naming feature and the ability to batch add to queue by list selection.
-
New Releases
-
HandyLinux is a Linux distribution based on Debian and Xfce that features a rather interesting and unique desktop. A new development version has been released and the makers of the OS appear to be making good progress with it.
-
Screenshots
-
PCLinuxOS/Mageia/Mandriva Family
-
OpenMandriva Lx, a Linux distribution developed by the OpenMandriva Association, has just received an early development version that has been deemed as pre-Alpha.
-
Red Hat Family
-
Fedora
-
The elections for FESCo – January 2015 have concluded, and the results are shown below…
-
We recently interviewed Fedora user and contributor Major Hayden on how he uses Fedora. This is the first installment of a new series here on the Fedora Magazine where we will profile Fedora users and how they use Fedora to get things done. If you are interested in being interviewed for a further installment of this series you can contact us on the feedback form.
-
Debian Family
-
The package mime-support is installed by default on Debian systems. It has two roles: first to provide the file /etc/mime.types that associates media types (formerly called MIME types) to suffixes of file names, and second to provide the mailcap system that associates media types with programs. I adopted this package at the end of the development cycle of Wheezy.
-
-
Derivatives
-
Canonical/Ubuntu
-
Ubuntu Touch has quite a few interesting features that you won’t find on another platform, but one of those features really stands out. It’s actually the publishing speed of a new app in the Ubuntu Store, which is probably under a minute.
-
Canonical revealed that several security issues have been discovered fixed in the Linux kernel affecting the Ubuntu 12.04 LTS (Precise Pangolin) operating system.
-
Canonical revealed details about an unzip exploit in Ubuntu 14.10, Ubuntu 14.04 LTS, Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS operating systems that has been found and corrected. It might not seem like a big issue and it’ not, but it doesn’t mean that an upgrade is not welcomed.
-
Ubuntu 15.04 (Vivid Vervet) is scheduled to launch in April and just a few weeks of development are left, which means that Linux Kernel 3.19 is the most likely candidate for implementation in the distro.
-
For those that haven’t yet tried out recent builds of Ubuntu 15.04, it’s very easy to try out systemd and switch between that and Upstart. On Ubuntu 14.10 it was possible to experiment with systemd by installing its packages but now with the Vivid Vervet it’s installed by default. Until making the default switch, Ubuntu 15.04′s GRUB2 configuration has a kernel option for the stock boot parameters (using Upstart) and then an alternative one using systemd. So from GRUB2′s menu you can simply switch between Upstart and systemd. The systemd option just appends init=/lib/systemd/systemd to the kernel command-line.
-
Flavours and Variants
-
Bodhi is a Linux operating system based on Ubuntu that has a minimalist approach and really low system requirements. A second Release Candidate has been released by Jeff Hoogland, the leader of the project.
-
A little over two weeks ago I announced my return to the Bodhi project and shared our 3.0.0 RC2 “Reloaded” discs. Today I would like to share a set of discs that is our third release candidate. All of the minor issues that were reported in the second release candidate have been corrected in this release and I consider these discs a very polished product.
-
-
Data Modul’s fanless, Pico-ITX “eDM-pITX-BT” SBC runs Linux on Intel’s Bay Trail SoCs, ranging from a single-core 1.5GHz Atom to a quad-core 2.4GHz Celeron.
-
Gateworks unveiled a compact “Ventana GW5520″ SBC with Linux and Android BSPs, HDMI, dual PoE-ready GbE, dual mini-PCIe, and industrial temperature range.
-
-
Phones
-
Android
-
Google has updated the company’s Platform Versions page for its Android mobile operating system, revealing that Android 5.0 Lollipop is gaining a bit of ground among users compared to last month.
-
Now here’s something you don’t see every day: a new version of Android spotted in the wild with nary a word from Google.
Google announced a few hours ago the upcoming availability of the Android One program in Indonesia. Following India, Nepal, Bangladesh, and Sri Lanka, this is the fifth country where Google is rolling out its affordable smartphone program. So far, nothing special… except Android 5.1 is mentioned multiple times on the Indonesian Android One landing page, and there’s even a subtle reference to it in the press image (above), where time is set to 5:10.
-
Apple plans to use the streaming service it acquired from Beats Music several months ago, but the app itself will be designed by Apple, Gurman reports. The price could be around $7.99 per month, but it’s not confirmed. This would make it cheaper than Spotify, which is $9.99 per month.
-
This whole thing started when Google updated its Indonesian Android One landing page earlier today, complete with a tidbit claiming that such low-cost devices would run “the latest and fastest version of Android (5.1 Lollipop)”. Given that one of Android One’s major selling points is to bring the latest and greatest software updates to people in emerging markets, it’s a little curious that none of the other international landing pages (think India, Bangladesh and Nepal) have gotten similar updates. Then again, it’s not like we haven’t seen a company representatives prematurely pull a trigger before. Tacit, purposeful confirmation? Human error? It doesn’t matter — this cat isn’t going back in the bag.
-
While Replicant OS is promoted by the FSF as a binary-free Android distribution and a truly open alternative to Apple products, the state of Replicant OS in terms of end-user readiness or being as a viable alternative to iOS and Android leaves much to be desired.
-
The two biggest issues regarding Android’s security are the size of the Android market and fragmentation of the Android ecosystem. Those issues impact all mobile platforms, not just Android, according to Charles King, principal analyst at Pund-IT. “The former point is an issue since, as Microsoft learned to its sorrow with Windows,” King remarked.
-
Seemingly out of nowhere Android is jumping up to version 5.1 and heading out the door—if you’re in Indonesia.
Google’s Indonesian Android One page lists the “latest and fastest” version of Android at 5.1 and touted the update via Twitter. Indonesia is the latest launch country for Google’s Android One effort, which is already underway in India.
-
Your keyboard is boring—it doesn’t do anything special or unique. You could change that: some crazy bastards in China have built a keyboard that’s secretly a quad-core Android PC.
-
Android Lollipop is an excellent leap forward for Google’s mobile operating system, but it isn’t perfect. Even with the Material Design overhaul and improved methods for working through tasks, it has a few annoyances that could use attention. So after some tinkering, here are five areas I think that it could use a touch up to make Android that much better.
-
Consider this scenario: Your organization bought a software license or subscription of a Content Relationship Management (CRM) tool for internal use. You start using the tool enthusiastically. But, with time, the enthusiasm dies, you get bored with the software, and the usage levels drop. Even though the software works fine, you fall back to excel sheets to manage customers, and conditions across the organization go back to the same. Continuous reminders for how to use the tool don’t bring you back, and finally it is decided that the current software is not sufficient for your organization’s needs. A new tool is needed.
-
If you use Linux, most likely Apache is your web server of choice. Apache is a great choice. It’s incredibly powerful, very reliable, and secure. There may, however, be certain deployments that either do not need all of the features found in Apache, do not have the resources to support Apache (such as in the case of an embedded system), or need something easier to manage. If that’s the case, fear not ─ there are plenty of light weight, open source, web servers out there ready to meet and exceed your needs.
-
ownCloud, Inc., the company behind the popular ownCloud open source file sync and share software, has announced a project that for the first time ties together researchers and universities in the Americas, Europe and Asia via a series of interconnected, secure private clouds. It’s yet another example of the momentum that ownCloud has. As I covered in a post yesterday, survey results from LinuxQuestions.org showed experts at the site to be very interested in the ownCloud platform.
-
Korea Telecom, SK Telecom, Enea, Spirent and Xilinx have joined the OPNFV Project, a community-led industry supported open source reference platform for Network Functions Virtualization (NFV) to advance the development of open source NFV platform. The OPNFV has a growing member base with a total 49 members now and a community gearing up for its first software release.
-
Events
-
As we get closer to the Southern California Linux Expo — SCALE 13x for those of you keeping score at home — it bears mentioning that the largest community-run Linux/FOSS show in North America has grown to host a lot of other sub-events during the course of the four-day expo.
-
In case there was any doubt about the surging popularity of containerized virtualization and app delivery, the Linux Foundation has announced plans to inaugurate an event, called ContainerCon, dedicated precisely to that topic. The first ContainerCon will take place this August with representatives from Docker, Red Hat (RHT), Twitter, Parallels and Canonical, among others.
-
SaaS/Big Data
-
Open source cloud computing vendor Mirantis has extended its reach into Japan, where it has already secured one channel partnership for its “pure-play” OpenStack distribution.
The growth comes in the form of a subsidiary, called Mirantis Japan GK, which will distribute Mirantis’s OpenStack distribution and other cloud computing services and products in Japan. The subsidiary will be based in Tokyo.
-
The 2015 “Guide to the Open Cloud: Open Cloud Projects Profiled” is The Linux Foundation’s second publication on the open cloud, which was first published in October 2013. The updated guide adds new projects and technology categories that have gained importance in the past year. The report covers well-known projects like Cloud Foundry, OpenStack, Docker and Xen Project, and up-and-comers such as Apache Mesos, CoreOS and Kubernetes.
-
Folks in the Big Data and Hadoop communities have been getting increasingly interested in Apache Spark, an open source data analytics cluster computing framework originally developed in the AMPLab at UC Berkeley. According to Apache, Spark can run programs up to 100 times faster than Hadoop MapReduce in memory, and ten times faster on disk. When crunching large data sets, those are big performance differences.
-
-
The open-source OpenStack cloud platform includes multiple projects that can be used to enable different capabilities in the cloud. In the OpenStack Icehouse milestone release, which debuted in April 2014, a key addition was the Trove database project, which enables the use of multiple databases in an OpenStack cloud deployment.
-
Databases
-
Big data company DataStax is hoping to bolster its appeal in the NoSQL, Internet of Things (IoT), Web and mobile markets through its acquisition this week of Aurelius, the company behing the open source Titan graph database. The move adds graph database capabilities to DataStax’s big data platform.
-
DataStax engineering vice-president Martin van Ryswyk said customers had been asking the Apache Cassandra distributor for a graph database capability, and that other acquisitions might be in the offing.
-
-
Oracle/Java/LibreOffice
-
News Summary Oracle Linux images are now available on the Docker Hub Registry, a repository for Docker-based components, including applications and operating systems (OSs). Oracle Linux joins MySQL, which is already extremely popular on Docker Hub and has been downloaded millions of times. Additionally, Oracle plans to provide a new Oracle-maintained MySQL image for the official repos on Docker Hub in late February further enabling developers to rapidly benefit from the latest MySQL innovations.
-
Looking to take advantage of the growing enthusiasm for Docker containers among application developers, Oracle today announced that images of Oracle Linux are now available on the Docker Hun Registry.
-
FSF/FSFE/GNU/SFLC
-
GNU Guix continues to be one of the most interesting new package management initiatives going on in the past few years. Guix also continues evolving into its own Linux distribution filled with GNU software.
Ludovic Courtès, the maintainer of GNU Guix and co-maintainer of GNU Guile, presented at FOSDEM last weekend about the progress being made on Guix. Ludovic refers to Guix as “The Emacs of Distros” and that Guix attempts to empower its users in a similar manner to Emacs. GNU Guix became an installable operating system just last year and in the months since it’s picked up an ARMv7 port, many bug fixes, and as of a few days ago became FSDG-compliant. FSDG is short for the Free System Distribution Guidelines as established by the Free Software Foundation.
-
The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.
-
Project Releases
-
Wireshark is one of the best network protocol analyzer. It is used for analysis, troubleshoot network to find security issues. Wireshark 1.99.2 is an experimental release with new features to test for wireshark 2.0.
-
Public Services/Government
-
Openness/Sharing
-
Open Data
-
OPENPediatrics (OP), a free online education and best practice sharing community for pediatric clinicians worldwide, has launched a new library of openly licensed medical animations and illustrations, making them available for non-commercial educational use.
The new multimedia library draws on the extensive collection of animations and illustrations developed for didactic and procedural videos created for the OP clinician community site.
-
Open Hardware
-
Hardware design and development traditionally have been shrouded in secrecy, with companies desperate to keep their designs for internal use only. But in a world where sharing and transparency have become the norm, and global collaborative development is no longer just a phrase used by marketers—at least in software engineering—it’s time for things to change.
-
Security
-
Defence/Police/Secrecy/Aggression
-
Fox News’ Special Report aired images of the execution from the terrorists’ video on February 3. Host Bret Baier explained the network’s reasoning for showing the graphic images, warning viewers, “The images are brutal. They are graphic. They are upsetting,” but, “The reason we are showing you this is to bring you the reality of Islamic terrorism and to label it as such. We feel you need to see it.” After displaying the images, Baier added, “Having seen the whole video, it is something you cannot unsee. Horrific and barbaric, as well as calculating and skilled at high-tech propaganda.” FoxNews.com later uploaded the full-length, 22-minute video on its site.
-
HOWARD KURTZ: Megyn, I see the arguments on both sides. I understand the case that we ought to show the pure evil that is ISIS, and I thought our colleague Bret Baier handled it judiciously by just showing a couple of still images. But I disagree with the Fox decision and here’s why. ISIS — I fear that many of the us in the media are helping ISIS spread its propaganda, using its fear tactics. And I felt the same way with the beheading video, still images of which became almost like wallpaper for every story about ISIS. And when that tactic became so familiar, these terrorists, these butchers, went to the even more sick and depraved and barbaric method of burning a man to death. And I just have a concern that we are helping spread the fear that ISIS so badly wants to spread.
-
Unlike ISIS, the U.S. usually (though not always) tries to suppress (rather than gleefully publish) evidence showing the victims of its violence. Indeed, concealing stories about the victims of American militarism is a critical part of the U.S. government’s strategy for maintaining support for its sustained aggression. That is why, in general, the U.S. media has a policy of systematically excluding and ignoring such victims (although disappearing them this way does not actually render them nonexistent).
-
Transparency Reporting
-
Scotland Yard confirms latest costs of mounting round-the-clock operation outside the Ecuadorian embassy in central London, where Julian Assange has claimed asylum since 2012
-
The price tag for the United Kingdom’s siege of the Ecuadorian embassy in London hit £10 million (US$15 million) Thursday.
A Wikileaks spokesperson pointed out the cost of the controversial police operation has now exceeded the budget of the Iraq War inquiry. The inquiry was established in 2009 to critique the U.K.’s role in the U.S.-led 2003 invasion of Iraq. The broad public inquiry is expected to have a final cost of roughly £10 million.
-
The cost to the UK taxpayer for policing WikiLeaks founder Julian Assange during his asylum stay at the Ecuadorian embassy has passed £10m, figures show.
Assange has sought asylum in the embassy since June 2012 in order to avoid extradition to Sweden, where he has been accused of sexually assaulting two women in Stockholm in 2010.
-
-
PR/AstroTurf/Lobbying
-
It’s not that the United States can’t afford to keep supporting its elderly in the not-particularly-generous manner that it does today; the big debt projection numbers Hall throws at us turn out to be not so big when you look at them as a percentage of the projected economy. He wants us to be alarmed that Obama’s budget plan would move the federal government’s share of the economy from 20.9 percent today to 22.2 percent in 2024–”higher than post-World War II averages,” he points out, but a trivial redistribution of what is expected to be a much larger economic pie.
-
Censorship
-
In an internal memo sent out to employees, Twitter CEO Dick Costolo acknowledged the platform’s ongoing problems with harassment and abuse as well as its inability to combat trolls. Costolo admitted that this behavior was a key factor in driving away core users from the platform, and that he would be taking an aggressive stance against trolls on Twitter.
-
Privacy
-
The social network will encourage users to register to vote on Thursday, in conjunction with the Electoral Commission
-
When an army as traditional as the UK’s is putting these kinds of resources behind online propaganda units, you know it’s entered the mainstream. Expect many others to follow suit, and for the digital fog of war to become considerably thicker.
-
At the beginning of the year, I did something I’ve never done before: I made a new year’s resolution. From here on out, I pledged, I would install only digitally signed software I could verify hadn’t been tampered with by someone sitting between me and the website that made it available for download.
It seemed like a modest undertaking, but in practice, it has already cost me a few hours of lost time. With practice, it’s no longer the productivity killer it was. Still, the experience left me smarting. In some cases, the extra time I spent verifying signatures did little or nothing to make me more secure. And too many times, the sites that took the time to provide digital signatures gave little guidance on how to use them. Even worse, in one case, subpar security practices of some software providers undercut the protection that’s supposed to be provided with digitally signed code. And in one extreme case, I installed the Adium instant messaging program with no assurance at all, effectively crossing my fingers that it hadn’t been maliciously modified by state-sponsored spies or criminally motivated hackers. More about those deficiencies later—let’s begin first with an explanation of why digital signatures are necessary and how to go about verifying them.
-
The federal government this week announced a reform to an investigative tool that gives the FBI sweeping surveillance power. But a target of that surveillance said the change appears to leave investigators with vast power to snoop — in secret.
The FBI uses national security letters to force business owners to hand over records on their customers, as long as the records are related to a national security investigation. No court approval is needed, and the FBI can impose a gag order on recipients, forbidding them from revealing even the existence of a letter.
-
For many years, the East German Stasi was viewed as the most totalitarian of intelligence services, relentlessly spying on its citizens during the Cold War. But the Stasi’s capabilities pale in comparison to what the NSA can now do, notes former U.S. intelligence analyst Elizabeth Murray.
-
The US has always been the world leader of cyberwar, hacking damn near everyone without any repercussions. And, for years, US intelligence officials and private contractors have been milking hacks to secure billions in cyber security programs: all you need is an enemy, and they will sell you the cure.
Their blatant hypocrisy, threat inflation and militaristic rhetoric must be challenged if we are to have a free and equal internet.
-
The Australian government has renewed its push to get the controversial data retention bill through parliament as soon as possible, despite pleas from privacy advocates and security experts for the government to substantially rewrite the proposed laws.
-
President Obama’s administration has finally offered some more detail on how its promises to curb the National Security Agency’s blanket surveillance of the global internet have been implemented. But it’s apparent the measures have offered little in the way of change, according to critics, especially for the majority of those affected: non-Americans.
A report from the Office of the Director of National Intelligence noted that if non-Americans’ conversations are hoovered up by the NSA their messages will remain on NSA servers for five years “unless the information has been determined to be relevant to, among other things, an authorized foreign intelligence requirement”, or if the Director of National Intelligence decides the information is worthy of retention.
-
The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.
In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . . get access to the emails themselves,” reads one top secret 2010 National Security Agency document.
-
Civil Rights
-
In 2003, Sami Al-Arian was a professor at the University of South Florida, a legal resident of the U.S. since 1975, and one of the most prominent Palestinian civil rights activists in the U.S. That year, the course of his life was altered irrevocably when he was indicted on highly controversial terrorism charges by then Attorney General John Ashcroft. These charges commenced a decade-long campaign of government persecution in which Al-Arian was systematically denied his freedom and saw his personal and professional life effectively destroyed.
-
OK, so consorting with murderous war criminals has been a common go-to move for Republican candidates since Dick Cheney appointed himself vice-president and puppet master back in Aught-Aught. But even TBOTP has to admit there are certain large brown spots on the apple these guys are polishing. Watch how deftly these areas of rot get mentioned and then dismissed.
-
What happened at the Abu Ghraib prison during the early days of the Iraq war is no secret: The whole world has seen the appalling photos.
Detainees under American control were raped, beaten, shocked, stripped, starved of food and sleep, hung by their wrists, threatened with death and, in at least one case, murdered. These are war crimes, punishable under both American and international law.
-
A little-noticed passage in President Obama’s fiscal 2016 budget is combining with delays by FBI records managers to frustrate inspectors general and their congressional allies in their efforts to clarify the watchdogs’ authority to gain full access to agency documents.
-
The leak trial of CIA officer Jeffrey Sterling never got near a smoking gun, but the entire circumstantial case was a smokescreen. Prosecutors were hell-bent on torching the defendant to vindicate Operation Merlin, nine years after a book by James Risen reported that it “may have been one of the most reckless operations in the modern history of the CIA.”
That bestselling book, State of War, seemed to leave an indelible stain on Operation Merlin while soiling the CIA’s image as a reasonably competent outfit. The prosecution of Sterling was a cleansing service for the Central Intelligence Agency, which joined with the Justice Department to depict the author and the whistleblower as scurrilous mud-throwers.
-
Health and social services have been given permission to force entry into the woman’s home, use ”necessary restraint” and sterilise her, at a hearing in the Court of Protection in London.
-
Internet/Net Neutrality
-
-
Today, we heard that we’ve won a stunning victory in the fight to protect net neutrality. The U.S. Federal Communications Commission (FCC) has put forward a draft proposal for strong, enforceable net neutrality rules based on classifying broadband as a Title II communications service.
-
Within a few weeks we’ll have a huge document full of legalese on the Federal Communications Commission’s net neutrality rules, to replace the near-200-page order from 2010 that was mostly overturned by a court ruling last year.
-
Verizon sued to block the FCC’s 2010 net neutrality order, leading to a court ruling that threw out rules against blocking and discrimination. The court said the FCC erred by imposing per se common carrier rules—the kind of rules applied to the old telephone network—onto broadband without first classifying broadband providers as common carriers. Now, FCC Chairman Tom Wheeler is proposing to reclassify broadband as a common carriage service, an even worse outcome for Verizon and fellow ISPs.
-
Internet freedom at last! FCC Chairman Tom Wheeler’s proposal is for full Title II reclassification for ISPs, defining ISPs as utilities and preventing fast-lane profiteering
-
The Internet rules the Federal Communications Commission proposed Wednesday would apply to fixed and wireless broadband, regulate interconnection deals, and ban fast lanes.
To cut through the jargon of telecommunications policy, FCC Chairman Tom Wheeler called the proposal the “strongest open Internet protections ever proposed by the FCC.”
Wheeler’s proposal would reclassify broadband Internet like a utility, similar to traditional telephones. The stronger authority, recommended by President Obama, would ban service providers from blocking or slowing Internet traffic, while also blocking companies from negotiating deals for faster service.
-
Zero-rating won’t be blocked by the FCC’s Open Internet proposals—and it could a major challenge to net neutrality
-
U.S. Federal Communications Commission chairman Tom Wheeler just pulled out the big gun in the net neutrality battle: In an op-ed published on Wired, Wheeler announced a proposal to invoke the agency’s Title II authority, which would allow the FCC to regulate broadband Internet service as a public utility, similar to phone service.
-
Intellectual Monopolies
-
In the last TTIP update I wrote about two important leaks, both dealing with regulatory matters. One of those came from the Greens MEP Michel Reimon, and he’s released another important document, this time concerning dispute settlement [.pdf]. Once more, it has been re-typed from the actual leaked document in order to minimise risk for the source (to whom thanks….)
-
The Trans-Pacific Partnership, now headed to Congress, is a product of big corporations and Wall Street, seeking to circumvent regulations protecting workers, consumers, and the environment. Watch this video, and say “no” to fast-tracking this bad deal for the vast majority of Americans.
-
Copyrights
-
An anti-piracy outfit working on behalf of porn studios has surprised ‘pirate’ students with demands for cash. The University of California passed on the $300 threats from CEG TEK alongside suggestions to pay up, but advice given by a campus computer science professor could put even more people at risk.
Permalink
Send this to a friend
02.04.15
Posted in News Roundup at 6:32 pm by Dr. Roy Schestowitz
Contents
-
It’s a great time to be alive if you’re a fanatic about the particulars of various performance-boosting graphics APIs. AMD’s Mantle is here, Microsoft’s DirectX 12 is coming with Windows 10, and at GDC in early March we’ll hear the first news about a successor to the open-source, cross-platform OpenGL API.
That’s not necessarily huge news if you’re using a Windows machine—unless this OpenGL successor is really special, most games will probably stick with DirectX 12 in a perpetual love/hate relationship. If you’re a Mac or Linux gamer, however, the next-generation OpenGL is potentially a huge deal.
-
Desktop
-
A few days ago I thought I’d never run something different than Mac OS X on my MacBook, but then I remembered how great Ubuntu ran some years ago on my old laptop. Apart from that my development environment was easily adoptable to Ubuntu and I really love customising stuff, so I made the switch to Ubuntu.
-
Server
-
Alex Williams: Alex, you have been developing CoreOS, and it has really been on a tear over the past several months. We’re going to talk a little bit about what you’re doing, but also I want to learn more about who is Alex Polvi? How did you get started in programming? Were you in grade school? Were you at middle school?
-
Audiocasts/Shows
-
Kernel Space
-
While the new Lenovo ThinkPad X1 Carbon with Broadwell processor is playing fairly well under Linux, the new Dell XPS 13 laptop/ultrabook that’s been of interest to many Phoronix readers still has a lot of work ahead although it’s effectively usable right now.
-
The 2015 “Guide to the Open Cloud: Open Cloud Projects Profiled” is The Linux Foundation’s second publication on the open cloud, which was first published in October 2013. The updated guide adds new projects and technology categories that have gained importance in the past year. The report covers well-known projects like Cloud Foundry, OpenStack, Docker and Xen Project, and up-and-comers such as Apache Mesos, CoreOS and Kubernetes.
-
The system and service manager systemd has plans to include a bootloader that can support UEFI secure boot, according to a report of a talk given by the main systemd developer, Lennart Poettering.
The bootloader Gummiboot is being considered, according to the talk that Poettering gave at the Free and Open Source Developers’ European Meeting in Brussels recently.
-
Graphics Stack
-
A change accepted into Wayland’s Weston compositor codebase on Monday allows for maximizing XWayland windows.
-
While libinput is most frequently talked about in the context of an input library handling the needs of Wayland compositors (and potentially Mir), it’s set to also take on the roles of an input driver for the X.Org Server.
-
Last weekend at FOSDEM 2015 there was a status update concerning Gallium3D Nine, the Direct3D 9 state tracker that runs Windows games in conjunction with Wine.
-
Alexandre Courbot spoke at FOSDEM this past weekend about enabling the NVIDIA Tegra K1′s “GKA20A” Kepler-based graphics processor with the open-source Nouveau driver.
-
Keith Packard took a break from his new job at Hewlett Packard working on Linux support for “The Machine” to put out the official release of X.Org Server 1.17.
X.Org Server 1.17.0 was released a few minutes ago and is codenamed Côte de veau. This is a half-year update to the X.Org Server and features integration of the xf86-video-modesetting DDX driver, much improved GLAMOR support, and other improvements.
-
Marek Olšák pushed out more RadeonSI Gallium3D driver improvements today for bettering the open-source Linux graphics driver support for the AMD Radeon HD 7000 series graphics cards and newer.
-
Benchmarks
-
While the comparison due out later this week will have Ubuntu Linux benchmark results from close to a dozen systems, this one-page article is just a quick glance comparing the ThinkPad X1 Carbon to an aging ThinkPad W510. While the ThinkPad X1 Carbon has a Core i7 5600U with HD Graphics 5500, the ThinkPad W510 has a Core i7 720QM processor with dedicated NVIDIA Quadro FX 880M GPU with 1GB of dedicated vRAM.
-
Applications
-
-
Proprietary
-
Google Drive will available in Linux soon- this is a promise that was first made in April 2012. The good news is that an official client for Linux is now available. Interestingly, the solution comes in form of a command-line program, which is a product of someone who was involved in the development of the Drive. The program is open-source, and it is written in “Go” programming language. It is a creation of someone who worked with the Drive development team, Burcu Dogan, and Google reserves the copyright.
-
Last week we covered the launch of Vivaldi, a new Chromium-powered, multi-platform web browser headed by the former CEO of Opera. In the past few days the Vivadli tech preview has been downloaded more than four hundred thousand times.
-
Instructionals/Technical
-
Wine or Emulation
-
While many Linux gamers are excited about the Gallium3D Direct3D 9 state tracker for offering better Windows gaming performance on Linux with the open-source drivers, the patches on the Wine side haven’t been accepted upstream. Here’s some clarification from one of the leading Wine developers on the graphics front to explain the opposition to the work.
-
Games
-
While Steam had some great game deals over the holidays and titles like the Metro Redux games are fresh to Linux, these events didn’t do anything to boost the Steam Linux market-share with the reported percentage of Linux gamers contracting slightly during January.
-
The Humble Bundle crew has launched their latest two-week sale of pay-what-you-want games. This newest bundle is the Star Wars Humble Bundle, but for Linux gamers you’re left out this round.
-
From the Depths is a game we completely missed covering! Sadly, Steam still doesn’t show games that are new for Linux if the Linux build comes later in the development cycle sometimes, so we are fixing this by covering it now!
-
AER is an upcoming atmospheric adventure platformer in which you play as a girl who can transform into bird and explore a world of floating islands and ancient secrets. The game will be published by Daedalic Entertainment and is slated for a 2016 release.
-
The Steam Hardware & Software Survey for January 2015 has been published by Valve and it looks like the Linux platform is holding steady, with a slight decrease that can be easily attributed to statistical error.
-
Valve is preparing to unveil glNext at the upcoming GDC 2015 in March. This is supposed to be the successor of the current OpenGL and it might be the one thing that could really turn Linux into a gaming platform.
-
Crimsonland is an old top-down shooter developed by Reflexive Entertainment and published by 10tons Ltd for the Linux platform 11 years later, but we’ll take what we can get.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
last week, I handed in my Master’s thesis. I was studying Physics for about 7.5 years now. I started using KDE 3.5.x while still in school and in my first student job as a web developer. At university, I taught myself C++ while working as a sysadmin at the faculty, in order to contribute to Kate, Quanta and KDevelop. I quickly discovered that Physics wasn’t so much my thing but the German education system doesn’t make it easy to switch fields. Thus, I endured and continued. And I kept coding though, mostly in my spare time, but also while working part-time for KDAB. Now, all these years later, I’m one of the official maintainers of KDevelop, and also contribute to KF5, esp. KTextEditor regularly. I created tools such as Massif-Visualizer and heaptrack. I became a Qt approver and maintainer of the Qt WebChannel module. And, starting from May this year, I’ll finally be working full-time for KDAB. Oh, how things have changed! Just compare Plasma 5.2 today to the KDE 4.0 alpha 1 or whatever it was that I tried in 2007 – a difference of night and day!
-
The crowdfunding campaign we ran on IndieGoGo to support the work on new unified graphics for GCompris finished yesterday. We didn’t reach the goal set to complete the whole new graphics, but thanks to 94 generous contributors, we collected 3642$. Also we got 260€ directly from the Hackadon 2014, many thanks to those contributors too! Thanks again to everyone who contributed and helped to spread the word!
-
digiKam Software Collection, the digital photo management application that works best on KDE desktops, has advanced to version 4.7.0 and is now available for download.
-
-
Another systemd component that can be used by Plasma 5 is timedated and its other daemons for allowing basic system admin tasks like time adjustment, locale management, managing the hostname, etc, through DBus interfaces.
-
I’m all for free-as-in-freedom. Because of the number of interfaces that software has with the world (both human and programmer), it’s very easy to lock people into proprietary software and create monopolies. Not having free competition is a bad way for any economy to run. I’m surprised at how infrequently this economic argument is made.
I’m also all for community-made software. It allows us to have control and fix problems that we find, to share knowledge, and to create professional and personal relationships. I love that I can go to almost any city in the world and meet up with someone who wants to chat about the code we work with.
-
A few days ago, Elias Probst asked me to provide some shell functions to easily fetch the current activity so that he could use it with the TaskWarrior – to separate tasks for different activities. These are now avilable in the KActivities repository and … I’m not going to explain them in this post. Maybe the next one.
-
GNOME Desktop/GTK
-
The GNOME OPW has been the program encouraging women and those associating as women to get involved with open-source software whether it be actual code development or other related tasks like working on documentation, graphics, etc. In return, the women gain experience and are provided with a few thousand dollars. This winter is when the X.Org Foundation became the latest project involved with the OPW.
-
-
-
New Releases
-
OpenELEC is an embedded operating system built specifically to run the famous KODI (XBMC) media player solution. The developers have just pushed version 5.0.1 out the door, a day after the release of Kodi 14.1.
-
Firmware for many Broadcom wireless devices has been included, so Q4OS will automatically recognize and make ready most of the BCM43 and other wireless network cards. New command line tools ‘qrepoadd’, ‘qreporm’ and ‘qrepolist’ has been introduced to easily handle external repositories, for example ‘sudo qrepoadd trinity’ adds complete Trinity repository. Q4OS Development Pack is now able to create more comfortable password-less installers for privileged ‘sudo’ users. It will be used to update most of standard Q4OS application installers in the following weeks. A few another improvements and bug fixes is provided, particularly for alternative KDE4 desktop environment.
-
-
There are many options available today for users looking at Linux distributions tailored for security research, and among them is BackBox Linux, which was updated to version 4.1 on Jan. 29. Backbox Linux 4.1 is based on the Ubuntu 14.04 LTS (Long Term Support) distribution and uses the Xfce desktop environment. BackBox Linux is not intended to primarily be a user-focused privacy distribution, as is the case with Tails, but rather is more aligned with Pentoo, CAINE and Kali Linux, all of which focus on providing tools for security analysis. Though BackBox is not primarily a privacy distribution, it does have tools that enable security researchers to stay anonymous while conducting research. For example, a RAM wiping tool will erase the memory on the system that Backbox is running when the operating system shuts down. Plus, BackBox includes a command line interface wizard that provides users with options for enabling anonymous network traffic over Tor (The Onion Router), as well as masking a user’s hostname. In this slide show, eWEEK takes a look at some of the features in the BackBox Linux 4.1 release.
-
Red Hat Family
-
Security vulnerabilities, like most things, go through a life cycle from discovery to installation of a fix on an affected system. Red Hat devotes many hours a day to combing through code, researching vulnerabilities, working with the community, and testing fixes–often before customers even know a problem exists.
-
Fedora
-
The election for Fedora 22 – Fedora 23 members of FESCo (the Fedora Engineering Steering Committee) is now open (through 00:00 February 4th — note that that’s today, Tuesday, February 3rd — and early evening in the United States).
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical published details about a single ClamAV vulnerability, in a security notice, for its Ubuntu 14.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems, that has been found and fixed.
-
-
Data Translation unveiled a Linux-enabled dynamic signal analyzer for measuring noise and vibration, based on a BeagleBone Black-like embedded computer.
The DT7837 is used for testing audio, acoustic, and vibration on mobile devices and other electronics gear. The dynamic signal analyzer can simultaneously measure four 24-bit IEPE sensor inputs at a sampling rate of 102.4 kS/s, says Data Translation.
-
If you’re interested in open hardware, this one has been hard to miss: this week, the Raspberry Pi Foundation announced the release of the Raspberry Pi 2. This tiny open hardware project has grown so large that its new releases are now making headlines in the New York Times, Wall Street Journal, and on the BBC.
-
Gone are the days when Linux users tried to run their free and open source operating system on Microsoft-controlled hardware: PCs. As Microsoft’s OS and Office market share is declining, and with an (almost) failed mobile platform, the company is now looking at open source for its survival.
-
Makers, hobbyists and developers that enjoy using the Raspberry Pi to create projects may be interested in OpenPi a new piece of hardware that is powered by the 32 bit ARM based Raspberry Pi Compute Module and soon the Quad core Raspberry Pi version 2.
-
The Linux-based “Eero” WiFi router uses mesh networking and self-correcting code to reduce dead zones and optimize speed, and offers mobile app access.
WiFi routers can be extended with WiFi repeaters or extenders to reduce dead zones and boost signal strength in large or multi-story homes, as well as long railroad apartments. Yet, these devise often don’t live up their claims, especially now that more and more people are simultaneously streaming video.
-
There’s plenty of excitement in the Raspberry Pi world this week: the big news is the announcement of the Raspberry Pi 2 hardware – the long-awaited and much-anticipated successor to the immensely popular original unit, which will now be known as the Raspberry Pi 1.
But that’s not the only news: there is also a new release of the Raspbian operating system and the NOOBS (New Out Of Box Software) package. I am just back from a week in Amsterdam, and will be leaving in a few days for a short trip to Iceland, so I just have time to download and install the new software on my two Raspberry Pi 1 units (Model B and B+), and I have ordered a RPi 2 so I hope that will be waiting for me when I return. At least, the Swiss Pi-Shop says that it will be available on 3 February so I am keeping my fingers crossed – because almost all of the excitement is about the Raspberry Pi 2.
-
Phones
-
Android
-
A few hours ago, we spotted no less than five mentions of “Android 5.1″ on Google’s Indonesian Android One page. Considering that 5.1 is quite a jump from 5.0.2, and something like 5.0.3 seemed more likely as the next bug fixer, we were cautious to suggest it may have been a mistake or a very persistent typo.
-
The Nexus 9 tablet is Google’s attempt to take a stab at the high end of the tablet market. But did the company hit or miss the bull’s eye with the Nexus 9? AndandTech has a very deep and detailed review that reveals the good and bad of the Nexus 9.
-
For the past few years, we’ve seen Google place significant emphasis on price as a way of competing with other tablets on the market. The original Nexus 7 managed to deliver a good tablet experience without the conventional 500 USD price for a tablet. The successor to the Nexus 7 was even more incredible, as it pushed hardware that was equal to or better than most tablets on the market at a lower price. However, as with most of these low cost Nexus devices not everything was perfect as corners still had to be cut in order to hit these low price points.
-
Everyone has their personal favorite programs, but some users are more serious about their software than others. One such group includes the people at LinuxQuestions. These are Linux experts who are kind enough to answer newbies’ endless questions. So when they pick out their favorite Linux distributions and open-source programs, I take their opinions seriously.
-
Many people in the Linux community look forward to the always highly detailed and reliable results of the annual surveys from LinuxQuestions.org. As Susan covered in detail in this post, this year’s results, focused on what readers at the site deem to be the best open source projects, are now available. Most of the people at LinuxQuestions are expert-level users who are on the site to answer questions from newer Linux users.
-
Contributing to an open source project is free in two ways. In one aspect you are giving of your talents to something much greater, and here you are free to use and share ideas. The concept of money and price is a man-made invention. The best things in life really are free!
-
Facebook has always used and contributed back to open source software. But over the past few years the company has become much more active in the open source community, releasing more of its own internal tools and participating in upstream development on the Linux kernel and many other projects. As a result, the company can more easily attract and retain developers, has increased code quality, and sees faster innovation, says James Pearce, head of open source at Facebook.
-
Docker is an open source software tool that supports packaging of an application and its dependencies into a virtual container that can run on a variety of infrastructures. Docker’s modern, lightweight design enables flexibility and portability on where applications can run and allows for faster, more efficient application development and deployment approaches.
-
This project is doing amazing work, but despite all the effort, it only supports very small number of phones based on one particular baseband chip because this one happens to accept unsigned firmware. It only supports 2G (and not even completely), so 3G and 4G are completely out of the question. Don’t expect to flash this on your Samsung Galaxy Whatever any time soon.
-
As these companies prove by their steadfast commitment to open source, and despite the recently discovered Linux Ghost vulnerability, faith is still strong amongst leading U.S. technology companies that open source software is the best solution for keeping software safe.
-
Events
-
As we get closer to the Southern California Linux Expo — SCALE 13x for those of you keeping score at home — it bears mentioning that the largest community-run Linux/FOSS show in North America has grown to host a lot of other sub-events during the course of the four-day expo.
In years past, Ubuntu, Fedora, PostgreSQL and Chef held their own sessions at SCALE — Ubucon, Fedora Activity Day, PostgreSQL Days and Intro to Chef respectively — and they’ll be back this year. Highlighting the “event within an event” lineup at SCALE 13x are also a few others.
-
The day will showcase open source solutions and technology, which offer an alternative to proprietary systems more commonly used by businesses.
-
Because of the vast scale of the event, around five thousand visitors, there is something for everybody, which again makes it possible for smaller FOSS communities, like Ada language practitioners, to meet at FOSDEM, rather than spending time arranging their own conference.
-
The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today is announcing the debut in 2015 of ContainerCon, a new event dedicated to bringing together leading developers and contributors of Linux containers with the Linux kernel developer community. The event will be co-located with LinuxCon + CloudOpen North America in Seattle, August 17-19, 2015.
-
Linux Foundation CMO Amanda McPherson said, “We believe it is important to offer a space for those working with containers, and those interested in learning more about them, to come together and share knowledge about this important new technology. Since Linux is the platform for containers, it’s a natural fit.”
-
SaaS/Big Data
-
Spencer Krum and Elizabeth K. Joseph shared their experience both using and providing the public infrastructure used by OpenStack at the configuration management developer room at FOSDEM.
-
Early in 2014, we launched our company Tesora as the OpenStack Trove company focused on the open source database-as-a-service project. This wasn’t, however, a brand new open source company. We began our life as ParElastic, developing a proprietary engine that could transparently scale-out MySQL.
-
The open-source OpenStack cloud community is now choosing the name for what will be the second platform release later this year. The Kilo release is set to debut in May ahead of the OpenStack Vancouver Summit.
The naming convention for OpenStack releases is to be somewhat related to the location of the design summit, so the ‘L’ name will need to have something to do with Vancouver, British Columbia or Canada even. The current list is now down to four candidate names:
-
VMware is much in the news this week for its announcements on the cloud computing front. In a blog post, the company announced the launch of VMware Integrated OpenStack, which, notably, is available for use, free of charge, with VMware vSphere Enterprise Plus, vSphere with Operations Management Enterprise Plus and all editions of vCloud Suite. The company is also pushing its vision of “one cloud, any app, any device.”
-
Databases
-
DataStax will announce it has bought Aurelius, whose team is behind the Apache-licensed Titan distributed graph database for Cassandra. Financial terms were not revealed.
-
-
Oracle/Java/LibreOffice
-
At the huge FOSDEM conference in Brussels this weekend, the developers of LibreOffice for Android presented their work and road map. LibreOffice for Android is currently available as a file viewer in the Google Play Store, but the team is making rapid progress developing editing capabilities as well.
-
CMS
-
Funding
-
BSD
-
Hans Wennborg at Google has put out the second RC of LLVM 3.6 and its sub-projects like Clang. The RC2 version just has more bug-fixes over what the RC1 release contained a short time ago. LLVM 3.6 was branched in the middle of January.
-
Over the past several months, the teams responsible for supporting the FreeBSD operating system discussed the current support model, and how that model can be improved to provide better support for FreeBSD users and consumers.
-
FSF/FSFE/GNU/SFLC
-
While it doesn’t get talked about too much these days, GNU Hurd remains under active development. A GNU Hurd developer has shared a status update about the state of Hurd in 2015 and how you can start contributing.
Samuel Thibault spoke at FOSDEM this past weekend about getting involved with this free software kernel project as an alternative to Linux, although Thibault is also a Linux user/developer. While you can see his PDF slides if you’re curious about getting involved with Hurd development, the most interesting portion of his presentation to us was the status update on GNU Hurd.
-
My latest Intel Broadwell Linux benchmarks are looking at the performance of the in-development GCC 5 compared to GCC 4.9, the current stable release shipped by many Linux distributions throughout 2014.
-
Yesterday ARM announced the new high-end Cortex-A72 CPU and today it’s supported by the GCC and LLVM Clang compilers.
-
Project Releases
-
Shadow Daemon is a collection of tools to detect, protocol and prevent attacks on web applications. Technically speaking, Shadow Daemon is a web application firewall that intercepts requests and filters out malicious parameters. It is a modular system that separates web application, analysis and interface to increase security, flexibility and expandability.
-
MongoDB 3.0 was announced today with an expected GA release in March. MongoDB 3.0 has “massive improvements to performance and scalability, enabled by comprehensive improvements in the storage layer.”
-
Public Services/Government
-
The forensic analysis code called Dshell has been used, for nearly five years, as a framework to help the U. S. Army understand the events of compromises of Department of Defense networks.
-
-
Licensing
-
Two of the most used Free Software licenses are the GNU General Public License (GPL) and the GNU Lesser General Public License (LGPL). Both are copyleft licenses, meaning that you can use them as long as you do not remove the Free Software rights from downstream users. The difference is that the LGPL can be linked unto non-free software (as long as the LGPL library itself stays free), but with the GPL everything needs to be free. In 2007, the FSF published an update to both licenses, so now we have version 2 (“GPLv2” and “LGPLv2.1”) and version 3 (“GPLv3” and “LGPLv3”).
-
Openness/Sharing
-
Smart refrigerators are not entirely new but General Electric’s (GE’s) ChillHub is the first to open-up its smarts with built-in USB ports for third-party smart accessories that let you use an app at the grocery store to tell you how much milk, soda, beer, eggs or even separate vegetables are left in the ChillHub. Plus, in collaboration with 3-D printer maker MakerBot Industries, LLC (Brooklyn, N.Y.) and rapid-manufacturer FirstBuild (a collaboration of GE and Local Motors in Louisville, Kentucky), the companies ran a contest to see which ideas from users could be made into serviceable, manufacturable accessories. The winners were announced at the Consumer Electronics Show (CES 2015, Jan. 6-9, Las Vegas).
-
Open Data
-
Most software produces data, and many data owners are currently working out how to release their data publicly as part of a wider “data for good” movement that includes groups like the Engine Room, NGOs, private individuals, communities, and companies.
-
Open Access/Content
-
Over the last few months, a bunch of big foundations have officially stated that all research that they fund via their grants now has to be placed under an open Creative Commons license such as the CC BY license that says that the information can be freely shared and copied, even for commercial purposes, with the only restriction being that you have to attribute the content to the original authors. In September of last year, the Hewlett Foundation kicked it off when it announced that it was requiring CC BY licensing on all content that it funded, followed in November by the Gates Foundation making a similar announcement.
-
Everyone has known for years that RadioShack was dying. Heck, in 2007, the mainstream satirical Onion ran a story, Even CEO Can’t Figure Out How RadioShack Still In Business. That story hit between the time the iPhone was announced and when it was launched, to put it into perspective.
-
Amazon.com Inc., aiming to bolster its brick-and-mortar operations, has discussed acquiring some RadioShack Corp. locations after the electronics chain files for bankruptcy, two people with knowledge of the matter said.
-
Science
-
The top secret documents used to break the Nazi’s Enigma Code were found during the restoration of Hut 6, which housed the unit dedicated to breaking German army and air force messages.
The papers found in 2013 were frozen to prevent further decay, before being cleaned and repaired.
The exhibition is called The Restoration of Historic Bletchley Park and the panels show the processes that were undertaken such as the paint analysis.
Amongst the fragmented codebreaking documents located in the roof of Hut 6 were also parts of an Atlas, a pinboard and a fashion article form a magazine.
-
Security
-
KeePass is a free, Open-Source and useful password manager that creates strong, random password and keep them encrypted on your HD. We to remember passwords, set same passwords for each website/services but that is making all of your accounts unsecure and exposing to hackers. Once any of the website that you’ve signed up on is compromised then most often hackers use username and passwords to open other accounts. So using same password is one way making account unsecured.
-
A vulnerability in fully patched versions of Internet Explorer allows attackers to steal login credentials and inject malicious content into users’ browsing sessions. Microsoft officials said they’re working on a fix for the bug, which works successfully on IE 11 running on both Windows 7 and 8.1.
-
Defence/Police/Secrecy/Aggression
-
As retired Gen. and ex-CIA Director David Petraeus was about to speak in New York City last Oct. 30, someone decided to spare the “great man” from impertinent questions, so ex-CIA analyst Ray McGovern was barred, arrested and brought to trial, prompting McGovern to ask some questions now in an open letter.
Dear Gen. David Petraeus,
As I prepare to appear in New York City Criminal Court on Wednesday facing charges of “criminal trespass” and “resisting arrest,” it struck me that we have something in common besides being former Army officers – and the fact that the charges against me resulted from my trying to attend a speech that you were giving, from which I was barred. As I understand it, you, too, may have to defend yourself in Court someday in the future.
-
Environment/Energy/Wildlife
-
California has a drinking water problem on top of its drinking water problem. Oil companies, with the permission of state officials, have been injecting their wastewater into clean aquifers, according to a damning new report. The practice goes back decades, and is now threatening water quality at a time when the drought-plagued state needs every drop it can get.
-
Finance
-
How would you like to live in an economy where robots do everything that can be predictably programmed in advance, and almost all profits go to the robots’ owners?
Meanwhile, human beings do the work that’s unpredictable – odd jobs, on-call projects, fetching and fixing, driving and delivering, tiny tasks needed at any and all hours – and patch together barely enough to live on.
Brace yourself. This is the economy we’re now barreling toward.
They’re Uber drivers, Instacart shoppers, and Airbnb hosts. They include Taskrabbit jobbers, Upcounsel’s on-demand attorneys, and Healthtap’s on-line doctors.
-
PR/AstroTurf/Lobbying
-
Early news coverage of the 2016 presidential campaign has tacitly allowed the GOP to disingenuously rebrand itself as a party of the middle class, despite the fact that the party’s new rhetoric doesn’t align with its policy positions that continue to exacerbate income inequality. When highlighting Republican rhetoric about the need to reduce income inequality, media should take care to hold the GOP accountable for its actions, not just its words.
-
Censorship
-
But the real issue isn’t really that an international company that happens to be led by an American has divorced itself from a moral stand. That kind of thing happens all the time and can be chalked up to the simple fact that, in capitalism, money is king and values are the jester entertaining the masses. And, just to be clear, I’m not arguing that there is even anything wrong with the above. The problem is the promise and what it is designed to do.
That promise was meant to accomplish two things. The first is the obvious public relations benefit Facebook received from going all Western values in public. The audience that would read Zuckerberg’s proclamation was always going to be largely in favor of the values expressed. That same audience likely largely won’t ever make themselves aware of Facebook’s kneeling before the censorious Turkish government. And that’s not a bug, it’s a feature.
-
Privacy
-
Never heard of FIPS-185? Perhaps you know it as the Escrowed Encryption Standard (EES). Its best-known implementation was a chipset known as the Clipper Chip. The Clipper Chip—and the lesser known implementation, Capstone—were developed by the U.S. National Security Agency (NSA) to be installed in communications devices, for the purpose of protecting private communications, but which also provided “back door” access to law enforcement agencies to conduct electronic surveillance, subject to court order. Naturally, this raised a lot of questions and concerns (some of which are worthy of a whole other blog post).
-
Our Supreme Court has handed down a chilling ruling about the state’s right to invade individual privacy – particularly when it’s contained, as it is so often these days, on computers or mobile phones.
-
A year after President Obama ordered modest changes in how the nation’s intelligence agencies collect and hold data on Americans and foreigners, the administration will announce new rules requiring intelligence analysts to delete private information they may incidentally collect about Americans that has no intelligence purpose, and to delete similar information about foreigners within five years.
The new rules to be announced Tuesday will also institutionalize a regular White House-led review of the National Security Agency’s monitoring of foreign leaders. Until the disclosures in the early summer of 2013 by Edward J. Snowden, the former N.S.A. contractor whose trove of intelligence documents is still leaking into public view, there was no continuing White House assessment of whether the intelligence garnered from listening to scores of leaders around the world was worth the potential embarrassment if the programs became public.
-
On the 13th of February The Social Security (Information-sharing in relation to Welfare Services etc.) Regulations 2015 come into force. On that date anyone claiming Universal Credit will lose control over who can see their most sensitive personal information. There was a consultation, of course. Sadly, the people who are affected by the new regulations don’t count as important enough to consult and the consultation ended on the 12th of January.
-
It’s been a year since Sen. Chuck Grassley (R-Iowa) asked Attorney General Eric Holder how it handled National Security Agency officials who abused the agency’s powers, and he still hasn’t gotten an answer.
Now, the head of the Senate Judiciary Committee is renewing his call for Holder to explain whether or not any of the dozen people who used spying tools to track their spouses or others without authorization have been punished.
-
“Warrant canary” is a colloquial term for a regularly published statement that a service provider has not received legal process that it would be prohibited from saying it had received, such as a national security letter. Canarywatch tracks and documents these statements. This site lists warrant canaries we know about, tracks changes or disappearances of canaries, and allows submissions of canaries not listed on the site.
-
Given Germany’s high-profile attachment to privacy, it’s always interesting to hear about ways in which its spies have been ignoring that tradition.
-
National Security Agency whistleblower Edward Snowden answered questions from Canadian students on Monday, telling them that mass surveillance can actually harm the ability to prevent terrorist attacks while also being detrimental to personal privacy.
Speaking at Upper Canada College in Toronto via webcam from Russia, Snowden was joined by journalist Glenn Greenwald as the pair fielded questions from high school students. When asked about mass domestic surveillance – which new reports show Canada is engaged in – Snowden argued that the practice could divert attention and resources from more focused efforts that would yield better results.
-
With legislation to overhaul a key surveillance program stalled on Capitol Hill, the Obama Administration issued a report Tuesday highlighting reforms it has made to the nation’s snooping efforts since Edward Snowden jump-started public debate on the issue with a series of unauthorized revelations more than a year ago.
-
This section lays out all the independent advice the IC has sought in the last 18 months, from the advice largely ignored (President’s Review Group) to narrowly scoped (the National Academies of Science report that assessed whether the IC could get the same features of the current phone dragnet, without assessing whether it was effective) to the largely inane (Congressional hearings).
-
The Office of the Director of National Intelligence (ODNI) announced Tuesday that it would immediately implement new surveillance reforms, which it claims illustrate an “ongoing commitment to greater transparency.”
These new changes, among others, stipulate that content interception cannot be used to intentionally target Americans and permanent residents, change secrecy limits on National Security Letters, require that non-intelligence related information collected on Americans be deleted, and restrict that similar data gathered on foreigners be deleted after no later than five years.
-
Via Ali Watkins’ story on Dianne Feinstein’s vindication by the Senate parliamentarian, Ron Wyden has written Eric Holder a letter listing all the unfinished business he’d like the Attorney General to finish before going off to his sinecure defending banks (my assessment, not Wyden’s).
[...]
Wyden has apparently been asking this for “several years.” While that doesn’t entirely rule out CIA spying on SSCI (which, after all, DOJ has answered by not prosecuting), it seems it is some other action he learned about under Obama’s tenure.
-
Civil Rights
-
So, they won’t carry machine guns while policing protests, but they’ll be in easy reach. Bratton stated that responding to protests and terrorist attacks require “overlapping skills,” hence the creation of a single unit. There has been no further clarification on what these “skills” might be, other than possibly being able to discern whether it’s a protest or terrorist attack they’re dealing with and, consequently, whether the machine gun stays in the squad car.
-
A federal jury saw a final clash between prosecutors and lawyers for Ross Ulbricht on Tuesday as the Silk Road drug-trafficking trial sped to a close.
The case will be with the jury shortly, after a stunningly short defense case. Ulbricht’s lawyers put on three brief character witnesses yesterday. Today, they brought a private investigator who offered just a few minutes of testimony and a former roommate of Ulbricht’s in San Francisco who only knew him for a few months.
-
Eric Holder is reaping applause as his six-year reign as Attorney General comes to a close. But Holder’s record is profoundly disappointing to anyone who expected the Obama administration to renounce the abuses of the previous administration. Instead, Holder championed a Nixonian-style legal philosophy that presumed that any action the president orders is legal.
Holder championed President Obama’s power to assassinate people outside the United States — including Americans — based solely on the president’s secret decrees. On March 6, 2012, Holder defended presidentially-ordered killings: “Due process and judicial process are not one and the same, particularly when it comes to national security. The Constitution guarantees due process, it does not guarantee judicial process.” TV comedian Stephen Colbert mocked Holder: “Trial by jury, trial by fire, rock, paper scissors, who cares? Due process just means that there is a process that you do.” For Holder and the Obama administration, reciting certain legal phrases in secret memos was all it took to justify executions.
-
Drug Enforcement Administration training documents released to MuckRock user C.J. Ciaramella show how the agency constructs two chains of evidence to hide surveillance programs from defense teams, prosecutors, and a public wary of domestic intelligence practices.
-
CIA whistleblower John Kiriakou has been released from the federal correctional institution in Loretto, Pennsylvania. He checked into a halfway house on February 3 and then went home to be with his family and serve the remaining 86 days of his sentence on house arrest. And, to mark his departure from the facility, he penned a final letter acknowledging everything he will not miss about being incarcerated.
Kiriakou was the first member of the CIA to publicly acknowledge that torture was official US policy under President George W. Bush’s administration. In October 2012, he pled guilty to violating the Intelligence Identities Protection Act (IIPA) when he confirmed the name of an officer involved in the CIA’s Rendition, Detention and Interrogation (RDI) program to a reporter. He was sentenced in January 2013 and reported to prison on February 28, 2013.
For much of Kiriakou’s prison sentence, Firedoglake has published his “Letters from Loretto.” (Firedoglake even published an illustration of one of his letters, which was done by graphic artist Christopher Sabatini.)
Kiriakou begins his final letter by expressing gratitude to all the people who supported him throughout his time in prison. He mentions a few of the friends he made while imprisoned.
-
In highly unusual testimony inside the federal supermax prison, a former operative for Al Qaeda has described prominent members of Saudi Arabia’s royal family as major donors to the terrorist network in the late 1990s and claimed that he discussed a plan to shoot down Air Force One with a Stinger missile with a staff member at the Saudi Embassy in Washington.
The Qaeda member, Zacarias Moussaoui, wrote last year to Judge George B. Daniels of United States District Court for the Southern District of New York, who is presiding over a lawsuit filed against Saudi Arabia by relatives of those killed in the Sept. 11, 2001, terrorist attacks. He said he wanted to testify in the case, and after lengthy negotiations with Justice Department officials and the federal Bureau of Prisons, a team of lawyers was permitted to enter the prison and question him for two days last October.
-
Becoming the first credentialed, well-known media insider to step forward and state publicly that he was secretly a “propagandist,” an editor of a major German daily has said that he personally planted stories for the CIA.
Saying he believes a medical condition gives him only a few years to live, and that he is filled with remorse, Dr. Udo Ulfkotte, the editor of Frankfurter Allgemeine Zeitung, one of Germany’s largest newspapers, said in an interview that he accepted news stories written and given to him by the CIA and published them under his own name. Ulfkotte said the aim of much of the deception was to drive nations toward war.
Dr. Ulfkotte says the corruption of journalists and major news outlets by the CIA is routine, accepted, and widespread in the western media, and that journalists who do not comply either cannot get jobs at any news organization, or find their careers cut short.
-
Starting on April 19, 1956, the federal government practiced and planned for a near-doomsday scenario known as Plan C. When activated, Plan C would have brought the United States under martial law, rounded up over ten thousand individuals connected to “subversive” organizations, implemented a censorship board, and prepared the country for life after nuclear attack.
-
So says a CIA lawyer in court papers explaining why some redacted portions of the 499-page executive summary, released by the Senate Intelligence Committee last December, can never be revealed. The information includes the identifies of covert CIA officers, “code words” used to conceal the identities of countries, “pseudonyms,” “official titles,” the number of people employed by the CIA, and the salaries of people who work for the CIA. The public disclosure of this information, the CIA said, would “damage national security.”
-
enator Lisa Murkowski of Alaska, the new chairwoman of the Energy Committee, was at a reception in Hershey, Pa., last month when aides to Representative Kevin McCarthy of California, the No. 2 Republican in the House, presented her with a party favor: a black windbreaker with the words “Chairman’s Table” on the back.
-
Since June 2013, the American public, press, and policy-makers have been debating the implications of Edward Snowden’s disclosures of mass U.S. government surveillance programs, most established after the 9/11 attacks. Our reliance on modern communications technology and its connection with our basic constitutional rights of free speech and Fourth Amendment protections against warrantless seizures and searches is at the heart of that debate. But while that controversy has raged very publicly (even globally), another series of U.S. government search and seizure activities have only recently started to receive the scrutiny they deserve. And just as the over-reach by the NSA sparked what I have previously termed the “digital resistance movement,” these other searches—conducted by elements of the Department of Homeland Security (DHS)—have sparked a more traditional form of citizen resistance.
-
The mass media have suddenly discovered Jeffrey Sterling — after his conviction Monday afternoon as a CIA whistleblower.
Sterling’s indictment four years ago received fleeting news coverage that recited the government’s charges. From the outset, the Justice Department portrayed him as bitter and vengeful — with the classic trash-the-whistleblower word “disgruntled” thrown in — all of which the mainline media dutifully recounted without any other perspective.
-
Today, the union-backed Our Walmart campaign will hold demonstrations across the country calling on Walmart managers to reverse disciplinary actions against 35 workers in nine states who participated in Black Friday protests against the retailer. Our Walmart will also add claims of illegal retaliation against the workers to an existing case filed with the National Labor Relations Board in October. One of the workers being added to the case is 26-year-old Kiana Howard of Sacramento, California.
-
Internet/Net Neutrality
-
TIM BERNERS-LEE has spoken out in favour of net neutrality, calling it “critical for Europe’s future”.
The World Wide Web pioneer was speaking in a blog on the European Commission website.
The European Parliament has made a clear declaration in favour of net neutrality, but it is open to individual veto by country, and the UK is one of those investigating the pros and cons.
-
Zero-rating – where carriers charge nothing or very little for the data used by specific apps and web services – is a threat to net neutrality, web inventor Tim Berners-Lee has warned.
-
FCC boss Tom Wheeler today confirmed weeks of media leaks by proclaiming he will, in fact, be pushing for Title II based net neutrality rules to be voted on at the agency’s meeting on February 26. In an editorial over at Wired, the FCC boss proclaims that the agency’s new rules will be the “strongest open internet protections ever proposed by the FCC.” Given the FCC’s history, this isn’t saying much; in fact it’s kind of like saying you’re the best triathlete in a late-stage cancer hospice ward. Fortunately Wheeler also notes that, unlike the FCC’s previous rules, these new rules will apply to wired and wireless networks alike.
-
Intellectual Monopolies
-
Copyrights
-
This is hardly surprising, but even as the head of the US Copyright Office, Maria Pallante, has called for the US to roll back the Sonny Bono Copyright Term Extension Act, so that copyright would last the life of an author plus an additional 50 years — rather than the 70 years it is today — the USTR is working to make sure that can’t happen. The latest report from the latest round of negotiations for the Trans Pacific Partnership (TPP) agreement says that the US has effectively bullied all the other participants into agreeing that the floor for copyright terms must be life + 70.
-
Last month, there were several Canadian media reports on how the work of Ian Fleming, the creator of James Bond, had entered the public domain. While this was oddly described as a “copyright quirk”, it was no quirk. The term of copyright in Canada is presently life of the author plus an additional 50 years, a term that meets the international standard set by the Berne Convention. The issue of extending the term of copyright was discussed during the 2009 national copyright consultation, but the government wisely decided against it. Further, the European Union initially demanded that Canada extend the term of copyright in the Canada – EU Trade Agreement, but that too was effectively rebuffed.
-
A federal court in Georgia has quashed a broad DMCA subpoena which required local Internet provider CBeyond to reveal the identities of alleged BitTorrent pirates. The magistrate judge ruled that ISPs don’t have to hand over personal information as they are not storing any infringing material themselves.
Permalink
Send this to a friend
02.03.15
Posted in News Roundup at 6:54 pm by Dr. Roy Schestowitz
Contents
-
The membership of Linux Australia is showing a downward trend, according to the minutes of the organisation’s general body meeting, with current numbers down to 70 per cent of the highest 2014 figure.
The meeting was held on January 12 and the minutes circulated on January 31. During the meeting, the membership numbers were claimed to be the same as 2014 by one member, Michael Still, but the outgoing secretary, Kathy Reid, clarified that they were about 70 per cent of 2014.
-
One of the comments I received from my previous article was that another operating system has just as much capability on the command line as Linux does. This person said that you could just add this software to get these features and that package if you want those features. That makes my point. With Linux, it is all built in. You do not have to go elsewhere to get access to the power of Linux.
Many people left comments stating that they could see how it might be nice to know the Linux philosophy as a historical curiosity, but that it had little or no meaning in the context of daily operations in a Linux environment. I beg to differ. Here is why.
-
Microsoft is working very hard on Windows 10 and it’s baking everything on the success of this new operating system. This prompted some voices in the community that it’s the end of the Linux desktop, whatever that means, but I’m here to tell you that’s not really the case.
-
Desktop
-
The M3800 with Ubuntu is available now, and getting rid of Windows 8.1 carves a savings of $101.50 from the price tag. This means the starting price is $1533.50, which is certainly not cheap, but for users planning to replace Windows with Linux anyway, not being forced to spend extra for the OS is a solid deal.
-
-
After wiping Windows 8.1 off the laptop, I started with the Fedora 21 installation.
-
There’s an odd thing happening out there in the world. Some Mac owners are actually replacing OS X with Linux. While there are no numbers available to show how many are doing this, it’s clearly something that has been happening for a while as you can see from this thread on Reddit. I have some thoughts of my own to share about this, and I’ll tell you in this post why some Apple customers might be moving to Linux on their Macs.
-
Kernel Space
-
This concept builds further upon the socket activation. When restarting a service, systemd can push the used sockets/file descriptors of that service to the sytemd daemon and pass it again to the service once it restarted. This way, no sockets/fd’s are lost.
-
I’m getting tired of the ever-increasing detailed fragility of systemd taking over the world. I despair of Debian Jessie ever being released at this rate. A lot of the release critical bugs are triggered by systemd because it meddles with so many knobs. Go read the following article and have a good cry… Maybe it’s all a bad dream.
-
The Linux community is filled with friction and diversity. One of the advantages of open source software is the diversity that leads to innovative approaches to improve the computing environment.
But can the diversity go too far? Is it a defining characteristic that kills programming creativity?
The news cycle surrounding open source technology is fed by ongoing arguments about PulseAudio versus ALSA Sound in one Linux distro or another. Hotly debated discussions ensue about the merits of Systemd replacing init. Some disputes lead to key developers forking a project. Others force particular project developers or contributors to quit.
-
The latest version of the stable Linux kernel, 3.14.31, has been announced by Greg Kroah-Hartman, and this is the most advanced long-term support branch of the kernel.
-
The average Linux user can be forgiven for being mystified by the passion and anger that surround the arguments over systemd, which aims to replace the traditional init daemon and shell scripts that initialise a Linux installation. Shell scripts are the tried and trusted method by which the Linux kernel is instructed on the options for its startup processes, and are seen by many sysadmins as ‘the Unix way’ of doing things. Scripts can be changed at will and the kernel doesn’t need a reboot.
-
Applications
-
Today however I wanted to review the Evolution client and my experience with it, especially in the light of my extensive use of Claws Mail (and to a lesser extent, Thunderbird). Just before we start, however, I just would like to underline that I’m not forgetting my adventures with email clients on Emacs. Expect a post on this topic later this month.
-
Syncthing GTK is a GTK3 & Python GUI for Syncthing, which includes a tray icon / Ubuntu AppIndicator. The app adds extra features on top of Syncthing, like filesystem watching and instant synchronization using inotify, system notifications for file updates and Syncthing errors, an auto-updater for the Syncthing daemon binary, speed throttling options and more.
-
TLP 0.7 was released recently, bringing an option which allows setting the minimum and maximum Intel P-state performance, better ThinkPad support and various other changes and bug fixes.
-
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Boxes is a GNOME application in Fedora that is used to create, manage, and run virtual machines. It was designed with simplicity and ease of use in mind, building upon the harder to use qemu-based virt-manager. Although it does not provide many of the features that virt-manager boasts, it is the perfect tool for Fedora users looking to try out new (potentially unstable) operating systems, or tinker with new software packages without polluting their own workstations.
-
Games
-
Unvanquished Alpha 36 was released on Sunday with a number of gamer-facing changes while on a technical side it looks like next month’s Alpha 37 will be more exciting.
-
It has been a long wait since Jane Jensen’s crowd-funded game was released for Windows and Mac in April last year. Now, almost 10 months later, a Linux build is up in a closed beta on Steam.
-
Safe-zones can now be secured, and the intense/sickening blurring on movement is now fixed as well! I am starting to have faith in Techland, not a lot mind you due to the still awful performance of the game on OpenGL, but more faith than before.
-
Lords of Xulima has just release the Linux version of their fantasy RPG and it looks fantastic, we decided to give it a go and tell you what we think.
-
Desktop Environments/WMs
-
Today in Linux news, Steven J. Vaughan-Nichols said that rolling release distributions are “gaining on” traditional releases and Christine Hall welcomes the “new breed of Linux users.” Reviews of KaOS and Linux Mint stood-out in the newsfeeds as did Jun Auza’s comparison of Mint to Ubuntu. Michael Larabel switched to back to Fedora and Robert Pogson is horrified at systemd creator’s future plans.
-
There are tons of different options when it comes to desktop environments for Linux. But which one is right for you? That’s a tough call and can only be made by each individual, but Datamation has some ideas to get you started finding your preferred desktop environment.
-
K Desktop Environment/KDE SC/Qt
-
It should be apparent that as developers there are parts we want to embrace as it. In many cases it allows us to throw away large amounts of code whilst at the same time providing a better user experience. Adding it as an optional extra defeats the main benefit.
-
Recently I was finally able to close BUG#305960 where a user requested support for 3D Cube FITS support in KStars. The FITSViewer tool always supported monochrome images since its inception, as this is what most CCD cameras in astronomy use. But single-shot color CCDs and DSLRs’ utilization within the astrophotography world kept growing over the last few years.
-
After a short discussion, we came up with a release date for Krita 2.9! It’s going to be… February 26th, Deo volente. Lots and lots and lots of new stuff, and even the old stuff in Krita is still amazing (lovely article, the author mentions a few features I didn’t know about).
Then it’s time for the port to Qt5, while Dmitry will be working on Photoshop-style layer styles — a kickstarter feature that didn’t make it for 2.9.0, but will be in 2.9.x. A new fundraiser for the next set of amazing features is also necessary.
-
It’s been a long time since I wrote my last post. In my last post, I had described my SoK project, how DLNA/UPnP media client works and my plans about implementing DLNA/UPnP media server.
-
So at the end of the Oxygen period, UX/UI design was reaching an inflection point. Gone were the days were graphical designers challenged its own illustrations skills in a perpetual “I can my candy more naturalistic silly than yours”.
-
-
A few weeks ago Alex Fiestas passed maintainership of PowerDevil, KDE’s power management service, over to me (thanks!), and there have been many exciting things going on in the power management department. Let’s take a look!
-
KDE Plasma 5.2 was just released a few days ago but for power KDE Plasma 5.3 are already exciting features building up, including greater power management capabilities.
-
The KDE Gardening Team selected the February “Bug of the Month”. Before announcing it, let me write about other bugs that got resolved recently.
-
In other words, I got nothin’ today. A few ideas, but not the energy nor motivation to follow through quite yet. I’m blaming the Super Bowl, the outcome of which is unknown as I write this. I’m thinking the world will continue to whirl around real nice like, whichever way it goes. But I did find a few minutes to give my aging behemoth home PC a bit of a makeover. Really all I did was to change the wallpaper to a nice new Debian logo-ed 3D thing. Shiny! I’d been using this old one for a few years I think, and it was just getting boring I guess.
Some of you may recall that I use Linux, Debian Stable (Wheezy!) to be exact, and the hard core savant types may recall that I also use, and love, KDE. Nobody knows what the K stands for – maybe Kool?, but the rest is desktop environment. One of the things that KDE allows idiots like me to do is to easily enable Desktop Effects. Eye candy. Things that wobble and spin and get all pretty like. I’m a sucker for this crap, and have even convinced myself that some of it is useful, even an aid to efficiency. Not that slothful inefficiency isn’t also charming under certain circumstances.
-
A new year, a new release… The digiKam Team is proud to announce the release of digiKam Software Collection 4.7.0. This release includes many bugs fixes from Maik Qualmann who propose patches to maintain KDE4 version while KF5 port is under progress.
-
GNOME Desktop/GTK
-
Today, I decided to help someone out and, as is often the case with coding, I got carried away.
-
-
A rolling-release Linux is one that’s constantly being updated. To some of you, that will sound a lot like DevOps’ idea of continuous deployment. You’d be right in thinking so. In both cases, the idea is that users and developers are best served by giving them the latest updates and patches as they’re created.
There are several ways of doing this. One is to deliver frequent, small updates, which is the model that Arch Linux uses. Another is to replace an old image of the operating system or program with a new one as changes are added to the software. Ubuntu Core is taking this approach.
-
The final release version of Simplicity Linux 15.1 is finally available for download. Simplicity 15.1 is based on Slacko, and uses the LXDE desktop environment for Netbook and Desktop editions. Also, we are proud to announce the release of our first 64-bit Edition: X. X 15.1 is a 64-bit only release and uses KDE as it’s desktop. Netbook and Desktop Editions are our only 32 bit releases for this cycle. One thing we are particularly pleased to bring you this release cycle is the fact that Simplicity Linux can view Netflix content straight out the box. You do not need to update libraries, change agent strings, or anything else. Just use the shortcut or use Chrome to view Netflix content.
-
-
UBOS is a new Linux distro that I like for two reasons. One is that it works toward making it easy for muggles to set up their own fully independent personal home servers with little or no help from wizards. The other is that it comes from my friend Johannes Ernst.
-
The polls are closed and the results are in. We once again had some extremely close races and our first ever three way tie.
-
Every year Linux fans wait for the results of LinuxQuestions.org Member Choice Award Winners and today the end of 2014 results are in. What was the favorite distribution this year? Which was the most used messenger these days? Who brings the best office suite or desktop environment? You might be surprised.
-
Reviews
-
Linux Mint is great if you are a traditionalist and you like the way things have pretty much always been.
Nice little touches are built upon again and again and the improvements are steady but not spectacular.
Linux Mint is just a really good, stable and solid Linux distribution and it is obvious why it is so popular.
-
KaOS 2014.12 is a very slick, very beautiful product. But it is not the most refined operating system out there. Sure, in terms of friendliness and accessibility, it’s right there among the big names, offering everything a user might want or need. Still, to get to that point, you will need to sweat a little. Printing, installer errors, availability of software, all these are potentially critical obstacles that must be addressed before KaOS can become a familiar and well-recommended family name.
You cannot fault the composition, the style, the setup. It’s really charming. Done with elegance. Maybe all my ranting has helped bring Linux aesthetics to a higher level. But while I do sometimes drool over pretty and shiny, I demand stability and predictability, first and foremost. KaOS has some catching up to do here. And so, it probably deserves around 6.5/10. Pitted against Manjaro, Netrunner Rolling and Chakra, it’s probably the second best Archy offering out there at the moment. The best? Well, read all those other reviews. Anyhow, this isn’t bad, but not quite good enough to wrestle with Ubuntu, Mint and friends. I shall definitely follow this distro’s progress.
-
New Releases
-
Simplicity Linux, a Linux distribution based on Slacko that uses the LXDE desktop, has reached version 15.1 and is now available for download and testing.
-
Screenshots
-
PCLinuxOS/Mageia/Mandriva Family
-
Why pre-Alpha? Because we are eager to deliver you the freshest and hottest, and with your help this new release can start shining brighter even sooner! Have fun, report bugs, enjoy!
-
The pre-alpha of OpenMandriva Lx 3 features X.Org Server 1.16.3 and Mesa 10.4.2 as the latest for open-source Linux graphics, KDE 4.14.3 is the desktop environment while OpenMandriva is working on migrating to KF5 + Plasma 5, SDDM is the new log-in manager, LXQt 0.8 is available as the new lightweight desktop environment, and there’s various package updates.
-
Ballnux/SUSE
-
It might not seem like a long time, but two years for a Linux operating system is more than usual. Users need to keep in mind that this is provided for free, so its maintaining it for a long time is actually time consuming, especially since the same devs have released other versions since then, which are better and more up to date.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical is already trying to stay ahead of the IoT (Internet of Things) movement and the company managed to have the latest Snappy Ubuntu Core ready just in time of the Raspberry Pi 2. At this point you might be wondering what the Internet of Things is and why Ubuntu is making a move for it.
-
The next generation Raspberry Pi 2 was announced by Raspberry Pi Founder Eben Upton on February 2. The biggest difference is the new quad-core 900MHz Broadcom ARM Cortex-A7 CPU which deliver up to six times the processing power of the Raspberry Pi B+.
-
For the past couple of years, users wanted to see how this Ubuntu convergence concept will come together and now their wish has been granted. More and more details have been revealed and there are a ton of videos that show how convergence works.
-
-
Axiomtek’s rugged, Linux-ready DIN-rail PC has a dual-core Atom E3827, remote IoT management, 4GB soldered RAM, and isolated serial, GbE, and DIO ports.
-
Raspberry Pi enthusiasts started the week with some welcome news: A Raspberry Pi 2 Model B SBC that is claimed to be six times faster than previous versions is available for the same $35 price. The community-backed single board computer swaps out the old ARM11/ARMv6 processor for an ARMv7 system on chip that features four 900MHz Cortex-A7 cores. That, along with a doubling of RAM to 1GB, means that for the first time, the Pi fully supports Ubuntu. In fact, there’s already an optimized build available of Canonical’s new lightweight Snappy variant of Ubuntu.
-
The next-gen Raspberry Pi 2 is on sale now, and despite its souped-up memory and CPU performance, it is still just $35.
-
NI has launched a real-time Linux-based “RoboRIO” robot controller with a Zynq ARM/FPGA SoC and NI’s LabVIEW IDE designed for FIRST robotics competitions.
-
Phones
-
Android
-
The Samsung Galaxy S5 is finally getting the Android Lollipop update after weeks of speculation. The update will be rolling out to Galaxy S5 phones in the United States. The Verizon Galaxy S5 Lollipop update is the first Galaxy Android 5.0 update in the U.S., but it won’t be the last update for all U.S. Galaxy users.
Samsung started rolling out its first round of Galaxy Android 5.0 updates at the end of last year. The company’s first update was the Samsung Galaxy S5 Lollipop update, according to Gotta Be Mobile. The update wasn’t much of a surprise for users since the Galaxy S5 is Samsung’s current Galaxy S flagship phone. The company typically rolls out updates for its current flagship models at the beginning.
-
I really, really like Android 5.0 (or “Lollipop” as it’s known by those of us who probably care too much about these things). It cemented my preference for Android, and has earned the Nexus 5 another few months as my go-to phone.
-
Back in December last year, Blizzard finally rolled out the Android version of Hearthstone, the company’s popular and admittedly addictive free-to-play online card game. This basically means that the game is now available on iOS and Android tablets, but no smartphones just yet, although Blizzard did state that they are planning on bringing the smartphone version to iOS and Android devices this year.
-
The HummingBoard-i2eX is a versatile board. It has greater performance than the Raspberry Pi 1 and includes more memory. At $110 it is more expensive than the Raspberry Pi, but you get more for your money.
-
Android users who are unhappy with their own version of Android Lollipop could only have less than a month to wait before Google rolls out the first major update for the latest iteration of its Android mobile platform.
-
-
Importantly, these tools are largely being born within enterprises like LinkedIn that have serious Big Data needs that no commercial software can solve. Even the National Weather Service has jumped in, open sourcing the code that powers its global forecast system.
-
That’s one of the key findings of research recently conducted by the Ponemon Institute and sponsored by Zimbra, a provider of commercial open source collaboration software in Frisco, Texas. Open source “provides improved control over your software and inherent security and privacy benefits brought to bear by a development community,” said Olivier Thierry, Zimbra’s chief marketing officer, in an interview. “These benefits are tied to the transparent nature of open source, which is taken a step further by commercial vendor support, ensuring long-term viability.”
-
DataStax has acquired Aurelius LLC, provider of the open source graph database Titan. The Aurelius team will join DataStax to build DataStax Enterprise (DSE) Graph, adding graph database capabilities into DSE alongside Apache Cassandra, DSE Search and Analytics. Development of DataStax Enterprise Graph will begin immediately with availability announcements coming later this year.
-
Email clients have long been a necessary evil for anybody living in the information age. I have yet to find an email client that I like. Tolerate, yes. But not like. I have found web browsers that I like, note taking programs that I like, even text editors that I love. But email remains the proverbial thorn in my desktop side.
For years now I’ve been using Mozilla’s Thunderbird, because while I don’t actually like it, it’s the one I hate the least. It has been stable and reliable all this time, something that couldn’t be said for the Evolution client it replaced. But it had flaws, and plenty of them. The biggest of which, in my opinion, is that it is slow. Not only is it slow when I’m doing something with it, it’s somehow even slow when I’m not doing anything.
-
I am thrilled to be joining OPNFV as its Director of NFV working directly with those who are committed to advancing open source NFV for all. I am excited about this organization, this technology, this community, and what the future holds for NFV.
-
The Linux Foundation’s OPNFV project for open source network functions virtualization technologies has appointed Heather Kirksey as director of NFV. It has also added new industry partners.
-
-
The Linux community is filled with friction and diversity. One of the advantages of open source software is the diversity that leads to innovative approaches to improve the computing environment.
But can the diversity go too far? Is it a defining characteristic that kills programming creativity?
The news cycle surrounding open source technology is fed by ongoing arguments about PulseAudio versus ALSA Sound in one Linux distro or another. Hotly debated discussions ensue about the merits of Systemd replacing init. Some disputes lead to key developers forking a project. Others force particular project developers or contributors to quit.
-
I work with IT teams that are so passionate about Red Hat’s open source mission that they bring a “default to open source” mentality to every project we work on. We’ve been quite successful in finding open source solutions for many of our business needs. Naturally, we turn to our own open source solutions for our operating system, middleware, and cloud needs. Beyond that, we always seek out open source solutions first for our other business needs, such as user authorization and telephony.
It’s through these first-hand experiences that I’ve reflected on the reasons why open source is a good fit for the enterprise. Here are some fundamental advantages I believe open source offers over proprietary solutions.
-
-
Alex Housley, 31, is the founder of Seldon, an open-source platform that generates user recommendations for any kind of company or industry.
-
Although it is not a universal remedy, open-source software is still an important ingredient in an EU strategy for more security and technological independence. The quality of the lifecycle processes of open-source software is crucial for its security – more than technology.
Support and fund maintenance and/or audit of important open-source software: open-source initiatives, some of them widely implemented for security and privacy, need funding to keep going and be audited (with regard to both code and processes).
-
Web Browsers
-
Chrome
-
Google distributed $1.5 million in awards in 2014 for security vulnerability disclosures, money that was spread across 200 different researchers and included disclosures on over 500 bugs in Google’s Chrome Web browser. In total, Google has paid out $4 million in bug bounties since it first began rewarding researchers in 2010.
-
SaaS/Big Data
-
VMware today is delivering on its promise of providing an integrated OpenStack cloud offering. VMware first announced the VMware Integrated OpenStack (VIO) product at its VMworld conference in August, as the company’s full embrace of the OpenStack platform.
-
If you’re bewildered by the number of open cloud platforms and usage models for them that are available, there are some useful new guides you should know about.
-
With all the hubbub surrounding open source cloud computing platforms that are proliferating more rapidly than ever, it’s easy to get lulled into thinking that projects like OpenStack and CloudStack rule the cloud roost. That’s not even close to the truth, though. The proprietary cloud is going strong, and Amazon remains the 800-pound gorilla in the cloud space.
-
Oracle/Java/LibreOffice
-
Inspired by the pothole identification and alert site and app, fixmystreet.com, OFE, through its fixmydocument.eu, is giving a crowd-sourced voice to public frustration with software interoperability limitations that stand in the way of citizens who are seeking to communicate and interact with government.
It should be noted, however, this is more than a vehicle through which to vent. Many parts of the EU are legitimately working hard to implement ODF, the open document format for office applications. Fixmydocument.eu will help them better identify software and documents that are presenting the most pressing and immediate problems. As an added benefit, it should not go unnoticed that more fully deploying ODF and other open standards will help the EU avoid vendor lock-in.
-
Funding
-
The OSI will launch our first ever Individual Membership Drive this year, coinciding with our 17th anniversary, Feb 3rd, 2015. Our membership drive goal is to sign up 2,398 members in celebration of our founding on 2/3/98 — “2,398 for 2/3/98″ — see what we did there? The membership drive will also run in parallel with our annual Board elections, with nominations opening on Feb 2nd. The membership campaign will become an annual event.
-
BSD
-
A recording from a MeetBSD California 2014 talk titled “WhatsApp: Half a billion unsuspecting FreeBSD users” by Rick Reed.
-
FSF/FSFE/GNU/SFLC
-
-
The FSF’s list consists of ready-to-use full GNU/Linux systems whose developers have made a commitment to follow the Guidelines for Free System Distributions. This means each distro includes and steers users toward exclusively free software. All distros on this list reject nonfree software, including firmware “blobs” and nonfree documentation. The Guix System Distribution is a new and growing distro that currently ships with just over 1000 packages, already including almost all of the programs available from the GNU Project.
-
Licensing
-
For software vendors, open source software (OSS) should be treated like a compliance issue – in the same way that corporate, securities or environmental compliance is a concern for many companies. The failure to manage compliance can be costly – just like it would be if a company ignored its environmental or securities compliance obligations. An environmental remediation order or a cease-trade order might result from compliance failures in those other areas.
-
Openness/Sharing
-
-
The project plans to democratise camera technology and put the power back into the hands of the users. ‘It is a self-liberation by creating high end tools that we ourselves love to work with – fully independent of any of the big, established camera corporations,’ explains a member of the team.
-
Open Data
-
“This year we are releasing all of the data included in the President’s Fiscal Year 2016 Budget in a machine-readable format here on GitHub,” the White House wrote. “The Budget process should be a reflection of our values as a country, and we think it’s important that members of the public have as many tools at their disposal as possible to see what is in the President’s proposals.”
-
Programming
-
That seemingly simple question is sometimes a topic of heated debate, even though, if one digs into the details, it’s more a debate about how to think about transformation rather than a debate about the end state.
Back up a minute—you can think about DevOps as living somewhere between two poles.
-
You can treat your cloud just like it was a data center full of servers with system administrators cracking the whip over them, but that misses the point of how to get the most from your cloud with DevOps.
-
Standards/Consortia
-
To no huge surprise, the next-generation OpenGL standard will be shown off next month at GDC 2015.
-
When we talk about the stalwart, hard-nosed relentlessness that ignites Detroiters’ souls, it’s hard to think of a better example than James Robertson.
His story is so outlandish it seems certain to be apocryphal: His home is in Detroit, but his work is in Rochester Hills. He has no car, and our public transit system is a joke that’s played daily to brutal effect on people like Robertson. That means he hoofs it up to 21 miles per day, through whatever obstacles man or mother nature toss in front of him. Together, Robertson’s commute and his shift consume a staggering 20 hours of every day. This has been his life for a decade, since his old car died. Earning just $10.55 an hour, Robertson couldn’t save up for another.
-
Science
-
To the parent of the unvaccinated child who exposed my family to measles:
I have a number of strong feelings surging through my body right now. Towards my family, I am feeling extra protective like a papa bear. Towards you, unvaccinating parent, I feel anger and frustration at your choices.
-
Health/Nutrition
-
ABC News contributor Laura Ingraham falsely suggested there’s a link between vaccines and autism, which flies in the face of substantial scientific evidence and her own employer’s reporting on the issue.
A domestic measles outbreak has highlighted the rising numbers of American parents who disregard medical recommendations and choose not to vaccinate their children, often for religious or personal reasons.
-
Security
-
Security researcher claims more than 110k users of the social network were infected in two days by trojan pretending to be a Flash update
-
Well, it’s been a week since we’ve heard about a security vulnerability in Adobe Flash — that’s like a lifetime in terms of this program. While the application is slowly receding, it’s far from dead and that means users have reason for worry. Of course, using Flash at all is a general concern — it’s a highly targeted platform for attackers.
-
-
A new FireEye report details how attackers were able to target groups within the Syrian opposition to learn battlefield tactics and strategy.
Malware is being used as a tactical weapon to gain intelligence in the ongoing Syrian civil war, according to a new report from security firm FireEye.
-
Defence/Police/Secrecy/Aggression
-
The civil war in eastern Ukraine has continued fitfully since September, when the parties signed a ceasefire known as the Minsk Agreement. The ceasefire has often been more honored in the breach than the observance, but overall it has led to considerably less bloodshed, especially among civilians, than the previous six months fighting. In the spring of 2014, the level of killing escalated sharply, at U.S. urging, when the newly-installed coup government in Kiev chose to attack rather than negotiate with the self-proclaimed People’s Republic of Donetsk and People’s Republic of Luhansk (now joined in the self-proclaimed federal state of Novorossiya). So far, only the Republic of South Ossetia has recognized these Ukrainian “republics” as independent countries. Only Russia, Nicaragua, Venezuela, and Nauru recognize South Ossetia, which declared its independence from Georgia in 1990, but secured it only in 2008 with the help of Russian intervention.
-
Transparency Reporting
-
There is a window of hope, thanks to a U.N. human rights body, for a solution to the diplomatic asylum of Wikileaks founder Julian Assange, holed up in the embassy of Ecuador in London for the past two and a half years.
Authorities in Sweden, which is seeking the Australian journalist’s extradition to face allegations of sexual assault, admitted there is a possibility that measures could be taken to jumpstart the stalled legal proceedings against Assange.
The head of Assange’s legal defence team, former Spanish judge Baltasar Garzón, told IPS that in relation to this case “we have expressed satisfaction that the Swedish state“ has accepted the proposals of several countries.
-
Environment/Energy/Wildlife
-
Britain was sprinkled with the white stuff this morning, leading to an assault of pictures on our Twitter, Facebook and Instagram feeds. Even London was dusted, and clearly tormented people of the capital dutifully documented the magical white wonderland before them.
-
Finance
-
Starting Monday, thousands of Croatia’s poorest citizens will benefit from an unusual gift: They will have their debts wiped out. Named “fresh start,” the government scheme aims to help some of the 317,000 Croatians whose bank accounts have been blocked due to their debts.
-
The Labour Party supports austerity in England but opposes it in Scotland.
-
PR/AstroTurf/Lobbying
-
It’s passages like this that make me hope that my child never falls in love with a centrist. “Purity” is bad, “pragmatism” is good–the latter defined as inherently in the center. Is the centrist position that acknowledges the catastrophic effects of global warming while expanding the extraction of fossil fuels really pragmatic? Or decrying the concentration of wealth while proposing policies that will do almost nothing to counteract it?
-
What’s wrong is that there was no “Venezuelan nuclear bomb plot,” and the scientist in question, Pedro Leonardo Mascheroni, didn’t offer Venezuela anything. What Mascheroni was convicted of was telling undercover FBI agents, who were pretending to work for Venezuela, that he could give them nuclear weapons secrets. In real life, Venezuela had nothing to do with it.
-
Google, Microsoft and Amazon have paid Eyeo a significant sum of money to be automatically whitelisted in Adblock Plus
-
Internet giants Google, Amazon, Microsoft and Taboola have reportedly paid AdBlock Plus to allow their ads to pass through its filter software.
The confidential deals were confirmed by the Financial Times, the paper reported today.
Eyeo GmbH, the German startup behind Adblock Plus, said it did not wish to comment.
-
Two suburban Wisconsin lawmakers have unveiled an economic development plan for the lowest-income neighborhoods of Milwaukee, and their “solutions” for the Wisconsin communities hit hardest by deindustrialization come directly from a national right-wing playbook.
Rep. Dale Kooyenga (R-Brookfield) and Sen. Alberta Darling (R-River Hills) represent two of the wealthiest districts in Wisconsin and have no background in economic development, yet have proposed at 23-page plan targeting the majority-minority communities with the highest unemployment rates in the state — and have done so without consulting any of the elected officials who actually represent the area.
-
As we’ve been covering, the cable and broadcast industry’s response to the shift toward Internet video appears to be a three-staged affair. Stage one was largely denial, with cable and broadcast executives either mocking (or denying the existence of) cord cutters, while going out of their way to try and ignore any data disproving their beliefs. Stage two is a one-two punch of desperately trying to milk a dying cash cow (like endless price hikes) while pretending to be innovative by offering largely uninteresting walled-garden services like TV Everywhere.
-
It’s not a terribly hard cartoon to parse: Islam is the modern equivalent of Nazism, and threatens a new Holocaust. The cartoon lists entities that have nothing in common with each other aside from their connection to Islam–political movements like Hezbollah and Hamas, who have been the targets of far more violence than they are responsible for, along with groups like ISIS and Boko Haram, terrorist groups whose victims are primarily Muslim. Hezbollah and ISIS are actually engaged in intense warfare with each other.
In case you missed the point, the cartoon puts one of the holiest phrases in Islam–”Allah Akbar,” or “God is great”–in the mouth of a Nazi skeleton.
-
Censorship
-
We’ve been noting how the trend du jour among news outlets has been to not only kill off your community comments section, but to proudly proclaim you’re doing so because you really value conversation. It’s of course understandable that many writers and editors don’t feel motivated to wade into the often heated comment section to interact with their audience. It’s also understandable if a company doesn’t want to spend the money to pay someone to moderate comments. But if you do decide to reduce your community’s ability to engage, do us all a favor and don’t pretend it’s because you really adore talking to your audience.
-
Privacy
-
David Cameron’s proposals to limit the use of end-to-end encryption technology in the UK are “absurd” according to Phil Zimmermann, creator of the email encryption software, PGP, and now president of secure communications firm Silent Circle.
-
There’s no playbook for leaking evidence of state and corporate wrongdoing. But with the uptick in whistleblower prosecutions by the US government, there probably should be.
For now, studying past whistleblowers, from Daniel Ellsberg to Chelsea Manning and Edward Snowden, is a good place to start. Some whistleblowers, like former NSA senior executive Thomas Drake and former US Department of Justice ethics adviser Jesselyn Radack (now Snowden’s lawyer), have shown themselves willing to offer instruction.
Drake and Radack, who appeared at the Berlin Transmediale festival’s CAPTURE ALL event to discuss the documentary Silenced, spoke to me about the challenges facing future whistleblowers and journalists. While they didn’t lay out a precise playbook, they did offer advice on how whistleblowers and journalists can better protect themselves.
For Radack, it starts with understanding the Espionage Act. While the 1917 law was initially designed to protect against spies, not whistleblowers, the US government has taken to claiming that the leaking of classified information is equivalent of espionage. Espionage Act prosecutions under President Obama, in Radack’s estimation, have created a “backdoor war on journalists” and an “unofficial way to create an official secrets act,” which exists in the United Kingdom but not in the US. Educating whistleblowers and the journalists who work with them is of the utmost importance to Radack.
-
The political fallout of WikiLeaks has passed, but the fury of law enforcement has not. More than four years after the organization published a trove of U.S. diplomatic cables, federal agents continue to wage a secret legal campaign to put the screws to those responsible.
This month, a new twist to the story emerged as lawyers for WikiLeaks accused Google of betraying its users by secretly turning over their communications to the Justice Department. Google shot back that it did all that it could, but the government stifled the company with gag orders.
The dispute suggests someone is not telling the truth but, at a deeper level, points to the problem of secret rabbit holes in the U.S. justice system that obscure the existence of criminal investigations.
-
Citing a fundamental right to privacy, travel and association, The Rutherford Institute has asked the U.S. Supreme Court to prohibit police from gaining unfettered access to motel and hotel guest registries. In an amicus curiae brief filed in City of Los Angeles v. Patel, et al., Rutherford Institute attorneys are asking the Court to declare unconstitutional a Los Angeles ordinance that allows police to inspect private hotel and motel records containing information about the persons who are staying there without a warrant or other judicial review. The Institute’s brief argues that the ordinance, which is similar to laws on the books in cities across the nation, flies in the face of historical protections affording hotel guests privacy in regards to their identities and comings-and-goings and burdens the fundamental rights of travel and association, which the Court has long safeguarded from arbitrary government scrutiny.
-
I’ve been a big Facebook supporter – one of the first users in my social group who championed what a great way it was to stay in touch, way back in 2006. I got my mum and brothers on it, and around 20 other people. I’ve even taught Facebook marketing in one of the UK’s biggest tech education projects, Digital Business Academy. I’m a techie and a marketer — so I can see the implications — and until now, they hadn’t worried me. I’ve been pretty dismissive towards people who hesitate with privacy concerns.
[...]
Facebook has always been slightly worse than all the other tech companies with dodgy privacy records, but now, it’s in it’s own league. Getting off isn’t just necessary to protect yourself, it’s necessary to protect your friends and family too. This could be the point of no return — but it’s not too late to take back control.
-
This kind of request is not unique to Canada. Some European countries also won’t allow certain types of data to leave the country. However, Canada has been open about using technology from the United States in the past, so a Canada-only request is unusual.
-
Michael Hayden, the former CIA and NSA director, has revealed what most people already suspected — to him, the Constitution is a document that he can rewrite based on his personal beliefs at any particular time, as noted by Conor Friedersdorf at the Atlantic.
-
A RECENT PUSH to get the incorrigible so-called Snoopers’ Charter into law has been stopped, freeing the UK, probably only briefly, from the threat of choke-strength communications monitoring.
-
British politicians keep trying to sneak the Snoopers’ Charter into law – even when it is obvious that the last thing you need when looking for a neeedle in a haystack is more hay
-
Civil Rights
-
The Federal Bureau of Investigation put Anonymous hacker Jeremy Hammond on a secret terrorist watchlist, according to confidential records obtained by the Daily Dot.
The records further reveal how the FBI treats cybercrimes and shines a rare light on the expanding definitions of terrorism used by U.S. law enforcement agencies.
-
The United Nations’ highest court on Tuesday ruled that neither Croatia nor Serbia committed genocide against each other’s populations during the Balkan wars that followed the collapse of Yugoslavia in the 1990s.
Peter Tomka, president of the International Court of Justice, said many crimes had been committed by both countries’ forces during the conflict, but that the intent to commit genocide — by “destroying a population in whole or in part” — had not been proven against either country.
-
Portugal is to introduce a law granting citizenship rights to the descendants of Jews it persecuted 500 years ago, following Spain’s adoption of similar legislation last year.
Cabinet spokesman Luís Marques Guedes said changes to the nationality law would provide dual citizenship rights for Sephardic Jews, the term commonly used for those who once lived in the Iberian peninsula.
The rights will apply to those who can demonstrate a “traditional connection” to Portuguese Sephardic Jews, such as through “family names, family language and direct or collateral ancestry”.
-
Ross Ulbricht’s lawyers began his defense case today, and it promises to be a short one—very short.
The half hour or so of testimony today, which included three character witnesses, will be combined with an estimated hour of direct testimony tomorrow. Unless something surprising happens, closing arguments will take place tomorrow afternoon.
The government has spent ten days laying out its case that Ulbricht is the mastermind behind the Silk Road drug-trafficking website; he could face life in prison if convicted.
Ulbricht will not be testifying on his own behalf. That decision was put off by Ulbricht and his lawyers until today, but US District Judge Katherine Forrest asked Ulbricht about it directly after testimony finished today.
-
The Mannerheim League for Child Welfare says it receives a constant stream of questions from schools and parents about how to handle increasing internet use by children and youth. One school in the eastern city of Kuopio has tried to intervene in late-night messaging and internet bullying.
-
“It is impossible for capitalism to survive, primarily because the system of capitalism needs some blood to suck,” Malcolm said. “Capitalism used to be like an eagle, but now it’s more like a vulture. It used to be strong enough to go and suck anybody’s blood whether they were strong or not. But now it has become more cowardly, like the vulture, and it can only suck the blood of the helpless. As the nations of the world free themselves, then capitalism has less victims, less to suck, and it becomes weaker and weaker. It’s only a matter of time in my opinion before it will collapse completely.”
-
Internet/Net Neutrality
-
If you haven’t heard, the FCC has officially defined broadband Internet service as 25Mbps down, 3Mbps up. This is more than six times the previous standard of 4Mbps down and represents a major shift in how the Internet is regarded by the U.S. government.
Frankly, the 3Mbps upstream minimum is still too low, but the 25Mbps downstream is adequate. This means that suddenly, many Americans no longer have broadband Internet access — and realistically, they haven’t in any way but name for many years now.
-
A new Federal Communications Commission proposal expected this week has the potential to be a game-changer in the debate over net neutrality.
-
The Wall Street Journal adopted the language of net neutrality critics to describe the Federal Communications Commission’s (FCC) net neutrality proposal, deeming the new potential rules an “intrusive regulation.”
On January 30, the FCC announced that it would “introduce and vote on new proposed net neutrality rules in February.” Although the official proposal has yet to be released, according to The Huffington Post, FCC Chairman Tom Wheeler “suggested that Internet service… should be regulated like any other public utility.”
-
The debate of a whether net neutrality should be a thing in the US has been going on for over a decade now. There is a clear rift between what the public wants and what the service providers want; ISP oppose net neutrality and any regulation whereas the public want a neutral net.
-
Intellectual Monopolies
-
It has long been evident that TAFTA/TTIP is not a traditional trade agreement — that is, one that seeks to promote trade by removing discriminatory local tariffs on imported goods and services. That’s simply because the tariffs between the US and EU are already very low — under 3% on average. Removing all those will produce very little change in trading patterns. The original justification for TTIP recognized this, and called for “non-tariff barriers” to be removed as well.
-
Trademarks
-
Homeland Security’s Immigration & Customs Enforcement group (ICE) has a history of seizing stuff without understanding even the most basic concepts around intellectual property. After all, these are the same meatheads who seized some blogs for alleged copyright infringement, and then had to return some of them over a year later, after they realized it was a mistake. ICE also has a history of using big sporting events to kiss up to the multi-billion dollar sports organizations by shutting down small businesses, protecting Americans from unlicensed underwear. And, of course, what bigger sporting event is there than the Super Bowl. Every year they make a bunch of seizures related to the Superbowl, and this year was no different.
-
Copyrights
-
The first of those things is that the copyright industry had a medical case of severe rectocranial inversion when they made the sloppy business assumption that an unlicensed copy of a movie or a piece of music was equivalent to a lost sale.
The second of those things is that it wouldn’t have mattered even if it were true (which it wasn’t), because no industry gets to eliminate fundamental civil liberties like the private letter, completely regardless of whether the continued existence of civil liberties means they can make money or not.
So we of the net generation knew all along that the copyright industry was not only wrong and stupid, but also that their assertion was – or should have been – irrelevant in the first place.
[...]
So the copyright industry has successfully lobbied for laws that ban people from sharing and discussing interesting things in private, and done so from the sloppiest conceivable of false business assumptions. As a result of this dimwitted business sense combined with diehard foolhardiness, we’re left with nowhere to talk or walk in private.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »