08.11.14
Posted in News Roundup at 3:26 am by Dr. Roy Schestowitz
Contents
-
Since first running into TrackingPoint at CES 2013, we’ve kept tabs on the Austin-based company and its Linux-powered rifles, which it collectively calls “Precision Guided Firearms,” or PGFs. We got to spend a few hours on the range with TrackingPoint’s first round of near-production bolt-action weapons last March, when my photojournalist buddy Steven Michael nailed a target at 1,008 yards—about 0.91 kilometers—on his first try, in spite of never having fired a rifle before.
But big, heavy, bolt-action rifles were only the beginning, with the underlying idea being that the company would scale its weapons both up and also down in size. And, last month, we day tripped back out to the Best of the West range just outside of Austin in Liberty Hill to lay hands on TrackingPoint’s newest set of PGFs, the TP AR 556 and TP AR 762. Unlike the big XS-series long rifles we fired last time, these newest PGFs are semiautomatic carbines—the type of weapon that the media usually (and incorrectly) refers to as “assault rifles.”
-
Desktop
-
Chromebooks have proven to be wildly popular in schools. More than a million Chromebooks were sold to schools this spring alone.
-
Kernel Space
-
-
We’re now around the half-way point of the Linux 3.17 merge window with at least another week expected before the 3.17-rc1 release depending upon Linus Torvalds’ travel around LinuxCon and the Kernel Summit in Chicago. While we’re only half-way through the merge window, there’s already enough new functionality to warrant a summary article for those that haven’t been keeping up with all the Linux 3.17 coverage.
-
Graphics Stack
-
Being merged into the mainline kernel code-base for Linux 3.17 was the big DRM feature pull that included enhancements to the Intel and AMD Radeon graphics drivers (among the other smaller DRM/KMS drivers), but missing from action was the open-source NVIDIA driver. The Nouveau driver changes were delayed by some last-minute bug-hunting but now a separate pull request was issued to land the Nouveau driver updates for Linux 3.17.
-
Applications
-
A terminal emulator is computer software which emulates a dumb video terminal within some other display architecture.
A terminal emulator allows the user to access a console and all its applications such as command line interfaces (CLI) and text user interface software. Even with modern desktop environments, it remains the case that accessing the command-line interface lets users perform tasks that would be very difficult, or too repetitive to undertake from a graphical environment. Using the command-line is often the quickest and most convenient way to perform many tasks.
-
-
-
Proprietary
-
Instructionals/Technical
-
-
-
-
-
-
-
Develop a good working knowledge of Linux using both the graphical interface and command line, covering the major Linux distribution families.
-
Wine or Emulation
-
A new development version of Wine, 1.7.24, has been announced by Alexandre Julliard and it features support for a couple of new features.
-
Games
-
StuntRally, a free racing game that features over 150 tracks and lots of cars, has just reached version 2.4 and and it bring numerous updates and new features.
-
Desktop Environments/WMs
-
With Linux comes choice. Along with that choice, comes debate. Which desktop is the best? Which offers the most user-friendly experience? The questions are not only never-ending, but date back over a decade where the “war” between KDE, GNOME, and every other desktop was given voice. I would, contend, however, that there is a desktop for every kind of user to be found within the Linux landscape. To that end, I want to take some of the most popular desktops and match them to end users.
-
K Desktop Environment/KDE SC/Qt
-
-
Iikka Eklund of Digia has announced that Qt 5.4 is under its feature freeze state after several months of development.
The Qt 5.4 feature freeze is coming as planned. Qt developers hope to do an alpha release next week (14 August), a beta release on 4 September, release candidate on 2 October, and the final release on 23 October. Of course, with Qt releases the schedule is subject to change pending any last minute bugs, etc, as with all Qt5 updates thus far the official releases have ended up slipping by about one month.
-
A Qt fan asked developers this weekend about what features might be candidates for a release that breaks from Qt5 and goes to Qt6 or even then to Qt7.
-
-
-
-
After 5 months we are releasing a new version of plasma-nm for KDE 4.x containing a lot of bugfixes, minor design improvements and internal changes (see my previous blog post). This is probably last major release since we are now focused to KF5/Plasma 5 version, but we will be still backporting all fixes and you can expect at least one more bugfix release in future.
You can get a tarball from usual location, compile it from git or wait for an update in your distribution.
-
-
This screenshot shows the QML/JS KDevelop plugin working as usual, highlighting declarations and uses, finding types, and displaying nice tool-tips. The code-completion also works even if it is not visible on the screenshot. What is interesting is the look of KDevelop: do you see the flatter theme? The colors that are a bit different than usual? This difference is appearance comes from the fact that this is not the usual KDevelop, this is KDevelop 5, based on Qt5 and on the shiny new KDE Frameworks 5.
-
The Randa Meetings started yesterday and approx. 45 people incl. friends and family are already here. More are still to arrive.
-
-
GNOME Desktop/GTK
-
-
New Releases
-
Michael Tremer, a developer for the ipfire.org team, has announced that IPFire 2.13 Core 81, a new stable build of the popular Linux-based firewall distribution, bringing quite a few security fixes.
-
DEFT 8.2 is the latest release of DEFT 8. What has been fixed?
-
Slackware Family
-
Slackel Fluxbox 1.0 Live, a distribution based on Slackware and Salix that uses the Salix tools and packages, has been released and is now available for download.
-
Red Hat Family
-
Debian Family
-
Clang is finally co installable on Debian. 3.4, 3.5 and the current trunk (snapshot) can be installed together.
So, just like gcc, the different version can be called with clang-3.4, clang-3.5 or clang-3.6.
-
Derivatives
-
The Linux Mint developers have decided to switch the Debian edition for the Linux distribution from the current snapshot cycle to a Debian Stable package base.
-
KeyCoin is today’s Random Coin of the Day for its extensive development, including a full on customized version of TailsOS, the Linux distribution where Tor protects all communication. The team also has trading tools and an encrypted messaging system in the works along with a few other amazing features.
-
Canonical/Ubuntu
-
Shutter, a feature-rich screenshot program that allows users to capture nearly anything on their screen without losing control, is now at version 0.92.
-
As you may know, Canonical is constantly updating Unity 8 and Mir, which are now used only on Ubuntu Touch, but starting with Ubuntu 14.10, a special Unity 8 and Mir flavor will be released.
-
-
Flavours and Variants
-
“Freya inherits core components from Ubuntu 14.04.1 LTS such as the Linux kernel (version 3.13), hardware drivers, and graphics stack. This includes support for EFI stub-loading, which is a kernel feature that enables booting directly from (U)EFI, without the need for an additional bootloader such as GRUB. Ubiquity does not yet have support for this configuration, but one of our developers has created a guide for a GRUB-free install of Freya on modern Mac computers using rEFInd.”
-
-
The new Raspberry Pi B+ board is a great upgrade over the RPi B board. I give it an A-.
-
I few weeks ago I announced I was joining Linaro. I work there as Director of Core Development Group. I moved from Prague to Cambridge (the original), that is, from continental to oceanic climate. From dry, cold in winter and hot in summer to wet, soft in summer and above zero most of the winter. In theory an improvement, you might think. Well, depending on much it rains. I will tell you better in spring.
A few days ago The Mukt published and interview where I explained a little what is Linaro and what do I do as Core Development Director.
-
Phones
-
Android
-
Android-x86 is an unofficial initiative to port Google’s Android mobile operating system to run on devices powered by Intel and AMD x86 processors, rather than RISC-based ARM chips. The project began as a series of patches to the Android source code to enable Android to run on various netbooks and ultra-mobile PCs, particularly the ASUS Eee PC.
-
Taking a look back at the week in news across the Android world, this week’s Android Circuit highlights a number of stories, including the first impressions and images of the Moto 360 smartwatch, the Meta M1 breaks cover, more news on a potential antitrust investigation of Android in the EU, China’s dominance of the Chinese Android market, Samsung and Apple drop some patent cases, and the Tab 4 Nook has a launch date.
-
Web Browsers
-
Mozilla
-
For now, the Gecko layout engine which is Firefox based on, has been made to work with Weston, the Wayland official reference compositor, but the keyboard input has been broken and the decorations are not displayed well, but the process is in its early stages.
-
Just about two weeks ago, I got a Flame and have decided to use it as my primary phone and put away my Nexus 5. I’m running Firefox OS Nightly on it and so far have not run into any bugs so critical that I have needed to go back to Android.
I have however found some bugs and have some thoughts on things that need improvement to make the Firefox OS experience even better.
-
Oracle/Java/LibreOffice
-
Two versions of LibreOffice were released in quick succession. You’ll find the latest iteration of the successful 4.2 series announced here, but slightly ahead of that 4.2.6 release, there was also the bump to a new development cycle. I was on a field trip to the US at the time of the 4.3.0 release announcement and was unable to devote time to updating the SlackBuild script and provide packages earlier than today.
-
FSF/FSFE/GNU/SFLC
-
For once, “our” is a totally appropriate modifier for discussing a spacecraft. ISEE-3 was originally a NASA spacecraft launched in the 1970s, but since then it’s been the subject of the first-ever public crowdfunding campaign to provide it a budget when normal funding was fully allocated to other functional, amazing science projects. After the massive collaborative effort required to get it going again, it’s also the first crowdsourced spacecraft. Despite being decades old, this craft is hip enough to make Zaphod Beeblebrox envious, as the buzzwords continue with running free software (GNU radio) and providing open-access data.
-
-
-
Project Releases
-
Openness/Sharing
-
Open Data
-
It’s been exactly ten years since the launch of OpenStreetMap, the largest crowd-sourced mapping project on the Internet. The project was founded by Steve Coast when he was still a student.
-
Standards/Consortia
-
Wednesday is the day we’ve been waiting for when hopefully the lid will be lifted on OpenGL 5 by the Khronos Group.
-
Health/Nutrition
-
Given Anthropogenic Climate Disruption (ACD) and our dwindling capacities for producing enough healthy food, a cutting-edge farming technique of a design engineer in Port Townsend, Washington, dramatically increasing produce yield, may well already be filling a critical void.
[...]
The corporate answer to the food crisis has been to introduce genetically modified organisms (GMOs) in an effort to expand crop sizes and yields. The outcomes and implications of this, however, continue to prove detrimental to both the environment and human health.
-
Security
-
This year’s Black Hat information security Relevant Products/Services conference in Las Vegas set an attendance record — and brought attention to a host of severe security threats. Presentations ranged from how any USB device could be hacked and creating fake Web sites, to the discoveries that Russian hackers had amassed 1.2 billion logins and that 2 billion smartphones were vulnerable to hijacking.
-
It’s possible to build a cloud botnet using free trials, but thanks to a new effort from security firm Bishop Fox, there is now a framework to limit the risk.
-
-
Smart traffic sensor systems that help regulate and automate the flow of traffic and lights contain security weaknesses that could be manipulated by hackers and result in traffic jams or even crashes, a researcher showed here today.
-
Defence/Police/Secrecy/Aggression
-
Several former US intelligence officers with a cumulative total of 260 years in various parts of US Intelligence recently wrote to President Barack Obama, expressing concern over ‘evidence adduced so far to blame Russia for the July 17 downing of Malaysian Airlines Flight 17’.
-
The United States expanded its Iraq air campaign over the weekend to beat back Islamist militants determined to kill members of a religious minority.
Fighter jets and drones struck ISIS fighters firing on ethnic Yazidis near the northern town of Sinjar, where extremists had driven tens of thousands fleeing into nearby mountains.
-
US forces launched a second wave of air strikes against Islamic extremists near Arbil in northern Iraq on Friday, destroying a militant convoy and killing a mortar team, the Pentagon said.
-
-
-
-
And since when has the U.S. advocated weapons non-proliferation? As the world’s No. 1 weapons salesman, with one-third of its foreign aid budget often military aid, the U.S. has equipped dictators with weapons to slaughter thousands. If supplying weapons is evil, shouldn’t it be consistently condemned? Consider school shootings. Does Obama blame the nation that supplied the guns?
-
The clashes deepened the sense of crisis surrounding Mr. Sharif’s government, whose power has already been undermined by a troubled relationship with the country’s military leadership. The prime minister now faces the prospect of a series of major streets protests led by Mr. Qadri and, more substantively, his rival in the opposition, Imran Khan.
-
The greatest mystery—or better said, mystification—to be overcome is the apparent contradiction between America’s proclaimed principles and the intensity of its covert operations practices. Philip Agee once called the CIA, “capitalism’s invisible army”. He recalled that one of his first tasks as a junior CIA officer had been to conduct background checks on Venezuelan applicants for jobs at the local subsidiary of a major US oil company.9 In fact, his conclusion after quitting the “Company” was that capitalism could never be maintained without an extensive military and secret police force to suppress opposition to it.
-
Indeed, numerous studies and books have shown that the American government, or CIA to be precise, has been behind some of the major coups in Africa as in the rest of the developing world. The CIA for example, is believed to be behind the overthrow of Ghana’s Kwame Nkrumah as well as the assassination of DR Congo’s Patrice Lumumba.
-
Dramatic increases in infant mortality, cancer and leukaemia in the Iraqi city of Fallujah, which was bombarded by US Marines in 2004, exceed those reported by survivors of the atomic bombs that were dropped on Hiroshima and Nagasaki in 1945, according to a new study.
-
Finance
-
He looks exactly the same. Navy blue suit, crisp white shirt and reddish tie. Lego-like cropped black hair, with a dash of white at the fringe. But these days, 3,000 miles away from the grand corridors of Whitehall through which he once strode, David Miliband navigates the cramped 12th floor of an office tower in midtown Manhattan.
-
PR/AstroTurf/Lobbying
-
After the Toledo Blade received months of criticism for reluctantly hosting National Rifle Association board member Ted Nugent at their food and music festival, the conservative commentator repaid the Ohio paper by declaring that “So as long as you know the Toledo Blade hates you, you’re a good American.”
Nugent has been a source of virulently racist, sexist, and homophobic commentary for years, but his January declaration that President Obama is a “subhuman mongrel” has triggered a wave of cancellations and protests of his concerts.
-
Censorship
-
The social network isn’t impressed. Maybe it’s the shock of seeing your bubble butt popping out of skimpy bikini. Or maybe it’s just because you’re a porn star.
-
Here’s what I know:
The application that serves up the icanhazip services is not compromised
The virtual machine on which the application resides is not compromised
The application is returning valid data with no evidence of serving malware
-
We’ve been covering the extreme and misinformed attempts by the City of London Police to become Hollywood’s personal police force online (despite only having jurisdiction for the one square mile known as the City of London). As we’ve noted, the City of London Police don’t seem to understand internet technology at all, nor do they have any jurisdiction to pull down websites. Yet, despite the total lack of a court order, many clueless registrars see letterhead from a police department and assume everything must be legit, even though this completely violates ICANN policy for domain registrars. Much of this is done in “partnership” with legacy players from the industry, who the police seem to listen to without any skepticism at all. It would be like the NYPD giving control of banking fraud investigations to Goldman Sachs.
-
Privacy
-
Phil Zimmermann, the creator of Pretty Good Privacy public-key encryption, has some experience when it comes to the politics of crypto. During the “crypto wars” of the 1990s, Zimmermann fought to convince the US government to stop classifying PGP as a “munition” and shut down the Clipper Chip program—an effort to create a government-mandated encryption processor that would have given the NSA a back door into all encrypted electronic communication. Now Zimmermann and the company he co-founded are working to convince telecommunications companies—mostly overseas—that it’s time to end their nearly century-long cozy relationship with governments.
-
American intelligence officials lack evidence that leaks from former National Security Agency contractor Edward Snowden are behind the Russian and Chinese governments’ heavy crackdowns on U.S. tech giants.
A former high-ranking American intelligence official told VentureBeat late Thursday that U.S. intelligence believes the Snowden leaks — regarding the infiltration of Microsoft, Yahoo, and others by the NSA — are behind the Russian and Chinese backlash. But, the source said, plenty of questions remained unanswered — and so far there’s no proof of a connection.
-
-
Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.
Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.
-
The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets’ computers and cell phones.
-
Internet Service Providers Association of India (ISPAI), on the other hand, believe the move could conflict with privacy of an individual. Also, there is no regulatory requirement for making phone number must for having an email address.
-
Australian Attorney General George Brandis seems to be working extra hard to demonstrate just how completely clueless he really is. On both copyright and surveillance, it’s pretty clear that he doesn’t even remotely understand the details, but is willing to go all in to support some misleading claims that someone told him. On the surveillance front, he recently claimed (incorrectly) that data retention rules are a must (and that whistleblowers should be thrown in prison).
-
-
I was thinking of this cavalier attitude towards the issues of confidentiality and privilege when I read that the National Security Agency or one of its cooperating partners had listened in on private attorney-client communications between a law firm and a foreign client.
-
Yesterday at DEF CON we had the chance to listen to Christopher Soghoian, Principal Technologist, American Civil Liberties Union talk about the state of the surveillance state and how we can help fight against it. Of course you might think that his talk would be about the use of spy proof technologies, but oddly enough very little of that was talked about except to make it clear that talk of spy-proof technology makes people in Washington nervous.
-
Since Edward Snowden helped reveal wide-scale government snooping programs, the conspiracy-oriented elements of the cyber-security community have become a little more emboldened.
-
-
Speaking the truth in times of universal deceit is a revolutionary act, so said George Orwell, author of “1984.”
-
Civil Rights
-
-
In a world where political hyperbole has become so prevalent that it has for the most part lost the ability to impact an audience, it’s easy to routinely dismiss things like the commonly tossed-around Watergate comparisons that abound in political media. Indeed, it’s practically newsroom SOP to affix a gate suffix to any scandal big enough to make the evening broadcast – Lewinsky-gate, Benghazi-Gate, Bridge-gate, etc.
-
-
-
Since 2008 the Senate Intelligence Committee has been investigating the interrogation procedures the CIA used on terrorist suspects. It produced a 6,000-page report plus a 700-page summary. In discussing the summary, Obama said, “We tortured some folks,” using a word — “torture” — the CIA abhors.
[...]
That’s ridiculous. People may argue over what’s torture and what’s not, but keeping facts secret to cover your backside — which is what’s going on here — is unacceptable.
-
Sen. Dianne Feinstein, California’s senior senator and a longtime hawk on national defense, is leading an epic constitutional struggle against unlikely foes: the CIA and fellow Democrat President Obama. So far, she’s winning.
-
Police should carry out a prompt, impartial, and thorough investigation into the death of an independent journalist in Russia’s North Caucasus, Human Rights Watch said today. Timur Kuashev, a freelance journalist and rights activist, was found dead in the outskirts of Nalchik, the capital of Kabardino-Balkaria, on August 1, 2014. His friends and colleagues told Human Rights Watch they strongly believe Kuashev’s death was a murder in retaliation for his activism.
-
What’s that saying about a lawyer who represents himself? Yes, well, consider the case of lawyer Jeffrey Wilens, representing himself pro se, in a “trademark” lawsuit filed against Automattic, the company better known for WordPress, the content management system/hosting service that a large percentage of the internet now uses. Wilens appears to have someone who doesn’t like him very much, who set up a bunch of websites using Wilens’ name and the name of his legal practice, Lakeshore Law Center. Wilens is claiming that this is trademark infringement, based on a trademark on his name and the name of his law practice. Even if he were just going after whoever made the page, this would be a massive long shot. As we’ve covered for years, so-called “gripe sites” are not considered trademark infringement. There’s no likelihood of confusion, they’re almost never commercials, and shutting them down would often violate the First Amendment. But Wilens is pointing his legal guns not just at whoever made the site, but also at Automattic for allowing the site to be created and hosting it (he also sued Google, but recently dismissed the company from the case).
-
Intellectual Monopolies
-
Copyrights
-
Three years ago, the UK government published the Hargreaves review of copyright laws in the digital age.
-
As we wrote yesterday, the infamous monkey selfie has returned to the news, thanks mostly to Wikimedia’s new transparency report, which discusses the supposed copyright claim over the following monkey selfie…
-
This week, police took unprecedented action by shutting down proxies facilitating access to torrent sites blocked in the UK. With the surprise arrest of the sites’ alleged operator leaving people scratching heads, TorrentFreak decided to find out what emboldened police to go after sites that neither carry nor link to any infringing content.
[...]
This week, however, PIPCU delivered a surprise. Instead of going after sites that host or link to infringing material, they targeted a series of sites that have never done so, arresting their alleged operator in the process.
Permalink
Send this to a friend
08.09.14
Posted in News Roundup at 5:04 pm by Dr. Roy Schestowitz
Contents
-
Every year, heck…every month, Linux is adopted by more companies and organizations as an important if not primary component of their enterprise platform. And the more serious the hardware platform, the more likely it is to be running Linux. 60% of servers, 70% of Web servers and 95% of all supercomputers are Linux-based!
Even if they’re not “Linux shops”, companies realize certain benefits from bringing Linux in for specific purposes. Its reliability, flexibility, scalability and cost of ownership offer huge advantages over other OSes…but I don’t have to tell you that, do I? You probably earn your keep because of these statistics!
-
Desktop
-
The five largest notebook vendors’ combined shipments in July decreased 25% on month while the three largest ODMs’ combined shipments also slipped 17%, according to Digitimes Research.
-
-
Kernel Space
-
The input subsystem pull request has been submitted for the Linux 3.17 merge window.
-
Several new ARM devices will be supported by the in-development Linux 3.17 kernel while some less-than-optimally-supported ARM hardware is also getting stripped from the mainline kernel tree.
Olof Johansson emailed in the large batch of ARM changes today for the Linux 3.17 merge window. Some highlights for the pull request consisting of around 750 patches include.
-
At the end of July AMD launched new Kaveri APU models: the A10-7800, A8-7600, and A6-7400K. AMD graciously sent over review samples on their A10-7800 and A6-7400K Kaveri APUs, which we’ve been benchmarking and have some of the initial Linux performance results to share today.
-
The Change.Org website just got a taste of its own medicine after Linus Torvalds started a petition addressed to said website with a simple request.
Change.Org is a very popular platform and lots of people use it to start petitions. Most of them don’t end up anywhere and there have been very few instances when something posted on Change.org actually made a difference. As it turns out, their scrutiny regarding the people who actually post stuff is lacking, to say it gently.
It turns out that the website doesn’t actually check who is posting petitions, which means that it’s very possible that some of the materials and initiatives posted online are not from those actual users.
-
-
Linux 3.17-rc1 is still about one week away at least, but already two commits of new functionality were reverted from the Intel DRM driver code for Linux 3.17.
The first revert yesterday to the Linux Git code was in regards to semaphores support for Broadwell. Semaphores support for Broadwell — a performance-boosting feature — was part of Intel’s big set of changes for this kernel merge window. The DRM pull was just sent in a few days ago but Intel developers decided to end up disabling the semaphores support in a drm-intel-fixes pull request they already submitted to Linus Torvalds.
-
-
Last week I’ve been working on improving the LVM plugin thinpool sharing capabilities. I didn’t explain LVM thin-provisioning before, so I’ll do it now to rationalize what I’m doing.
-
Graphics Stack
-
While we’re still waiting until around the end of the year to see Broadwell processors, Intel’s Open-Source Technology Center is already prepping Linux graphics driver code to begin pushing Skylake support into their driver stack.
-
Separate from the new DRM driver to be found in Linux 3.17 that was written about earlier, there’s another new DRM driver published this week that has yet to hit the mainline Linux kernel.
-
Raspberry Pi fans can rejoice that the VC4 Gallium3D driver has been merged to mainline Mesa in its early form.
-
Applications
-
Suricata, a high-performance Network IDS, IPS, and Network Security Monitoring engine that is open source and owned by a community-run non-profit organization – the Open Information Security Foundation (OISF) –, is now at version 2.0.3.
-
-
-
-
-
-
-
-
-
Proprietary
-
Watching Netflix is possible on Linux however it’s made more difficult by Netflix insisting on using Silverlight from Microsoft. Below is a PPA for an application called netflix-desktop, it will allow you to watch Netflix in a Firefox browser that is being emulated in Wine to trick Netflix into thinking you’re using Windows.
-
Instructionals/Technical
-
Wine or Emulation
-
The Wine development release 1.7.24 is now available.
What’s new in this release (see below for details):
- Beginning of some DirectWrite classes implementation.
- Initial wrapper dll for the packet capture library.
- Some crypto improvements.
- Various bug fixes.
-
-
Games
-
Metro: Last Light on Linux has been amazing penguin gamers with the visual clarity and AAA game-play. Since May we’ve been excited over 4A Games working on a “Redux” game with Linux support. Metro Redux incorporates Metro: 2033 and Metro: Last Light and should be another amazing hit for Linux gamers later this year.
-
-
-
Desktop Environments/WMs
-
There are other Window Managers out there and you can try 76 of them out by downloading and trying out LinuxBBQ (although it takes patience).
-
K Desktop Environment/KDE SC/Qt
-
I expect these few days to be oriented towards Kdenlive future (some Frameworks 5 porting, some refactoring, some new features)… So before that I’m trying to leave the present things in the best possible state, preparing a v0.9.10 release.
-
This is my GSoC project status report. My project aims to design an educational game using marble which will help you learn geography. You can browse maps and enjoy quizzes to test your knowledge.
-
-
You don’t have to remove the KDE 5 packages in order to get logged into your familiar KDE 4 desktop by the way – just choose the appropriate Desktop Environment. As I said, the two environments don’t bite.
One thing you will notice, is how fast the new desktop is. The Plasma Desktop in KDE 5 uses an all-new, fully hardware-accelerated graphics stack on top of Qt5 and the Frameworks5 libraries, and the effect is amazing. Resource usage is still high but the reason for that is known: it is caused by a design issue in KWin and that is currently being worked on.
KDE 5 has been my default desktop for the past week (using Plasma 5.0.0 package), and I hope that the update to Plasma 5.0.1 will fix a couple of pesky bugs.
-
GNOME Desktop/GTK
-
Over a month ago I embarked on my own personal challenge to use GNOME Shell (otherwise just known as GNOME 3) for an entire week. That week happened and went, I wrote some thoughts I had after that initial week, but did not officially end my usage of the Shell. Fast forward to now… I’m still using GNOME Shell and here’s why.
First of all, it’s worth mentioning that what follows in this article is my personal experience and may not reflect your own such experience, even a prolonged one, with GNOME Shell. Therefore, please do not assume I am trying to convince you that GNOME is all sunshine and rainbows and that you’re completely wrong in all your negative opinions of it, if you happen to be one of those people who do not like the GNOME desktop.
-
-
Using the Ice technology in the Peppermint OS is much like launching an app on an Android phone or tablet. For example, I can launch Google Docs, Gmail, Twitter, Yahoo Mail, YouTube, Pandora or Facebook as if they were self-contained apps on a mobile device — but these pseudo apps never need updating. Ice easily creates a menu entry to launch any website or application as if it were installed.
-
-
New Releases
-
OpenELEC, an embedded operating system built specifically to run XBMC, the open source entertainment media hub, is now at version 4.2 Beta 3, following closely the release of the XBMC base.
-
Screenshots
-
Red Hat Family
-
Fedora
-
-
Once upon a time in Fedora Core 1 through Fedora Core 3, updates were handled via a manual process involving emails to release engineering. Starting with Fedora Core 4, a private internal updating system that was available only to Red Hat employees.
-
This Friday is the third day of Flock, the Fedora Contributor Conference, in Prague, the Czech Republic. As you could on day 1 / Tuesday and day 2 / Wednesday, you still can attend – no matter where in the world you are. If you cannot watch the videos live for whatever reason, you may watch them afterwards at the same links posted below.
-
Some people think of GNOME Software as a front end to PackageKit, but that’s not really true, although PackageKit is important. The software installer uses the PackageKit plugin architecture, which although private can be used by anyone who needs it. Problems do occur, Hughes conceded, when you have multiple instances of an application in different repositories, but this can be resolved through application policies (such as “prefer the distribution version”).
-
The most visible product of the Fedora community is the Fedora distribution itself. However, there’s much more to Fedora than its distribution, and underneath it all the Fedora infrastructure keeps things humming along. Without it, we’d have no mailing lists, no Web site, no build systems, packages, or (ultimately) distribution.
-
-
Docker, Docker, Docker! Easily one of the most popular topics at this year’s Flock (or in tech in general), Arun S A G of Yahoo gave a Friday morning talk on the state of Docker and Fedora, as well as a brief comparison between Docker and other Linux-based container technologies.
-
Debian Family
-
Knoppix, one of the longest standing Live CD/DVD/USB Linux distributions based off Debian, is out with a new update.
-
Knoppix 7.4.0, a bootable Live CD/DVD made up from the most popular and useful free and open source applications, backed up by an automatic hardware detection and support for many video cards, SCSI, and USB devices, has been released and is available for download.
-
-
Debian is the great granddaddy of Linux distributions and it remains a popular choice among Linux users. But there has been some recent controversy over whether or not the upcoming Debian Jessie should stick with GNOME as its default desktop versus moving to Xfce. This has caused some sharp debate in the Debian community as you might imagine, and the Oskuro blog has made a passionate argument in favor of GNOME.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has just announced that Ubuntu 12.04.5 LTS (Precise Pangolin) has been officially released for its Desktop, Server, Cloud, and Core flavors.
-
-
Canonical said that a number of OpenSSL vulnerabilities have been found and fixed in its Ubuntu 14.04 LTS, Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS operating systems.
-
NASA seems to be a fan of open source operating system Ubuntu. The Linux distribution built by Canonical has been spotted “flying” over an Antarctic region, during NASA’s Operation IceBridge.
-
The developers working on the popular Ubuntu Linux distribution have announced the release of Ubuntu 12.04.5 LTS, an update to the “Precise Pangolin” version. This update brings “security updates and corrections for other high-impact bugs, with a focus on maintaining stability and compatibility”. It also includes an updated kernel to allow for better installation on x86 architectures.
-
The Ubuntu developers have worked a lot lately at Ubuntu Touch and related, due to the fact that they hope to make the first Ubuntu Touch powered available this Autumn.
-
-
UniPi is seeking Indiegogo funding for a Raspberry Pi add-on for building automation with analog and digital I/O, changeover relays, and 1-Wire interfaces.
-
Phones
-
In Q2 2014, the world’s largest smart phone market, mainland China, accounted for 37% of global shipments – some 108.5 million units. Of the top five vendors in China this quarter, all but one were local companies. And perhaps more impressively, that home-grown success continues in the top 10, where eight vendors were Chinese. In little over a year, Xiaomi has risen from being a niche player to become the leading smart phone vendor in the world’s largest market, overtaking Samsung in volume terms in Q2. Xiaomi took a 14% share in China, on the back of 240% year-on-year growth. With Lenovo, Yulong, Huawei, BBK, ZTE, OPPO and K-Touch, the eight Chinese vendors in the top 10 together accounted for a total of 70.7 million units and a 65% market share. Samsung and Apple, the only international vendors in the top 10, together accounted for shipments of 20.0 million units, representing 18% of the overall smart phone market in China.
-
MediaTek has reported revenues of NT$19.27 billion (US$641.91 million) for July, up 22.7% sequentially and 45.8% on year. For the first seven months of 2014, revenues amounted to NT$119.41 billion, increasing 69.5% from a year earlier.
-
Android
-
The party has begun. Everyone has arrived. The good ones, the bad ones, the pretty ones and the not-so-pretty ones are already here. Except for one. Yes, and it is the most promising one too. Android and iOS both have reached a level of maturity that has given them a huge stronghold over the mobile OS market space. Both of them have been for years, have millions of apps, and have a formidable presence that has managed to ward of competition even from big companies like Microsoft.
-
Neptune’s Android 4.1-based “Pine” smartwatch is shipping to Kickstarter backers with a dual-core Snapdragon, 2.4-inch screen, telephony, and dual cameras.
-
Good news for Moto X users under AT&T as the handset will receive the Android 4.4.4 Kitkat OS update by the end of the month.
-
Regardless of what your views are on ‘alternative’ methods for getting TV and movie content for viewing, Popcorn Time continues to exist, much to the dismay of the MPAA. The service utilizes BitTorrent technology to get content and streams it to the viewer as it downloads, making for almost instant viewing.
-
I’ve been hoping to see this headline for some time now. At the first LibreOffice Conference, the Document Foundation announced its plans to migrate LibreOffice to mobile devices. The plan didn’t include a total rewrite of the code, but repurposing at least 90% of the current code base. That meant the majority of the work was already done. That last remaining 10%? The user interface. The 90% already compiles on Android — so there is a working model. Of course, what good is a working model without an interface to go along with it?
-
Ansible for server automation, open source tools and the different types of network automation were top-of-mind for this week’s SDN bloggers.
-
-
Web Browsers
-
Chrome
-
The Beta branch of Google Chrome, a browser built on the Blink layout engine that aims to be minimalistic and versatile at the same time, is now at version 37.0.2062.68.
The Google Chrome developers have been working around the Beta branch, but now a new release has been made and it packs a few changes and improvements.
-
Mozilla
-
Collabora remains interested in seeing Mozilla’s Firefox web-browser with Gecko layout engine on Wayland.
As reported on Phoronix a few times, the GTK3 port of Firefox is still being worked on along with the Wayland port. The GTK3 version of Firefox hasn’t yet hit the mainline code-base, but progress is being made and for allowing Firefox/Gecko to avoid its hard dependencies on X11 interfaces.
While there’s still some work to go, Frederic Plourde of Collabora has reminded us it’s still being worked on and their experimental code continues to allow Firefox to run natively on Wayland’s Weston compositor.
-
SaaS/Big Data
-
As I noted in this post, last week marked the release of ownCloud 7 Community Edition, the new version of the ever popular open source file-sharing and storage platform for building private clouds. Among the benefits you can get from running ownCloud is a unique server-to-server sharing feature, which lets you share files with other users on separate instances, without having to use file sharing links. For many people, ownCloud has become an essential open platform.
-
We have good reasons to keep an eye on that. Open Source projects typically have a huge turnover (60%/year is normal), requiring us to keep attracting new contributors. Not only that, ownCloud Inc. has hired many community members and, through its marketing and sales machine, is increasing the number of ownCloud users enormously. We do numbers on our user base internally, and the number we make public (about 1.7 million at the moment) is a rather conservative estimate. And growing quickly: Germany’s upcoming largest-ever cloud deployment will bring ownCloud to half a million users!
-
CMS
-
FSF/FSFE/GNU/SFLC
-
Equipped with free GNU Radio software, a group of citizen scientists has contacted, controlled, and is attempting to recapture a 1970s-era satellite and bring it back into an orbit close to Earth.
-
-
The Linux 3.16 kernel was released a few days ago with some awesome features while those wishing to run this kernel in an ultra-free mode without support for closed-source firmware blobs or the ability to load non-free kernel modules, the GNU Linux-libre 3.16 release is available.
-
Public Services/Government
-
Turin wants to be the first city in Italy to switch completely to open source and Ubuntu and entirely ditch all the Microsoft products.
-
A new online environment to help developers and researchers test their software for security weaknesses and vulnerabilities – and improve them – is open for business, the Homeland Security Department recently announced.
-
Open source projects like the National Library of Medicine’s Pillbox show potential of open innovation — including competition with projects started elsewhere.
-
Licensing
-
A few years ago, Red Hat CEO Jim Whitehurst made the prediction that open source software would soon become nearly pervasive in organizations of all sizes. That has essentially become true, and many businesses now use open source components without even knowing that they are doing so.
-
So, Oracle is pushing the limits but apparently is legally doing so. Whether FLOSS can legally be embargoed by government is beyond me. After all, the source is out there and can’t be put back in the bottle. Further, if every country in the world had a random set of embargoes against every other country in he world, FLOSS could not be international at all. That would be a crime against humanity. If Java, why not Linux, itself? If such embargoes apply, Russia, Iran, Cuba etc. could just fork everything and go it alone. They certainly have the population to support a thriving FLOSS community behind their own walls.
-
Openness/Sharing
-
Security
-
-
BRANDEN GHENA pulls his car up under a traffic light in a city in Michigan. He plugs a radio transmitter into the car’s power adapter, connects it to his laptop and, with a few keyboard strokes, takes control of every traffic light in town.
-
A single well-designed cyber weapon could “take down the entire internet,” according to Dan Geer, chief information security officer for In-Q-Tel, the CIA’s venture capital company.
-
OK, so bottom line. Nothing is secure. Who knows, maybe the NSA asked Vivint and other firms to put holes in their systems, just to make its work a little easier.
-
During his keynote and a press conference that followed here at the Black Hat information security conference, In-Q-Tel Chief Information Security Officer Dan Geer expressed concern about the growing threat of botnets powered by home and small office routers. The inexpensive Wi-Fi routers commonly used for home Internet access—which are rarely patched by their owners—are an easy target for hackers, Geer said, and could be used to construct a botnet that “could probably take down the Internet.” Asked by Ars if he considered home routers to be the equivalent of critical infrastructure as a security priority, he answered in the affirmative.
-
-
Every security play will tell you to your face that “we’re different.”
In the case of 6Scan, a small malware outfit that has a unique approach to isolating that unnerving computer threat, the boast may finally be right.
-
Defence/Police/Secrecy/Aggression
-
That raises the question of whether the CIA has begun providing weapons in secret to the Kurds, something U.S. officials will not confirm nor deny. The CIA declined to comment on whether it was sending arms.
-
The U.S. drone strike killed three suspected al-Qaida men in Yemen’s central province of Marib on Saturday, Yemeni security officials said.
The strike targeted a house in Wadi Abida area in Marib province, killing three men and injuring two women, the officials said on condition of anonymity.
-
December 12, 2013, began on a happy note for members of two Yemeni tribes as they celebrated the union of a young couple. After the wedding, a convoy of men took off to escort the bride to her new home. Twelve of them never made it.
-
The bombing of wedding parties revealed much about the directionless and aimless war in Afghanistan.
-
This is important because the exclusion of Palestinians from public opinion polling in Israel is actually quite common–though it’s not always reported clearly. A recent Washington Post article (7/29/14) ran with a headline proclaiming, “Israelis Support Netanyahu and Gaza War, Despite Rising Deaths on Both Sides.” The Post cited various polls demonstrating support for the Israeli government’s current campaign in Gaza:
-
The brutal Hannibal procedure seems to me to break all rules of war. It should be thrown out of the window and never used again in Gaza.
-
-
Israel says Hamas has fired six rockets across the border since the 72-hour ceasefire ended on Friday morning.
-
Prior to Russian President Vladimir Putin and China blocking Obama’s wish to send NATO planes into the Syria conflict, relations between Obama and Putin were pretty good.
-
U.S. forces launched a second wave of air strikes against Islamic extremists near Arbil in northern Iraq on Friday, destroying a militant convoy and killing a mortar team, the Pentagon said.
-
Obama has authorized targeted air strikes on Islamic State to protect US personnel. He also authorized air drops of humanitarian aid to members of the Yazidi minority who fled to the mountains and Christians as well.
-
Prime Minister Narendra Modi on Friday told visiting US Defence Secretary Chuck Hagel that India would like to work with US defence majors on a joint development and co-production model as part of Delhi’s efforts to achieve self-reliance and reduce arms import.
-
Most historians and military experts have since concluded that the second attack on American warships did not occur, many blaming misread sonar pings. “Review of action makes many recorded contacts and torpedoes appear doubtful,” the Maddox commanding officer reportedly communicated after evading the alleged torpedo attacks. “Freak weather effects and overeager sonar men many have accounted for many reports.”
-
I assume, in jest, that at least a tiny part of the media blackout over the “anti-terrorist” wonton brutalities against civilians in southeastern Ukraine (Novorossya) may be the result of the decidedly unsexy quality of the fascist cohort participating in the Kiev junta’s campaign there. Foot soldiers of Svoboda and Right Sector paramilitary army (the Kiev junta’s so-called National Guard, formed as a volunteer army after the coup) look comically lumpen. Moreover, they feel like a postmodern pastiche of the original Nazis—and so does their cult, a virtual fan club, of Stepan Bandera, the Galician butcher who notoriously collaborated with the Axis forces in the extermination of Jews, Ukrainians, Poles, and other undesirables in the East. Ideologically, they seem unreal, as though they had just crawled out of a deep bomb hole in history, which had not been quite repaired in the post war, absurdly calling out for “Glory to Ukraine.” A glimpse at fascist-parade photographs and videos of their subterranean, wormy faces set in the bully’s obstinate scowl, their heads shaven kapo style, hobnail-booted and pudgily stuffed in fascist-regulation black, makes one think of hastily rounded up layabouts as extras for an implausible B-movie about an improbable skin-head warfare in a high school anywhere in the USA. Despite their obvious fantasies, Aryan warriors headed for Valhalla they are not. So, if they can’t be advertised as shining knights in America’s democracy armor or as specimen of a superior brand of military men, why were these retrogrades recruited to lead the Western-backed “pro-democracy” crusade in the Kiev Maidan and its aftermath?
-
Western influence on conflict resolution processes in Africa and other parts of the world is usually associated with anarchy and regime change. According to the grapevine, US foreign relations agenda is driven by the CIA whose main aim is to puppetise political leaders in the world to embrace and advance American interests. Where such efforts are rejected, the US cunningly orchestrates regime change to either cause total chaos in a country or ensure a leader of their choice gets to the helm of political power. The modus operandi involves luring targets with cash handouts and/or pledges of donor funding.
-
Transparency Reporting
-
WikiLeaks founder Julian Assange on Thursday urged US intelligence leaker Edward Snowden to watch his “physical security” if he travels abroad after Russia gave him a residence permit.
-
-
-
-
-
Finance
-
The group, named CIA Project, claims evidence that the cryptocurrency is made by the NSA or the CIA.
-
PR/AstroTurf/Lobbying
-
The American Legislative Exchange Council, or “ALEC,” met in Dallas on July 30 for its annual meeting. ALEC brings together state legislators and corporate lobbyists to vote on “model” legislation behind closed doors, before those bills are introduced in state houses across the country, stripped of their ALEC origins. As the Kansas City Star has noted, what happens at ALEC meetings “provides a preview for the next state sessions” in legislatures around the country.
-
Censorship
-
Vietnam strongly objects to a censorship order issued by Australia’s Victoria State Supreme Court concerning the Australian-style polymer note printing case, Vietnamese Foreign Ministry spokesman Le Hai Binh said on Friday.
-
Wikipedia’s founder Jimmy Wales has revealed new details about what he describes as the site’s “censorship” under the EU’s “right to be forgotten” laws.
-
Why would the FCC even contemplate allowing such a thing? In January, a Washington appeals court handed a big victory to Verizon, which had sued over FCC rules requiring providers to handle all Internet traffic equally.
-
Privacy
-
The US National Security Agency is struggling to attract top technology workers after revelations of widespread eavesdropping practices damaged its reputation.
-
In the cyber age, no website is completely secure and our data is open for everyone to pry upon. Whether it’s a hacking incident or the case of the NSA snooping on our mails – nothing is confidential. In such an era, it just makes sense to build a more secure Web.
-
-
-
How hard is it to hack into satellite communications? Not that hard, according to researcher Ruben Santamarta of Seattle-based security company IOActive. He’s found a number of flaws in several widely-used satellite communication (SATCOM) terminals, the ground-based devices that communicate with orbiting satellites.
Speaking at the Black Hat security conference in Las Vegas yesterday (August 7), Santamarta showed how SATCOM devices work and what kinds of flaws, including hard-coded credentials, backdoors and insecure and undocumented protocols, are present in them.
-
The National Security Agency (NSA) now has access to virtually all online and mobile communications, as well as most credit card transactions, conducted in or through the U.S. The NSA is also tapping into the most popular smartphone applications, including Angry Birds, Google Maps, and Twitter. However, the NSA is far from the only entity treading on personal privacy to achieve its objectives; the private sector is teeming with examples of companies obtaining personal user data through questionable means and deploying it in even more questionable ways.
-
A killer combination of rapidly advancing technology and a desire for greater privacy among the public should condemn current surveillance state to an historical anachronism, according to PGP creator Phil Zimmermann.
In an extended talk at Defcon 22 in Las Vegas, Zimmermann said it might seem as though the intelligence agencies have the whip hand at the moment but mankind had faced this situation before. He also said the abolition of slavery and absolute monarchy, and the achievement for civil rights, also once looked unlikely but were achieved.
-
Berlin has asked all foreign diplomatic missions to provide names of secret service agents working in Germany, news weekly Der Spiegel reported on Friday, amid a rift with Washington over allegations of US spying.
-
-
-
Whistle-blowers come in packs, so it’s a wonder no one followed the example of former National Security Agency contractor Edward Snowden for so long. Now, there seems to be a second leaker, and he or she is, like Snowden, feeding information to the press rather than peddling it to foreign intelligence services. It’s a sign that there’s a flaw in the U.S. approach to national security.
After WikiLeaks published its trove of U.S. military and diplomatic documents in 2010, copycat sites sprang up throughout the world. Even established media outlets set up their own. The information released on these Web pages was not always sent in by whistle-blowers. I was present at the birth of YanukovychLeaks, the Ukrainian site where documentation plundered from former president Viktor Yanukovych’s abandoned residence was published. The “leaks” component in the names, however, pointed to the original project spearheaded by Julian Assange.
-
Earlier this week on the social news and media aggregation website Reddit, the user “PhineasFisher” revealed that he had hacked into the central servers of the spying software company FinFisher, and discovered they had been assisting oppressive Middle Eastern regimes in Egypt and Bahrain to spy on journalists and activists since the first Arab Spring.
Phineas released his 40GB cache of plundered files to the open Internet, which revealed that the company had installed their spyware on close to 80 machines within both countries, including those belonging to several prominent human rights lawyers, as well as leaders of the opposition forces who have been jailed since 2010.
-
Last year’s Defcon event saw blatant anger directed at the feds after Edward Snowden’s revelatory leaks about the National Security Agency’s metadata collection efforts ignited a global firestorm. But this year is different. The relationship between Defcon organizers and the feds has entered a cooling off period.
-
The Australian government announced new anti-terrorism measures this week, in response to the alleged involvement of Australian citizens with extremist groups in countries including Syria and Iraq. Quietly omitted from the briefing at which those changes were announced, but separately leaked to the press this week, were the government’s plans to introduce mandatory data retention requirements for Australian Internet Service Providers (ISPs).
-
In the post-Snowden era, many people have come to believe that the only way to maintain privacy is through encrypting everything. (Well, as long as your encryption doesn’t use the flawed RSA algorithm that gave the NSA a backdoor.) A fast-moving session at the Black Hat 2014 conference challenged the assumption that encryption equals safety. Thomas Ptacek, co-founder of Matasano Security, noted that “nobody who implements cryptography gets it completely right,” and went on to demonstrate that fact in detail.
-
And in the United Kingdom, wiretaps are approved by the Home Secretary — an executive official. It would be as if our own attorney general could approve the FBI’s wiretap requests. Perhaps even more notably, the Netherlands has the highest rate of wiretapping of any European country — Dutch police can tap any phone they like, so long as the crime under investigation carries at least a three-year jail term.
-
Perhaps a whispered conversation between two people might still be private in the U.S., but little else – not even kids playing “Angry Birds” — escapes the monitors at the National Security Agency, according to both a new report from a private data firm and a prominent U.S. Senator.
-
Russia is changing the way people use internet in the country. In a recent round of preventive measures taken by Prime Minister Dmitry Medvedev, a new law requires Russians to identify themselves before logging on to public Wi-Fi hotspots. The decree was signed by Medvedev on July 31 but was publicly announced Friday, according to Reuters.
-
Russia further tightened its control of the internet, requiring people using public Wi-Fi hotspots provide identification, a policy that prompted anger from bloggers and confusion among telecom operators on how it would work.
-
Most terrorists and spy agencies are aware not to use cell or Internet communication for their devious plots. They know cell phones can be turned on remotely.
-
The National Security Agency secretly tried to delete part of a public court transcript after believing one of its lawyers may have accidentally revealed classified information in a court case over alleged illegal surveillance.
Following a recent hearing in the ongoing Jewel v. NSA case, in which the Electronic Frontier Foundation is challenging NSA’s ability to surveil foreign citizen’s U.S.-based email and social media accounts, the government informed U.S. District Court Judge Jeffrey White it believed one of its attorneys mistakenly revealed classified information.
-
Maybe Keith “Haystack” Alexander, who sold this country the pipe dream of mass surveillance and is now raking in the profits of fear and incompetence in the private sector. A modest man, he refuses to confirm his World Record Revolving Door fees of a million a month. “That number was inflated from the beginning,” he said.
Of course, why would any self-respecting Russian hacker want to work for Haystack? Especially after Alexander’s old gang at the NSA got wiped out by a team of American techies in a friendly game of cyberwar.
For those who tend to worry about the fate of their identities in small town Russia, the Times has some tips on re-thinking your password(s).
-
The chat and instant-messaging service Goldman Sachs and five other banks are close to adopting has CIA-like encryption powers that could make life difficult for regulators, The Post has learned.
-
-
The Foreign Intelligence Surveillance (FISA) Court on Friday ordered the release of a partially declassified court opinion, which explains the government’s justification for the collection and surveillance of bulk telephone records by the National Security Agency.
-
Brazil is considering a law that would force U.S. companies like Google to store and keep data on its citizens only within Brazil’s borders – not at Google’s U.S. servers. Let’s call that data protectionism. Pandora, meet the NSA. This isn’t a story about Brazil. It’s a story about the future of technology, and about a lot of money.
-
Civil Rights
-
-
-
-
-
Ahead of the delayed release of a US Senate report on the Central Intelligence Agency’s (CIA) torture system, in place under the previous George W. Bush administration, the Observer revealed that the UK government has approached its US counterparts to censor information regarding Britain’s involvement in rendition and torture through the use of the Indian Ocean air base of Diego Garcia.
-
Mr. Wides tells Paul Jay the Watergate scandal exposed a pattern of a White House above the law and paved the way to exposure of CIA assassinations plots and illegal actions
-
-
-
-
-
The silliest legacy of the Watergate affair was the habit of attaching the suffix “gate” to any action anyone wanted to inflate into something terrible. Silly and unfortunate, because even the term “Watergate” diminished the seriousness of President Richard Nixon’s crimes.
-
-
-
-
-
-
With the president’s blessing, the CIA has put itself in charge of determining whether the materials cited in the SSCI report can be declassified. As is Obama’s default leadership mode, he is absent from this battlefield, having expressed his full confidence in Brennan, who is orchestrating the PR campaign to discredit the unreleased report. In Humpty Dumpty’s power narrative, the CIA comes out on top.
-
Whether it’s Democrats raising money from their base over the threat of impeachment or Republicans suing the president, the parties have this much in common: They’re both more interested in pursuing partisan, short-term advantage than they are in building consensus and solving national problems that require immediate attention.
-
-
-
-
In an article released on August 4, the Associated Press (AP) revealed a plan financed by USAID (United States Agency for International Development) to recruit Cuban youths and organize them to act against the government.
-
The agency repeatedly has refused to release certain records even though information is not classified, arguing that it needs to be treated as classified anyway, experts said. In reaction to the ongoing CIA-Senate spat, Sen. Carl Levin, D-Mich., chair of the Senate Armed Services Committee, said the redactions include material already published in the Senate Armed Services Committee report on detainee abuse in 2009.
-
I think the American people would expect nothing less of their government. These events took place. I am a witness. However many black lines President Obama or his editors try to draw over this report, the truth will not go away.
-
Internet/Net Neutrality
-
Only one portion of the FCC’s network neutrality rules survived a federal appeals court decision in January, and all four major US carriers have just been accused of violating it.
-
Just as the FCC released more than 1.4GB worth of net neutrality comments, President Barack Obama clarified his own thoughts on the proposed rules.
During Tuesday’s U.S.-Africa business forum, the president took a strong stance against net neutrality.
-
The FCC is slated to close the written comment window for the net neutrality proceeding on September 10th, but that doesn’t mean that the FCC is going to make up its mind anytime soon. In fact, it doesn’t even mean that the FCC will be done hearing from the public. Technically, the public can continue to comment, and the FCC, if it decides to do so, can continue to listen to Americans who speak out against proposed rules that would allow Internet providers to discriminate against how we access parts of the Net.
-
DRM
-
Netflix has surpassed HBO in subscriber revenue, according to a status update from Netflix CEO Reed Hastings on Wednesday. The company is now pulling in $1.146 billion compared to HBO’s $1.141 billion, and it boasts 50.05 million subscribers, according to its second-quarter earnings reported in July.
-
-
Readers of the New York Times will have to steel themselves this weekend, as the unseemly brawl between Hachette and Amazon erupts on to the tranquil pages of the Grey Lady. Perhaps the most incendiary item in Sunday’s edition is due to be a full-page ad paid for by a group of bestselling authors – and backed by over 900 other writers – calling on Amazon “in the strongest possible terms to stop harming the livelihood of the authors on whom it has built its business”.
-
Intellectual Monopolies
-
Copyrights
-
Another day, another abuse of the DMCA’s anti-circumvention provisions to stop things that have nothing whatsoever to do with copyright. As pointed out by Slashdot, the Hackaday site recently had a post about how to clone some Tektronix application modules for its MSO2000 line of oscilloscopes. The post explained a simple hack to enable the application module to do a lot more.
-
Senator Joe Biden plagiarized a campaign speech and became Vice President of the United States. Senator John Walsh, D-Mont., plagiarized a final paper and may have ended his political career. What’s the difference?
On Thursday, Walsh dropped his bid to be elected to the U.S. Senate from Montana. He has served in the Senate since February, when he was appointed to replace Max Baucus, who was named ambassador to China. His campaign was already doing badly against that of his Republican challenger, Representative Steve Daines, when two weeks ago the New York Times reported that he plagiarized much of the final paper for his master’s degree at the U.S. Army War College.
-
Old wounds were reopened this week when Wikipedia released its first-ever transparency report, which cited a monkey selfie among its recent takedown requests.
-
Community’s decision on whether to keep or remove the photo could have ramifications as to who holds copyright to pictures posted online
Permalink
Send this to a friend
08.08.14
Posted in News Roundup at 1:07 pm by Dr. Roy Schestowitz
Contents
-
Look…let’s face this together. Dating can suck.
When you’re young, it’s an adventure. One has relatively little baggage, the emotional scars are few and you haven’t even begun to think about dating’s therapeutic value yet. In other words, the dating world is your oyster.
Then you find yourself at midlife, when you’ve accumulated a large pool of of crises. You know, stuff like that divorce or two under your belt, some strong political or religious beliefs that are deeply ingrained and…oh yeah…that messy conviction for hacking that’s still on your record. These are things that tend to narrow down the potential list of candidates for life-long bliss.
-
Desktop
-
Most price speculation put the device at around $399, and considered the device expensive. Now that the official price is known, the unique device seems even less appealing than before. With HP’s Chromebooks ranging from $279 to $349, and LTE models available, the Slatebook looks woefully overpriced.
-
Ubuntu has been spotted aboard the International Space Station and it seems that it was used to control a rover back on Earth.
Astronaut Alexander Gerst has published a photo that he took on board the ISS (International Space Station), bragging with the fact that he controlled a rover back on Earth and with his brand new “Rover driving licence.”
Alexander Gerst is an ESA (European Space Agency) astronaut and he is currently onboard the ISS. He’s also a geophysicist and volcanologist, and now he seems to be a certified Rover driver. The image that he published on Twitter and Google+ got a lot of people interested, including Linux users…
-
Server
-
-
Cumulus Networks, a startup with a Linux-based operating system for commodity data center network switches, has added support for a new hardware architectures and expanded the feature set in the latest Cumulus Linux 2.2 release.
-
-
Kernel Space
-
-
The generally interesting ACPI and power management pull request was sent in for the Linux 3.17 merge window.
The changes corralled by Intel’s Rafael Wysocki for the ACPI+PM area of Linux 3.17 include an ACPICA update to bring ACPI 5.1 support, potentially faster hibernation, and basic work towards ACPI on ARM support. The faster hibernation is via using radix trees for storing memory bitmaps.
-
The Intel DRM graphics driver will feature its usual large amount of changes with the in-development Linux 3.17 kernel.
-
The Linux Foundation is once again this year sponsoring scholarships for students and young professionals interested in open source software development through the Linux Training Scholarship Program, which is now accepting applications.
-
As always there is no shortage of driver related updates in the new kernel and there are also a few interesting features too. Perhaps the most interesting is the unified control group hierarchy which is a feature that Jon Corbert of LWN has done a masterful job of explaining what it does. With Linux 3.16 and beyond there is even more fine grain feature for control and the how users are grouped for that control.
-
The PowerPC pull request for the Linux 3.17 merge window reveals that support for pre-POWER4 hardware is being eliminated. Among the affected hardware is POWER3 and IBM RS64 processors, which are from the late 90′s. POWER3 was used in IBM RS/6000 servers at the time and clocked at only a few hundred megahertz. Support for the old POWER hardware is being dropped since its Linux usage is minimal these days and the support was already regressed for some kernel releases.
-
Facebook is hiring another Linux kernel engineer to join its growing kernel team. The goal for the new employee will be to make “the Linux kernel network stack to rival or exceed that of FreeBSD” and carry out other improvements to the Linux network stack.
-
Facebook wants better comms performance from the Linux kernel, and is recruiting developers to get it.
Its job ad, here, says the House of Zuck wants a Linux kernel software engineer who will focus on the networking subsystem.
-
FACEBOOT IS LOOKING to hire a high-level Linux kernel developer, as it seeks to upgrade the Linux network stack to rival FreeBSD.
-
-
It’s been quite a long time since the announcement of the Barbershop Load
Distribution (BLD) Algorithm. Quite a few changes have been made, since then.
Now it more reflects what it really should be Wink. It’s a simplistic approach
towards load balancing, typical x86 SMP boxes should run okay (tested personally)
, but, yes it can break your boxes too. I’m looking forward to get some feedback,
to keep further development up and going.
-
Graphics Stack
-
The new DRM/KMS driver for the Linux 3.17 release is the STI KMS driver for STMicroelectronics with their STIH416 and STIH407 chipsets. Nouveau is missing out on changes for this pull request due to Ben Skeggs still tracking down a longstanding Nouveau issue but he’s expected to send in a separate Nouveau pull request in the days ahead that will have the new improvements for the open-source NVIDIA driver.
-
NVIDIA today has announced their first beta Linux/Solaris/FreeBSD driver release in the 343.xx driver series. As expected, this release drops pre-Fermi hardware support from the Linux mainline driver code-base.
As we have known for months, those with GPUs older than the GeForce 400 “Fermi” series, you’ll need to use NVIDIA’s 340.xx legacy driver from here on out until you’re able to switch over to the open-source Nouveau driver. The NVIDIA 340 legacy driver will still maintain support for newer Linux kernel and X.Org Server releases along with prominent bug-fixes, but won’t otherwise receive new driver features, etc. NVIDIA’s now maintaining multiple legacy drivers and they’ve been doing a good job at still supporting these drivers for vintage hardware for several extra years.
-
NVIDIA has just announced that a new version of its Beta driver for the Linux platform, 343.13, has been released and is ready for download and testing.
The new driver from NVIDIA doesn’t feature anything out of the ordinary, but the developers have made a series of changes and improvements, which should translate in better support and performance.
-
The Broadcom VC4 Gallium3D driver, which provides the open-source user-space component to an OpenGL driver for the Raspberry Pi, will soon likely be added to mainline Mesa.
-
Benchmarks
-
In continuing of yesterday’s tests of comparing the OpenGL performance of the latest Radeon Gallium3D and Catalyst drivers with an array of AMD Radeon HD/Rx graphics cards, here’s some complementary data including the performance-per-Watt and overall system power consumption for a few of the different AMD GPUs of recent generations.
-
Applications
-
The software tracks a user’s pressed keys, mouse clicks and used bandwidth and the uptime of the system. Periodically, or by hand, the user can upload to the server the number of keystrokes made; this is called “pulsing”.
-
Data Crow 4.0.2, a media cataloger and organizer that can be used to manage all your collections in one product, has been released and is available for download.
-
Wireshark, the best network protocol analyzer that offers users the means to capture and interactively browse the traffic running on a computer network, has advanced to version 1.12.0 and is now available for download.
-
Proprietary
-
The Opera developers have released a new version of their Internet browser and they brought the version up to 25.x, at the same time implementing a number of new features.
Now that the Opera developers are working on the Linux version, users expect only the best from them, but most of all, to have the same quality as the other supported platforms, Windows and Mac OS X.
-
-
-
Instructionals/Technical
-
Games
-
Take-Two Interactive Software is one of the biggest game publishers, with games like GTA V under its belt, and it looks like it’s showing an interest for the Linux platform.
-
Borderlands: The Pre-sequel will be the first Borderlands IP to release on Linux, according to 2K.
-
-
The HandBrake repository has seen some updates; it now contains the current development version for Fedora 20 and later, based on feedback in the previous weeks. It contains less and less bundled libraries and now uses the GTK3 interface.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Digia has officially announced today they will be spinning off their Qt division into its own company (still wholly-owned by Digia) that will focus exclusively upon Qt development.
-
Over the last years, many changes have been happening in the Qt ecosystem. One of the biggest was the creation of Qt Project where Qt is now being developed as an open source project. The Qt Project was created to provide a space open for all to further develop and foster innovation for the Qt technology.
-
As the adoption of Qt is increasing in commercial as well as Open Source projects the company behind the project, Digia, has decided to spin Qt unit as a new company.
Digia has been facing a resource challenge with Qt as 75% of the contribution comes from Digia employees. Qt has dual presence one at qt.digia.com and one at qt.project.com and these two sites or two entities have drifted apart instead of coming closer. Now what is the difference between the two? Same as with any open source project and commercial product. qt.digia.com is all about commercial offering whereas qr-project is all about the community.
-
After 5 months we are releasing a new version of plasma-nm for KDE 4.x containing a lot of bugfixes, minor design improvements and internal changes (see my previous blog post). This is probably last major release since we are now focused to KF5/Plasma 5 version, but we will be still backporting all fixes and you can expect at least one more bugfix release in future.
-
KDE has today made the first update to KDE Frameworks 5. Frameworks are our addon libraries for Qt applications which provide numberous useful features using peer reviewed APIs and regular monthly updates. This release has 60 different frameworks adding features from Zip file support to Audio file previews, for a full list see KDE’s Qt library archive website Inqlude. In this release KAuth gets a backend so you can again add features which require root access, KWallet gets a migration system from its KDELibs 4 version and support has been added for AppStream files.
-
-
-
When we were building towards 5.0, we made the choice to focus all the effort on the core, and not release plasma-addons. It would have been simply too much work and quality of the core would have suffered.
The intention was to start bringing them back from 5.1, which will be in approximately 2 months from now.
The amount of stuff in plasma addons is huge.
-
The KDE Community has released Frameworks 5.1. KDE Frameworks is the evolution of KDE Libraries which is now extremely modular and optimized for Qt applications. This modular nature of KDE Frameworks makes is easy to use for Qt developer as now they can choose only those libraries that they need instead of having to install the entire set which would as one may say ‘bloat’ the system.
-
GNOME Desktop/GTK
-
The WebKit2 GTK+ API has always been GTK+ 3 only, but WebKitGTK+ still had a hard dependency on GTK+ 2 because of the plugin process. Some popular browser plugins like flash or Java use GTK+ 2 unconditionally (and it seems they are not going to be ported to GTK+ 3, at least not in the short term). These plugins stopped working in Epiphany when it switched to GTK+ 3 and started to work again when Epiphany moved to WebKit2.
-
This year’s GUADEC was in Strasbourg, a very beautiful city with its old streets and architecture.
-
-
-
CherryTree 0.34.3, a hierarchical note-taking application that features rich text and syntax highlighting, storing data in a single XML or SQLite file, has been released and is now available for download.
-
GNOME has, for some reason or another, always been the default desktop environment in Debian since the installer is able to install a full desktop environment by default. Release after release, Debian has been shipping different versions of GNOME, first based on the venerable 1.2/1.4 series, then moving to the time-based GNOME 2.x series, and finally to the newly designed 3.4 series for the last stable release, Debian 7 ‘wheezy’
-
-
Qubes, an open source operating system designed to provide strong security for desktop computing, which is based on Xen, X Window System, and Linux and can run most Linux applications and utilize most of the Linux drivers, is now at version 2 RC2 and it’s ready for testing.
-
It runs Linux. It’s opensource It supports a wide range of hardware. It’s stable. It keeps the browser upto date, supporting the latest standards like the Web Video Text Tracks Format.
Furthermore Webconverger Neon is polished, if it fails in often hostile outdoor environments, such as a hardware issue of loss of connectivity, it defaults to a black screen. No silly network can’t be found messages. No blue screens. No modal dialog boxes. And then network/hardware is restored, it lights back up as best it can as it’s retrying in the background.
-
New Releases
-
Clonezilla Live 2.2.3-30, a Linux distribution based on DRBL, Partclone, and udpcast that allows users to do bare metal backup and recovery, is available for download and testing.
-
PCLinuxOS/Mageia/Mandrake/Mandriva Family
-
PCLinuxOS comes with many flavors, but the default is actually KDE. The developers also make a few other versions, like KDE MiniMe, LXDE, or FullMonty, but this is the main one downloaded by most users.
The distribution actually follows a rolling release model, which means that new major features and other changes are introduced regularly through the update channel. Every month, the download ISOs are regenerated with the new update, but if you already have the operating system installed you only have to update it regularly.
-
Arch Family
-
A new preview version of Manjaro 0.8.11, a Linux distribution based on well-tested snapshots of the Arch Linux repositories and 100% compatible with Arch, has been released for the Xfce, Openbox, KDE, and NET flavors.
-
Red Hat Family
-
In the 2013 edition, he looked forward to 2014 as “a defining year for the technology industry. In Whitehurst’s eyes, cloud computing was ripe for production-scale deployment, and Big Data analysis would start to yield real-world results. Web-based businesses took this step a couple of years ago, but this is where more traditional industries join the cloud-based revolution.
-
-
-
-
Fedora
-
On July 29th, the Fedora local team gave an introductory presentation for the students of Computer Systems Engineering at Universidad Interamericana de Panamá as our contribution for the Engineering Week that this university organizes.
-
Josh Boyer — member of the Fedora Kernel Team and FESCo — talked at Flock about the State of the Fedora Kernel, including some of the changes and updates for Fedora 21. The plan with for the Kernel in Fedora 21 is to release kernel 3.16 (or 3.17 at release, depending on scheduling.) During the Fedora 21 process, the kernel maintenance has actually been fairly calm, despite a set of new packaging changes.
-
-
-
At the Flock 2014 conference in Prague, Aditya Patawari delivered a talk on the Fedora Project’s use of Ansible for orchestrating its services. System administrators face many challenges today, as new servers, applications, and updates to these systems are constantly needing to roll out. Deciding whether to deploy virtually or on bare metal; configuring and managing systems and their access credentials is also a continuous and repetitive challenge which Patawari calls the “sysadmin loop.”
-
-
During Josh’s talk about the Linux kernel in Fedora, he shared that Fedora 21 will likely ship with the feature-rich Linux 3.16 kernel. However, depending upon the timing of things, it could end up being Linux 3.17. This isn’t a huge surprise given Fedora 21′s early November release and going into beta in September.
-
-
Once upon a time in Fedora Core 1 through Fedora Core 3, updates were handled via a manual process involving emails to release engineering. Starting with Fedora Core 4, a private internal updating system that was available only to Red Hat employees.
-
-
-
Matthias goes on to point out that Wayland is actually not that hard to find in Fedora either — while it won’t be the default display server in Fedora 21, it is already including in the upcoming release for users to try out and test. To try out Wayland for yourself, just install the gnome-session-wayland-session package from the repositories, then select the GNOME on Wayland option from the session chooser when logging into your profile.
-
Christoph asserts that “distros are boring”. He means that most people choose a distro they are comfortable with, not “which one is best”. The traditional delivery model has made assumptions that are no longer valid. Each distro release tried to meet everyone’s needs. Fedora.next represents a recognition that, with a common core, each of the Products can address the needs of a different audience well.
-
-
-
The Nvidia driver has been updated to beta version 343.13 for Fedora 21 and 22.
Starting from this version, nvidia-settings is now compiled with GTK3 in place of GTK2.
-
Debian Family
-
FSF executive director (and Debian Developer) John Sullivan will give a presentation about the current state of things as the FSF sees it, and will leave plenty of time for discussion as well.
-
Version 7.4.0 of KNOPPIX is based on the usual picks from Debian stable (wheezy) and newer Desktop packages from Debian/testing and Debian/unstable (jessie). It uses kernel 3.15.6 and xorg 7.7 (core 1.16.0) for supporting current computer hardware.
-
-
I ran across this on Monday night. Anyone else watch Major Crimes?
-
debbugs is the Debian bug tracking system. See https://www.debian.org/Bugs/ for an entry point. It’s mostly mail based, with a read-only web interface. You report a bug by sending an email to submission address, and (preferably) include a few magic “pseudo-headers” at the top of your message body ot identify the package and version. There’s tools to make this easier, but mostly it’s just about sending an e-mail. All replies are via e-mails as well. Effectively, each bug becomes is own little dedicated mailing list.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical’s Ubuntu operating system has found a very large market to expand to, India, and it looks like this might be the country that’s the most receptive to this Linux operating system.
-
Colombia’s Caribbean tourism hotspot Cartagena is set to host a regional convention on computer operating system Ubuntu from August 14 and 16, offering workshops and presentations from Latin America’s Ubuntu experts.
-
The UK authorities have declared that the Ubuntu Shopping Lens are legal and that no laws have been broken, either in Great Britain or in the European Union.
-
Today in Linux news, Softpedia is reporting that Ubuntu is the fasting growing operating system in India. Tarus Balog says it seems like “the ideal of open source software” is dead. Linux.com has the top 10 Open Source software titles that rock the Web and Dmitry Kaglik says Zorin OS has stopped him from “distro hopping.”
-
The Amazon “shopping suggestions” feature built into Ubuntu desktops does not violate consumer protections under European and UK privacy law.
-
-
Stéphane Graber of Canonical announced the Ubuntu 12.04.5 LTS release today as the first update since the Ubuntu 14.04 LTS debut back in April. Ubuntu 12.04.5 features its updated kernel and X.Org/Mesa stack for improved hardware support should you still be bound to Ubuntu 12.04. As with other Ubuntu LTS point releases, Ubuntu 12.04.5 also incorporates various security and bug fixes for its package set to make it an easier install than having a large upgrade basket upon installation.
-
The Ubuntu team is pleased to announce the release of Ubuntu 12.04.5 LTS (Long-Term Support) for its Desktop, Server, Cloud, and Core products, as well as other flavours of Ubuntu with long-term support.
-
-
Flavours and Variants
-
-
I, a Microsoft user since DOS 5.x was introduced to Linux in the late 90′s when a friend gave me a copy of Novell Linux. I was in awe that you could get a “free” operating system without having to pay for it. The system didn’t hold my attention long because there were not a lot of applications for it that were similar to the Windows programs I was accustomed to.
-
-
Sydney, Australia-based Ninja Blocks was one of the earlier entries in the Linux home automation game. The startup’s open source Ninja Block hub launched on Kickstarter in 2012, and began shipping in a more advanced version last October. The $199 Ninja Block Kit integrated a BeagleBone Black SBC and an Arduino-compatible microcontroller, and offered remote access via smartphone apps and a cloud service. Using a 433MHz RF radio, it controlled vendor-supplied sensor inputs including motion detectors, contact closures, temperature and humidity sensors, and pushbuttons.
-
Phones
-
Android
-
-
Stolen or lost phones have been a big headache for some Android users. There’s almost nothing worse for some folks than realizing that their phone is no longer in their possession and that they have no idea where it went. Now Google has released an update to its Android Device Manager that may help recover lost or stolen Android phones.
-
CyanogenMod have today launched a central device information point on the CM website. The ‘Device Status Roster’ is an extremely easy to navigate point of reference for anyone looking to install CM or find the latest download available.
-
Sony has announced that it will no longer support the Android side of PlayStation Mobile, its initiative to support cross-platform indie game publishing for the PS Vita and Google’s OS. The service will continue to operate on PlayStation Certified devices running Android 4.4.2 and below, but from Android 4.4.3 and up, Sony can’t guarantee that games will play correctly or that users will be able to access the store. Phones and tablets on Android L, the upcoming major refresh, won’t have store access at all, and Sony says it has no plans to give any more devices PlayStation Certified status.
-
-
Android dominates the world’s smartphone market. A new report from analyst firm Strategy Analytics pegs the Google-owned operating system’s global market share at 85 percent. That means that nearly nine in ten phones shipped are built on Android.
-
Navdy’s Android 4.4 based automotive head-up display (HUD) combines a projected display with voice and gesture controls to interact with smartphone apps.
Transparent head-up displays (HUDs) are becoming increasingly available as pricey options for luxury cars, promising to improve driver safety by keeping eyes on the road. Now, San Francisco-based startup Navdy is introducing a one-size-fits-all aftermarket solution for the 99 percent. The Navdy HUD is available at a steep discount of $299 throughout August before moving to $499, and will ship in early 2015.
-
There are a lot of different Android tablets, but sometimes it can be a time-consuming headache to find the best ones. ZDNet has a helpful roundup of the best Android tablets for this month, and there’s even one from Nvidia that will appeal to Android gamers.
-
Given the broad choice, and combine that with rock-bottom prices, there’s never been a better time to pick up a new Android tablet.
-
Recent numbers from ABI Research on the market share of mobile smartphone platforms splits out the two major variants of Android. Both Google’s flavor of Android (namely the Android variant used by members of the Open Handset Alliance, with the Google Play support and services), and the Android Open Source Project, which is free for any manufacturer to base their handset on, are listed.
-
Android’s march to the top of the smartphone field has been nothing short of meteoric. Back in 2008, there were still questions about the viability of the platform. But in July, Strategy Analytics researchers delivered their latest smartphone market share numbers, which showed Android reaching new highs at a record 84.6 percent share of global smartphone shipments. That is commanding share.
Some people forget, though, that Google steers a preferred version of Android (the version used by members of the Open Handset Alliance, with Google Play support and services), while the Android Open Source Project walks its own path. The fact is, though, both channels benefit Google in big ways.
-
-
One last app came rolling in at the tail end of update Wednesday. This time, we’ve got a relatively small update to Android Device Manager, Google’s answer for lost or stolen phones. The changelog hasn’t been posted on the Play Store, but a quick teardown told us everything we needed to know. There’s a new callback feature that makes contacting the owner a one-touch operation.
-
Qualcomm were quick to add that the success of such power capacity during playback was largely due to their Snapdragon processor. The Qualcomm 801 processor contains a ‘Qualcomm Hexagon DSP’ “a technology block found inside certain Snapdragon processors” which works harmoniously with the One’s 3100mAH battery. Qualcomm suggest while other processors rely on CPU to playback media the Snapdragon is able to “funnel” the media through the DSP thus limiting battery consumption.
-
Shortly after Google’s I/O event we announced the release of a developer preview of the upcoming and hotly anticipated L preview. This was specifically for Nexus 5 and 7 devices and allowed users to get a taste of what L might eventually look like when it is released in the fall.
-
An open source project’s website is the main gateway for potential users and contributors to learn about your project, and it assists existing community members to contribute to the project. But it has to do it right. Does your website clearly present your project, its goals and status, and assist your community members to efficiently communicate with each other? Is it attracting new contributors?
-
Since the very beginning, I knew that we wanted to build a community around the philosophy of the open source way at Opensource.com. That would be easy because once people understood the benefits of open source, they’d be onboard, right? But, what would be the best way to reach new people? Who would participate? How and why would they want to? All of these questions were swimming around in my head. When I set out to find the answers, I could tell it wouldn’t be easy. Understanding group dynamics is a complex beast, but one that comes with satisfying rewards.
-
Before he lost his arm serving as a Marine in Iraq in 2005, Jonathan Kuniholm was pursuing a PhD in biomedical engineering. Now as a founder and president of the Open Prosthetics Project Kuniholm is working to make advanced, inexpensive prosthetics available to amputees around the globe through the creation and sharing of open source hardware designs.
-
Riak CS 1.5, the latest release of the open source distributed NoSQL database for cloud storage from Basho, is out this week, with new features aimed at enhancing performance, scalability, Amazon S3 compatibility and more.
-
When most people think “open source” they think of software Github projects and hackers determined to code for the Greater Good. But it’s also a wholesale philosophy that can be applied to many aspects of society—like running a city.
-
Twitter has shifted its way of thinking about how to launch a new service thanks to the Apache Mesos project, an open source technology that brings together multiple servers into a shared pool of resources. It’s an operating system for the data center.
-
Within our industry, there is a growing divide between two schools of thought; between those companies that believe that the future of the network lies in openness, and those that think a proprietary approach is the compelling way to go.
-
Midas List VC Salil Deshpande talked to TechRepublic about why he’s betting on open source software and what he thinks about the future of IT.
-
Zenoss Inc., the leading provider of unified monitoring and analytics solutions for physical, virtual, and cloud-based IT, today announced Zenoss Control Center, an open source project.
-
-
Move to commodity hardware: All elements of the system run on low-cost standard Linux servers, signifying a transition away from traditionally proprietary, closed hardware systems to a software-based, IP network future.
-
-
Open-source software is also called as OSS, which is a computer software program designed and deployed with its source code made available and licensed with a free license in which the copyright holder provides the rights to an anonymous entity for any purpose. People using OSS can distribute the software to anyone and for any purpose because Open-source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements.
-
Events
-
Web Browsers
-
Chrome
-
Chrome is not just a browser. It has managed to reinvent itself by first turning into a full-fledged operating system, and then an ecosystem. Thanks to the relative openness of the platform and the plethora of efforts developers have put in, extensions and apps on Chrome offer pretty much the same functionality as a big ol’ desktop.
-
The Development branch of Google Chrome, a browser built on the Blink layout engine that aims to be minimalistic and versatile at the same time, has advanced to version 38.0.2114.2 for Linux, Windows, and Mac OS X.
-
SaaS/Big Data
-
Last week marked the release of ownCloud 7 Community Edition, the new version of the ever popular open source file-sharing and storage platform for building private clouds. As The Var Guy noted: “The biggest update that makes the software stand out from other cloud services is a server-to-server sharing feature, which allows users of one ownCloud cloud to share files with those on a completely separate instance, without having to use file-share links.”
-
-
In the early days of OpenStack, established vendors and startups focused mainly on providing services to design and build private cloud environments for devops approaches that blended development and IT operations for speed and efficiency. As OpenStack has matured, there’s been an increase in enterprise adoption and a corollary rise in vendors deploying supported products and managed services.
-
-
-
Databases
-
MongoDB has appointed venture capitalist and former entrepreneur Dev Ittycheria as its new chief executive, adding fuel to speculation that the NoSQL database firm may be planning to go public soon.
-
A database is an information organized in such a fashion that a computer program can access the stored data or a part of it. This electronic file system is stored, updated, selected and deleted using a special program called Database Management System (DBMS). There is a huge list of DBMS, a few of which makes to the list here are – MySQL, MariaDB, SQL Server, Oracle, DB2, LibreOffice Base, Microsoft Access, etc.
-
Facebook engineers Avinash Lakshman and Prashant Malik originally built Cassandra to power the engine that let you search your inbox on the social network. Like other so-called “NoSQL” databases, it did away with the traditional relational model—where data is organized in neat rows and columns on a single machine—in order to more easily scale across thousands of machines. That’s vitally important for a growing web service the size of Facebook. Lakshman had worked on Amazon’s distributed data storage system called Dynamo, but the two also drew inspiration from a paper Google published in 2006 describing its internal database BigTable.
-
Oracle/Java/LibreOffice
-
Larry Ellison’s Oracle bowled out Solaris 11.2 last week – and what does this Unix-like give us? Cloud computing, yes, but also a stab at a datacenter-in-a-(large)-box.
-
Oracle Solaris, one of the most widely deployed UNIX operating systems, which delivers critical cloud infrastructure with built-in virtualization, simplified software lifecycle management, cloud scale data management, and advanced protection for public, private, and hybrid cloud environments, has finally reached version 11.2.
-
CMS
-
-
Plone is a powerful content management system (CMS) that provides users with full control of the process of publishing content. Along with this fine-grain control comes a level of collaboration you might not find with other CMS tools. Plone supports sharing out the publication process to users and groups, as well as sharing folders and documents to individual users. It is, of course, important that you tailor the users and groups to meet the specific needs of your publication and collaboration process.
-
-
Education
-
“Code is the next resume.” These words by Jim Zemlin, executive director at The Linux Foundation tell profoundly about how our technology industry, and the many businesses that depend on it, are transforming. The unprecedented success of open source development methodology in the recent past raises some fundamental questions about the way the businesses are designed, the structure of the teams, and the nature of work in itself.
-
FSF/FSFE/GNU/SFLC
-
-
-
-
Last month in Cambridge was the 2014 GNU Tools Cauldron where GCC as a JIT compiler and other interesting topics were discussed by developers. One of the topics discussed was surrounding better collaboration between GCC and LLVM developers.
-
Everyone has wasted an afternoon on YouTube clicking through videos of talking cats, screaming goats and bad-lip-reading renditions of popular movies. Heck, there are plenty of YouTube videos of me doing odd and silly things as well. (Does anyone remember ‘Buntu Family Theater?) For important family videos, however, I much prefer to control my own data. I’ve tried over the years to keep an archive of home movies and such in a folder on a server somewhere, but they never get seen because getting to them in inconvenient. That’s where MediaGoblin comes in.
-
-
The laptop that the Free Software Foundation awarded last year as the first laptop they endorsed that “respected your freedom” was the Gluglug X60, old refurbished models of the IBM ThinkPad X60. These old laptops that were recommended by the FSF came loaded with Core Duo/Solo processors and GMA950 graphics along with other outdated specs, but were free of needing any firmware blobs or binary drivers. The Gluglug X60 ships with Coreboot as its boot-loader and since the initial announcement the Gluglug company has evolved into offering a “Libreboot” project.
-
Project Releases
-
Percona Server, an enhanced drop-in replacement for MySQL that will allow queries to run faster and more consistently and to consolidate servers on powerful hardware, is now at version 5.1.73-14.12.
-
-
OpenDNS has released OpenGraphiti, an interactive open source data visualization engine that enables security analysts, researchers and data scientists to pair visualization and Big Data to create 3D representations of threats.
-
The parking space bidding app MonkeyParking is no longer available to San Francisco drivers, but another developer called Sweetch is using an open-source approach to fill the void.
-
Public Services/Government
-
The Department of Immigration has showed what a cash-strapped government agency can do with just $1 million, some open source software, and a bit of free thinking.
Speaking at the Technology in Government forum in Canberra yesterday, the Department’s chief risk officer Gavin McCairns explained how his team rolled an application based on the ‘R’ language into production to filter through millions of incoming visitors to Australia every year.
-
The General Services Administration last week announced a new policy requiring open source software be given priority consideration for all new IT projects developed by the agency. And while some may question whether open source software will be as effective as its conventional, proprietary counterpart, Sonny Hashmi, GSA’s chief information officer, is confident this new IT model will put the agency in the best position to procure and develop software in the most cost-effective manner.
-
The General Services Administration will require all new IT projects be open source, according to a policy announced by the agency Aug. 1.
-
The Russian government is considering the replacement of Microsoft and Oracle products with Linux and open source counterparts, at least for the Ministry of Health.
-
Licensing
-
Back in the good ol’ days, a customer could reasonably add a representation to a software or development agreement that promised “no open-source materials will be provided in the work product/software.” Those days are long gone because nearly every product incorporates open source. It seems that every vendor has a list of open-source software that is incorporated into its products and is more than eager to share the list with customers.
-
Openness/Sharing
-
When I was at school, computers were only really just beginning to show their promise and few people had Internet access. I remember begging my Mum for a ZX Spectrum and using it to write basic code to draw things on the screen. From then on I was hooked, but didn’t really know if there were careers programming computers, and it wasn’t at all clear whether this was of any use if I wanted to do scientific research. As I moved to a much faster Amiga 500 Plus, I continued to enjoy programming as a hobby and loved writing simulations to understand mathematics and physical phenomena.
-
Mancini and her colleagues at Democracia en Red, though, might just have the answer to that. It’s called DemocracyOS, and it’s an open source platform that enables citizens to debate proposals that their representatives are voting on. It’s also a place for voters to present projects and ideas to their representatives for debate.
-
Open Hardware
-
LowRISC is a new venture that’s “open to the core” with a goal of producing fully open hardware systems.
A Phoronix reader wrote in this week to share lowRISC, a hardware platform aiming to be open-source from its System-on-a-Chip (SoC) to the development boards. As implied by the name, lowRISC is based upon the 64-bit RISC-V instruction set.
-
Programming
-
Parse released the Parse PHP SDK, aimed at enabling Parse integration “for a new class of apps and different use cases.” The company also said that this is its “first SDK for a server-side language, and the first to be truly open-source.”
-
Standards/Consortia
-
A couple of weeks ago, I wrote about the huge win for open standards – and thus, by implication open source – in the realm of document formats in the UK. There’s an interesting Cabinet Office document from 25 March that is the record of the meeting where the final decision to go with PDF, HTML5 and ODF was taken.
[...]
The issue of patents rather hinges on the new Unitary Patent and the Unified Patent Court, both of which I expect to be bad news for free software. There’s not much we can do about it until we know exactly what the problems are, and even then it’s not clear how much we can change things.
The point about fonts is a good one, and something that several people have mentioned to me after I published my article on the ODF decision. The issue is that it is all very well setting ODF as the standard for exchanging documents, but if everyone is using different sets of fonts, there could be interoperability problems. So we need to draw up some basic list of such fonts, and make them part of the new government standard.
-
Security
-
Companies too often focus on fixing the wrong software vulnerabilities, leaving themselves open to attack, a security expert says. Core Security is releasing at Black Hat a model to help companies properly patch flaws.
-
-
A researcher finds possible security risks with Nest thermostats, though Nest Labs itself is downplaying the risk.
-
-
-
Hidden within hundreds of millions of mobile phones around the world is control software used by carriers to help set up devices and features. According to new research set to be presented at the Black Hat USA security conference this week in Las Vegas by researchers working at Accuvant, the carrier control software itself has security vulnerabilities in it that could be exposing the world’s mobile phone users to risk.
-
Companies increasingly understand that the key to developing innovative software faster and better than the competition is through the use of open source software (OSS). It’s nearly impossible to use only commercially sourced code and get your software to market with the speed and cost constraints required by today’s product life cycles. Without the ability to choose and integrate best-of-breed OSS, some of the greatest product ideas might never see the light of day.
-
-
The hackers collected data on a massive scale, ‘so it affects absolutely everybody,’ security firm says
-
-
Can your computer be hacked? Yep. Can your phone be hacked? Yep. Have your passwords been harvested? Very possibly. (The NYT just reported that one Russian group has more than a billion, though it’s unclear how many are salted and hashed.) So how worried should you be, exactly?
-
Defence/Police/Secrecy/Aggression
-
Carroll of Westforth Street, Anstruther, pled guilty to being in possession of an offensive weapon in Great Junction Street on June 21 last year. His defence solicitor, David Patterson, said Carroll had served with Royal Engineers for six years. After leaving the British Army, Carroll, he said, “had been head-hunted by the CIA to work as a Close Protection Officer in Iraq”.
-
The summit in Washington was supposed to be about trade, but it’s not. US imperialism does not sustain itself by competitive trade, but by force of arms. The real objective was to ensure that mutually beneficial African trade with China and Brazil results in no shift in African nations’ political orientation away from the US
-
Whatever lingering moral authority remaining in the administration of President Barack Obama fell to dust last Friday in a news dump that no one, apparently, was expected to pay any attention to.
That’s what Friday news dumps are for; you drop the smelliest stories in the late afternoon, when the citizenry is staring out the window at work and waiting for the weekend to begin. Very few people pay attention to the news on the weekends, and by Monday morning, the damning or damaging stories that were dropped on Friday have flowed far down the river to pollute the bay, out of sight and out of mind.
-
-
The Obama administration will push for the stalled mega deals for M-777 ultra-light howitzers and Javelin anti-tank guided missiles (ATGMs) when US defence secretary Chuck Hagel comes visiting from Thursday.
-
Why is it that most politicians of both parties have no problem subsidizing the Iron Dome to protect Israel from enemy air attacks with billions of dollars in taxpayer money but claim they haven’t the funds to build a fence to protect our Southern border?
-
A recent move by the Pakistani government to curtail U.S. drone attacks highlights their problematic nature.
-
Pakistan on Thursday condemned the U.S. drone strike in North Waziristan tribal region that had killed at least five people on Wednesday.
-
-
-
-
-
-
Pro-Palestine demonstrators determined to stay on top of UAV Engines in Shenstone, Staffordshire
-
A man has been arrested as pro-Palestinian activists entered the second day of a protest today after scaling the roof of a factory in Staffordshire which they claim is supplying weapons to Israel.
-
Africa is the new frontier for the U.S. Defense Department. The Pentagon has applied counterterrorism tactics throughout the Middle East and, to a lesser extent, Central and South Asia. Now it is monitoring the African continent for counterterrorism initiatives. It staged more than 546 military exercises on the continent last year, a 217 percent increase since 2008, and is now involved in nearly 50 African countries.
U.S. military and police aid to all Africa this year totaled nearly $1.8 billion, with additional arms sales surpassing $800 million. In terms of ensuring Africa’s safety and security, however, the return on this investment is questionable.
What if, for example, that money was instead spent eradicating pervasive viruses that are undermining Africa’s future? Yellow fever vaccination doses cost less than $1.00 and Hepatitis B vaccination doses cost 25 cents or less. These viruses, and their deadly bedfellows like Ebola, are the real threats terrorizing African communities – and more deserving of U.S. defense dollars.
-
In recent weeks, media outlets, including this publication and The New York Times have noted the shift in U.S. counterterrorism strategy from direct action, such as drone strikes and capture-and-kill raids, to indirect action—namely training, equipping and advising partner or indigenous troops, with a limited American combat role.
-
Al-Qaeda started to get stronger after 2009, when its various international branches decided to make Yemen their main base,” the NDC representative Nadia Abdullah said, Itar-Tass reported.
“We are also convinced that other countries contributed to that, thinking they would free themselves of the (Al-Qaeda) presence by redirecting the militants to Yemen. There are Iraqis, Saudis, Syrians, Afghans, and Pakistanis. They did a disservice to Yemen,” she added.
-
White supremacist David “Joey Pedersen offered no apology for a multi-state crime spree that left four dead, using his statement at Monday’s sentencing to blast police, prosecutors and American foreign policy in a harangue briefly interrupted by a sister who yelled at him to “shut up.”
Pedersen said he couldn’t sit idle while “Western identity is being destroyed by other cultures,” and he regretted that police intervened before he did more damage.
“I offer no excuses because none are needed,” he said.
-
-
-
Two missiles slammed into a house in a village in the Datta Khel area in the border region of North Waziristan, security officials said, injuring two militants, besides the five dead.
The bodies of the five people killed were charred beyond recognition, one of the villagers told Reuters.
Drone strikes in Pakistan resumed in June after a gap of six months, during which the Pakistani government pursued peace talks with the Taliban. Pakistan announced an anti-Taliban offensive in North Waziristan within days of the resumption.
-
Nick Clegg has indicated the Government is to announce a suspension of Britain’s £42m of arms export licences to Israel if it resumes its attacks on Gaza.
-
-
-
-
This is quite a new development in the history of West Asia which is fraught with blood-spilling tussle between the Arabs and Israelis. Egypt, which has played the role of a balancer traditionally in the volatile politics of West Asia, is leading a coalition of Jordan, Saudi Arabia and the United Arab Emirates against the Hamas. But what is the reason behind this fresh development in West Asian politics?
-
-
-
With reports indicating that forces loyal to Syrian President Bashar Assad are gaining ground in that country’s brutal civil war, moderate Syrian rebels have told a visiting journalist that the United States is arranging their training in Qatar.
-
The White House proposed a plan two months ago for the Pentagon to train and equip vetted Syrian rebel forces in that nation’s civil war. But, since then, there’s been lots of talk and not much action.
Administration officials have agreed on the broad outline of a proposal, which would see several hundred U.S. troops train 2,300 to 2,500 vetted rebels outside of Syria over 18 months. The Syrians could then train more forces at home.
-
But with Iraq in shambles, intervention has become a tougher sell—and that’s a good thing.
-
After supporting radical jihadists in Syria, the administration of Barack Obama is now going to bomb them in Iraq – two-and-a-half years after the last American troops left the Middle Eastern country.
-
The full extent of the troubles that have befallen the Yazidi people of northern Iraq has not yet come to light, but the fighting for their land continues. Meanwhile, Prime Minister Nouri al-Maliki refused to consider stepping aside for Iraq’s sake. At least 938 people were killed and 107 more were wounded.
-
T.E. Lawrence – Britain’s legendary “Lawrence of Arabia” – warned outsiders that, for them, Arabia is not a hospitable place. “However friendly and informal the treatment of yourself may be, remember always that your foundations are very sandy ones.”
-
West also insisted that, “President Obama has little moral authority at this point,” criticizing the government’s $USD 2 million pursuit of former Black Panther Assata Shakur and the persecution of Bradley Manning and Edward Snowden.
-
We’re continuing to explore the US-led Global War on terror and try to understand why it has actually resulted in an increased terrorist threat around the globe.
-
As a 72-hour truce in Gaza expired at 8 a.m. Friday, Palestinian militants fired barrages of rockets into Israel and the Israeli military responded with airstrikes, one of which killed a 10-year-old boy, according to relatives.
-
“The illegal carpet-bombing of neutral Cambodia, designed to deprive North Vietnam of troops and supplies … sowed the seeds for the murderous Pol Pot regime,” wrote the BBC’s Bob Chaundy.
And according to documents released by the CIA in the early 2000s, “Kissinger was actively involved in the establishment of Operation Condor, a covert plan involving six Latin American countries including Chile, to assassinate thousands of political opponents,” wrote Chaundy.
-
Obama has authorized targeted air strikes on Islamic State to protect US personnel. He also authorized air drops of humanitarian aid to members of the Yazidi minority who fled to the mountains and Christians as well.
-
-
Yemen is a U.S. ally that says it approves every drone strike, but it is also so strapped for cash that the government has implemented numerous austerity measures. Either it handed out the money and guns to cover for its partner, or the U.S. privately paid money to the families of men it publicly describes as al-Qaeda while simultaneously promoting the man responsible for the strike. In truth, only three things are known for certain: Twelve men are dead, $800,000 in cash was delivered, and the dead can’t be both guilty and innocent.
-
When it comes to often misleading euphemisms, no organization does a better job of it than the US military. For example, when combatants shoot their own, they term it “friendly fire.” Makes one wonder what would “unfriendly fire” be? Or it’s when our drones in the Middle East kill innocent women and children, we term it “collateral damage.” Back in the days of the US invasion of Vietnam, a misadventure that ended up costing an estimated 2.5 million lives, there was the village “pacification program,” one case being the My Lai episode, where Lt. William Calley and his troops “pacified” two villages by exterminating somewhere between 350 and 500 children, women (some pregnant) and senior men and women.
-
Environment/Energy/Wildlife
-
The hydraulic fracturing process, or “fracking,” involves pumping a mixture of fluid chemicals into the earth at a high pressure, creating horizontal fractures that release more oil or natural gas from the rock formations than from vertical drilling alone. The oil and gas industry commonly uses “deep injection wells,” also known as “class II” wells, to dump untreated waste fluids after they are used. As the level of fracking production escalates, the wastewater injection process has also increased; it more than tripled from the first half to the second half of 2011, according to the Natural Resources Defense Council. With the uptick in fracking comes emerging risks. Scientists have linked the process to seismic activity, specifically to a recent surge of more than 200 earthquakes in Oklahoma so far this year, some of which have been disastrous.
-
Finance
-
Librexcoin LogoLibrexcoin is today’s Random Coin of the Day for its implementation of Zerocoin, a library used in anonymization of the coin’s transactions. Librexcoin claims that some other coins do not truly implement any form of anonymity, but instead making it easier to track the transactions. “Vaporware” is where a company (or coin in this case) publicly discusses releasing hardware or software to generate interest, but the product is never formally released or canceled publicly. Librexcoin seeks to change this with their coin.
-
The Prime Minister backed the announcement, tweeting: “Great news that Boris plans to stand at next year’s general election – I’ve always said I want my star players on the pitch.”
-
PR/AstroTurf/Lobbying
-
This week the White House has gathered dozens of heads of state from across Africa for a summit in Washington, DC. It has the potential to raise some interesting issues about economic development, major corporations and debates over human rights and the US-led war on terrorism.
But the Sunday chat shows had a strange way of doing this. CBS’s Face the Nation (8/3/14) tapped CEO and former New York Mayor Michael Bloomberg as its Africa expert, sitting alongside White House senior adviser Valerie Jarrett.
-
The self-proclaimed super PAC to end all super PACs, MAYDAY has relied financially on tech moguls since it started its push to take money out of politics. The organization recently released a list of donors that gave more than $10,000, including some of Silicon Valley’s wealthiest players who gave the committee millions.
-
The Wisconsin Supreme Court’s recent decisions upholding Governor Scott Walker’s signature voter ID legislation depended on the votes of the four justices often described as “conservative.”
But the decisions were anything but conservative — instead, they ran counter to conservative principles like federalism and judicial restraint.
-
Last month O’Reilly and others on Fox News defended racist remarks about black communities when they supported local New Jersey reporter Sean Bergin, who was suspended after editorializing that “broken families” were the cause of the “sick, perverse” anger toward police that has “contaminated America’s inner cities.”
-
Censorship
-
-
The controversial “right to be forgotten” ruling introduced by the European Union Court of Justice (ECJ) earlier this year has attracted fresh wave of criticism from the Wikimedia Foundation. The criticism comes hot on the heels of the release of the first-ever transparency report by the non-profit organization behind Wikipedia. The report gives an insight into the volume of government requests the Foundation receives for content alterations or take-downs from its various websites (including Wikipedia).
-
A recent European Court of Justice (ECJ) decision is undermining the world’s ability to freely access accurate and verifiable records about individuals and events. The impact on Wikipedia is direct and critical.
-
Privacy
-
Former Indian External Affairs Minister Natwar Singh has alleged that the United States exerted pressure on former prime minister Manmohan Singh in the choice of his ministers and that CIA agents had “penetrated deep into every sphere of decision and policy making” of the Congress-led United Progressive Alliance government, according to local media reports Monday.
-
-
-
-
-
-
A new classified document about the US intelligence community has been released causing some officials to suspect that a new leaker is feeding information to journalists.
-
-
-
The federal government has concluded there’s a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN.
-
-
-
-
-
-
-
-
-
Just over a year after Edward Snowden revealed NSA surveillance techniques to the world, US officials confirm speculation that a second leaker is now spilling secrets
-
-
-
-
A website has disclosed the number of people considered suspicious by the NSA’s terrorism investigators. But who leaked the lists? It’s unlikely that it was Edward Snowden, the usual suspect.
-
-
Today in bad news about the government watching you, we learnt that the US government’s terrorist watch list has doubled in recent years. What’s worse, however, is that the government admits that over 40 per cent of the people on that list have “no recognized terrorist group affiliation”. None.
-
-
The document reveals that “On 28 June 2013, the Terrorist Identities Datamart Environment (TIDE) passed a milestone of one million persons in TIDE,” including some 730,000 “biometric files” such as fingerprints, retina scans, DNA, and the like.
-
A U.S. government database of known or suspected terrorists doubled in size in recent years, according to newly released government figures. The growth is the result of intelligence agencies submitting names more often after a near-miss attack in 2009.
-
-
What could possibly be more invasive, more offensive, than the secret indiscriminate bulk collection of data by the National Security Agency?
Quite a number of things, actually.
Let’s put aside, for now, the CIA’s complicity in torture, which, to my mind, is the worst scandal of the Bush years. Then, as you read about the following two stories, compare them to the NSA’s surveillance, and weigh the potential and actual harm to real people that the practices exposed herein would cause.
1. The Intercept’s Jeremy Scahill, relying on classified documents, has exposed for all to see the ungainly expansion of terrorist watch lists after September 11, 2001, and particularly, the intrusive, invasive, and privacy-threatening means the government knowingly uses to secretly enrich its files on what must be thousands of innocents Americans, assuming that the actual bad people among them are very few. As of August 2013, Scahill reports, there were 5,000 Americans on watch lists.
-
The bill also leans on the executive branch to be more transparent about surveillance activities. It would require the director of national intelligence to make public either a redacted version or a summary of any significant opinion by the FISA Court. It also would require far more detailed statistical reporting on the use of surveillance authorities. For the first time, the government would publicly report the number of individuals affected by various surveillance programs—including, for most programs, a separate estimate of the number of affected Americans. And the bill would establish a panel of paid privacy advocates who could appear in FISA court proceedings, which currently take place with only government officials present.
-
To increase the security of the internet and computers, the government should corner the market on zero-day vulnerabilities and exploits, offering top-dollar to force out all other buyers. At least, that’s what Dan Geer thinks, and his opinion matters. Geer is chief information security officer at the CIA’s venture capital arm In-Q-Tel, which invests in technologies that help the intelligence community.
-
-
In a eclectic keynote delivered to the Black Hat conference audience, Dan Geer, CISO at In-Q-Tel, made known his thoughts on and ideas about a number of things: from Internet voting to vulnerability finding, from net neutrality to the right to be forgotten.
In-Q-Tel is a not-for-profit corporation that invests in tech companies with the goal of keeping US intelligence agencies equipped with the latest information technologies, but in this instance, Geer put forward his own views.
-
-
-
The Electronic Frontier Foundation (EFF) released a video by acclaimed documentarian Brian Knappenberger (The Internet’s Own Boy) that explores how and why an unlikely coalition of advocacy organizations launched an airship over the National Security Agency’s Utah data center. The short documentary explains the urgent need to rein in unconstitutional mass surveillance, just as the U.S. Senate has introduced a new version of the USA FREEDOM Act.
-
Public concerns about the US government’s secretive surveillance programmes exposed by Edward Snowden have spawned a slew of encryption products and privacy services that aim to make electronic spying more difficult.
-
The Attorney-General had a difficult task when he squeezed into the tiny Sky News studio yesterday afternoon to discuss the government’s data retention proposal. The Prime Minister had already caused confusion by saying an internet user’s browsing history would be included under the proposal — a dramatic widening of data retention from the model proposed by Labor,
-
-
The Intercept, an independent media organization in the U.S., announced on August 4 that the National Security Agency (NSA) of the US included South Korea in the biggest threats secretly working against the U.S.
-
-
-
U.S. House of Representatives Liberty Caucus Chairman Justin Amash survived a strong primary challenge from establishment forces, but those same groups picked off Rep. Kerry Bentivolio and prevailed in an open primary to replace retiring House Intelligence Committee Chairman Mike Rogers. The libertarian-leaning Michigan Republican Amash won 57-43 percent over challenger and businessman Michael Ellis.
-
-
-
Rep. Justin Amash has been one of the most involved and active voices in Congress on pushing back against the intelligence community’s overreach and attack on our civil liberties. Many folks know him for the Amash Amendment, which would have defunded the NSA’s bulk collection of phone records under Section 215 of the PATRIOT Act. While it was narrowly defeated, it certainly woke up many in Congress to the fact that the surveillance scandal was a real deal. Over the last year, though, we’d been hearing more and more stories about how the “mainstream Republicans” were looking to unseat Amash in the primaries. Amash is often identified as being in the “Tea Party” wing of the party, and sometimes described as more “libertarian.”
-
After easily defeating his primary challenger on Tuesday, Rep. Justin Amash (R-Mich.) delivered a scathing victory speech slamming his opponent for running a “smear campaign” against him.
“I ran for office to stop people like you,” Amash said, referring to his primary challenger, Brian Ellis.
“You owe my family and this community an apology for your disgusting, despicable smear campaign. You had the audacity to try and call me today after running a campaign that was called the nastiest in the country,” he continued.
-
Digital mass surveillance is having a chilling effect on US democracy, affecting journalists and lawyers, a report from human rights organisations has warned.
The report, by Human Rights Watch and the American Civil Liberties Union, concludes that some of the most fundamental freedoms are under threat. The organisations argue that the government’s policies on secrecy and preventing leaks, as well as its stance on officials talking to the media, undermine traditional US values.
-
-
Two Carnegie Mellon University researchers from the school’s Software Engineering Institute, or SEI, were set to present an abstract on Tor at Black Hat today. Alexander Volynkin and Michael McCord’s talk was to center on how adversaries could “de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months,” and do so cheaply.
-
Tor has been a thorn in the side of law enforcement for years now, but new work from Wired’s Kevin Poulsen shows the FBI has found a new way to track users across the network. Poulsen looks at the 2012 case of Aaron McGrath, who agents found hosting child pornography on a network of servers in Nebraska. Looking to expand on the bust, agents got a warrant to track anyone who visited the website at its Tor address, and infected servers with tracking malware to identify the root IP of anyone who visited the site. As a result, agents were able to track at least 25 users back to home addresses and subscriber names.
-
-
-
-
University of Oxford students now have the option to pursue a Master’s degree in software and system security accredited by GCHQ (Government Communications Headquarters) – the British counterpart of the US NSA (National Security Agency).
-
On June 27, The Electronic Frontier Foundation, Greenpeace and the Tenth Amendment Center joined forces to fly a 135-foot-long airship bearing a downturned arrow and the words “Illegal Spying Below” over the National Security Agency’s $1.2-billion data center in Bluffdale, Utah.
-
The National Institute of Standards and Technology (NIST) lacks independence and uncritically adhered to the wishes of US electronic eavesdroppers in releasing a weakened random-number generator in 2006. So says a group of mathematicians and computer scientists in a new report commissioned by the lab following the leaking of documents last year by the former National Security Agency (NSA) contractor Edward Snowden. According to those documents, the NSA designed an encryption algorithm to include a “back door” so that it could copy encryption keys from internet users without their knowledge. The algorithm was approved by NIST, which itself develops cryptography technology and advises US companies and government agencies on electronic security issues.
-
Richard Betts, a national security expert at Columbia University, said Snowden released “lots of information about the sorts of metadata the National Security Agency – or NSA – collects for U.S. intelligence, involving the destination of communications and the identities of people around the world who are talking to each other.
-
-
A KEYLESS SECURITY SYSTEM that doesn’t use databases and never stores passwords has hit the Kickstarter crowdfunding website, promising to encrypt data and make it inaccessible to hackers and spies.
A startup named Venux has created an “NSA proof” security system called Venux Files, a universal file management system that provides access to many cloud-based services such as Dropbox and iCloud, making it easier for users to store, access, and manage files securely from any location.
-
Over the years, there have been many instances of Facebook (NASDAQ:FB) being down for maintenance or crashing leaving millions of users stranded. Although individuals can get their social media fix from Twitter, Instagram or Google+, users insist that Facebook is their primary choice. This means that even when it’s down, they’ll resort to any tactic to ensure it goes back up, even calling the police.
-
The announcement this week that Federal Cabinet has given in principle support to the retention of customer data by telecommunications companies for up to two years – so that government agencies can access it without a warrant – suggests that government representatives just don’t understand the consequences of retaining everyone’s metadata and giving spy agencies access to it. The Australian population generally, and lawyers and journalists in particular, should be deeply concerned.
Metadata is not just “the envelope” rather than its content. It is not some sort of harmless or innocuous activity log, which is exactly why the spy agencies are so keen to have it stored and accessible. It is the index to a person’s electronic communications, detailing the when, who, where and how often of each contact. As journalist Glenn Greenwald asks in his book ‘No place to hide Edward Snowden, the NSA and the Surveillance State’: ‘Would the senator, each month, publish a full list of people he/she emailed and called, including the length of time they spoke and their physical locations when the call was made?”
-
ThoughtWorks, a global technology company employing 200 people Australia, is concerned that Australian Attorney-General appears confused about data retention and metadata.
We stand ready to provide Senator Brandis with a briefing and clear explanation of the technical and practical aspects of metadata and data retention, in addition to outlining the considerable cost it poses to business.
-
A judge that served on the secretive U.S. court that authorizes U.S. government surveillance issued a letter raising concerns with a new Senate bill to reform NSA surveillance. In the letter, Judge John Bates – who formerly served on the Foreign Intelligence Surveillance Court (FISC) – argues that the FISC reforms proposed in Sen. Leahy’s recent USA FREEDOM Act (S.2685) would degrade the court’s relationship with the government and increase the court’s workload.
Currently, the FISC considers sweeping government surveillance requests in secret, with only the government advocating before it. Several current laws – such as Section 215 of the PATRIOT Act – give the FISC limited discretion to evaluate surveillance requests, which ultimately led to the government obtaining overbroad surveillance authority. Sen. Leahy’s USA FREEDOM Act would pave the way for independent lawyers to advocate for civil liberties before the FISC – subject to several restrictions.
-
-
Malware used by government agencies for illegal surveillance, known as FinFisher has likely been exposed. The alleged hack of Gamma Group International yielded a 40GB trove that has been made public. Gamma is a provider of “surveillance technology” that your anti-virus probably knows as malware, but only further concealments are developed, as indicated in the screenshot above from release notes which are linked below.
-
-
With global citizens and governments dealing with cyber-surveillance and its impact on personal freedom, classified document leaks will continue and that’s not a bad thing, say security and law experts.
-
The context for this discussion is the Australian government’s new anti-terror proposals included in the National Security Amendment Bill that Parliament will vote on soon. One of the provisions of that bill is that telecommunications companies will be forced to keep your ‘metadata’ for up to two years. This is called ‘data retention’.
-
The NSA pulls no punches when it comes to the surveillance of innocent people in every corner of the world in its attempt to “collect it all.” Those in the U.S. prepared to vigorously oppose mass government spying need to fight back and hold our representatives to account for the routine human rights violations perpetrated by the National Security Agency. And this activism needs to occur on all levels, from lobbying local and state officials to setting up meetings with Congress members.
-
-
The National Security Agency can legally monitor every American, inside and outside the U.S., “by collecting their network traffic abroad,” according to a working paper by researchers at Harvard University and Boston University.
This can happen without any checks and balances from Congress or the Foreign Intelligence Surveillance Court, which oversees surveillance requests from the NSA, said researchers Axel Arnbak of Harvard’s Berkman Center for Internet & Society and Sharon Goldberg, a BU assistant professor of computer science.
-
At dawn on June 27th Greenpeace and the Tenth Amendment Center launched an airship to fly above the NSA data center in Utah. The message on the sides was not subtle — “Illegal spying below”, with an arrow pointing down. It was meant as an alert to action for citizens, and the stunt did have an effect.
-
-
The U.S. National Security Agency is turning to Silicon Valley for topflight talent, but first it has to rebuild trust.
Anne Neuberger, special assistant to NSA Director Michael Rogers, said this week she feared the agency would no longer be able to recruit top technologists, since former contractor Edward Snowden blew the lid off the extent of its spying activities.
-
Something is bugging us Indians now a days. Is the alleged bugging of BJP minister Nitin Gadkari’s home a case of infighting within the party or is a foreign government or agency involved? Or is there any truth in such report at all? These are questions that ‘bugs’ for an answer. The Congress has, meanwhile, used it as an inflammable object to start a political bushfire to corner the BJP.
-
Revelations about the U.S. National Security Agency’s electronic eavesdropping capabilities have sparked anger in Germany and a boom in encryption services that make it hard for the most sophisticated spies to read emails, listen to calls or look through texts.
Jon Callas, co-founder of Silent Circle, which sells an encryption app allowing users to talk and text in private, said a series of disclosures from former intelligence contractor Edward Snowden last year have been good for business.
-
IT security firm Kaspersky Cyber security Windows XP firm Kaspersky claimed it has detected an old, widely known vulnerability that was used in a cyber attack to sabotage Iran’s nuclear program in some versions of Windows platform across 19 million computers, including in India.
-
Google will boost the search rankings of websites that always use secure encrypted connections to transmit pages and exchange data.
-
What Google announced, specifically, is that it will begin favoring sites that encrypt their traffic in its search results. As offers go, this seems eminently reasonable and optional. Adopting Web encryption—technically, the HTTPS standard, also known as HTTP over TLS—is pretty straightforward; lots of sites (banks, many email services, Facebook, etc.) use it already. (ReadWrite, alas, does not.)
-
-
-
-
-
-
A few days ago Dan Greer, the chief information security officer at In-Q-Tel, gave a keynote address at Black Hat USA[1]. According to the company’s web site In-Q-Tel is a non-profit, but it’s a special sort of non-profit. It offers venture capital funding on behalf of the “intelligence community” (read government spies). During his presentation Greer proposed, among other things, that the U.S. government bolster internet security by dominating the market for zero-day vulnerabilities.
Zero-days are basically flaws, unpatched bugs, in software and hardware which attackers can leverage to compromise a computer and covertly gain access. Think of a zero-day vulnerability like an unlocked door recessed back in an obscured alleyway of an otherwise secure home.
Greer’s recommendation goes like this: using its buying power the United State government could act like a hi-tech billionaire who’s snatching up real estate in Silicon Valley and wade out into the digital black market to outbid all of the other buyers. By driving up prices American security services would corner the market on zero-day vulnerabilities.
-
South Asia’s diverse topography, chaotic overpopulation and vast, unplanned cities make drones especially useful
-
India has started using drones to monitor public gatherings and events that are difficult for law enforcement bodies to control from the ground, Time magazine reported.
“The misconception that drones are meant more for destructive purposes seems to still linger around,” Shinil Shekar, head of sales and marketing at Airpix, a Mumbai-based drone company, was quoted by Time as saying, “And it is important that people be more educated about their potential civilian applications.”
-
While you’d expect the members of the military who were being paid daily to hunt down virtual threats would come out way in front, it turns out the guys who have been sitting on the sidelines waiting for their chance to shine got just that, and blew the serving squads right out of the water.
-
A class-action civil suit by a lawyer against Facebook’s data collection practices has attracted over 20,000 co-complainants just five days after its launch.
-
-
-
Facebook is confronting another class action lawsuit, which is gaining massive support from users. Austrian law student and data privacy activist, Max Schrems filed the case against the social network giant’s subsidiary in Ireland for allegedly violating European privacy laws.
-
Former NSA and U.S. Cyber Command head Keith Alexander is defending his new million-dollar cyber-security consultancy, which critics say allows the recently retired general to profit off of his taxpayer-funded career in public service.
-
FOIA enthusiast Jason Leopold isn’t going to sit back and let former NSA head Keith Alexander recede noisily into the background. Alexander’s transition from spy-in-chief to $1 million-a-month rockstar security consultant to our nation’s most easily-impressed banks is currently on everyone’s minds. First off, how many state secrets is he selling? And just how many hacker-beating patents will he be filing for?
-
-
-
-
-
It hardly seemed possible that Keith Alexander the civilian could stir more outrage than Keith Alexander the cyber surveillance chief.
-
-
-
Civil Rights
-
-
In the space of just one week last month, according to Crif, the umbrella group for France’s Jewish organisations, eight synagogues were attacked. One, in the Paris suburb of Sarcelles, was firebombed by a 400-strong mob. A kosher supermarket and pharmacy were smashed and looted; the crowd’s chants and banners included “Death to Jews” and “Slit Jews’ throats”. That same weekend, in the Barbes neighbourhood of the capital, stone-throwing protesters burned Israeli flags: “Israhell”, read one banner.
-
Fox News host Steve Doocy and guest Bo Dietl exploited the death of a Staten Island man at the hands of the New York Police Department (NYPD) to attack Mayor Bill de Blasio and push for increased use of aggressive police tactics like stop-and-frisk and chokeholds. Dietl went as far as to suggest the autopsy of the man’s death was fraudulent, calling for an “independent” medical examiner to inspect the event.
-
This is why, 40 years after Richard Nixon’s resignation from office, I carry a pocket-sized copy of the Constitution in my brief case. It is my way of remembering how far we have come since Watergate … and how much always is at stake for America.
-
On anniversary of Nixon’s fall, John Dean talks Tea Party, taking out Gordon Liddy & Watergate conspiracy theories
-
Neither Congress nor the courts have taken the example to heart and stood firmly against presidential crimes or serious misconduct.
-
-
-
The burglary he demanded was not the one that would occur exactly one year later at the Democratic National Committee’s office in the Watergate complex. Richard Nixon was ordering a break-in at the Brookings Institution, a think tank, to seize material concerning U.S. diplomacy regarding North Vietnam during the closing weeks of the 1968 presidential campaign.
-
-
-
The reaction to the events was furious. “It was a terrifying night,” Drew says. “It felt like we were in a banana republic.” “The television networks offered hour-long specials,” Woodward and Bernstein write in their book The Final Days. “The newspapers carried banner headlines. Within two days, 150,000 telegrams had arrived in the capital, the largest concentrated volume in the history of Western Union. Deans of the most prestigious law schools int he country demanded that Congress commence an impeachment inquiry. By the following Tuesday, forty-four separate Watergate-related bills had been introduced in the House. Twenty-two called for an impeachment investigation.”
The reaction forced Nixon to appoint a new special prosecutor, Leon Jaworski, who would eventually succeed in his quest for the tapes.
-
-
The Senate is all aglow over the CIA’s hacking their computers. But 42 years ago, Hollywood warned about an overarching national security state, and nobody listened. In 1972 a movie issued alerts with striking prescience but minimal public response, and remains little known. What makes the Groundstar Conspiracy notable is its depiction and discussion of what evolved after 9/11/2001; although created decades earlier, it predicted the post al Qaeda environment, asking how far we should go to preserve our security, how much freedom we have to give up to remain secure.
-
Release details of CIA program
-
Even though a bipartisan majority of the committee voted to declassify the report, there is a concerted effort to discredit it by depicting it as partisan and unfair. The report’s detractors include the CIA itself: The agency’s rebuttal will be released alongside the report’s key sections. While the CIA is under no obligation to stay silent in the face of criticism, it seems that between its apparently excessive redactions and its spying on the committee’s computers, the agency is determined to resist oversight.
-
The release of a long-delayed investigation into the Central Intelligence Agency’s post-9/11 interrogation methods was held up yet again on Tuesday after the chair of the Senate Intelligence Committee objected to the amount of information that had been censored by the Obama administration.
-
CIA whistleblower John Kiriakou, who has been serving a prison sentence in a federal correctional facility in Loretto, Pennsylvania for over a year, has written a letter describing how he was given a special designation marking him dangerous. This led to him not being sent to a minimum security camp, and he reveals he was put in a low-security facility because the Bureau of Prisons (BOP) inappropriately categorized his offense as one related to “espionage.”
-
-
-
-
-
Was there not something annoyingly breezy in the president’s phrasing last week as he acknowledged the abuse of suspected terrorists in the wake of Sept. 11? Was there not something off-putting in the folksy familiarity of it?
“We tortured some folks.”
What’s next? “He raped a chick?” “They stabbed a dude?”
-
-
In an Aug. 1 news conference, President Obama acknowledged that in the post-9/11 era “we tortured some folks.” His casual description of detainees did nothing to soften the brutal truth that by resorting to torture the United States failed to uphold the legal and moral framework that should truly define “American exceptionalism.” Instead, America resorted to tactics that are wrong and ineffective, and that put Americans at risk of enduring similar treatment.
-
“I have a question for all the well-meaning people who praise President Obama for ‘banning’ torture,” asks Barry Eisler. “Would you also find it helpful for the president to ban kidnapping? Child abuse? Mail fraud? Maybe you would. After all, no one likes kidnapping, child abuse, or mail fraud. Maybe it would be good if the president banned them.”
-
-
-
-
-
-
-
Khadija and her family survived though her father was brutally tortured and two of her uncles were executed. Her family recently won a settlement with the British government, though part of the deal was that Britain did not publicly admit to any wrongdoing and inquiries were halted.
-
Several Democratic senators have criticized the Obama administration’s heavy censoring of a Senate report that details the Central Intelligence Agency’s program last decade in which terrorism suspects were tortured.
Senator Dianne Feinstein (D-California), chair of the Senate Intelligence Committee, complained that the administration redacted or removed “key facts” from the report, which has not been released.
In fact, the editing by Obama officials makes it unlikely the committee’s findings will become public anytime soon, as Feinstein wants as much of the full story of the CIA’s shadowy program told as possible. She said she intends to press the White House for omissions from the report to be restored.
-
Republicans in the Senate Intelligence Committee are claiming that the CIA’s “enhanced” interrogation techniques were vital in finding Osama Bin Ladin, as part of a larger critique of a report by Democrats that details what President Obama called “torture” of prisoners in CIA custody (via The Daily Beast).
-
More than a year and a half ago, the Senate Intelligence Committee approved a voluminous report on the CIA’s detention and interrogation of suspected terrorists after 9/11. Those who have read the report say it concludes that the agency used brutal and sometimes unauthorized interrogation techniques, misled policymakers and the public, and sought to undermine congressional oversight. It also reportedly rejects the idea that waterboarding and other “enhanced interrogation techniques” (a euphemism for torture) produced information vital to preventing terrorist attacks.
-
A group of retired Military Generals has asked US President Barack Obama to declassify a Senate report on CIA interrogations expected to be released this week. “The CIA’s programme prompted a public discussion about whether these enhanced interrogation techniques (EITs) produced reliable information,” a group of 15 interrogators, interviewers and intelligence officials said in a letter to Obama.
-
-
The Senate Intelligence Committee chairwoman is withholding release of its long-awaited report on the CIA’s detention and interrogation program in protest of administration redactions that “eliminate or obscure key facts” in the panel’s review.
-
-
-
-
-
-
-
-
-
-
In some respects, the recent admission by CIA Director John Brennan that his agents and his lawyers have been spying on the senators whose job it is to monitor the agency should come as no surprise. The agency’s job is to steal and keep secrets, and implicit in those tasks, Brennan would no doubt argue, is lying.
-
We’re taught as kids that lying is bad, that liars should be held accountable. But in Washington, lying is so endemic and so flagrant that the perpetrators are rarely even rebuked.
-
Forty years ago, Senator Frank Church suggested that the Central Intelligence Agency (CIA) was “a rogue elephant rampaging out of control, over which no effective direction was being given.” Church’s “rogue elephant” was a myth, although a plausible one at that, in that neither Dwight D. Eisenhower, nor John F. Kennedy left a paper trail conclusively linking them to plots to murder Fidel Castro. The absence of any paper trail was designed to allow presidents to “plausibly deny” any operation, should it be exposed. This was seen as a prudent step to protect the United States government, particularly its chief executive, from repercussions stemming from violations of international law.
-
First came the stirring denial, followed by the heartfelt apology.
-
-
-
The CIA and the Senate can’t agree on how to mask the identities of those who helped the U.S. in its secret detention. Whose identities will Obama protect?
-
A definitive Senate report about one of America’s darkest periods continues to be withheld – precisely because the agency behind it refuses to come clean
-
The US administration is expected to release a declassified Senate report in the coming days that will detail abuses by intelligence agents targeting extremist groups in the wake of the September 11, 2001 attacks.
-
-
-
-
-
-
-
The CIA’s months-long battle with the Senate has reached a new impasse, this time over the release of the Senate Select Committee on Intelligence report on the CIA’s torture of terrorism suspects during the Bush years. In about the most blatant conflict of interest imaginable, the CIA was allowed to redact the report about its own war crimes — and to precisely no one’s surprise, the spy agency blacked it out into gibberish.
-
The CIA now admits that it spied on a Senate investigation into the agency’s shameful program of secret detention and torture. Do we need any more proof that the spooks are out of control?
An internal “accountability board” will look into the incident, an agency statement said, and might recommend “potential disciplinary measures” or even “steps to address systemic issues.”
-
The Bush administration’s interrogation policy cannot be written off as a panicked aberration that ended in the immediate aftermath of 9/11.
-
And I actually don’t want to pick on them. They’ve done a lot of bad stuff, and they’ve done a lot of good stuff, and the people who work there, by and large, are as good as you might think you are.
-
-
The U.S. and U.K. collaborated to snatch Khadija al-Saadi’s family in Hong Kong and deliver them into the custody of a murderous dictator.
-
-
-
-
I felt that no one was really paying attention to the travesty of politicized intelligence that I documented in 1991. And now I must ask again, “Is anyone paying attention to any of this?” In addition to the limited attention that the issue received from the mainstream media, President Obama answered a question at a news conference last week about the Senate report by stating that “We did a whole lot of things that were right, but we tortured some folks.” Well, if we “tortured some folks,” then perhaps we need to know the folks that did the torturing. Of course, the CIA’s redaction of the report included the pseudonyms of the operations officers who conducted the “enhanced interrogation techniques.” It is “beyond the scope of reason” that anyone, including the commander in chief, could read or even be briefed on the sadistic activity that dominates the torture report and blithely answer any question on the topic.
-
-
When the Central Intelligence Agency was accused of spying on U.S. senators investigating its detention program, Director John Brennan quickly rejected the charges.
-
-
CIA Director John Brennan has apologized to lawmakers over the determination that his agency improperly spied on Congress by searching computers used by Senate investigators. An apology isn’t enough: He needs to go.
The Senate Intelligence Committee since 2009 has been investigating the CIA’s use last decade of interrogation techniques on terrorism suspects that President Obama now describes as “torture.” An Inspector General’s report confirmed last week that five CIA employees searched computers that were assigned to congressional investigators and, in the process, reviewed committee files and staff members’ emails.
-
Recently The Jerusalem Post reported that Col. (res.) Jana Modgavrishvili is the first Justice Ministry investigator of complaints of torture against the Shin Bet (Israel Security Agency) who is not an internal appointee.
-
THE Senate Intelligence Committee will soon release key sections of its report on the Central Intelligence Agency’s detention and interrogation of terrorism suspects after 9/11. In remarks on Friday anticipating the report’s release, which he has publicly supported, President Obama acknowledged that “we tortured some folks.”
-
-
President Barack Obama said Friday the United States “tortured some folks” during President George W. Bush’s tenure, a declaration that could conceivably bring consequences for alleged American torturers or those who authorized their conduct.
-
Cheney left behind the legacy of torture as national policy.
-
The latest example erupted last week, when the CIA’s inspector general confirmed that the agency had hacked into Senate Intelligence Committee computers and read emails sent by staffers. The investigation came after Sen. Dianne Feinstein revealed the surreptitious search, charging that the CIA had violated federal law and the Constitution.
-
CIA spying on the Senate is the constitutional equivalent of the Watergate break-in. In both cases, the executive branch attacked the very foundations of our system of checks and balances.
President Obama is not President Nixon. He hasn’t been implicated personally in organizing this constitutional assault. But he is wrong to support the limited response of his CIA director, John Brennan, who is trying to defer serious action by simply creating an “accountability panel” to consider “potential disciplinary measures” or “systemic issues.”
-
There’s nothing like a former ally who’s changed sides. Sen. Dianne Feinstein, once a spy agency loyalist on intelligence matters, has become a demanding critic who wants more disclosure of CIA torture practices.
Feinstein, who heads the Senate Intelligence Committee, was a quiet supporter of Washington’s spy agencies for years. But that changed – at long last and for the public’s good – when she learned the CIA was hacking into her committee’s computers while Senate staffers drew up a long-awaited appraisal of the agency’s treatment of suspected terrorists in the wake of the Sept. 11 attacks.
-
So what diversion does Obama dangle as bait before his media in his last press conference before they vacation together? With his CIA caught snooping on Senators, he changes the topic to his favorite “Blame Bush” theme by leaking a CIA document on torture.
-
-
-
-
-
-
-
The US State Department is increasing security at some American embassies in anticipation of the public release of a long-awaited Senate report detailing the CIA’s use of harsh interrogation techniques, US officials said on Wednesday.
-
“The bottom line is that the United States must never again make the mistakes documented in this report,” Feinstein said in a statement released Tuesday. “I believe the best way to accomplish that is to make public our thorough documentary history of the CIA’s program.”
[...]
In his own statement, Sen. Carl Levin (D-Mich.) echoed the committee and Feinstein, saying the CIA’s proposed redactionswere “totally unacceptable.”
-
-
-
The most transparent administration ever has managed to infuriate the left’s top national security state defender, Sen. Dianne Feinstein (D-Calif.), even further. The CIA already drew her ire in a way even libertarians can appreciate (and yet still laugh at) when they snooped on staffers from the Senate Intelligence Committee as they put together a massive report analyzing the CIA’s use of torture under President George W. Bush. The CIA ended up apologizing to her, and now there are calls to dump CIA Director John Brennan after he initially scoffed at Feinstein’s complaints.
-
-
-
-
-
-
-
-
-
Wow. Twelve years. The time has flown by. Seems like just yesterday that the Justice Department sent over its torture memos to then-CIA General Counsel John Rizzo, ramping up a CIA torture program that horribly abused more than a hundred men, killing a few of them. No one at the CIA was ever even charged with a crime. Some agents, in fact, got job promotions.
-
-
-
A retired major general in the US army, Antonio Taguba, says CIA officials are trying to undermine a report about the agency’s interrogation programme. In a New York Times op-ed, he also says CIA officials have used extraordinary means to resist oversight of their activities.
-
On July 24, European Court for Human Rights (ECHR) ruled that Poland has to pay 230,000 euros ($307,366) compensation to two individuals whose human rights had been violated. Guantanamo detainees Zayn al-Abidin Muhammad Husayn (also known as Abu Zubaydah), and Abd al-Rahim al-Nashiri won a case against Poland, which, according to the court, failed to prevent their detention and torture at the CIA-operated Stare Kiejkuty prison, and to prosecute those responsible for it.
-
Among members of the intelligence community, Brennan has “the closest relationship with the president,” said former Rep. Jane Harman (D-Calif.), who spent eight years on the House Intelligence Committee and is now the director of the Wilson Center.
-
She used to just make baskets. Now she also makes history. Former Colorado State star Becky Hammon — soon to retire after 16 seasons in the WNBA — is hired by the San Antonio Spurs to be an assistant coach. Who would have guessed that this glass ceiling was about to shatter? Via the Coloradoan.
-
-
-
-
-
-
-
-
-
-
-
-
-
A new book, to be released September 2nd, discloses a previously unknown connection between Presidents Richard Nixon, Gerald Ford, John F. Kennedy and the CIA. In fact, author Roger Stone, a former Nixon aide, asserts that Nixon “knew the CIA was involved in JFK’s assassination” and was so pesky in his attempts to get them to disclose all their records that the CIA contemplated the assassination of Nixon as well. The book, Nixon’s Secrets: The Rise, Fall, and Untold Truth about the President, Watergate, and the Pardon, demonstrates a definitely unfriendly relationship between himself and then CIA Director Richard Helms.
-
A U.S. program in Cuba that secretly used an HIV-prevention workshop for political activism was assailed Monday by international public health officials and members of Congress who declared that such clandestine efforts put health programs at risk around the world.
-
It was during this time, the early phases of the Obama administration, that the relationship between Washington and Havana appeared to be moving in an innovative direction, away from ideological tactics and Cold-War rhetoric towards progressive talks and cooperation. Sadly, however, this was not to be the case. Despite the odd and insignificant lessening of the embargo’s merciless restrictions on travel and remittances, the Obama administration has maintained a moribund status quo of Washington’s policy towards Cuba. This tragic fact was emphasized as recently as August 4, when yet another woeful tale of sandbox antics when the Associated Press revealed an additional United States Agency for International Development (USAID) program that was tasked with subverting Cuban sovereignty.
-
Another cockamamie USAID plot revealed
-
US legislators and health activists criticized the US plans to use an HIV-Aids campaign in Cuba to carry out political activism by saying that such covert operations put US health programs at risk in all parts of the world.
The program, which was financed and supervised by the US Agency (USAID) for International Development including the sending of a dozen Latin American youngsters to Cuba to recruit leaders and encourage a rebellion on the island.
-
The Associated Press gratuitously blew a CIA democracy-sowing operation in Cuba, supposedly to make us so outraged that the CIA would encourage regime change in a socialist paradise. Just whom was AP serving?
No, it wasn’t one of the agency’s famous Keystone Kop capers to unseat the ruling Castro brothers. There were no exploding cigars, no revved up Cuban exiles, no weapon shipments, no cloaks, no daggers.
-
Did Obama, Clinton, and the United States Agency for International Development (USAID), which oversaw the operation, learn nothing from the 1960s, when the Kennedy and Johnson administrations tried repeatedly to overthrow Cuban ruler Fidel Castro and even to assassinate him?
-
In the 1980s the Sandinistas accused the CIA of trying to assassinate him with a bottle of poisoned Benedictine liqueur. Fr D’Escoto once referred to former US president Ronald Reagan as “the butcher of my people” and only last year told US president Barack Obama in a letter that the US was “hooked on wars of aggression” and “possessed by the demons of greed and domination”.
-
In the past year, over 50,000 refugee children have fled from Central American countries and crossed the U.S. border. While many have been released to their families and other caregivers, thousands remain locked up in mass detention centers. Much of the media coverage carries the familiar anti-immigrant slant, blaming the parents and even the children for imagining the U.S. to have pro-immigration policies. This tendency to blame immigrants parallels the longstanding trend of blaming formerly colonized countries for internal violence, and it omits the role of U.S. and European colonialism and imperialism in originating it. It erases the history of Central America and it distorts the nature of mass migration.
-
As in Venezuela in 2002, when Hugo Chávez was briefly detained during a failed coup, tens of thousands took to the streets to support the president. A section of the “democratic” opposition offered its conditional support. Another, led by Cléver Jiménez, head of Pachakutik Plurinational Unity Movement — the political wing of the Confederation of Indigenous Nationalities of Ecuador (Conaie) — called (unsuccessfully) on indigenous and social movements to form a “national front” to demand Correa’s resignation.
-
-
-
Intellectual Monopolies
-
Copyrights
-
There is an interesting copyright case going on at Wikipedia. A photographer named David Slater who went to Indonesia to shoot jungle there. Unfortunately one of his cameras was temporarily stolen by a female Macaque and ended up taking a lot of selfies.
-
With help from Hollywood, City of London Police have arrested the alleged operator of Immunicity and a range of torrent site proxies. The 20-year-old man was questioned at a local police station, and pending further investigation was released on bail.
Permalink
Send this to a friend
Posted in Site News at 4:37 am by Dr. Roy Schestowitz
Summary: Microsoft resorts to AstroTurfing, lawsuits, vapourware, and attack ads, revealing that it is a feeble aggressor whose only remaining hope for revival is destruction of rivals
Samsung sells computers with Windows, but Microsoft is now suing Samsung. This is very revealing.
Now that Microsoft takes its Android-hostile patents to court we might finally see them defanged, or as SJVN put it, this “could be the beginning of a war over the validity of Microsoft’s Android patents.”
“The Apple vs. Samsung case recently suffered a setback after Samsung had used the SCOTUS ruling against ‘abstract’ patents.”There is no such thing as Android patents, just as there is no such thing as FOSS patents. This is the wording style of the aggressor. The Apple vs. Samsung case recently suffered a setback after Samsung had used the SCOTUS ruling against 'abstract' patents. Additionally, China told us which patents Microsoft is using against Android, so there too lies an opportunity for a final smackdown (prior art can be brought forth).
All this lawsuits talk ought to remind us that Microsoft really hates Linux and FOSS. It only pretends otherwise because it needs to (Slashdot gives some help to Microsoft’s “open” proxy/PR/charm offensive), as many businesses/people who use Windows also use GNU, Linux, Android, Firefox etc. We quite enjoyed this new analysis from Jim Lynch, who correctly said:
Microsoft has never been a…er…fan of Linux, to say the least. Former Microsoft CEO Steve Ballmer even likened Linux to cancer back in 2001. Now Microsoft has an unintentionally hilarious comparison of its server products and Linux on a site called Why Microsoft.
[...]
I hadn’t heard of this site before, but I bumped into it via a Reddit thread. Talk about a one-sided comparison bathed in “marketing-speak!” I particularly enjoyed the ridiculous bit about security threats where Microsoft just says this: “Persistent threats and dedicated attackers can slow your projects and put your IT environment at risk with Linux projects.”
It was a fun read this morning while I finished my first cup of coffee. I was fortunate not to snort coffee through my nose while reading through it. Thanks for the laughs, Microsoft.
[...]
Feel free to put me in the cynic category when it comes to Microsoft and open source. I think the Why Microsoft site is a much clearer indication of where Microsoft’s thinking is at than the speculation in this Dev Ops article. In other words, I’ll believe that Microsoft is actually embracing the open source community when it actually happens.
Windows is in trouble, so Microsoft’s lawsuit against a massive partner (Samsung) is not entirely shocking. Windows is in so much trouble that releases of it get altogether cancelled and Microsoft started using vapourware tactics (talking about versions of Windows that do not even exist). To quote the British press:
Microsoft has at last revealed the date when its second major update to Windows 8.1 will ship to customers: never.
Vista 8 has been an utter disaster (worse than Vista). No wonder Microsoft goes to court in a desperate attempt/attack to tax the Android leader. No wonder Microsoft uses vapourware tactics as well (all links to examples are omitted as we don’t wish to feed fiction, fantasy, and marketing).
Microsoft will mostly likely continue its attack ads against Google, even though Microsoft reads your mail [1] while repeatedly accusing Google of doing that.
Windows is a passing fad. We don’t expect it to be widely used 5 years from now. Other Microsoft products heavily rely on Windows’ inertia, so they too will gradually perish and be shut down (while more staff gets laid off by the tens of thousands). █
Related/contextual items from the news:
-
Permalink
Send this to a friend
Posted in Apple, Microsoft at 4:04 am by Dr. Roy Schestowitz
Proprietary operating systems are demolished by Snowden’s valuable leaks that exposed and/or confirmed more back doors
Summary: China bans Apple’s operating systems (just like Microsoft’s) while Apple retreats on it litigation strategy from 2010, showing perhaps where Microsoft is heading now that it is suing Samsung (as Apple did some years ago)
Back doors in Windows are nothing new, but the media does not discuss them too often (unlike iOS back doors). Earlier this week, according to this report, “IT security firm Kaspersky Cyber security firm Kaspersky [...] claimed it has detected an old, widely known vulnerability that was used in a cyber attack to sabotage Iran’s nuclear programme in some versions of Windows platform across 19 million computers, including in India.”
Remember Stuxnet?
“Countries that the US does not like would be utterly irresponsible to still deploy and use proprietary software from the United States after all that.”The press seems to have quickly move on, without ever connecting it to material from NSA leaks showing Microsoft complicity with the NSA. Countries that the US does not like would be utterly irresponsible to still deploy and use proprietary software from the United States after all that.
China has already banned Windows and Russia moves away from x86 (hence no Windows). China is now banning Apple operating systems as well. Is Russia next? They’ve asked Apple and SAP for source code, having silently kicked Microsoft out (by moving to ARM).
According to this report from China, Microsoft is asked to obey the law it so often ignores (it is said to be bribing Chinese officials and engaging in other serious crimes). The report says: “Microsoft isn’t exactly welcome in China nowadays. The company and the government have many issues between them. The software company is believed to be guilty of breaching Chinese antitrust rules.
“Microsoft was told not to obstruct the antitrust investigation by Chinese regulators by the State Administration for Industry and Commerce (SAIC).
“Special investigations by the Chinese government are common these days. It seems the SAIC only wants to make sure Microsoft isn’t doing anything that is against the law.”
China has meanwhile moved on to banning the other NSA back doors [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11] and one article makes it clear that all Apple operating systems are banned:
China seems to be on a mission to isolate itself from the world, at least in terms of technology. After banning Windows 8 on government PCs and raiding several of Microsoft’s offices in China as part of an anti-trust investigation, Chinese officials have now prohibited to purchase of several Apple products for government use.
China will instead use Linux-based platforms. Some are AOSP forks.
Apple is meanwhile also retreating from lawsuits against Samsung [1, 2, 3], albeit only after it lost the biggest case in many practical terms (only cents granted on royalties per phone sold). Yes, Apple is dropping some lawsuits after Samsung tried a SCOTUS case (precedence) in its legal strategy. It has also been pleasant to see the EFF’s Daniel Nazer telling the US Patent Office to “End the Flood of Stupid Software Patents”:
We have often written about how software patents feed trolls and tax innovation. We’ve pushed for patent reform in Congress, in the courts, and at the Patent Office. While new legislation has stalled (for now), reformers have won significant victories in the courts. Of these, the Supreme Court’s recent decision in Alice Corp. v. CLS Bank may be the most important. In this case, the court issued a landmark decision cutting back on abstract software patents.
He is explicitly talking out against software patents — something which they have not done in a while at the EFF. Even a Microsoft booster like Bill Snyder could support this with an article titled “The battle against stupid software patents is on”. We will cover patents in more depth in the next post, █
Permalink
Send this to a friend
08.06.14
Posted in News Roundup at 11:29 am by Dr. Roy Schestowitz
Contents
-
Today in Linux news, Christine Halls strolls down memory lane to a time when real men still wrote their own drivers and backups were for sissies. Tecmint.com has six cool distributions for your older PC and a couple of favorites were spotted out in the world doing real work. One blogger writes of his year without Windows and there are several interesting gaming notes. We have all this and lots more on this Monday, August 04, 2014.
-
His numbers for browsers are even more startling. Even those who use that other OS to visit these sites are using M$’s browser only a few percent, 9% on Wikipedia but only 2.7% on Distrowatch. The world of FLOSS and */Linux has come a long way and the popularity of Free Software amongst the technologically literate is spreading to the mainstream of ordinary users of IT. Two of the greatest lock-ins that M$ developed are fading rapidly.
-
The Age of the Connected Car is dawning. The Linux Foundation is positioning an open source Linux OS to take the front seat in steering carmakers to adopting Automotive Grade Linux, or AGL, as the engine driving all in-car electronics.
Today’s automobile has from 60 to 100 sensors to control everything from climate to airbags and dozens of vehicle components. Carmakers expect that number to double as cars get smarter. The so-called “smartcar” will use these sensors to do much more than give the driver a hands-free option for changing lanes, breaking and parking.
Today’s new cars have options for Internet connectivity and can connect to applications for entertainment, vehicle service and maintenance. These connected cars can use apps on smartphones and tablets to provide driving services such as directions, traffic reports, motel and restaurant locators, and much more. They can do it independently of any hard-wired navigational or entertainment system the carmaker provides.
-
Desktop
-
There’s no denying the power and utility value of the cloud. We all use it and it’s certainly something that most Linux users can appreciate. However, I disagree with the basic premise of the article that Linux “Linux needs…a major win in the desktop arena.” Why? Linux is alive and well, and doing just fine without having tons of desktop market share.
I’m not sure where this obsession with market share comes from, but I think it’s an altogether unhealthy thing. And it’s particularly bad when you consider that mobile devices have been chipping away steadily at desktop usage across all platforms. I’d much rather see Linux offer more mobile device options than trying to go on some quixotic quest to gain desktop market share when most users are moving away from the desktop anyway.
The author uses Chromebooks as an example, and I can understand his affection for them. For what they do they are fine computing devices, and their popularity can’t be questioned at this point (as always see Amazon’s list of bestselling laptops to see just how popular they are right now). But we already have Chromebooks, so why do we need a Linux “cloudbook?”
-
Running on the latest Chrome OS Dev version? Google recently published a few new changes to the Gallery and Files apps.
-
Server
-
Docker sells its platform-as-a-service business to cloudControl to ensure that “dotCloud PaaS customers have a good home with an experienced PaaS provider.”
The popular open-source Docker container virtualization technology was born inside a company originally known as dotCloud. Docker Inc. today announced that it is shedding its legacy and selling the dotCloud business to German platform-as-a-service vendor cloudControl. Financial terms of the deal are not being publicly disclosed.
-
Let me start by saying this is absolutely not a Docker bashing article. I actually love Docker, and I think it is an outstanding piece of software that will have great success. But I have to confess, I’m not sure that it deserves the virtualization moniker that so many in the industry are hanging on it.
-
Docker is more popular in enterprise data centers and clouds now than ice-cream on a hot summer day in a day-care center. So, it comes as no surprise that openSUSE, SUSE’s community Linux distribution, has adopted Docker as well.
-
-
Cumulus® Linux® 2.2 brings greater flexibility, simplified operations and end-to-end resiliency along with a new hardware architecture and new ecosystem solutions
-
Kernel Space
-
-
-
The Linux Foundation has opened submissions for its 2014 Linux Training Scholarship Program to fund classes in topics including embedded Linux and Yocto.
The Linux Training Scholarship Program awards free tuition to Linux Foundation training courses for the most promising Linux developers, IT professionals, and students who lack the ability to attend. Last year, nearly 700 applications were received for the Linux Training Scholarship Program, says the not-for-profit Linux Foundation (LF). The average age of the submitter was said to be 25 years-old.
-
Linus Torvalds has announced the release of Linux kernel 3.16 codenamed ‘Shuffling Zombie Juror’, which brings many notable improvements.
-
The Linux Foundation has announced a host of onsite exciting activities to go along with information-packed keynotes, co-located events, conference sessions and more taking place at LinuxCon and CloudOpen North America August 20-22, 2014 at the Sheraton, Chicago.
-
The modern data center is rapidly evolving, with the advent of cloud computing bringing new technologies, tools and best practices. As enterprises seek to understand and take advantage of emerging areas in virtualization and the cloud such as software-defined networking and storage, microservers and containers, many are seeking third-party consultants and services to ease the transition.
Daynix is a software development and consulting company based in Israel that helps companies navigate this new world of cloud infrastructure and virtualization. Its services range from hypervisors and paravirtualized devices development to cloud infrastructure. The company also works closely with open source communities on cloud-related technologies, which are rooted in Linux.
-
Following a rather quiet week and ‘nothing particularly exciting’ after release of Linux 3.16-rc7, Linus Torvalds has pushed out Linux 3.16 final.
-
You’ll be excited by 3.16 if you’re keen to run Linux on Samsung’s Exynos or other ARM SoCs. Those keen on ARM CPUs as data centre alternatives to x86 will be pleased to note work to help Xen virtual machines suspend and resume. There’s also a boot-from-firmware feature on ARM.
-
The Samsung supported Flash-Friendly File-System (F2FS) will sport some new functionality with the Linux 3.17 kernel release.
-
The work that was ongoing for months to provide DMA-BUF cross-device synchronization and fencing is finally landing with the Linux 3.17 kernel.
The patches by Maarten Lankhorst for DMA-BUF cross-device synchronization were up to eighteen revisions and are now finally in a condition to be merged with Linux 3.17 via the driver core subsystem pull. DMA-BUF has now proper fence and poll support along with other new functionality that affects many different kernel drivers. For Phoronix readers, one of the benefits of DMA-BUF cross-device synchronization is to reduce tearing when sharing buffers between multiple GPU DRM drivers.
-
Over 200,000 lines of code is being removed from the Linux 3.17 kernel in the staging subsystem due to the removal of a bunch of old, unmaintained drivers.
Greg Kroah-Hartman shared that with the staging driver patches for Linux 3.17, there’s over 39,000 new lines of code while over 254,000 lines have been removed. The big code delta comes from 14 different drivers being removed that were “obsolete and no one was willing to work on cleaning them up.”
-
The Radeon DRM driver changes have been published for queuing into drm-next before hitting the mainline Linux 3.17 kernel tree.
Among the exciting work to be found for the AMD Radeon graphics kernel driver in Linux 3.17 include:
- Good Hawaii support for the AMD Radeon R9 290 series. The R9 290/290X should now work with the open-source driver at long last, but besides Linux 3.17 you’ll need newer microcode files and also the latest Gallium3D code. Once 3.17-rc1 has been tagged, I’ll move ahead with my open-source Radeon Hawaii benchmarks on the R9 290.
- Support for a new firmware format to make updates easier to manage.
-
-
The HID (Human Interface Device) pull request was sent in this morning for the Linux 3.17 merge window.
Jiri Kosina’s HID pull request for Linux 3.17 features the following prominent work:
- The Sony HID driver features improved support for the SIXAXIS device support. The SIXAXIS gamepad line was part of the original Sony PlayStation 3.
-
-
Graphics Stack
-
After last week running new Nouveau vs. NVIDIA proprietary Linux graphics benchmarks, here’s the results when putting AMD’s hardware on the test bench and running both their latest open and closed-source drivers. Up today are the results of using the latest Radeon Gallium3D graphics code and Linux kernel against the latest beta of the binary-only Catalyst driver.
Similar to the NVIDIA GeForce tests of last week, on the open-source side was the Linux 3.16 kernel with Mesa 10.3-devel and other updated graphics user-space using the Oibaf PPA on Ubuntu 14.04 LTS x86_64. When benchmarking the proprietary Catalyst 14.6 Beta driver from mid-July, we had to pull back to the Linux 3.14 kernel for kernel compatibility with this binary blob release.
-
Applications
-
Browsers have been a hot topic lately here in the Linux blogosphere, not just because of all the woes plaguing Tor in recent weeks, but also because of the increasingly worried mumbling about Firefox’s future.
-
-
-
As you may know, Telegram is a popular instant messaging service, similar to WhatsApp. While there isn’t any official Linux client, there are three unofficial solutions: Sigram, Telegram Desktop and Unity Webapps Telegram.
-
QEMU, a generic open source emulator and virtualizer that can run OSes and programs made for a different machine, is now at version 2.1.0.
QEMU supports virtualization when executing under the Xen hypervisor or using the KVM kernel module in Linux. The developers have made a huge number of improvements and changes in this release, and it looks like we might see a stable build soon.
-
Instructionals/Technical
-
Games
-
Microïds, the indie publisher specializing in adventure titles, and noted game designer Paul Cuisset today announced that their new adventure game, Subject 13 , has reached its initial Kickstarter goal and PC, Mac, mobile, and Linux versions will be developed. To celebrate this news, Microïds released the first gameplay video to show some of the environments and puzzles players will explore to progress in the scenario.
-
Unvanquished, a free, open source first-person shooter combining real-time strategy elements with a futuristic and sci-fi setting, has just received its 30th Alpha release and the developers have celebrated by implementing some new, exciting features.
-
A new Steam Beta update has been made available by Valve and it looks like the developers are still finding things to fix and features to implement.
-
Desktop Environments/WMs
-
One thing that MATE has in common with both Enlightenment and Awesome is the general peppiness. Everything in MATE is just plain snappy and light on resource usage. And you could say that memory/CPU usage isn’t a huge deal with modern hardware. But, in my testing on this i5 with 8 gigs of RAM, MATE is so much more responsive than GNOME Shell, KDE or Unity that it’s just plain silly.
-
K Desktop Environment/KDE SC/Qt
-
Qt Creator 3.2 rolls in new functionality while this release candidate delivers on the last of the fixes and tacking on some extra features. Among the extras found in Qt Creator 3.2 RC1 include more panes that are searchable, QBS plug-in now supports adding/removing files from projects, and the C++ code mode lhas received additional fixes.
-
Famous digital photo management application for KDE and Linux digiKam 4.2.0, which includes an image editor for photo corrections and manipulation, is now available for download.
-
As usual, we have worked hard to close your reported issues since the previous stable release 4.1.0. A list of the issues closed in digiKam 4.2.0 is available through the KDE Bugtracking System.
-
As part of the core Plasma team I have spent a long time helping in the migration to make everything QtQuick2.0 based, making sure we get the most out of the OpenGL backing.
This weekend I wanted to make some sort of demo which shows the power of this in the form of an interactive wallpaper.
-
I am happy to announce the new luajit2 backend for Cantor, that will be released with KDE 4.14. If you haven’t heard of Cantor yet, it is a KDE application that provides a notebook-like frontend for various programming languages, with a mathematical and scientific focus.
-
I’ve wrote a simple plugin for KTextEdit (Kate, KDevelop, and other programs that uses the KDE text editor component) that provides code completion for Go, by using gocode as backend.
-
Besides these application the VDG is also working with developers (or without) on an image viewer and a video player. Besides that we want to make slight improvements to key areas of Plasma 5 e.g. the system tray. As you can see there’s still much to do, but we’re pleased with the progress made so far.
-
Every backer who pledged 25 euros or more had a chance to vote for their favorite feature — and the now the votes are in and have been tallied up! Here are the twelve features that Dmitry will be working on for Krita 2.9:
-
First, many of us will be taking off this week for Randa, Switzerland. Many sprints are taking place simultaneously, and the most important to me is that we’re writing another book. Book sprints are fun, and lots of work! As well as the team in Randa, a few people will be helping us write and edit from afar, and I’ll be posting a link soon so that you can help out as well.
-
Qt Creator 3.2 RC1, a cross-platform IDE (integrated development environment) tailored to the needs of Qt developers and part of the Qt Project, is now available for download and testing.
-
GNOME Desktop/GTK
-
Sonar GNOME 2014.1, a Linux distribution based on Manjaro and Arch Linux and developed specifically for people with various impairments, has been released and is now available for download.
-
-
One of the many interesting things covered in Jiří’s coverage of this years GUADEC was GNOME Builder — an IDE that will focus purely on GNOME applications, with a goal of making it “Dead Simple”. Jiří’s post about day 4 at GUADEC covers the content of Christian Hergert’s talk about Builder (including him announcing the brave step of quitting his day job to work on it). While there are other IDEs in Fedora (like Adjuta and Eclipse) that can be used for development on the GTK+GNOME stack, none of these are focused purely on development of this type.
-
-
Screenshots
-
Arch Family
-
Arch Linux is one of the best GNU/Linux based distributions out there which give ‘full’, and I mean total, control to its users. There is no company behind it which may have to make compromises with what its users want vs what it needs to be able to monetize from the product; Arch is purely community driven project.
-
Red Hat Family
-
A number of other analysts have also recently weighed in on RHT. Analysts at RBC Capital raised their price target on shares of Red Hat from $64.00 to $70.00 in a research note on Friday. Separately, analysts at Susquehanna upgraded shares of Red Hat from a neutral rating to a positive rating in a research note on Friday. They now have a $70.00 price target on the stock, up previously from $57.00. Finally, analysts at TheStreet upgraded shares of Red Hat to a buy rating in a research note on Wednesday, July 9th. Four analysts have rated the stock with a hold rating and eighteen have assigned a buy rating to the company. The company presently has a consensus rating of Buy and a consensus target price of $63.48.
-
Ancient Greece had its Great Explainers, one of whom was Plato. The open source community has its Great Explainers, one of whom is Michael Tiemann.
Several thousand feet in the air, in a conference room on the 10th floor of Red Hat’s Raleigh, NC headquarters, Tiemann is prognosticating. The place affords the kind of scope he relishes: broad, sweeping, stretched to a horizon that (this morning, anyway) seems bright. As the company’s VP of Open Source Affairs explains what differentiates an open source software company from other firms in a crowded market, he exhibits the idiosyncrasy that has marked his writing for decades: the tendency to pepper his exposition of open source principles with pithy maxims from a diverse range of philosophers, politicians, political economists, and popular writers. It’s a habit borne, he says, of the necessity of finding something that resonates with the many skeptics he’s confronted over the years—because necessity, he quips (quoting Plato, of course), is the mother of all invention.
-
Fedora
-
Fedora.next, the major revamping of Fedora Linux, is shaping up to feature tight integration with container-based virtualization for the cloud, according to a recent discussion among developers of the open source operating system, which forms the basis for Red Hat Enterprise Linux (RHEL).
-
While Fedora 21 will be arriving later than anticipated, on the plus side is that the 64-bit ARM support is coming along well and the (indirect) delay gives developers extra time for polishing up this first Fedora Linux release with great AArch64 support.
-
With the Fedora 21 Alpha freeze looming in the rear view mirror, although the object wasn’t as close as it would appear, I thought it was high time that I gave a brief overview of the state of ARM aarch64 in Fedora. Some might assume the silence means not a lot has been happening but this is extremely far from the truth!
-
On the hardware side of things, Peter also recently blogged about some of the ARM hardware support that the newly released 3.16 Linux kernel will provide, including support for the NVIDIA Jetson TK1, Samsung EXYNOS, Qualcomm MSM 8×60, 8960 and 8974, APM X-GENE, and AMD Seattle. He also reports that the graphics driver support for ARM systems is also improving with nouveau, freedreno and etnaviv all possibly being supported on some specific ARM devices.
-
We previously reported about Final Term, a new terminal emulator for Fedora that features many nifty features including context menus, reflow, smart command completion and 24-bit colour in the terminal. Final Term is not yet in the official Fedora repositories, as it is still under heavy development, and the UI is still slightly buggy. That said, the COPR repo that provides Fedora packages for Final Term was recently updated (and has been periodically since it was created) with the new development versions from upstream. So if you still want to try out this new terminal, jump over to the COPR page, and follow the instructions there.
-
After a rousing introduction by Fedora Project Leader (FPL) Matthew Miller, Flock kicked off with a keynote by journalist Gijs Hillenius. In the keynote, Hillenius discussed free and open source adoption in European public institutions.
The title of the keynote, “Free and Open Source Software in Europe: Policies & Implementations” was slightly misleading – Hillenius only discussed public/governmental adoption of FOSS, and didn’t really discuss corporate adoption or use by individuals. This is not surprising, Hillenius focuses on use of open source for public administrations for the Open Source Observatory and Repository (OSOR). Still, he provided an interesting picture of adoption by public European institutions.
-
Debian Family
-
VolksPC has taken to Indiegogo this week to launch to launch a crowd funding campaign to help take its low cost solid state Linux PC into production.
-
Derivatives
-
Canonical/Ubuntu
-
Toshiba Electronics has introduced two starter kits for early development of web applications using the Toshiba TZ5000 Application Processor Lite (ApP Lite) series.
The RBTZ5000-2MA-A1 and RBTZ5000-6MA-A1 starter kits provide drivers for internet applications using HTML5.
Both kits provide drivers for video playback using Wireless LAN and HDMI output, with the RBTZ5000-2MA-A1 on Ubuntu Linux, and the RBTZ5000-6MA-A1 on an Android 4.4 platform.
-
The Intel Graphics Installer for Linux, a tool that allows users to easily install the latest graphics and video drivers for their Intel graphics hardware, is now at version 1.0.6 and is ready for download.
-
The developers have identified some security issues with the GNU C Library and an update has been pushed into the repositories.
“Stephane Chazelas discovered that the GNU C Library incorrectly handled locale environment variables. An attacker could use this issue to possibly bypass certain restrictions such as the ForceCommand restrictions in,” reads the security notice.
-
India is the fastest growing market for open source operating system Ubuntu, helped by tie-ups with top PC vendors and the increasing adoption of cloud-based applications in the country.
The Linux-based operating system grew 50% year-over-year in India. Canonical, the company behind Ubuntu, has partnered with Dell and HP to bundle the OS with certain models of their laptops offered in India.
-
Flavours and Variants
-
Deepin 2014 is available in 32-bit and 64-bit x86 builds. The download image for the distribution is approximately 1.5 GB in size. Booting from the project’s live media brings up a menu we can navigate with either the keyboard or the mouse pointer. The menu asks us to select our preferred language from a list. Once our language has been selected the system boots to a desktop interface with a starry sky in the background. On the desktop we find an icon for launching the project’s system installer. At the bottom of the screen we find a quick-launch bar filled with icons for commonly accessed applications. There are also buttons for bringing up the distribution’s application menu and settings panel on this launch bar.
-
ExTiX 14.1.2 64-bit, a distribution based on the recently launched operating system from Canonical, Ubuntu 14.04 LTS, has been officially released.
The developer rebased the distribution on the newer Ubuntu 14.04 LTS (Trusty Tahr) a while ago and this new build is mostly about updates and fixes. Users are provided with a GNOME 3.10 desktop and GNOME Classic 3.10. For users who want a lighter system, Razor-qt 0.5.2 is also available in ExTiX Light.
-
-
NI unveiled a rugged 4-slot “CompactDAQ” system for data acquisition and control (DAQ), with real-time Linux, an Atom E3825, and optional sensor modules.
Usually, when you have a choice of Windows or Linux, the Windows version costs more. In the case of the National Instruments (NI) CompactDAQ cDAQ-9134 Controller, however, it’s the Linux version that costs $500 more, at $4,999. That’s because it’s a special real-time Linux variant called NI Linux Real-Time, also available on NI’s CompactRIO cRIO-9068 controller and sbRIO-9651 computer-on-module, both of which are based on the Xilinx Zynq-7020 system-on-chip. The cDAQ-9134 instead runs on a dual-core, 1.33GHz Intel Atom E3825 SoC.
-
Our brand new sister magazine RasPi is here! Issue #1 is out today, available to download through Apple’s App Store. It’s jam-packed full of amazing content and only costs 69p/99¢.
Each month we’ll be walking you through a big Pi project, showing off some of the best work in the community, sharing your tweets, letters and emails, and of course giving you a whole bunch of tutorials to teach you how to get the most from your Raspberry Pi and make amazing things with it.
-
Phones
-
Ballnux
-
Until now, as with most new versions of software, new code for a new version of OpenSUSE had been bottled up for group testing at a beta or milestone stage.
In the OpenSUSE world, this milestone stage had taken place in something called the “Factory”.
-
Android
-
August is here and just like clockwork CyanogenMod have released a new version of CM11. For those of you unaware CyanogenMod recently changed the way in which they list downloads. Until recently CM was always released as either stable, snapshot (mostly stable) or nightlies (experimental and buggy) versions. However CM11 over the last few months have used an ‘M’ release system which instead simply refers to ‘milestone’. The M releases are technically snapshots but are considerably more stable than nightlies and are considered to be suitable for main or daily usage.
-
Ugoos is prepping an Android 4.4 “S85″ media player dongle with a quad-core Amlogic S805 Cortex-A5 SoC clocked to 1.5GHz, and a quad-core Mali-450 GPU.
Ugoos has spun a variety of Android media player boxes and dongles over the last few years, including a UT3 box, featuring Rockchip’s quad-core, Cortex-A17 RK3288 system-on-chip with a 16-core Mali-T760 GPU, now selling for $130. Before that was the Ugoos UT2, with the quad-core, Cortex-A9 RK3188 SoC clocked to 1.6GHz, with a Mali-400 GPU. Last year, the Chinese company introduced a dongle-style UM2 stick, running on the same RK3188 and Mali-400 GPU.
-
Google’s dominance of the smartphone market has reached new heights, with its Android operating system now accounting for a record 84.6 percent share of global smartphone shipments, according to research by Strategy Analytics.
The growth in Android phones during the second quarter of this year came at the expense of BlackBerry, Apple iOS and Microsoft’s Windows Phone, the research firm said Wednesday.
-
Another month, another release to mark the occasion – today we fire off the builds for CM11 M9. The M9 build incorporates changes from June 31st through its branch date on Sunday July 27th.
-
The authors of Duplicati, an open-source file backup client, discuss the impetus for the creation of their project, keeping data secure in the cloud, and backup integrity with incremental data storage.
-
The report noted that GSA is already using the Github open source community alongside the National Geospatial-Intelligence Agency, while the U.S. Geological Service is exploring the community to facilitate software development crowdsourcing.
-
Sweetch, which lets users secure a parking space for a flat fee of $5 and sell one for $4, was one of several apps mentioned by name in the cease and desist letter from City Attorney Dennis Herrera to fellow parking app MonkeyParking, TechCrunch reports.
-
Image being able to move an object in an image maintaining its perspective as if you are physically holding the object and moving it around? Let me give the example of a chair in a picture. How would you feel if you are able to turn it around or “even upside down in the photo, displaying sides of the chair that would have been hidden from the camera, yet appearing to be realistic”?
-
Zimbra’s Olivier Thierry talks about the three C’s that open source firms must support, the need to be market driven in tech, and how his firm’s solutions address security and data privacy issues.
-
Collaboration is a core component of modern business, and over the years, collaborative efforts have resulted in some of the world’s most groundbreaking innovations, in the areas of technology, medicine and engineering. The opportunities are seemingly endless when people unite and work together, whether within a single organization or across many.
But what if this collaborative ethos is extended to include practically every human being on earth? Are there any limitations on what can be accomplished?
-
SaaS/Big Data
-
MapR’s Big Data platform, based on open source Apache Hadoop, gained the endorsement of Amazon Web Services (AWS), which has included the company’s software as the first Hadoop distribution in the new AWS Partner Network (APN) Competency Program.
-
ownCloud is one of the most important free software project considering our move to the ‘cloud’ is inevitable. Most of us use more than one computing devices (I have 8) and we want to be able to access some of our data from any device we want and thus the need of cloud based syncing and storing solutions. However, the moment you use 3rd party cloud services such as Dropbox, iCloud, Drive or OneDrive you lost control and ‘ownership’ of your data. At the same time you expose your otherwise private data to these companies and law-enforcement authorities.
-
Sure you could join everyone else and put your data on the Amazon Web Services (AWS) public cloud, or you could use the latest ownCloud 7 to run your own private cloud.
-
-
OpenStack recently celebrated its fourth birthday and it seems as we pass this milestone, it’s a healthy, vibrant and growing project. It has been embraced by players big and small including such industry luminaries as IBM, Microsoft, HP, Red Hat, SAP and many others. It’s all good for OpenStack.
-
Oracle/Java/LibreOffice
-
The developers from The Document Foundation have released a new stable build in the 4.2.x version of LibreOffice, just a few days after the main branch of the suite, 4.3, made its grand appearance.
“The Document Foundation announces LibreOffice 4.2.6 ‘Still,’ the seventh and last minor release of the most solid version of the software, ready for enterprise deployments and conservative users. LibreOffice 4.2.6 arrives just one week after the successful launch of LibreOffice 4.3 ‘Fresh,’ the most feature rich version of the office suite,” reads the official announcement.
-
-
Just before summer began, Oracle unveiled the beta version of Solaris 11.2, which is only the second point release of Solaris since version 11 of the platform appeared in 2011. The really notable thing about the beta was that Oracle began positioning Solaris as “a modern cloud platform that melds efficient virtualization, application-driven software-defined networking (SDN) technology and a full OpenStack distribution.”
-
Education
-
When Opensource.com said they wanted to do a series of articles on how having an open source job has changed us, this story came to mind. Can you think of any other industry that would do this kind of thing for a “competing” company? I can’t! But then again BibLibre and ByWater aren’t competitors, we see ourselves as partners. Everyone who works on or with Koha is a member of the worldwide community and as such works together toward a common goal: making Koha awesome.
-
BSD
-
At the end of September, OpenBSD distribution will move to a new distributor. As a result the old stock (CDs, Tshirts and posters) will become unavailable.
-
Although the NUC is a tiny computer, it’s packed with power. The model I purchased has a 1.3GHz i5 with four cores. I added 16GB’s of RAM (the maximum) and a 250GB mSATA SSD. The NUC comes standard with gigabit Ethernet and four USB 3.0 ports. There is also a mini PCI Express slot for adding wifi, if wanted. Since the NUC was going to be living on my desk, I decided against the wifi for now. The NUC has integrated Intel graphics (Intel® HD Graphics 5000) which as an OpenBSD user is exactly what I wanted. It’s also capable of driving a high resolution display, and since I had recently acquired one of the beautiful Monoprice 27″ IPS 2560 x 1440 displays from Massdrop* it was a perfect fit.
-
FSF/FSFE/GNU/SFLC
-
-
With the launch of the Libreboot project, users now have an easy-to-install, 100% free software replacement for proprietary BIOS/boot programs. This project is important; currently, many computer-makers notoriously deny free software developers the information they need to develop free replacements for the proprietary software they ship with their products. In some cases, manufacturers do not even share enough information for it to be possible to install a free operating system.
-
I started the development of version 0.4.0 of FisicaLab. And what better to start with a new icon. I’m not a graphical designer, so I wanted keep this simple. To start I used one of the icons at module of dynamics of circular motion, the icon of final system. The three particles and the lines (I think these are called “kinetic lines” in comics, but I’m not sure) represent a system in movement. The “f” is not only for FisicaLab but also for “final state of the system”.
-
The original author of Net::Gnats has transferred maintainer status to me since it is planned that the next version of Gnatsweb will be leveraging this module.
-
Project Releases
-
At the request of the maintainer of the recent added RcppMLPACK package, it adds the Boost.Heap library. Boost.Heap implements priority queues which extend beyond the corresponding (and somewhat simpler) class in the STL. Key features of the Boost.Heap priority queues are mutability, iterators, ability to merge, stable sort, and comparison.
-
Licensing
-
Micah-Shalom Kesselman recently started working at the FSF as one of this summer’s licensing interns. In this post, he writes about his interest in free software and what his goals are for his internship.
-
Openness/Sharing
-
Ross Mounce is a postdoctoral researcher at the University of Bath studying the use of fossils in phylogeny and phyloinformatics, completing his PhD at the University of Bath last year. Ross was one of the first Panton Fellows and is an active member of the Open Knowledge Foundation, particularly the Open Science Working Group. He is an advocate for open science, and he is actively working on content mining academic publications to reuse scientific research in meta-analyses to gain higher level insights in evolutionary patterns.
-
-
Open Hardware
-
Pardon the noise. We’ve been banging around for a few months in our workshop, toiling away at our latest creation: What is open hardware?, a new resource page. And it’s finally finished!
-
Programming
-
Parse today released the Parse PHP SDK, which you can download yourself from GitHub. The Facebook-owned company says the release is its first SDK for a server-side language as well as the first to be “truly open-source.”
-
Security
-
-
-
So today we will show, how you can manage many yubikeys for many notebooks using privacyIDEA. privacyIDEA is an authentication system for two factor authentication – usually with OTP devices. In a recent version privacyIDEA started to not only answer authentication request, but it was also enhanced to be able to define client machines and add information, which authentication device could be used for an application on a client machine.
-
-
-
-
Defence/Police/Secrecy/Aggression
-
The Army will lay off about 500 majors as part of its ongoing downsizing effort, the service has announced.
The military branch used involuntary separation boards to determine to determine where the number of soldiers exceeded future force requirements. The Army announced earlier this year it planned to select from a pool of 19,000 captains and majors to reduce the size of its force in the post-war era. The service laid off 1,100 captains earlier this summer.
-
If the GOP position sounds contradictory, that’s because it’s less about the Constitution than cleavages within the party. There are real questions about Obama’s abuses of power — say, the spying on Americans by the National Security Agency or the use of drones to kill U.S. citizens overseas — but the opposition party has left those largely untouched. The planned lawsuit was a bone thrown to conservatives to quiet their impeachment talk. The legislation restricting Obama’s executive authority on immigration was a similar effort to buy off conservatives who had been encouraged to rebel by Sen. Ted Cruz, R-Texas..
-
The decision by Western countries, especially the United States, to make Yemen their main military base lead to al-Qaeda getting stronger in the region, a representative of Yemen’s National Dialogue Committee (NDC) said in an interview with Rossiya Segodnya news agency.
-
From 2004 to July, 2014, between 2,340 and 3,790 people have been killed by U.S. RC (Remote-Controlled) aircrafts, stated a study from the Bureau of Investigative Journalism released here today.
As of open sources, the institution estimated that more than a third of those killed were civilians and about 200 children, while at least 1,100,000 citizens have been seriously wounded.
-
Finance
-
New York’s Department of Financial Services has presented draft regulations for bitcoin trade that are an absolute heap of bullshit, and that’s even before going into what the proposal actually says. The propsed regulations require a so-called “BitLicense” in order to trade in bitcoin with residents of New York and with everybody else in the world. The problem is, that’s an absolute joke from a legal standpoint, completely ignoring the very concept of a jurisdiction.
-
PR/AstroTurf/Lobbying
-
Rupert Murdoch’s 21st Century Fox announced today that it had withdrawn its bid to acquire the Time Warner entertainment conglomerate.
In a statement, Murdoch said, “Time Warner management and its Board refused to engage with us to explore an offer which was highly compelling. Additionally, the reaction in our share price since our proposal was made undervalues our stock and makes the transaction unattractive to Fox shareholders.”
-
-
Privacy
-
The temporary asylum of the US whistle-blower Edward Snowden, who has been hailed as a hero by a majority or ‘well-informed’, expired yesterday. Russia has not yet confirmed the extension of his asylum, as the country is preparing for a war with Ukrain.
-
Former Rep. Ron Paul has taken his push for clemency for Edward Snowden to a new level, announcing he’s collected more than 37,000 signatures in the past five months — about a third of what he says he needs to get a White House response.
-
-
With the recent news that Germany has expelled our CIA director in Berlin after the CIA paid two Germans to spy on two German government employees, we can see very clearly that our American intelligence agencies are out of control.
-
-
If you believe in getting a decent outcome, then you should adjust your methods of achieving it to those that are most likely to find success.
-
-
-
-
Leaked documents published by ‘The Intercept’ reveal continued cooperation between the NSA and Israeli intelligence agencies.
-
“In the CIA people view liaison relationships as a pain in the ass but necessary,” says Valerie Plame, the CIA undercover agent whose identity was infamously disclosed by aides to President George W Bush soon after the 2003 US invasion of Iraq. Liaison relationships are the CIA’s term for cooperation with foreign intelligence agencies, and, given that not even the world’s mightiest spy outfit can go anywhere it likes, the CIA maintains plenty of such liaisons.
-
Sen. Dianne Feinstein (D-CA), head of the Senate Select Committee on Intelligence, says that John Brennan, the director of the CIA who has finally admitted that he lied when he angrily and repeatedly insisted that the agency did not spy on staff members of the Senate committee charged with oversight US intelligence agencies, “has a lot of work to do,” before she can forgive him for lying to and spying on her committee.
-
The Coalition government led by Prime Minister Tony Abbott today announced controversial legislation mandating data retention for telecommunications companies, to be put to the parliament before the end of the year, while simultaneously abandoning anti-discrimination changes.
-
A report by two organizations committed to the protection of civil liberties is raising new and valid concerns about how government surveillance programs have created an impediment to free speech and freedom of the press. The report gives additional weight to efforts in Congress to end the National Security Agency’s indiscriminate gathering of telephone records.
-
Many examples of extraterritoriality grow out of America’s archipelago of military bases around the world, where Status of Forces Agreements (SOFA) allow service members exemption from local laws, even when they commit crimes against host country people. The U.S. also stations Customs and Border Patrol agents in other nations, denying boarding on U.S.-bound flights from Canada, for example, to Canadian citizens otherwise still standing in their own country. Imagine the outcry in America if the Chinese were to establish military bases in Florida exempt from U.S. law, or if the Russians choose which Americans could fly out of Kansas City Airport. Never mind drone strikes, bombings, deployment of Special Forces, invasions and CIA-sponsored coups.
The snowballing NSA revelations have already severely damaged U.S. credibility and relationships around the world; nations remain shocked at the impunity with which America dug into their private lives. NSA spying has also cost American tech firms $180 billion in lost revenues, as “We’re not an American company” becomes a sales point.
-
-
-
-
GCHQ accrediting some university degreesThe NSA’s British counterpart, GCHQ, is now accrediting certain university degrees from some of the top colleges in the United Kingdom, including Oxford. The accreditations are provided with some online security degrees, and they are essentially the GCHQ’s stamp of approval which could help students find jobs at the government agency once they graduate.
-
Judge Andrew Napolitano spoke on Fox Business about the role that Google Inc (NASDAQ:GOOGL) played in the arrest of a Florida sex offender. He talked about the lengths that the world’s biggest Internet search engine can go to protect itself from indictment as a conspirator in unlawful activities.
-
German newspapers recently reported that the NSA targets people who research privacy and anonymity tools online—for instance by searching for information about Tor and Tails—for deeper surveillance. But today, researching something online is the near equivalent to thinking out loud. By ramping up surveillance on people simply for reading about security, freedom of expression easily collapses into self-censorship; speech is chilled; people may become afraid to research and learn.
-
-
In fact, lots of them are spending their summer breaks grappling with student data. What to gather. How to use it. And how to protect it.
-
There was broad convergence of views and interests between the US and India when John Kerry, accompanied by Commerce Secretary Penny Pritzker and other senior American officials, visited India last week, despite India’s decision not to ratify the World Trade Organization’s (WTO) Trade Facilitation Agreement (TFA).
The TFA, which was agreed upon by all WTO member states in Bali last year, had to be ratified by all signatories by July 31 to come into force. The deal was designed to reduce trade barriers by lowering import tariffs and standardizing customs, and was expected to boost trade and add up to an estimated 1 trillion USD to the global economy.
The new Indian government, led by Modi, made a U-turn, vetoing the trade deal over disagreements on New Delhi’s food subsidies. The failure to reach an accord overshadowed Kerry’s three-day hop-over to New Delhi for an annual Strategic Dialogue meeting between the two countries.
-
National Security Agency whistleblower Thomas Drake says Australia’s looming national security reforms makes him ‘shudder’, labelling them ambiguous and a plot to stamp out legitimate public-interest whistleblowing.
-
Apple’s been hit with a class action suit [PDF] in the US for using the location service function on its iPhones to track customers without notice to, or consent from, customers when it comes to their whereabouts being tracked, recorded, sent to Apple, and potentially provided to third parties.
A Californian woman, Chen Ma, filed the suit on behalf of Apple’s 100-million-plus iPhone users in the US District Court for the Northern District of California.
She accuses the company of violating iPhone users’ privacy by not only being able to pinpoint their locations but also to “record the duration that users stay at any given geographical point and periodically transmit” the data to Apple’s database.
-
-
When twenty-six year old Austrain law student Max Schrems filed a lawsuit against Facebook claiming damages because it allowed the NSA to spy on him, as in the average user, he helped to open up a potential world of hurt for the company.
Because, now, there are over 11,000 people joining the class action lawsuit against Facebook after the first weekend of the campaign “Europe vs Facebook.” People are joining from Germany, the Netherlands, Finland and the UK. The objective? €500 or the equivalent of £398 at current exchange rates.
“We want to show to the US industry that they have to respect [European] fundamental rights if they want to do business in Europe,” Schrems said in an interview. “We love the technology, but we want to be able to use things without permanent worry for our privacy. Right now you have two options: live like in the stone age, or take action. We decided for the second.”
-
Civil Rights
-
In the dreadful nationalistic war between rival Imperial powers, the Belgian Empire was probably the most evil of all. To commend its resistance is ridiculous. Joseph Conrad’s great “Heart of Darkness” and “Congo Diary”, and the formal revelation by British Consul Roger Casement of the dreadful enslavement and abuse of the Congo population to provide vast profits to the Belgian crown, provide lasting testimony to the malignity of the Belgian Empire.
-
The same consideration rules out other countries which have the Queen as Head of State. Otherwise New Zealand might have been a good choice. A similar size to Scotland, a thriving democracy and a population very heavily of Scottish descent.
-
O’Reilly portrays himself as the moral and intellectual authority on how to solve the problems he says plague black communities and black culture, decrying “race hustlers” and prescribing harmful “solutions” to issues like the mass incarceration of black men.
-
After reading the recent story about a ‘correctional officer’ intimidating a network news reporter for accidentally filming an empty prison at Wilton, NY, I googled ‘empty prison’.
-
The stark admission by the CIA’s inspector general that the agency had broken into a classified computer network used by its overseers at the Senate Intelligence Committee violates the core principle of separation of powers of governmental branches enshrined in the U.S. Constitution. Along with the CIA’s illegal rendition, detention, and torture of suspected terrorists and the NSA’s secret monitoring of Americans’ phone traffic, it shows that U.S. spy agencies are in danger of going rogue and need to be severely disciplined. Such intelligence organizations are supposed to defend the republic and not undermine it.
-
There are still plenty of loopholes in Mr. Leahy’s bill, and it’s not hard to see where they came from. “In developing this legislation,” says Mr. Leahy, “I have consulted closely with the Office of the Director of National Intelligence, the NSA, the FBI, and the Department of Justice — and every single word of this bill was vetted with those agencies.” That’s hardly reassuring.
-
If you’ve managed to get over your own NSA-induced, Snowdenian fear of typing, here’s another important privacy question: Do you trust that bag of potato chips you’re holding? The word out of MIT is that you probably shouldn’t. Nearby potted plants should also be treated with suspicion. What makes these everyday items a threat to your (conversational) personal data? It’s just that MIT announced on Monday that its researchers, along Microsoft and Adobe, have developed an algorithm that can reconstruct sound simply by analyzing video of the vibrations of objects around you.
-
Several African-American Secret Service agents who claim the agency denied them promotions because of their race can sue the government as a group, according to the latest court ruling in a 14-year-old lawsuit.
-
A new version of a computer-based cyber-security training course from the Pentagon still classifies disillusionment with U.S. foreign policy as a “threat indicator” that a federal employee might be a spy.
That training, available online and still being used as recently as last week, has been administered to millions of military and civilian employees throughout the federal government. Little seems to have changed since HuffPost reported on an earlier version of the same training course last year — even though a spokesman said then that the training was being “updated.”
-
Here’s what exercising your First Amendment rights gets you in certain parts of the US. Photographer Jeff Gray has been filming cops and photographing public structures, as well as documenting the reactions of law enforcement to his activities.
-
A certain percentage of police officers are “bad cops,” just like a certain percentage of the human race is composed of thuggish sociopaths. That’s an unfortunate fact of life. Whether the percentage of bad cops is greater than the percentage in non-law enforcement positions is still open for discussion, although there’s a lot about a cop’s job that would attract thuggish sociopaths: power, better weapons, nearly nonexistent accountability, etc.
-
Ross Ulbricht claimed he couldn’t have laundered money, as Bitcoin isn’t money.
Alleged Silk Road founder Ross Ulbricht’s defense attorney Joshua Dratel has asked the court to suppress nearly all of the evidence collected against his client. Should the motion be successful, it would likely put a substantial damper on the government’s efforts to prosecute Ulbricht.
-
Internet/Net Neutrality
-
The federal government remains locked in a battle with two telephone companies, demanding they refund what the government argues is $3.5 million in wrongfully charged late-payment fees.
-
-
Intellectual Monopolies
-
Copyrights
-
In an emergency motion (PDF) filed Friday, TV-over-Internet startup Aereo submitted its most detailed legal arguments yet as to why it should be allowed to be a cable company. It also asked, based on those arguments, to resume operations until a final decision was reached.
-
A series of ads created by a New Zealand-based ISP has been rejected by Sky TV on copyright grounds. The ban on the ads, which contain references to a VPN-like service providing access to geo-blocked content such as Netflix, has been decried as “unjustified and petty” by ISP Slingshot.
Permalink
Send this to a friend
Posted in Apple at 10:50 am by Dr. Roy Schestowitz
Summary: Net Applications (Apple- and Microsoft-funded) makes a misinformation comeback, Apple retreats from some Samsung litigation battles, and Microsoft dives deep into it
A couple of days ago we noticed that an editor had a headline changed from “Android users MORE ACTIVE than iOS fanbois for the first time” to something else. This report about numbers from “Net Marketshare” (part of Net Applications) coincides with contradictory reports like this from the Gates-friendly press (among others), titled “iOS Users Seven Times More Active Than Android Users, Suggests Net Applications”. These cite Net Applications, which is partly funded by Apple. There are some contradictions and reports about this are generally confusing. It’s not clear what they are measuring and based on past years, Net Applications is mostly a propaganda agent. This Apple-affiliated firm is saying something which makes Apple sounds more favourable than Android (common trick like citing buyer spendings, something about security — not absolute sales — and so on) because Android has the lion’s share of the market and it’s impossible to deny it’s unstoppable growth. Perhaps Apple paid Net Applications some more money to produce propaganda. Their pie charts are widely disgraced and recognised as inaccurate, misleading, and biased by design (improper data).
Anyway, Android is perpetually being smeared by both Apple and Microsoft. Apple had sued Samsung using patents and Samsung recently hit back at Apple using a case against software patents. Apple now retreats. “In a totally unexpected move,” writes SJVN, “Apple and Samsung, who’ve fought patent wars around the globe, agreed to drop all their cases outside of the US.”
Microsoft too had just sued Samsung. This was covered by the Microsoft-friendly press first (including BBC, as we noted the other day) and coverage has thus far been shallow. They just can’t call “racketeering” what clearly is racketeering. It oughtn’t be too shocking, except if one considers how close Microsoft and Samsung have been over the year (including UEFI restricted boot collaborations). “Apparently Secure Boot is blowing up on Windows too,” tells us Ryan in the IRC channels. “People upgrading their graphics card report their computer won’t boot up again until they disable secure boot, restart the system, install the signed drivers for the new card, and then they can turn secure boot back on.”
Maybe they should just stick to Free software, abandoning both Apple and Microsoft. The future is free/libre and no amount of misinformation can successfully deny it anymore. █
Permalink
Send this to a friend
Posted in Microsoft, Security, Windows at 10:29 am by Dr. Roy Schestowitz
Tick the box to ban
Summary: Symantec, a Windows insecurity firm, is miserably trying to divert attention away from reports about distrust that led to a ban in China
According to many reports this week [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16], China does not trust some US- and Russia-based companies to take care of ‘security’ in China. It’s about time.
Reports focus on two firms, but another one is seemingly affected (Symantec). While Kaspersky (which we occasionally mention here) does not deny the claims, Symantec does strike back and “Says its Products are Still Allowed in China”. This is a cleverly-worded denial. Some products are definitely banned, but the “Security software developer Symantec Corporation denied its software has been banned in China.” Symantec merely says or emphasises that not everything is banned.
Just to be more specific: “It is important to note that this list is only for certain types of procurement and Symantec products are not banned by the Chinese government.”
Kaspersky is hyping up security threats at the moment and Symantec is trying hard to dodge the negative publicity because trust is fundamental to their sales. Symantec, which has strong Microsoft connections and disdain for FOSS, should not be trusted if China does not trust Microsoft (we already know how China feels about the ‘new’ Microsoft). To quote an IDG report:
Symantec and Kaspersky Lab have become the latest tech firms to be kicked off the Chinese Government’s approved list, according to an unconfirmed report in the country’s media.
The People’s Daily newspaper broke the news at the weekend in a report that claimed that local supplies including Qihoo 360, Venustech, CAJinchen, Beijing Jiangmin and Rising would from now on be the preferred software for antivirus duties.
The news seems to have surprised both firms, which have until now have been approved suppliers for desktop security.
Symantec has been overlooking government back doors such as the ones Microsoft puts in place and lets the US government know about. This is an older debate which made a comeback amid NSA leaks (other antivirus makers seemingly exempt government malware and such, e.g. Stuxnet). Here is Wall Street’s press coverage:
That’s a lesson that Microsoft and Symantec are learning right now. An antivirus company from Silicon Valley, Symantec competes in China against local favorites like Beijing-based Qihoo 360 Technology. According to reports by Bloomberg News and the Chinese media, China has instructed government departments to stop buying antivirus software by Symantec and its Moscow-based rival, Kaspersky Lab. Symantec software has backdoors that could allow outside access, according to an order from the Public Security Ministry. Not coincidentally, Qihoo’s New York-traded shares rose 2.7 percent yesterday, following reports of the move against Symantec and Kapersky.
Well, good for them. After being cracked by the NSA they need to secure their systems by better identifying possible moles (in the software sense).
Dan Goodin, who typically slams FOSS over security issues (less severe than in proprietary software), finally writes about Microsoft’s best known back doors that it tells the NSA about (Goodin does not mention the NSA connection):
There’s a trivial way for drive-by exploit developers to bypass the security sandbox in almost all versions of Internet Explorer, and Microsoft says it has no immediate plans to fix it, according to researchers from Hewlett-Packard.
The exploit technique, laid out in a blog post published Thursday, significantly lowers the bar for attacks that surreptitiously install malware on end-user computers. Sandboxes like those included in IE and Google Chrome effectively require attackers to devise two exploits, one that pierces the sandbox and the other that targets a flaw in some other part of the browser. Having a reliable way to clear the first hurdle drastically lessens the burden of developing sophisticated attacks.
What can Symantec do to stop this other than suggest abandoning Windows (its bread and butter)? Symantec must have known about back doors in the form of IE vulnerabilities, but did it properly protect China from it? No, Symantec makes money from the prevalence of Windows and the company’s management is deeply connected to Microsoft’s. █
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »