01.02.15
Posted in GNU/Linux, Microsoft, Vista 8, Windows at 1:04 pm by Dr. Roy Schestowitz
Windows is yesterday’s problem
Summary: Even the most Microsoft-friendly Web surveys (where Windows-oriented sites are grossly overrepresented) show a sharp decline in Windows usage and gains are attributed to Chromebooks
IN THIS GNU- and Linux-dominated world (except in desktops/laptops) we need not write so often about the demise of Windows. In fact, we have not been doing that for months. Windows is rotting on its own while platforms like RHEL and Android thrive.
“Windows is rotting on its own while platforms like RHEL and Android thrive.”Watch how Microsoft spins the latest figures that demonstrate the collapse of Windows, even on desktops/laptops. As one blogger put it, “I woke up today, on the first day of January, and read Mechatotoro’s post about the jaw-dropping December 2014 market share statistics for Windows 8*.
“While the optimistic Winbeta site claims the market share loss is due to the traction gained by Windows 10, I doubt it.”
That is complete nonsense. Vista 8 was probably the worst-performing version of Windows since the 1980s (adoption rates worse than Vista) and the next vaporuware (Vista 10) started 20 months ago and is still not released. To say that Windows usage is declining because of some experimental build is simply delusional, but then again, these are Microsoft boosters we’re talking about. Their loyalty to Microsoft transcends logic and facts. The boosters cannot shoot the messenger either because Net Applications is closely connected to Microsoft. Therein lies the great irony.
One blogger has complained the the press (e.g. the Wintel-friendly corporate media) is not covering this major finding:
December Was a Disaster for Windows 8.x…Why Aren’t We Hearing about It?
[...]
Windows 8 and 8.1 combined seemed to have lost a whooping 7.07% market share! They went down from 18.65% in November to 11.58% in December. That is something! Why aren’t we hearing about this in all the (pro-Windows) tech sites??
For those who wonder what has been gaining at Windows’ expense (other than mobile devices where Android reigns supreme), “Data reveals Chrome OS might have been a roaring success in December”. To quote this report: “Stats published earlier today by analytics company NetApplications suggests that Google’s operating system, Chrome OS, might have a bumper month thanks possibly to Christmas sales.
“Data compiled for the month of December 2014 shows that Windows 7, Windows 8 and Windows 8.1 suffered significant dips while Windows XP and OSes classified as “Other” have increased significantly.”
We too bought a Chromebook, but we installed GNU/Linux on it. Chromebooks are significantly cheaper than ‘fat’ laptops with Windows, so no wonder Microsoft is so nervous and afraid of Google. █
Permalink
Send this to a friend
Posted in Microsoft at 12:38 pm by Dr. Roy Schestowitz
Summary: More documents leaked by Edward Snowden serve to validate claims that Skype is about as bad as one can get when it comes to private communication
GIVEN Microsoft’s very special relationship with the the NSA we were never shocked to learn about spying on Skype users (both audio and video, in real time even). Days ago more information was made available. One journalist said that the new documents show spy agencies could grab all Skype traffic. To quote: “A National Security Agency document published this week by the German news magazine Der Spiegel from the trove provided by former NSA contractor Edward Snowden shows that the agency had full access to voice, video, text messaging, and file sharing from targeted individuals over Microsoft’s Skype service. The access, mandated by a Foreign Intelligence Surveillance Court warrant, was part of the NSA’s PRISM program and allowed “sustained Skype collection” in real time from specific users identified by their Skype user names.”
“Thanks to Snowden they now have it confirmed as truth with original documents to prove/validate it.”Here is another take which quotes: “The nature of the Skype data collection was spelled out in an NSA document dated August 2012 entitled “User’s Guide for PRISM Skype Collection.” The document details how to “task” the capture of voice communications from Skype by NSA’s NUCLEON system, which allows for text searches against captured voice communications. It also discusses how to find text chat and other data sent between clients in NSA’s PINWALE “digital network intelligence” database.
“The full capture of voice traffic began in February of 2011 for “Skype in” and “Skype out” calls—calls between a Skype user and a land line or cellphone through a gateway to the public switched telephone network (PSTN), captured through warranted taps into Microsoft’s gateways. But in July of 2011, the NSA added the capability of capturing peer-to-peer Skype communications—meaning that the NSA gained the ability to capture peer-to-peer traffic and decrypt it using keys provided by Microsoft through the PRISM warrant request.”
The authors of the original article previously linked to our Wiki page about Skype and also some articles we wrote about Skype. We wrote about this well before Microsoft bought Skype (proprietary software) and years before the NSA leaks. Thanks to Snowden they now have it confirmed as truth with original documents to prove/validate it. █
Permalink
Send this to a friend
Posted in America, Law, Patents at 12:22 pm by Dr. Roy Schestowitz
Summary: Signs that the US is turning against software patents, not just against patent trolls which so-called patent reforms strive to tackle
THE UNITED STATES is improving when it comes to patents sanity because scope is being narrowed, especially when it comes to software patents. We wrote over a dozen articles about it, but the media is still full with so-called ‘reports’ (shameless self-promotion and self service) from patent lawyers, who would deliberately have the public believe that not much has changed. Always remember that patents (as per their mission statement) are supposed to be about publication, innovation, and public interests, not about securing the newly-created jobs of parasitic lawyers and their monopolistic clients.
“Always remember that patents (as per their mission statement) are supposed to be about publication, innovation, and public interests, not about securing the newly-created jobs of parasitic lawyers and their monopolistic clients.”The EFF recently made this good move against software patents, specifically naming software patents as the issue (not “trolls” or “stupid” patents as the EFF habitually addresses the issue).
To quote the EFF: “There are many reasons software patents cause so much trouble. The Patent Office does not do a good job reviewing software patent applications to see if they are claiming something new. And these patents often describe the purported invention with highly vague and ambiguous language. Software patents also tend to claim every way to solve a problem, rather than the particular solution developed by the applicant. This is known as functional claiming. While it may seem like an arcane legal dispute, functional claiming is a key feature of overbroad software patents.”
The EFF recently improved its activism in this area, having wasted nearly a decade tackling one patent at a time (so-called ‘busting’), talking about patent trolls, or alluding to patents that are “stupid” rather than ones whose class/type/scope makes them illegitimate. Alas, the “Stupid Patent of the Month” series from the EFF continues. It usually names software patents, but does not refer to them as such. Here is the example from a few days ago:
In the Spirit of the Holidays: It’s Not Too Late for Uber to Avoid Stupid Patent of the Month
[...]
Because Uber did just that, Uber is being forewarned of its risk of receiving the Stupid Patent of the Month award. Specifically, Uber has applied for a patent on a form of dynamic pricing, a practice that (even if it didn’t exist before the study of economics) has been heavily in use by various industries, including most famously by airlines, for over 20 years.
Stallman recently published a good list of reasons not to use Uber (the car ride brokering company), but that is a subject for another day. The EFF has provided yet another reason to avoid Uber.
Make no mistake however. The EFF’s lawyers are outnumbered by patents-loving lawyers who flood the media with pro-software patents articles (we are reviewing this on a daily basis). The only exception we have found in the past fortnight was Timothy B. Lee, who published the article titled “Software patents are a disaster. The courts finally did something about it in 2014.” Here are some opening paragraphs:
For two decades, people in Silicon Valley have been complaining about software patents. People would get patents on broad concepts like checking email wirelessly or scanning documents to an email account, and then sue anyone who happened to stumble across the same concept. Thanks to this kind of frivolous litigation, patents in the software industry may actually be discouraging innovation instead of encouraging it.
But until recently, complaints about excessive patenting of software mostly fell on deaf ears. The patent office issued tens of thousands of new software patents every year, and the courts upheld most of them. Congress showed little interest in addressing the issue.
The fiercest pro-software patents sites refuse to talk about the demise of software patents or even call patent trolls “trolls” (they use other words). What they do care about is the patent reform in the US; yes, even patent lawyers’ sites speak about it and some worry about the (rather likely) imminent appointment of Michelle Lee, who is one of them (a lawyer, albeit with a scientific background as a computer scientist). Louis J. Foreman says: “I’m concerned independent inventors, small businesses and the property protections we all depend on are about to become collateral damage as Congress once again tries to crack down on “patent trolls.” The popular definition of a patent troll as used in the congressional debate is a company that doesn’t make any products itself, but that owns patents and tries to make money by accusing other companies of infringement.”
We have seen more of that argument elsewhere, basically complaining that patent trolls are not a problem. As one person put it, “obviously, these guys have never been sued by a patent troll…the Wright Brothers…really?”
It was said in reference to this odd article. “Take a look at the website of the ‘tech’ company 1 of the authors works for,” said one person. It sure looks like those who defend trolls are either trolls themselves or those who work with trolls.
In relation to a patent reform this puff piece from The Hill gave a platform the the BSA (Microsoft front group). One relevant part says:
“I think the change in the Senate is a good thing for patent reform,” said Craig Albright, a top lobbyist with BSA | The Software Alliance. “And that change is important for the prospects of getting patent reform done and it’s one of the reasons why we’re optimistic.”
As we have shown before, when Microsoft and its partners speak about patent reform they don’t speak about eliminating or limiting software patents, which they love dearly. Here is another new article titled “Patent Reform Likely to Succeed in Next Congress” and further commentary from TechDirt:
As we’ve noted recently, a series of Supreme Court decisions over the past decade, culminating in the big Alice v. CLS Bank ruling in July, has clearly put a serious crimp on the patent trolling business. Vague, broad, dangerous patents are falling like flies, new patent trolling lawsuits are on the decline and the US Patent Office is rejecting a lot more questionable software and business method patent applications. All good news. But is it enough?
That is pretty much where favourable coverage ends. The biased media of patent lawyers still dominates the news feeds, aided by large corporations’ press.
Bloomberg, i.e. Wall Street, gives them a platform with which to defend software patents in the wake of Alice v. CLS Bank and blogs of patent maximalists write about it in a self-serving fashion. “Look at those patent guys scared to death about loosing their jobs with the removal of software patents,” wrote the FFII’s President. There is more where it came from (bypassing limitations), glorification of patents and revisionism (disguised as ‘history’) about software patents, as noted in an article we published 2 weeks ago. When Gene Quinn talks about history he speaks of a highly modified version that helps patent lawyers fool judges or lawmakers.
A lot of other legal sites, such as Mondaq, Lexology and Law 360 showed their clear bias. Only patent lawyers write there on this topic and it’s unsurprisingly biased. Some are willing to acknowledge the fact that software patents are in trouble, but they selective pick cases where software patents endure. To quote an example from today: “In discussing computer software patentability, the court stated outright that “software must be eligible under § 101″ and that the Supreme Court has implicitly endorsed the patentability of software, including in Alice. Specifically, the court reasoned that patent law must balance between encouraging creation of new computing solutions and protecting against applying established ideas through a computer environment. Caltech, 156 C.D. Cal. at 9095. The court also interpreted Alice as acknowledging the patent eligibility of software if it improves “the functioning of the computer itself” or “any other technology.””
“No, Mr Crouch,” insists the FFII’s Present, “loading software on a PC does not make it a new machine” (Crouch is one of the most prominent boosters of patents).
Joe Mullin recently showed that not only software patents are dying in the US but patents on genetics too. As Susan Decker from Bloomberg put it: “Myriad Genetics Inc. (MYGN) can’t block competitors’ DNA tests to determine risk for breast and ovarian cancer after a U.S. appeals court said three patents on the tests never should have been issued.
“The patents cover products of nature and ideas that aren’t eligible for legal protection, the U.S. Court of Appeals for the Federal Circuit said in an opinion posted today on the court’s docket. The court upheld a trial judge’s decision to allow the competing tests, including those made by Ambry Genetics Corp., to remain on the market.”
It sure looks like the US improves a lot on the patent front, but reading the lawyers-dominated press won’t quite reinforce this impression.
“Comments will be accepted until March 16, 2015,” says the USPTO regarding the “Interim Guidance on Subject Matter Eligibility”. Three weeks from now we shall receive some new sregarding patent scope in the US and perhaps also find out who is going to head the USPTO,
A public forum will be hosted at the Alexandria campus of the USPTO on Jan. 21, 2015, to receive public feedback from any interested member of the public. The Eligibility Forum will be an opportunity for the Office to provide an overview of the Interim Eligibility Guidance and for participants to present their interpretation of the impact of Supreme Court precedent on the complex legal and technical issues involved in subject matter eligibility analysis during examination by providing oral feedback on the Interim Eligibility Guidance and claim example sets. Individuals will be provided an opportunity to make a presentation, to the extent that time permits.
It is very likely that law firms and large corporations will submit the lion’s share of comments and those who are unaffiliated will be ignored or mostly unaccounted for. Software patents will lose when the wealthy interests against them outweigh the likes of Microsoft. In a world where Free software increasingly dominates (sharing and collaboration among software companies) the vision of a software patents-free world is no fantasy. █
Permalink
Send this to a friend
01.01.15
Posted in News Roundup at 9:09 pm by Dr. Roy Schestowitz
Contents
-
Desktop
-
Librem 15 is a new Linux-powered laptop in the making, and the crowdfunding campaign that’s taking place on Indiegogo has just passed the halfway mark.
-
-
-
-
Applications
-
Comix is an application that lets users read comic books that can even be archived. It’s been around for many years and it’s one of the best so far, despite its age and simplistic approach.
The American culture always held comic books in high regard and this trend is now spreading across the world. It’s true that not everyone is really a fan of this kind of storytelling and that there is still a long way to go until more people from other continents appreciate them. In any case, if you want to read comic books on a Linux platform, it’s rather easy to do so, especially since there are quite a few options out there.
-
Download managers are not something new for Linux users, but it’s true that apps with nice GUIs and lots of options are. uGet is definitely one of the most interesting download managers for the Linux platform and we’ll now take a closer look at it.
-
LiVES is a simple-to-use video editor and VJ tool that allows users to combine real time and rendered effects, streams, and multiple video/audio files. The developers have released a new version of it with some minor changes and improvements.
-
PhpMyAdmin is a tool built in PHP that handles the administration of MySQL databases. The developers have released a new version and is now available for download.
-
Instructionals/Technical
-
Games
-
Steam for Linux has been available for a couple of years already and it seems like it’s definitely making an impact, if we look closely at the most played games on the digital distribution platform.
-
Blitzkrieg 3, a new strategy game developed by Nival Interactive, will be getting a Linux release, at least this are the latest reports from the German media.
-
Here is a look back at the most popular articles on GamingOnLinux for 2014, it was a seriously crazy year for us here, and for everyone in Linux gaming, so let’s see what happened! We had a few downers, but most of it was great stuff that I am proud to be a part of.
-
Lisa is a quirky side-scrolling RPG set in a post-apocalyptic wasteland. It has a nice style to it, and very positive reviews on Steam.
-
After a bit of a wait it’s finally possible for you to bring your penguins to space and colonize new worlds in the name of Torvalds. But how does Civilization: Beyond Earth fare, what are its strengths and weaknesses? Let’s find out.
Civilization: Beyond Earth is the newest installation in the long standind series of Civilization games and, as you all are probably aware, instead of allowing you to become the most powerful nation on Earth it brings you onto an unexplored planet far away as humanity’s last resort to save itself from an overpopulated home.
-
-
Roundabout, a weird arcade driving game developed and published on Steam by No Goblin, has also reached the Linux platform and is now available with 34% discount.
-
The Way of Life, an adventure game developed in just 24 hours, has made its way on Steam for Linux. It’s not ready yet and is still under development, but the first three levels have been provided for free.
-
OpenTTD is an open source simulation game based on the popular Microprose title Transport Tycoon written by Chris Sawyer. It’s been around for quite some time and it’s still played by many gamers, even today. A new major release is in the making and the first Beta has been released.
-
The Itch.io games store has always been nice, but icing on the cake is that they are now creating an open source desktop client in Qt 5.
It’s in the very early stages, but could be something to give it a boost over other smaller stores. Desura is also working to bring their re-open sourced client back to Linux, and GOG are bringing out a closed source client. Looks like desktop clients are becoming a big thing again.
-
Finally, Desura has a new client available for Linux. Bad Juju Games haven’t officially announced it anywhere on Desura yet, but it is available to download.
It has been open sourced again thanks to Bad Juju Games who moved it to the GPL3 license, and removed the need to sign a contributor agreement, but the Desura name and logo are still subject to certain terms (fair enough).
-
TIMEframe was originally created for the Ludum Dare game jam competition by Random Seed games and an updated version has been in development.
It looks like a pretty interesting concept, and they need help by getting votes on Steam Greenlight. Sadly, the original doesn’t have Linux support, so it’s great the updated version will.
-
One of the great things about open source is that you’re free to modify and redistribute it in whichever way you like. This is real creative freedom that I support. All of my apps and games are open source. A while back, I helped fund the opening of some game music and art assets to the public. Being in the public domain (or having a Creative Commons license, as these art assets now do) allows for public remixing and free use of the content. Gotta love that.
-
Desktop Environments/WMs
-
All leaders must rise to the challenge for December 2015, warns outgoing EU climate chief
-
-
-
K Desktop Environment/KDE SC/Qt
-
-
Well the first two laps of my first SoK is over and now I finally enter into the final lap. In the first month I had finished with the design of the site but it was just plain and simple HTML/CSS and as we all know that is not enough. So the next question that arises is – what do we need ? And the answer to that will be a framework.
-
There were not many commits from my side to the Cantor project during the last month, but most of stuffs that are related to porting the Python 2 backend to Python 3 have been done.
-
MUP is a markup previewer. It supports multiple markup formats. You can use it to read markup text, but it is also useful when writing markup text to check how your work looks, thanks to its refresh-as-you-save feature.
-
Here in the Marble world, we are working hard on expanding the current functionality with new features. Today I would like to show you some stuff we’ve recently introduced as part of the Measure tool. The measure tool is basically a multifunctional georuler, that allows to perform a variety of measurements. For instance, now you can easily measure distances on trivial paths or areas of complicated polygon shapes.
-
GNOME Desktop/GTK
-
Bastian Hougaard and Jakub Steiner put together a wonderful video for the campain. Thanks guys!
I’ve funded the last 4 months of development to give you and idea of what you are funding and reduce your risk. I also wanted to prove to you that I’m capable of taking on this project. I hope you agree and are willing to keep me going.
-
-
New Releases
-
Deepin, a Linux distribution that provides a unique, fun, and interesting experience to its users has been upgraded to version 2014.2 and is now ready for download.
-
OpenELEC is a bleeding-edge embedded operating system built specifically to run the Kodi media player hub. It has just been upgraded to use the latest version of Kodi and it packs a ton of improvements.
-
I am proud to announce the release of ZevenOS 6.0 – Goodbye Edition.
Goodbye Edition therefore because its released at the end of this year and will be the last ZevenOS Version for a long long time.
This release is based upon Ubuntu 14.04 LTS and will be supported for 5.0 years.
-
Screenshots
-
Red Hat Family
-
Fedora
-
On some levels this makes sense. Red Hat is the single largest entity in Fedora and many (if not most) of the movers and shakers in Fedora are Red Hat employees. A quick glance at the Fedora 21 System Wide Changes shows many more Red Hat employees than not. Is it any wonder that individual contributors can feel a bit like a sailboat in the way of an aircraft carrier?
-
Today I’d like to take a look at where Ansible is, a year later, using last year’s report as a benchmark. I think it’s fair to say that we’ve done pretty well for our users in 2014.
-
Debian Family
-
The next timed change of the freeze policy will apply per January 5th. After that date, we will only accept RC bugs fixes. Which means it is final chance for translation updates.
-
Derivatives
-
Canonical/Ubuntu
-
Ubuntu can be easily tweaked and it’s not all that difficult to make some visual changes to it. People think that Unity is not all that flexible, but that’s definitely not the case and users need just two apps to make all the changes they want.
-
-
Phones
-
Tizen
-
The HOT News of the day is that Samsung have decided to start shipping Tizen on ALL of their upcoming Smart TVs starting 2015. According to industry sources, Samsung have taken this bold move following a meeting that took place on 29 December, and decided to only use Tizen across its complete upcoming TV line in an effort to boost its own Tizen TV ecosystem.
-
Android
-
After a lengthy corporate restructuring, the indomitable Kodak is applying its brand and expertise to a new market: smartphones. The imaging company announced its intention to launch a range of Android smartphones aimed at transitioning technophobes in partnership with mobile device manufacturer Bullitt Group.
-
This last year has been a big one for Android. Displays have started moving beyond 1080p, devices keep getting bigger, and Android 5.0 brings the most fundamental change the platform has seen in a very long time. Some of the phones that were released in 2014 were huge successes, and other fell short of expectations, but which one was the best? That depends on how you frame the question, so let’s split it up a few different ways and find out.
-
In most areas, Google is already beating Apple, or at least catching up to it. Yet Apple still has a stranglehold in specific areas, ones that aren’t easy to break, including the enterprise as well as the hearts of independent developers and startups.
-
Earlier this week, we brought you the story of Jason Kallelis of Writing About Tech, a longtime Android fan who had grown so frustrated with Android’s user experience recently that he felt tempted to switch to the iPhone 6 Plus. Well, it’s just one day later and Kallelis has already decided to take the plunge and has bought himself Apple’s giant new phablet as an experiment to see if he likes it better.
-
Android 5.0.2 has rolled out for Nexus 7 users, and the latest incremental update aims to fix a few lingering bugs that were still crawling around the Android 5.0 Lollipop operating system after launch.
-
Google’s new Android 5.0 Lollipop operating system delivered tons of new features to Nexus smartphone and tablet users. However, it also delivered a number of Android 5.0 Lollipop issues to owners of the Nexus 4, Nexus 5, Nexus 6, Nexus 9, Nexus 10, and Nexus 7, Lollipop problems that Google’s been trying to iron out over the last month and a half.
-
December was the fourth anniversary for Android 2.3 Gingerbread—an eternity for smartphones—yet the OS stubbornly refuses to die. The OS that originally shipped in 2010 is still clinging on to 9.1 percent of active devices, and in developing markets it still ships on new devices. Android 2.3 has even outlasted newer versions of Android, like 3.0 Honeycomb (0 percent) and 4.0 Ice Cream Sandwich (7.8 percent).
-
Another reliable tipster confirmed that the HTC One M9 “Hima” will be released in March boasting the latest Android 5.0 Lollipop OS overlaced with the HTC Sense 7 user interface.
-
The news of a OnePlus ROM was not new news, as it had been reported months ago that the company was working on its own version of close-to-stock android. More recently, the company announced a competition in their forum asking members to suggest a name for their ROM. Well, if you have been waiting to see what OnePlus could bring to the ROM table then it looks like the wait is over. OnePlus today have released the first version of their very own ROM. At the moment, the ROM name has still not been decided (or at least made known) and instead is simply going by ‘Android Lollipop Alpha’. As the name suggests, this ROM is based on Android 5.0 (Lollipop) and is now available to download and install. However, before you all click download, you do need to know that this is a very early build. Quite often builds are referred to as “early” or “alpha”, but this is seriously early and OnePlus has therefore released this as a ‘community preview’ version (similar to what we saw from Google with the L preview a few months ago). OnePlus make this point in their blog post stating “It’s so early, in fact, that this build contains no extras beyond the stock features of AOSP Lollipop”. So you’ve been warned. You should expect things not to work, bugs and other nasties associated with early and alpha ROM builds.
-
-
Samsung Electronics Co. may be ringing in the New Year with a fresh new system update for its devices. The manufacturer reportedly plans to begin sending out the Android 5.0 Lollipop update to its devices in January, according to a Reddit user claiming to be a Samsung employee.
-
If the 40 free applications that Amazon gave away last week wasn’t enough to satiate your hunger for new apps, the company is back today with even more goodies for your Android device.
Amazon is now offering 33 paid Android apps for free as part of its latest Free App of the Day Bundle. There are games and utilities packed inside of the bundle, including big names like Monopoly, République, Thomas Was Alone, Lyne, and Angry Birds Star Wars.
-
Android is the most used mobile operating system in the history of the world. Google’s mobile OS shipped on 84% of all global smartphones in Q3 2014, a level that has grown consistently over the last several years. In contrast, Apple’s iOS has lost quarterly share in a growing market, showing up in 11.7% of all smartphone shipments in the third quarter.
-
While Google has yet to release the Android Lollipop for the HTC One M7, users of the smartphone can try out the latest version by installing the Android 5.0.2 Lollipop update on their phones thanks to LiqiudSmooth ROM.
-
Instructables user depotdevoid took his old Droid Razr Maxx and decided to turn it into an always-on, internet-connected webcam he could monitor at any time. If you want to do the same, you’ll need a few things to make this project work. A copy of IP Webcam (Free, $4 Pro) from Google Play, and a soldering iron (if you don’t want to just use USB power—depotdevoid’s Maxx has a broken USB charging port) to add external power, and a mount for your phone are all it really takes. He uses his to watch his 3D printer when he’s not in his garage workshop, but you can use it to keep an eye on package deliveries, watch your pets during the day, or just see the view from your home window.
-
An obscure court case in India appears to have dented hopes of the mobile industry weaning itself off Google dependency – and has raised questions about the goals of Cyanogen and its backer, a Silicon Valley VC firm with close ties to Google.
In the cosy world of Menlo Park VC firms, Andreessen Horowitz (or “A16Z”) is as close to Google as anyone. Together, they teamed up to create the “Glass Collective”, while its head, Netscape founder Andreessen, appear to go to battle in Google’s wars against media companies, as Michael Wolff reminded us this week.
-
-
Although it can be exciting living on the bleeding edge of tech, sometimes being first to a software update can prove to be more harmful than good. Just ask Nexus (or even iPhone) owners who’ve, over the years, learned the hard way that initial updates — especially when it comes to major Android versions — can often times be riddled with bugs and other general weirdness. It’s this very reason it appears there was such a long delay in the rollout of Android 5.0 Lollipop for the Nexus 5.
-
What became of the crowdfunded projects we covered in 2014? Two earned more than $2 million each, about a third went unfunded, and half had shipping delays.
Ten years ago if somebody were to tell you you’d soon be able to collect thousands and even millions of dollars for your product idea simply by posting a summary and some pictures on a web page, you might have been inclined to check their meds. Then Kickstarter launched in 2009, and small-scale investing changed forever.
-
While it may seem to most consumers that all smartphones are pretty much the same — and for Apple users, they are — Android phone manufacturers brought a diverse array of hardware to the market in 2014. The theme of the year was standout features, including large (and even curved) displays, water-resistant designs and powerful cameras. Manufacturers competed fiercely to win the favor of consumers, and many handsets stood out for very specific reasons. Below is a rundown of the best Android devices of 2014 and their best features.
-
Android 4.4 “KitKat” has been ported to Intel/AMD x86 processors for a while in stable form while kicking off the New Year is the second stable release of Android-x86 4.4
Android-x86 4.4-r2 is the second stable update to KitKat for Intel/AMD processors. This update has various x86-specific improvements targeted for tablets and netbooks.
-
Nokia has confirmed the launch date of its first Nokia-branded Android tablet, the N1, which will first hit the Chinese market on Jan. 7, 2015.
-
Sub-notebooks/Tablets
-
The One Laptop Per Child project, still going strong in 2015, provides a new version of the nearly indestructable XO laptop which is specifically geared toward children in farming communities.
The XO Tablet is an Android tablet designed for children 3-12 years old that brings OLPC’s expertise to both the educational . It features a 7-inch screen and over 150 applications.
-
At the beginning of a new year, it’s traditional to look back over the last 12 months. But as far as this column is concerned, it’s easy to summarise what happened then: open source has won. Let’s take it from the top:
Supercomputers. Linux is so dominant on the Top 500 Supercomputers lists it is almost embarrassing. The November 2014 figures show that 485 of the top 500 systems were running some form of Linux; Windows runs on just one. Things are even more impressive if you look at the numbers of cores involved. Here, Linux is to be found on 22,851,693 of them, while Windows is on just 30,720; what that means is that not only does Linux dominate, it is particularly strong on the bigger systems.
Cloud computing. The Linux Foundation produced an interesting report last year, which looked at the use of Linux in the cloud by large companies. It found that 75% of them use Linux as their primary platform there, against just 23% that use Windows. It’s hard to translate that into market share, since the mix between cloud and non-cloud needs to be factored in; however, given the current popularity of cloud computing, it’s safe to say that the use of Linux is high and increasing. Indeed, the same survey found Linux deployments in the cloud have increased from 65% to 79%, while those for Windows have fallen from 45% to 36%. Of course, some may not regard the Linux Foundation as totaly disinterested here, but even allowing for that, and for statistical uncertainties, it’s pretty clear which direction things are moving in.
-
Is open source collaboration the key to communication? No silver bullet exists that provides organizations with everything they desire in a single solution. With that said, commercial open source collaboration solutions help companies future proof their investment and give them what is needed to fit their unique requirements. So, if what you are seeking is better security and privacy, improved flexibility and greater control over your collaboration solution, then you should consider open source.
-
Events
-
The rise of China is hardly a secret – by some metrics, the Chinese economy is already the largest in the world. But in recent months, it has become clear that Chinese technology companies are also about to have a major impact on the rest of the planet – and that includes the world of open source.
-
Web Browsers
-
Mozilla
-
I use the private mode of firefox quite often, for example when I want to test an application while being authenticated in one windown and not authenticated in another window.
-
SaaS/Big Data
-
In just a few hours 2014 ends. This is a great opportunity to look back at what happened this year in the ownCloud world and in my personal life. This was an absolutely crazy 12-month so this blog post is now way longer that I planed. A huge thanks you to everyone in the ownCloud community. It´s a blast to work together with so many clever and friendly people from all over the world.
-
Project Releases
-
New Year’s Eve Edition: GWorkspace 0.9.3 released!
-
A new version of rfoaas is now on CRAN. The rfoaas package provides an interface for R to the most excellent FOAAS service–which provides a modern, scalable and RESTful web service for the frequent need to tell someone to eff off.
-
Openness/Sharing
-
Open Hardware
-
A bit of news on the development of OpenTAC – the Open Hardware Test Automation Controller.
-
Programming
-
I just watched a CCC talk in which the speaker claims Perl is horribly broken. Watching it was fairly annoying however, since I had to restrain myself from throwing things at the screen.
-
Standards/Consortia
-
The ODF Plugfest that took place in London on 8 and 9 December showcased innovative ways to work with electronic documents. The most striking idea is the borrowing of techniques commonly used in software development, promising many news ways to create and collaborate on documents.
At the two-day workshop in London, the Berlin-based ODF expert Svante Schubert proposed to borrow techniques commonly used in software development, to manage revisions from many different sources. He suggests to exchange only the changes made in a text, instead of the much more cumbersome sending back and forth of an entire document. “Using files for collaborating on documents is a relic from the era of floppy discs”, developer Schubert says. “It forces a recipient to read the entire document and try to understand what has been changed by others.”
-
A travel agency in one of Japan’s most beautiful cities, Kyoto, has started organising bridal ceremonies for single women.
-
-
Security
-
The Lizard Squad, a band of young hooligans that recently became Internet famous for launching crippling distributed denial-of-service (DDoS) attacks against the largest online gaming networks, is now advertising own Lizard-branded DDoS-for-hire service. Read on for a decidedly different take on this offering than what’s being portrayed in the mainstream media.
-
It’s no secret that some in the computer security world like the idea of being able to “hack back” against online attacks. The simplest form of this idea is that if you’re a company under a denial-of-service attack, should you be able to “hack” a computer that is coordinating those attacks to stop them? More than two years ago, an LA Times article noted that some cybersecurity startups were marketing such services. Related to this, when the terrible CISPA legislation was being debated, one concern was that it would legalize such “hack backs” because, among other things, CISPA would grant immunity to companies “for decisions made based on cyber threat information.” Some interpreted that to mean that companies would have immunity if they decided to hack back against an attacker.
-
-
-
-
More than 78 per cent of all PHP installations are running with at least one known security vulnerability, a researcher has found.
Google developer advocate Anthony Ferrara reached this unpleasant conclusion by correlating statistics from web survey site W3Techs with lists of known vulnerabilities in various versions of PHP.
-
Defence/Police/Secrecy/Aggression
-
US director Oliver Stone has called Ukraine’s Euromaidan revolution that ousted president Viktor Yanukovych a CIA “coup” and claimed that the West played a role in fostering anti-government protests in the country.
The filmmaker, who is not new to conspiracy theories around world events, posted the bizarre theory on Facebook after a four-hour interview with Yanukovych, whom he called “legitimate president of Ukraine until he suddenly wasn’t on February 22 of this year”.
-
Acclaimed film director Oliver Stone on Tuesday claimed that the overthrow of Ukrainian president Viktor Yanukovych earlier this year was the result of an American plot.
Stone, who is known for his left-wing politics, made the claim via a post on his Facebook page. In it, he revealed that he’d spoken to the ousted ruler for “4 hours in Moscow for new English language documentary produced by Ukrainians.” Stone did not provide many details on the documentary but said it “seems clear that the so-called ‘shooters’ who killed 14 police men, wounded some 85, and killed 45 protesting civilians, were outside third party agitators.”
-
The armed coup in Kiev is painfully similar to CIA operations to oust unwanted foreign leaders in Iran, Chile and Venezuela, said US filmmaker Oliver Stone after interviewing Ukraine’s ousted president for a documentary.
-
-
-
-
-
Hollywood film producer Oliver Stone has said he wants to make a four-hour documentary telling the “dirty story” of the overthrow of former Ukrainian President Viktor Yanukovych in what he believes was a “coup” organized with the help of the United States’ Central Intelligence Agency.
-
As Russian troops amass along the Ukraine border and take over military facilities in the Crimea region, the United States has distanced itself from any boots-on-the-ground intervention.
The U.S. won’t send troops or weapons, but it will send hashtags.
While Congress approved an aid package for Ukraine and sanctions against Russia this week, the State Department pushed a Twitter campaign under the hashtag #UnitedForUkraine, which calls on people to share their support for the country.
President Obama had great success using social media during his campaigning days, but does that same mindset work for foreign affairs?
“I don’t know what effect this is supposed to have,” said former State Department diplomat James Lewis. “It’s a hashtag. What’s it going to do? For this situation, it’s not a useful tool.”
To get the momentum going on the hashtag, top officials posted their own photos. Among the most notable was the State Department’s chief spokesperson Jen Psaki, who was once in the running for the Obama’s press secretary.
-
The woman who was accidentally shot dead by her two-year-old son in an Idaho Walmart is described by those who knew her as a gun lover, a motivated academic and a successful nuclear research scientist.
“She was a beautiful, young, loving mother who was taken much too soon,” Veronica Rutledge’s father-in-law, Terry Rutledge, told the Spokesman-Review. “She was out on what was supposed to be a fun-filled day with her son and nieces.”
Rutledge was shot at about 10.20am on Tuesday, in the electronics department of the Hayden, Idaho, Walmart. Kootenai County sheriffs said her son, sitting in the front of a shopping cart, reached into Rutledge’s purse, found her weapon and shot his mother.
“I mean, this is a pretty tragic incident right now that we’re dealing with,” Kootenai lieutenant Stu Miller told reporters on Tuesday. “When you have young children, small people, holiday season – it’s not a pleasant experience.”
While shopping with her son and nieces in the store, Rutledge carried a loaded small-caliber handgun zippered in a pocket in her purse. The purse was a Christmas gift from her husband, Colt Rutledge, one designed specifically for concealed carry, the Washington Post reported.
-
In his 2009 acceptance speech for the Nobel Peace Prize, President Barack Obama declared, “Where force is necessary, we have a moral and strategic interest in binding ourselves to certain rules of conduct. And even as we confront a vicious adversary that abides by no rules, I believe the United States of America must remain a standard bearer in the conduct of war.” By the time Obama accepted the award, one year into his presidency, he had ordered more drone strikes than George W. Bush had authorized during his two presidential terms.
The Bush administration detained and tortured suspected terrorists. The Obama administration has chosen to illegally assassinate them, often with the use of drones. The continued indefinite detention of men at Guantánamo belies Obama’s pledge two days after his first inauguration to close the prison camp there. However, Obama has added only one detainee to the Guantánamo roster. “This government has decided that instead of detaining members of al-Qaida [at Guantánamo] they are going to kill them,” according to John Bellinger, who formulated the Bush administration’s drone policy.
-
Evidence in the public domain suggests that predator drone strikes are doing more harm than good.
That is not surprising. The Senate Intelligence Committee report released recently similarly showed that post-9/11 torture did not work on al Qaeda detainees and facilitated international terrorist recruitment.
Yet Congress has been derelict in failing to conduct comprehensive oversight hearings to appraise the predator drone program. They would probably provoke legislation to terminate the professedly targeted killings because they create more terrorists or terrorist sympathizers than they eliminate.
-
The German public has reacted with surprise to headlines that the Bundeswehr passed on so-called “kill lists” of Afghan “terrorists” to the US. Admitting the truth can be painful at times, says Kersten Knipp.
-
-
German weekly Der Spiegel published secret NATO documents revealing a list of around 750 suspected Taliban officials, some of whom were killed without charge or trial.
Opposition parties demanded an explanation from Chancellor Angela Merkel Tuesday after a German newspaper published secret documents suggesting Germany had provided intelligence for targeted killings of Taliban members in Afghanistan.
-
-
The U.S.-led NATO war on Afghanistan has lasted so long they’ve decided to rename it, declare the old war over, and announce a brand new war they’re just sure you’re going to love.
The war thus far has lasted as long as U.S. participation in World War II plus U.S. participation in World War I, plus the Korean War, plus the Spanish American War, plus the full length of the U.S. war on the Philippines, combined with the whole duration of the Mexican American War.
-
In the United States in 2014, you may be arrested for selling loose cigarettes, jumping turnstiles, dancing on the subways, and having small amounts of marijuana, but not for assassination, torture, anal rape, illegal surveillance, or invading, occupying and bombing sovereign countries.
-
At the time, Weiss was one of at least 48,000 corporate soldiers working in Iraq for more than 170 private military companies (PMCs), with another 30,000 to 100,000 serving in Afghanistan at any given point during the war along with thousands more who performed menial tasks like cooking and cleaning for marginal pay.2 Though the Pentagon claims not to keep records on mercenary fatalities, over 1,000 mercenaries are estimated to have been killed in Iraq and another 2,500 in Afghanistan, including eight who worked for the CIA, with thousands more wounded.3 A 1989 UN treaty, which the U.S. did not sign, prohibits the recruitment, training, use and financing of mercenaries, or combatants motivated to take part in hostilities by private gain, with PMCs claiming exclusion on the grounds that they play a combat support role.4 This essay details the role of PMCs in America’s long Iraq War in light of a century-long history of U.S. use of mercenary and clandestine forces throughout the world. It shows the multiple ways of mercenary war as a means of concealing military intervention from public view. The Bush administration carried these practices to extreme levels, particularly in financing organizations which profit from war and hence are dedicated to its perpetuation.
-
The corporate media chorus willfully ignores that U.S. actions, not Islam, fuel jihadism.
-
-
At least 153 people have been killed in 25 U.S. drone strikes in Pakistan’s restless tribal belt in 2014, according to figures from a Pakistan-based think tank.
-
Peace activist Kathy Kelly is about to begin a three-month prison sentence for protesting the U.S. drone war at a military base in Missouri earlier this year. Kelly, along with another activist, was arrested after offering bread and an indictment against drone warfare. Kelly is the co-coordinator of Voices for Creative Nonviolence, a campaign to end U.S. military and economic warfare.
-
Muntasser survived an Israeli strike on Gaza this summer which killed his young brother and three cousins. Five months and a suicide attempt later the Palestinian boy remains haunted by the memory.
Just a week into the deadly 50-day July-August war, two Israeli missiles slammed into a beach in Gaza City where Muntasser Bakr, 11, was playing football with relatives.
-
Co-directors Seth Rogen (who also plays a leading role) and Evan Goldberg and screenwriter Dan Sterling have created a work that consists largely of a series of unconnected vulgar jokes and gags strung over a plot that glorifies state murder. One of the sharper characterizations of the film is to be found in the emails from Sony executives, who panned The Interview as “desperately unfunny and repetitive.” The studio officials termed the film “another misfire” by Rogen and [actor James] Franco, in which “Franco proves once again that irritation is his strong suit.”
-
Representations of North Korea as a buffoon, a menace, or both on the American big screen are at least as old and arguably as tired as the George W. Bush-era phrase, “the axis of evil.” Along with the figure of the Muslim “terrorist,” hackneyed Hollywood constructions of the “ronery” or diabolical Dr. Evil-like North Korean leader bent on world domination, the sinister race-bending North Korean spy, the robotic North Korean commando, and other post-Cold War Red/Yellow Peril bogeymen have functioned as go-to enemies for the commercial film industry’s geopolitical and racist fantasies. Explaining why the North Korean leader was the default choice for the villain in his 2014 regime-change comedy, The Interview, Seth Rogen has stated, “It’s not that controversial to label [North Korea] as bad. It’s as bad as it could be.”1 Indeed, one-dimensional caricatures of North Korea flourish in the Western media in no small part because “[w]acky dictators sell.”2 Yet when it comes to Hollywood’s North Korean regime-change narratives, the line between fact and fiction, not to mention the distinction between freedom of expression and government propaganda, is revealingly thin. Whether in Hollywood or Washington, the only permissible narrative for North Korea is what Donald Macintyre, former Seoul bureau chief for Time magazine, has called “the demonization script.”3 Not only have the dream machines of the entertainment industry long played an instrumental role within American theaters of war, but also, U.S. officials and political commentators often marshal the language of entertainment—for example, the description of U.S.-South Korea combined military exercises as “war games” and the Obama administration’s references to the Pentagon’s “playbook” with regard to North Korea—when describing U.S. military maneuvers on and around the Korean peninsula.
-
The suicide bomber had been recruited as a CIA informant and taken to Afghanistan to infiltrate the upper ranks of al-Qaeda. For months, he provided the Agency with independently verifiable intelligence on the terrorist network, and he promised to lead the CIA to the group’s most senior members. Instead, the asset was an al-Qaeda double agent…”
-
According to a secret study released by the WikiLeaks group on Dec. 18, the US Central Intelligence Agency (CIA) considers the killing of Revolutionary Armed Forces of Colombia (FARC) second-in-command Raúl Reyes by Colombian forces in Ecuadorian territory on Mar. 1, 2008 an example of ways that assassinations of rebel leaders “can play a useful role.” In addition to the Reyes case, the paper reviews the use of “high-value targeting (HVT)”—the killing or capture of top leaders—in fighting rebels in Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland and Sri Lanka. HTV can have “negative effects,” the study concludes, but the practice can “contribute to successful counterinsurgency outcomes” if used strategically. The July 9, 2009 study, marked “secret” and “NOFORN” (“no foreign nationals”), is entitled “Making High-Value Targeting Operations an Effective Counterinsurgency Tool”; it apparently forms part of a “Best Practices in Counterinsurgency” series.
Reyes, the FARC’s chief spokesperson and negotiator, was killed when the Colombian military launched a nighttime air raid and then an incursion against a rebel encampment in Ecuador’s northeastern Sucumbíos province about three kilometers from the Colombian border. Some 19 FARC members were killed in the operation, as were four Mexican students who had been visiting the encampment while in Ecuador to attend a leftist conference. Although the Colombian government and the media treated the attack as a simple raid against a group of rebels, the CIA study refers to it as part of a number of “successful HVT strikes against top insurgent leaders in early 2008, in conjunction with earlier strikes against second and third-tier leaders and finance and logistics specialists.” Reyes’ death “is likely to have seriously damaged FARC discipline and morale, even among its leadership, according to a CIA field commentary.” As an example of the operation’s success, the CIA noted that “[p]ublic support for the Colombian government solidified in the wake of the killing…with President Alvaro Uribe’s approval rating increasing from the mid-70% range to as high as 84%.”
-
Finance
-
Social justice activists determined to feed the homeless have faced eviction for the second time following their attempts to open a soup kitchen in Westminster, in the heart of London. They were forcibly ousted by police Tuesday night.
Following their eviction from a listed Victorian building near Trafalgar Square they had been occupying in the run-up to Christmas, the group decided to set up a soup kitchen outside.
Since December 25, they had been distributing food, coffee and tea outside the vacant offices to people sleeping rough on the streets of London.
-
But these old works do invite us to live questions that they lived, which many of us had complacently forgotten, and which Pikettymania was an effort to remember. These are the inescapable questions of a world where the economy, including global ecology, does not take care of itself, and where it may come into conflict with democracy. They are questions for a world where we need to get clearer on what we mean by democracy, and what we lose when we neglect or betray it.
-
France’s star economist Thomas Piketty, who shot to fame and topped best-seller lists in 2014 with his controversial book on wealth and inequality, has declined the country’s highest award, the Legion d’Honneur, local media said on Thursday.
“I refuse this nomination because I don’t think it’s up to a government to say who is honorable,” Piketty told AFP news agency. “They would do better to focus on reviving growth in France and Europe.”
-
PR/AstroTurf/Lobbying
-
A Twitter advertising technique is perturbing people. Promoted brands like MasterCard and IFC are appearing in the list of accounts some users follow, even if they don’t actually follow them.
Sources familiar with the company’s advertising strategy tell me this has been occurring since early 2013, but the public has only just now cottoned onto it thanks to actor William Shatner (of Star Trek fame). Shatner brought attention to it after he saw that “MasterCard” appeared in his following list despite the fact that he didn’t follow it. He did a little investigation and discovered that the same promoted account appeared on Dwayne Johnson’s follower list, looking a little out of place given “The Rock” only followed one other account.
-
The rapid expansion of America’s right-wing media began in the 1980s as the Reagan administration coordinated foreign policy initiatives with conservative media executives, including Rupert Murdoch, and then cleared away regulatory hurdles, reports Robert Parry.
-
Censorship
-
The block here is clearly not directed at Techdirt, but rather at Google’s Feedproxy service — which was formerly Feedburner, a company Google bought years ago. Many, many, many sites that have RSS feeds use Google’s service as it makes it much easier to manage your RSS feed and to do some basic analytics on it.
In this case, it appears that Air Canada has (for reasons unknown) wasted good money on a company called “Datavalet” which offers “Guest Access Management” for companies who offer WiFi access to customers. Datavalet proudly highlights Air Canada and famed Canadian donut chain Tim Hortons among its customers.
-
Some users were also able to access Gmail via cell phone clients on Google’s Android, the top mobile operating system in China.
-
Privacy
-
Apps often need permission to access other stuff on your phone to work. What is less obvious is the breadth of information collected, and why it gets scooped up. Vocativ put together a list of common permissions from popular Android apps, calling it a “barometer of what app makers think they can get away with.”
-
I remember being excited senior year of high school when thinking about our future class reunion. My excitement stemmed from a movie I had watched. In the movie, the star was the ugly duckling growing up. When he arrived at his class reunion, he was a rich hunk with a gorgeous bride. I couldn’t wait to be “that guy”. I also couldn’t wait for all of the “popular kids” to show up at this future class reunion fat and strung out. It was going to be GREAT.
As it turns out, I was entirely wrong. NOBODY showed up at our class reunion. Because we never had one. And I blame Facebook. The social media giant has helped us all become closer apart.
-
A new round of NSA documents snatched by master blabbermouth Edward Snowden appeared online late on Sunday, revealing spooks’ internet security pet hates.
The latest dump of PDFs published by Der Spiegel appeared to show what the Five Eyes surveillance buddies – the USA, the UK, Australia, Canada and New Zealand – see as obstacles posed by internet security protocols.
-
Although it’s now well known that US spy agency NSA and its British cousin GCHQ were able to monitor, collect, and analyse our digital communications, a new report reveals which encrypted programmes gave the spy agencies a headache.
-
It’s not easy to truly be anonymous online. Sure, there are plenty of chat apps and secret-sharing sites that claim to offer you privacy, but it’s tricky to know whether US intelligence agencies have a backdoor in them or not.
The best way to stay anonymous online has been to use Tor, a special kind of web browser developed to help US government employees hide their tracks online.
-
If you want a truly anonymous life, then maybe it’s time you learned about Tor, CSpace and ZRTP.
These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel.
-
But perhaps more significantly, the revelations culled from the trove of documents leaked by Edward Snowden show the forms of encryption the NSA struggled to break (at least at the time of the documents in 2012). That list includes PGP, Tor, CSpace, OTR and ZRTP.
[...]
Another alarming statistic from the article is the number of https connections, the type of secure connections used by sites like Facebook, that the agency intercepts. One document showed that by late 2012, the NSA was cracking 10 million such connections a day.
-
After a banner year for shedding light on the NSA’s secret surveillance programs in 2013, the pace of disclosures in 2014 — both from whistleblowers and through Freedom of Information Act (FOIA) lawsuits — slowed significantly.
-
Google delivered a boob of a Christmas present to WikiLeaks by informing the organisation that it turned over an email account to the National Security Agency [NSA] following a request over two years ago.
A Twitter post by WikiLeaks stated that Google contacted the group on Christmas Eve to inform them the Gmail mailboxes and account metadata of an employee were handed over to law enforcement authorities after a US federal warrant had been issued, Ars Technica reports.
-
Roughly a year and a half since the first Snowden disclosures, there’s already been a judicial order to shut down the National Security Agency’s bulk metadata collection program.
The lawsuit filed by Larry Klayman, a veteran conservative activist, would essentially put a stop to unchecked NSA surveillance. And at the start of 2015, he remains the only plaintiff whose case has won when fighting for privacy against the newly understood government monitoring. However, it’s currently a victory in name only—the judicial order in Klayman was stayed pending the government’s appeal.
-
The agency has identified one anonymity method that’s impossible to crack. By combining several services including Tor, VPNs, CSpace and ZRTP, Internet users would give the NSA a “catastrophic” headache, as their communications would be virtually impossible to intercept.
This cocktail leads to a “near-total loss/lack of insight to target communications, presence,” as the NSA explains.
-
The National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel. A slide deck from a presentation by a member of OTP’s VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNs—including tools with names drawn from Star Trek and other bits of popular culture.
-
-
Patrick writes, “The NSA dumped its IOB reports on Christmas Eve, except that it was short 15 files, I pointed that out, next dump was silent but an additional 12 files, I pointed out the three missing files, and as of today, the three extra files were added, but the extra 3 files have a different naming convention.”
-
The “Christmas Eve” NSA file dump that you will see reported at: NSA Waited Until Christmas Eve To Release Details Of Its Illegal Surveillance On Americans, What you need to know about the NSA document dump, and, U.S. Spy Agency Reports Improper Surveillance of Americans, repeated by various other sources, which never mentioned the dump being incomplete, is now complete.
I reported in Merry Christmas From the NSA! Missing Files about 15 missing files, which by my report of: NSA IOB Report Dump – Still Missing Files had become 3 missing files and when I checked today, the NSA file dump is complete, all being silent corrections to the file dump.
-
Every quarter, the National Security Agency generates a report on its own lawbreaking and policy violations. The reports are classified and sent to the President’s Intelligence Oversight Board. It’s unclear what happens once they get there.
-
Here’s a perfect New Year’s resolution: Let’s abolish the National Security Agency and prosecute its agents for spying on us. It’s perfect because it’s the right thing to do — and because it’s a promise that’s probably impossible to keep.
On Christmas Eve, the NSA, complying with a Freedom of Information Act request from the American Civil Liberties Union, released documents showing that intelligence agents used the incredible resources of the NSA to spy on their wives, husbands, and girlfriends.
-
-
Three out of three? That could be the score for the U.S. National Security Agency’s cryptographic “most wanted” list of 2012.
In January 2012, it saw Internet traffic anonymizing tool Tor (The Onion Router), Linux distribution Tails (The Amnesic Incognito Live System) and disk encryption system TrueCrypt as the biggest threats to its ability to intercept Internet traffic and interpret other information it acquires.
Since then, flaws have been found in Tor and the FBI has unmasked Tor users and a vulnerability was found in Tails allowing attackers to determine users’ IP addresses.
And while a source-code audit gave TrueCrypt a relatively clean bill of health in April, TrueCrypt’s anonymous developers inexplicably abandoned the software a few weeks later, warning it was insecure.
-
-
-
Some of the new leaks imply that the NSA is able to compromise core cryptographic Internet protocols like TLS and IPSEC. This is scary news indeed: if the underlying mathematics of crypto are compromised, then in some important sense, all bets are off. But as Green shows, the NSA does not appear to be attacking the math: instead, it has infiltrated and subverted big companies in order to steal their cryptographic certificates, which means that the companies can’t be trusted, but the math can be (probably).
-
The story of John Ashcroft and James Comey’s hospital-bed heroics has by now been told many times. On March 10, 2004, President Bush’s White House counsel, Alberto Gonzales, and chief of staff, Andrew Card, went to the intensive care unit of George Washington University Hospital to try to persuade the ill attorney general, Ashcroft, to sign off on continuing massive collection of Americans’ Internet “metadata,” a program started in October 2001. Comey, then the deputy attorney general, had refused to reauthorize the program; its most recent authorization was scheduled to expire the next day. Comey got to his boss first, and Ashcroft refused to sign. Though pushed hard by Gonzales and Card, and also by Vice President Dick Cheney and his counsel, David Addington, Comey and several of his Department of Justice colleagues stood their ground and declined to ratify this domestic metadata collection based on the president’s bare say-so.
-
Austrian journalist Erich Möchel delivered a presentation in Hamburg at the annual meeting of the Chaos Computer Club on Monday December 29, detailing the various locations where the US NSA has been actively collecting and processing electronic intelligence in Vienna.
-
The Edward Snowden leaks and the revelation of wholesale NSA surveillance of the entire planet hit a lot of people hard, but particularly in Germany, where the public knows all too well the dangers of a surveillance state. The backlash was huge, and the German government promised major changes to their relationship with the US spies.
-
In a crescendo of anger over American espionage, Germany expelled the CIA’s top operative, launched an investigation of the vast U.S. surveillance programs exposed by Edward Snowden and extracted an apology from President Barack Obama for the years that U.S. spies had reportedly spent monitoring German Chancellor Angela Merkel’s cellphone.
-
Laura Poitras’ new documentary about mega-leaker Edward Snowden, “Citizenfour,” makes no pretense at being evenhanded. It’s a polemic against the National Security Agency’s effort to spy on people in the United States and around the world – innocent, guilty, or simply suspect – all in the name of national security.
-
When Horace Edwards saw a recent showing of the documentary “Citizenfour,” which chronicles former National Security Agency contractor Edward Snowden’s leak of classified documents, he was aghast.
-
Civil rights and federal attorneys sparred at a hearing over a case involving domestic dragnet surveillance by the federal government. The plaintiffs argued the searches are illegal, while the government said opponents don’t have enough evidence to know.
The hearing, requested by the Electronic Frontier Foundation (EFF) for a partial summary judgment, concerns the class action lawsuit, Jewel v. NSA, which was filed six years ago. It claims the National Security Agency (NSA) acquired AT&T customers’ e-mail and other data using surveillance devices attached to the company’s network.
-
Civil rights and federal attorneys sparred at a hearing over a case involving domestic dragnet surveillance by the federal government. The plaintiffs argued the searches are illegal, while the government said opponents don’t have enough evidence to know.
The hearing, requested by the Electronic Frontier Foundation (EFF) for a partial summary judgment, concerns the class action lawsuit, Jewel v. NSA, which was filed six years ago. It claims the National Security Agency (NSA) acquired AT&T customers’ e-mail and other data using surveillance devices attached to the company’s network.
-
When Christmas approaches, the spies of the Five Eyes intelligence services can look forward to a break from the arduous daily work of spying. In addition to their usual job — attempting to crack encryption all around the world — they play a game called the “Kryptos Kristmas Kwiz,” which involves solving challenging numerical and alphabetical puzzles. The proud winners of the competition are awarded “Kryptos” mugs.
-
Civil Rights
-
In 1971, I entered the full text of the top-secret Pentagon Papers – a history of how the US became mired in the swamp of the Vietnam War – into the Congressional Record, even as the Federal Bureau of Investigation was hunting for Daniel Ellsburg (who gave the papers to the New York Times) and President Richard Nixon and his Justice Department were filing injunctions against newspapers to prevent their publication. Subsequent case law affirmed that members of Congress may reveal any government “secret” to the public without fear of prosecution because of the “Speech and Debate” clause of the constitution, from which members derive their duty to inform the people about the actions of their government.
-
After video of a man wrestling a woman and throwing her against a car came to light Tuesday, the San Jose Police Department issued a warrant – for the woman’s arrest.
Of course the man “being assaulted” was none other than an off-duty San Jose Cop in plainclothes. The officer reportedly approached the woman – without identifying himself as a police officer – after a fender bender between their cars.
-
Steve Rogers, who is Captain America (Chris Evans), awakens from decades of suspended animation, to find himself in the present day when the global war on terrorism is being waged. He works for SHIELD, a powerful paramilitary spy agency that now has military drones called “hellicarriers,” which allow for assassination. As Rogers says, “I thought the punishment usually came after the crime.” Part of the reason why the agency has turned to assassination is because the agency was infiltrated, and Captain America spends the movie dealing with this.
-
It seemed an unlikely excuse from a man suspected of breaking into cars at an auto yard. But police say it appears a Norwalk man was being truthful when he insisted he was just checking the vehicles to make sure they were locked.
Employees at Coating’s Auto Body caught 20-year-old Alexander Louis Friday and held him for police.
-
This is a message to Allen Clifton, co-founder of Forward Progressives, and anyone else who labels the police accountability movement dangerous and hateful. Us “anti-government activists” as you called us, protesters, cop watchers, cop blockers, members of the civil rights movement; we are not hate groups as you recently proclaimed, despite being thoroughly told you are wrong in the comment section of your own article. You join the ranks of other “journalists” like Bill O’Reilly who recently attacked Cop Block and others who film the police.
-
From 1967 to 1971, the Central Intelligence Agency ran a secret government operation called Phoenix. (4) At the time, the program was classified and, due to the unpopularity of the Vietnam War, it received wide public scrutiny. In fact, many war protesters called it an illegal assassination program. (5)
The Phoenix Program’s official stated purpose was to gather intelligence on the communist Viet Cong and share that information with South Vietnamese military and government leaders. The program has been heralded a success due to its ability to “gain detailed knowledge about the Viet Cong and to disrupt that organization”. (5) So what does “disrupt” mean, exactly?
To many detractors, it means exactly what it sounds like: assassination. In fact, the program is known to have resulted in about 20,000 deaths. (4)
One of those is a South Vietnamese interpreter by the name of Thai Khac Chuyen. (6) Chuyen was accused of being a double agent and killed by six Special Forces soldiers in 1969, but those soldiers were never held accountable for their actions because U.S. political leaders didn’t want key witnesses to testify. Therefore, a trial for the soldiers could not be staged. This event led to Daniel Ellsberg copying key documents and releasing them to the press.
Rightly or wrongly, the U.S. developed a reputation for murder on the battlefield, an irony not lost on political conservatives who have criticized journalists for losing the Vietnam War merely by reporting on ugly incidents like Chuyen’s assassination, and his treatment prior, and the My Lai Massacre. (7)
-
The scope of CIA torture revealed in this week’s Senate Intelligence Committee report has come as a shock to many, but America’s involvement with torture predates the terrorist attacks on 9/11. This week Brazil published its very own torture report as part of an investigation into the crimes perpetrated during the country’s 21 year-long U.S. backed military dictatorship. It confirms what historians have been writing about for years: that torture and other human rights abuses were systemic within the regime, and that the military received extensive training by the U.S. and the U.K. on torture and other repressive techniques.
-
Last month’s revelations about CIA torture have hurt U.S. credibility worldwide. The Senate Intelligence Committee’s report on CIA Interrogation concluded the program “created tensions with U.S. partners and allies…complicating bilateral intelligence relationships.” It said the program caused “immeasurable damage to the United States’ public standing, as well as to the United States’ longstanding global leadership on human rights in general….”
-
Sen. Mark Udall has called for the full release of the Senate Intelligence Committee’s report on torture. However, as a still-sitting member of Congress, he has a constitutional protection to read most of the still-secret report on the Senate floor — and a group of intelligence veterans urges him to do just that.
-
As the public grapples with the gruesome realities put forth in the Senate Intelligence Committee’s damning report on the CIA’s torture program, the agency has dug in to defend itself. The CIA claims the torture tactics it used in the years following 9/11 were legal and saved American lives. And despite what the Senate study alleges, the agency insists it never lied about the torture program.
-
Calls for Sen. Mark Udall (D-Colorado) to reveal the entire, unredacted CIA torture report have increased, with a group of former intelligence analysts issuing a memo that urges the outgoing legislator to read the report on the Senate floor.
-
Not long ago, in a bid to find out how effective the CIA really was at counterterrorism, U.S. President Barack Obama released a rabbit into a forest and challenged the agency to find it. The CIA spent months planting informers in the forest, interviewing forest creatures, and examining all the forest intelligence. Nothing. Finally the agency went into the forest and dragged out a soaking wet, badly beaten brown bear screaming: “Okay, okay! I’m a rabbit, I’m a rabbit!”
[...]
For years, the British government denied that its territory had been used for so-called “rendition” flights, in which terror suspects were illegally transported across the globe by the CIA to countries where they could be tortured. It also denied that British intelligence agencies had any involvement or knowledge of the CIA’s brutal program. The denials were supported by an ISC investigation in 2007 that gave the intelligence agencies and government a clean bill of health. The ISC reiterated its findings in 2010. – See more at: http://www.dailystar.com.lb/Opinion/Commentary/2014/Dec-30/282569-britains-murky-role-in-cia-torture.ashx#sthash.I6TN3xGP.dpuf
-
New York Review contributor Mark Danner has been writing about the use of torture by the US government since the first years after September 11. Following the release this month of the Senate’s report on the CIA torture program, Hugh Eakin spoke to Danner about some of the most startling findings of the investigation and what it reveals about the continued political debate surrounding the program.
-
Norman Pollack: The antecedent question, not did the CIA deceive these administrations about the efficacy of EITs, but, as the Senate Report claims, were the administrations even aware of the programs? The Senate Report is seeking to give Obama deniability—i.e., that he was kept in the dark—lest he be held accountable for war crimes. I am in no position to judge whether EITs yielded relevant information. But on solidification of security, no; if anything, torture has turned much of the world against America, and has created the basis for the rise of militant groups and the desire for retribution.
-
But CIA torture being a “stain” on an otherwise flawless record doesn’t suffice either. In fact, in some way, this logic is the heart of the problem, since it blocks any attempt at honest reading of whatever “values” Washington stands for, and tries to achieve, using “soft diplomacy” of “rectal feeding.”
What is equally worrying to what the report has contained is the existing mindset in the US, among the ruling class and the media.
This reality can be best summarised in the words of a Fox News show co-host, Andrea Tantaros: “The United States of America is awesome, we are awesome,” she exclaimed.
“The reason they want to have this discussion is not to show how awesome we are. This administration wants to have this discussion to show us how we’re not awesome.”
With such overriding thoughtless mindset, there is little evidence to show that such “awesomeness” will cease any time soon, even if at the expense of many innocent people. – December 27, 2014.
-
The recent CIA torture report revealed the agency’s inhumane practices of interrogation during the War on Terror. However, some people claim the information gathered through torture proved valuable and saved lives – but is that so? Is information gathered this way even reliable? Will the CIA stop its practices now the truth is out? And what about the inmates of Guantanamo Bay? What has been done to them? To find answers to these questions and many more, we speak to former FBI criminal profiler Jim Clemente on Sophie&Co today.
-
When the US Senate report on the CIA’s torture campaign was released recently, the State Department sent out a warning to US missions abroad to beware of a possible backlash. In the event, beyond indignant newspaper editorials, the international reaction has been somewhat muted.
-
The Senate Intelligence Committee’s scathing torture report not only described the brutality of the CIA’s interrogation methods, but also demonstrated their ineffectiveness. Led by ex-Vice President Dick Cheney, former Bush administration officials have rushed to the airwaves to defend the CIA.
“I would do it again in a minute,” Cheney said on NBC’s Meet the Press, claiming that Enhanced Interrogation Techniques (EITs) produced “actionable intelligence that kept us safe from attacks”.
-
Nearly four decades later, Perico Rodriguez recalls his torture. He fought to breathe. Prison guards had blindfolded him and chained him to a bunk-bed. They tied his hands behind his back and shoved his face into a bucket of water.
The technique was known as El Submarino, a cousin of waterboarding used during Argentina’s “Dirty War”. His lungs, he said, never recovered.
-
Ministers faced fresh accusations of a cover-up last night after refusing to reveal crucial details of British meetings with US politicians investigating CIA torture.
Home Secretary Theresa May was one of several British politicians and envoys who paid 24 visits to senior members of the Senate Intelligence Committee as it investigated barbaric techniques used on terror suspects.
The disclosure has fuelled claims that the Government desperately lobbied to keep allegations of Britain’s complicity in torture out of the committee’s damning report
-
Mr. Olszewski states that millions of Americans who died protecting our freedom would have no problem with a little physical and psychological torture.
I would like to know who or how many of these Americans who died elected him to act as their spokesman regarding their mindsets about torture.
For your edification, Mr. Olszewski, these fun and games the CIA played resulted in a detainee meeting his death by drowning from hypothermia while being waterboarded. A second detainee died from hypothermia while being handcuffed to his cell wall without any clothing in freezing temperatures.
We hanged German leaders who were responsible for torturing people, after they were found guilty of these crimes at the Nuremberg trials.
-
‘American people have a right – indeed, a responsibility – to know what was done in their name; how these practices did or did not serve our interests; and how they comported with our most important values,” says John McCain. But he seems to be alone among pro-torture, CIA-supporting politicians.
Indeed, McCain’s views on the subject seem highly unpopular in the Republican Party. Reactions pretty much sum up to various forms of denial, fear mongering and finger-pointing. ‘This release could endanger the lives of Americans overseas, jeopardize U.S. relations with foreign partners, potentially incite violence, create political problems for our allies, and be used as a recruitment tool for our enemies,’ say Republican Senators Marco Rubio and Jim Risch. One might argue that most of the world suspected the CIA of torture anyways, not to mention a level of anti-American notions in certain parts of the world that have been stable for a long time, but who cares, let’s panic.
-
CIA Torture Program Whistleblower John Kiriakou was sentenced to 30 months in prison while those he exposed still remain free.
-
-
Former attorney general Dominic Grieve has said “egregious” behaviour like the CIA torture techniques would not occur in Britain because of the European Convention on Human Rights.
His intervention comes amid a bitter dispute within the Conservative party over the leadership’s plan to stop British laws being overruled by European judges.
Mr Grieve has criticised his party’s proposals for a new Bill of Rights which proponents said would give UK courts and Parliament the final say over Europe.
-
-
-
When Ilana Greenstein blew the whistle on mismanagement at the CIA, she tried to follow all the proper procedures.
First, she told her supervisors that she believed the agency had bungled its spying operations in Baghdad. Then, she wrote a letter to the director of the agency.
-
A former CIA case officer has gone public with claims of retaliation against her from the bureau after she tried to report her concerns over the misconduct of colleagues in the intelligence service.
“I don’t believe in breaking the law, I don’t believe in leaks, I don’t believe in divulging classified information,” stated Ilana Greenstein in a video interview released by McClatchy DC, a Washington-based journalistic bureau on Tuesday. “What I believe in is a good internal system, where people who have concerns can voice those concerns without recrimination.”
-
Colonel Lawrence Wilkerson, who was chief of staff to Secretary of State Colin Powell from 2002 to 2005, accused the CIA of having operated this torture-based conditioning program to fabricated the evidence that provided the rationale for going to war against Iraq [2].
-
Foreign Affairs Minister Charlie Flanagan is seeking clarification from the US government on whether evidence was uncovered in a recent US Senate intelligence committee report of Shannon Airport being used by the CIA for extraordinary rendition.
-
The Minister for Foreign Affairs and Trade has confirmed he is seeking clarification from the US Government whether any evidence of Shannon Airport being used by the CIA for extraordinary rendition was uncovered in a recent U.S. Senate Intelligence Committee report.
Minister Charlie Flanagan had been asked by Dublin South West Sinn Féin TD Seán Crowe whether he was aware of the report and revelations about CIA torture of detainees.
-
Simon Carswell’s article on Shannon Airport and renditions (“Bush assured Irish State Shannon not used for rendition flights”, December 22nd) provides an important insight into the concerns that two former Irish ministers had in relation to the CIA’s torture and renditions programme.
Dermot Ahern was minister for foreign affairs and Michael McDowell was minister for justice when a report by Dick Marty for the parliamentary assembly of the Council of Europe identified Ireland and Shannon as a stopover point for rendition flights. Nonetheless the government failed to take decisive action, apart, it would seem, from asking the US government if it was taking prisoners through Shannon. The US government’s response to such questions can hardly have been a surprise to the ministers.
-
We practiced tortures that we have prosecuted after real war and condemned when used by other countries that could as legitimately claim “national security” as we did. So, it’s not a question of Congress not clearly prohibiting torture, it’s we as a nation allowing our representatives to turn a blind eye to it.
-
Intellectual Monopolies
-
Copyrights
-
Current US law extends copyright for 70 years after the date of the author’s death, and corporate “works-for-hire” are copyrighted for 95 years after publication. But prior to the 1976 Copyright Act (which became effective in 1978), the maximum copyright term was 56 years—an initial term of 28 years, renewable for another 28 years. Under those laws, works published in 1958 would enter the public domain on January 1, 2015, where they would be “free as the air to common use.” Under current copyright law, we’ll have to wait until 2054.1 And no published works will enter our public domain until 2019. The laws in other countries are different—thousands of works are entering the public domain in Canada and the EU on January 1.
Permalink
Send this to a friend
Posted in Apple, Microsoft, Patents at 12:35 pm by Dr. Roy Schestowitz
Sleight of hand and litigation by proxy don’t work
Summary: The Rockstar patents sale and the final defeat suffered by SCO serve to show that Microsoft cannot beat Free/libre software using aggression and underhanded tactics
Microsoft’s attempts to crush GNU/Linux culminated with the Novell deal in 2006. Microsoft tried to make the competition its own, but it never worked because people antagonised Novell and no large company really followed Novell’s footsteps. Novell is now essentially dead, much like other Microsoft ‘partners’.
“This isn’t happening because Apple and Microsoft decided to play nicer.”Over a decade ago Microsoft paid SCO when it attacked Linux. This was similar to what Novell later did with Microsoft because both used a form of monopoly, either copyrights or patents. Microsoft subsidised anti-GNU/Linux campaigns that did cause a lot of damage. In neither case, however, were the claims valid and both campaigns failed after years or endless struggle, hinged to a great degree on the goodwill of the Free software community.
Simon Sharwood from The Register wrote about a fortnight ago about Groklaw, which had silently become a bit active again, for the first time in many months. Sharwood wrote: “IBM has had a win in its long court battle with SCO over just who owns Unix and, by extension, whether Linux is an unauthorised clone.
“Some quick and simplified history: SCO – short for The Santa Cruz Operation – was a software company that offered a version of Unix for x86 chippery. When Linux came along in the late 90s and started turning into a business, SCO more or less sank and it attacked both Novell and IBM for their role in helping to spread Linus Torvalds’ brainchild. At stake was whether those who distribute and profit from Linux should share some of their bounty with SCO. If a court had found in SCO’s favour, it would have been bad news for Linux.
“The Novell suit ran for about six years, but SCO lost. After that, SCO endured all manner of financial strife, but managed to crawl from the crypt more than once. Last year, SCO managed to secure approval to re-open the case against IBM.”
Robert Pogson wrote about that too:
It’s nice to know that GROKLAW is not dead, just hibernating. Maybe spring will wake it up. Surely there’s some legal case interesting enough to fire it up, like world v Obamacare, or world v N. Korea, or … Of course, now that M$ loves */Linux and Apple has acknowledged that round corners are not innovative there are fewer lawsuits in the world but until all those who fought GNU/Linux for two decades die of old age, there’s still hope they will seek to humiliate themselves in the courts.
This serves to remind us that the Microsoft-backed copyright attack on Linux took well over a decade to be over. This induced a huge toll and Microsoft continues to attack Linux, usually by proxy. Here for example is the Microsoft booster Ina Fried attacking Linux again. He or she (used to be called Ian) has found a way to make the most popular OS (Android) sound like a failure. It’s ugly spin like that which we see other Microsoft boosters spreading in the media (some of them used to work directly for Microsoft or are still working for Microsoft). Watch BGR trolling (clickbait) with one person’s account to make Android sound undesirable [1, 2]. These are fights that are fought with words, but Microsoft goes much further than this. A couple of years ago Microsoft and its proxies tried to cause Android to come under antitrust trouble, but they have failed based on reports. To quote The Register: “A US District Court judge has cast doubt on an antitrust lawsuit filed against Google, describing the damages sought as “speculative.”
“The class-action suit filed earlier this year alleges that Google engages in illegal anti-competitive behavior by requiring makers of Android smartphones to bundle its search app on their devices.”
Remember that this all came from Microsoft. We wrote several articles to show this and so did other sites. In addition to legal attacks through regulators Microsoft has been attacking Android through patent trolls (Microsoft has just given another $23,000,000 to patent troll VirnetX) and patent holders which still have some products. Several examples have been given over the years and the legal assaults are far from over.
The Open Invention Network, which defends Linux (and other related projects) from patent attacks, recently gave this interview to ECT. The Open Invention Network’s CEO Keith Bergelt said that “we had to create channels for collaboration. Otherwise, we would have hundreds of entities spending billions of dollars on the same technology.” It’s not “technology” that he is alluding to when he talks about it; it’s a parable for patents.
As GNU/Linux is becoming a massive player in the fastest-growing markets, notably mobile, no wonder Microsoft now mostly attacks Android and strives to derive revenue from it (or create fear through perception that Microsoft derives revenue from it). Windows is a complete disaster in this area. Ahonen explains how bad things are in his article that he titled “Microsoft (and Nokia) have only achieved 50M Lumia activations? Seriously? Out of 76M shipments? What happened to the other 26M? Seriously! Tossed into garbage by retail?”
Ahonen, a Nokia expert, says that “30% of all Windows Phone based Lumia smartphones shipped have not been activated. That must be an industry record for futility. [...] the product line was a sales disaster. ”
Microsoft’s patent strategy against Android is clearly not succeeding. Even a Microsoft lobbyist, Florian Müller, wrote about the poor success rates of patent lawsuits against Android and told me today that Rockstar too is part of it all.
“The interesting part about Rockstar is that since they sold 2K patents to shareholders, hard to prove devaluation of rest,” he said to me, “but one can certainly suspect that if they bought 6K patents for $4.5B, sell two thirds for $900M, that there *was* devaluation” (take with a grain of salt given the messenger’s connection to Microsoft and Apple).
There was recently a lot of press coverage about telecom patents and Android because Verizon announced that it entered into a patent licensing agreement with Google (more in [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29]), but a bigger story, especially in FOSS-friendly circles, was the Rockstar story. As FOSS Force put it: “Perhaps the most telling sign of the sinking value of software patents came just a week ago, when the patent trolling company Rockstar, jointly owned by Apple, Microsoft, BlackBerry, Sony, and Ericsson, offloaded it’s approximately 4,000 remaining patents for $900 million — representing about two thirds of the patents it purchased in 2011 for $4.5 billion in a bidding war with Google. Google would seem to have the last laugh here, as it’s a member of RPX, the company buying the patents, meaning they’ll will be available to the search company as protection against patent litigation, which is why they had been a bidder in the first place.”
BlackBerry is becoming a patent troll and RPX is pretty much a troll, albeit one that is not so hostile towards Free software because of its members. Mike Masnick said about the news that the “Stupid Costly Patent Nuclear War By Microsoft & Apple Against Android [was] Averted”. He put it in context as follows: “Last year, Rockstar launched its massive patent attack on Android, suing basically all the major Android phone makers and Google. While some have argued that big company v. big company patent attacks aren’t a form of patent trolling, some of us disagree. This, like most patent trolling, is just trying to extract money from companies and has nothing to do with actual innovation. In the tech world, some have referred to this kind of thing as “privateering” in which a big company puts the patents into a shell company to hide their trolling activity.”
Joe Mullin said that “Apple and Microsoft spent $4.5 billion on a patent attack, sold it at a loss.”
“Another skirmish in the ongoing dirty war by the legacy technology & media industry against Google bites the dust,” wrote Simon Phipps, adding to many more articles (even some from Android-hostile networks) that framed this — quite correctly — as an assault on Android:
Apple- and Microsoft-backed patent group ends its war on Android
And just like that, the Rockstar Consortium’s lawsuit campaign against Android is over. The patent holding group (backed by Apple, BlackBerry, Ericsson, Microsoft and Sony) has sold all of its commonly held patents to clearinghouse RPX for $900 million, or a fraction of the $4.5 billion the total patent pool was worth a few years ago. Rockstar will accordingly drop the lawsuits that it still had left, including those leveled against HTC, LG and Samsung. Don’t worry that RPX will promptly turn around and sue someone else, either. It already has a deal to license those patents for defensive purposes to a group of 30-plus companies, including Google and Cisco, while the Rockstar companies get to keep their licenses.
This isn’t happening because Apple and Microsoft decided to play nicer. It is happening because they repeatedly fail to defeat Android/Linux using patents, especially now that software patents are becoming a lot weaker in the United States — a subject we shall cover in our next post. █
Permalink
Send this to a friend
Posted in Deception, Free/Libre Software, GNOME, Microsoft, Mono, Novell at 11:38 am by Dr. Roy Schestowitz
The risk of Microsoft’s interjection into Free/Open Source software (FOSS) persists
Summary: Attempts to put Mono in GNOME still exist (Xamarin behind it) and the openwashing of .NET continues months after the Big Lie
MONO has been a thorn in the side of Free software for nearly a decade, shortly after it had been conceived by a Microsoft fan who used it to promote Microsoft APIs with associated patent risk and lock-in. It wasn’t too shocking to see the Microsoft-tied Novell joining in the ‘fun’. We have spent many years fighting back against Mono, which was an embodiment of Microsoft’s interests and an attempt to assimilate FOSS to Microsoft. The Microsoft proxy now known as Xamarin is still threatening to bring Microsoft APIs to GNOME. We thought GNOME had already salvaged itself from this risk, but the risk persists and it needs to be stopped. It was already defeated before (GNOME was close to becoming Mono-dependent whereupon we wrote many articles to create protests).
The unfortunate thing is that Microsoft bamboozled many journalists into stating that .NET is "open source" (it is not) and a Dice site is trolling again using that same old .NET spin. Do not let the lie be spread so easily. Microsoft’s .NET is proprietary and it still is a patent threat that favours Windows and Microsoft, i.e. proprietary software with back doors.
“It is a propaganda campaign just like “Scroogled” and the goal is to crush software freedom, not just companies like Google.”IDG recently hired a longtime Microsoft booster, Mary Branscombe, letting her spread these lies every week or so. She was openwashing Microsoft the other day as well as several times last month. She used to write in the CBS-owned ZDNet (very poor-quality Microsoft ads disguised as ‘articles’), but now she escapes the boundaries of tabloids and is really doing a lot of damage not only to Free software but to truth itself.
This whole ‘movement’ which tries to ‘sell’ Mono to GNU/Linux, promote the notion that .NET is ‘open’ and Microsoft is wonderfully ethical needs to be crushed. It is a propaganda campaign just like “Scroogled” and the goal is to crush software freedom, not just companies like Google. █
Permalink
Send this to a friend
Posted in Europe, Patents at 5:15 am by Dr. Roy Schestowitz
Summary: Even patent lawyers are upset at Benoît Battistelli and his out-of-control tyranny in the European Patent Office
Guillaume, known as EPpatent in Twitter, has drawn our attention to this letter [PDF]
from the start of the week. This letter is very important because it shows us that the corrupt EPO is now under fire also from patent lawyers in Europe. They express concern about the way Benoît Battistelli runs the EPO. The Office is rapidly losing its legitimacy. If someone wishes to help by OCR’ing the document below, that would be helpful, albeit EPLAW is mostly rehashing arguments we saw already. Expect Battistelli to be ousted (or step down) soon. His clients and staff both hate him. █
Permalink
Send this to a friend
12.31.14
Posted in News Roundup at 10:09 pm by Dr. Roy Schestowitz
Contents
-
Linux systems have been spotted in all sorts of interesting places, but they don’t usually make their ways into the movies. Well, from the looks of it, a Linux system has been used in Luc Besson’s Lucy.
-
It’s the end of yet another year. I’m not going to go on record to say that 2015 will finally, finally, finally be the year of Linux! It may, but it may not. What I will go on the record for is to say what my personal Linux and open-source wishes for Linux are in the coming year. They aren’t many, and they aren’t tilting at any given windmill … they just are.
I’ve already made my “predictions” for Linux in my post “2015 will be the year Linux takes over the enterprise (and other predictions)”. This time, however, I want to take a look at what might be necessary for some of those predictions to actually come true.
-
Clichéd though they may be, year-in-review pieces about desktop Linux—by which I mean Linux distributions designed for end users working on desktops, PCs and, perhaps, large-form mobile devices—are a tradition here at The VAR Guy (and, before that, at our late, great sister-site, WorksWithU, a blog dedicated to Ubuntu Linux). But at the end of 2014, there’s not much to say about desktop Linux other than that it’s now so mature, and open source momentum so focused on other niches, that the Linux desktop has seen little major action over the past 12 months.
-
While the Librem 15 doesn’t necessarily match my personal tastes for laptop hardware due to the overall size and the mouse in particular, the mission of the company definitely does. Up until this point there were few options for laptops that ran purely Free Software, much less any that had modern hardware and a modern look and feel. I believe Purism genuinely wants to create a quality laptop that will appeal both to the Free Software community as well as privacy advocates and the Librem 15 is a nice start. In this era of pervasive surveillance, rootkits bundled with corporate software, threats of hardware backdoors by nation states, and the overall increasing sophistication of attacks, I think Purism is on to something here. As more people value transparency as a means toward security, a computer that can provide the source code for every driver, application, and firmware it uses becomes more valuable.
-
Xiaomi is quickly becoming a major player in the tech gadget space. It’s already a huge smartphone maker in China, though has started to spread its wings into other arenas as well. Next up may be a new laptop, at least according to some specs that were recently provided by GizmoChina. As you’ll note from the image above, this looks like a MacBook Air – but don’t let that fool you just yet.
GizmoChina says that the Xiaomi notebook, powered by Linux, may cost under $500, though the specs suggest it may cost a bit more than that. The site says Xiaomi’s notebook will pack an Intel Core i7 Haswell processor, a 15-inch 1920 x 1080-pixel display and a solid 16GB of RAM. There’s no news on what sort of storage this will pack, though if it’s as thin as the picture suggests, it may have a solid state hard drive as well.
-
Desktop
-
Google’s Chrome OS just got a little bit more useful.
Google evangelist François Beaufort posted on Google+ that the Chrome OS now supports running Linux in a window via the Crouton Chrome extension. Before you use the extension, you’ll have to put your Chromebook in Developer Mode.
Prior to today’s announcement, you had to use a virtual terminals and switch back and forth between your Linux distro and Chrome OS. Now it’s in one handy dandy window right there in the main operating system.
-
-
-
-
-
-
-
-
-
-
Linux is full of awesome apps, both open source and proprietary. People new to Linux might be used to Windows or Mac OS X apps that aren’t available on Linux, and don’t know about available alternatives. Even seasoned Linux users tend to find new and useful software quite often.
Linux apps are also very easy to install. In most cases, they’re in your distribution’s repositories so all it takes is a quick search through your Software Center or a single command in the terminal. Speaking of terminals, there are plenty of apps that can help you avoid the terminal, if that’s your preference.
-
Server
-
Container technology was without a doubt one of the biggest stories of 2014, and if you mention the container arena to most people, Docker is what they think of. As impressive as Docker is, as recently as June of last year, OStatic highlighted some of its instabilities.
-
Kernel Space
-
Fedora contributor Tomasz Torcz has taken a fresh look at what individuals and companies are the largest contributors to systemd.
-
When it comes to systemd middleware, Lennart Poettering often takes the blame and has sole authorship attributed. But there are many more developers (git shows 593 authors in total) – missing their portion of berating, thus unappreciated and unhappy. Over the Winter Holidays I’ve run LWN’s “who wrote” scripts to gather more insight into systemd’s developer base.
-
Rising above all of the systemd controversies and in-fighting this year, systemd developers remained committed and did a heck of a job at adding code to the project.
As some complementary development statistics for systemd focused on 2014 to yesterday’s lead developers of systemd article, I ran GitStats this morning on the latest end-of-year systemd mainline Git repository. The numbers speak for themselves and systemd grew significantly this year.
-
Graphics Stack
-
-
Mesa 3D in 2014 saw slightly more commits this year than the previous two years. However, Mesa didn’t see much in the way of new active contributors this year.
-
Benchmarks
-
Testing for this article was done using the same Core i7 4790K Haswell system as used by the other recent Linux graphics tests. Ubuntu 14.10 x86_64 was running on the system with the Unity 7.3.1 desktop and X.Org Server 1.16.0. The open-source Nouveau driver consisted of the Linux 3.18.0 kernel, Mesa 10.5.0-devel, and xf86-video-nouveau DDX Git. The proprietary NVIDIA Linux driver used was the latest NVIDIA 346.22 beta driver release from earlier this month.
-
Past Intel Windows vs. Linux graphics driver benchmarks have shown that for Haswell the OpenGL performance on Linux generally comes up short of the proprietary Windows driver. Fortunately, the Intel open-source Linux driver improved a lot this year and is now more competitive to the Windows driver.
My latest end-of-year testing was comparing the Intel Linux graphics performance over the past year to Microsoft Windows with the latest proprietary driver (v10.18.10.3960).
-
Applications
-
-
-
Instructionals/Technical
-
-
-
-
-
-
-
To be completely honest, I find Git to be a dry subject. But a version control system is essential to a modern dev workflow so I had to learn it. Any good VCS is fine but Git seems to be the most popular. So I went with Git.
-
Games
-
About 2 years ago I have started one project in KDE Playground called KDots. This is an implementation of the game of dots.
-
Desktop Environments/WMs
-
Rumors: They exist, for better or worse, and there’s not much you can do about them. In addition, rumors are the starting blocks for the old Churchill adage that “a lie gets halfway around the world before the truth has a chance to get its pants on.”
Three times this month, Xfce came up in conversation — online, of course, and in the realm of social media and in forum discussions — and the context in which each conversation came up had the desktop on the brink of closure, with one unwitting person saying that Xfce was dead.
-
GNOME Desktop/GTK
-
One of the commonly asked questions is whether using Wayland will be more power efficient or save power compared to running the same software under an X.Org Server environment. Here’s a simple test of GNOME on Wayland in Fedora 21 while monitoring a laptop’s battery use.
After yesterday’s Fedora 21 Gaming Benchmarks: X.Org vs. XWayland To End 2014 I ran a simple comparison just looking at the system power consumption while engaging with the GNOME 3.14.2 desktop environment under X.Org Server 1.16 and when running under Wayland.
-
Early in the spring Karen Sandler announced her departure* as the Executive Director of the foundation.
The GNOME Asia Summit, an event with a strong community building focus, was this year hosted in Beijing, China. In the end of July the GNOME community gathered for GUADEC in the beautiful city of Strasbourg, France for a week of talks, discussions and hacking.
-
The GNOME project had a rather splendid year with significant progress made in porting GNOME’s components to Wayland, adding many features to the GTK+ tool-kit, enabling OpenGL support in GTK+, and improvements to the many GNOME applications.
-
-
Version 5.0 of the RPi-compatible, Kodi/XBMC-oriented OpenELEC Linux distro for media players upgrades to Kodi 14, adds i.MX6 support, and drops AppleTV.
-
-
New Releases
-
Clonezilla Live, a Linux distribution based on DRBL, Partclone, and udpcast that allows users to do bare metal backup and recovery, is now at version 2.3.2-2. Users should be able to download it and test it.
-
In addition to numerous new and upgraded packages, this release has the following highlights:
Systemd has been updated to version 217, which has numerous improvements.
Nix has been updated to 1.8.
NixOS is now based on Glibc 2.20.
KDE has been updated to 4.14.
The default Linux kernel has been updated to 3.14.
-
NixOS 14.12 stable is codenamed “Caterpillar” and includes Nix 1.8 for package management and a wide collection of package updates. The release announcement by Domen Kožar details, “11972 commits were pushed by 310 contributors since the last release (14.04).”
-
Deepin Linux with its original desktop environment claims to have been downloaded tens of millions of times and in use in more than 40 countries around the globe. Deepin 2014.2 delivers new themes, drag-and-drop reordering support for the Dock icons, launcher improvements, improved multi-screen support, network improvements, system notification improvements, tablet support, and other updates focused around its HTML5-based desktop.
-
-
Screenshots
-
Red Hat Family
-
Debian Family
-
Debian Project News – December 29th, 2014
-
Derivatives
-
Canonical/Ubuntu
-
Rosetta is the space probe that was sent to meet the Churyumov–Gerasimenko comet and that carried the Philae lander, which eventually made a touchdown on the comet itself. It looks like the guys who are analyzing the data sent by the probe are also using Ubuntu.
-
-
Developers have reinvented the terminal numerous times and there are a ton of various apps out there that do the same thing. Now, an “Ubuntu terminal reboot” has surfaced and it’s glorious.
-
The MeegoPad T01 is a tiny PC-on-a-stick with an Intel Atom Bay Trail processor, 2GB of RAM, and Windows 8.1 software. It sells for around $100 and up.
Just plug the stick into the HDMI port of a display, connect a power source, and you’ve got a desktop computer (with the processing power of a cheap Windows tablet).
But what if you’d rather run Ubuntu? Yep. You can do that.
-
Last year, Canonical tried to crowdfund its own smartphone that would run the company’s “Ubuntu Touch” operating system. The smartphone was called “Ubuntu Edge” and would come with a unique design, 4 GB of RAM, a quad-core processor, sapphire screen and 128 GB of storage.
The campaign ultimately failed, reaching less than half of its ambitious goal of $32 million. Since then, we haven’t actually seen a commercially available device running Ubuntu Touch.
A new start-up called MJ Technology promises to build a tablet that will look like the Ubuntu Edge smartphone Canonical wanted to build, and it will run Ubuntu.
-
In 2014, open source technology came under a heavy barrage of criticism as a result of high-profile security vulnerabilities. Mark Shuttleworth, the founder of Ubuntu Linux and its lead commercial sponsor Ubuntu, has a very different view and remains a stalwart defender of the open source model for software development and security.
In a video interview with Datamation, Shuttleworth details his view on open-source security as Ubuntu Linux celebrates its 10th anniversary.
In 2014, the Heartbleed vulnerability in the open source OpenSSL cryptographic library had wide ranging impact. OpenSSL is widely deployed on servers, VPNs and even mobile devices and it took some time for vendors and users to get systems and devices patched.
“We have a big responsibility to proactively make sure that the system is as robust in the face of inevitable flaws as it can be,” Shuttleworth said.
-
-
Windows phone (Lumia 1020) is probably the last place where you would expect to see Ubuntu, but a user has posted images with Ubuntu running on this device and they seem to be legit.
The first thing that users might think is that someone ported Ubuntu Touch for the Lumia 1020 device and that would not be an impossible task. It would be difficult but not impossible. It would also be a difficult to install a custom ROM, but that’s also not impossible. The interesting thing is that the images show an Ubuntu system running and not the Touch version.
-
Flavours and Variants
-
Pear OS was a Linux distribution based on Ubuntu that imitated the Mac OS X desktop environment with great accuracy. It disappeared rather mysteriously roughly a year ago, and no one has heard anything of it ever since. Now, an image has been ported on a remote and obscure part of the Internet that shows that Pear OS might be making a comeback.
-
Today in Linux news Softpedia.com is reporting that Pear OS is making signs of a comeback. In other news, Debian is spotted in a new movie and Phil Shapiro shares a cheap laptop story. We have 2014 highlights on Ubuntu, GNOME, and FOSS in general as well as Jack Wallen’s wishes for the new year.
-
-
The AeroCore 2 is an update to the original AeroCore controller introduced last Spring. Like most hacker-oriented UAV autopilots, both AeroCore models run Nuttx RTOS for real-time control tasks, along with Linux for higher level functions.
-
What better way to spend the holidays, and prepare for the New Year, than with a new release of Raspbian (Debian GNU/Linux specifically for the Raspberry Pi), and a new NOOBS package?
For those who don’t have a Raspberry Pi (or more than one) already, or might have just gotten one for Christmas, the foundation has posted a Got a new Pi article. I also wrote a number of Hands-On with Raspberry Pi posts last Christmas, which include a lot more detail and lots of screen shots.
The new Raspbian release (2014-12-24) and a new NOOBS package (1.3.11) are available for download in the usual ZIP format on the Raspberry Pi downloads page. The NOOBS image also includes Pidora, Arch Linux, openELEC, RaspBMC and RiscOS.
-
2014 brought us plenty of new open-spec, community-backed SBCs — from $35 bargains, to octa-core powerhouses — and all with Linux or Android support.
-
Phones
-
Chinese telecom manufacturer turned mobile device maker Huawei’s low-cost Honor-branded smartphone has skyrocketed to sales of 20 million units from one million in the last year, a spike the company has attributed to a strategic shift to an online-only business model.
-
Tizen
-
In all respects this is the Samsung quality as the original Gear S strap you are currently using, so you know this product well, but it is currently selling for £40 in the UK, which is about $62USD. This is a good product, but it’s at a premium price and you have to ask yourself, Do I really need it?
-
Android
-
Following Apple’s lead with its planned CarPlay infotainment system, which optimizes a compatible console unit for the iPhone OS, Google already has something similar in the works debuting in 2015 called Android Auto.
-
Sub-notebooks/Tablets
-
You can buy tablets for under £30, but for just over that (including shipping) you can get a 7” Quad Core device, and Amazon is now chock-a-block with cheap tablets. Even retail outlets, with brand name tablets, will do you a massive discount.
-
The more competitive the market for personal computing, the more innovative will be OEMs and retailers. I expect many more will ship GNU/Linux just to be different or to offer something new. 2015 could be the last year retail shelves exclude GNU/Linux anywhere. The monopoly is truly dead.
-
As this year draws to a close, it’s worth taking note of two important projects from the Apache Software Foundation (ASF) that have graduated to top-tier project status, ensuring them development resources and more. Apache MetaModel went from the Apache Incubator to become a Top Level Project. It provides a model for interacting with data based on metadata, and developers can use it to go beyond just physical data layers to work with most any forms of data.
Meanwhile, we’ve also covered the news of Apache Drill graduating to Top Level Project status. Drill is billed as the world’s first schema-free SQL query engine that delivers real-time insights by removing the constraint of building and maintaining schemas before data can be analyzed.
-
-
Funding
-
The online community tore the project apart and discovered that the makers of Anonabox were disingenuous when they were saying that it was something original, custom built. As it turned out, it was actually a repurposed Chinese device with a slightly better memory. Also, the operating system used was OpenWRT, which is basically Linux distro for routers and other such devices. Most, if not all of the information provided on Kickstarter was a lie. Eventually, the Kickstarter project was suspended and no one got hurt, financially.
-
FSF/FSFE/GNU/SFLC
-
The Free Software Foundation has created a helpful video that explains what free software is and why users should value it.
-
Public Services/Government
-
The UK government’s 400 IT departments are preparing their organisations for the use of the Open Document Format (ODF) as the default for its editable documents. The process should avoid making civil servants and other end-users bear the brunt of the switch, says Magnus Falk, deputy chief technology officer (CTO) of the UK government. “To unlock our digital documents, we’re leading a digital transformation.”
-
Amtega, Galicia’s agency for technological modernisation, has published its training materials for Linux and LibreOffice under an open license. They can be used by training centres, organisations and individuals to prepare for the office productivity CODIX certification provided by the CeMIT network.
-
More than 5100 people have signed the call to promote open formats and interoperability in the French educational system, a campaign initiated in November by April, France’s free software advocacy group. Their call for interoperability in the education system (Appel pour l’intéropérabilité dans l’Education Nationale) is supported by 100 teachers, as well as employees and school trade unions.
-
Openness/Sharing
-
Open Data
-
Open data has found the most innovation at the local government level. While not taking away from te efforts of data.gov and the state initiatives, local data has more impact on the day to day lives of civil society. A wealth of city and county public data exists, but accessing it can sometimes be time consuming. Now, thanks to a new local government partnership, open data in Durham is just months away from becoming a reality.
-
Open Hardware
-
Unless you live off-the-grid and have abundant free electricity, leaving your rig on while you go away on trips is hardly economic. So if you’re like [Josh Forwood] and you happen to use a remote desktop client all the time while on the road, you might be interested in this little hack he threw together. It’s a remote Power-On-PC from anywhere device.
It’s actually incredibly simple. Just one Arduino. He’s piggybacking off of the excellent Teleduino software by [Nathan] who actually gave him a hand manipulating it for his purpose. The Arduino runs as a low-power server which allows [Josh] to access it via a secure website login. From there, he can send a WOL packet to his various computers to wake them up.
-
Programming
-
…over 78% of all PHP installs have at least one known security vulnerability.
-
One of many reasons to love Performance Co-Pilot, is the fact that it is a fully fledged framework to do performance analysis. It makes it extremely simple to extend and to build anything on top of it. In this post we shall explore how simple it is to analyze your performance data using iPython and pandas.
-
There are countless developers and administrators who are creating and deploying online applications backed by SQL databases.
The problem is that creating and deploying them is not the easiest nut to crack due to the complexity of marrying HTML, JavaScript and other tools and components.
That’s exactly the problem that Adam Chlipala, an Assistant Professor of Electrical Engineering and Computer Science at MIT, is trying to solve with Ur/Web, a domain-specific functional programming language for modern Web applications. The language encapsulates many key components needed for robust applications into just one language, and can help ensure the security of the applications.
-
Media stations have been criticised for showing split-screen footage of distraught families as they were watched live footage of bodies from missing AirAsia flight QZ8501 being recovered from the water.
TV One, an Indonesian news channel, screened images from rescue crews as they encountered the debris and bodies found earlier today in the Java Sea, off the coast on Borneo, on a split screen interposed with live reaction from the families of passengers.
-
Metropolitan police urge everyone not among 100,000 who paid for reservation to stay at home and watch on TV
-
Security
-
Fact is, we don’t yet know enough details about all possible attack surfaces against SSH available to the agencies and we badly need more information to know what infrastructure components remain save and reliable for our day to day work. However we do have an idea about the weak spots that should be avoided.
-
This is nonsense. North Korea has had extensive offensive cyber capabilities for years. And it has extensive support from China.
Even so, lots of security experts don’t believe that it’s North Korea.
-
This crew is taking credit for the Sony and Xbox hack and the Feds are already taking the low-hanging fruit. It is not really a surprise that these hacks are so prolific most hacker crews want to get their name out there but to do so means, well that it is out there.
Colour me surprised that a member of the Lizard Squad hacking group, whos handle alias is “ryanc” aka Ryan caught the attention of the FBI aka Federal Bureau of Investigation after speaking with the media about the Christmas-day attacks on Xbox Live and the PlayStation Network (PSN).
-
US cybersecurity experts say they have solid evidence that a former employee helped hack Sony Pictures Entertainment’s computer system — and that it was not masterminded by North Korean cyberterrorists.
One leading cybersecurity firm, Norse Corp., said Monday it has narrowed its list of suspects to a group of six people — including at least one Sony veteran with the necessary technical background to carry out the attack, according to reports.
The investigation of the Sony hacking by the private companies stands in stark contrast to the finding of the FBI, which said Dec. 19 its probe traced the hacking — which ended up foiling the planned wide release of the Hollywood studio’s “The Interview” — to North Korea.
Kurt Stammberger, senior vice president at Norse, said he used Sony’s leaked human-resources documents and cross-referenced the data with communications on hacker chat rooms and its own network of Web sensors to determine it was not North Korea behind the hack.
-
The cyberattack on Sony Pictures unleashed a torrent of alarmist media reports, evoking the image of North Korean perfidy. Within a month, the FBI issued a statement declaring the North Korean government “responsible for these actions.” Amid the media frenzy, several senators and congresspersons called for tough action. Arizona Senator John McCain blustered, “It’s a new form of warfare that we’re involved in, and we need to react and react vigorously.” President Barack Obama announced his administration planned to review the possibility of placing North Korea on the list of states sponsoring terrorism, a move that would further tighten the already harsh sanctions on North Korea. “They caused a lot of damage, and we will respond,” Obama warned darkly. “We will respond proportionally, and we’ll respond in a place and time and manner that we choose.”
-
This past year has been one of the busiest ones on record for IT security professionals, with a seemingly endless stream of high-profile exploits and software vulnerabilities. At the end of 2013, Target revealed what turned out to be the first of many retail breaches over the next 12 months. Retailers large and small were in the news over the course of 2014, with breaches at Home Depot, Staples, Dairy Queen and even the nonprofit Goodwill Industries. Retailers weren’t the only ones under attack in 2014, however; the open-source software development movement was under scrutiny due to several high-profile security incidents. The OpenSSL Heartbleed vulnerability that was first disclosed in April had a wide-reaching impact and consequences that took months to unravel. Heartbleed also ushered in a new era of naming and branding vulnerabilities that extended throughout 2014. The Shellshock bug in the open-source BASH shell was another high-impact vulnerability disclosed in 2014 that left IT professionals scrambling. Not all high-impact flaws were the cause of panic though. The open-source Xen hypervisor that powers much of the world’s public cloud infrastructure was patched before any public exploits emerged. In this slide show, eWEEK takes a look back at the top 10 security incidents and vulnerabilities of 2014.
-
South Korean authorities have found evidence that a low-risk computer “worm” had been removed from devices connected to some nuclear plant control systems, but no harmful virus was found in reactor controls threatened by a hacker.
Korea Hydro & Nuclear Power Co Ltd said it would beef up cyber security by hiring more IT security experts and forming an oversight committee, as it came in for fresh criticism from lawmakers following recent hacks against its headquarters.
-
Defence/Police/Secrecy/Aggression
-
Combat operations in Afghanistan may be coming to an end, but a look at secret NATO documents reveals that the US and the UK were far less scrupulous in choosing targets for killing than previously believed. Drug dealers were also on the lists.
-
“Do you want to listen to Taliban cassette?” Matiullah Matie asks as he steers his white Toyota Corolla along a narrow road surrounded by cornfields and mud huts. He keeps the tapes in the car for long drives, Matie explains, just in case he picks up a hitchhiker who looks like a Talib. “They think I am such a pious mujahid man,” the round, bearded businessman laughs. “They don’t know I am screwing them all.”
-
-
Transparency Reporting
-
WikiLeaks spokesperson said that Iceland’s initiative to become the Switzerland of Bits is unlikely to move an inch further under the country’s current conservative government.
-
When Ilana Greenstein blew the whistle on mismanagement at the CIA, she tried to follow all the proper procedures.
First, she told her supervisors that she believed the agency had bungled its spying operations in Baghdad. Then, she wrote a letter to the director of the agency.
But the reaction from the intelligence agency she trusted was to suspend her clearance and order her to turn over her personal computers. The CIA then tried to get the Justice Department to open a criminal investigation of her.
Meanwhile, the agency’s inspector general, which is supposed to investigate whistleblower retaliation, never responded to her complaint about the treatment.
-
Environment/Energy/Wildlife
-
This year saw landmark reports on climate change, detailing the ever-increasing scientific certainty that human activities are driving catastrophic climate change and that action needs to be taken to prevent the worst effects. Yet despite the fact that more Americans than ever support action on climate change, conservative media went to ridiculous lengths to cast doubt on the scientific consensus behind global warming, citing everything from free market economics to witchcraft, touting conspiracy theories and predictions of an “ice age,” and even fulfilling Godwin’s law.
-
Finance
-
Bitcoin had a difficult year in which its value declined by two-thirds, but there is still much reason for optimism in 2015.
-
Here’s a news story you probably didn’t see: “Creative enterprises hub to be established in Qianhai.” You didn’t see it because it ran in the Shenzhen Standard, an English-language newspaper in China’s Guangdong province, slightly north of Hong Kong. The local government is investing $750 million to build a giant hub for design and other creative enterprises.
-
Censorship
-
Internet users in India are starting to lose to access websites including GitHub, Internet Archive, Pastebin, and Vimeo under an order from India’s DoT (Department of Telecom).
It appears an order to block the sites issued on December 17 is taking effect — albeit unevenly.
Today, Centre for Internet and Society (Bangalore, India) Policy Director Pranesh Prakash posted a copy of the notice listing the 32 blocked URLs.
-
It’s not clear why these sites have been blocked in this way, but Prakash, who is Policy Director at the Centre for Internet and Society in Bangalore, India, believes it may be because of a court order in a copyright case. He also points out that this is not the first time this has happened. However, the key nature of many of the sites affected, and the fact that entire sites, rather than just some of their pages, were blocked, is bound to lead to calls for this blunt instrument to be refined before it is used again.
-
Over 60 websites and links, including popular online tools like Github and Sourceforge used by thousands of programmers have been blocked in India, triggering angry protests by Internet users.
-
Privacy
-
Here at 31C3, Sebastian Schinzel just gave a presentation based on Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. The particular attack that caught my eye was the failure to generate a fake PMS before checking for bad padding, not after. Doing it afterwards exposes a timing difference of up to a few microseconds which can be measured over the network.
-
And, sure, it is a “threat” to the way in which the NSA snoops on everything, but for the vast majority of users, it’s a way to protect their privacy from snooping eyes. The report does reveal that certain encryption standards appear to still cause problems for the NSA, including PGP (which you already use for email, right?), OTR (used in some secure chat systems) and VoIP cryptography system ZRTP. Phil Zimmermann, who helped develop both PGP and ZRTP should be pretty damn proud of his achievements here.
-
We’ve talked quite a bit about National Security Letters (NSLs) and how the FBI/DOJ regularly abused them to get just about any information the government wanted with no oversight. As a form of an administrative subpoena — with a built in gag-order — NSLs are a great tool for the government to abuse the 4th Amendment. Recipients can’t talk about them, and no court has to review/approve them. Yet they certainly look scary to most recipients who don’t dare fight an NSL. That’s part of the reason why at least one court found them unconstitutional.
At the same time, we’ve also been talking plenty about Section 215 of the PATRIOT Act, which allows the DOJ/FBI (often working for the NSA) to go to the FISA Court and get rubberstamped court orders demanding certain “business records.” As Ed Snowden revealed, these records requests can be as broad as basically “all details on all calls.” But, since the FISA Court reviewed it, people insist it’s legal. And, of course, the FISA Court has the reputation as a rubberstamp for a reason — it almost never turns down a request.
-
THERE is no shortage of tech companies trying to replace e-mail in the workplace by offering new collaboration tools.
Workers, though, just want their e-mail.
In a new survey, 61% of US adult workers who use the internet ranked e-mail as “very important” for doing their jobs, according to Pew Research Center.
-
-
Civil Rights
-
Anti-government protesters in Russia followed along on Twitter as opposition leader Alexey Navalny live-tweeted his house-arrest violation today. But the real action was on FireChat, where Navalny and his supporters organized protests and exchanged unfiltered communication.
-
I received an update from the Maryland mom of two who was contacted by Montgomery Country Child Welfare Service in November after she let her kids, ages 6 and 10, play at the park two blocks from home by themselves. She was cited for allowing a child under age 8 “to be locked or confined in a dwelling, building, enclosure, or motor vehicle while the person charged is absent.”
The CPS worker decided “confined in a dwelling” was the same thing as “outside in a park.”
-
Internet/Net Neutrality
-
Comcast’s customer service troubles are well documented, with bad customer service experiences going viral every few months, requiring Comcast CEO Brian Roberts to trot out of his corner office to promise to do better. Just a few months ago, Comcast also excitedly hired a new “Senior VP of Customer Experience,” named Neil Smit Charlie Herrin. I hope Herrin wasn’t taking an extended vacation for the holidays, because just in time for New Year’s, yet another horrific customer experience situation has gone viral via Reddit.
-
Intellectual Monopolies
-
Copyrights
-
-
A few years ago, we wrote about some research by Paul Heald that did an astounding job visually demonstrating how much copyright law today harms the dissemination of content.
-
I agree partly with what Fung said in his column. He’s absolutely right about convenience and access being big problems for consumers.
[...]
I’ll give you a good example of this. For the longest time the popular hard rock band AC/DC refused to put its music up on iTunes and other digital outlets. The band members and their management retained a 1980s mind-set and wanted people to go to Walmart to buy CDs. Talk about being trapped in the past!
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- Links 6/1/2017: Irssi 1.0.0, KaOS 2017.01 Released
Links for the day
- Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)
A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone
- The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO
In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"
- Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern
The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)
- Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3
Links for the day
- Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released
Links for the day
- Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents
Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress
- New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)
To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies
- Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials
One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end
- Links 31/12/2016: Firefox 52 Improves Privacy, Tizen Comes to Middle East
Links for the day
- Korea's Challenge of Abusive Patents, China's Race to the Bottom, and the United States' Gradual Improvement
An outline of recent stories about patents, where patent quality is key, reflecting upon the population's interests rather than the interests of few very powerful corporations
- German Justice Minister Heiko Maas, Who Flagrantly Ignores Serious EPO Abuses, Helps Battistelli's Agenda ('Reform') With the UPC
The role played by Heiko Maas in the UPC, which would harm businesses and people all across Europe, is becoming clearer and hence his motivation/desire to keep Team Battistelli in tact, in spite of endless abuses on German soil
- Links 30/12/2016: KDE for FreeBSD, Automotive Grade Linux UCB 3.0
Links for the day