10.09.16
Posted in Europe, Patents at 7:18 am by Dr. Roy Schestowitz
Summary: Some more views of the Bremelandsgård farmstead, courtesy of Google Maps, demonstrating overlap between FJORDBLINK MEDICAL ApS and Jesper Kongstad’s residence
IN OUR previous post we wrote about a company connected to the Chairman of the Administrative Council of the European Patent Organisation (EPO) and explained why it’s of interest to us. This post contains additional information and observations including images.
If one types in the following company names into the search facility on Google Maps it recognises them and locates the company at the Bremelandsgård farmstead:
- Bremelandsgård v/Jesper Kongstad (the fur farming sole proprietorship) — to be covered in part 5 of our series
- FJORDBLINK MEDICAL ApS (the medical device company)
Google Maps was used to generate the following views of the farmstead, some with company tags (automatically provided by Google Maps) and some without.
Part 5 will focus an another controversial aspect of the above farmhouse/mansion. It’s probably a lot more than just a house for ordinary people, akin to the mansion of Kim Dotcom in New Zealand. █
Permalink
Send this to a friend
Posted in Europe, Patents at 6:55 am by Dr. Roy Schestowitz
Photo credit: DKPTO at Flickr
Summary: The next installment of the Danish saga, this time dealing with the connections between Jesper Kongstad and a private company known as FJORDBLINK MEDICAL ApS
THE END of last week culminated in part 3 about the business ventures of Jesper Kongstad, Chairman of the Administrative Council of the European Patent Organisation (EPO). In the previous article we provided an overview of the Kongstad family business conglomerate which to seems to be mainly controlled via the holding company BREMELAND HOLDING ApS whose shareholders are Jesper and Majbritt Kongstad and their three sons.
“During the time when the Jørgensens were living in Horsens Ms. Jahn Jørgensen was active in local politics as a elected councilor for the Venstre party which forms the current minority government in Denmark.”In this contribution we will take a closer look at FJORDBLINK MEDICAL ApS (CVR number 25942507) which is a private limited company 100% owned by BREMELAND HOLDING Aps. The main business of FJORDBLINK is “to develop, produce, sell and trade with medical devices”.
It should be recalled that the registered address of both BREMELAND HOLDING ApS and FJORDBLINK MEDICAL ApS is Vibelandsvej 8, Valby, 3200 Helsinge which coincidentally corresponds to that of the current Kongstad family home “Bremelandsgård” (Danish for “Bremelands farm”).
“As far as can be determined, the original priority filing for protection was filed with the DKPTO on 19 November 2014.”The English language Web site of FJORDBLINK MEDICAL ApS can be found at en.fjordblink.com.
According to the FJORDBLINK Web site, the CEO and Administrative Director is Ms. Helle Jahn who according to the Danish Central Business Register (CVR) also goes by the name of Helle Jahn Jørgensen. Not a lot is known about Ms. Jahn Jørgensen apart from the fact that she used to operate a number of small businesses including a driving school and a trading company involved in “port-related activities” in the harbour town of Horsens on the eastern coast of Denmark’s Jutland peninsula. According to available information she is married to Michael Junk Jørgensen.
“The proprietor of the utility model is registered as FJORDBLINK MEDICAL ApS of Vibelandsvej 8, Valby, 3200 Helsinge. As noted above this corresponds to the address of the current Kongstad family home.”From the CVR it appears that Michael Jørgensen is a director of TELKO DENMARK A/S which is a wholly owned subsidiary of TELKO OY a Helsinki-based company (Finland) which according to its Web site, Telko.com, is “a distributor of chemicals and polymers with local offices and warehouses in Nordic, Baltic Eastern European countries and Central Asia”.
During the time when the Jørgensens were living in Horsens Ms. Jahn Jørgensen was active in local politics as a elected councilor for the Venstre party which forms the current minority government in Denmark. As noted in an earlier article, the Minister in charge of the DKPTO is Troels Lund Poulsen, a prominent member of Venstre. It seems that the Jørgensens moved to Randers further north on the Jutland peninsula around 2013 or 2014 and it is not known if Ms. Jahn Jørgensen is still an active member of Venstre.
Returning now to FJORDBLINK MEDICAL ApS, according to information published on its Web site it has a wide-ranging network of distributors both in Europe (Germany, the Netherlands, Belgium, Italy, Portugal, Bulgaria, Greece, and Romania) and globally (China, India and Iran).
“Helle Jahn Jørgensen, the CEO of the company is named as the inventor.”Its main product is a device called the “Medical Birth Pool” which, according to its Web site was developed in collaboration with leading midwives at Danish hospitals for pain relieving water birth: “Fjordblink ® Medical’s product concept combines maximum comfort and safety for women in labor with professional requirements for functionality, ergonomics, and hygiene. Fjordblink ® Medical birth pools are therefore developed as a medical device and FJORDBLINK Medical is certified in accordance with the DS/EN ISO 13485 ISO standard.”
An interesting detail concerning the “Medical Birth Pool” is that intellectual property rights protection has been secured for it in the form of a so-called “utility model” which is also known as a “Gebrauchsmuster” in Germany.
As far as can be determined, the original priority filing for protection was filed with the DKPTO on 19 November 2014. The publication number of the Danish Utility Model Publication (“Brugsmodelskrift”) is DK 2014 00163 U3.
“The previous company name STRANDHØJ HOLDING ApS is understood to refer to the previous Kongstad family…”The proprietor of the utility model is registered as FJORDBLINK MEDICAL ApS of Vibelandsvej 8, Valby, 3200 Helsinge. As noted above this corresponds to the address of the current Kongstad family home. Helle Jahn Jørgensen, the CEO of the company is named as the inventor.
The corresponding German “Gebrauchsmuster” has the publication number DE 20 2014 105 549 U1. In line with the company’s global marketing ambitions the utility model protection has also been registered in China under the publication number CN 204337017 U [PDF]
.
According to data in the CVR, FJORDBLINK MEDICAL ApS was originally founded on 1 March 2001. From 28 December 2001 until 6 July 2006 it appears to have operated under the name KONGSTAD HOLDING ApS and from 7 July 2006 until 11 April 2013 under the name STRANDHØJ HOLDING ApS. The name FJORDBLINK MEDICAL ApS was adopted in 2013.
“Prior to 2013 it seems that Majbritt Kongstad acted as CEO and that Jesper Kongstad was the Chairperson of the Board of Directors.”The previous company name STRANDHØJ HOLDING ApS is understood to refer to the previous Kongstad family residence “Strandhøj” located at Højagervej 6, 2960 Rungsted (Google Street View).
Prior to 2013 it seems that Majbritt Kongstad acted as CEO and that Jesper Kongstad was the Chairperson of the Board of Directors. The annual accounts for the company for the period 01.01.2011 – 31.12.2011 when it was operating under the name STRANDHØJ HOLDING ApS were signed off by Jesper Kongstad on 31 May 2012. Details are in this PDF.
“In fact, during the years 2011 to 2015 significant losses were continuously registered.”In April 2013 the company underwent some internal restructuring. Majbritt Kongstad resigned her position as CEO and was replaced in this role by Helle Jahn Jørgensen. At the same time Ms. Kongstad was appointed as Chair of the Board of Directors. The other member of the Board of Directors is a Danish lawyer Ernst Ulrik Bayer who is associated with the prominent Copenhagen law firm Molke Leth.
A perusal of the company’s financial statements also reveals some interesting information. It seems that the company has not been a commercial success so far. In fact, during the years 2011 to 2015 significant losses were continuously registered. Based on CVR figures, the operating result for 2015 was a deficit of 2,412,563 DKK (approx – 323,400 EUR). In 2014 the deficit was 1,447,343 DKK (approx. – 194.014 EUR). The operating losses for the years 2013, 2012 and 2011 were respectively 928.393 DKK (approx. – 124.449 EUR), -3,842,877 DKK (approx. – 515.131 EUR) and 109.388 DKR (approx. – 14.663 EUR).
“The certificate of registration is dated 14 September 2011 and signed by the Director General of the DKPTO, Mr. Jesper Kongstad.”The annual report for 2015 contains a statement to the effect that the company has used important resources on development and quality assurance, and that 2016 again is expected to generate an operating loss (due to product development, documentation, quality assurance and marketing) while 2017 should yield an operating profit. BREMELAND HOLDING Aps, the owner of the company and the main holding company of the Kongstad family conglomerate is named as the guarantor for the deficit in 2016 while an unidentified third party has apparently given a guarantee for the company’s liabilities. See this PDF.
A further interesting detail in this saga concerns the registration of the name “FJORDBLINK” as a trademark in the Danish Register of Trade Marks under the number VR 2011 02145.
The official DKPTO correspondence concerning the registration of the trademark can be found online here.
The certificate of registration is dated 14 September 2011 and signed by the Director General of the DKPTO, Mr. Jesper Kongstad. According to the certificate the registration is valid for a period of ten years. See this PDF.
“The trademark registration application on behalf of FJORDBLINK MEDICAL P/S was apparently filed by Ms. Helle Jahn (Jørgensen) who was subsequently appointed as CEO of FJORDBLINK MEDICAL ApS in 2013.”What is striking here is the fact that the application for the trademark registration was filed in the name of FJORDBLINK MEDICAL P/S (CVR number 33392737) rather than by FJORDBLINK MEDICAL ApS (CVR number 25942507). The trademark registration application on behalf of FJORDBLINK MEDICAL P/S was apparently filed by Ms. Helle Jahn (Jørgensen) who was subsequently appointed as CEO of FJORDBLINK MEDICAL ApS in 2013. PDF here.
The CVR number 33392737 leads to a defunct limited partnership company by the name of FOME P/S with an address at Vibelandsvej 8, Valby, 3200 Helsinge.
It appears that between 31 December 2010 and 11 April 2013 the company operated under the name FJORDBLINK MEDICAL P/S and that its registered address during that period was in Randers where Helle Jahn Jørgensen resides.
According to the CVR, Majbritt Kongstad was appointed as CEO of this company on 12 April 2013 and the address was changed to Vibelandsvej 8, Valby, 3200 Helsinge. At around the same time, the lawyer Ernst Ulrik Bayer and Asger Kongstad, apparently a son of Jesper and Majbritt Kongstad, were appointed to the Board of Directors.
“The case of FJORDBLINK MEDICAL seems to throw up a lot of unanswered questions about potential conflicts of interest and there are a number of as yet unsolved riddles about its operations.”Some time thereafter on 10 October 2013 the company appears to have ceased trading. In view of the dissolution of FJORDBLINK MEDICAL P/S is unclear what has happened to the “FJORDBLINK” trademark and who, if anybody is the current assignee.
The case of FJORDBLINK MEDICAL seems to throw up a lot of unanswered questions about potential conflicts of interest and there are a number of as yet unsolved riddles about its operations. Perhaps somebody will be able to carry out further investigation in order to clarify these matters.
In case of link erosion or critical material going offline we have decided to make local copies of some documents. Included are the following items:
- Copies of utility model certificates referred to in the text for China
[PDF]
, Germany [PDF]
, and Denmark [PDF]
.
- Copies of documents relating
[PDF]
to the “FJORDLAND” trademark registration [PDF]
(in Danish).
- Copy of “Strandhoj” annual accounts
[TIF]
for 2011 signed off by Jesper Kongstad on 31 May 2012.
- One further interesting detail concerning FJORDBLINK MEDICAL ApS which has come to light is worth highlighting. The official correspondence relating to the utility model application in Denmark is available online via the DKPTO’s Web site. One of the documents submitted with the application is a power of attorney which is co-signed by Majbritt Kongstad and Helle Jahn (Jørgensen). A copy of the power of attorney is now on our server
[PDF]
, in order to assure/ensure it remains available/accessible to all.
Addendum/addenda, containing more visual items, will be published separately. █
Permalink
Send this to a friend
Posted in News Roundup at 2:26 am by Dr. Roy Schestowitz
Contents
-
One of the main Linux draws is its customization, and one of the most important areas is the desktop environment. Of the Linux desktop environments, GNOME and KDE are two of the leading environments. Tyrell Wellick (Martin Wallström) says to protagonist Elliot, “So I see you’re running Gnome! You know I’m actually on KDE myself.” Those familiar with Linux and its environments will appreciate this moment, especially Wellick’s follow up, “Yeah, I know what you’re thinking, I’m an executive running Linux, why am I even running Linux?”
Not only do we learn about KDE and GNOME, but there’s even a bit about the perception of Linux use in the enterprise (hint: it’s usually relegated to sysadmins and tech specialists, not execs).
-
Yes! You read right. While the world is realizing the power of Linux, on the other hand there are also people who are often found debating in the communities like, Reddit about how bad Linux is due to several problems. Several issues that are raised are actually myths about Linux. So here is a try from LinuxAndUbuntu to cover and clear some of the most talked Linux myths.
-
Desktop
-
Microsoft may have used its Ignite conference to trumpet Windows 10 now running on 400 million devices, but the operating system’s market share went backwards in September according to two of three traffic-watchers we track each month.
StatCounter Global Stats has Windows 10 at 24.42 per cent desktop OS market share for September, down just .01 per cent from its August share. Netmarketshare recorded a sharper dip, from August’s 22.99 per cent to a September reading of 22.53 per cent.
Both firms, as we’ve often pointed out, rely on sniffing web traffic for their numbers and that’s far from a certain way of figuring out who’s running what. Indeed, StatCounter has recently recorded a surge in “Unknown” desktop operating systems, up from 4.06 per cent in June to 6.42 per cent in September, suggesting tracking and/or methodological issues.
-
The recent Microsoft Windows 10 Anniversary Update ruffled more than a few feathers as many users are experiencing a reboot cycle.
These things are bound to happen when a company takes a cavalier attitude and constantly slipstreams updates. This is unlike the previous era of the neverending patch Tuesday. The difference: these Windows 10 updates are not optional.
-
There is much talk in the Linux world about the mythical “average user.” There is no such thing with Linux. First off, people who use Linux usually are those who know a thing or two about computers to begin with and want to take advantage of all the choices Linux offers. Linux has been considered the place for nerds, hackers and programmers for years. These folks are NOT typical at all. Secondly, it is unfortunate but true that most advanced Linux users are completely out of touch with what an average user really is.
The vast majority Windows and Mac users are those who have learned just enough to get done what they need to get done. They’re clueless about how the machines they use everyday get those tasks accomplished and the idea of popping open a bash terminal to work with configuration files or fix problems is way out of their comfort zones. This does not mean that Linux can’t offer them a safe and friendly environment to work in, far from it. Linux offers a wide variety of Graphical User Interfaces (GUIs) that make working with a Linux box a point and click affair.
-
Server
-
Docker founder Solomon Hykes officially announced the debut of the open-source Infrakit toolkit this week, in a bid to further enable DevOps to actually work.
-
Kernel Space
-
Linux creator Linus Torvalds this week apologized for including in the just-released Linux 4.8 kernel a bug fix that crashed it. The bug the dev was trying to fix has existed since Linux 3.15, “but the fix is clearly worse than the bug … since that original bug has never killed my machine,” Torvalds wrote.
-
-
-
-
-
-
-
After announcing the release of Linux kernel 4.8.1, Greg Kroah-Hartman had the pleasure of informing the community about the release of the twenty-fourth maintenance update to the Linux 4.4 LTS series.
Linux 4.4 LTS is a long-term supported kernel branch, used by some of the most stable GNU/Linux distributions, including Alpine Linux 3.4, Linux Lite 3, and Ubuntu 16.04 LTS (Xenial Xerus), and it will receive point releases that bring bug fixes and security patches, along with updated drivers for a few more years. Linux kernel 4.4.24 LTS is the latest build, and it comes just one week after the release of Linux kernel 4.4.23 LTS.
-
There is support for a number of new ARM platforms with the in-development Linux 4.9 kernel.
-
The MD subsystem updates were sent out earlier this week for the Linux 4.9 kernel merge window with a few improvements/features to note.
-
This morning the protection keys syscall interface was submitted for the Linux 4.9 merge window, the last step of adding Protection Keys support to the Linux kernel.
-
-
Graphics Stack
-
-
-
While GNOME is frequently brought up for its well-vetted Wayland support when using the latest packages, the Enlightenment desktop has also been progressing very well with its Wayland compositor and they continue making improvements to their display stack. One of these important pieces has been the Ecore_Drm2 library.
Ecore_Drm2 is part of EFL 1.18 and is their new abstraction layer for interfacing with Linux’s DRM (Direct Rendering Manager, of course).
-
On Thursday the RADV open-source Radeon Vulkan driver was merged into mainline Mesa and I provided bleeding-edge RADV vs. AMDGPU-PRO benchmark results for these two independent AMD Linux Vulkan driver implementations, plus comparison results to the OpenGL drivers in the same games. For those that have been wondering how the NVIDIA proprietary Vulkan driver compares to AMD’s two Vulkan driver options, here are some fresh benchmark results.
-
Applications
-
The tint package is now on CRAN. Its name stands for Tint Is Not Tufte and it offers a fresh take on the excellent Tufte-style html (and now also pdf) presentations.
-
Instructionals/Technical
-
Wine or Emulation
-
For those sticking to Wine 1.8.x stable releases until Wine 2.0 is released around the end of the year, Wine 1.8.5 is the latest and greatest.
Wine 1.8.5 doesn’t incorporate any of the new features building up in the Wine 1.9 development series but simply back-ports some bug fixes.
-
The Wine maintenance release 1.8.5 is now available.
-
The Wine team released yesterday sixth stable release of 1.8 branch of Wine. Version 1.8.5 has many small changes including 58 bugfixes.
This stable release contains bugfixes, new features are included in development releases from 1.9 branch.
-
Games
-
LINUX GAMING –
X-Plane, one of the most realistic flight simulators that continues to be cross-platform, will be released “this holiday season” and it offers more flying improvements and much better visuals.
The X-Plane crew announced today, “X-Plane 11 is the detailed, realistic, and modern simulator you’ve been waiting for. And it’s coming this holiday season.”
X-Plane 11 is slated to have a completely redesigned UI, improved 3D high-definition cockpits, new effects, realistic avionics, “living” airports, and a variety of new buildings, roads, and other scenery.
-
‘Enclave’ [Steam] is another Wine-port from Topware Interactive who promised to bring their older published titles to Linux. I’m totally okay with this, and it’s currently in Beta.
Wine enables us to play a great many things we otherwise wouldn’t be able to, so for developers to actually test it and release their old games with a build of Wine that works well, can only be good for us in the long run.
-
For the second time in only a few months, Overkill has managed to push out an update for PAYDAY 2 [Steam] that has completely broken the Linux version.
The developers have noted they are aware of it, but no solution has been offered as of right now.
-
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Today, October 8, 2016, KDE announced the monthly release of the KDE Frameworks project, a collection of over 70 add-on libraries to the Qt5 GUI (Graphical User Interface) toolkit.
-
-
-
-
New Releases
-
After announcing last month the release of his AryaLinux 2016.08 distribution with the MATE 1.15 desktop environment, developer Chandrakant Singh is now proud to announce the Xfce edition.
-
Superb Mini Server finally got a new updated version release after a long time period.Yes, After a long awaited time,the previous version of SMS(Superb Mini Server)2.0.8 which was released back in 2015,now in 2016 got a new release of SMS 2.0.9.
Even if the releases are less-frequent,this slackware based distribution really makes a good amount of users,who works with servers,mostly looks at this fellow distro,because of set of applications available and the environment is completely perfect for those who love to work with the web-server based developments and managements.
-
OpenSUSE/SUSE
-
-
-
In our latest report, we promised you would not have to wait another three weeks to hear (or read) from us. And here we are again, but not with any of the anticipated topics (build time reduction and Euruko 2016), but with a call for help in a topic that could really make a difference for (open)SUSE.
Nowadays, YaST team is trying to fix a long-standing issue in the installer: low-vision accessibility. In the past, a user could get a high-contrast mode just pressing shift+F4 during installation. Unfortunately, that feature does not work anymore and, to be honest, changing to a high-contrast palette is not enough. Other adjustments, like setting better font sizes, should be taken into account.
Another option is to use the textmode installation and set some obscure variable (Y2NCURSES_COLOR_THEME) to get the high-contrast mode. But it sounds like the opposite to user friendly.
-
Red Hat Family
-
Finance
-
Fedora
-
The development cycle of Fedora 25 has suffered two setbacks causing the release dates to slip, the last time with the Alpha. But not today. The release team agreed that the Beta is ready to go on time. This will be the last public build before the Final, so now is the time to report those bugs. Fedora 25 will bring some new features to test, like Ctrl-Shift-e to type in Emoji.
Jan Kurik posted this afternoon to the developers mailing list that the Fedora 25 Beta Go/No-Go Meeting had ended in a Go. There were five accepted blocker bugs earlier but the fixes are in and the team set about deciding on two proposed. The first concerned the Anaconda installer failing on RAID when it’s in a “migrating state.” It’s reproducible by creating a new RAID-1 set and immediate starting the install. However, the team decided that since the install will complete if the user waits for the initial sync to complete it wasn’t serious enough to hold up the Beta. They plan on having it fixed for Final as they’ve already decided it’s an accepted Final blocker.
-
Debian Family
-
Derivatives
-
After announcing the release of DebEX KDE Live DVD Build 161001, GNU/Linux developer Arne Exton informs us today about the availability of a new build of his DebEX GNOME Live DVD.
-
Finally a new update of many TeX related packages: all the texlive-* including the binary packages, and biber have been updated to the latest release. This upload was delayed by my travels around the world, as well as the necessity to package a new Perl module (libdatetime-calendar-julian-perl) as required by new Biber. Also, my new job leaves me only the weekends for packaging. Anyway, the packages are now uploaded and should appear soon on your friendly local server.
-
Canonical/Ubuntu
-
Looking for a Linux icon set that’s a little understated and less in your face? Check out Victory.
Bombastic name aside, there’s nothing particularly imposing about the Victory icon set. It doesn’t dominant the desktop in the way that something that some modern themes, like the bright and bashful Kylin icon set, do.
-
-
Ubuntu and machine learning is helping to bring a sense of touch to our computers, in pioneering work being done by computer scientists at the University of St Andrews.
-
-
The release date of Ubuntu 16.10 is now less than a week away — but do you plan to upgrade to the ‘Yakkety Yak’ once it arrives?
-
-
NXP unveiled its automotive i.MX8 Quad with four Cortex-A53 cores, two Cortex-M4F cores, and two GPUs. The QuadPlus and QuadMax add one and two -A72 cores.
Freescale teased its automotive i.MX8 family in 2015 before the company was acquired by NXP, a process that may have contributed to the SoC family’s delays. The first three i.MX8 models are now due to sample in Q1 2017, says NXP, which has already built a development kit for the SoC, shown farther below. In addition, plans have leaked for future i.MX8 models for multimedia and low-power IoT applications, including dual-core models (see farther below).
-
Phones
-
Tizen
-
-
-
Today, the Samsung Z3 (model SM-Z300H) smartphone got a little software update in India, taking it to version Z300HDDU0BP12. This update only measure in at 5.9MB, so nothing much to really brag about, but still worth updating. This is a maintenance release and does not bring any new features with it and is mainly for performance and bug-fixes. No change log has been provided.
-
-
Android
-
Xiaomi has officially started to sell its Google Android TV 6.0-based set-top-boxes in the U.S. The Xiaomi Mi Box STB boasts with a rather powerful SoC, an HDMI 2.0a (4K, 60 fps, HDR) video output, a Bluetooth remote with voice search feature as well as a $69 price tag. The combination of modern, capable hardware and a relatively affordable price will improve chances of Xiaomi’s STB to become popular among those who use Google’s Android TV platform.
The Xiaomi Mi is powered by Amlogic’s S905X-H SoC (four ARM Cortex-A53 cores at 2.0 GHz, five ARM Mali-450MP clusters) and is equipped with 2 GB of DDR3 memory, 8 GB of NAND flash, a wireless module supporting Wi-Fi 802.11ac and Bluetooth 4.0, a USB port as well as an HDMI 2.0a output with HDCP 2.2 and CEC. Xiaomi bundles a Bluetooth remote with a mic and voice search feature with its STB for extra convenience. In addition, the company sells its Mi Game Controller for those, who would like to play Android games on TV.
-
-
-
-
-
-
-
-
-
-
Chinese hardware upstart LeEco accidentally showed off key parts of its device lineup two weeks before the company is set to officially launch its US business Friday. The leak, which was first spotted by AndroidPolice, revealed two budget-phones as well as four different TV sets based on Google’s Android TV platform.
Product shots also show numerous LeEco-branded apps, suggesting that the company wants to use its devices to grow its entertainment services, much like it has done in China. A LeEco spokesperson didn’t immediately respond to a request for comment.
-
Last weekend, we told you that the Nokia D1C had been run through the Geekbench benchmark test. Under the terms of Microsoft’s purchase of Nokia Services and Devices back in 2014 (when the deal closed), Nokia was not allowed to produce a smartphone using the Nokia name until the fourth quarter of 2016. Now that we are in that time frame, it is more than a coincidence that an Android powered, Nokia branded phone was recently benchmarked.
The Geekbench test revealed that the device will be powered by the Snapdragon 430 chipset, and will carry 3GB of RAM. That obviously is just a small peek at the Nokia D1C’s specs. But today, the handset was run through AnTuTu, and that benchmark test has provided us with a much larger look at the phone’s specs.
-
Google is drawing a line under the Nexus brand and opening up a fresh front in the smartphone wars. The Google Pixel and Pixel XL are the first smartphones to be “Made by Google.” They may have been manufactured by HTC, but make no mistake, that G on the back is very important.
This is a major strategy shift for Google, and one that is long overdue. By taking end-to-end control of software and hardware, Google can elevate Android to the next level, addressing its major shortcomings. It’s a move that shows a willingness to stand toe-to-toe against Apple and shrug off any lingering deference to dominant Android partners like Samsung.
-
-
-
-
-
-
-
-
When I watched Chad Fowler’s GOTO Amsterdam 2014 Keynote it got me thinking about what our aims should be in life.
He mentions Joel Spolsky’s post from 2001: Good Software Takes Ten Years. Get Used To It, and says software typically only lasts five years so rarely gets to be very good.
He asks, what does it take create legacy software with a positive meaning, that is software so good that you are fondly remembered for it for many years to come.
How many very famous developers, or ex-developers are there in the world. You may disagree, but I would argue that Bill Gates is the only living person with worldwide fame partly associated with writing code.
Only big company CEOs have any chance of becoming a household name. Even Sir Tim Berners Lee has only about half as many Twitter followers as Grumpy Cat.
-
A top AT&T executive said the company will launch its Enhanced Control, Orchestration, Management, and Policy (ECOMP) platform into open source by the first quarter of 2017. And the Linux Foundation will be the host of the open source project.
In a blog post, Chris Rice, SVP of AT&T Labs Domain 2.0 Architecture and Design, said that after the company developed ECOMP, it received a tremendous amount of feedback from service providers and virtual network function (VNF) providers that wanted more details about the platform. He also said the companies wanted AT&T to publicly state that it was going to open source the project.
-
It’s autumn/fall technology conference season… but you already knew that, so what’s coming next? O’Reilly’s OSCON event is just around the corner and the conference itself has seen the launch of many new projects from OpenOffice.org to OpenStack.
-
We talk a great deal on Techdirt about the importance of free speech alongside the importance of not damning technological tools for the way third parties choose to use them. These matters can delve into minutiae in the American and Western forms of this conversation, with discussions about Section 230 protections and the like. But in other parts of the world, the conversation is much different.
Back in 2008 in Iran, for instance, the government there elected to imprison a Canadian resident of Iranian lineage, initially under a death sentence, but later commuting that sentence to mere life imprisonment. His crime? Saeed Malekpour created some open source code for sharing photos on the internet that others within Iran used for pornography.
-
As medical implants become more common, sophisticated and versatile, understanding the code that runs them is vital. A pacemaker or insulin-releasing implant can be lifesaving, but they are also vulnerable not just to malicious attacks, but also to faulty code. For commercial reasons, companies have been reluctant to open up their code to researchers. But with lives at stake, we need to be allowed to take a peek under the hood.
Over the past few years several researchers have revealed lethal vulnerabilities in the code that runs some medical implants. The late Barnaby Jack, for example, showed that pacemakers could be “hacked” to deliver lethal electric shocks. Jay Radcliffe demonstrated a way of wirelessly making an implanted insulin pump deliver a lethal dose of insulin.
But “bugs” in the code are also an issue. Researcher Marie Moe recently discovered this first-hand, when her Implantable Cardioverter Defibrillator (ICD) unexpectedly went into “safe mode”. This caused her heart rate to drop by half, with drastic consequences.
It took months for Moe to figure out what went wrong with her implant, and this was made harder because the code running in the ICD was proprietary, or closed-source. The reason? Reverse-engineering closed-source code is a crime under various laws, including the US Digital Millennium Copyright Act 1998. It is a violation of copyright, theft of intellectual property, and may be an infringement of patent law.
-
Google has released open-sourced Cartographer, a real-time simultaneous localization and mapping (SLAM) library in 2D and 3D with ROS (Robot Operating System) support. This technology which works with the open source ROS can be used by developers for many things, such as robots, drones and self-driving cars.
-
LinuxCon
-
-
-
Jim Zemlin raises an eyebrow when I say Hyperledger is rather outside Linux Foundation’s usual domain, being a bit, er, consumery.
“It’s totally enterprise,” the Foundation’s executive director tells me. “It’s infrastructure.” Just like Linux, he reckons. Hyperledger is the layer above the operating system, above Linux.
Linux is the Linux Foundation’s oldest and hardest of hard-core projects – a technology fundamental that drives economies.
-
J.P. Morgan Chase is developing a blockchain, commonly referred to as a public ledger, atop a crypto-network called Ethereum.
The system, dubbed “Quorum,” is designed to toe the line between private and public in the realm of shuffling derivatives and payments. The idea is to satisfy regulators who need seamless access to financial goings-on, while protecting the privacy of parties that don’t wish to reveal their identities nor the details of their transactions to the general public.
-
SaaS/Back End
-
Recently, we caught up with Kavitha Mariappan, who is Vice President of Marketing at Databricks, for a guest post on open source tools and data science. In this arena, she took special note of The R Project (“R”), which is a popular open source language and runtime environment for advanced analytics. She also highlighted Apache Spark and its distributed in-memory data processing, which is fueling next-generation data science.
Now, R users can leverage the popular dplyr package to sift and work with Apache Spark data. Via the sparklyr package, a dplyr interface for Spark, users can filter and aggregate Spark datasets then bring them into R for analysis and visualization, according to an RStudio blog post.
-
The latest release of widely deployed open-source cloud platform improves security, virtualization and networking.
The open-source OpenStack project released OpenStack Newton on Oct. 6, providing the second major milestone update for the cloud platform in 2016.
OpenStack Newton follows the Mitaka release, which debuted in April with a focus on simplifying cloud operations. In contrast, OpenStack Newton provides a long list of incremental updates and improvements, including improved security, container support and networking capabilities.
-
OpenStack, the massive open source project that helps enterprises run the equivalent of AWS in their own data centers, is launching the 14th major version of its software today. Newton, as this new version is called, shows how OpenStack has matured over the last few years. The focus this time is on making some of the core OpenStack services more scalable and resilient. In addition, though, the update also includes a couple of major new features. The project now better supports containers and bare metal servers, for example.
In total, more than 2,500 developers and users contributed to Newton. That gives you a pretty good sense of the scale of this project, which includes support for core data center services like compute, storage and networking, but also a wide range of smaller projects.
-
The OpenStack community today released Newton, and it’s hard to believe that this is the 14th version of the most widely deployed open source software for building clouds. “New features in the Ironic bare metal provisioning service, Magnum container orchestration cluster manager, and Kuryr container networking project more seamlessly integrate containers, virtual and physical infrastructure under one control plane,” the announcement notes. “These new capabilities address more use cases for organizations with heterogeneous environments, who are looking for speed and better developer experience with new technologies like containers, alongside workloads that require virtual machines or higher availability architectures.”
Here is more on what’s under the hood and how this new version embraces virtualization and containers.
The 14th release improves the user experience for container cluster management and networking, and the Newton release addresses scalability and resiliency. These capabilities will be demonstrated at the upcoming OpenStack Summit, happening October 25-28, in Barcelona Spain.
“The OpenStack community is focused on making clouds work better for users. This is clearly evident in the Newton release, which tackles users’ biggest needs, giving cloud operators and app developers greater security, resiliency and choice,” said Jonathan Bryce, executive director of the OpenStack Foundation. “The new features and enhancements in Newton underscore the power of OpenStack: it handles more workloads in more ways across more industries worldwide. OpenStack is a cloud platform that ties everything together—compute, network, storage, and innovative cloud technologies.”
-
Oracle/Java/LibreOffice
-
We’ve been informed by The Document Foundation’s Italo Vignoli that the next major release of the popular LibreOffice office suite, version 5.3, will soon enter development and the first bug hunting session takes place in two weeks.
-
FSF/FSFE/GNU/SFLC
-
DNS allows to resolve the name of an IP address. This is sometimes called “reverse lookup”. In fact, it is actually “normal” resolution of a PTR record. The name of such a record would be, for example, 4.4.8.8.in-addr.arpa. The .arpa TLD is managed by IANA.
This blogpost is meant to spread ideas that have been exchanged via private email and might be interesting for a broader audience. If you feel like you have useful comments, don’t hesitate to do so.
-
Openness/Sharing/Collaboration
-
Programming/Development
-
Release 7.12 of GDB, the GNU Debugger, is now available via anonymous FTP. GDB is a source-level debugger for Ada, C, C++, Objective-C, Pascal and many other languages. GDB can target (i.e., debug programs running on) more than a dozen different processor architectures, and GDB itself can run on most popular GNU/Linux, Unix and Microsoft Windows variants.
-
GDB 7.12 is now available as the latest feature release of the GNU Debugger.
Arguably most exciting about GDB 7.12 is that it now supports debugging programs written in Rust! But if Rust support doesn’t excite you, there is also some Fortran support improvements and various Python language enhancements.
-
In her LinuxCon Europe talk, “The Set of Programmers: How Math Restricts Us,” Carol Smith, Education Partnership Manager at GitHub, got us thinking about how math requirements impact our ability to bring more people into the field of computer programming.
Carol kicked off her talk with a story about how she traveled to New Zealand with two friends, Boris and Natasha (not their real names), and learned that Boris has agoraphobia, which causes him extreme anxiety in open spaces. New Zealand, as it turns out, is full of wide open spaces. During one hike, Boris really struggled with crossing the long bridge across a gully. The more he told himself he could do it, the harder it was. He felt like he should be able to do this and felt like he was the only person who couldn’t do it. A lot of people get this feeling when they try to do math. They feel like everyone else can do math, and the more they think this, the more they feel like they are the only person who can’t do math.
-
Yes it is. But it is also limited to build the Rust crate. It does one thing, very well, and easily.
Although I’m writing a GNOME application and this needs more than building the code. So I decided I need to wrap the build process into automake.
Let’s start with Autoconf for Rust Project. This post is a great introduction to solving the problem and give an actual example on doing it even though the author just uses autoconf. I need automake too, but this is a good start.
-
We have seen a changing of the guard in the past few years as software takes center stage and once-beloved hardware simply becomes a canvas for developers. The ability to code is an important skill for the production of any modern technology, especially a product that falls within the “internet of things.” If IoT developers are to create the next big thing in tech, they will need to know the most important and popular IoT coding languages. Here is a list of top coding languages providing the backbone of IoT software:
-
Nexedi, an open source software company based in France, has filed a lawsuit against Apple in Paris alleging that Apple’s App Store contract is unfair.
In a blog post, founder and CEO Jean-Paul Smets and UI designer Sven Franck said that the company has undertaken the lawsuit to force Apple to improve its support for the latest web technology in iOS.
Smets and Franck point to technical shortcomings in mobile Safari such as lack of support for HTML5 service workers, webRTC, and WebM – web technologies necessary for running applications like the OfficeJS spreadsheet and Hubl.in online conferencing.
-
The primary reason for starting this lawsuit is because we hope that it will help Apple to sooner support the latest Web and HTML5 standards on its iOS platform – the operating system used by all iPhones.
Anyone running html5test (http://html5test.com/) on his iPhone will find out that current iOS support of HTML5 Web technologies is lagging behind other platforms.
-
Standards/Consortia
-
With “Vulkan Next” likely not debuting until 2017, the Vulkan 1.0.x point releases continue with minor fixes to the Vulkan documentation.
-
On Thursday evening, Beer found himself locked out of his Skype account and had to chase Microsoft support for help.
His emails finally made their way to Microsoft’s Global Escalation Services.
On Friday evening, he was told that there were multiple users who were having trouble signing into their Skype accounts. “I believe we may be experiencing a bit of an outage,” the escalation supervisor wrote.
-
Security
-
-
Imagine for a moment that you are a security engineer who discovers a backdoor that your company execs have been trying to hide from your team. Would you quit on ethical grounds or stay so that you can prevent this from happening again? I don’t think there is one right answer. Personally I am grateful both for those who left and blew the whistle, and for those who stayed to protect Yahoo’s 800 million users.
Part of the job function of security engineers and pen testers is being ready for the moment you encounter something that you think should be disclosed but your company wants to keep secret. Think about what you would be willing to lose. Be prepared to escalate internally. Know the terms of your NDA and your exit agreement; try your best to honor them. Most of all, keep pushing for end-to-end encryption.
-
Hacker attacks that try to take down websites with a flood of bogus traffic, technically known as Distributed Denial of Service (DDoS) attacks, have become a daily occurrence on the internet. The rise of DDoS has created a cottage industry of companies dedicated to mitigating the attacks, and, on the flip side, professional DDoS-for-hire services and gangs.
Now, a group of security researchers wants to name and shame not only the hackers responsible for such crippling attacks, but also the internet providers and traffic carriers that enable them by turning a blind eye to their actions, with a project called SpoofIT.
-
I wrote the original cyber-vulnerability letter to the White House in 1994, and instead of acting responsibly, the US Government allowed NSA — with the active complicty of US communicaitons and computing provider CEOs — to compromise all US offerings. Not only are the communications and computing devices and related consulting compromised, but so are larger offerings (e.g. Boeing aircraft, which come with a computer system pre-configured for US Government remote control take-over — Lufthansa is reported to have discovered this and at great expense removed all US computers from every aircraft). NOTE: I am quite certain about both of the above indictments, but only a proper European Commission investigation can satisfy the public interest; I believe that the same problems infect C4I systems from China, France, Israel, and Russia, and I do not believe most people are aware that the electrical system is now easily used to enter computers that are nominally disconnected from the Internet.
-
A new vulnerability has been discovered that could shut down most Linux systems using a command short enough to fit in a tweet.
-
I’ve just read an interesting article entitled “who makes the IoT things under attack“, explaining that devices connected to the Internet such as router, IP cameras, IP Phones, etc.. may be used by Botnet to launch DDoS attacks, and they do so using the default username and password. So you may think once you’ve updated the firmware when available, and changes the default admin/admin in the user interface, you’d be relatively safe. You’d be wrong, because the malware mentioned in the article, Mirai, uses Telnet or SSH trying a bunch of default username and password.
That made me curious, so I scanned the ports on my TP-Link wireless router and ZTE ZXHN F600W fiber-to-the-home GPON modem pictured below, and installed by my Internet provider, the biggest in the country I live, so there may be hundred of thousands or millions of such modems in the country with the same default settings.
-
As I noted just the other day, cybersecurity should be a defensive game. Going offensive is really, really dangerous, because things will get worse, and we really don’t know what the capabilities of the other side(s) truly are. Focus on protecting critical infrastructure, not on some meaingless symbolic strike back.
But, of course, in this day and age, people seem to feel that every action requires some sort of reaction, and in a computer security realm, that’s just stupid. But it seems to be where we’re inevitably heading. The cybersecurity firms will get wonderfully rich off of this. But almost everyone will be less safe as a result.
-
Defence/Aggression
-
Saudi-led warplanes struck a funeral at a community hall in the Yemeni capital Sanaa, the country’s Houthi-run administration said on Saturday, but the coalition denied any role in the attack. More than 140 mourners were killed, according to local health officials cited by the United Nations, in an attack that prompted a strong rebuke from Washington, a key Saudi ally.
Jamie McGoldrick, a UN official in charge of humanitarian efforts in the country, said more than 525 were injured.
The death toll was 82, according to Ghazi Ismail, the administration’s acting health minister. The reason for the discrepancy in numbers was not immediately clear.
-
Russian forces could shoot down coalition jets if the United States launches airstrikes against pro-government forces in Syria, the Russian ministry of defence has said.
American officials have reportedly discussed using limited airstrikes to force Bashar al-Assad’s government to halt its assault on Aleppo and return the negotiating table after a ceasefire collapsed last month.
In Moscow’s starkest warning yet against Western intervention in the war, Russia’s chief military spokesman said that any airstrikes on government-held territory in Syria would be considered a “clear threat” to Russian servicemen.
-
Despite our unorthodox presidential election, America’s overseas military bases are largely taken for granted in today’s foreign policy debates. The U.S. maintains a veritable empire of military bases throughout the world—about 800 of them in more than 70 countries. Many view our bases as a symbol of our status as the dominant world power. But America’s forward-deployed military posture incurs substantial costs and disadvantages, exposing the U.S. to vulnerabilities and unintended consequences.
Our overseas bases simply do not pay enough dividends when it comes to core national interests. Here are seven reasons why it’s time to close them.
-
It is a plain lie that Russia was responsible for the leak of the Democratic National Committee emails to WikiLeaks. It is quite extraordinary that the Obama administration formally adopted the accusation yesterday.
The US motivation is apparently to attempt to discredit in advance the further Hillary material that WikiLeaks plans to release in the coming month. The official statement that the leak was “consistent with the methods and motivation of Russian directed efforts” is carefully written by the NSA and, when you analyse it, extremely weak. What it says is “there is no evidence whatsoever but this is the sort of thing we think the Russians do”. As it happens, I have direct knowledge that there could not have been any evidence as it was not the Russians.
-
What must the world think watching the US presidential campaign? Over time US political campaigns have become more unreal and less related to voters’ concerns, but the current one is so unreal as to be absurd.
The offshoring of American jobs by global corporations and the deregulation of the US financial system have resulted in American economic failure. One might think that this would be an issue in a presidential campaign.
The neoconservative ideology of US world hegemony is driving the US and its vassals into conflict with Russia and China. The risks of nuclear war are higher than at any previous time in history. One might think that this also would be an issue in a presidential campaign.
Instead, the issues are Trump’s legal use of tax laws and his non-hostile attitude toward President Putin of Russia.
-
What Freedland does not understand is that it was hatred of his political bubble chums which caused Brexit in the first place. The official Remain campaign director was Jack Straw’s son Will. Peter Mandelson was Vice-President. The top-down campaign was devoid of popular enthusiasm with an almost total lack of popular engagement and community events. It continually paraded figures like Blair, Cameron, Osborne, Straw, Clegg, Kinnock and others, which gave ordinary people a chance to give those they rightly despise a political kick in the pants by voting against their will. Brexit has been caused by a justified hatred of the UK political class.
That those who caused the disaster see themselves as the answer to it is laughable. I remain hopeful that the English in particular will recover from the wave of jingoism which appears to have swept over them like a plague. But resistance must be organic and arise from the people themselves. I hope to see the emergence of a new, untainted and dynamic generation of young activists. My generation have bequeathed a terrible legacy.
-
Transparency/Investigative Reporting
-
In April 2015 the New York Times published a story about a company called “Uranium One” which was sold to Russian government-controlled interests, giving Russia effective control of one-fifth of all uranium production capacity in the United States. Since uranium is considered a strategic asset, with implications for the production of nuclear weapons, the deal had to be approved by a committee composed of representatives from a number of US government agencies. Among the agencies that eventually signed off the deal was the State Department, then headed by Secretary Clinton. The Committee on Foreign Investment in the United States (CFIUS) comprises, among others, the secretaries of the Treasury, Defense, Homeland Security, Commerce and Energy.
[...]
What the Clinton campaign spokesman failed to disclose, however, was the fact that a few days before sending his rebuttal to the New York Times, Jose Fernandez wrote on the evening of the 17 April 2015 to John Podesta following a phone call from Mr Podesta (Email ID 2053): “John, It was good to talk to you this afternoon, and I appreciate your taking the time to call. As I mentioned, I would like to do all I can to support Secretary Clinton, and would welcome your advice and help in steering me to the right persons in the campaign”.
Five days after this email (22 April 2015), Clinton spokesman Brian Fallon wrote a memo to the New York Times, declaring that “Jose Fernandez has personally attested that ‘Secretary Clinton never intervened with me on any CFIUS matter’,” but Fallon failed to mention that Fernandez was hardly a neutral witness in this case, considering that he had agreed with John Podesta to play a role in the Clinton campaign.
The emails show that the contacts between John Podesta and Jose Fernandez go back to the time of internal Clinton campaign concern about the then-forthcoming book and movie “Clinton Cash” by Peter Schweizer on the financial dealings of the Clinton Foundation.
-
Assange, the notorious founder of Wikileaks, detailed plans to unleash a fresh batch of leaked documents each week until the November 7 presidential election. The first of these leaks was due yesterday, but instead of documents intended to derail the Clinton campaign, we got a plug of Assange’s book and an echo of previous statements that the leaks would come once a week between now and the election.
The documents are said to expose Clinton, the military, the oil industry, and Google.
Seriously. Google.
Eric Schmidt, former CEO of Google and its current chairman seems to be the lynchpin in Assange’s new master plan. In an excerpt from his 2014 book ‘When Google Met Wikileaks,’ Assange accuses Schmidt of having ties to the State Department when Hillary Clinton was Secretary of State and working closely with her campaign.
-
The controversial whistleblower organization WikiLeaks on Friday released emails that they say are linked to Hillary Clinton campaign chairman John Podesta.
While much of the new batch of hacked emails are benign newsletters and shared articles, one note in particular has gotten attention for offering a glimpse into Hillary Clinton’s paid Wall Street speeches. The email depicts Clinton acknowledging the security issues with using her BlackBerry and suggests that she considers herself a political moderate. It also alleges that she dreams of “open trade and open borders,” among other topics.
But some of the most intriguing excerpts come when Clinton is addressing issues of Wall Street while actually on Wall Street. In the hacked email, the Democratic presidential nominee discusses the “rigged system,” and the causes of and solutions to the financial crisis in an unguarded tone, framing large banks and investment firms as partners rather than problems.
-
Environment/Energy/Wildlife/Nature
-
Solar panels generated more electricity than coal in the past six months in a historic year for getting energy from the sun in the UK, according to a new analysis.
Research by the Carbon Brief website found that solar generated nearly 7,000 gigawatt hours of electricity between April and September, about 10 per cent more than the 6,300GwH produced by coal during the same period.
The figures represent a dramatic turnaround in the UK’s electricity supplies.
The first ever day when solar produced more than coal was only on 9 April – when there was no coal-fired electricity for the first time since 1882. But then May became the first ever month when this happened.
-
Four minutes before 10am on Friday morning, Reuters provided an update on the death toll in Haiti. At a minimum, the news agency said, 572 people had lost their lives as a result of Hurricane Matthew.
At almost precisely the same time, CNN was broadcasting live footage of the storm as it passed northwest along the coast of Florida, from where more than two million people had fled. The winds were strong, the waves powerful and there was genuine concern about the potentially deadly impact of the storm surge.
But at that moment, the number of US fatalities as a result of the category four storm was zero. The Haitian death toll barely made a mention in the network’s rolling coverage.
-
Hurricane Matthew’s devastation in Haiti has left the nation facing a humanitarian crisis as corporate media shifts its focus to the storm’s encroachment onto U.S. shores.
As the brief U.S. news coverage of Haiti dissipates, aid groups on the ground are still struggling to reach the most impacted regions, while residents grapple with flooding, mudslides, and a shortage of shelters. The storm’s 145 mile-per-hour winds also took down a bridge, tore the roofs off of houses, and damaged at least one hospital and clinic.
Matthew killed at least 11 people in the Caribbean on Tuesday, with five of those in Haiti, including a 26-year-old man who was attempting to rescue a child from a rushing river, according to the Weather Channel. However, civil protection officials warned that the death toll is hard to calculate due to the extensive damage.
“It’s the worst hurricane that I’ve seen during my life,” one official, Fidele Nicolas of Nippes, told the Associated Press. “It destroyed schools, roads, other structures.”
Marie Alta Jean-Baptiste, director of the Civil Protection Agency, also said Tuesday, “It’s much too early to know how bad things are but we do know there are a lot of houses that have been destroyed or damaged in the south.”
-
NOAA-supported scientists working in the Hawaiian Archipelago have characterized the most extensive deep coral reefs on record. They found several large areas with 100 percent coral cover and concluded that deep coral reefs have twice as many species that are unique to Hawaii than their shallow-water counterparts.
-
Finance
-
Leading foreign academics from the LSE acting as expert advisers to the UK government were told they would not be asked to contribute to government work and analysis on Brexit because they are not British nationals.
The news was met with outrage by many academics, while legal experts questioned whether it could be legal under anti-discrimination laws and senior politicians criticised it as bewildering.
“It is utterly baffling that the government is turning down expert, independent advice on Brexit simply because someone is from another country,” said Nick Clegg, the Liberal Democrats’ EU spokesman.
“This is yet more evidence of the Conservatives’ alarming embrace of petty chauvinism over rational policymaking.”
Sara Hagemann, an assistant professor at the London School of Economics who specialises in EU policymaking processes, EU treaty matters, the role of national parliaments and the consequences of EU enlargements, said she had been told her services would not be required.
-
In an attempt to keep the EU-Canada trade deal CETA on track, the European Commission has drawn up a declaration aimed at reassuring those worried by the implications of the deal. A five page document was leaked last night and has been scrutinised by lawyers and trade experts.
Guy Taylor, the trade campaigner for Global Justice Now said
“These leaked documents prove just how much trouble this toxic trade deal is in. They show a panicky commission in Brussels issuing a series of defensive declarations, organising extraordinary meetings of ministers, and staying in a permanent state of crisis to try and legitimise a trade deal that is deeply unpopular and deeply undemocratic.
-
Britons are EU citizens too. What’s missing from the practical arguments about Brexit is the recognition that a solemn social contract is being destroyed
[...]
Theresa May values “the spirit of citizenship”. I know because she said so in her speech at the Conservative party conference. She waxed lyrical about an ethos “that means you respect the bonds and obligations that make our society work. That means a commitment to the men and women who live around you.”
Forgive me if I choke on my rich tea biscuit, Theresa. I have a citizenship that I am proud of, that links me to a wider community, that guarantees me rights and freedoms, and it’s being revoked against my will.
-
James Galbraith’s articles and interviews collected in his book Welcome to the Poisoned Chalice trace his growing exasperation at the “troika” – the European Central Bank (ECB), IMF and EU bureaucracy – which refused to loosen their demand that Greece impoverish its economy to a degree worse than the Great Depression. The fight against Greece was, in a nutshell, a rejection of parliamentary democracy after the incoming Syriza coalition of left-wing parties won election in January 2015 on a platform of resisting austerity and privatization.
-
AstroTurf/Lobbying/Politics
-
Excerpts of Hillary Clinton’s remarks during paid speeches to Goldman Sachs, Deutsche Bank, Morgan Stanley, and other groups were leaked online Friday afternoon by WikiLeaks. Clinton, who was paid upwards of $225,000 per speech, earned more than $22 million on the paid speaking circuit after resigning as secretary of state.
The excerpts are revealed in an email from Tony Carrk, the research director of the Clinton campaign, to John Podesta, the campaign chairman, and other top campaign officials. Carrk, who did not respond to a request for comment, highlighted in the memo the most politically damaging quotes from each paid speech, under headers including “CLINTON ADMITS SHE IS OUT OF TOUCH,” “CLINTON SAYS YOU NEED TO HAVE A PRIVATE AND PUBLIC POSITION ON POLICY,” and “CLINTON REMARKS ARE PRO KEYSTONE AND PRO TRADE.”
The wealth Clinton accumulated was a topic at the paid events.
Discussing middle class economic anxieties, Clinton told a crowd at a Goldman Sachs-sponsored speech that she is now “kind of far removed because the life I’ve lived and the economic, you know, fortunes that my husband and I now enjoy, but I haven’t forgotten it.”
But the discussions were also an opportunity for Clinton to speak candidly about policy, politics, and her approach to governing.
-
The Office of the Director of National Intelligence and the Department of Homeland Security today jointly charged that the Russian government was responsible for directing a series of intrusions into the networks of US political organizations and state election boards. In a “joint security statement,” officials from the two agencies declared they were “confident” that the government of President Vladimir Putin was behind the hacks and the publication of data obtained from them—some of it doctored—specifically to impact the results of the upcoming US elections.
-
The U.S. said publicly for the first time that intelligence agencies are “confident that the Russian government directed” the hacking of American political groups and leaked stolen material in order to interfere with the Nov. 8 election.
“These thefts and disclosures are intended to interfere with the U.S. election process,” the Office of Director of National Intelligence and the Department of Homeland Security said in a joint statement on Friday. “We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.”
While intelligence officials had previously said privately that they blamed Russia for the attacks, Friday’s announcement puts pressure on President Barack Obama’s administration to respond even as relations with Moscow rapidly deteriorate over everything from Syria and Ukraine to nuclear cooperation.
-
In an official statement today, the Director of National Intelligence and Department of Homeland Security officially blamed Russia for stealing and publishing archived emails from the Democratic National Committee this summer.
“The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts,” the statement reads. “We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.”
-
Republican strategist Ana Navarro delivered a passionate rebuke of Donald Trump during an appearance on CNN Friday night.
Reacting to sexually aggressive comments about women the GOP nominee made in a leaked tape from 2005, Navarro said it was high time for the Republican party to call him out.
“How many times does he get away with saying something misogynistic before we call him a misogynist?” she asked. “How many times does he get away with saying something sexist before we acknowledge that he is a sexist? It is time to condemn the man.”
The former Jeb Bush supporter and John McCain adviser called Trump a “pig” and said his comments were “vile.”
-
With only 31 days to go until Election Day, a growing number of elected Republicans are demanding Donald Trump, their party’s nominee for president, step down.
-
States With an October 11 Voter Registration Deadline Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Michigan, Montana, New Mexico, Ohio, Pennsylvania, Tennessee, Texas, Utah Territories: American Samoa, District of ColumbiaNext to November 8, the most significant day in the electoral calendar this cycle may be October 11. That’s the deadline for voter registration in 16 states and territories, representing some two-fifths of the US population. The list includes seven of the top 10 states in terms of electoral votes, and several of the most hotly contested campaign battlegrounds, including Florida, Ohio and Pennsylvania.
In the 2012 election, some 66 million eligible voters, or 30 percent of the total, were unable to vote due to lack of registration. Unregistered voters account for the bulk of the US’s comparatively low voter turnout, as 90 percent of citizens who register typically go on to vote. Compared with registered voters, those who don’t register are more likely to be young, lower-income and people of color.
Despite this—or perhaps because of this—corporate media have done little to alert the public about the upcoming deadline, or about voter registration in general. A search of Nexis transcripts from the three major broadcast news outlets—ABC, CBS and NBC—turned up no stories on any news show talking about registration deadlines over the past month. (These networks do have information about voter registration deadlines on their websites—but people looking online for information about the deadlines are people who don’t need to be informed that there are deadlines.) Considering the way shows like Meet the Press and This Week and Face the Nation are obsessed with the minutiae of campaign strategy, the failure to discuss the critical factor of the voter registration timeline seems like a major gap.
-
Here’s how:
— Two days before the second presidential debate, the government of the United States officially accused Russia of a hacking campaign aimed at interfering in the U.S. election. In a joint statement, absent any specifics or technical details, the Department of Homeland Security and the Director of National Intelligence stated “the recent [hacked email] disclosures… are consistent with the methods and motivations of Russian-directed efforts… based on the scope and sensitivity of these efforts, only Russia’s senior-most officials could have authorized these activities.”
— The statement goes on to detail how only Democratic servers were attacked, meaning the American government is claiming that Russia is trying to throw the election to Donald Trump, plain and simple. It is left unsaid why the Russians would risk cyberwar with the United States to do this, as many have suggested Trump is a neocon in spirit whose loose finger will be on the nuclear button from day one. Clinton is much more of a political realist, comfortable with the business-as-usual of the past eight years that has gone in Russia’s favor in the Ukraine and Syria. She in fact seems like the stable known known, always a preference.
— Though the first “Russian” hacks were reported in July, it is only 48 hours before the second presidential debate that the statement was released. It could easily have been held until Monday, there is no national security urgency for this to come out Friday. However, with the timing, Trump, essentially tied with Clinton in the polls, will now spend much of the debate defending himself. Since the statement includes no details, only accusations, it is hard to see how anyone could defend themselves. It would be near-impossible for Trump to come out ahead Sunday night; this is a near-coup.
— Despite the certainty with which the U.S. government has accused Russia of trying to influence the election by hacking into secured email servers, the FBI maintains there is no evidence the Russians or anyone else accessed Clinton unsecured, unencrypted email server laden with actual classified materials, including during Clinton’s first trip to Moscow when she sent and received encrypted email over the Internet and WiFi.
-
Censorship/Free Speech
-
For some 11 months, the makers of the new movie “I’m Not Ashamed” about the young girl who was the first victim of the Columbine killers in Colorado in 1999 were unable to promote their movie through Youtube.
The trailer was taken down late in 2015, and the movie’s entire channel then was suspended.
It’s back now, with the movie opening on Oct. 21, but the makers still want to know why the Internet company took the damaging action.
-
Standing in Rudder Tower, the building named after his former rival, award-winning journalist and Aggie Tom DeFrank told the story of The Battalion’s censorship from Texas A&M administration during his time as an editor exactly 50 years ago on the birthday of the university.
DeFrank is currently a contributing editor for the National Journal and was the White House correspondent for Newsweek. DeFrank has covered every president since President Lyndon B. Johnson, and has written a book on President Ford titled “When I’m Gone.”
DeFrank was the speaker during the latest Aggie Agora session, a seminar and speaker series meant to educate students and community members willing to come. DeFrank’s speech focused on his time at The Battalion dealing with his advisor, Jim Lindsey, and James Earl Rudder, the 16th president of Texas A&M University, for articles depicting the university in a non-flattering light. The events eventually led to DeFrank being fired from The Battalion.
-
A statue of Mahatma Gandhi will be removed from a university campus in Ghana after professors launched a petition claiming the revered Indian independence leader and thinker was racist.
The statue of Gandhi was unveiled in June at the University of Ghana campus in Accra by Pranab Mukherjee, the president of India, as a symbol of close ties between the two countries.
-
It could be bought for just under £20 and was described as a “sexy Saudi burka Islamic costume” with “a lovely soft stretch material”.
Amazon users outraged by the product branded the online store as “disgusting racists”.
One person said: “You’re all disgusting racists. My culture is not your costume.”
While another commented: “A person’s culture is NOT a fancy dress costume,” and one more added: “Is this some sort of mockery to the religion.”
-
While we’ll try to keep the grave-dancing at a minimum, it wasn’t difficult to see this coming. Game publisher Digital Homicide has something of a history of lashing out against any negative reviews it might receive, of which there are many. Whether it is more high profile targets like well-followed YouTube game reviewers, or merely lowly Steam customers that offered reviews of Digital Homicide games, the company has taken to simply suing everyone for all the things as its reaction. It seemed easy to recognize that this was not a winning business strategy in general, but when Steam reacted to the latest attempts at litigation by simply dropping all Digital Homicide games from its store, things clearly became dire for the company.
And now the story comes to a close with a conclusion pretty much everyone saw coming: Digital Homicide has filed a motion to dismiss its lawsuit against those Steam customers, declaring the company to be financially ruined and unable to move forward with the litigation.
-
A couple weeks ago, notorious developer of crappy Steam games Digital Homicide made waves by suing 100 anonymous Steam users, who they deemed a “hate and harassment group,” for $18 million. Now, however, the suit’s been dismissed.
In a motion to dismiss filed last week, Digital Homicide said that their business had been “destroyed,” rendering them unable to continue pursuing the suit. On Friday, it was approved.
-
Waving a large Palestinian flag and holding signs reading “Stop censoring our movement,” some 15 protesters gathered outside of Mark Zuckerberg’s San Francisco house on Friday to protest Facebook’s temporary suspension of social media accounts that belong to Palestinian journalists.
Nick Pardee, a member of the Party for Socialism and Liberation, which put the protest together said the suspension of Palestinian accounts showed a pro-Israel bias. Accounts in Israel, including those of government officials, are not removed despite inciting violence against Palestine, he said.
“These people are genocidal, and Mark Zuckerberg has no interest in censoring them,” he said.
-
Ben Affleck may have sat down for a slew of in-depth interviews promoting his new film The Accountant this week, but chances are you won’t get to see them in full.
-
Derry City and Strabane District Council has asked newsagents to stop selling the Sun to show “solidarity” with the families of the 1989 Hillsborough Stadium disaster, which was gratuitously misreported by the Tory tabloid. The council also backed a Liverpool-based campaign for all shops to boycott the newspaper.
The request was proposed by Independent councillor Paul Gallagher, who has previously stood for the Irish Republican Socialist Party (IRSP), the political wing of the INLA. His motion received unanimous backing from Sinn Féin, the largest party on the council, and the SDLP. All the unionists abstained, apart from one who voted against.
-
The disappointment is echoed by others in the audience as many are still unsure where the festival stands with its ongoing controversy over artistic freedom.
Still, most are staying hopeful the festival will return to its former glory, back to normal again.
For the past two years, Asia’s premier film festival has been in a fierce battle with the Busan metropolitan Government over its decision to screen a documentary that the Busan city mayor and former BIFF chairman adamantly opposed.
The contentious film, The Diving Bell, criticized the South Korean Government’s rescue efforts in the aftermath of the Sewol Ferry disaster, which took the lives of more than 300, most of whom were high school students.
-
The Supreme Court urged on Friday the federal government to stop harassing the director of feature film ‘Maalik’ and submit a report on objectionable content in the movie.
Meanwhile, the Central Board of Film Censors (CBFC) admitted before the court that the ban on ‘Maalik’ had been imposed without investigating complainants.
The court observed that there was nothing objectionable in the film under Section 9 of the Motion Pictures Ordinance, 1979.
The two-judge bench, comprising Justice Umar Ata Bandial and Justice Qazi Faez Isa, is hearing the federal government’s appeal against the Sindh High Court judgment.
-
-
-
-
-
-
-
-
Privacy/Surveillance
-
I’ve reviewed Oliver Stone’s movie Snowden elsewhere, and it’s well worth seeing just as a movie. But of course the issues brought up by Snowden the man, and Snowden the movie, are more complex than fit into two hours.
-
The article goes on to say, “The information believed to have been stolen by Mr. Martin appears to be different in nature from Mr. Snowden’s theft, which included documents that described the depth and breadth of the NSA’s surveillance.”
The problem with all this talk about the “theft” and “stealing” of secrets is that while Snowden, one of the most prominent whistleblowers of the modern era, has indeed been charged by the federal government with theft—along with two violations of the Espionage Act—he’s been convicted of no crime. Were he to stand trial, he would no doubt try to offer a public interest defense of his actions—as the Parliamentary Assembly of the Council of Europe has urged that he be allowed to do—saying that the need to expose government wrongdoing overrode the law against unauthorized release of government documents.
The Times may believe that such a defense would be unsuccessful—and no doubt many legal experts would agree with that assessment. Still, it’s unusual for journalists to assume that someone accused of a crime is guilty, in effect taking the role of judge and jury upon themselves.
Such an assumption is particularly problematic in this case, because the same section of the legal code that is used to charge Snowden with theft of “any record, voucher, money, or thing of value” also criminalizes “whoever receives, conceals, or retains the same with intent to convert it to his use or gain, knowing it to have been embezzled, stolen, purloined or converted.” There is no explicit exception for journalists there, any more than there’s an exception for whistleblowers.
If we’re going to call Snowden’s documents “stolen,” then journalists frequently receive “stolen” records from sources and use them as the basis for stories—as the Times itself has done with documents released by Snowden. If Snowden is a thief, then the New York Times is a fence.
-
In a shift from an earlier proposal, the Federal Communications Commission’s final rules to regulate the privacy practices of internet service providers are expected to be in line with the Federal Trade Commission’s approach, according to telecom and agency sources.
FCC Chairman Tom Wheeler has two other big-ticket items on his year-end agenda, cable set-top boxes and pricing for business data lines used by banks, hospitals and the like. As such, it appears the top telecom regulator will grant the private sector’s pleas to make the new privacy regulations distinguish between “sensitive” and “nonsensitive” data.
-
I’m guessing this is the same source who went to both publications, but it continues to raise more questions about this. Forcing Yahoo to actually install code is a big, big deal and gets back to the questions raised by the DOJ trying to force Apple to do the same thing. And, once again, this is the kind of thing the government isn’t supposed to be able to do in secret. Yes, individual orders and details about who or what is being searched can and should be kept secret, but requiring a company to install code that sniffs through every email… that’s not how these things are supposed to work.
-
The National Security Agency came out in support of encryption again Wednesday, but privacy advocates were quick to contest the agency’s stance, criticizing it for having a different definition of the term than others.
Glenn Gerstell, general counsel for the NSA, stressed that the agency believes in strong encryption multiple times during a panel, “Privacy vs. Security: Beyond the Zero-Sum Game,” at Cambridge Cyber Summit here at MIT, on Wednesday.
-
-
-
-
-
Technology has always played an inextricable role in spying, and today, that means one or more data centers underpin any spying operation.
It comes as no surprise that a US surveillance outpost in the UK has a data center, as revealed by a story published last month by The Intercept, the aggressively anti-NSA investigative online magazine published by First Look Media. The story reveals an unprecedented amount of detail about the activities taking place at Menwith Hill Station, relying on classified US government documents leaked by former NSA contractor Edward Snowden.
Glenn Greenwald, one of The Intercept’s founding editors, was one of the key journalists who wrote the first series of stories based on the Snowden leaks in 2013. Greenwald wrote his for The Guardian.
-
Ex-Yahoo employees have spoken anonymously to Motherboard about the news that Yahoo had built an “email scanner” for a US security agency, likely the FBI or the NSA. These sources — at least one of whom worked on the security team — say that in actuality, the NSA or FBI had secretly installed a “rootkit” on Yahoo’s mail servers and that this was discovered by the Yahoo security team (who had not been apprised of it), who, believing the company had been hacked, sounded the alarm, only to have the company executives tell them that the US government had installed the tool.
The sources in the article say that the “rootkit” was “buggy” and “poorly designed.”
In the security world, a rootkit is a program that changes the operating system to create administrative (“root”) access that is invisible to the system’s actual administrator. For example, in 2005, Sony-BMG put a covert rootkit installer on more than six million audio CDs; when inserted into Windows computers, these CDs silently updated the Windows kernel so that it would not report the existence of files or processes whose names started with “$sys$”. Then the CDs installed an anti-ripping program that started with $sys$ and tried to shut down any attempt to rip an audio CD — because the program started with $sys$, users and their anti-virus software couldn’t see the programs’ files on their drives, nor would the programs appear in the computers’ process list.
-
So, one of the things in the USA Freedom Act is a provision requiring that the White House declassify any “novel interpretations” of the law in ordering surveillance. This was to avoid the situations, such as under the Section 215 program, where the intelligence community reads words to mean things differently than anyone else would read them. Now, given what we’ve learned so far about the Yahoo email scanning case and the fact that it clearly goes beyond what people thought the law enabled, it seems clear that there’s some interpretation somewhere that’s “novel.”
-
Furthermore, it finds that the 68-day gap between the seizure and search was unreasonable. The state argued that the investigation was “complex,” but the court points out investigators obtained five other search warrants during that same time period.
Even if it had been more timely in its acquisition of a warrant, that still wouldn’t have been able to rescue the evidence it located on the suspect’s phone. Because the underlying seizure was performed without probable cause, the use of a warrant for the search did nothing but create a paper trail for “poisoned fruit.”
Hopefully this reversal will deter future seizure attempts by state and local law enforcement. Without the ruling in place, anything from cars to computers could end up being taken and held by police under the assumption that criminals use such items. That’s not probable cause. That’s not even reasonable suspicion. It’s fishing expeditions waiting to happen and speculation taking precedent over Fourth Amendment protections.
-
Well, this is somewhat unexpected. Earlier this year, we noted that Congress was working on a plan to undermine the Privacy and Civil Liberties Oversight Board (PCLOB). But apparently, the Intelligence Community, in the form of Director of National Intelligence, James Clapper, is against this idea.
The PCLOB was initially created as part of the PATRIOT Act, but was basically given no real power. In 2007, Congress finally gave it a bit more power and independence, only to watch both the Bush and Obama administrations ignore it by not appointing anyone to the board. That finally changed in 2012 — just in time for the Snowden leaks (though it has been without a chairperson, since the last one left earlier this year). The PCLOB then put out a scathing report about the NSA’s mass surveillance on Americans under the Section 215 program, though it wasn’t as concerned about PRISM and upstream collection under the Section 702 program. For years now, the PCLOB has supposedly been investigating surveillance under Executive Order 12333, which we’ve been told by insiders is the main program the NSA relies on for surveillance (the others just fill in the gaps).
-
After the US/EU “safe harbor” on data protection was tossed out thanks to NSA spying being incompatible with EU rights, everyone had tried to patch things up with the so-called “Privacy Shield.” As we noted at the time, as long as the NSA’s mass surveillance remained in place, the Privacy Shield agreement would fail as well. This wasn’t that difficult to predict.
And there are already some challenges to the Privacy Shield underway, including by Max Schrems, who brought the original challenge that invalidated the old safe harbor. But things may have accelerated a bit this week with the story of Yahoo scanning all emails. This news has woken up a bunch of EU politicians and data protection officials, leading to some serious questions about whether it violates the Privacy Shield agreement.
-
The Snowden Effect continues. In addition to actual oversight finally being applied to surveillance programs, the breadth and scope of some programs continues to be narrowed. Some of this narrowing has been forced on the NSA by legislation. But some of it also appears to be shame-related. It’s no longer as acceptable to harvest vast amounts of data domestically, apparently.
Shane Harris at The Daily Beast notes that the latest Inspector General’s report [PDF] details a sharp decline in Section 215 requests since Snowden’s debut leak in June 2013.
-
Imagine a futuristic society in which robots are deployed to everybody’s house, fulfilling a mission to scan the inside of each and every residence. Does that mental image look far-off and futuristic? Well, this week’s Yahoo e-mail surveillance revelations perhaps prove this intrusive robot scenario has already arrived in the digital world.
Days ago, Reuters cited anonymous sources and reported that Yahoo covertly built a secret “custom software program to search all of its customers’ incoming e-mails for specific information.” Yahoo, the report noted, “complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI.”
Reuters then followed up, saying Yahoo acted at the behest of the secret Foreign Intelligence Surveillance Court. Not to be outdone, The New York Times reported Yahoo used its system designed to scan for child pornography and spam to search for messages containing an undisclosed “signature.” The Times said a FISA judge found probable cause to believe that this digital signature “was uniquely used by a foreign power.” The scanning has ceased, the report noted, but neither of the news agencies said how long the search lasted and when it began.
Yahoo denies how the reports portrayed its assistance, saying they are “misleading.” Other tech companies have denied participating in such surveillance as it was outlined in those reports.
-
Elizabeth Martin told the New York Times she would be shocked if her former husband Harold, whom she has not seen since 2009, betrayed his country by deliberately passing on government secrets.
Harold Martin, 51, from Glen Burnie, Maryland, was secretly arrested by the FBI in August after federal prosecutors said he illegally removed highly classified information and stored the material in his home and car. Martin worked for the same NSA contractor, Booz Allen Hamilton, that employed the whistleblower Edward Snowden, but his own motive remains a mystery.
-
Investigators have little doubt that a National Security Agency contractor arrested in August hoarded mountains of classified material, but so far they’ve found no evidence that he leaked anything to anyone, The New York Times reported Friday.
-
“While very few details are available about the case of another NSA contractor stealing confidential information, based on the information available thus far, there are some observations that can be made.
Mainly, there is no easy way to characterize insider threats.
-
-
On a half-dozen occasions in the last three years, top-secret information has leaked from the National Security Agency and appeared on the web. Government analysts concluded with alarm that the documents, including intercepted communications from Europe and Japan and the computer code for the N.S.A.’s hacking tools, had not come from the huge collection taken by Edward J. Snowden.
That meant there was at least one more leaker still at large, and when F.B.I. agents found in August that a former agency contractor had been taking home top-secret material, they thought they might have the culprit.
Now they are not so sure.
Harold T. Martin III, the contractor arrested by the F.B.I. on Aug. 27, brazenly violated basic security rules, taking home a staggering quantity of highly classified material. He had been doing this undetected, agency officials were chagrined to learn, since the late 1990s. But, officials say, they have not been able to definitively connect Mr. Martin, 51, a Navy veteran, to the leaked documents.
-
European Union privacy watchdogs are concerned by reports that Yahoo has been secretly scanning its users’ email at the request of U.S. intelligence services.
“It goes far beyond what is acceptable,” said Johannes Caspar, Commissioner for Data Protection and Freedom of Information in Hamburg, Germany.
Reuters reported on Tuesday that Yahoo had built a system for U.S. government agencies to search all of its users’ incoming emails. Other tech companies were quick to distance themselves, saying they would have challenged any such request in court.
-
The revelation this week that Yahoo scanned the incoming emails of hundreds of millions of Yahoo users set off a storm of condemnation. The real outrage is that this kind of government surveillance, frequently abetted by the collaboration of telecom and tech companies, is pervasive and has little or no oversight.
As told by Reuters and the New York Times, Yahoo received a secret order last year from a judge of the Foreign Intelligence Surveillance Court (FISC) that compelled the company to customize an existing scanning system (used to find and report child pornography and malware) to search emails for a computer “signature” tied to the communications of a state-sponsored terrorist organization. Emails containing the signature were turned over to the NSA or FBI — and Yahoo was barred from disclosing the matter.
-
-
Earlier this year, as you recall, there were two big cases in which the DOJ and FBI sought to force Apple to make significant technological changes to iPhone software in order to allow the DOJ to brute force the passcode on some iPhones used by some criminals. Eventually, after Apple (and others) pushed back, and public opinion was turning against the FBI, the DOJ miraculously announced that it found its way into both iPhones and the cases were dropped. But the issue of forcing companies (and Apple especially) to backdoor their way into encrypted iPhones certainly has not been dropped. And it appears that the FBI may be testing the waters to see if it can try again.
-
IT IS TIME to look up déjà vu in the dictionary. The FBI needs to unlock another iPhone and it still doesn’t know how to do it, despite making all that fuss about the San Bernadino one.
A report on Wired from an FBI press conference after a mass stabbing in America said that the FBI is in possession of an iPhone that belonged to now dead assailant Dahir Adan.
FBI special agent Rich Thorton told the conference that it would be handy to get into the phone and find out more about Adan, but that the FBI can’t. He explained that the search for a solution is on. Again.
“Dahir Adan’s iPhone is locked. We are in the process of assessing our legal and technical options to gain access to this device and the data it may contain,” he said.
We thought that the FBI had this sorted. The agency made a lot of fuss when it set about breaking into the iPhone 5C of San Bernardino gunman Syed Farook earlier this year.
-
Facebook is watching you.
The social media giant won the “Big Brother” Award in Belgium on Thursday. The award is named after the dystopian government surveillance in George Orwell’s “1984,” and given to the “biggest privacy-offender of the year,” according to the Flemish League for Human rights, which runs the awards, and its partners.
Facebook, nominated by international digital advocacy group EDRi, won after being criticized for its default privacy settings in a unanimous decision. The social network didn’t respond to requests for comment.
“Facebook has access to a wide range of personal data, and it tracks your movements across the web, whether you are logged in or not,” EDRi said. “And the devil is in the default: To opt out, you are expected to navigate Facebook’s complex web of settings.”
-
Civil Rights/Policing
-
It’s harder to get the police to believe somebody has 26 bodies buried in their backyard — which is probably why the police so rarely get tipped off about that sort of thing.
-
On May 31, the city of Chicago agreed to settle a whistleblower lawsuit brought by two police officers who allege they suffered retaliation for reporting and investigating criminal activity by fellow officers. The settlement, for $2 million, was announced moments before the trial was to begin.
As the trial date approached, city lawyers had made a motion to exclude the words “code of silence” from the proceedings. Not only was the motion denied, but the judge ruled that Mayor Rahm Emanuel could be called to testify about what he meant when he used the term in a speech he delivered to the City Council last December, at the height of the political firestorm provoked by the police shooting of 17-year-old Laquan McDonald.
In that speech, Emanuel broke with the city’s long history of denying the existence of the code of silence. He spoke of “problems at the very heart of the policing profession,” and said: “This problem is sometimes referred to as the Thin Blue Line. Other times it’s referred to as the code of silence. It is the tendency to ignore, deny, or in some cases cover up the bad actions of a colleague or colleagues.”
-
-
-
-
My flight touched down at Bangkok’s Suvarnabhumi airport without any problems, at about midnight on 5 October. I had been invited to share my experiences of Hong Kong’s umbrella movement at two universities in Bangkok and to talk about becoming a young politician.
But as I left the plane, I started to feel paranoid that officials at the immigration counter might take me away and deport me back to Hong Kong on the very same flight. A strange feeling came over me. I could see more staff than usual ahead of me. But there was nowhere else to go. When I stepped on to the bridge leading off the plane, I saw a crowd of immigration police. I knew something was wrong.
What surprised me was that, unlike when I was refused entry to Malaysia – in May 2015, this time I didn’t have to go to the counter to be taken away. This time the officials came to meet me.
They asked if I was Joshua Wong. I told them I was.
-
A prominent local media executive fired from Yahoo last year has filed a lawsuit accusing CEO Marissa Mayer of leading a campaign to purge male employees.
“Mayer encouraged and fostered the use of (an employee performance-rating system) to accommodate management’s subjective biases and personal opinions, to the detriment of Yahoo’s male employees,” said the suit by Scott Ard filed this week in federal district court in San Jose.
Ard, who worked for Yahoo for 3 ½ years until January 2015, is now editor-in-chief of the Silicon Valley Business Journal. His lawsuit also claims that Yahoo illegally fired large numbers of workers ousted under a performance-rating system imposed by Mayer. That allegation was not tied to gender.
Yahoo spokeswoman Carolyn Clark defended the company’s hiring and performance-review processes, which she said are guided by “fairness.”
“This lawsuit has no merit. With the unwavering support of our CEO, we are focused on hiring employees with broad and varied backgrounds, and perspectives,” Clark said. “Our performance-review process was developed to allow employees at all levels of the company to receive meaningful, regular and actionable feedback from others.
-
The complaint (PDF) filed by Scott Ard says that Yahoo’s “stack ranking” system was “without oversight or accountability” and was “more arbitrary and discriminatory” than stack ranking used by other companies.
The lawsuit claims that Yahoo’s Media Org employees were ranked from 0.0 to 5.0 before being subject to a “calibration” process by higher-level management. Ard claims employees weren’t told their numeric ranking but were only informed of their “Bucket” ranking, labeled “Greatly Exceeds, “Exceeds,” “Achieves,” “Occasionally Misses,” or “Misses.”
Ard was hired at Yahoo in 2011, where he had editorial control of the Yahoo.com homepage. In 2014, following a leadership change that put Chief Marketing Officer Kathy Savitt in charge of Media Org, Ard was shifted to a role in which he managed Yahoo Autos, Yahoo Shopping, and Yahoo Small Business.
-
Vanessa Rodel didn’t realize she was sheltering the most wanted man in the world until the morning after he showed up unexpectedly at her door.
Her houseguest from the United States had requested a newspaper. She discovered his high-profile identity when she recognized Edward Snowden’s face on the front page of the Hong Kong daily.
“I said ‘oh my God,’” Rodel told CNN. “The most wanted man in the world is in my house!”
The next Snowden arrested?
Rodel — who fled the Philippines — is one of several asylum seekers in Hong Kong who are now going public with a secret they kept for years.
For weeks in 2013, these impoverished people took turns hiding the man behind one of the biggest intelligence leaks in US history.
-
It’s one thing to bring in an e-voting system that most experts say is a bad idea in theory. But making it effectively illegal to point out flaws that exist in practice is really asking for trouble. Unless this proposed law is changed to allow independent scrutiny of the systems, Argentina will probably find this out the hard way.
-
Just last week, there were fresh claims about CIA torture of detainees at a black site in Afghanistan. Two Tunisian men told Human Rights Watch they were strapped to a board and held with their heads upside down in a barrel of water. They were beaten with metal rods, anally raped and threatened with a makeshift electric chair.
Yet the Senate Intelligence Committee, led by Sen. Richard Burr, still won’t release its full report on what was done to CIA captives.
-
In short: the government has not barred foreign academics from providing policy advice, at least not in any legal or other formal way.
To do so would be almost certainly unlawful: for example, the government would be in breach of the law of public procurement if it discriminated in favour of UK citizens instead of EU citizens when commissioning research services.
And there is no such bar set out in any published government document; it seems not to be in any contract specification or tendering document; and there does not even seem to be any written communication from the FCO stating the bar.
But senior managers at the London School of Economics (LSE) believed they had been told by the Foreign and Commonwealth Office (FCO) that there was now such a bar.
How did LSE senior managers come to believe the FCO had said there was such a bar?
-
History demonstrates the evils that arise from whipping up popular xenophobic nationalism. After the Tories trumpeted that companies will have to declare how many foreigners they employ, that foreign doctors will be phased out of the NHS, that taxi drivers will have to prove their immigration status, that fewer foreigners will be allowed to study at British universities and that landlords will have to check the papers of their foreign tenants, we will now be told by Theresa May that to oppose this surge of fascism is elitism. I call it fascist after careful consideration; I don’t know what else to call it. Immigrants to Britain are going to be hauled up to produce documents at numerous moments of daily life to prove their right to be here. They will not yet need to be identified by yellow stars, but anybody who does not see the direction of travel is a fool.
The ability of politicians and media to whip up popular racism is well demonstrated historical fact. I am simply appalled by the catalogue I have outlined above. It is astonishing to me that popular opinion, particularly in England, has been conditioned to the point where outright racism has become the accepted everyday level of political discourse. And it is not just the Tories. Blairites are using populist anti-immigrant rhetoric as their most potent attack on Corbyn. Rachel Reeves made a speech last week that channelled Enoch Powell in predicting violent reaction to immigrants, and in some ways was worse than Powell’s classical allusion. But while Powell’s anti-immigrant rant ended his chances of becoming Prime Minister in a more decent age, Reeves is firmly in today’s UK establishment mainstream.
The argument that immigration is impacting the living standards of ordinary working people is a demonstrable falsehood. If mass immigration made a country’s people poorer, then Germany and the USA would have the lowest living standards for ordinary citizens in the world. An economy is not a thing of fixed size with a set number of jobs. If it were not for immigration, there would have been no economic growth in the UK at all since the millennium.
-
But Burton seems not to be alone in feeling the need to convey that message to a young audience. The animated film How to Train Your Dragon 2 also featured an all-white cast of characters—except for the villain, Drago Bludvist, who is depicted as dark-skinned, hook-nosed and dreadlocked, and voiced by Djimon Hounsou, an actor from Benin…
-
Internet Policy/Net Neutrality
-
Facebook is reportedly bringing its campaign to connect millions more people to the Web to its own backyard.
As The Washington Post reports, the social network is reportedly in talks with government officials and wireless carriers to bring its Free Basics mobile app to North America and serve the 37 million US residents who are not currently using the Internet. Facebook is reportedly looking for a way to roll out Free Basics without running afoul of net neutrality rules, which derailed the program in India.
Similar to global versions, the US Free Basics would target low-income and rural Americans who can’t afford a reliable, high-speed Web connection at home or on their phone. The app allows folks to stretch their data plans by offering free Internet access to online resources like news, health information, and job offers.
Exactly which apps will be included have not been determined, though Facebook will likely be among them.
-
The hack of the Democratic National Committee this past summer, allegedly by Russia, prompted a political firestorm, but didn’t cause even a ripple in the US economy.
But imagine the economic firestorm that would result if online attackers brought the entire internet down, even temporarily.
You may not have to imagine it, according to Bruce Schneier, CTO of Resilient Systems, cryptography guru, blogger and international authority on internet security. In a recent post titled, “Someone is Learning How to Take Down the Internet,” he wrote that he had been told by multiple sources that, ““someone has been probing the defenses of … some of the major companies that provide the basic infrastructure that makes the Internet work.”
But according to some of his fellow security experts, you don’t really need to imagine it, since the chances of the internet really being taken down are remote. And even if it happens, it won’t cause catastrophic damage. Several commenters on Schneier’s post wondered why even hostile actors would want to take down the internet, since if they do, they won’t be able to use it either.
-
For years, we’ve noted how there’s absolutely zero financial or technical justification for usage caps on fixed-line networks. They don’t really help manage congestion, and as any incumbent ISP earnings report indicates, flat-rate broadband has proven incredibly profitable. But thanks to limited competition, caps are a great way to raise rates, hamstring streaming video competitors, and give incumbents a distinct advantage for their own services (aka zero rating). Ultimately, caps disadvantage startups and small businesses, while making broadband more expensive and confusing for everyone.
Needless to say, Comcast is pursuing this option with reckless abandon.
-
DRM
-
This week, the chief arbiter of Web standards, Tim Berners-Lee, decided not to exercise his power to extend the development timeline for the Encrypted Media Extensions (EME) Web technology standard. The EME standardization effort, sponsored by streaming giants like Google and Netflix, aims to make it cheaper and more efficient to impose Digital Restrictions Management (DRM) systems on Web users. The streaming companies’ representatives within the World Wide Web Consortium (W3C) were unable to finish EME within the time allotted by the W3C, and had asked Berners-Lee for an extension through next year.
Berners-Lee made his surprising decision on Tuesday, as explained in an email announcement by W3C representative Philippe Le Hégaret. Instead of granting a time extension — as he has already done once — Berners-Lee delegated the decision to the W3C’s general decision-making body, the Advisory Committee. The Advisory Committee includes diverse entities from universities to companies to nonprofits, and it is divided as to whether EME should be part of Web standards. It is entirely possible that the Advisory Committee will reject the time extension and terminate EME development, marking an important victory for the free Web.
-
HP to remove DRM from printers: In a statement that was full of we-did-it-to-protect-you rhetoric, HP has said that it’s going to remove DRM that it installed as an update on certain models of its printers that prevented users from using ink cartridges with security chips not manufactured by HP.
-
Intellectual Monopolies
-
The member governments of the UN World Intellectual Property Organization, after considering a confidential UN investigation report on whistleblower charges against WIPO Director General Francis Gurry, have decided to end the case without discipline, WIPO has said. Instead, members are working to bolster whistleblower protections, internal oversight and procurement procedures at the agency for the future.
-
Member governments of the UN World Intellectual Property Organization (WIPO) are working intensively in a closed-door session today to make changes to the way allegations of wrongdoing against high-ranking WIPO officials are handled. What is not clear from the secretive discussions is whether any action will be taken against the director general as a result of a UN investigation of his activities, for which the UN report is on the meeting agenda.
-
Backpage.com has been the target of lots of moralizing, grandstanding law enforcement types, who absolutely hate the fact that there’s a classified site out there where some users use it for prostitution (I know that some of the comments will discuss the question of whether or not prostitution should even be a crime, but right now it is, and so this article won’t focus on that other discussion). As we’ve noted time and time again, it’s bizarre that law enforcement folks keep blaming the platforms, when those platforms are actually really useful for law enforcement to track down, arrest, prosecute and convict people actually breaking the law. Still, the grandstanding forced Craigslist to completely shut down its adult section, and most of that traffic moved over to Backpage.
And now, the CEO of Backpage, Carl Ferrer, has been arrested in Texas for “pimping,” with both Texas Attorney General Ken Paxton and California Attorney General Kamala Harris pushing out grandstanding press releases to talk about how tough on prostitution and pimping they are.
There’s just one big problem in all of this: the charges are almost certainly completely bogus, and Harris and Paxton are flat out ignoring federal law on this matter. Specifically, they’re ignoring the law we talk about all the time: Section 230 of the Communications Decency Act. As we’ve noted over and over again, CDA 230 says that internet platforms are not liable for the content created by users. There’s an exception for federal criminal acts, but not for states. Various state Attorneys General have been whining about this for years, and demanding Section 230 get a new exception just for them, but that hasn’t happened. So Harris and Paxton clearly know about Section 230, and clearly know that they’re just ignoring the law. They apparently don’t care. They’re either too focused on the publicity grandstanding value of pretending like they’re “tough on crime,” or they’re hoping that by presenting emotional stories, they’ll win over judges and convince them to ignore Section 230.
-
The news that WIPO member states have endorsed a decision taken by the organisation’s Coordination Committee to drop any further investigation of the allegations of serious misconduct levelled against the organisation’s Director-General Francis Gurry is no surprise; a few days ago this blog predicted it would happen. However, for anyone who believes that the IP system is best served by transparency and accountability, the fact this outcome was so predictable does not make it any less depressing.
Ever since the then WIPO deputy Director-General James Pooley first accused Gurry of being involved in taking WIPO staff members’ DNA and in interfering to alter the outcome of a procurement process in his April 2014 Report of Misconduct, IAM has taken no position on the claims. We don’t know if they were true; but we do know that they should have been investigated quickly, thoroughly, independently and with full protection for witnesses.
-
Copyrights
-
It seems each day more people are willing to share ever more personal things on the Internet. Along these lines, in May of this year Kali Kanongataa a California resident used Facebook to live stream his wife giving birth. After portions the live stream ended up on television and publicized on the Internet, he sued ABC and Yahoo for allegedly infringing his copyright by displaying the video.
The day after the live stream, ABC’s “Good Morning America” ran a short segment about the live stream and showed a brief excerpt from the video that was up loaded by Mr. Kanogataa which had been widely viewed online since this airing. The clip also appeared on Yahoo, which has a partnership with ABC.
-
Pokémon Go is not available to buy in India so the game is being heavily pirated by fans. With legal moves underway to try and bring this behavior to a halt, the Gujarat High Court is now seeking advice on how to stop downloads to protect the public interest.
-
Streaming piracy is on the rise with the popular media center Kodi at the center of attention. While Kodi itself is a neutral platform, millions of people use third-party add-ons to turn it into the ultimate pirate machine. In less than a year, the leading add-on repository has seen the number of unique users double, which may be just the beginning.
Permalink
Send this to a friend
10.07.16
Posted in News Roundup at 10:06 pm by Dr. Roy Schestowitz
Contents
-
There are plenty of useful and well-thought-out features on Tesla’s 17-in touchscreen, but the internet browser is not one of them. For years now, we have been used to high-speed internet browsing on our laptops, desktop and now even or phones, but Tesla’s browser is so slow that it feels like it’s from another era.
Model S and X owners have been asking for an update to the browser for a long time and unfortunately, it didn’t come with the recent 8.0 update, but Tesla CEO Elon Musk said yesterday that it will with an upcoming update, which will likely be in December.
Tesla’s operating system is built on a modified version of Linux Ubuntu. Musk says that Tesla aims to upgrade the Linux OS to 4.4 in Tesla vehicles in December. That’s when he expects they will be able to update the browser.
-
Desktop/Microsoft
-
Perhaps the world has gone truly mad. Or maybe Microsoft’s trying to pull the wool over our eyes prior to its major shift in patching strategy — the patchocalypse — widely anticipated this month. It’s even possible Microsoft wants to bring back the “Get Windows 10″ campaign, to drive Windows’ reputation even deeper into the dirt.
A Microsoft spokesman says it isn’t bringing back the “Get Windows 10″ campaign, but our old nemesis KB 2952664 reappeared suddenly yesterday afternoon, and Windows users are livid — and scared.
-
Login issues at Skype have bitten iTWire, with editor-in-chief Stan Beer being told his account has been suspended. After 16 hours of waiting, he is still unable to log in, and Microsoft now says it has lost his account and all its data.
A furious Beer would not rule out legal action. “This is unacceptable. I have been using my account practically every day for the past 10 years. It is vital to the operation of my company. If I do not have it reinstated immediately I will have no alternative but to consider my options and take legal action,” he said.
An email just received from Microsoft’s support team said: “We have checked our records and your account does not exist in the Microsoft system. Please check the spelling of your account. If you are sure this is the correct Microsoft account, it is also possible that it has expired due to inactivity.
“Your account will expire if you do not sign in regularly or within the first 10 days after registration. When the account is deleted, all messages, folders, and contacts are deleted as well. Incoming messages will be sent back to the sender as undeliverable, but the user name is immediately available for registration.”
After suffering repeated issues with Windows over many years, Beer thought he had escaped the clutches of Microsoft when he switched to OS X.
But last evening he was given a sharp reminder that the Typhoid Mary of the Internet has a long reach and can still foul up one’s day.
-
When you have data you want to get rid of forever, whom are you going to call? There’s one sure place to go: Redmond. You are assured of losing your data when you hand it to Microsoft.
The company is not in the habit of keeping backups. That’s so yesterday.
No, Microsoft is out there in front of them all, modern-looking chief executive Satya Nadella in the lead, preaching the gospel of getting rid of the old and welcoming in the new.
The bitter truth must now be acknowledged: veteran tech journo Bob Cringely said it first and I have repeated it for some time, but never seen it up so close. Microsoft is a marketing company, not a technology company.
-
When Lenovo released the Yoga 900-13ISK2 it became apparent that Linux and BSD users could not rely on closed source BIOSes. Of course while it is rather naive to think that a Microsoft Signature Edition PC would be Linux friendly, one could hope that at least it would not be Linux or BSD hostile. On further analysis one can see that this is not the case, and any would-be Linux user is in for a very difficult time trying to load any operating system other than Windows 10.
The exact reasons for this problem boil down to the inability of the BIOS to set Advanced Host Controller Interface (AHCI) mode for the SSD. Now I knew long ago that closed source BIOSes could become a problem back in the mid-1990s. I’ve spent considerable time researching the ways one can obtain a computer with FOSS firmware.
Before I go into the specifics of which computers actually have a BIOS with freely available source code allow me to recap some computer history. When we look at the original IBM PC BIOS we can see that it’s been well analyzed and that no other operating systems have been locked out. In addition to this there was no way to alter the BIOS save for swapping out the BIOS chip and putting in a different one. So for several years people didn’t give much thought to the BIOS, as long as their computer booted they could load whatever operating system they wanted, be it Unix, Minix, MS-DOS, CP/M, etc.
-
Server
-
With ContainerCon Europe currently underway in Berlin, we want to share some of the great progress the Open Container Initiative (OCI) has made.
The OCI was launched with the express purpose of developing standards for the container format and runtime that will give everyone the ability to fully commit to container technologies today without worrying that their current choice of infrastructure, cloud provider or tooling will lock them in.
-
A tweak to Microsoft’s Outlook.com cloud service has blocked a good number of people from accessing their messages.
Specifically, the baffling and unannounced change affects Outlook.com users with connected accounts: these are email accounts hosted on third-party servers (such as a company’s private server or an ISP’s mail server) that are accessed via the Outlook.com cloud. People with this setup are no longer able to send or receive mail through Redmond’s webmail service.
Reg reader David Barrett, who runs an internet-facing server for his friends and a UK health charity, said the issue has left those users who run Outlook.com with outside mail systems unable to get their email for days now.
“It happened around the end of last week/over the weekend and seems to have been a gradual rollout,” he told us.
-
Kernel Space
-
TODAY’S Legend of Linux is Ralf Flaxa, president of engineering at Suse (that’s the one with the gecko logo).
Flaxa has worked on Linux since the beginning and has been at Suse since 2002 in charge of several projects that have been rolled out not just at Suse but across the whole Linux ecosystem.
-
The release v2.29 (now rc1) is without dramatical changes, the small exception is libsmartcols where we have many improvements.
The old good cal(1) is more user-friendly now. It’s possible to specify month by name (e.g. “cal January 2017″) and use relative placeholders,
-
Today, October 7, 2016, renowned Linux kernel maintainer Greg Kroah-Hartman proudly announced the availability of the first point release to the latest Linux 4.8 kernel series.
-
-
-
-
Linux pioneer Linus Torvalds is a stand-up guy — he says what he feels. There’s no sugarcoating, and he’ll admit to faults, like recent issues with the Linux 4.8 kernel.
He was full of surprises at last week’s Linaro Connect conference, when he was asked about his favorite chip architecture. He didn’t blink before saying it was x86, not ARM.
It may have been the long history of x86 with PCs that influenced his answer. There’s little fragmentation of software and hardware with x86, and things just work.
Read more
-
-
With Intel’s 3D Xpoint Optane technology beginning to appear as extremely fast non-volatile memory and other advancing efforts in the NVDIMM space like ReRAM, persistent memory was a popular topic at this week’s LinuxCon Europe event in Berlin.
Persistent memory is about non-volatime memory that retains data while being DMA-capable and offer memory-like performance. There’s been a lot of work building up in this space from libraries supporting it to DAX (Direct Access) support in Linux file-systems for use on persistent memory. Several presentations were done this week about the latest tech and Linux support for it.
-
The F2FS (Flash-Friendly File-System) and EXT4 file-system feature updates have been sent in for the Linux 4.9 merge window.
-
The Intel Integrated Sensor Hub (ISH) is supported in the Linux 4.9 kernel code for benefiting Cherrytrail mobile/convertible/ultrabook hardware and newer.
The Intel ISH is an on-package sensor hub used on some systems in place of external sensor hubs. The ISH provides sensors like detecting device rotation, automatic backlight adjustment, and can also be responsible for some low-power sleep states. This is for Cherrytrail and newer, including some Skylake notebooks.
-
-
Graphics Stack
-
-
-
-
The open source OpenGL driver AMD radeonsi is now extremely close to having full OpenGL 4.4 support, and OpenGL 4.5 is now complete.
I’ve said it before, and I will say it again, the progress on open drivers in the past year has been pretty amazing.
Recently “GL_ARB_query_buffer_object” was added in for radeonsi (OpenGL 4.4), leaving only “GL_ARB_enhanced_layouts” left for full OpenGL 4.4 support.
-
Applications
-
-
Ubuntu Phone has an unofficial Instagram app called Instagraph, but (until now) there was no desktop client available for Ubuntu desktop.
Although Instagram is (imo) best experienced through its official mobile apps, you can login and browse your feed via the Instagram website.
But, next time you go to reach for your phone or open a new tab to browse your feed, try Ramme instead.
-
Proprietary
-
WhatsApp, the widely used free messaging system is now available on many platforms and operating systems. Previously, it was only available for the major platforms such as Android and iOS, but it has recently become available for ChromeOS – based devices like the Chromebooks and it seems to continue this trend of availability on as many platforms as possible.
-
Instructionals/Technical
-
-
-
In the course of my job at Red Hat, I work with Docker containers on Fedora Atomic host every day. The Atomic Host from Project Atomic is a lightweight container OS that can run Linux containers in Docker format. It’s been modified for efficiency, making it optimal to use as a Docker run-time system for cloud environments.
Fortunately I’ve found a great way to manage containers running on the host: Cockpit. Cockpit is a remote manager for GNU/Linux servers with a nice Web UI. It lets me manage servers and containers running on the host. You can read more about Cockpit in this overview article previously published here. However, I also wanted to automate running containers on the host, which I’ve done using Ansible.
Note that we cannot use the dnf command on the Atomic Host. The host is designed not as a general purpose OS, but to be more fit for containers and other purposes. But it’s still very easy to set up applications and services on the Atomic Host. This post shows you how to automate and simplify this process.
-
Wine or Emulation
-
The Wine Staging release 1.9.20 is now available.
-
The Wine Staging development team announced recently the release and immediate availability of the Wine Staging 1.9.20 maintenance update for GNU/Linux operating systems.
Coming hot on the heels of the Wine 1.9.20 development release, which brought reimplementation of the clipboard API (Application Programming Interface), message handling in WebServices component, multiple new API Set libraries, as well as a bunch of bug fixes, Wine Staging 1.9.20 adds some improvements on its own end.
-
Games
-
Here’s a way to grab Tomb Raider while supporting the porter Feral Interactive directly, it’s currently dirt-cheap on the Feral store.
£4.49 for a major game like Tomb Raider until the 13th of October. It has it’s issues with performance in places, sure, but since the patch it is better. I still hope they are able to push it a little more in future, but at that price it’s a fantastic deal.
Could be something ideal to start your weekend with, let me know if you plan to pick it up, and what you think to it!
-
-
-
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Qt 5.8 will include IoT-oriented “Qt Lite” technology that enables fine-grained configuration and supports small-footprint IoT gizmos without OpenGL.
The Qt Company announced a Qt Lite project that aims to extend the Qt development framework to smaller footprint Internet of Things devices with as little as 16MB RAM and flash. The Qt Lite technology will initially appear in Qt 5.8, including a more flexible configuration system for the cross-platform development framework, as well as a new 2D renderer for devices that can’t run OpenGL. Qt Lite also provides a more accessible, lightweight set of development tools.
-
KDE Neon, the newly popular distribution produced by KDE and Kubuntu developer Jonathan Riddell and based on Ubuntu is now available in version 5.8. The best part of this latest release? It includes the latest long term stable release of Plasma 5.8. You can get additional details about this release from Jonathan Riddell’s blog.
-
-
GNOME Desktop/GTK
-
Now that my time as an intern is over, I want to take a moment to thank Outreachy for giving me the opportunity to be a part of this amazing experience. Also a big thank you to my mentor Jim Hall and the GNOME design team (Allan and Jakub) for the guidance and encouragements they provided throughout these months. And finally, a thank you to GNOME community for being awesome ^_^
-
-
New Releases
-
The Linux Lite 3.2 Beta release has arrived for developer testing and to give an idea about the recent changes made to the Linux Lite distro. It now features a new Lite Desktop widget. The GRUB bootloader has been set to its default configuration which enables multibooting other operating systems alongside Linux Lite.
-
Arch Family
-
This linux desktop is an homage to one of our favorite distributions, Arch Linux-and reader KudalGadgil shared it with us in our desktop show and tell pool. Here’s how you can get a similar look.
-
Slackware Family
-
The developers of the Slackware-based, server-oriented Superb Mini Server (SMS) GNU/Linux distribution announced recently the release of the ninth maintenance update in the stable 2.0 series of the operating system.
-
Red Hat Family
-
The day several Redhat trainers and industry folks met to talk about best practices and give feedback on the vision and mission ( and speed of progression) of Redhat Enterprise Linux (RHEL) and upstream / downstream projects and products. Among one of the most popular Sessions was the one by Robin Price and Martin Priesler on OpenSCAP which was a standing room only session with nearly 1/3 of attendants in attendance for this talk / session. Rita Carroll and others setup a interest list for those that would like to attend another OpenSCAP Workshop (mainly centered on a hands-on event but other venues seemed open for debate). If you’d be interested regardless of whether you like me were in attendance please email Rita @ rita@redhat.com with a simple subject line referencing OpenSCAP Workshop (Tysons Area).
-
When an application developer or architect tasked with exploring the possibilities that containerized applications offer, nothing is easier than the Red Hat Container Development Kit (CDK).
The Red Hat CDK has all the Cloud tooling you need for your local OSX, Linux or Windows environment and it has a few containers pre-configured for you to explore.
-
-
Finance
-
Fedora
-
I had a great time at the Libre Application Summit in sunny, hipster moustachioed Portland – many thanks to Sri for inviting me. Sorry this blog post is a bit late, but things have been really busy with the Fedora 25 Beta release (which we signed off on today).
For a first year conference without a crazy marketing budget or anything, attendance was great – it was a good size for the venue, the number of sessions, and the social events, things felt busy and there was a lot of people-getting-to-know-each-other going on. Sri, Adelia and friends did a great job of finding a good venue and getting a solid wifi network, providing food and coffee, and setting up some fun social events.
-
The first step in this is to make sure that the subject completely design team fedora. A second step is to check the validity according to legal terms.
In this category are the rules established by the international community and the teams fedora.
-
Alex Larsson from the Flatpak project, an open source initiative sponsored by Red Hat in an attempt to make cross-platform app deployment easier, announced on October 6, 2016, the release of Flatpak 0.6.12.
-
Back in August Fedora 25 switched to using Wayland by default in time for the project’s alpha release. With next week’s beta release, Fedora 25 is still using Wayland by default and it looks like it will remain that way unless any showstoppers appear.
Initially it wasn’t clear if Fedora 25 would continue using Wayland by default as it neared the final release, but so far so good. Adam Williamson of Fedora QA confirmed in the forums, “Wayland is the default for Fedora Workstation in F25 Beta, and barring any crazy showstoppers we didn’t know about showing up between now and Final, is likely to be the default for Final too.”
-
The beta of Fedora 25 will be released on-time next week.
It’s a bit rare in the Fedora space, but all relevant parties have signed off on the Fedora 25 Beta for it to ship on-time, 11 October. Often Fedora releases are challenged by delays due to blocker bugs, including earlier with Fedora 25 Alpha, but all appears to be in shape for shipping the beta next week.
-
GNOME Outreachy is a global program that offers historically underrepresented people of gender and race stipends to write code for several participating FOSS projects . Inspired by Google Summer Of Code, Outreachy offers participants hands-on internships for contributing to open source projects.
In 2016, the Outreachy internship dates are from December 6, 2016 to March 6, 2017. Participants work remotely from home while getting guidance from an assigned mentor and collaborating within their project’s community.
-
Debian Family
-
To help out making life for LEGO constructors in Debian easier, please join us on our IRC channel #debian-lego and join the Debian LEGO team in the Alioth project we created yesterday. A mailing list is not yet created, but we are working on it.
-
People keep ignoring the status of the Pacemaker HA stack in Debian Jessie. Most people think that they should stick to Debian Wheezy.
Why does this happen? Perhaps little or none publicity of the situation.
Since some time now, Debian contains a Pacemaker stack which is ready to use in both Debian Jessie and in Debian Stretch.
-
-
Derivatives
-
Canonical/Ubuntu
-
Canonical’s Sergio Schvezov announced recently the release and immediate availability of the Snapcraft 2.19 tool for creating Snap universal packages, in the Ubuntu 16.04 LTS and Ubuntu 16.10 repos.
-
Dell just launched its new XPS 13 Developer Edition laptop in the US and European markets, and, as usual, they’re partnering with Canonical to deliver you the best Ubuntu Desktop experience as possible.
For those of you that aren’t aware yet, the Dell XPS 13 Developer Edition laptop was made possible as a part of a project called Sputnik, which attempted to identify the needs of developer when running an open source operating system like Ubuntu, which is currently one of the most popular GNU/Linux distributions in the world. Therefore, Dell XPS 13 Developer Edition laptop now ships with Ubuntu 16.04 LTS (Xenial Xerus).
-
A few hours ago, October 6, 2016, Canonical’s Adam Conrad announced that the upcoming Ubuntu 16.10 (Yakkety Yak) operating system has entered the Final Freeze development stage.
-
Flavours and Variants
-
Ubuntu MATE project leader Martin Wimpress announced today, October 6, 2016, that the latest MATE 1.16 desktop environment has landed in the stable repositories of the upcoming Ubuntu MATE 16.10 (Yakkety Yak) operating system.
-
-
SolidRun has updated its tiny, Linux-ready i.MX6 based MicroSoM modules with optional eMMC and NOR flash, improved FlexCAN, and TI WiLink8 wireless.
SolidRun has refurbished its NXP i.MX6-based MicroSoM computer-on-modules with new rev 1.5 versions featuring optional eMMC and/or NOR flash, among other additions. Despite some minor mechanical redesigns, the modules have the same 47 x 30mm dimensions, and are backward compatible. They can be plugged into existing MicroSoM companion products such as SolidRun’s sandwich-style, open-spec HummingBoard SBCs and CuBox-i mini-PCs. All the modules continue to run Linux or Android.
-
Logic Supply informs Softpedia about a recent case study they’re doing featuring drone control specialists Desert Rotor, a drone controller company that uses their ML100 industrial PC for its next-gen UAV control system.
First, we’d like to inform the reader that Logic Supply is the leading industrial and embedded computer hardware manufacturer. The company is being known for creating some of the most powerful industrial products, from mini and rugged panel PCs and thin client computers to dust-resistant, fanless, and ventless units that can be used in virtualization and IoT (Internet of Things) markets, or other applications.
-
Phones
-
Tizen
-
It is no secret that Samsung uses Spreadtrum’s SOCs for most of its budget and mid range smartphones. Spreadtrum’s current best chip happens to be the SC9860- a 16nm process based 2GHz octacore 64 bit Cortex A53 SOC; these are chipset specifications from the yester-year and the technology is now moving into more powerful heterogeneous architectures involving ARM’s Cortex A73, A72 and A57 standards(and the low powered A53 cores for better battery efficiency). Now, this might not make any sense to a normal user. But over at Samsung, Spreadtrum’s slow development pace for its chips seems to be holding the Korean smartphone giant down from offering better (or more) midrange products.
-
Android
-
The smart car market hasn’t exactly settled along the usual Google vs Apple camps and some do take both sides, if not their own. When BMW launched its BMW Connected service early this year, it seemed to have actually put up a stake on Apple’s iOS side of the fence. Apparently, it was only bidding its time. In its new update, the service finally gets its first Android app. But that’s not the only thing that’s new, as BMW Connected is also gaining support for the Apple Watch 2 and Amazon’s Alexa.
-
-
-
Google got us all hot and bothered with the launch of a new pair of smartphones earlier this week, but you can be forgiven for missing a major announcement regarding Android.
The details of the latest version of the operating system, 7.1 Nougat, have been revealed, and it’s missing some of the key features Google waxed lyrical about on Tuesday.
The biggest news is that Google Assistant, which is sort of like a souped-up version of Siri for Android, will remain exclusive to the Pixel and Pixel XL, in the near future at least. The virtual helper played a central role in Google’s event, with the company taking time to demonstrate how it supports two-way conversation and learns from you as you spend more time using it.
-
If, after seeing all the software goodies on Google’s new Pixel phones, you hoped that some of those cool features will trickle down to other Android phones capable of running Android 7.1 Nougat, you’ll be disappointed.
Google’s smart personal assistant Assistant (Google did not do us a favor when naming this one), as well as unlimited, free backup for full-resolution photos and videos will remain Pixel-only for the time being. Somewhat less surprisingly, non-stop customer support service won’t be included, either.
-
-
-
-
-
-
There were big changes announced at Google this week as the company’s “Google Hardware” team came out of hiding and announced a slew of products. The star of the show was definitely the Google Pixel, Google’s new pair of smartphones that the company is saying it designed while using HTC as a manufacturer. The advent of Pixel phones means Google is an Android OEM again, harkening back to the days when it owned Motorola. This time, though, the company is serious about hardware and software integration.
Android, however, is the world’s most popular operating system because of OEM partners like Samsung, Huawei, Xiaomi, and LG. And if Google wants Android to continue to deliver Google services to billions of people, it will still need all those partners. Google once again has a delicate balancing act to pull off. The company must do its best to deliver a Google-y Android phone while not stealing the thunder from other OEMs or putting them at a serious competitive disadvantage.
-
It has been one year since Syrian-Palestinian open technology leader Bassel Khartabil disappeared from his prison cell in Syria.
Bassel served as the public affiliate for Creative Commons Syria and contributed to Mozilla Firefox, Wikipedia, and other open communities online. He also was the CTO of Al-Aous, a publishing and research institution dedicated to archaeological sciences and arts in Syria. In November 2012, Foreign Policy named Bassel one of the world’s 100 top global thinkers.
-
Open source employees in Europe have it good, especially when we compare that market to the rest of the world. This is according to a new report by Dice and The Linux Foundation. The report says that out of 1,000 European respondents 60 percent believe it would be fairly easy to find a new job this year. Globally, the figure stands at about 50 percent.
“Demand for open source talent is growing and companies struggle to find experienced professionals to fill open roles”, says Bob Melk, president of Dice. “Rising salaries for open source professionals indicate companies recognize the need to attract, recruit and retain qualified open source professionals on a global scale. Regardless of where they reside around the world, these professionals are motivated by the opportunity to work on interesting projects”.
Most sought after skills are application development, the report says, adding that European businesses are doing more than their counterparts in other parts of the world in order to keep hold of the staff. Four out of ten professionals in Europe say the best part about their jobs is that they get to work on interesting projects, as well as the fact that they get to use “cutting-edge technology”.
-
Google has released a new open-source font called Noto, which supports 800 languages and covers 110 writing systems.
Short for ‘No more Tofu’, the name of the new typeface is a nod to what people call the default white boxes that appear when a computer doesn’t understand a character on a website.
“One of the goals of the project was to support every language and every character, so one of the things we wanted to do was make sure there’s no tofu for all our users,” said Bob Jung, an director of internationalization at Google.
-
Cartographer, which Google initially used internally only, enables real-time mapping inside buildings, the company says.
Like it often does, Google has released into the open-source community an indoor mapping tool called Cartographer that it has used internally.
Cartographer is designed to enable what is known as real-time simultaneous localization and mapping (SLAM)—or the ability to build a 2D or 3D map while at the same time keeping track of an individual or robotic agent’s location within that map.
The algorithms used in SLAM combine data from various sensors such as Light Detection and Ranging (LIDAR) systems and cameras to determine the position of an object within an environment and to map that environment.
-
Free Code Camp is an organization that teaches people to code. As part of this free training, student coders produce free code needed by nonprofit organizations. Free Code Camp doesn’t accept donations, but you can support them by buying t-shirts, hoodies and audiobooks through their store.
-
Web Browsers
-
Mozilla
-
We are happy to support National Cyber Security Awareness Month (NCSAM), a global effort between government and industry to ensure everyone has the resources they need to be safer, more secure and better able to protect their personal information online.
We’ve talked about how cybersecurity is a shared responsibility, and that is the theme for National Cybersecurity Awareness Month – the Internet is a shared resource and securing it is our shared responsibility. This means technology companies, governments, and even users have to work together to protect and improve the security of the Internet. We all have to do our part to make the Internet safer and more secure for everyone. This is a time for all Internet users to Stop. Think. Connect. This month, and all year long, we want to help you be more “CyberAware.”
-
CMS
-
This article will be about OTRS, a ticket system we’re using at the FSFE for handling things like swag orders, internship applications and so on. But it could actually be about any software. OTRS just happened to be in the line of fire this time.
This will be an example in how to (not) manage user expectations. You may know the principle of least astonishment, and this will be a typical example of where it fails. The problem is in how a program communicates (or fails to communicate) to the user what it will do based on some input.
The design principle of least astonishment simply means you should aim for designing your software in a way that what the user expects should happen when performing a certain operation, should also happen. If something else happens, that’s bad design.
-
Education
-
People turn to public libraries for answers, and a lot of times libraries are superb at providing them. But when it comes to providing answers about open source, libraries have an uneven track record.
What can we do to make this better so that more people can turn to their public library to learn about open source software, hardware, and principles?
Right now, if you walked into my public library and pelted me with questions about open source—like, “What is it?” “How does it work?” “How can I use open source?”—I’d rattle off answers so fast you’d be walking out with a new tool or technology under your belt. Open source is a big world, so of course there are some things I don’t know, but guess what? We have the Internet and books right at our finger tips. Saying that you don’t know the answer is fine, and patrons will respect you for it. The key is helping them find the answer.
-
BSD
-
Today, October 6, 2016, Jim Thompson from the pfSense project has had the great pleasure of announcing the release and immediate availability of the pfSense 2.3.2-p1 maintenance update to the open source BSD-based firewall distro.
-
Last week news came out that the FreeBSD 11.0 release wasn’t going to happen as planned but it needed to be respun due to security issues. The release was supposed to happen on 3 October, but three days later we find out it needed to be re-spun again and is still going through testing.
-
FSF/FSFE/GNU/SFLC
-
So ActivityPub is nearing Candidate Recommendation status. If you want to hear a lot more about that whole process of getting there, and my recent trip to TPAC, and more, I wrote a post on the MediaGoblin blog about it.
Last night my brother Stephen came over and he was talking about how he wished ActivityPub was more of a “transactional” system. I’ve been thinking about this myself. ActivityPub as it is designed is made for the social network of 2014 more or less: trying to reproduce what the silos do, which is mutate a big database for specific objects, but reproduce that in a distributed way. Well, mutating distributed systems is a bit risky. Can we do better, without throwing out the majority of the system? I think it’s possible, with a couple of tweaks.
-
-
We’re still not over how cool it was to see so many from our community join the FSFE Summit in September. It was a good experience and we’re keen to repeat it. One of the highlights was the ending keynote where Julia Reda called out proprietary software as a threat to democracy. Be sure to view the keynote and some of the other talks from the Summit, either on our YouTube channel, or from our download server where you can get the available videos in webm format.
We also celebrated the FSFE’s 15th birthday in C-Base with a ceremony where we honored many of our local heroes from around Europe. C-Base has kindly provided a recording of the ceremony if you’re interested in hearing the story of some of our heroes, all of whom you can find working in one of the FSFE’s teams today.
-
Public Services/Government
-
Open code with Russian services preferred, unless good excuses can be found
-
Openness/Sharing/Collaboration
-
Open Hardware/Modding
-
I firmly believe that in the absence of any intentional organizational strategy a person’s workspace becomes a reflection of their mind. Like bits of knowledge stored in the brain, tools and assets instinctively find themselves organized in a way that feels right to the individual.
If this holds true, it stands to reason that, more often than not, our workspaces are always naturally trending away from being tidy and highly-functional. At this point, the odds are good that I’m just trying to rationalize why my office is an unmitigated disaster most of the time, but since you’ve made it this far, let’s make one more assumption: No two people are exactly alike, therefore no two workspaces are exactly alike.
With this assertion firmly in place, I’d like to share a few things I’ve implemented for creating my workspace that have worked well for my brain. Your workspace will look different, but the practices I chose to follow here can be used for anyone looking to match their setup to their brain.
-
Programming/Development
-
RPM of PHPUnit version 5.6 are available in remi repository for Fedorra ≥ 22 and for Enterprise Linux (CentOS, RHEL…).
-
For over a year, Apple’s software has been the subject of more derision than might be expected for a company of its size.
Developer Marco Arment took Apple to task early last year, arguing that OS X (recently rebranded macOS) is full of embarrassing bugs and that the company is trying to do too much on unrealistic deadlines.
Arment subsequently disavowed his post because of the widespread media attention it received. But there was blood in the water and the feeding frenzy has continued at Apple’s expense, at least in part because controversy, manufactured or not, drives online traffic.
-
Science
-
The bumblebee brain is puny, at least compared with the massive and fatty organ locked in your skull. At about 0.0002 percent the volume of yours, bee brains are close in size to the seeds stuck on a hamburger bun. Thinking about insect brains in terms of size alone, however, is a trap. The intelligence of sesame-brained bugs should not be underestimated.
A study reported in the journal PLOS Biology on Tuesday, for instance, takes bee smarts in a surprising direction: Scientists from the Queen Mary University of London suggest that the “insects possess the essential cognitive elements for cultural transmission,” as they wrote in their new paper. It is possible to teach a single bee a new trick, in other words, and a different bee can learn that behavior from her peer.
-
Digital publishers may be pouring time and energy into cranking up their video operations, but for a lot of their potential viewers, text is still the way to go.
New data from Pew Research finds that, when it comes to the news, younger adults still prefer words over moving images. While 46 percent of Americans overall say they prefer to watch the news over reading it, that number is far lower for Americans between the ages of 18 and 29 — only 38 percent of that group named video as their preferred news consumption format. In contrast, 42 percent said that they actually prefer text (which they prefer to read online, of course). Just 19 percent of young adults named listening as their preference. (“Smelling the news” was not an option.)
-
Hardware
-
In the early 2000s, Fujitsu was one of the top 5 PC makers globally. Today, it’s a loss-making enterprise that’s seen its market eroded by smartphones and tablets. The margins have squeezed, and IT conglomerate Fujitsu has been working to offload its non-core businesses and improve profitability. The company spun off its PC division as a separate business in February, a move that’s typically a precursor to a sale or other major restructuring option.
-
Health/Nutrition
-
Hurricane Matthew is whipping away at Florida’s shores this week—threatening lives and homes and parties.
If you know any Floridians, you know that no one is really freaking out yet. We are masters of disaster in the worst kind of way, having endured hurricanes, tornados, weird crimes, Rick Scott, and a growing Zika virus problem in the past year alone. That’s why business owners in Miami this week were prepping for Hurricane Matthew with a kind of calm, cooperative indifference.
-
Voters in four states appear likely to approve ballot measures that would legalize marijuana for recreational purposes, according to recent surveys, while voters are split on the question in a fifth state.
The polls, taken over the last few weeks, demonstrate a seismic shift in the politics of pot. Even a decade ago, voters rewarded politicians who promised to redouble the war on drugs. After November’s elections, nearly a quarter of Americans could live in states where marijuana consumption is legal.
But proponents and opponents alike say that polls taken before Election Day often overstate support for legal marijuana measures.
“If the pro-legalization side is not at 55 percent at this point, it will likely lose,” said Sean Noble, an Arizona-based Republican strategist working against that state’s legalization measure, Proposition 205. “We know that polling on legalization generally overperforms actual results.”
-
Plans to impose a total ban on abortion have sparked a massive uncontrolled explosion of anger in Poland. On Monday 3 October a strike of Polish women was called, inspired by the example of Icelandic women, who held a nationwide strike in 1975. In Warsaw, over 50,000 demonstrated in the pouring rain, in Wroclaw 30,000 and Krakow 25,000. Tens of thousands more demonstrated all across the country. In Poznan, there were clashes with the police, while in Kielce demonstrators demolished a controversial homphobic exhibition. Even the police’s conservative estimates talk about 98,000 people demonstrating in over 143 separate protests across the country. Meanwhile, the left party Razem estimated that over 140,000 people had protested on the streets throughout the country. These are easily the biggest ever protests in defence of abortion rights in Poland, far exceeding the protests in 1993, when the current ban on abortion was introduced.
The first wave of the movement started in spring with the anouncement that a right-wing pressure group had collected over 100,000 signatures (finally they collected 400,000) required to submit a draft law to the Polish parliament which would impose a total ban on abortion and punish women with up to three years in prison. The barbarity of the proposals is illustrated by the fact that all miscarriages would be treated as suspected abortions and would be subject to criminal investigation.
However, already Poland has one of the most restrictive anti-abortion laws in Europe, allowing abortion only in the case of rape, a threat to the health or life of the woman, or deformation of the foetus. In practice, even when these conditions are fulfilled abortion is often prevented by doctors who exploit the so-called “conscience clause” and impose their own religious beliefs on patients by refusing vital treatment.
-
Security
-
-
-
-
If your gpg key is too valuable for you to feel comfortable with backing it up to the cloud using keysafe, here’s an alternative that might appeal more.
Keysafe can now back up some shares of the key to local media, and other shares to the cloud. You can arrange things so that the key can’t be restored without access to some of the local media and some of the cloud servers, as well as your password.
For example, I have 3 USB sticks, and there are 3 keysafe servers. So let’s make 6 shares total of my gpg secret key and require any 4 of them to restore it.
-
CHANGING PASSWORDS is just too much for some people, according to research, and causes them to do stupid things.
This is called ‘security fatigue’, apparently, and comes straight from the National Institute of Standards and Technology (NIST) and a collection of clipboards and pens.
“After updating your password for the umpteenth time, have you resorted to using one you know you’ll remember because you’ve used it before? Have you ever given up on an online purchase because you just didn’t feel like creating a new account?” asked NIST.
“If you have done any of those things, it might be the result of ‘security fatigue’. It exposes online users to risk and costs businesses money in lost customers.”
-
Recent research from IDC shows a clear picture: IT organizations are increasingly unhappy about BYOD and now want to curtail or end the practice.
Their stated concern: The costs are too high and the savings too low. But those concerns are misguided and likely masking a secret agenda to regain control over mobile devices, not to save money. Face it: BYOD was never popular with IT.
-
Defence/Aggression
-
Like those from a battering ram, the hits just keep coming from the recently elected president of the Philippines, Rodrigo Duterte.
Saying this week that President Obama could “go to hell,” Duterte has threatened to jettison decades of close security cooperation with the United States, suggesting Manila would turn to China or Russia for support.
The latest anti-U.S. vitriol came as U.S. Marines and sailors practiced amphibious landings and other exercises with Philippine troops at coastal sites close to the strategic shipping lanes and disputed islands in the South China Sea, a regional hot spot.
The joint exercises began Tuesday and are scheduled to run until Oct. 12. Last week, Duterte said this would be the final round of joint exercises with the U.S. military.
-
Environment/Energy/Wildlife/Nature
-
The report warns that future generations may be forced to use “negative emissions” measures to forcibly extract CO2 from the atmosphere as temperatures keep rising. (Photo: Joe Brusky/flickr/cc)
Fossil fuels must be taxed out of existence to ensure that future generations are not saddled with a world of rising seas and extreme weather—and all the costs that come with them—according to a new research paper by renowned climate scientist and Columbia University professor James Hansen.
-
On October 5, the United Nations proudly announced that enough countries had agreed to the Paris Agreement for it to go into effect, 30 days from now. That’s great. But if you are a bit confused about what exactly this news means, fear not. I’m here to break it all down.
-
Vast swathes of Southwestern United States — a region already grappling with parched conditions — may now have to brace for another threat — decadeslong “megadroughts.”
According to a new study published Wednesday in the journal Science Advances, there is roughly a 70 to 90 percent chance that the Southwest would experience a megadrought — an extreme dry spell lasting 35 years or more — before the end of the century. And, if precipitation is below normal, it’s 99 percent certain that such an event will occur.
“Megadroughts are rare events, occurring only once or twice each millennium. In earlier work, we showed that climate change boosts the chances of a megadrought, but in this paper we investigated how cutting fossil fuel emissions reduces this risk,” lead author Toby Ault, a professor of Earth and atmospheric sciences at Cornell University, said in a statement. “The increase in risk is not due to any particular change in the dynamic circulation of the atmosphere. It’s because the projected increase in atmospheric demand for moisture from the land surface will shift the soil moisture balance.”
The present-day Earth is 1 degree Celsius hotter than it was 150 years ago. The Paris climate agreement, which is to come into force next month, aims to restrict this rise to below 2 degrees Celsius — a target that many experts now believe is almost certain to be breached.
-
Hurricane Matthew is already feared to have caused seven deaths after it hit Haiti and the Dominican Republic on Tuesday, bringing 145mph winds, pounding rain and storm surges to coastal communities.
The category 4 storm, the strongest hurricane to hit Haiti in 50 years, is expected to surge northwards towards Florida’s east coast and up the south-eastern US coast by the weekend. It follows September’s Hurricane Hermine, which was the first hurricane to hit Florida in nearly 11 years.
-
States of emergency have been declared in Florida, Georgia and the Carolinas as Hurricane Matthew barrels toward the Southeast coastline. More than 2 million people have been urged to evacuate their homes. The record-breaking storm has already killed at least 26 people in Haiti and four in the Dominican Republic. The storm is soon expected to hit the Bahamas and then strengthen as it moves toward Florida. Meteorologists are predicting Matthew could be the strongest hurricane to hit the United States since Wilma in 2005. Many scientists are saying climate change has intensified Hurricane Matthew because warmer ocean waters help create stronger hurricanes. Matthew is already the longest-lived Category 4 or 5 hurricane in the Eastern Caribbean on record. To talk more about Hurricane Matthew and climate change, we speak to Guardian journalist Oliver Milman and Michael Mann, a distinguished professor of atmospheric science at Penn State University. His latest book, co-authored with political cartoonist Tom Toles, is titled “The Madhouse Effect: How Climate Change Denial Is Threatening Our Planet, Destroying Our Politics, and Driving Us Crazy.” Mann is also author of “The Hockey Stick and the Climate Wars: Dispatches from the Front Lines.”
-
Hurricane Matthew’s eyewall continues to brush parts of Florida’s northeast coast with high winds and storm surge flooding, and will spread those impacts, in addition to potentially serious rainfall flooding into Georgia, South Carolina, and southern North Carolina through at least Saturday night.
-
Finance
-
The UK will trigger Article 50 of the Treaty of Lisbon, triggering the formal two-year Brexit negotiation process, by the end of March 2017, the prime minister has announced.
The government also intends to publish a ‘Great Repeal Bill’ which, once given effect, will remove the 1972 European Communities Act from the UK statute book and enshrine any EU laws in effect on the date of the UK’s exit from the EU into UK law, Theresa May told the Conservative Party annual conference.
May said that the process would give UK businesses and workers “maximum certainty as we leave” the EU, while retaining the government’s right to “amend, repeal and improve any law it chooses” at a later date. EU law expert Guy Lougher of Pinsent Masons, the law firm behind Out-Law.com, said that the comments provided “a helpful indication of the government’s intentions and priorities”.
“Although the prime minister has indicated her opposition to the shorthand labels of ‘soft Brexit’ and ‘hard Brexit’, it appears that the government’s negotiation intentions and the likely outcome are closer to the latter than the former,” he said.
-
Trump’s business “genius” relies on stiffing creditors and contractors, laying off workers and driving the equity of investors down while he just walks away.
-
Privatization is bad news for federal, state and local government workers, and the communities where they live. That’s according to a new report released Wednesday by In the Public Interest, a research group focused on the effects of privatization.
The study, “How Privatization Increases Inequality,” explores the role privatization plays in the American economy—compiling data on the estimated $1.5 trillion of state and local contracts doled out each year.
“A lot of decisions are small,” says Donald Cohen, executive director of In the Public Interest, but “if you add all that up, it’s very significant.”
-
AstroTurf/Lobbying/Politics
-
But Facebook’s most powerful political tool may be one that’s hiding in plain sight. Consider the “I Voted” button.
The button, dubbed by Facebook a “voter megaphone”, allows users to report whether they have voted and shows which of their friends have also voted.
-
Video of Mike Pence denying Trump said any of the horrible, racist, stupid, uninformed and generally embarrassing things he spouts all day long, matched with Trump saying the stuff.
-
She’s a dark horse in the presidential race, but green party nominee, Dr. Jill Stein could have a big impact on the outcome.
Stein is campaigning in L.A. for a few days – trying to convince voters that she is the better choice. Green Party presidential candidate Jill Stein will make a campaign stop Thursday at Cal State Northridge.
Stein is polling around the 2% mark in most of the national polls, but that is enough to sway the election to the winner.
-
After the first presidential debate on September 26, CNN hosted a focus group at the University of Richmond. According to Justin Smith, one of the 28 people included in the panels, CNN censored those who said they would be voting for a third party, declaring them “undecided.”.
“Out of 28 panel members, five said they were decided on Clinton, two said they were decided on Trump, and 12 said they were going to vote 3rd party. But once they saw the response, they reshot the segment and replaced ‘3rd party’ with ‘still undecided.’ You’ll noticed on the live feed, I refused to raise my hand,” wrote Smith in a Facebook post. Smith is supporting Evan McMullin, former CIA operations officer and former chief policy director for the House Republican Conference in the U.S. House of Representatives, for president. “They then said they were going to reshoot it, except this time they changed ‘3rd party’ to ‘undecided.’ Some of us asked about the third party option, and they ignored us. They then said they were going to shoot it again, and still asked for ‘undecided’ voters and left out ‘3rd party.’ A lot of the members voted ‘undecided’ because it was the only option other than Trump or Clinton.” Smith posted the CNN video of the focus group and wrote that in the video he refused to raise his hand and vote “undecided” as a protest.
-
WikiLeaks series on deals involving Hillary Clinton campaign Chairman John Podesta. Mr Podesta is a long-term associate of the Clintons and was President Bill Clinton’s Chief of Staff from 1998 until 2001. Mr Podesta also owns the Podesta Group with his brother Tony, a major lobbying firm and is the Chair of the Center for American Progress (CAP), a Washington DC-based think tank.
-
Donald Trump bragged in vulgar terms about kissing, groping and trying to have sex with women during a 2005 conversation caught on a hot microphone, saying that “when you’re a star, they let you do it,” according to a video obtained by The Washington Post.
The video captures Trump talking with Billy Bush, then of “Access Hollywood,” on a bus with the show’s name written across the side. They were arriving on the set of “Days of Our Lives” to tape a segment about Trump’s cameo on the soap opera.
-
Censorship/Free Speech
-
Back in 2008, then Senator Joe Lieberman went on a ridiculous pro-censorship campaign, demanding that YouTube take down any “terrorist” videos. For reasons I still don’t understand, YouTube complied. As a result, watchdogs documenting Syrian atrocities had them censored from YouTube, because YouTube determined them to be in “violation” of its guidelines in publishing “shocking and offensive videos.”
That was a few years ago, and it seems like the problem has only gotten worse — as have the ridiculous calls for YouTube and other platforms to be the giant censor in the digital sky. The latest victim? Would you believe it’s the European Parliament itself? Marietje Schaake, a really wonderful Member of the European Parliament (and a Techdirt reader), tweeted that the video she had posted of a European Parliament debate on “anti-torture” was taken down for “violating community guidelines.” Really.
-
Donald Trump’s outright contempt for journalists and press freedom is well known—but in the past month he has outdone himself.
In the span of a long weekend in mid-September, Trump threatened to sue The New York Times, his staff had a Vice reporter arrested outside a campaign event, and he blamed the New York terrorist bombings on “freedom of the press.”
This weekend, Trump struck again. After the Times’ huge scoop detailing how he took an almost billion-dollar loss on his 1995 taxes, Trump’s lawyer threatened “prompt initiation of appropriate legal action” against the Times once more. By my count, it is at least the 11th time Trump has threatened to sue a news organization or journalist during his campaign for president.
I had intended to quantify how many journalists or news commentators Trump has threatened to sue over his lifetime, but that quickly turned into a fool’s errand. A simple Google search of “Trump threatens to sue” will return an overwhelming number of stories. In the past decade alone, he’s sued a former Times journalist who wrote a book about him that he later admitted he didn’t even read; he’s threatened to sue former View host Rosie O’Donnell for allegations that have been shown over and over again during this campaign to be correct; he’s sued HBO’s Bill Maher over a joke bet that involved proving he was not, in fact, born an orangutan.
-
Donald Trump keeps insisting that he’s a strong supporter of the 2nd Amendment of the Bill of Rights, but he appears to have skipped right past the 1st Amendment. We’ve discussed his stated plans to “open up” libel laws and his regular threats to sue newspapers for reporting on him in ways he dislikes. Trevor Timm, of the Freedom of the Press Foundation, recently tried to count how many times Trump had threatened to sue the media since his campaign began (ignoring all the threats from before the campaign).
-
THE PIRATE BAY is not a place you want to go, at least not according to the Chrome and Firefox browsers which have taken to warning people that the pages are perhaps poisoned and definitely deceptive.
A post on TorrentFreak said that users are batting their heads against a blocking wall when they try to access magnets and that kind of stuff.
We took to the water today in search of The Pirate Bay on Firefox. Virgin Media has put a cage around the site, but you can still get to it. Once there we were able to get to the main page, but no further.
A search, with a capital R for research, took us to a page of links that took us to another page, but not one that we expect The Pirate Bay user base will enjoy.
-
Chrome and Firefox are again blocking direct access to The Pirate Bay’s download pages. According to Google’s safe browsing program, ThePirateBay.org is a “deceptive site” that may steal user information. The TPB crew has been alerted to the issue and hope it will be resolved soon.
-
Privacy/Surveillance
-
Not long after Edward Snowden’s revelations of massive government surveillance of the American public, Yahoo was one of the eight tech giants that called for strong reforms that would protect their customers.
And back in 2007, Yahoo went to court to challenge a government surveillance program in order to protect its users’ privacy.
Well, that was then.
Now, in a move that has outraged privacy advocates, Yahoo reportedly has helped take government intrusion to a new level. Without apparent protest, according to news reports, it built a mechanism that allowed the National Security Agency and the FBI to scan all of its users’ incoming emails for specific characters or words.
-
Verizon is pushing for a $1 billion discount off its pending $4.8 billion agreement to buy Yahoo, several sources told The Post exclusively.
The request comes on the heels of the web giant getting bludgeoned by bad news in the past few days.
Yahoo revealed two weeks ago that it had been hacked in 2014 and that usernames and passwords for 500 million accounts were swiped.
Then, earlier this week, it was learned that Yahoo had been ordered by a secret Foreign Intelligence Surveillance Court to scan emails for terrorist signatures.
“In the last day we’ve heard that [AOL boss] Tim [Armstong] is getting cold feet. He’s pretty upset about the lack of disclosure and he’s saying, ‘Can we get out of this or can we reduce the price?’” said a source familiar with Verizon’s thinking.
That might just be tough talk to get Yahoo to roll back the price. Verizon had been planning to couple Yahoo with its AOL unit to give it enough scale to be a third force to compete with Google and Facebook for digital ad dollars.
The discount is being pushed because it feels Yahoo’s value has been diminished, sources said.
-
A new case might lead the FBI and Apple into another fight over security and privacy on smartphones, following a confirmation yesterday by FBI special agent Rich Thorton that the FBI has the iPhone of Dahir Adan in its possession (via Wired).
Adan was the culprit behind the stabbing of 10 people in a Minnesota mall in mid-September, and was eventually shot and killed by police. After the event, terrorist organization ISIS claimed credit for the attack on social media, but “no evidence has emerged to suggest ISIS had a hand in planning or executing the attack.”
During a press conference in St. Cloud, Minnesota yesterday, Thorton confirmed that the FBI has Adan’s iPhone and that it is locked with a passcode. According to the special agent, the organization is “still trying to figure out how to gain access to the phone’s contents.” The issue currently is that the model and version of iOS running on the iPhone is known only to the FBI. Following the launch of iOS 8 in 2014, any iOS device running the software is encrypted to an extent that no malicious outsider — or even Apple itself — can get into the iPhone or iPad.
-
Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.
Despite this week’s differing media accounts, this much isn’t disputed: In 2015, Yahoo provided the U.S. government with the means to scan every single email that landed in every single Yahoo Mail inbox. The scanning was kept an absolute secret — and as this ex-Yahoo source describes, that meant keeping it a secret from security personnel who came to believe it endangered Yahoo’s hundreds of millions of unwitting customers.
The employee, who worked at Yahoo before, during, and after the installation of the email-scanning program, requested anonymity because of a nondisclosure agreement formed when the individual quit several months after the program was discovered internally last summer. The source declined to share certain specific names for fear of violating that same NDA or the NDA of others, but The Intercept has confirmed details of the source’s employment at Yahoo, which would have put the then-employee in a position to know this information.
-
Police records obtained by the Daily Dot reveal in unprecedented detail how the Obama administration enables law enforcement to suppress information about controversial phone-surveillance technology used by police throughout the United States.
The documents, which link the purchase of so-called Stingray devices to various North Carolina state and local police agencies, include a fill-in-the-blank warrant drafted by the U.S. Justice Department (DOJ) and intended for use by state and local police that extends the veil of secrecy over law enforcement’s Stingray use.
The records, originally acquired by Working Narratives under North Carolina public records law and shared with Daily Dot reporters, also offer new specifics about the capabilities of Stingrays bought by police in North Carolina from Harris Corporation, a leading U.S. manufacturer of cell-site simulators, and the company behind the original “StingRay” procured by the Pentagon and various intelligence agencies more than two decades ago. The North Carolina agencies referenced by the documents include the New Hanover County Sheriff’s Office; the Wilmington Police Department; and the North Carolina State Bureau of Investigation, an agency that reports directly to Gov. Patrick L McCrory (R).
-
In the six weeks since federal agents raided a suburban Maryland home and arrested Harold T. Martin III on suspicion of stealing classified information from the National Security Agency, another organization has quietly prepared to face the fallout: Booz Allen Hamilton, Mr. Martin’s employer.
Booz Allen, a consulting firm that earns billions of dollars by working for American intelligence agencies, has been called the world’s most profitable spy organization. News this week of Mr. Martin’s arrest in August could renew scrutiny of the firm’s operations and, more broadly, the lucrative contracting business that American intelligence now relies on to run its vast, global surveillance operations.
Mr. Martin’s arrest is the second time in three years that a Booz Allen contractor has been accused of stealing potentially damaging material from the N.S.A. The company also employed Edward J. Snowden, who spirited out a cache of documents that, in 2013, exposed the extent of American surveillance programs in the United States and around the world.
Booz Allen is one of a handful of defense and intelligence contractors that blur the line between the government’s intelligence work and private enterprise.
-
BT customers are unable to delete BT Yahoo email services – despite an exodus of users seeking to leave the security-challenged webmail biz.
Since allegations arose that Yahoo built an app to enable it to scan all of its users’ emails at the request of US intelligence, many users have sought to delete their email accounts.
That was in addition to Yahoo!’s confession last month that hackers had stolen the credentials for at least 500 million of its customer email accounts.
-
Imagining a Cashless World [Ed: Lack of anonymity in purchasing/payments now “driven in part by an epidemic of armed robberies in smaller shops,” says iophk]
A fantastic heist (we like our crimes as smart and magical as dreams) took place some years back, when a stolen helicopter landed on the roof of a cash depot in Stockholm and three masked men smashed a skylight to climb inside. It was September 23, 2009. The depot was freshly stocked in expectation of a coming Swedish payday. Armed with a Kalashnikov, the invaders held employees at bay while their accomplices outside positioned road spikes to keep cop cars from swarming the building. Fake bombs had been set among the police helicopters to delay an aerial chase. The thieves loaded bag after bag of bills into their aircraft, then departed. Seven men were later caught and sentenced, but nearly all of the stolen cash—reportedly some $6.5 million—still has not been found.
The robbery is known as the Västberga heist, and, like many capers, it became a source of public fascination. (It is the subject of Evan Ratliff’s e-book “Lifted.”) But it also earned astringent notice from some economic theorists, who saw in it a parable about the risks of paper money. Cash is the squirmy ferret of societal wealth—tricky to secure physically and, once liberated in the wild, almost impossible to get back—and money, as technology, has changed a lot in half a century. A day’s errands once called for bulging pockets. Now it’s possible to shop for groceries, pay rent, buy lunch, summon a taxi, and repay your sister for a movie without handling a checkbook, let alone fumbling with bills and coins. Most people think of card and electronic payments as conveniences, stand-ins for exchanging cold, hard cash. Yet a growing group of theorists, led in the United States by Kenneth S. Rogoff, a former chief economist at the International Monetary Fund, are embracing the idea that physical currency should be the exception rather than the rule.
-
Twitter shares plunged 20.1% Thursday after published reports said would-be suitors including Google would not bid for the struggling social media company.
Technology news outlet Recode said Google and Disney would not pursue Twitter and Apple was unlikely to buy it either, deflating the stock that had soared on takeover speculation.
Marc Benioff, CEO of Salesforce.com, considered one of the more likely suitors for Twitter, also seemed to downplay his interest during an analyst meeting at his company’s annual Dreamforce event in San Francisco.
“We look at everything and we don’t buy most things, and we haven’t agreed to buy that company,” he said Wednesday, emphasizing that Salesforce.com has a “disciplined M&A process.”
-
A Yahoo operation in 2015 to scan the incoming email of its customers for specific information identified by the U.S. government was authorized under a foreign intelligence law, U.S. government officials familiar with the matter said.
Reuters on Tuesday reported that the Yahoo program was in response to a classified U.S. government request to scan emails belonging to hundreds of millions of Yahoo users.
The revelation rekindled a long-running debate in the United States over the proper balance between digital privacy and national security.
The Department of Justice obtained the order from the Foreign Intelligence Surveillance Court, said the sources, who requested anonymity to speak freely.
-
Civil Rights/Policing
-
Tim Kaine repeatedly defended Hillary Clinton’s use of a private email server during Tuesday night’s vice-presidential debate. “The FBI did an investigation,” he said at one point, “and they concluded that there was no reasonable prosecutor who would take it further.” But such a statement is credible only if it follows a real criminal investigation—that is, the sort of investigation that the FBI and the Justice Department conduct when they actually care about a case and want convictions.
-
Google has been hit with a class-action lawsuit accusing the ad giant of discriminating against older employees.
The Northern California District Court has certified [PDF] the case brought against the Chocolate Factory, allowing aggrieved applicants aged 40 and older to join together in filing a single suit.
By certifying the case, the court allows the plaintiffs to take on Google’s legal might as a combined force, rather than individually. This, in turn, increases the likelihood of a favorable settlement from Cali-based Google.
The complaint, originally filed in April of 2015, claims that Google discriminates against job candidates over the age of 40 when screening them. The suit accuses Google of violating the US Age Discrimination in Employment Act.
-
If the Drug War is US law enforcement’s wildly-swinging fist, the DEA is its middle finger. Once the pointless brutality stops, the finger is extended to everyone — especially taxpayers.
Even the agency’s name inadvertently belies its twisted motivations: “Drug Enforcement Agency.” Without further information, the name, on its own, seems to suggest a shoring up of the drug trade, rather than an adversarial force.
The DEA has a lot of skin in the drug game. Without the steady flow of drugs, it ceases to exist. It operates with a great deal of autonomy and is often excused its worst excesses because most people agree (without much thought) that drugs are bad.
The DEA controls a vast network of confidential informants. Actually, to state it more accurately, the DEA oversees… Never mind. The DEA pays a great deal of money to confidential informants. Beyond handing out cash, the DEA apparently does little else to keep its informants in line.
A just-released Inspector General’s report [PDF] on the DEA’s use of confidential informants finds the agency has no problem paying out vast sums of money to lying informants and that it maintains a small army of otherwise-employed citizens who moonlight as cash/drug-sniffing humans for the nation’s top drug warriors.
This year’s report builds on the lowlights of last year’s examination of the DEA’s informant program, in which the OIG basically stated the entire program runs without sufficient oversight. Nothing has changed in the interim. This report includes even more details of excess, abuse, and stupidity.
-
Hundreds of people in Mumbai, India have been detained in relation to a massive telephone scam where fake callers “from the IRS” targeted Americans. In said calls, scammers tried to convince recipients that they were from the IRS in order to con victims into forking over thousands of dollars payable via prepaid credit cards.
According to The Guardian, 200 Indian police officers raided nine locations across one of India’s largest cities.
-
Indonesian police have arrested a man accused of hacking into a public billboard in Jakarta and streaming a pornographic film.
The 24-year-old IT analyst has admitted the crime, said police, for which he could face up to six years in jail.
Motorists were left in shock last week when footage from a Japanese porn film was displayed on an electronic screen in south Jakarta.
The video ran for five minutes on Friday before power was eventually cut.
However the clip had already been captured on many mobile phones and soon spread across social media.
The man, who was arrested in his office, allegedly carried out the prank after seeing login details displayed on the billboard.
-
A shopper at Westfield Valley Fair mall claims in a civil lawsuit that a security guard pulled a gun on him after he hit a traffic cone while trying to leave the mall in December.
In the Santa Clara County Superior Court filing submitted last week, San Jose resident Nicholas Buchanan, an Apple engineer, is seeking unspecified damages against the mall, a security contractor, and two security guards for a Dec. 5, 2015 encounter. The lawsuit also takes issue with how the guard who drew a pistol on Buchanan was not licensed to carry a firearm at the time.
-
RELIGIOUS authorities in the Malaysian state of Selangor has launched a mobile application that allows members of the public to report Syariah-related crimes, adding to concerns of growing Islamic fundamentalism in the Muslim-majority country.
Selangor’s Islamic Religious Department (Jais) director Haris Kasim told The Star that the app allows the public to become the eyes and ears of enforcers, making it easier for them to report offences that breach the Syariah code, such as pre-marital or extramarital sex, or alcohol consumption, which are forbidden to Muslims.
“The application, which was launched Tuesday, is simple and easy to use. Once installed on a smartphone, people can send over information and make reports to Jais very easily,” he was quoted as saying.
-
A top chess player is boycotting the World Chess Championship in Iran because women will be legally required to wear the hijab while competing.
Nazi Paikidze-Barnes, a Geogian-American chess player, is petitioning the World Chess Federation (FIDE) in a bid to change the host country of the women’s world championship competition from Iran.
“I think it’s unacceptable to host a women’s World Championship in a place where women do not have basic fundamental rights and are treated as second-class citizens,” the 22-year-old told the BBC.
-
After being arrested, Khan told a police officer: “Never get an arranged marriage bro.”
The butcher was handed a life sentence after pleading guilty to murdering Nasreen.
Manchester Crown Court heard Khan told his wife “it’s not halal for you to work with men”.
-
A 16-year-old fatally shot by a Los Angeles police officer in South Los Angeles called 911 himself before the shooting and left his family a “farewell note,” leading investigators to believe he had a “desire to end his own life,” LAPD chief Charlie Beck said Thursday.
Coroner’s officials identified the boy Thursday as Daniel Enrique Perez, who police say was shot after pointing a realistic-looking replica gun at officers.
Beck said detectives identified Perez through a cellphone he was carrying, which was used to call 911 about 20 minutes before the deadly encounter. The caller reported a man with a gun matching Perez’s description, Beck said.
-
The burqa veil is to be banned in schools and universities across Norway following similar measures in other European countries, according to the Norwegian education minister.
The country’s right-wing government confirmed it was considering “national regulations prohibiting the full-face veil in schools and universities”, a move supported by the opposition Labour Party.
Education minister Torbjorn Roe Isaksen confirmed the ban would only apply to the full-face veil and not to other Islamic headscarves including the hijab, chador and niqab.
-
Two former high-ranking CIA officials will be compelled to answer questions under oath about the agency’s brutal interrogations of terrorism suspects, a federal judge ruled Tuesday as part of a lawsuit brought against former CIA contractors by the American Civil Liberties Union.
The ruling would require Jose Rodriguez, who was the head of the CIA’s Counterterrorism Center after the Sept. 11, 2001, attacks on the United States, and John Rizzo, the agency’s former acting general counsel, to submit to depositions about a program that used methods widely condemned as torture.
“This ruling is a critical step towards accountability, and it charts a way forward for torture victims to get their day in court,” ACLU attorney Dror Ladin said in a statement released by the organization after the ruling in federal court in Spokane, Wash.
-
On a windy afternoon in February 1959, 14-year-old Craig Wade scooped up what seemed to be a crumpled rag that was blowing, tumbleweed style, across a railroad track in his hometown, Pittsfield, Massachusetts. He later told a local newspaper that he simply “likes to save things.”
-
Internet Policy/Net Neutrality
-
Facebook is in talks with the government and wireless carriers to bring its “Free Basics” internet service to the U.S., reports The Washington Post.
If the plan works, Facebook “would target low-income and rural Americans who cannot afford reliable, high-speed Internet at home or on smartphones,” the report notes.
Facebook didn’t immediately respond to a request for comment.
Free Basics isn’t a full-fledged internet provider, but rather an agreement with carriers that lets people use Facebook and other sites without it counting towards their data plan.
Facebook has run into trouble with Free Basics abroad. The program, which currently operates in 49 countries, was shut down earlier this year in India due to net neutrality concerns.
-
Intellectual Monopolies
-
Copyrights
-
As has by now been extensively reported, on 14th September the European Commission released its new copyright reform package. Prominent within this is its proposal for a new Directive on Copyright in the Digital Single Market.
The proposal contains an array of controversial offerings, but from the perspective of this intermediary liability blogger, the most interesting provision is the proposed Article 13 on ‘Certain uses of protected content by online services’. This is highly problematic in a number of different ways.
-
BitTorrent has fired its two co-CEOs Robert Delamar and Jeremy Johnson and laid of an unknown number of staffers, Variety has learned from multiple sources. BitTorrent CFO Dipak Joshi has stepped in as interim CEO.
The company is also closing its Los Angeles-based production studio and shuttering its BitTorrent Now video streaming efforts. This comes just months after BitTorrent announced a renewed focus on media under the leadership of Delamar and Johnson.
BitTorrent founder Bram Cohen laid out the changes in an email to staff earlier this week, according to a source, but layoffs apparently began as early as two weeks ago. In addition to being ousted as CEOs, Delamar and Johnson were also removed from the company’s board of directors.
The company had officially announced the appointment of Delamar and Johnson as new co-CEOs in April. At the time, the duo laid out a renewed focus on media production and distribution, which involved the opening of a new Los Angeles-based production studio.
These efforts culminated in BitTorrent Now, an ad-supported music and video streaming platform that launched in June. BitTorrent Now built on the company’s efforts to strike media distribution deals with independent artists, but didn’t actually use BitTorrent’s P2P technology for streaming.
Permalink
Send this to a friend
Posted in Europe, Patents, Rumour at 4:44 am by Dr. Roy Schestowitz
Being above the law, even at The Hague, helps the autocracy of Battistelli and his praetorian guard
Summary: The unaccountable, unregulated Patent Office continues its union-busting activities and is expected — some believe — to decapitate even SUEPO The Hague (representing perhaps a thousand members of staff)
THE EPO‘s management continues to behave as though it’s above the law (any country’s law and even international law). The President, for instance, is allowed to break even his own rules. That’s classic autocracy, contrary to the principles of the Rule of Law.
“The problem is, the Administrative Council has become a lapdog, not a watchdog, and we’re rather pessimistic about it. It’s now complicit.”Recently, judging by the Dutch media, EPO management found an ‘ally’ in the Advocate General, Mr. Vlas, who is similar to an Attorney General (AG) in other countries. This may depend on who’s translating and how. The management of the EPO must be happy as it means that the high court’s decisions in January will quite likely be against SUEPO, not on grounds of legitimacy of their complaint but based on technical grounds or legitimacy of enforcement, i.e. the EPO being above the law and exempt from Dutch law (even though it resides on Dutch soil).
Someone has passed us some thoughts on the matter of this legal case in the Netherlands, stating:
The Attorney General of the Netherlands has issued his opinion on the immunity of the EPO in the context of the EPO’s breaches of fundamental rights. The AG did not in the least contest the findings of the violations, and went as far as stating that “honouring the claim to immunity of jurisdiction from the national judge does not in the least mean that violations of material rights are permitted”. However, in the specific case of SUEPO’s claims, he adopted the position that as long as individual EPO employees can have recourse to the ATILO, the route to the Dutch judge is barred. SUEPO does not understand this point; SUEPO cannot see how the ATILO can enforce a union’s right to collective bargain through individual complaints about violations of individual rights. SUEPO’s lawyers are studying the matter and will consider submitting a supplementary brief. The Court will hand down its decision (which may or may not follow the opinion of the AG) on 20 January 2017.
The above suggests that this is far from over. In the mean time, a source told us that witch-hunting in The Hague continues — something which we already knew about and wrote about. “The Attorney General’s opinion comes at an unusual juncture,” we learned, “and (in spite of its conservative stance) may well push the EPO and its Administrative Council to do something about the respect of fundamental rights.”
The problem is, the Administrative Council has become a lapdog, not a watchdog, and we’re rather pessimistic about it. It’s now complicit.
“This in its own right should be cause for massive demonstrations at The Hague next week.”We learned from our source that things have escalated even further. One “should remember,” to quote, “that the council has adopted resolution CA/26/16, which the President has completely ignored. Since then, as anyone can read from the minutes of the Board 28, there are “three current investigations/ disciplinary proceedings involving SUEPO members in The Hague”. Clearly, the witch-hunt of SUEPO officials is going on, this time in The Hague. One of the targets is Laurent Prunier (Secretary of SUEPO The Hague, and member of the CSC), who has been suspended since 27.06.2016, and whose disciplinary hearing towards dismissal (and more) has just taken place on 28 and 29 September. No comment can be provided without risking compromising Laurent’s defence.”
Some people have in fact been informed that “his name has been expunged from the internal phone book even before the proceedings are closed.”
They “thus fear for the worst.”
This in its own right should be cause for massive demonstrations at The Hague next week. In Prunier's own words, these are “demonstrably fabricated accusations.”
We saw that before, did we not? █
Permalink
Send this to a friend
Posted in Europe, Patents at 4:10 am by Dr. Roy Schestowitz
Summary: A roundup which gives an overview of Jesper Kongstad’s various business ventures in Denmark
YESTERDAY we explored the political context in which Jesper Kongstad, Chairman of the Administrative Council of the European Patent Organisation (EPO), exists in Denmark. Why does this matter? Stay tuned for the remainder of this series.
“…Kongstad still seems to be able to find enough time for an impressively diverse range of private entrepreneurial activities.”One might think that as the Director General of the DKPTO, a member of the Board of the Nordic Patent Institute (NPI) and Chairman of the EPO’s Administrative Council Mr. Kongstad would have very little spare time on his hands for dabbling in the grubby world of commerce.
At any rate this is the impression given in an interview published in the Danish farmers’ journal LandbrugsAvisen in February 2014, Ms. Kongstad claimed that her husband worked “more than full time” in his official job in the public sector.
In a similar vein in an interview which Kongstad himself gave to Managing Intellectual Property in March 2016 (subscription required to read the whole article), he stated the following: “I am now spending about half of my time on EPO-related work, but I do not receive any remuneration for that.”
“From the CVR data it appears that BREMELAND HOLDING and JESØK HOLDING are — as their names suggest — holding companies whose primary purpose to hold shares in other companies and businesses.”But despite being such a busy fellow in his public sector day job, Kongstad still seems to be able to find enough time for an impressively diverse range of private entrepreneurial activities.
A quick glance at the publicly-accessible Danish Central Business Register (aka CVR — Det Centrale Virksomhedsregister) reveals some interesting information. Note: The CVR is the central government register containing primary data on all businesses in Denmark, regardless of economic and organizational structure, except personally owned companies with an annual turnover of less than 50,000 DKK. The CVR is available with English navigation, headings and categories, although a lot of content is in Danish and it can be accessed by anyone.
According to the data contained in the CVR, the following private limited companies have their registered address at the Kongstad family home in Helsinge.
BREMELAND HOLDING ApS
Company Reg. No. 35033165
JESØK HOLDING ApS
Company Reg. No. 31160561
FJORDBLINK MEDICAL ApS
Company Reg. No. 25942507
From the CVR data it appears that BREMELAND HOLDING and JESØK HOLDING are — as their names suggest — holding companies whose primary purpose to hold shares in other companies and businesses.
“The main activity of Bremelandsgård is “breeding of fur animals, etc.”“The shareholders in BREMELAND HOLDING are Mr. and Ms. Kongstad and their three sons. The shareholders in JESØK HOLDING are BREMELAND HOLDING and SK VIRUM HOLDING, a further holding company apparently owned by Mr. Kongstad’s brother.
FJORDBLINK MEDICAL ApS is an actively trading company which is 100% owned by BREMELAND HOLDING and whose main purpose is “to develop, produce, sell and trade with medical devices”.
A further business in the form of a sole proprietorship is also registered in Kongstad’s name:
Bremelandsgård v/Jesper Kongstad
Company Reg. No. 34572445
The main activity of Bremelandsgård is “breeding of fur animals, etc.” According to the CVR entry the company also engages in secondary lines of activity described as “business and other management consultancy activities”.
“According to the official record these companies ceased trading either after bankruptcy or voluntary liquidation or due to the company undergoing a split or merger.”Yet another company which is apparently owned and operated by the Kongstad family is WARMECENTRALEN A/S (Company Reg. No. 25801059), a plumbing and central heating company which is jointly owned by BREMELAND HOLDING and SK VIRUM HOLDING.
Aside from the currently active companies in the Kongstad family business conglomerate the CVR also lists a series of other now-defunct companies with which Kongstad was associated during the years 2001 and 2003 (i.e. before his appointment as Director General of the DKPTO): NASCENT ApS, BSP PHARMA A/S, ASTION DANMARK A/S, ASTION DEVELOPMENT A/S, ASTION HOLDING A/S, ASTION INFLAMMATION ApS, IDA ROYALTY ApS, INSTITUT FOR DROGEANALYSE A/S, HENRIKSHOLM A/S. According to the official record these companies ceased trading either after bankruptcy or voluntary liquidation or due to the company undergoing a split or merger.
One might wonder how Mr. Kongstad manages to find enough time and energy to devote to his various private business ventures given his onerous duties in the public sector as head of the DKPTO, member of the NPI Board and Chairman of the EPO Administrative Council.
“We are not in a position to pass judgment on the question as to whether or not Mr. Kongstad’s private entrepreneurial activities are in compliance with the code of conduct for Danish civil servants.”However, it is important to stress that there is no suggestion that his involvement in these ventures necessarily involves anything untoward or irregular and it should be noted that the official code of conduct for Danish civil servants does not exclude an official from having another occupation in addition to his official position.
Nevertheless, Section 17 of the Danish Civil Servants Act places some restrictions on other occupations: “An official may only have another occupation beside his official position insofar as and to the extent that it is consistent with the conscientious exercise of duties related to the official position and with the esteem and trust that the position requires.”
Note: The standards which apply in this regard are explained in more detail in the guidelines issued by the Danish State Employer’s Authority in a Danish language publication entitled “God adfærd i det offentlige”.
An English language summary entitled “Code of Conduct in the Public Sector – in brief” is also available.
According to the official guidelines, any additional occupation:
- must not involve the risk of conflicts of interest in relation to the main occupation,
- must not put too many demands on the employee’s work and
- must not be against the “dignity requirement”.
The “dignity requirement” (or “decorum requirement”) is set out in § 10 of the Danish Civil Servants Act: “Officials must conscientiously abide by the rules that apply to their position, and both within and outside the service prove worthy of the esteem and trust that the position requires.”
“The final two parts will be dealing respectively with the medical appliance trading company FJORDBLINK MEDICAL ApS and the fur farming sole proprietorship Bremelandsgård.”We are not in a position to pass judgment on the question as to whether or not Mr. Kongstad’s private entrepreneurial activities are in compliance with the code of conduct for Danish civil servants. That is clearly a matter for the national authorities in Denmark and for his supervising minister, Troels Lund Poulsen. However, we do intend to take a closer look at some of the business ventures referred to above because they raise issues which may deserve further investigation, in particular the medical appliance company FJORDBLINK MEDICAL ApS and the fur farming sole proprietorship Bremelandsgård.
The final two parts will be dealing respectively with the medical appliance trading company FJORDBLINK MEDICAL ApS and the fur farming sole proprietorship Bremelandsgård. █
Permalink
Send this to a friend
10.06.16
Posted in Deception, Europe, Patents at 5:55 pm by Dr. Roy Schestowitz
Sending a warning shot the boards’ way (Chairman of the Enlarged Board of Appeal is next to go)…
Source (original): Rospatent
Summary: Staff of the EPO is still fighting back against the chopper and liar in chief, Mr. Battistelli, whose flagrant disregard for the law is odious as he keeps “turning a blind eye on infringements of fundamental rights in the EPO”
LAST NIGHT we wrote about the EPO‘s kangaroo courts, which have become a hallmark of Battistelli’s horrible, horrendous regime. The following latest comment discusses how Battistelli keeps defaming a judge whom he dislikes, using the “Nazi” bat (not the judge's club). He would have everyone laid off if he could. Instead he systematically fires/sanctions/silences all or most of the staff’s representatives (a top-down approach). Nobody is safe when allegations can be made up, fabricated, or sexed up/distorted based on half-truths. There is no access to justice within the EPO or even outside of it.
“Every bit of negative publicity which the EPO has received is something that Battistelli and his goons deserve; they have done this to themselves, not just with their words but also with their actions.”“Yeah,” a new comment says, “so ridiculous that they were eventually dropped by the “prosecution” and did not feature in the June proceedings. However, rumour has it that a certain batty-brain keeps trotting them out at regular intervals to remind his retainers why the suspension should be maintained.”
Quoting the previous message that said: “The accusations were downright ridiculous: having “objects which can be constructed as weapons” and “nazi memorabilia”. The exact wording at the time fails me, but it really sounded as if they combed his office and found nothing but a pocket knife and an history book to frame him.”
It wasn’t a pocket knife but sporting equipment (a club). Would a tennis racket qualify as a weapon? How about a bowling bowl? For weaponry fetishes look no further than Jesper Kongstad and his political friends who like to murder large animals for reaction/leisure (we covered this in the morning).
“The guy is a chronic liar and as time goes by he needs to lie more and more (keeping up with previous lies), to the point where almost every sentence out of his mouth is a lie…”Every bit of negative publicity which the EPO has received is something that Battistelli and his goons deserve; they have done this to themselves, not just with their words but also with their actions. “Is it just me,” I publicly asked earlier today, “or has someone else noticed that a lot of the media distances itself from/avoids Battistelli for fear of reputation damage?” The guy is a chronic liar and as time goes by he needs to lie more and more (keeping up with previous lies), to the point where almost every sentence out of his mouth is a lie (see this latest interview with him).
We have meanwhile been learning more about next week's EPO protest. “Forthcoming demonstration[s] on 13 October,” we learned, are planned for The Hague (there is also a demonstration planned for Munich).
People are said to be “organizing a demonstration on 13 October at lunch time in The Hague to draw the attention of the Prime Minister of the Kingdom of The Netherlands and the Representation of the EU in The Netherlands that urgent action is needed. Letting Mr Battistelli ignore the AC resolution CA/26/16 or turning a blind eye on infringements of fundamental rights in the EPO cannot be the policy of democratic EU members states.”
This coincides with the meeting of the Administrative Council. The main question on people’s mind is, will Jesper Kongstad be Battistelli’s lapdog, lap chinchilla, or maybe he’ll finally wake up and realise he’s supposed to be a watchdog? █
Permalink
Send this to a friend
Posted in News Roundup at 3:41 pm by Dr. Roy Schestowitz
Contents
-
When I was 17 years old, I started using Linux because I wanted a desktop that resembled my brother-in-law’s Gentoo laptop, which used the KDE environment. Instead, I got the now-nostalgic brown and orange GNOME 2 environment because I’d installed Ubuntu. (Ubuntu has since changed its color palette.)
-
Server
-
Fifth place was a five-way tie between Lenovo, NetApp, IBM, Huawei, and Inspur. IDC declares a statistical tie when there is less than a one percent difference in revenue among two or more vendors.
-
It may sound counterproductive from an Automation specialist to reveal the limitations of his job, but I have seen a wide range of inefficiencies, and many failed attempt to fix them.
-
As more and more of our infrastructure moves into the cloud, the proliferation of buzzwords, new terms, and new ways of doing things can be daunting. Fabio Chiodini, Principal System Engineer at EMC, spent some time helping us make sense of these concepts during his LinuxCon Europe talk, “Cloud Native Applications, Containers, Microservices, Platforms, CI-CD…Oh My!!”
-
Docker’s mission is to build tools of mass innovation, starting with a programmable layer for the Internet that enables developers and IT operations teams to build and run distributed applications. As part of this mission, we have always endeavored to contribute software plumbing toolkits back to the community, following the UNIX philosophy of building small loosely coupled tools that are created to simply do one thing well. As Docker adoption has grown from 0 to 6 billion pulls, we have worked to address the needs of a growing and diverse set of distributed systems users. This work has led to the creation of many infrastructure plumbing components that have been contributed back to the community.
-
Kernel Space
-
-
-
-
-
-
-
-
The Linux 4.8.0 kernel was officially release on October 2, becoming the fifth kernel release so far in 2016. The Linux 4.7 kernel was released on July 24.
As opposed to all the other kernel releases this year (and in fact in contrast to all kernel releases since 2.6) Torvalds really wasn’t happy about this one, though the source of his displeasure didn’t become apparent until after the release.
“So the last week was really quiet, which maybe means that I could probably just have skipped rc8 after all,” Torvalds wrote in in his Linux 4.8 release announcement. “Oh well, no real harm done.”
A day later on October 3, Torvalds addmits that he shouldn’t have merged a late set of updates from kernel developer Andrew Morton.
-
Dave Chinner has submitted his XFS file-system updates for the Linux 4.9 kernel. This time around most of the changes are internal to the open-source file-system rather than boasting new end-user features.
XFS for Linux 4.9 has improvements to the iomap-based DAX infrastructure, iomap fixes and changes, more efficient XFS delayed allocation using iomap, preparation patches for upcoming reflink support, and other prep changes and internal improvements.
-
-
-
After nearly exactly two months, Linus Torvalds released kernel 4.8 into the wild on Sunday, October 2nd. Torvalds dubbed 4.8 Psychotic Stoned Sheep, probably inspired by the news that a flock of woolly ruminants ate some abandoned cannabis and, high as kites, run amok in rural Wales, striking terror into the hearts of the locals.
This has been one of the larger releases, with many patches being sent in before the first release candidate was published. However, Torvalds attributes many of the changes to the switch to a new documentation format — instead of using the DocBook, documentation must now be submitted in the Sphinx doc format.
-
Two days after announcing the release of the Linux 4.8 kernel as the latest stable and most advanced kernel branch for GNU/Linux operating systems, Linus Torvalds apologizes on the kernel mailing list for the inclusion of bug.
According to Mr. Torvalds, the bug was left in the last RC8 (Release Candidate 8) build by kernel developer Andrew Morton, which caused problems when attempting to compile it, thus resulting in a dead kernel. If you’re curious, the full report is attached to Linus Torvalds’ mailing list announcement.
-
Graphics Stack
-
-
-
-
-
-
A number of last minute XWayland improvements/fixes landed today in the Git code-base ahead of this month’s X.Org Server 1.19 release.
XWayland changes hitting the xorg-server Git today include creating a secondary input device to be used for pointer warping/locking, pointer warp emulation, touch fixes, and other xwayland changes.
-
-
-
If you have a GCN 1.0 Southern Islands or GCN 1.1 Sea Islands graphics card and have been wanting to play with the experimental AMDGPU kernel DRM driver as an alternative to the Radeon DRM driver, here’s an opportunity for Ubuntu/Debian users.
With the forthcoming Linux 4.9 kernel is the new experimental Kconfig option to enable GCN 1.0 GPU support in AMDGPU, complementing the existing GCN 1.1 build-time option for turning on support there in this more modern DRM driver. In case you missed my tests this week of the experimental functionality in AMDGPU DRM, see AMDGPU vs. Radeon GCN 1.0/1.1 Performance On Linux 4.9 DRM-Next and Regressed R9 290 Isn’t Affected By Issue When Using AMDGPU DRM Driver.
-
Applications
-
Today, October 5, 2016, the Wireshark development team announced the release of the first maintenance update for the Wireshark 2.2 series of the world’s most popular network protocol analyzer software.
-
The development cycle of the Docker 1.12.2 maintenance update to the widely-used open-source and cross-platform application container engine continues with a second Released Candidate, as announced on October 3, 2016, by Docker engineer Victor Vieux.
Docker 1.12.2 Release Candidate 2 (RC2) comes one week after the unveiling of the first RC milestone, mainly to address more of the bugs and annoyance discovered lately or reported by users since the first point release of the major Docker 1.12 release. Again, the entire changelog is attached below if you like to read the technical details.
As you might know, Docker 1.12 introduced a lot of exciting new features, such as the built-in orchestration and routing mesh, the brand new Swarm Mode, as well as a bunch of networking improvements for better security. And it looks like Docker 1.12.2 will attempt to further improve the Swarm Mode and networking functionalities.
-
The day of October 5, 2016, also brought us a new Beta of the upcoming Kodi 17 “Krypton” open-source and cross-platform media center software, the third and most probably the last for this development cycle.
As we told you in the report about the second Beta of Kodi 17, the final release of the popular media center is launching later this fall with numerous new features and improvements in areas like skinning, video playback, PVR/DVR, live TV, music library, etc. Beta 3 comes three weeks after the release of the second Beta milestone, and it includes a bunch of fixes for various issues reported by users since then.
-
Of course, just a few hours after releasing frogr 1.1, I’ve noticed that there was actually no good reason to depend on gettext 0.19.8 for the purposes of removing the intltool dependency only, since 0.19.7 would be enough.
-
Like most people living in 2016 I don’t use Flickr. But if I did, I’d probably use Frogr to manage and upload my photos. Frogr is one of a few apps that I’ve written about across all 7+ years I’ve run this site.
-
The libvirt Linux virtualization API has been updated to version 2.3 today with some new features and plenty of bug fixes.
-
If you’re a fan of the Harmony music player then listen up: there’s a new update waiting for you to download.
-
Making the GNOME top panel transparent is something a lot of users like to do — but it can look a little out of place when you maximise a window. Dynamic TopBar is a nifty little extension for the GNOME Shell desktop that “makes the top bar transparent when no window is maximized.”
-
It seems a recurring meme in MediaGoblin land to say “we’ve been quiet, because we’ve been busy” (or maybe historically on every tech blog ever), but I guess I can’t resist repeating the mantra. It’s true! Though the weight of my focus has been shifted from where I expected it to be. From the last few updates over the last year, you would be right to anticipate that the main thing I would be working on would be merging the federation code Jessica has written and getting 1.0 out the door. That was the plan, and we’re still working towards that, but priorities shifted as we realized the opportunities and time pressures we were under with ActivityPub. After the Social Working Group face to face meeting in June, Jessica and I sat down and talked about what we should do. Jessica had recently started working at Igalia (great people!) and was busy with that and other transitions in her life, so we discussed whether we thought it was most sensible to focus my energy on MediaGoblin or on ActivityPub. It was clear that ActivityPub was shaping into a solid specification, but it was also made clear that the Social Working Group’s charter was running out by the end of 2016. We both think ActivityPub is key to MediaGoblin’s success and didn’t want to see our invested time go to waste, so decided my immediate focus should switch to ActivityPub so it could successfully make it as a standard.
Which isn’t doom and gloom for MediaGoblin! MediaGoblin development has continued… the community is good enough that people have been able to work while I’ve been busy. I’m happy to say we also appointed longtime contributor Boris Bobrov as co-maintainer to help reduce me being a bottleneck. (Thank you Boris, and congrats!) Other contributors have also stepped up to the plate. I’m especially thankful of Ben Sturmfels for hosting MediaGoblin hackathons and being so responsive to community members. (And of course, there are many others to thank, too!)
Anyway, I’m not going anywhere, I’ve just been shifting focus to standards work for a bit… but it’s all for the greater good of MediaGoblin. (Well, and the greater federated social web!) Soon, we’ll be putting the work we’re doing on ActivityPub directly into MediaGoblin. When we merge Jessica’s work on federation, we will also retool it so that the first federated release of MediaGoblin will be blazing the trails with ActivityPub.
-
Instructionals/Technical
-
Games
-
Readers of this site should know by now that, as a general rule, DRM is equal parts dumb and ineffective. What in theory is a way for game publishers to stave off piracy typically instead amounts to a grand digital method for making sure legitimate customers can’t play the games they buy. Now, not all DRM is created equally shitty, of course — one of the more benign forms of DRM is Valve’s Steam platform. Because games purchased on the platform check in with Steam servers for product keys and otherwise encrypts the individual files for the game each user downloads, it’s a form of DRM.
And because DRM is almost always annoying even at its best, there are some gamers who will only buy DRM-free games. Many Kickstarter campaigns for video games, in fact, explicitly state that backers and non-backers will have a DRM-free option for the game available, either through platforms like GOG and HumbleBundle, or directly from the developer. Duke Grabowski, Mighty Swashbuckler! was one such game, with developer Venture Moon Industries promising both a Steam release and a DRM-free release when it collected funds from backers. Then, suddenly, once the company got a publisher on board for the project, it announced that the game would only be available on Steam.
-
Steam updated today and, as a nasty surprise, I hit the same problem I had before with it.
I tried the solution here, but it was not working this time: the code reverted to its original form, preventing the Steam runtime to work.
-
You won’t believe this, by Feral Interactive announced a few hours ago, October 5, 2016, that it will port the awesome Mad Max open world action-adventure video game to the SteamOS, Linux, and Mac platforms.
Developed by Avalanche Studios and published by Warner Bros. Interactive Entertainment, the Mad Max has been officially released for Microsoft Windows operating systems, as well as PlayStation 4 and Xbox One gaming consoles a year ago, on September 2015.
-
Quite a number of people have asked me to talk about where to buy Linux games, how to make sure developers are supported and so on, so here I am.
First of all, I am fully aware there will likely be a small backlash in the comments on certain points. We do seem to have a small minority of very vocal people who like to boast about buying dirt cheap games from places like G2A, which makes me sad. We also have a few who like to advocate piracy, which is not only sad, but makes us look really bad in the eyes of developers. For the most part though, the people commenting here are fantastic to talk to.
To make this a point: I am not aiming to single anyone out, nor am I aiming to be hostile towards anyone. Read this as if we are all sitting around the table having a *insert favourite drink* and discussing the best way to support our platform. That’s what this is all about, everything I do is to help Linux gaming progress somehow.
To get this out of the way; I flat out do not recommend buying from places like G2A and Kinguin, Samsai already wrote about that here. Read that as a starting point if you please. Basically, don’t pre-order, don’t buy from random reseller stores.
-
Shadow Warrior 2 was due to get a Linux version, then suddenly information on it vanished from the Steam page and Humble Store. The plot thickens from there.
When queried about it, a developer for Flying Wild Hog blamed it on a publisher decision (Devolver Digital) not to have Linux at day-1. I personally spoke to Devolver on twitter, who claimed this was false and they didn’t know why the developer said so. That developer very quickly deleted their post after this, and then made a new one that was entirely different.
-
BUTCHER is a blood-soaked action platformer from Transhuman Design, the developer behind King Arthur’s Gold and Trench Run.
It’s brutal, difficult, fast paced and it’s actually rather good. It’s almost as if Doom or Quake were re-designed as an action platformer, with the difficulty and speed of Broforce thrown in for good measure. That’s how I can best describe it. It has a similar atmosphere to Doom and Quake, and great action. There’s very little plot to it, no tutorials to get through and nothing standing in the way of getting in, killing stuff and getting on with it.
-
-
It’s good to see both Dead Island Definitive Edition [Steam] & Riptide Definitive Edition [Steam] still being supported. Both have been patched to fix major issues.
-
‘Stellar Tactics’ [Official Site, Steam] is a rather expansive looking space exploration RPG and the good news is that the developer already has plans for a Linux version.
-
-
-
Day of Infamy [Steam] is the new FPS from the Insurgency developers New World Interactive. It has a Linux version, even though it’s not advertised yet. It seems to work pretty well and they just updated the game.
-
I’m going to be honest, this is quite easily going to be my Game Of The Year on Linux.
-
Super Time Force Ultra [GOG, Steam] was recently ported to Linux thanks to Aaron from Knockout Games, now I’ve had a chance to check out this action platformer I’ve given it a few thoughts.
-
Feral Interactive announced today that the open world, third-person action game Mad Max is coming to Mac and Linux on October 20th, 2016.
-
-
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDE Student Programs announces the 2016-2017 Season of KDE for those who want to participate in mentored projects which enhance KDE in some way. Projects from past Seasons of KDE include new application features, the KDE Continuous Integration system, new reporting for developers, as well as a web framework, porting and a plethora of other work.
Successful mentees earn a certificate of completion along with a very cool t-shirt and other goodies. Any person who wants to complete a project is eligible to enter.
-
After many work around in the previous beta version of KDE Plasma 5.8 beta,KDE team is finally here with their first LTS of Plasma desktop software release, KDE Plasma 5.8 LTS.
Believe it or not, this release is surely gong to attract plenty of non-techie or simple users.But Techies are also not going to lose interest, this Ubuntu based beauty is going to prove the beast features as well.
-
GNOME Desktop/GTK
-
It had great talks that will eventually end up in videos uploaded to the web site. We were amazed at the progress being made to Servo, including some performance results that blew our minds. We also discussed the next steps for WebKitGTK+, WebKit for Wayland (or WPE), our own Clutter wrapper to WebKitGTK+ which is used for the Apertis project, and much more.
[...]
One of the main problems people reported was applications that use WebKitGTK+ not showing anything where the content was supposed to appear. It turns out the problem was caused by GTK+ not being able to create a GL context. If the system was simply not able to use GL there would be no problem: WebKit would then just disable accelerated compositing and things would work, albeit slower.
-
GNOME 3.24 is to be released on March 22, 2017 — providing that development goes to plan between now and then, of course!
-
-
If you have a computer with an AMD hybrid configuration with Intel HD integrated graphics, and you’re running the newest GNU/Linux distributions, chances are the AMD Radeon GPU is not properly supported.
-
Reviews
-
Apricity OS is a great, two-pronged Linux distro that recently reached a milestone that will ensure its continued success.
Apricity’s first public beta, which was GNOME-only, was released more than a year ago. A choice of either the GNOME or Cinnamon desktops later became available in the monthly development snapshot releases.
This rolling release delivery method already provided a pleasant computing experience. Both desktop versions performed well. Each monthly build brought more functionality. I have not experienced any stability issues with the continuing stream of beta releases.
-
New Releases
-
Linux Lite creator Jerry Bezencon informs Softpedia today, October 5, 2016, about the release and immediate availability of the Beta of his upcoming Linux Lite 3.2 Ubuntu-based operating system.
-
OSMC’s September update is here. These changes come in light, as Kodi Jarvis (v16) is very stable as it nears its end of its life. We have been working on preparing OSMC for Kodi Krypton (v17) and will be offering some test builds for all platforms shortly.
We have also been working on a new version of the OSMC skin which will be compatible with the upcoming Kodi release. We’ve taken a lot of community feedback on board and updated the skin to reflect our new brand. As soon as we have some test builds for the new version of Kodi, we will also make our new skin available for public testing.
-
OpenSUSE/SUSE
-
Today, October 5, 2016, the openSUSE Leap development team announced the availability of the third and last Beta snapshot for the upcoming openSUSE Leap 42.2 operating systems, due for release in mid-November.
-
-
Red Hat Family
-
At the Red Hat Forum in London, a couple of key tenets shone through – getting the all-important digital transformation right and the power of open source.
For the event, which was opened up to the press for the first time, digital transformation took the bulk of the talk. “Software is becoming the differentiating factor for your company,” explained Werner Knoblich, Red Hat senior vice president and general manager EMEA.
-
Finance
-
Fedora
-
He goes on to say that he’s working to get to the root of the issue and hopes to have the issue patched soon. In the meantime, he suggests not running the update from a desktop environment.
“If you’re using Workstation, the offline update system is expressly designed to minimize the likelihood of this kind of problem, so please do consider using it,” he advised. “Otherwise, at least run ‘dnf update’ in a VT – hit ctrl-alt-f3 to get a VT console login prompt, log in, and do it there. Don’t do it inside your desktop.”
-
Debian Family
-
We told you at the beginning of the summer that you can help define the new look and feel of the upcoming Debian GNU/Linux 9 “Stretch” operating system, due for release later this fall.
-
Derivatives
-
Canonical/Ubuntu
-
Over the past few years a number of companies have released small desktop computers with Intel Atom processors. Some ship with Windows software. Some have Linux. And others have no operating system at all.
Want to install your own operating system? If you’re using Windows that shouldn’t be too hard. But Linux may be another story, since many GNU/Linux-based operating systems lack some of the wireless or HDMI/audio features you may need.
-
Note that the Ubuntu Linux models are considered Dell’s “Developer Edition” laptops, so they’re not necessarily cheaper than their Windows counterparts. In fact, the most affordable 2016 Dell XPS 13 available with Linux is a $950 version with a Core i5-7200U CPU, 8GB of RAM, and 128GB of storage.
-
When you want a laptop running Ubuntu, you can always purchase a Windows machine and replace the operating system. Why bother with that hassle, though? Instead, it is smart to buy a machine pre-loaded with a Linux-based operating from a company like System76.
While System76 sells brilliant Ubuntu-powered laptops and desktops, it is not the only game in town. Actually, believe it or not, Dell has long been a proponent of Linux, even before ‘Project Sputnik’. Its Ubuntu-powered XPS 13 Developer Edition laptops have been quite popular, and for good reason — they are built well and are very beautiful. Today, Dell announces a refresh with 7th-gen Intel Kaby Lake processors. The 13-inch laptop even gets a new color option — rose gold.
“As you may remember, these systems began life four years ago as Project Sputnik, an open-ended exploratory project. From the very beginning, the effort was designed to solicit and incorporate input from the developer community as to what they wanted in a laptop”, says Barton George, Senior Principal Engineer, Dell.
-
The latest updates to Ubuntu 16.10 Yakkety Yak add a Unity8 desktop session to the Ubuntu login screen.
-
-
In case you missed word earlier, the Unity 8 desktop is now available to try out in the latest Ubuntu 16.10 developer images — no need to manually install anything. It’s not the default experience, but it’s there, as an option, right on the login screen (see right).
-
Dustin Kirkland leads Canonical’s platform products and has said that his firm’s focus is operational simplicity while delivering security, elasticity and compatibility with the Kubernetes standard across all public and private infrastructure.
-
We told you earlier this summer that we’re switching to use Ubuntu 16.10 (Yakkety Yak) on some of our computers to monitor its development cycle and inform you guys about the new features it gets.
-
We reported back in August that Ubuntu project member Nathan Haines put together yet another Free Culture Showcase event were amazing artists would submit their beautiful wallpapers for the upcoming Ubuntu 16.10 operating system.
-
For those hoping Unity 8 on Mir would make it into upcoming Ubuntu 16.10 will be pleased to know it has. Phoronix and OMG!Ubuntu! have tested it. openSUSE 42.2 Beta 3 was announced today, a day ahead of schedule featuring the newly released Plasma 5.8. Elsewhere, Kevin Fenzi shared some good tips for enhanced security and Jack M. Germain test drove stable Apricity OS 7.2016 Aspen.
-
The XPS 13 Developer Edition is not an exception.The Dell XPS 13 Developer Edition will run Ubuntu Linux OS with the 7th generation Intel Kaby Lake processors. This has just been announced by Dell. Users can also enjoy the 13-inch laptop in a rose gold color option.
-
Senior Principal Engineer at Dell Barton George wrote in a recent blog the company unveiled a new version of its XPS 13 Developer Edition laptop in the United States and Europe. As a refresher, this laptop is the result of George’s Project Sputnik initiative to provide an Ubuntu-based solution to developers. The laptop is now in its sixth generation packing a seventh-generation Intel Kaby Lake processor and an InfinityEdge display.
“From the very beginning, the effort was designed to solicit and incorporate input from the developer community as to what they wanted in a laptop,” he said. “With the community’s input, Project Sputnik became an official product and continues to evolve.”
-
-
The Armadeus “Opos6UL” COM runs Linux on an i.MX6 UL SoC, and has eMMC, optional wireless, extended temp support, and a carrier board with RPi-style I/O.
French embedded manufacturer Armadeus Systems, which last year shipped an APF6_SP computer-on-module with an i.MX6 and a Cyclone V GX FPGA, has now unveiled a more modest, but similarly Linux- and NXP-based COM aimed at IoT applications. The i.MX6 UltraLite (UL) based Opos6UL is designed for industrial products like IoT gateways, medical devices, small HMI, and autonomous robotics.
-
Phones
-
It’s our great pleasure to announce that we are now starting to speed up deliveries of Sailfish OS updates.
This post, as mentioned in the title, is about the next early access iteration, update Fiskarsinjoki. Fiskarsinjoki is a small Finnish river in the village of Fiskars. It passes through a park-like cultural landscape and lands in the Gulf of Finland – just some trivia for you to learn!
-
Jolla is looking to push out Sailfish OS releases faster and thus today announced “Fiskarsinjoki” in early access form.
This next iteration of Sailfish OS is codenamed Fiskarsinjoki over a small Finnish river. Fiskarsinjoki adds support for saving images/video directly to an SD card, easy conference calls support, an integrated scientific calculator, more editing options in the image gallery, file sharing support in the file manager, and various other small features and refinements.
-
With the Linux 4.9 staging pull request comes the addition of the Greybus subsystem.
-
Tizen/ARTIK
-
The latest Tizen based smartwatch, the Gear S3, has been launched at the end of August. This gear device builds on the hit features of the Gear S2, the circular screen and rotating bezel immediately come to mind, and adds more features for the fashion and sports conscious amongst us.
-
We’ve been following the launch of the Samsung Z2 closely, as you would expect from Tizen Experts, and we knew that Kenya was the next market to be graced by the Z2 and its 4G capabilities. Well it looks like today is the day as Samsung has been sending out Press Invites for the event over the last few days.
-
Many of our readers have been waiting for Xender, a file transfer & sharing app, to be released on the Tizen Store and today it finally has. Do you need to transfer a file between mobile phones or between your phone and the pc? This is what Xender is designed to do and it does it quite well. The app boasts at being the fastest all-in-one file transfer and sharing app!
-
Samsung and hackster.io had announced an ‘IOT challenge Using ARTIK Cloud” a couple of months ago in order to bring the maker and developer community on board to samsung’s cloud platform. The deadlines for submissions of project ideas are about to close in 5 days at the time of writing. A huge list of entries have been flooding the doors of hackster.io and Samsung ever since the contest was announced.
-
Android
-
-
-
Lenovo will not build smartmobes running on Microsoft’s Windows operating system because it doubts the software giant’s long term commitment to the market.
This is the view from Lenovo’s chief operations officer Gianfranco Lanci, who told attendees at the Canalys Channel Forum 2016 that Windows 10 was generating interest in the corporate market for PCs but that his company won’t entertain basing its phones on the OS.
“We don’t have Windows phones or any plans to introduce a Windows Phone,” he said.
“I don’t see the need to introduce a Windows Phone and I am not convinced Microsoft is supporting the phone for the future,” Lanci added.
According to Gartner, Windows Phone/Windows 10 Mobile was the third most popular OS on the planet behind Android and iOS during Q2, running on 1.97 million phones compared to 297 million on Google’s OS and 44.39 million on Apple’s software.
-
When it comes to home entertainment, especially the new wave of 4K-enabled products, it gets pretty expensive to kit out your home with equipment. And if you’re in a home with multiple screens, it’s even more so.
The Probox2 is the latest Android-based TV box to hit the market and has a great number of features to at least tempt you to consider stumping up the cash to get quality visuals in all your rooms.
-
It’s increasingly likely that you’re reading this on your smartphone. In fact, it’s likely you’re doing more on your phone than ever before, which is why it’s so important to buy the right one — for you and the people in your life.
Here at Android Central, we don’t just play with phones — we live and breathe them. We’re constantly comparing them to the competition, seeking out the ideal device for each particular use case. We believe in the Android mantra of, “Be together, not the same,” which is why we are launching the Smartphone Buyer’s Guide to help you pick the right phone for your unique situation.
-
-
At Google’s hardware event this week, the new version of the Android operating system, Android 7.1 (Nougat 7.1), was barely mentioned. As it turns out, there was a reason for that: some of the new Pixel smartphones‘ best features won’t be arriving in the new OS. This includes features like Google Assistant, the built-in customer support service, unlimited and free backup of full-res photos and videos, Smart Storage, and more.
Details on which features were “Pixel-only” were previously reported by Android Police, citing a changelog provided by a Google source. Google confirmed to us those changes are accurate.
Some of the omissions make sense. For example, only Pixel phones will ship with the new, “quick switch” adapter that makes it easier to move your data from iPhone to Android. That requires hardware in the form of the adapter cable.
-
For years the Android fanboy argument has been that the iPhone is too expensive and that Android offers them a way to get a high-end smartphone for a fraction of the price.
-
Blending traditional and touch computer user input methods to create a satisfying experience and commercial success has proven elusive for the three big consumer operating system vendors. Apple, in fact, has mostly avoided the challenge by keeping the Mac and ther iPad distinct, with Tim Cook likening attempts to meld laptop and tablet interfaces to combining a refrigerator with a toaster.
[...]
If putting Android apps on Chrome OS has failed to excite, how about imbuing Android with elements of Chrome OS? That seems to be the idea behind Andromeda, a rumored forthcoming Google OS that would presumably aim to incorporate the best of both worlds. One model for how it may look and work comes from Remix OS, a tweaking of Android that debuted on a Surface-like device and has since become far more broadly available. It borrows desktop user interface elements from Windows even more aggressively than Chrome does.
Five years ago, I wrote that Chrome OS was heading toward a niche—ultimately the education market—versus Android. Now, with Andromeda, the security and simplicity that makes Chrome OS great and the windowing user interface that makes it usable on laptops could become key ingredients in finally allowing Android to have an impact on larger-screen computing devices.
-
Samsung introduced this camera setup in the Galaxy S7, and it’s just as fantastic today in the newer Galaxy Note 7. The 12MP resolution gives you plenty of pixels to work with, and the optical image stabilization (OIS) keeps everything clear whether you’re taking low-light shots or shooting video on the move.
Just as important as the photo output is how quickly the camera operates. Two presses of the home button launch the camera in less than a second, and photos are taken instantaneously even when shooting in HDR or a tough lighting situation. The camera interface is simple but also powerful if you choose to move to the full Manual mode, which can enable great shots if you want to tweak and use a tripod.
-
It’s been a tougher question to answer recently, as Android phones have approached and in some cases beaten the iPhone in terms of design and capability.
But there’s one major thing that keeps me recommending the iPhone over any Android phone: the iOS ecosystem.
It’s the only platform with the best developer support and consistent updates with new features throughout the life of your device. Android can’t do that. In fact, many Android phones stop getting new updates and features after a year or so.
-
It is truly a bummer that the Galaxy S7 Active is an AT&T exclusive because this is a smartphone worthy of all SIMs. Inside, it’s packed with the same stellar components as the rest of the Galaxy S7 family, including a Snapdragon 820 processor and 4GB of RAM. It also offers a massive 4000mAh battery, in addition to a rugged, dust-proof, and water-resistant enclosure. Its 5.1-inch Super AMOLED display is bright enough to see in the great outdoors and sits behind a shatter-resistant protective coating that can withstand the toughest of falls.
Bottom line: The Galaxy S7 Active is what other consumer-oriented rugged smartphones should aim to be like.
-
Android may be the dominant smartphone operating system (OS) but “it’s not invincible,” according to analysis firm IHS Markit, which argues that Google’s latest Pixel smartphone could risk antagonizing manufacturers reliant on the software.
On Tuesday, Google – a subsidiary of Alphabet – held a hardware event in which it launched two smartphones – the Pixel and Pixel XL – a smart home hub called Google Home, a virtual reality (VR) headset, Wi-Fi routers and a new version of its Chromecast streaming device.
The Pixel smartphone runs Google’s Android software and comes with Google Assistant – the technology giant’s digital personal assistant similar to Apple’s Siri, which is also present on its Home hub.
-
-
-
-
-
Open source careers may be even more in demand and rewarding in Europe than the rest of the world, according to new data from the 2016 Open Source Jobs Report released today by The Linux Foundation and Dice. European open source pros are more confident in the job market, get more incentives from employers, and more calls from recruiters than their counterparts worldwide, according to the data.
The full report, released earlier this year, analyzed trends for open source careers and the motivations of professionals in the industry. Now, the data have been broken down to focus specifically on responses from more than 1,000 open source professionals in Europe, and how they compare to respondents from around the world.
-
This project was incredibly exciting to me because it demonstrated the freedom that digital art represents. Digital art allows traditional audio and visual methods to take on new forms by adding layers of data and interactivity. This means that your project can respond to events happening in its environment, or on the other side of the world. When a project begins acquiring hardware components like lighting or moving objects, the term digital art seems inadequate since the entire environment becomes the art piece.
It is well-established that the open source movement has created an enormous amount of value for businesses and organizations. Often overlooked, however, is the amount of value that it has created for those looking to pursue creative ventures. The open source community has created a plethora of libraries and frameworks that reduce the barrier of entry for aspiring digital artists and musicians. Though there are many out there, I would like to focus on Processing and Arduino because they have most shaped my approach to both art and programming.
-
For many of us, our calendar is our lifeblood. Without it, we would be lost, perhaps both literally and figuratively.
While some people can get away with a wall calendar or a paper day planner to organize their schedule, a whole lot of us have turned over the process of managing time allotments to a digital calendar. In truth, most of us are juggling quite a few calendars from both our work and personal lives, and often a few other organizations that we’re involved with, including anything from non-profits to tech meetups to social clubs.
-
Machine learning and vision are essential technologies for the advancement of robotics. When sensors come together, they can enable a computer or robot to collect data and images in real-time.
A good example of this technology in real-world use is the latest Roomba vacuums. As the robot cleans your dirty floor, it is using sensors combined with a camera to map your home. Today, Google releases Cartographer — an open source project that developers can use for many things, such as robots and self-driving cars.
-
Google today said that it’s open-sourced Cartographer, a library for mapping movement in space in both 2D and 3D. the technology works with the open source Robot Operating System (ROS), which makes the software easier to deploy in software systems for robots, self-driving cars, and drones.
Cartographer is an implementation of simultaneous localization and mapping, better known by its acronym SLAM. But it’s not the only open source SLAM library; there are plenty others, like hector_slam. Proprietary alternatives are also available; for example, Apple recently acquired one company with SLAM software, Flyby Media. But this is Google we’re talking about — Google, the company with self-driving cars that have already driven more than 2 million miles without human control.
“Our focus is on advancing and democratizing SLAM as a technology,” Googlers Damon Kohler, Wolfgang Hess, and Holger Rapp wrote in a blog post. “Currently, Cartographer is heavily focused on LIDAR SLAM. Through continued development and community contributions, we hope to add both support for more sensors and platforms as well as new features, such as lifelong mapping and localizing in a pre-existing map.”
-
It’s a script we’ve seen played out many times in the open source community. A great software idea becomes popular, and continues to be developed by a core group of people. Those people build a business around servicing the software. The business grows, and so does the company. In an effort to sustain growth, the company chooses to monetize their software.
The business logic for this timeline is very clear, and from a certain point of view, hard to refute. Businesses exist to make money. Despite servicing a customer base that believes in the principles of open source, many companies choose – after a time – to abandon those principles to a larger or lesser degree for a traditional software business model.
-
The free and open source software community depends heavily upon the work of community-funded nonprofit organizations. These organizations develop software, organize community events, manage key infrastructure, and educate people about FOSS. They serve as key organizing points for the people and companies that develop and sustain FOSS.
Historically, some of the most important FOSS nonprofits have been U.S. tax-exempt organizations—entities recognized by the U.S. Internal Revenue Service as exempt from federal income tax according to IRS regulations. But over the last few years, the community has witnessed changes in the IRS’s handling of applications for tax-exempt status from FOSS organizations. Most troubling, the IRS has denied applications from organizations whose missions and activities differ very little from existing (and exempt) FOSS nonprofits. The IRS’s actions raised concerns within the community about whether tax exempt status would be available to future FOSS organizations and what these changes might mean for the exempt organizations upon which the community already depends. The Open Source Initiative and the Software Freedom Conservancy formed a working group to explore these questions and gather more information about the issue.
This post will cover what the working group has learned about how this issue developed, where things stand now, and what recent developments at the IRS mean for the future. In future posts, we’ll provide additional guidance to FOSS projects about organizational options, including when U.S. tax-exempt status is a viable option.
-
My travels globally have given me a feeling for how best to work in many different contexts—like Latin America, West Africa, North Africa, and Southeast Asia, to name a few. And I’ve found that I can more easily adapt my work style in these countries if I focus on something that plays a role in all of them: trust.
In The Open Organization, Jim Whitehurst mentions that accountability and meritocracy are both central components of open organizations. Trust is linked to both of those concepts. But the truth, I’ve found, is that many people don’t have the information they need to determine whether they can trust a person or not. They need data, along with a system to evaluate that data and make decisions.
I’ve found a way to measure trust, studied trust building, and developed a strategy for cultivating trust that’s worked for me over the years. I think it could work well in open organizations, where building trust is critical.
Let me explain.
-
OAuth is an open standard in authorization that allows delegating access to remote resources without sharing the owner’s credentials. Instead of credentials, OAuth introduces tokens generated by the authorization server and accepted by the resource owner.
In OAuth 1.0, each registered client was given a client secret and the token was provided in response to an authentication request signed by the client secret. That produced a secure implementation even in the case of communicating through an insecure channel, because the secret itself was only used to sign the request and was not passed across the network.
OAuth 2.0 is a more straightforward protocol passing the client secret with every authentication request. Therefore, this protocol is not backward compatible with OAuth 1.0. Moreover, it is deemed less secure because it relies solely on the SSL/TLS layer. One of OAuth contributors, Eran Hammer, even said that OAuth 2.0 may become “the road to hell,” because:
“… OAuth 2.0 at the hand of a developer with deep understanding of web security will likely result in a secure implementation. However, at the hands of most developers – as has been the experience from the past two years – 2.0 is likely to produce insecure implementations.”
Despite this opinion, making a secure implementation of OAuth 2.0 is not that hard, because there are frameworks supporting it and best practices listed. SSL itself is a very reliable protocol that is impossible to compromise when proper certificate checks are thoroughly performed.
Of course, if you are using OAuth 1.0, then continue to use it; there is no point in migrating to OAuth 2.0. But if you are developing a new mobile or an Angular web application (and often mobile and web applications come together, sharing the same server), then OAuth 2.0 will be a better choice. It already has some built-in support in the OWIN framework for .NET that can be easily extended to create different clients and use different security settings.
-
There are four essential questions a company should ask before it decides to create an open source project, according to Duane O’Brien, open source programs evangelist at PayPal.
Who cares?
Are we still using it?
Are we committing our own resources?
Can we develop it all in the open?
This framework, developed by O’Brien’s boss Danese Cooper, is useful in vetting internal software for release as open source projects.
-
Midway through SUPERSEDE, the EU three-year project backed by €3.25m in funding to make software better, software still sucks.
It’s always been thus, but now that computer code has a say in the driving of Teslas, confronts everyone daily on smartphones, and has crept into appliances, medical devices, and infrastructure, it’s a more visible problem.
Robert Vamosi, security strategist at Synopsys, told The Register in a phone interview that software quality matters more than ever.
“We’re seeing real-world examples of automobiles remotely attacked and medical devices being suspended when they need to keep functioning,” he said. “It’s becoming life-critical.”
The organizations involved in SUPERSEDE – ATOS, Delta Informatica, SEnerCon, Siemens, Universitat Politècnica de Catalunya (UPC), the University of Applied Sciences and Arts Northwestern Switzerland (FHNW), and the University of Zurich (UZH) – aim to improve the user experience of their software products with a toolkit to provide better feedback and analytics data to application developers.
-
ETSI’s Open Source MANO (OSM) group today announced Release ONE, the first code out of the NFV management and orchestration (MANO) project.
ETSI touts that OSM can natively support VIMs from VMware and OpenStack and can also support various software-defined networking (SDN) controllers. It can also create a plug-in framework to improve platform maintenance and extensions.
-
For many years AT&T has been on the forefront of virtualizing a Tier 1 carrier network. They’ve done so in a very open fashion and are actively participating in, and driving, many open sources initiatives. Their open initiatives include Domain 2.0, ECOMP, and CORD, all of which are driving innovation in the global service provider market. Chris Rice, Sr. VP of Domain 2.0 Architecture and Design of AT&T, provided an overview of how AT&T got where they are today during his keynote address at the ODL Summit.
Providing a bit of history of this journey, Rice noted that today’s implementations and visions started years ago. One of the first steps was the creation of what he called a router farm, which was initiated because of the end of life of a router and there wasn’t a new router that could just take its place. The goal was to remove the static relationship between the edge router and the customer. Once this was done, AT&T could provide better resiliency to their customers, detect failures, do planned maintenance, and schedule backups. They could also move configurations from one router to another vendor’s router. The result was faster and cheaper; however, “it just wasn’t as reusable as they wanted.” They learned the importance of separating services from the network and from the devices.
-
When I watched Chad Fowler’s GOTO Amsterdam 2014 Keynote it got me thinking about what our aims should be in life.
He mentions Joel Spolsky’s post from 2001: Good Software Takes Ten Years. Get Used To It, and says software typically only lasts five years so rarely gets to be very good.
He asks, what does it take create legacy software with a positive meaning, that is software so good that you are fondly remembered for it for many years to come.
[...]
Pieter was a man who knew all of this. His deep passion for optimal collaboration lead to the creation of C4: The Collective Code Construction Contract. Not only was he very talented technically, he also understood people and how to foster a strong community.
-
Events
-
This post is long past due, but I figured it is better late than never. At the start of the year, I set a goal to get more involved with attending and speaking at conferences. Through work, I was able to attend the Southern California Linux Expo (SCALE) in Pasadena, CA in January. I also got to give a talk at O’Relly’s Open Source Convention (OSCON) in Austin, TX in May. However, I really wanted to give a talk about my experience contributing in the Ubuntu community.
José Antonio Rey encouraged me to submit the talk to FOSSCON. While I’ve been aware of FOSSCON for years thanks to my involvement with the freenode IRC network (which has had a reference to FOSSCON in the /motd for years), I had never actually attended it before. I also wasn’t quite sure how I would handle traveling from San Francisco, CA to Philadelphia, PA. Regardless, I decided to go ahead and apply.
Fast forward a few weeks, and imagine my surprise when I woke up to an email saying that my talk proposal was accepted. People were actually interested in me and what I had to say. I immediately began researching flights. While they weren’t crazy expensive, they were still more money than I was comfortable spending. Luckily, José had a solution to this problem as well; he suggested applying for funding through the Ubuntu Community Donations fund. While I’ve been an Ubuntu Member for over 8 years, I’ve never used this resource before. However, I was happy when I received a very quick approval.
-
It was another lazy Saturday with a rare sight of empty Bangalore roads. This FOSS Wave event in Bangalore had been in planning for almost a month. Finally, here we were on September 10th, 2016 in front of the almost a century old structure of University Visvesvaraya College of Engineering.
Five speakers reached the venue by 9:30am. We were to talk in two different sessions starting from 10:30am until 4:00pm on the following topics.
-
-
A few days ago systemd.conf 2016 ended, our second conference of this kind. I personally enjoyed this conference a lot: the talks, the atmosphere, the audience, the organization, the location, they all were excellent!
I’d like to take the opportunity to thanks everybody involved. In particular I’d like to thank Chris, Daniel, Sandra and Henrike for organizing the conference, your work was stellar!
I’d also like to thank our sponsors, without which the conference couldn’t take place like this, of course. In particular I’d like to thank our gold sponsor, Red Hat, our organizing sponsor Kinvolk, as well as our silver sponsors CoreOS and Facebook. I’d also like to thank our bronze sponsors Collabora, OpenSUSE, Pantheon, Pengutronix, our supporting sponsor Codethink and last but not least our media sponsor Linux Magazin. Thank you all!
-
SaaS/Back End
-
This summer, Databricks conducted a comprehensive Apache Spark Survey to identify insights on how organizations are using Spark and highlight growth trends since the company’s last Spark Survey in 2015. The 2016 survey results reflect answers from 900 distinct organizations and 1615 respondents, who were predominantly Apache Spark users, and the results are available now.
The results show that the Spark community is still growing fast: the number of meetup members worldwide has tripled, and the number of contributors to the project has grown by 67% since last year. Moreover, Spark is driving cutting-edge innovation. Users arebuilding diverse apps, with significant growth in machine learning and streaming.
-
To land your first OpenStack job, you’ll want to prove you have a functional understanding of OpenStack basics, can navigate the resources to solve problems, and have recognized competency in your focus area.
Used with permission
The hardest part of pivoting your career is proving that you are qualified in your new focus area. To land your first OpenStack job, you’ll want to prove you have a functional understanding of OpenStack basics, can navigate the resources to solve problems, and have recognized competency in your focus area.
“A functional understanding of OpenStack” means you know how to work in OpenStack––not just naming the projects in alphabetical order or giving an overview of its history. While you’ll want to read up on its origins and future roadmap, you’ll also want to jump in by using tools like DevStack or TryStack to explore.
-
CMS
-
Everybody knows about WordPress, Drupal and Joomla, although they are great and they are popular for a reason, there are quite a few other alternatives that you may have never heard of. Thousands of quality developers and designers work hard to create amazing masterpieces of applications. Most of them release their applications for free and they make them open source. The least we can do is spread the word so they can get the attention they well deserve. We’ve already listed a dozen CMS apps in our self-hosted alternatives post, but in this article, we’ll focus more on each CMS and its features. Here, 5 open source CMS apps will get the spotlight.
-
Education
-
“Charlie serves as the Technology Director for Penn Manor School District in Lancaster County Pennsylvania. A member of the senior leadership team, he directs instructional technology programs and technical infrastructure and operations. A passionate advocate and speaker on open source values in education, Charlie and his team implemented the largest classroom desktop Linux program in Pennsylvania.
“Under his leadership, Penn Manor School District received the 2011 School of Excellence in Technology Award from the Pennsylvania School Boards Association (PSBA). In 2016, Penn Manor was recognized with the Districts of Distinction Award for the Open Source one-to-one Laptop Program.”
The book’s title is The Open Schoolhouse: Building a Technology Program to Transform Learning and Empower Students. The Kindle version is only $4.99. I’ve read it. You should read it, too, if you’re a teacher, school administrator, student, parent, uncle or aunt or have friends or family with kids in school — or even if you’re a taxpayer someplace where they have public school or you’re connected in some way with a charter school or private school.
-
FSF/FSFE/GNU/SFLC
-
A new distribution of the Emacs editor, called Spacemacs, repackages the classic developer’s tool in a new skin for greater usefulness to a new generation of programmers.
Emacs is one of the oldest text editors in existence. Its most popular variant (now 31 years old) is GNU Emacs, originally developed by Free Software Foundation president Richard Stallman. The editor’s enduring popularity comes from its extensibility and programmability courtesy of the built-in Emacs Lisp scripting language — and from the culture of tooling that’s sprung up as a result. Extensions for Emacs (and, thus, Spacemacs) provide everything from integration with GitHub to Slack chat windows.
-
Project Releases
-
There’s a new release of FontForge available. “This release introduces a new icon set, new functionality for custom icon selection graphics, support for GlyphOrderAndAliasDB files, and support for Unicode 9.0.”
-
Public Services/Government
-
Russia is drafting a new law requiring Russian government agencies to give preference to open source and to block US software from computer systems, citing security concerns.
Just weeks after Moscow committed to removing Microsoft Outlook and Exchange on 600,000 systems under orders from Russian president Vladimir Putin, the nation’s lower house, the State Duma, is drafting a bill to make it harder for agencies even to buy Russian software products that are based on foreign-made proprietary middleware and programming frameworks.
The bill marks Russia’s latest attempt at substituting imported software with local products, but casts a wider net than existing restrictions on IT procurement by agencies and state-run enterprises.
-
Russia is taking another step to reduce dependence on Oracle Corp., Microsoft Corp. and International Business Machines Corp. technologies in the country’s $3 billion software market amid political tensions with the U.S.
The State Duma, Russia’s lower house of parliament, is drafting a bill to restrict government agencies from buying licensed software, giving preference to open-source software. This would complement legislation that curbed state purchases of foreign programs last year, restricting the choice to about 2,000 local software makers.
“Many local software firms are offering products based on foreign frameworks such as IBM’s WebSphere or Microsoft’s ASP.net,” said Andrey Chernogorov, executive secretary of the Duma’s commission on strategic information systems. “We are seeking to close this loophole for state purchases as it causes security risks.”
The end of IBM’s partnership with Russian vendor Lanit last year created a potential vulnerability for the government’s website zakupki.gov.ru, which is based on a proprietary IBM platform, according to an explanatory note to the draft law. Additionally, license fees that Russian software makers pay foreign partners inflate their products’ cost of use.
Some Russian regional administrations already started switching from Oracle to free database software adapted for their needs by local programmers, according to Duma documents.
-
Germany’s Federal Ministry of the Interior is organising a three-month, online public review of a new manual for municipal eGovernment services. From 22 September until 30 November, a website will allow readers to comment on the document.
-
Openness/Sharing/Collaboration
-
Open Data
-
On stage at TechCrunch Disrupt last month, Udacity founder Sebastian Thrun announced that the online education company would be building its own autonomous car as part of its self-driving car nanodegree program. To get there, Udacity has created a series of challenges to leverage the power of community to build the safest car possible — meaning anyone and everyone is welcome to become a part of the open-sourced project. Challenge one was all about building a 3D model for a camera mount, but challenge two has brought deep learning into the mix.
In the latest challenge, participants have been tasked with using driving data to predict steering angles. Initially, Udacity released 40GB of data to help at-home tinkerers build competitive models without access to the type of driving data that Tesla of Google would have. However, because deep learning models drink data by the pond rather than the gallon, the company pushed out an additional 183GB of driving data.
-
Health/Nutrition
-
With the exception of a brief detour into Indiana Gov. Mike Pence’s (R) anti-abortion beliefs during the vice presidential debate on Oct. 4, the night centered around foreign policy, not public health.
It’s a shame, since lackluster public health efforts are what led to the defining moment of Pence’s one-term Indiana governorship: a massive HIV outbreak spurred by public health funding cuts and Pence’s moralistic stance against needle exchanges.
A timeline of the HIV outbreak, the worst in state history, reads like a roadmap of what to do if you want to create a public health crisis.
-
Polish lawmakers have voted overwhelmingly to reject draft legislation that would introduce a near-total ban on abortion following mass protests in over 60 cities across the country.
Some 100,000 women dressed in black staged nationwide demonstrations in Poland on Monday against plans to tighten the country’s already restrictive abortion rules, including banning the procedure even in cases of rape, with prison terms for women ending a pregnancy.
The hastily arranged vote presents the first major domestic setback for the ruling conservatives, of which many members initially backed the proposal.
-
As the world gets hotter, we’ve been warned that the next wars will be over water. In India, that future is here, and the latest proof is a battle between two neighboring states fighting over the river that runs through them.
In the latest chapter of a century-old water war in southern India, riots rocked Bangalore, the techie capital city of Karnataka state, in September. Buses were set ablaze, and a man was killed by police trying to control the crowds. Protestors opposed a Supreme Court order for the state to release about 120,000 cusecs, or cubic feet per second of water, from the Cauvery river to Tamil Nadu, the state downstream, over 10 days.
-
Flint, Michigan, is dealing with another outbreak. This time it’s an infectious bacterial disease called Shigellosis, which can cause bloody diarrhea and fever and typically spreads when people don’t wash their hands.
That’s exactly what’s happening in Flint, the county health director told CNN.
A water crisis has plagued residents there for more than two years. Last year, people experienced rashes and hair loss when high levels of lead were found in the local water supply. In 2014, the area faced one of the worst outbreaks of Legionnaires’ disease in US history.
Still afraid and mistrustful of the water, people in Flint — who are still forced to use either filtered or bottled water because of damaged water pipes — are bathing less, and refusing to wash their hands.
-
Republicans in Congress are plotting ways to block the Obama administration from paying insurance companies hundreds of millions of dollars as part of an ObamaCare program.
GOP lawmakers say they are looking at “a dozen” options — including a possible provision in the year-end spending bill — to prevent the administration from using an obscure fund within the Treasury Department to pay out massive settlements to insurers.
The insurance companies are suing over a shortfall in an ObamaCare program that they say is damaging their businesses.
Settling the cases could help insurers deal with losses on the ObamaCare marketplaces, but Republicans argue the move would be a “bailout” that would circumvent the will of Congress.
-
Security
-
-
Akin to locking your doors and closing your windows there’s some really basic things everyone should be doing with their Linux installs (This is of course written from a Fedora viewpoint, but I think this pretty much applies to all computer OSes).
-
The Electronic Frontier Foundation (EFF) asked a court Thursday for an order that would prevent the government from prosecuting its client, security researcher Matthew Green, for publishing a book about making computer systems more secure.
Green is writing a book about methods of security research to recognize vulnerabilities in computer systems. This important work helps keep everyone safer by finding weaknesses in computer code running devices critical to our lives—electronic devices, cars, medical record systems, credit card processing, and ATM transactions. Green’s aim is to publish research that can be used to build more secure software.
-
The government of Malta has unveiled a National Cyber Security Strategy. The strategy provides the legal context to defend the country’s computer networks infrastructure and its users from threats.
-
Last week, we wrote about a DDoS attack on well-known investigative cybercrime journalist Brian Krebs.
To explain.
A DDoS attack is an aggressive sort of DoS attack, where DoS is short for denial of service.
A DoS is a bit like getting into the queue at the station to buy a ticket for the next train, only to have a time-waster squeeze in front of you and slow you down.
By the time the miscreant has asked, innocently enough, about the different sorts of ticket available, and whether it costs extra to take a bicycle, and how much longer it would take if he were to change trains in Manchester, only to walk off without buying a ticket at all…
…you’ve watched your train arrive, load up with passengers, and depart without you.
A DDoS attack is worse: it’s short for distributed denial of service attack, and it’s much the same thing as a DoS, except that the trouble-stirrer doesn’t show up on his own.
-
Initially the lack of security on “smart” Internet of Things devices was kind of funny as companies rushed to make a buck and put device security on the back burner. And while hackable tea kettles and refrigerators that leak your Gmail credentials just seem kind of stupid on the surface, people are slowly realizing that at scale — we’re introducing millions of new attack vectors into homes and businesses annually. Worse, compromised devices are now being used as part of massive new DDoS attacks like the one we recently saw launched against Brian Krebs.
Unfortunately, companies that service the medical industry also decided a few years ago that it would be a good idea to connect every-damn-thing to networks without first understanding the security ramifications of the decision. As a result, we’re seeing a rise in not only the number of ransomware attacks launched on hospitals, but a spike in hackable devices like pacemakers that could mean life and death for some customers.
-
Johnson & Johnson is telling patients that it has learned of a security vulnerability in one of its insulin pumps that a hacker could exploit to overdose diabetic patients with insulin, though it describes the risk as low.
Medical device experts said they believe it was the first time a manufacturer had issued such a warning to patients about a cyber vulnerability, a hot topic in the industry following revelations last month about possible bugs in pacemakers and defibrillators.
J&J executives told Reuters they knew of no examples of attempted hacking attacks on the device, the J&J Animas OneTouch Ping insulin pump. The company is nonetheless warning customers and providing advice on how to fix the problem.
-
As KrebsOnSecurity observed over the weekend, the source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released. Here’s a look at which devices are being targeted by this malware.
The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default usernames and passwords. Many readers have asked for more information about which devices and hardware makers were being targeted. As it happens, this is fairly easy to tell just from looking at the list of usernames and passwords included in the Mirai source code.
-
Transparency/Investigative Reporting
-
It was once celebrated as a champion of transparency. But now 10 years old, WikiLeaks has lost a lot of friends.
The whistle-blowing website serves as the world’s best known source for leaked government and intelligence information.
It has exposed corruption and misuse of power in many countries, including the United States.
But WikiLeaks founder Julian Assange has become increasingly controversial over the past decade.
Critics say his site is manipulated by politicians, and the way it releases classified documents is irresponsible.
Assange has been hiding in the Ecuadorian Embassy in London to avoid possible extradition to Sweden, where he faces questions over allegations of sexual assault.
-
British authorities have a reputation for keeping incredibly tight-lipped about surveillance, especially when asked to release even basic details of programs or technologies under the Freedom of Information Act.
But a lot more goes on behind the scenes of requests around surveillance topics than one might realise. By requesting the processing notes and communications for FOIA requests, it’s possible to gain insight into what really happens when someone asks for information on a controversial subject, and how, in some cases, police forces develop a national strategy to ensure that no information seeps out.
For example, Motherboard has been using the FOIA to dig up details of UK law enforcement’s use of “equipment interference”, the government’s term for hacking. While managing to get some information out of agencies, such as how a few of them will share hacking technologies, many of the requests have been stonewalled.
-
Environment/Energy/Wildlife/Nature
-
The vast patch of garbage floating in the Pacific Ocean is far worse than previously thought, with an aerial survey finding a much larger mass of fishing nets, plastic containers and other discarded items than imagined.
A reconnaissance flight taken in a modified C-130 Hercules aircraft found a vast clump of mainly plastic waste at the northern edge of what is known as the “great Pacific garbage patch”, located between Hawaii and California.
The density of rubbish was several times higher than the Ocean Cleanup, a foundation part-funded by the Dutch government to rid the oceans of plastics, expected to find even at the heart of the patch, where most of the waste is concentrated.
“Normally when you do an aerial survey of dolphins or whales, you make a sighting and record it,” said Boyan Slat, the founder of the Ocean Cleanup.
“That was the plan for this survey. But then we opened the door and we saw the debris everywhere. Every half second you see something. So we had to take snapshots – it was impossible to record everything. It was bizarre to see that much garbage in what should be pristine ocean.”
-
The really scary thing about climate change is not simply that humans may fail to get their emissions under control. It is that, at some point, the Earth could take over and start adding even more emissions on its own.
A new study underscores this risk by looking closely at Indonesia, which has a unique quality – some 70 billion tonnes of carbon that have built up in peatlands over millennia. In this, Indonesia is much like the Arctic, where even larger quantities of ancient carbon are stored in permafrost, and is also vulnerable.
In each case, if that carbon gets out of the land and into the atmosphere, then global warming will get worse. But global warming could itself raise the odds of such massive carbon release. That is a dangerous position to be in as the world continues to warm.
-
The bad news: Earth’s climate change problem just passed a point of no return. Atmospheric carbon levels have passed 400 parts per million, and they won’t return to more environment-friendly levels “ever again for the indefinite future.”
-
When naturalist John Muir explored Lyell Glacier in Yosemite National Park about 150 years ago, the river of ice stretched as far as 10 football fields between the peaks of the Lyell Canyon, a glacier one might expect to see in Alaska, not California.
Today, it’s a sliver of the natural feature Muir called a “living glacier.” Over the last 130 years, the glacier has lost 78 percent of its surface, shrunk from about a half square mile to 66 acres.
Stand on the glacier and it’s hard to hear anything except the sound of melting water rushing underneath. A big patch of bedrock is exposed in its middle.
In its dying state, Lyell Glacier has become a vivid example of the effects of climate change and a touchstone for National Park Service officials increasingly concerned about global warming.
In a speech about climate change at Yosemite this summer, President Barack Obama highlighted Lyell Glacier as a warning for the future.
-
Mar-a-Lago, the country club in West Palm Beach that is one of Donald Trump’s marquee pieces of real estate, is at risk of sustaining damage due to Hurricane Matthew.
The storm will soon bear down on the east coast of Florida, with the National Hurricane Center issuing a serious warning about Matthew’s potential impact. The warning indicates the “potential for devastating damage across coastal Palm Beach County,” which is where Mar-a-Lago sits.
In addition to seeing hurricane force winds of greater than 74 miles per hour, West Palm Beach, which is along the state’s east coast, where Mar-a-Lago sits, could receive more than three feet of standing water from the hurricane’s storm surge, according to a projection from the National Hurricane Center.
The experimental storm surge inundation map below shows West Palm Beach with an arrow to the rough location of Mar-a-Lago.The inundation levels refer to a reasonable worst-case scenario for the flooding of normally dry land. There is about a 1-in-10 chance that storm surge flooding at any particular location, including the area where Mar-a-Lago is, could be higher than the values shown on the map.
-
Finance
-
The U.S. Chamber of Commerce has already picked the winner in Tuesday night’s vice presidential debate between Sen. Tim Kaine, D-Va., and Gov. Mike Pence, R-Ind.
It’s free trade! (Or, more accurately, corporate-friendly trade agreements.)
Previewing the debate Tuesday morning, the Chamber tweeted merrily that both candidates have a “great track record on trade.”
Their running mates are both on the record opposing the hugely controversial Trans-Pacific Partnership Agreement, but as the Chamber notes so happily, Kaine and Pence both have a long history of siding with big business. Both have praised the TPP and backed similar deals in the past.
The Chamber, a trade group that represents some of the largest corporate entities in the world, from Goldman Sachs to Dow Chemical, has spent over $1.2 billion just on lobbying since 1998, making it by far the largest influence peddler in Washington, D.C.
-
Europe’s governments lack decisiveness in digitising their public services and organisations, conclude the authors of the “eGovernment Benchmark 2016”, which was made public by the European Commission on 3 October. Progress in eGovernment is incremental, the study shows. The authors urge “an acceleration in order to keep up with private sector, and citizen’s expectations”.
-
Hours after WikiLeaks held an early morning press conference commemorating their 10th anniversary, hacker Guccifer 2.0 released a trove of documents he claimed were from the Clinton Foundation. WikiLeaks tweeted the 800+MB of files hacked by Guccifer 2.0 shortly after. The documents include several Democratic National Committee (DNC), Democratic Congressional Campaign Committee (DCCC), and Virginia Democratic Party documents, though Guccifer 2.0 said he obtained them in a hack from the Clinton Foundation.
The Clinton Foundation has denied this. Alleged communication files were leaked from the Clinton Foundation to the Observer upon request through Guccifer 2.0’s Twitter account, but the Clinton Foundation has not yet responded to a request for a statement on those specific documents.
-
Donald Trump is the first major party presidential candidate in 40 years not to release his tax returns. However, the New York Times has obtained three pages of Trump’s 1995 income tax returns, which it revealed in a controversial investigative report published Saturday.
“Donald Trump Tax Records Show He Could Have Avoided Taxes for Nearly Two Decades, The Times Found,” read the headline on the front page of Sunday’s New York Times.
-
AstroTurf/Lobbying/Politics
-
On September 29, Green Party nominee Jill Stein’s campaign sent out an email with the title, “Join our Latinx movement!”, marking the first official appearance of the term “Latinx” in the 2016 election. The term, which arose from the desire to find a non-binary, gender inclusive word to refer to our community, has been gaining traction since it first came into use online in October of 2014. Today, it’s increasingly common to see “Latinx” used in media headlines (including some of our own), academic texts and activist literature – but the word has not arrived on the scene without its fair share of controversy and resistance. In 2016 much ink has been spilled making cases for or against the term – and in the comments of Remezcla posts we frequently see our usage of the term hotly debated.
-
Republican presidential candidate Donald Trump and his campaign have spent the week slut-shaming former Miss Universe Alicia Machado, saying she posed in Playboy and that there was a sex tape depicting her in it (there is not). An old New York Daily News article has surfaced that tells a story of Trump pressuring his future wife, against her will, to pose for Playboy magazine. Trump personally negotiated the fee, according to the report.
The article, tweeted by historian Jeff Nichols, outlines how Trump insisted that Maples do the centerfold and negotiated a million-dollar check to compensate her.
-
We’ve noted a few times in the past our serious concerns about Hillary Clinton’s hawkish and tone deaf views on cybersecurity, in which she wants the US to go on the offensive on cyberattacking, even being willing to respond to attacks with real world military responses. She seems to ignore the fact that the US has a history of being some of the most aggressive players on offense on such things (Stuxnet, anyone?), and doesn’t seem to recognize how escalating such situations may not end well at all.
Of course, her opponent, Donald Trump has been totally incomprehensible on cybersecurity during the course of his campaign. There was his first attempt to respond to questions about cybersecurity in which it’s not clear he understood the question, and started talking about nuclear weapons instead. Or the time he took a question on cybersecurity and answered by talking about the latest CNN poll. Or, of course, who can forget his debate performance on the topic, where his key insights were that his 10 year old was good with computers and a 400 lb. hacker may be responsible for the DNC hacks.
It appears that the Trump campaign finally decided that maybe Trump should say something marginally coherent on the subject, and sent him out earlier this week with a prepared teleprompter speech, which Trump actually managed to get through without going too far off script. And… it’s basically the same kind of bullshit as Clinton — pushing for more aggressive and offensive cyberattacks.
-
Vice-presidential candidates Republican Mike Pence and Democrat Tim Kaine faced off in Longwood University in Farmville, Virginia, Tuesday night in their first and only debate before next month’s election. Third-party vice-presidential candidates, including Libertarian William Weld and the Green Party’s Ajamu Baraka, were excluded from the debate stage under stringent rules set by the Commission on Presidential Debates, which is controlled by the Democratic and Republican parties. On Tuesday night, Democracy Now! aired a special “Expanding the Debate” broadcast, where we gave major third-party candidates a chance to respond to the same questions in real time as the major candidates. The Green Party’s Ajamu Baraka joined us live from Richmond, Virginia. Baraka is a longtime human rights activist and the founding executive director of the U.S. Human Rights Network and coordinator of the U.S.-based Black Left Unity Network’s Committee on International Affairs.
-
Donald Trump Monday turned his destructive mouth on a group he ostensibly supports, displaying his trademark lack of sense and compassion when talking about the unseen wounds that too many vets carry home with them from war.
“When you talk about the mental health problems, when people come back from war and combat and they see things that maybe a lot of folks in this room have seen many times over and you’re strong and you can handle it, but a lot of people can’t handle it,” he said during a question-and-answer session sponsored by the conservative Retired American Warriors PAC, referring to veterans who commit suicide.
Most appallingly, this was probably Trump’s idea of tact and/or empathy for those who have seen combat. But contra his faux tough guy image and what he seemed to be suggesting, PTSD isn’t a symptom of weakness; it’s an at times debilitating wound of war. “To effectively argue that veterans with PTSD are somehow weak is both wrong and insulting.” Steve Benen wrote Monday. “The fact that Trump, even now, still doesn’t understand the basics of this issue is extraordinary.”
-
Jill Stein could soon be making a big jump in the polls, with the race between Donald Trump and Hillary Clinton starting to turn into a blowout and polls likely underestimating the growing support for the Green Party.
Stein, running to the left of Hillary Clinton, has been lingering around the 2 percent mark in most of the national polls to come out in recent weeks. While it would take something of a miracle for Stein to win a state — or even grab double-digit support — the Green Party’s goal may be the 5 percent threshold that would guarantee matching federal funding for the next election cycle. And that could be well within reach.
Although Stein appears to be only about halfway there in the polling, there are a number of signs that the current polling is underestimating the support for the Green Party this election cycle.
-
Amazon is making a significant change to its Community Guidelines, announced today, which will eliminate any incentivized reviews, except for those that emerge from within its own Amazon Vine program. This program allows Amazon – not the seller or vendor – to identify trusted reviewers, and has a number of controls in place in order to keep bias out of the review process.
Amazon has historically prohibited compensation for reviews – even going so far as to sue those businesses who pay for fake reviews, as well as the individuals who write them, in an effort to make its review and rating system fairer and more helpful to online shoppers. However, it has allowed businesses to offer products to customers in exchange for their “honest” review.
The only condition was that those reviewers would have to disclose their affiliation with the business in question in the text of their review. Reviewers were generally offered the product for free or at a discounted price, in exchange for their review.
Although, in theory, these reviewers could write their true opinion on the product – positive or negative – these incentivized reviews have tended to be overwhelmingly biased in favor of the product being rated.
-
A party that hangs a skull-and-crossbones flag at its HQ, and promises to clean up corruption, grant asylum to Edward Snowden and accept the bitcoin virtual currency, could be on course to form the next Icelandic government.
The Pirate Party has found a formula that has eluded many anti-establishment groups across Europe. It has tempered polarising policies like looser copyright enforcement rules and drug decriminalisation with pledges of economic stability that have won confidence among voters.
This has allowed it to ride a wave of public anger at perceived corruption among the political elite – the biggest election issue in a country where a 2008 banking collapse hit thousands of savers and government figures have been mired in an offshore tax furore following the Panama Papers leaks.
If the Pirates emerge as the biggest party in an Oct. 29 parliamentary election – as opinion polls suggest – they will deliver another defeat to Europe’s mainstream politicians.
-
Every time there’s an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack an election? Maybe, but that depends on your goals.
The topic of election hacking is different this year, and that’s because someone is actually hacking political targets. Adding fuel to the fire, on Aug. 12, 2016, during an event in Pennsylvania, Donald Trump warned the crowd that if he loses the battleground state, it’s because the vote was rigged.
“The only way we can lose, in my opinion — and I really mean this, Pennsylvania — is if cheating goes on,” Trump said. This was no random remark either, Pennsylvania voting has been called in to question before. Such was the case when Republican supporters claimed Mitt Romney lost the state in 2008 due to fraud.
When it comes to hacking elections, most people imagine voting machines compromised in such a way that a vote for candidate ‘A’ actually counts as a vote for candidate ‘B’ – or the votes just disappear.
-
The upcoming U.S. presidential election can be rigged and sabotaged, and we might never even know it happened.
This Election Day voters in 10 states, or parts of them, will use touch-screen voting machines with rewritable flash memory and no paper backup of an individual’s vote; some will have rewritable flash memory. If malware is inserted into these machines that’s smart enough to rewrite itself, votes can be erased or assigned to another candidate with little possibility of figuring out the actual vote.
In precincts where vote tallies raise suspicions, computer scientists will be called in the day after the election to conduct forensics. But even if a hack is suspected, or proven, it would likely be impossible to do anything about it.
-
The Miami Herald has a video of Haitian activists protesting the Democratic National Convention, primarily because of the “Clinton Foundation’s spending in Haiti after the 2010 earthquake.” According to The Nation in a piece titled The Shelters That Clinton Built, the Clinton Foundation provided Haiti with trailers “structurally unsafe and laced with formaldehyde” that “came from the same company being sued for sickening Hurricane Katrina victims.” Pertaining to the Clinton Foundation’s legacy in Haiti, The New York Times writes “the Clintons have become prime targets of blame for the country’s woes.”
As a result of the Clinton Foundation’s controversial involvement with Haiti, The Huffington Post reports that Florida’s Haitian-American community might have a profound impact on Election Day. Ryan Grim explains the influence of Florida’s Haitian-American community in a piece titled With All Eyes On Haiti, Its Diaspora In Florida Could Swing A Close Election. With a sudden shift in U.S. immigration policy dividing Haitian families, alongside the Clinton Foundation’s role in Haiti, Florida’s Haitian community’s discontent might impact other ethnic groups on Election Day.
It’s this backdrop that motivated me to interview Harvard-trained investor and financial analyst Charles Ortel. Dady Cherry of Haiti Liberte’ refers to Ortel as “one of the world’s finest financial analysts” and Mr. Ortel has spent over one year investigating the financial peculiarities of the Clinton Foundation. He’s also researched extensively on the Foundation’s involvement with Haiti and other countries around the globe.
-
Censorship/Free Speech
-
The EFF is publishing a series looking at the multitude of ways gatekeepers and governments can make content disappear from the web — using everything from legislation they helped craft to applying pressure to multiple points between the content they want removed and the person who put it there.
But not every tool used to remove content comes in a form that can be contested by the general public. Some of these tools are the result of private agreements with private entities — agreements in which users have no say. The EFF calls it “Shadow Regulation.”
-
-
A teenage boy has been jailed in Singapore for “wounding the feelings of Muslims and Christians” in a series of YouTube videos, sparking condemnation from the United Nations.
It is the second time 17-year-old Amos Yee has been imprisoned over his blogs, being sentenced to four weeks in jail last year over footage where he compared revered former Prime Minister Lee Kuan Yew to Hitler and Jesus.
He has been jailed for six weeks and fined $2,000 (£1,150) on six charges of intending to wound the feelings of Muslims and/or Christians and two of failing to attend a police station, the Straits Times reported.
-
If Trump’s job was to punish every internet user who ridiculed him with a meme, he’d sure have a lot of work to do. Luckily, U.S. netizens have enough freedom of speech to laugh at him as often as Harambe memes appear on Twitter.
Yet making the use of memes illegal is not out of this world. Indonesia’s government is looking to criminalize internet users for posting them.
Its Electronic Information and Transactions Law (ITE) punishes any electronic media communication that incites fear or embarrassment under its defamation article. The public has continuously called for the article’s removal, but instead Indonesia is introducing more restrictions to freedom of expression. Posting memes, texts, pictures, or videos would be punishable if found to have a defamatory or slanderous tone.
According to the Indonesian government, this provision stands to prevent and control cyberbullying. But it can further be used as a political tool against opposition during elections.
-
Confession time: I think memes generally suck. Yes, yes, I know you love them, but when I think of memes, I tend to think of political memes on Facebook that I then have to drop Snopes.com links into the comments on, stupid copyright trolling over them, and that time Axl Rose tried to DMCA a meme so that nobody would see that he dipped into the chocolate fudge too much recently.
Which is why I’m going to move to Indonesia, where the government has decided it’s time to put a strict control policy on any memes it finds offensive, embarrassing or that incite fear.
-
A few days before Twitter’s Sept. 8 board meeting, as the company’s finance team readied a presentation, it received conflicting directions on a crucial question. Should their slides reflect Twitter’s prospects as an independent company or delve into the benefits of getting acquired?
Jack Dorsey, Twitter’s chief executive officer, argued that the 10-year-old company should remain on its current course and work to capitalize on recent product improvements and success in streaming live video, people familiar with the discussions said. Ev Williams, a former CEO who has a history of clashing with Dorsey, was in favor of exploring a sale. Other directors agreed they had a fiduciary duty to consider that option. The board ultimately decided to consider takeover prospects after getting an expression of interest from a potential acquirer, which led it to hire Goldman Sachs and Allen & Co. to evaluate possible bids.
-
They never learn.
When those in power try to silence the little guys, it often backfires. And when heavy-handed actions to stomp out tiny voices of dissent are exposed, the resulting tsunami of publicity often helps the group that was targeted.
Case in point: Last weekend’s sand sculpture caper.
A coalition of grassroots groups, opposed to light rail but unable to afford expensive radio and TV spots, entered the freelance division of the Neptune Festival sand sculpture competition. For a $15 entry fee, they created a modest little mound of sand with a simple message: “Please vote no light rail.”
-
In January 2011, protests broke out across Egypt to demand an end to the despotic and repressive regime of Hosni Mubarak. The protests were largely organized online, through social networks like Twitter and Facebook. Mubarak quickly realized this, and launched a counterattack: He severed all access to the internet from within Egypt.
-
-
A new book has revealed that the British Dam Busters screenwriter was caught up in a censorship battle with ‘Hitler’s Hollywood consul’ over the ‘negative’ portrayal of Germany after World War I.
The book on RC Sherriff’s life suggests that Nazi agent Georg Gyssling managed to persuade Universal Pictures to halt The Road Back, All Quiet on the Western Front and Three Comrades in the 1930s.
Roland Wales, who has written From Journey’s End to the Dam Busters: The Life of RC Sherriff, Playwright of the Trenches, said the studios bowed down to Gyssling’s demands in fear of losing revenue from German box offices.
He said: ‘The Germans had a Consul in LA, a man called George Gyssling, part of whose job it was to keep up to date with the studio’s plans, and to encourage them to amend their films’
-
A home across the street from the school, where a Confederate flag regularly flies, became the center of the counterprotest movement with people running up and down the street waving Confederate flags, shouting “All Lives Matter” and “White Power.” In one instance, counterprotesters offered the students fried chicken and watermelon, saying, “Not that fried chicken and watermelon is racist or anything.”
In the quiet of this past Sunday morning [Sept. 25], with nobody to witness but God and the approving eyes across the street, school officials painted all the parking spaces black, including Tamia’s. I wonder who painted the spaces and how they felt. Tamia was not informed.
-
Re “Will the Left Survive Millennials?,” by Lionel Shriver (Op-Ed, Sept. 23):
My initial response to Ms. Shriver’s keynote address at the Brisbane Writers Festival last month — walking out and writing about why — seemed to be largely misunderstood. Many took the reaction to be a call for censorship and responded with fury. They took as a given the right to say and write what they want, without critique, consequence or interrogation of intent.
The debate is not about censorship: People can write in the voices they please. The real question is whether they should. It is about the structures that define the world in which we live and work.
Fiction does not exist in a vacuum: It becomes people’s realities, because so often the only exposure we have to those with very different lived experiences to our own is through stories. But this discussion is larger than the world of fiction.
Ms. Shriver claimed that those who now fight for equality have become the oppressor. Her words betrayed a disappointment that the times are changing, and lamented that people are so terrified of being caught saying the wrong thing that they instead choose not to say anything at all.
-
-
-
-
-
-
-
-
-
-
-
-
-
Privacy/Surveillance
-
The Internet of Things (IoT), which are devices connected to the internet, is gaining momentum. On the positive side, the idea of being able to remotely activate your central heating, or for your fridge to tell you when you’re nearly out of milk, is rather exciting. However, the darker side of IoT is its vulnerability to hacking, privacy concerns and consumer rights. This was a common theme at last Friday’s Gikii conference, an event dedicated to combining law, technology and popular culture. Think of tech law enthusiasts using episodes of Hannibal to illustrate cybersecurity flaws. Stand-up for geek lawyers.
An opening talk by Jon Crowcroft, described the IoT as, ““Take all the stuff in the world with moving parts, and now make it as easy to use and reliable as your printer – then put it the far side of the Internet.” (Quote attributed to Derek McAuley.) The idea is that everyday objects are enhanced with internet connectivity. Done well, it should convey health, energy efficiency and productivity benefits. Done badly, and you have privacy concerns, hacking and consumers not being able to access goods and services they’ve paid for.
Crowcroft noted some challenges of current IoT models, which largely rely on conveying information from devices to the cloud, and back again. He suggested three main critiques: 1) Poor Availability & Latency (connecting through the cloud introduces latency, dependent on internet connectivity), 2) Higher energy use and expense, and 3) Lower security and vulnerability to attack. Combined, these factors imply that the IoT does not currently offer the promised automated world.
-
The raid took place on August 27. “I thought the Third World War had started,” Bennett told me via telephone, describing the sight of his neighbor of 10 years being hauled away by heavily armed FBI agents.
Bennett recalls seeing “two dozen of these guys in camo uniforms, with rifles, come running across the yard knocking down his fence. … They dragged him out, threw him on the ground, handcuffed him, and took him away.” He says the FBI agents remained at Martin’s home until “3 or 4 o’clock in the morning” removing computer equipment and papers.
Prior to this conversation, Bennett had not been informed of the reason for his neighbor’s arrest. He describes Martin, age 51, as a “good neighbor,” but someone who never talked about his work: “I knew he worked in Washington, but I didn’t know what he did.” Bennett added that he didn’t recall Martin ever talking about the U.S. government or fellow Booz Allen NSA contractor Edward Snowden.
-
-
This week, the UK’s new National Cyber Security Centre, NatCybSecCent for short (and NCSC for super-short), has begun its operations. It’s part of GCHQ and will bring together a number of related groups: CESG—the information security arm of GCHQ—the Centre for the Protection of National Infrastructure, CERT-UK, and the Centre for Cyber Assessment. The NCSC will ultimately be based in London, with a team of around 700 led by Ciaran Martin.
Mr Martin is a man with his finger on the pulse. Fully three weeks before prime minister Theresa May announced that the UK no longer wanted migrants coming over here and daring to save people’s lives in our health system, Mr Martin had already announced the digital equivalent: the Great British Firewall, presumably building on the glorious tradition of The Great British Bake Off.
-
-
-
-
-
-
The NY Times story about this claims that the information Martin had was “computer code.” There’s a lot of speculation on the Twitters that this is related to the infamous Shadow Brokers “leak” of NSA hacking tools. The dates don’t fully line up. The Shadow Brokers leak involved code from 2013. The DOJ claims that the code it found Martin had is from 2014 — though it’s certainly possible that the investigation into Shadow Brokers led them to Martin (the arrest came the week after the Shadow Brokers info went public).
[...]
As always, it will be interesting to hear the other side of this story. We’ve certainly seen the DOJ come down hard on former NSA employees and contractors, claiming they had made off with classified information, when the later details turned out to show a lot less. But this is clearly a story worth following…
It should also make you wonder just how many “controls” the NSA has really put in place to keep employees and contractors from walking off with highly classified information. We know that Snowden did it back in 2013, but the NSA keeps insisting that it’s put in place more controls to stop it from happening again. And, if this truly is exploit code, this is much worse. Snowden made off with information about certain programs — but not actual code.
-
The “Magistrate’s Revolt” was fun while it lasted. Post-Snowden, a few magistrate judges began viewing law enforcement’s electronic search warrant applications with a bit more skepticism. These judges also rolled back a bit of the deference extended to the federal government, forcing the DOJ to narrow search requests or drop gag orders.
The first flames of the revolt to be snuffed out occurred in a DC district court — the same district where “In re Sealed Case” is the most common docket entry — when Judge Richard Roberts overrode two decisions by magistrate judge John Facciola. The deference to “government knows best” was reinstated and the feds got their gag order and broad search requests approved.
The same thing is happening in the center of the country. Orin Kerr of the Volokh Conspiracy reports that a Kansas district court judge has reversed magistrate judge David Waxse’s denial of an email search warrant.
-
-
The security scare that surfaced about two weeks ago after it was revealed that information on about 500 million Yahoo users had been compromised was bad enough. Even worse was the fact that the compromise began in 2014, with word just now being revealed. The bullet in the head was the revelation Wednesday by Reuters that in 2015 the company evidently searched through its customers incoming emails, spying for either the NSA or the FBI.
With that news, any nostalgia I had left for the brand completely disappeared. As far as I’m concerned, the site can now completely disappear from the Internet and I won’t feel so much as a twinge of regret that it’s gone. I can forgive the type of incompetence that led to the big breach, but I can’t forgive a website that betrays the trust of its users.
On Tuesday, just hours after Reuters published its exclusive story on Yahoo’s cooperation with our spymasters, the Electronic Frontier Foundation called the incident “the next front in the fight against mass surveillance.”
The EFF article concluded by saying “this is a perfect example of why we need to reform Section 702 and rein in the NSA’s mass surveillance programs. Absent such reform, Congress must not reauthorize Section 702 when it expires at the end of next year.”
-
Of course, people are parsing every word of that and noting some… remaining questions. The article is misleading? Okay, how? Which parts? What did it get wrong? You narrowly interpret every government request? Great. So explain what was found here, or explain the specifics of what Yahoo is doing. “Does not exist on our systems”? Did it ever? Does it exist on someone else’s system? Does a different mail scanning system exist? Lots of people would like to know.
More importantly, note that they say they want to minimize disclosures. But that’s not the key issue here, as Chris Soghoian points out. The Reuters report was on the searching of all emails, not the disclosure bit. Yes, sure, it seems clear that after searching everyone’s email, Yahoo likely only “disclosed” a small number to the NSA, but that’s not really the point, is it?
I mean, I guess this statement is better than Yahoo’s original: “Yahoo is a law abiding company, and complies with the laws of the United States” statement. But, it’s not very reassuring. Much more important is what Yahoo could have said, but didn’t.
-
On Wednesday afternoon the NY Times released a report that appeared to clarify some of the questions around Tuesday’s Reuters report about Yahoo scanning all emails. According to the NY Times, unlike the original Reuters report that talked about a “directive” (which would imply an NSA surveillance program such as the one under Section 702 of the FISA Amendments Act), the scanning was actually the result of a more traditional FISA Court order.
-
YAHOO HAS unconvincingly denied accusations that it built an application to enable it to bulk-scan emails on the request of intelligence agencies following a demand by the US government.
The decision by CEO Marissa Mayer to comply with the order, rather than fight it, reportedly led to the departure of Yahoo’s highly rated chief information security officer, Alex Stamos, although Stamos has chosen to keep schtum on the matter.
The revelation was made on Tuesday in a Reuters report quoting three former employees of the company.
However, Yahoo has finally got round to hitting back, describing the reports as “misleading”.
“We narrowly interpret every government request for user data to minimise disclosure. The mail scanning described in the article does not exist on our systems,” said Yahoo.
However, in a series of tweets, privacy campaigner Christopher Soghoian described the company’s curt denial as “carefully worded”, and said that Yahoo “has a history of putting out carefully written, deceptive denials when it comes to NSA surveillance”.
-
A system intended to scan emails for child pornography and spam helped Yahoo satisfy a secret court order requiring it to search for messages containing a computer “signature” tied to the communications of a state-sponsored terrorist organization, several people familiar with the matter said on Wednesday.
Two government officials who spoke on the condition of anonymity said the Justice Department obtained an individualized order from a judge of the Foreign Intelligence Surveillance Court last year. Yahoo was barred from disclosing the matter.
-
Facebook Messenger now lets you toggle end-to-end encryption [Ed: False, misleading claims. The FBI's Comey never even mentioned or shamed Facebook with the T word. It’s not because he forgot; it’s because they’re supine, complicit. When Facebook talks about encryption, safety, privacy etc. it’s probably alluding to resistance to China/Russia/boogeyman, not NATO/5 Eyes. How much is the corporate media willing to lie about Facebook encryption and privacy to entrap, mislead, potentially kill activists? Facebook helps the governments spy, retains private keys, we bet...]
With the flick of a switch back in April, the popular international messaging service WhatsApp turned on end-to-end encryption for every conversation in its system, dramatically boosting security for its 1 billion-person userbase. At long last, parent company Facebook has finally rolled out the same protections for users of its standard Messenger service. Today, users can toggle the “Secret Conversations” feature on in settings to enable end-to-end encryption, ensuring that nobody can pry into chat content but the participants.
-
So, the big story yesterday was clearly the report that Yahoo had secretly agreed to scan all email accounts for a certain character string as sent to them by the NSA (or possibly the FBI). There has been lots of parsing of the Reuters report (and every little word can make a difference), but there are still lots of really big questions about what is actually going on. One big one, of course, is whether or not other tech companies received and/or complied with similar demands. So it seems worth nothing that they’ve basically all issued pretty direct and strenuous denials to doing anything like what Yahoo has been accused of doing.
Twitter initially gave a “federal law prohibits us from answering your question” answer — and a reference to Twitter’s well documented lawsuit against the US government over its desire to reveal more details about government requests for info. However, it later clarified that it too was not doing what Yahoo was doing and had never received such a request. Microsoft’s response was interesting in that it says it’s not doing what Yahoo is, but refused to say if it had ever received a demand to do so. Google said it had never received such a request and would refuse to comply if it had. Facebook has also denied receiving such a request, and, like Google, says it would fight against complying. This still leaves lots of unanswered questions about why Yahoo gave in. Again, historically, Yahoo had been known to fight against these kinds of requests, which makes you wonder what exactly was going on here.
-
A federal contractor suspected of leaking powerful National Security Agency hacking tools has been arrested and charged with stealing highly classified information from the U.S. government, according to court records and a law enforcement official familiar with the case.
Harold Thomas Martin III, 51, of Glen Burnie, Md., was charged with theft of government property and unauthorized removal and retention of classified materials, authorities said. He was arrested in August after investigators searched his home in Glen Burnie and found documents and digital information stored on various devices that contained highly classified information, authorities said.
[Read the full criminal complaint filed against Harold Thomas Martin III]
Investigators are probing whether Martin was responsible for an apparent leak that led to a cache of NSA hacking tools appearing online in August, according to an official familiar with the case. Those tools included “exploits” that take advantage of unknown flaws in firewalls, for instance, allowing the government to control a network.
-
The F.B.I. secretly arrested a National Security Agency contractor in recent weeks and is investigating whether he stole and disclosed highly classified computer codes developed to hack into the networks of foreign governments, according to several senior law enforcement and intelligence officials.
The theft raises the embarrassing prospect that for the second time in three years, an insider has managed to steal highly damaging secret information from the N.S.A. In 2013, Edward J. Snowden, who was also a contractor for the agency, took a vast trove of documents that were later passed to journalists, exposing N.S.A. surveillance programs in the United States and abroad.
The contractor was identified as Harold T. Martin 3rd, 51, of Glen Burnie, Md., according to a criminal complaint filed in late August. He was charged with theft of government property, and unauthorized removal or retention of classified documents. During an F.B.I. raid of his house, agents seized documents and digital information stored on electronic devices. A large percentage of the materials found in his house and car contained highly classified information.
At the time, F.B.I. agents interviewed Mr. Martin, and he initially denied having taken the documents and digital files. The agency later said he had stated that he knew he was not authorized to have the materials. According to the complaint, he told the agency that “he knew what he had done was wrong and that he should not have done it because he knew it was unauthorized.”
-
Civil Rights/Policing
-
Errol Morris and Wim Wenders both have new films out this year: Morris’ “The B-Side: Elsa Dorfman’s Portrait Photography” examines the life and work of polaroid portrait artist Elsa Dorfman, and Wenders’ “The Beautiful Days of Aranjuez” captures a conversation between a man and woman that encompasses the totality of life. But the two acclaimed directors have also executive produced Sonia Kennebeck’s documentary feature debut “National Bird,” about drone warfare and the three whistleblowers determined to break the silence around the controversial affair. Watch the trailer for the film below.
-
Federal authorities have won indictments against 80 people, including corrections officers and inmates, in an alleged conspiracy to sneak heroin, cocaine, cellphones, pornography and other contraband into the Eastern Correctional Institution in Westover.
The largest federal indictment in Maryland history is the latest to allege that officers and inmates used sex, drugs and violence to run a criminal enterprise out of a state prison facility.
It mirrors the 2013 case in which the Black Guerrilla Family gang used similar methods of bribery and intimidation to seize control of the Baltimore City Detention Center.
Federal prosecutors now charge 18 corrections officers, 35 inmates and 27 others in a scheme in which the officers allegedly took bribes to sneak contraband into ECI, the state’s largest prison.
-
A paradox sits at the heart of the human rights movement. For decades it has made strong claims about the universality of human rights but then proceeded to present a discounted version of the universality story.
Standard historical accounts have privileged the role of western actors, and their perspectives on historical causalities. These have been accompanied by an overemphasis on the 1940s and 1970s in explaining the emergence of human rights—an emphasis that reveals a scholarly addiction to “human rights moments” and iconic histories, instead of more richly contextualized narratives over time.
The above-mentioned emphasis has resulted in a huge gap in knowledge concerning the intervening period – covering about 25 years from 1948 to the mid-1970s. In this period, the largest transformation of sovereign power in world history took place, namely decolonization. Surely, this structural transformation in the international system of states played a role in the post-1945 emergence of human rights en route to their contemporary significance?
-
The court acquitted anti-Zwarte Piet activist Jerry Afriyie on Thursday. Afriyie was charged with resisting arrest and assaulting a police officer during a violent protest in Gouda two years ago, NOS reports.
During the Sinterklaas arrival festival in Gouda in 2014 supporters and opponents of blackface Zwarte Piet gathered to protest at the town hall. They had no permission to protest there and the police ordered them to leave. The atmosphere turned nasty and a total of 90 people were arrested, both in the pro- and anti-Zwarte Piet groups.
Afriyie was the only one to end up in court, according to NOS. According to the Public Prosecutor, he resisted arrest and injured a police officer by pinching him hard in the leg.
-
The Muslim cleric was repeatedly beaten with a shoe when an on-air row over the Islamic veil turned violent.
The fight broke out live on Egypt’s popular LTC TV during a discussion about the place of the burka in the Islamic world.
Sydney imam Mostafa Rashid claimed that the headscarf is a cultural tradition rather than a religious duty.
-
Good news: If you aren’t married when you have sex with someone, you just get beaten — perhaps to death — because you are to be given 100 lashes.
-
The Staten Island man who filmed Eric Garner’s final breaths was sentenced Monday to four years in prison for possession of a weapon and drug charges.
Ramsey Orta told his family “it will be okay” in Staten Island Supreme Court as Justice Stephen Rooney read out his sentence.
As court officers put handcuffs on Orta, protesters stood up in the courtroom, holding their fists in the air, flashing peace signs and chanting, “No justice no peace! F–k these racist police!”
-
Thailand on Wednesday barred entry to a Hong Kong student activist who helped organize pro-democracy protests in the Chinese-ruled city in 2014, with a Thai newspaper saying he had been deported and “blacklisted” at China’s request.
Bespectacled Joshua Wong, 19, was detained in Bangkok where he had been invited to speak at universities about Hong Kong’s “Umbrella Movement” street protests and on setting up his political party, Demosisto.
He was later put on a plane back to Hong Kong where he told reporters Thai authorities had not given him a reason for refusing him entry but had shown him a document citing a security law. One officer had mentioned a “blacklist”, he said.
“As a Hong Kong person, I did not expect that even if I do not enter mainland China, I would be inside a foreign detention center, detained by other police. This is unbelievable,” he said.
-
In the last seconds before he was shot 14 times, Joseph Mann dodged the police cruiser once, then twice. Dashboard video recorded the officer’s words inside the car: “Fuck this guy. I’m going to hit him.”
“OK, go for it. Go for it,” his partner replies.
The Mann family’s attorney amended his complaint against the city of Sacramento on Friday and sent a letter to the justice department requesting a civil rights investigation into the Sacramento fatal police shooting of Mann, a 51-year-old homeless man with a history of mental illness.
“It’s disgusting,” attorney John Burris told the Guardian. “It raises the question that this might have been a deliberate, premeditated murder, that they intended to do what they did.”
-
Tasleem was just 18 years old when her brother shot her in the head. Her crime was marrying a man of her choice, considered a betrayal of a family’s honor among many in Pakistan who live by an ancient code of conduct.
Last year, three people a day were killed in the name of “honor” in Pakistan: a total of 1,096 women and 88 men, according to the independent Human Rights Commission of Pakistan, which says the true figure is likely higher because many such crimes go unreported.
In 2014, the number was 1,005 women, including 82 children, up from 869 women killed a year earlier.
Outrage at the practice has grown in recent months as Pakistani news channels have reported on girls who are shot, strangled or burned alive, most often by a brother or a parent.
Pakistan’s conservative Prime Minister Nawaz Sharif has promised to introduce legislation that will remove a legal loophole that allows the family of a murder victim to effectively pardon the murderer. The loophole is often invoked in honor killings to prevent any prosecution.
-
People caught carrying knives in the street will be jailed for longer under new proposals.
Carrying a knife while in a group or gang, or filming attacks for social media could also spell more jail time.
The Sentencing Council for England and Wales says it wants sentences to better recognise public concern amid a rise in recorded knife offences.
Justice Minister Sam Gyimah said sentences should reflect the “devastation” caused by knife crime.
Police recorded almost 29,000 crimes involving knives in the 12 months to March 2016 – a 10% rise on the year before.
-
A Pakistani scholar visiting Australia for a speaking tour has been ordered home after a video sermon surfaced of him saying the world will be purified when every Jew is wiped out.
Muhammad Raza Saqib Mustafai, who has a Facebook fan base of almost a million people, spoke at the Ghausia Masjid in Blacktown and the Al-Madinah Masjid in Liverpool over the long weekend.
-
After years of civil asset forfeiture abuse, legislators are finally fighting back. Reform bills have been offered up all over the country. Unfortunately, very few of them have made it to state governors’ desks intact. The DOJ itself has played an integral part in thwarting true forfeiture reform, but legislators are also battling powerful police unions and a law enforcement lobby that needs to do little more than say the words “drug dealer” to convince fence-straddlers to come down on their side.
-
Internet Policy/Net Neutrality
-
For decades, incumbent broadband ISPs have all but owned state legislatures, often to the point where they’re quite literally allowed to write awful state law that actively harms state consumers. That’s why it has proven amusing to see these same ISPs cry like petulant children at Google Fiber’s disruption of the uncompetitive broadband market. AT&T, for example, has sued Louisville and Nashville for passing pole attachment reform that would speed up broadband deployment, all while claiming that doing so gives Google Fiber an unfair advantage.
-
Intellectual Monopolies
-
This morning at the World Intellectual Property Organization General Assemblies, WIPO Director General Francis Gurry commented on the success of the WIPO Conference on the Global Digital Content Market, which took place in April. But the full video of the keynote speaker, who had sharp words for corporate internet giants and other new technologies, is missing from the archive.
His comments were made during the WIPO General Assembly, as delegates were about to discuss the report of the Standing Committee on Copyright and Related Rights. A short video was then aired presenting a summary of the conference. The keynote speaker [pdf] of the conference was Jaron Lanier, a computer scientist, music composer and performer, and author of numerous books, the latest “Who Owns the Future.”
-
Has the adoption of the World Intellectual Property Organization Development Agenda in 2007 changed the culture of the organisation, and what did it achieve? According to panellists at a side event to this week’s WIPO General Assembly, the Development Agenda has not yet changed the culture of the organisation and its primary focus to support and protect intellectual property. However, WIPO should follow the United Nations Sustainable Development Goals and collaborate with other UN agencies to include development consideration in its work, they say.
-
“Great victory”, “life-changing”, “historic milestone” – no adjectives were strong enough yesterday to celebrate the entry into force of the Marrakesh treaty at the World Intellectual Property Organization. The treaty, which went into effect on 30 September, “opens the door to the world’s knowledge,” to visually impaired people, but will need many more countries join, in particular countries that are major producers of special format books – the United States and the European Union.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- Eight Wireless Patents Have Just Been Invalidated Under Section 101 (Alice), But Don't Expect the Patent Microcosm to Cover This News
Firms that are profiting from patents (without actually producing or inventing anything) want us to obsess over and think about the rare and few cases (some very old) where judges deny Alice and honour patents on software
- 2017: Latest Year That the Unitary Patent (UPC) is Still Stuck in a Limbo
The issues associated with the UPC, especially in light of ongoing negotiations of Britain's exit from the EU, remain too big a barrier to any implementation this year (and probably future years too)
- Links 7/1/2017: Linux 4.9.1, Wine 2.0 RC4
Links for the day
- India Keeps Rejecting Software Patents in Spite of Pressure From Large Foreign Multinationals
India's resilience in the face of incredible pressure to allow software patents is essential for the success of India's growing software industry and more effort is needed to thwart corporate colonisation through patents in India itself
- Links 6/1/2017: Irssi 1.0.0, KaOS 2017.01 Released
Links for the day
- Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)
A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone
- The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO
In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"
- Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern
The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)
- Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3
Links for the day
- Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released
Links for the day
- Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents
Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress
- New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)
To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies
- Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials
One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end