10.31.15
Posted in News Roundup at 8:32 pm by Dr. Roy Schestowitz

Contents
-
You feel safe, wrapped in that comforting blanket of Linux. It soothes you and protects you from the lumbering monsters that hide within your server closet. That innocent penguin has always been there to ward away the evil…it’s glowing red eyes peering through the Windows of a house made of glass. And you stand tall, knowing the open source platform will always have your back. Or, will it?
-
Desktop
-
Psst, want a cheap laptop? Philadelphia’s Nonprofit Technology Resources wants to save a pile of laptops from the scrapyard. So Ed Cummings, the president of the organization, said the organization is having a “Linux Laptop Pizza Party” on Saturday in the City of Brotherly Love, according to Juliana Reyes writing in Technical.ly.
-
Server
-
Kernel Space
-
With recently having picked up four Western Digital Black HDDs, I decided to run some fresh hard drive benchmarks with the most common Linux file-systems to see how the performance compares atop Ubuntu 15.10.
-
While there was still a fair amount of code churn this week, if Linus remains comfortable with the state of the kernel, Linux 4.3 will be released this weekend.
-
Alex Deucher sent in another pull request of new AMDGPU/Radeon DRM material for landing in DRM-Next to in turn make it into Linux 4.4.
-
Intel has published a new set of patches fpr speeding up AES-CBC encryption for processors having the AVX2 instruction set extension.
-
Graphics Stack
-
Martin Peres at Intel has sent out the latest revised patches for supporting Direct Rendering Infrastructure 3 (DRI3) with EGL.
-
Alex Goins of NVIDIA posted the patches yesterday evening as version two of PRIME synchronization for the i915 DRM. The patches aren’t big but will hopefully fix tearing for those using PRIME on dual GPU systems.
-
Maxime Ripard of Free Electrons published a set of nineteen patches yesterday for adding Allwinner A10 display engine support via a new DRM driver for the Linux kernel.
-
The Mesa i965 DRI driver enables ARB_shader_clock support for Intel Ivy Bridge “Gen 7″ graphics and newer. This work will be part of Mesa 11.1.
-
Complementing yesterday’s Are The Open-Source Graphics Drivers Good Enough For Steam Linux Gaming? article is a look at the Steam Linux gaming performance for three different Intel Linux systems running Ubuntu 15.10 and firing up the latest Steam client. This is the last of the planned series that began one week ago with the a 22-way comparison of NVIDIA/AMD GPUs on SteamOS.
-
Following the 4K AMD/NVIDIA High-End GPU Comparison On SteamOS Linux and 22-Way Comparison Of NVIDIA/AMD Graphics Cards On SteamOS For Steam Linux Gaming articles, a few Phoronix readers were inquiring about the CPU and GPU utilization metrics during testing.
So I started work on some follow-up tests to look at the CPU/GPU utilization during testing to try to answer that question. The Phoronix Test Suite is able to do so by simply setting MONITOR=cpu.usage,gpu.usage as an environment variable prior to running any benchmarks (or see phoronix-test-suite system-sensors or MONITOR=all for the other system sensors supported through Phodevi – The Phoronix Device Interface).
-
-
As there’s been some discussion lately about the “size” of the different open-source Linux graphics drivers, here are some fresh looks at the rough code size of each of the main DRM/KMS kernel drivers as well as the Mesa/Gallium3D user-space drivers.
-
Over the past week on Phoronix have been several featured articles looking at the performance of SteamOS with the proprietary AMD/NVIDIA graphics drivers: 22-Way Comparison Of NVIDIA/AMD Graphics Cards On SteamOS, 4K AMD/NVIDIA High-End GPU Comparison On SteamOS, and Is SteamOS Any Faster Than Ubuntu 15.10 Linux? One of the frequent questions that have come up since then is how the open-source driver performance compares to that of the binary blobs on SteamOS, so here are some of those benchmarks.
-
Applications
-
Furius ISO Mount is an application that allows users to mount a large number of images in their operating systems with minimal effort. It’s designed to be used by beginners and experts alike, although the need for such apps has diminished.
-
In Cockpit we run thousands of integration tests per day against pull requests and git master. Each test brings up up Cockpit in a full operating system VM, and hammers on it in some way. Without these tests it’s impossible to validate that Cockpit actually works.
-
Thanks to everyone who contributed with bug reports and testing. What isn’t generally visible is that a lot of this happens behind the scenes downstream on distribution bug trackers, IRC, and so forth.
-
PyRoom is the kind of application that you don’t ever hear people talking about, but that is completely surprising once you open it. It’s a distraction-free text editor that allows writers to focus on the writing and less on anything else.
-
-
Arun Raghavan from the PulseAudio project has had the pleasure of announcing the immediate availability for download and testing of the first point release of the PulseAudio 7 open-source sound server.
-
The developers of the open source GStreamer multimedia framework have announced a few hours ago the release and immediate availability for download of the first maintenance version of the GStreamer 1.6 series.
-
-
-
The developers of the open source, MPlayer-based MPV video player software have announced the release and immediate availability for download of version 0.12.0.
-
Proprietary
-
If you are a systems administrator and you are tasked with ensuring your systems have a backup and replication process, Veeam is likely in your arsenal of tools.
-
The Vivaldi developers, through Olafur Arnason and Ruarí Ødegaard, have announced the release of two consecutive Snapshots of the upcoming Vivaldi web browser for all supported operating systems.
-
Instructionals/Technical
-
Wine or Emulation
-
What’s new in this release (see below for details):
– Implementation of the TransmitFile function.
– More implementation of the Web Services DLL.
– Improved video decoding.
– Alternative for the deprecated prelink tool.
– Major Turkish translation update.
– Various bug fixes.
-
Alexandre Julliard announced earlier today, October 30, the immediate availability for download and testing of a new development version of the Wine software that lets users run Windows apps and games on any GNU/Linux operating system.
-
Wine 1.7.54 was released this morning as the latest bi-weekly Wine development release.
Wine 1.7.54 offers improved video decoding, an implementation of the TransmitFile function, more of the Web Services DLL has been implemented, and more.
-
Games
-
For Linux gamers, you can now set extra mouse buttons to do things, which is apparently a big thing (I never use mine).
-
A new Humble Weekly Bundle has been released, and it’s called Day of the Devs. With one exception, all the games that have been made available also come with Linux support.
-
Not the news I expected to hit my inbox this week. Fishing Planet an online fishing game aimed at realism is heading to Linux.
-
The game was ported to Linux in time for the Halloween sale on Steam and is a bargain for fans of puzzle platformers.
-
-
-
Guild Software thought that it will be nice for its Vendetta Online players to receive a new double update of the game, so that they don’t get bored on Halloween night.
Guild Software thought that it will be nice for its Vendetta Online players to receive a new double update of the game, so that they don’t get bored on Halloween night.
-
-
One of the things I do here is contact developers who promised a Linux version of a game which hasn’t yet surfaced, and the latest user request for me to check was Moebius: Empire Rising. It took a while to get a response on it, but they did kindly reply and allow me to publish their answer.
-
On the flip-side, there are companies like Valve (with Steam) and Nvidia (with their Shield line) that are enabling some amazing, but proprietary, games to come to Linux (I still haven’t managed to make myself write it as “GNU/Linux”… I still think that looks goofy as a name). All of which lets me feel a bit better about playing these closed games.
By buying games written for, and running on, a Free Software platform… I am helping to encourage further development, testing, and usage of that platform. Which is good.
-
Desktop Environments/WMs
-
After introducing the first maintenance version of the soon-to-be-released Cinnamon 2.8 desktop environment, the most anticipated release of Cinnamon, Clement Lefebvre presents the second point release.
-
K Desktop Environment/KDE SC/Qt
-
Some time ago KDE project bet on the separation of base libs, on somehing called frameworks, that create a set of libraries to be capable to be used for any other software project.
-
This month began with a super KDE Sprint for KDevelop and Kate. I’ve mentioned the things I did and learned in my previous blog post.
-
GNOME Desktop/GTK
-
Hi GNOMErs!
The development of the next GNOME release, 3.20, has started, and the
first development release, 3.19.1, is now available.
-
The GNOME developers are working around the clock to implement the most awesome GNU/Linux technologies in their highly acclaimed open-source desktop environment used in numerous Linux kernel-based operating systems by default.
-
Christian Hergert has shared a blog post with some of his plans for what he hopes to accomplish during the GNOME 3.20 cycle with regard to his GNOME Builder integrated development environment.
GNOME Builder continues to be to GNOME as KDevelop is to KDE. GNOME Builder so far has supported features like extensive inline code completion, quick file access, code assistance, integrated GNOME/GTK document viewing, live markdown previews, and many other features. If you are not familiar with the current state of GNOME Builder, see the GNOME Wiki.
-
-
Javier Jardón announced the release of GNOME 3.19.1 today as the first development release aiming toward GNOME 3.20.
-
I’ve been busy working on the plumbing for what will become Builder 3.20. We have a really ambitious cycle ahead of us, so getting these core changes in place as soon as possible will help give us time to stabilize.
-
-
-
Reviews
-
You can use BackBox as your main Linux distro and do nothing more involved that run its security envelop to harden your immediate computing environment and surf the Web with anonymity.
You can use BackBox more productively to dig deep into your network to sniff out security risks and lock down your connectivity and data. BackBox’s security tools are professional class.
-
Pinguy Builder is a very useful app that can be used by anyone to create an Ubuntu Live CD from scratch or to back up an existing Ubuntu installation. The process should work with all the other Ubuntu-based distributions.
-
New Releases
-
Suman Chakravartula has had the great pleasure of informing Softpedia about the immediate availability for download of the Fedora-based Rockstor 3.8-9 Linux operating system, known as an open-source, powerful and smart NAS (Network-attached storage) solution.
-
Screenshots/Screencasts
-
Gentoo Family
-
Sabayon 15.11 is a modern and easy to use Linux distribution based on Gentoo, following an extreme, yet reliable, rolling release model.
This is a monthly release generated, tested and published to mirrors by our build-servers containing the latest and greatest collection of software available in the Entropy repositories.
The Change-log files related to this release are available on our mirrors.
-
The Sabayon developers are happy to announce the release of their monthly rolling ISO images, dubbed Sabayon 15.11, which include all the updates that have been released during the month of October 2015.
-
Arch Family
-
Twitch playing Pokémon was easy mode. Tomorrow, Twitch viewers will be invited to do something altogether more challenging: install Arch Linux. Using the same Twitch chat-driven concept as the collaborative Pokémon playthrough, anyone will be able to enter commands and control the installation process.
-
-
-
-
-
-
-
-
Ballnux/SUSE
-
Now that the Release Candidate of the forthcoming openSUSE Leap 42.1 GNU/Linux operating system was made available for download and testing during the last two weeks, the time has come to take a look at Leap’s most prominent features.
-
Red Hat Family
-
I met Alison Chaiken at LinuxCon 2010 in Boston, not long after she joined Nokia as a Meego technical consultant. A few months later, I interviewed her about her role at Nokia and her predictions about where open source technology was headed in 2011. She predicted an increasing role for cameras and microphones in mobile. “Cameras and microphones are used deliberately to take photos and record voice commands, but in the future they will be always on, gathering ambient data about the environment of users on the go,” she said.
These days Alison works on automotive Linux systems programming at Mentor Graphics’ Embedded Software Division, and she spends a lot of time working with, contributing to, and speaking about systemd. She’ll be leading a training session, systemd, the Next-Generation Linux System Manager, at LISA15 in Washington D.C. on November 9. In this interview, she makes another prediction—that sys admins will enjoy using systemd.
-
Multinational software company, Citrix, has partnered with open source company, Red Hat, on new product integrations for building OpenStack Clouds. As part of the collaboration, Citrix unveiled the integration and certification of its application delivery controller, NetScaler, with Red Hat Enterprise Linux OpenStack Platform.
Citrix said, in a statement, that this partnership will enable customers to assemble their Cloud infrastructure using components from Citrix and Red Hat for the first time.
-
Red Hat, the world’s leading provider of open source solutions, has announced that it has signed a definitive agreement to acquire Ansible, Inc., a provider of powerful IT automation solutions designed to help enterprises move toward frictionless IT.
-
Wall Street brokerages expect that Red Hat (NYSE:RHT) will post $0.31 earnings per share for the current quarter, according to Zacks Investment Research. Nine analysts have provided estimates for Red Hat’s earnings. The highest EPS estimate is $0.32 and the lowest is $0.30. Red Hat posted earnings of $0.30 per share in the same quarter last year, which suggests a positive year-over-year growth rate of 3.3%. The firm is expected to issue its next earnings results on Thursday, December 17th.
-
-
The Ceph Community, an open-source object and file cloud storage stack, has formed an advisory board that will work in governance with the community.
The Ceph Advisory Board will assist the community in driving open-source software-defined storage technology, and in collaborating with the community’s technical and user committees.
-
Fedora
-
In somewhat of an embarrassing move and indicating that KDBUS likely won’t be proposed for Linux 4.4, this in-kernel IPC mechanism is being temporarily stripped out of Fedora.
Fedora developers added KDBUS to their Rawhide kernel this summer at the request of the systemd developers involved in KDBUS development. With systemd 221, the upstream developers also encouraged Linux distributions to begin shipping KDBUS even though it wasn’t part of the mainline kernel. This turned out to be a mistake.
-
You might have heard of the C.H.I.P., the 9$ computer. After contributing to their Kickstarter, and with no intent on hacking on more kernel code than is absolutely necessary, I requested the “final” devices, when chumps like me can read loads of docs and get accessories for it easily.
-
-
While Fedora 23 failed its Go/No-Go meeting yesterday, at today’s meeting this next installment of Red Hat’s Fedora Linux was cleared to be released next week.
Fedora 23 RC10 has been promoted to final at today’s meeting, per the notes.
Fedora 23 will now be officially released next Tuesday, 3 November. Fedora 23 is in exceptional shape and comes with a variety of new features. I personally look forward to upgrading to Fedora 23 on my main production system once switching over to a Skylake ultrabook.
-
The Fedora KDE community has been dealt a blow today with one of the co-maintainers of the Fedora KDE packages resigning from those duties along with his roles relating to the Fedora KDE special interest group.
Kevin Kofler, who has long been involved in KDE packaging for Fedora and advancing KDE on Fedora, he is stepping down from their KDE SIG and from co-maintaining all of the Qt/KDE packages he maintains for the distribution — except for the few packages he is the upstream maintainer of in the KDE world.
-
Jan Kurik tonight announced that Fedora 23 is GO for release. An internal RC10 will be created and tested and if no major issues arise, it will be released as Fedora 23 next week. For KDE users it may not be a day for celebration, as Phoronix.com’s Michael Larabel reported today that a co-maintainer for KDE in Fedora said that upcoming version 23 is “easily the worse KDE spin we have ever released.” Yikes.
-
-
-
-
Linux Voice magazine periodically releases older issues of their magazine under a CC-BY-SA license so the entire Linux community can read, share and use the articles they publish (they also donate 50% of their profits to the Free Software community).Today, they released Issue 12 of Linux Voice under the CC-BY-SA license, nine months after the release of the magazine back in February.
Of particular interest to Fedora users is at the end of their Distro Hopper segment, they take a look at our first ever release — Fedora Core 1. While obviously a little dated, with the release of Fedora 23 so close, there is also a review of Fedora 21. The issue also features an interview with systemd developer Lennart Poettering.
-
The Red Hat developers have finally greenlit the launch of Fedora 23 and it looks like the new version will finally arrive on November 3, the date that was previously tracked.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical’s Sergio Schvezov announced the release of the fourth maintenance build of the snapcraft utility that can be used by anyone to easily create Snappy packages for the Ubuntu Snappy Core operating system.
-
On the last day of October, Canonical’s Łukasz Zemczak sent in his daily email to inform us all about the latest work done by the Ubuntu Touch developers in preparation for the upcoming OTA-8 software update.
-
Canonical’s David Planella sent in his bi-monthly report to inform us all about the last things that happened in the Ubuntu world. The report includes information about the work done by the Ubuntu Community Team during the last two weeks.
-
-
Solu Machines recently launched a Kickstarter campaign with the hopes of releasing a completely new class of device. Dubbed the Solu, the company has prototyped a 4.5-inch cloud-powered computer with a peculiar square form factor. Its touchscreen display allows users to navigate the device with their fingers, like they would a smartphone or tablet.
-
Solu Machines recently launched a Kickstarter campaign with the hopes of releasing a completely new class of device. Dubbed the Solu, the company has prototyped a 4.5-inch cloud-powered computer with a peculiar square form factor. Its touchscreen display allows users to navigate the device with their fingers, like they would a smartphone or tablet.
-
Solu Machines is running a Kickstarter campaign for an unusual type of computer. The Solu is a mini PC that measures about 4.5 inches square and has a touchscreen display, so you can use it sort of like a mobile phone or tablet. But connect it to a monitor and keyboard and the Solu becomes a touchpad that you can use to interact with desktop on a bigger screen.
-
VIA’s “EPIA-E900” SBC uses VIA’s own Eden X4 processor, and debuts a reincarnated “Pico-ITXe” form-factor featuring MXM-based PCIe and multi-I/O expansion.
VIA’s new EPIA-E900 single-board computer introduces a second generation of the Pico-ITXe form-factor that VIA demoed at an Embedded Systems Conference back in October 2008. Although this Pico-ITXe re-spin has the same name, it bears little resemblance to the now-defunct Pico-ITXe v1.0. While the original Pico-ITXe footprint measured 100 x 72mm and included self-stacking SUMIT expansion, today’s Pico-ITXe is 38mm longer and expands with a coplanar MXM slot that carries a collection of I/O interfaces plus PCI Express.
-
Phones
-
Tizen
-
VLC is a cross platform open source media player that is created by the VideoLAN Project. It supports many different audio and video compression methods and file formats and Is regarded as one of the best and most versatile media players out there.
-
Android
-
Back in March I was given an LG G Watch R, the first Android Wear smartwatch to have a full round display (the Moto 360 was earlier, but has a bit cut off the bottom of the actual display). I’d promised I’d get round to making some comments about it once I’d had it for a while and have failed to do so until now. Note that this is very much comments on the watch from a user point of view; I haven’t got to the point of trying to do any development or other hacking of it.
-
That’s where people like GM’s Phil Abram come into play. Abram — who has stints at Sonos and Sony on his résumé — led the company’s adoption of CarPlay and Android Auto, which will eventually reach just about every vehicle GM sells in the US. He’s also coming off a connected car deployment in China after rolling out in Europe and North America, where LTE currently ships on 16 models.
-
-
-
-
-
-
ChromeOS is a stripped-down Gentoo-derived GNU/Linux operating system built using Chromium OS. At its simplest, it’s a browser as operating system.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Before we start, let’s get one thing out of the way: there’s no practical application for the apps demonstrated below, at least not in the way they’re being used. You can’t seriously play a game meant for a 20-button controller on a screen smaller than two inches across, even if your fingers are tiny enough to hit the virtual buttons. This is the work of an enthusiast gamer and Android fan. It doesn’t have to make sense.
-
Two Android devices, using the very same build of the OS, can be quite different in reality if they’re made by different manufacturers. So much so that it’s not rare for (uninitiated) friends and family members to ask us whether a heavily skinned device is an Android device. It’s kind of weird.
-
This week, the Nexus 6P and 5X received a substantial new feature: Factory images. Factory images are a great failsafe to have with a Nexus device, just in case you need to restore it back to its original state if catastrophe strikes.
This update was one of the few highlights in a rather slow week of updates in Android Land. Of course, if Android really does swallow up Chrome, we can’t wait to add a whole list of Android-powered PCs to this weekly compilation.
-
Back at Google I/O in 2014, Google announced Android Auto. Their first step into the car – well other than their self-driving cars. The idea was to provide a seamless experience in terms of infotainment systems in our cars. Because let’s face it, the car makers suck at making infotainment systems. However, Google also wanted that data (reports have stated that Google wants basically an OBD-II dump, while others have stated that it’s just whether the car is in park, what the headlights are doing, etc). After all, Google collects data about everything.
-
Root. It’s a word we’re mostly familiar with here. Despite the ever-increasing attempts by Google to make it harder to achieve and use (and most likely this will continue, with the predicted convergence of the heavily locked-down ChromeOS and Android platforms), rooting remains incredibly popular on XDA.
-
-
-
Open source enterprise use cases appear to be on the rise, at least anecdotally, with an increasing number of CIOs, IT directors and Chief Technology Officers telling CIO UK about investigating and adopting free and open source alternatives to proprietary software as they seek to gain freedom and flexibility, cut costs, increase agility, improve code quality and avoid vendor lock-in.
UK businesses it seems have also finally conquered their “irrational fears” of open source and security fears are also on the wane, reports have suggested.
The most recent studies by the non-profit Linux Foundation in its Enterprise End User Trends reports have revealed year on year increases in Linux deployments over the last four years, with the open operating system seeing particular growth as a platform for cloud computing.
-
Neo4j graph NoSQL database team launches open source graph query language called openCypher. Neo Technology, the company behind the graph database, announced last week at GraphConnect Conference, the launch of the open source project that will be available to technology providers as a common language for querying graph data.
-
The Tor Project has launched the beta version of Tor Messenger, an easy-to-use encrypted message client for those concerned about their privacy and potential surveillance.
-
Many organizations use static analysis security testing (SAST) and dynamic analysis security testing (DAST) for monitoring, but while these tools are excellent for finding bugs in code written by internal developers, they are not effective in detecting known open source vulnerabilities in application code. In fact, open source vulnerabilities are far too complex to be found by these automated tools.
-
Events
-
Alan Clark, chairman of the board at the OpenStack Foundation, discusses the progress made at the OpenStack Summit this week.
-
Web Browsers
-
Chrome
-
-
Earlier this year Samsung’s Julien Isorce posted VA-API support for Nouveau to better video acceleration for this open-source NVIDIA driver. Since then he’s been working on some Gallium3D VA improvements to benefit the use-case of Chromium’s GStreamer back-end.
-
SaaS/Big Data
-
At the OpenStack Summit here, there have been a number of common themes and questions that keep surfacing. Time and again panels are discussing why contributions matter and how Amazon is or isn’t the competition.
One such panel session was titled “The OpenStack Orchestra: The Next Wave of OpenStack Specialist Startups,” and included executives from Mirantis, Tesora, SwiftStack and PLUMgrid.
-
Networking has always been a part of the open source OpenStack cloud platform, but it has never been more popular, or as exciting as it is now. At the OpenStack Summit in Tokyo, one of the hottest topics is networking, as organizations of all sizes turn to the cloud for Software Defined Networking and Network Functions Virtualization capabilities.
-
-
Oracle/Java/LibreOffice
-
LibreOffice 5.1 Alpha has launched, ready for the weekend. Enthusiasts and community members will be able to grab the software and partake in the first Bug Hunting Session from Friday October 30th to Sunday November 1st. The final build of LibreOffice 5.1 is expected to launch in February next year.
-
BSD
-
I’m Henning, not 20 any more, OpenBSD developer since 2002. I architected & wrote large parts of pf, started, architected and wrote large parts of bgpd and ntpd. The imsg & privsep framework I wrote for bgpd is in almost all newer OpenBSD daemons. I also worked a lot in the network stack, including many redesigns. One of the last bigger projects I did was the replacement of the queueing subsystem.
-
FSF/FSFE/GNU/SFLC
-
Stepping ahead of the Linux 4.3 release is a Halloween release of GNU Hurd 0.7, GNU Mach 1.6, and GNU MIG 1.6.
GNU Hurd 0.7 improves the node cache for the EXT2 file-system code (ext2fs), improves the native fakeroot tool, provides a new rpcscan utility, fixes a long-standing synchronization issue with the file-system translators and other components, and the Hurd code has been ported to work with newer GCC versions and libc.
-
The Digital Millennium Copyright Act (DMCA) contains provisions penalizing the circumvention of “technological protection measures”. These measures are digital jails denying users access to the software and other digital works they possess, preventing them from examining or changing the software on their devices. While such measures are nominally meant to protect copyrighted works, in reality they function as unacceptable restrictions on computer user freedom. The Free Software Foundation (FSF) opposes such Digital Restrictions Management (DRM) systems. The FSF further opposes the DMCA’s anti-circumvention provisions, and demands that Congress repeal those provisions. Other countries with similar laws should follow suit.
Every three years, the Library of Congress reviews proposals granting limited exemptions from the DMCA’s broad ban on users controlling the software and data on devices encumbered with DRM. This flawed process is meant to lessen the DMCA’s harm by giving user rights advocates an opportunity to request exemptions allowing circumvention in particular cases. Even when such petitions succeed, the resulting exemptions last only three years, meaning that advocates must repeatedly fight to retain the limited ground they won.
-
Licensing
-
Each approach strikes a different balance between your costs, benefits and PCI risks and workload. The table sums up the highlights, the details of which I’ll explain further.
-
-
-
Openness/Sharing
-
-
-
-
Croatia’s e-Građani (eCitizens) project was declared the best European eGovernment services project, in an awards ceremony at the Open Government Partnership Global Summit 2015 in Mexico on Wednesday.
-
Open Access/Content
-
On Thursday, Harvard Law School announced its Free the Law project, teaming up with a company called Ravel to scan all federal court decisions and all state court decisions, and then place them all online for free. This is pretty huge. While some courts now release most decisions as freely available PDFs, many federal courts still have them hidden behind the ridiculous PACER system, and state court decisions are totally hit or miss. And, of course, tons of historical cases are completely buried. While there are some giant companies like Westlaw and LexisNexis that provide lawyers access to decisions, those cost a ton — and the public is left out.
-
-
The Department of Education has launched #GoOpen, a campaign to encourage schools to use open educational resources (OER). To add force to the hashtag, the Department proposed new regulation that any tool developed with its federal grant funds will be required to have an open license, would which allow schools to use and modify those resources for free.
-
-
Open Hardware
-
A pair of engineers in Singapore, Andrew “Bunny” Huang and Sean Cross, have developed a working laptop which was designed to be completely open sourced, with no proprietary drivers or software of any kind. The Novena laptop is powered by a Cortex A9 and an FPGA and runs Debian, even communications are handled by a software-defined radio board. This is more of a proof of concept than a marketable machine but the links at The Register will take you to the details on how you could build one yourself. Even the bezel is open source and modifiable, it is a laptop with an upgradable screen!
-
-
Programming
-
PHP 7.0 RC6 was released today for what may be the final release candidate ahead of PHP 7.0.0′s official premiere in two weeks.
-
Ceylon, the programming language based on Java and developed at Red Hat, is out with a new version of this programming language that can be lowered down into JavaScript.
-
We’re pleased and proud to unleash PyPy 4.0.0, a major update of the PyPy python 2.7.10 compatible interpreter with a Just In Time compiler. We have improved warmup time and memory overhead used for tracing, added vectorization for numpy and general loops where possible on x86 hardware (disabled by default), refactored rough edges in rpython, and increased functionality of numpy.
-
PyPy 4.0.0 was released today as a major update for this Python 2.7 interpreter and JIT compiler.
-
-
CAIRO: Egypt confirmed on Saturday that a Russian passenger plan had crashed in central Sinai.
A statement from the prime minister’s office said Sherif Ismail had formed a cabinet level crisis committee to deal with the crash.
The plane, travelling from the Egyptian resort Sharm el-Sheikh to the Russian city of St Petersburg, disappeared from radar screens in Cypriot airspace, Russia’s RIA news agency reported, citing a Russian aviation authority source.
The source said the aircraft was an Airbus A-321 jet, had 224 passengers and crew on board, and was operated by Russian airline Kogalymavia.
-
Sunday, October 16 was declared Steve Jobs Day by California’s Governor Brown. I admire Brown for taking a step to recognize Jobs’ extraordinary contributions, but I couldn’t help be struck by Rob Pike’s comments on the death of Dennis Ritchie a few weeks after Steve Jobs.
-
I’ve been lamenting the demise of the Unix philosophy: tools should do one thing, and do it well.
-
It takes a little longer, but it’s so much nicer if you can read an email thread from top to bottom rather than having to scroll to the bottom, read, scroll backward, read, scroll backward, read, etc. Yes, it’s the easiest way to reply to a message, but it’s an enemy of comprehension for recipients.
-
Security
-
Lauri Love made an appearance on the BBC flagship current affairs programme Newsnight on Friday 23 October, explaining the significance of a widely publicised hack of telecoms provider TalkTalk, which has led to the disclosure of personal information of millions of subscribers.
-
Free website hosting service 000webhost has suffered a data breach which has placed the service’s security practices under scrutiny.
000webhost is a free web hosting service which supports both PHP and MySQL, catering for millions of users worldwide. On Wednesday, the firm told users in a Facebook message that the company had suffered a databreach on its main server.
-
Google has given Symantec an offer it can’t refuse: give a thorough accounting of its ailing certificate authority process or risk having the world’s most popular browser—Chrome—issue scary warnings when end users visit HTTPS-protected websites that use Symantec credentials.
The ultimatum, made in a blog post published Wednesday afternoon, came five weeks after Symantec fired an undisclosed number of employees caught issuing unauthorized transport layer security certificates. The mis-issued certificates made it possible for the holders to impersonate HTTPS-protected Google webpages.
-
Conjecture on cracked primes for the Diffie-Hellman asymmetric algorithm is in recent news, suggesting that several nations have broken primes in common use and can read all traffic…
-
While the software was designed to be run on an Intel NUC using Linux (or similar device), it could conceivably be run on other platforms and setups. The code is open, after all, and there for the taking. In any case, here are the specs described by the company:
-
Defence/Police/Secrecy/Aggression
-
Syrian rebels wielding US-made anti-tank missiles have become YouTube war heroes after a surge in successful attacks on forces loyal to dictator Bashar al-Assad.
Use of the BGM-71 TOW missiles – which cost $50,000 a piece – is up over 850% in October with the American-made weapons responsible for the destruction of scores of Syrian army tanks. Charles Lister, a Syrian expert at the Brookings Institute, said there had been 82 uses of the missiles as of 20 October up from 13 in September.
-
It’s been 43 years since the CIA cut off support to the Tibetan guerillas that the agency trained and armed to fight a covert war against China. Yet, a monument to the CIA’s secret war in Tibet is still standing in Pokhara, Nepal.
The former Hotel Mount Annapurna building sits on a quiet side street off the Pokhara airport. Established in 1972 with CIA funds, the hotel was meant to give former Tibetan resistance fighters based in Nepal’s nearby Mustang region a livelihood and a future as they laid down their arms and transitioned to life as refugees.
-
In particular, it is becoming more common for countries to punish people who express sensitive opinions on social media and in other forums. Perhaps the most high-profile example of the past year occurred in March, following the death of Singapore’s first Prime Minister, Lee Kuan Yew. Five days after Lee died, a sixteen-year-old named Amos Yee tweeted mild criticism of the former Prime Minister and linked to an eight-and-a-half-minute YouTube clip in which he condemned Lee as a “horrible person” whose legacy was to make people afraid to criticize him. Yee appears to have had a point, because, days later, the police arrested him, charging him with having violated Singapore’s Harassment Act, which restricts “threatening, abusive, or insulting communication.”
-
According to a Brazilian lawmaker, US Central Intelligence Agency is active in several Latin American countries, trying to destabilize the situation there.
-
The runaway military surveillance blimp that came loose from an Army base in Maryland on Wednesday dragged its torn tether through power lines in two Pennsylvania counties before crashing into the woods.
But at least no one died.
The same can’t be said of a recent accident involving a U.S. military blimp in Kabul that constantly hovers over the Afghan capital. (See The Above, a short documentary from The Intercept’s Field of Vision project, also embedded below.)
On Oct. 11, a British military helicopter was coming in for a landing at NATO headquarters, where the blimp is moored. According to an eyewitness who spoke to the BBC, the helicopter hit the tether, which then wrapped itself around the rotors. The helicopter crashed, killing five people — two U.S. service members, two British service members, and a French contract civilian — and injuring five more.
-
WESTERN NATIONS, primarily the U.S., Great Britain, Germany, and Russia, have helped increase corruption among Middle Eastern and North African states by selling them vast quantities of weapons with little oversight, according to a new report by Transparency International. The resultant corruption, the report says, has worsened the region’s many conflicts, weakened military coherency, boosted extremism, and “formed a narrative for violent extremist groups.”
-
Donald Trump has claimed many, many times—on TV, at campaign stops and at candidate debates—that he opposed the 2003 US invasion of Iraq in real time. “You know, I was the one, and I said it very strongly, and you know this, and it was reported by everybody, because unfortunately I get a disproportionate amount of publicity,” Trump told CNN‘s Chris Cuomo (10/6/15). At the September debate (9/18/15), he said he could point to “25 different stories” about him being against the war before it started.
-
A couple points before dissecting the journalistic efficacy of disseminating these vague, half-assed threats. Firstly, it’s odd that the New York Post is and continues to be the sole source of this bulletin. The FBI typically posts major threats on its website, but this one, according to the FBI press officer FAIR contacted, was “meant for law enforcement and not to be disseminated.”
-
Transparency Reporting
-
President Barack Obama found himself drawn into Hillary Clinton’s email controversy Friday as the White House acknowledged the State Department is withholding a set of messages Obama and Clinton exchanged during her four years as secretary of state.
As the State Department made public a new batch of more than 7,200 pages of Clinton’s emails, officials stressed that the White House was not asserting executive privilege over the Obama-Clinton exchanges but insisting that they be treated as presidential records, which are normally not available to the public until between five and 12 years after a president leaves office.
-
Finance
-
We all know how hard it is for folks like New York Times columnist David Brooks, living in a remote corner of Washington, to find out about changes in public policy. Therefore it wasn’t surprising to see him praise Marco Rubio, Brooks’ favored candidate for the Republican presidential nomination, for a welfare reform proposal that was put in place almost 20 years ago.
-
PR/AstroTurf/Lobbying
-
The CIA’s internal watchdog has criticized the spy agency for introducing Hollywood representatives to undercover officers and allegedly being careless in talking to them about agency secrets.
In a 20-page report prepared in 2012 and stamped “secret,” the spy agency’s Inspector General said that CIA employees who had contact with Hollywood representatives had “not always complied” with agency regulations intended to stop leaks of classified information.
The report was made public on Wednesday by Judicial Watch, a conservative group which said it obtained the document under the Freedom of Information Act.
-
If Europe is serious about regulating the car industry and protecting public health and the climate, it needs to stand up to the car lobby rather than allowing those resisting regulation to write it.
-
I am sorry to have to do this, but as a representative of the mainstream media, I hereby declare war on GOP presidential candidate Sen. Ted Cruz.
In the media’s defense, Cruz started it. Literally.
I received a fundraising email from him today that said, “I am declaring war on the liberal media.” Liberal media and mainstream media are synonymous, generally defined by Republicans as “any media outlet that presents facts that prove we’re lying.”
-
-
The Koch-backed measures to eviscerate Wisconsin’s limits on money in elections and neuter the state’s election watchdog hit a stumbling block in the state senate this week, with a handful of Republican senators expressing concern that the measures go too far.
-
Censorship
-
Last week the UK’s Cabinet Office sought silently to remove the reference to “international law” from the Ministerial Code.
The text had stated that there was an “overarching duty on ministers to comply with the law including international law and treaty obligations and to uphold the administration of justice and to protect the integrity of public life”. The new version states that there is an “overarching duty on ministers to comply with the law and to protect the integrity of public life”.
-
In debates about freedom of expression in the UK, a common refrain is ‘well, at least we’re not as bad as Over There’. Whether it’s France banning burqas, Poland prosecuting those who ‘insult Poland’, or half of Europe prosecuting Holocaust denial, we’ve usually been able to point to some more authoritarian, European neighbour to reassurre ourselves that we’re not as bad as all that. Well, it’s time we snapped out of it, and realised we’re no longer in a position to do this. The list of countries that are worse than us on free expression is rapidly diminishing.
-
A new chat tool has been launched in an effort to improve the security of online messaging.
Tor Messenger allows users to chat over the Tor (The Onion Router) network in a way which hides the location of participants.
-
China’s leaders have drafted the country’s first film law, which would ease the censorship process and be intended to boost movie production in the world’s second biggest movie market.
China’s film market is heavy regulated, but, with no clear published guidelines, filmmakers are unsure what can pass censors or not.
-
China’s heavy censorship of Hollywood films is not only affecting Chinese moviegoers, but also how American studios produce their films, and Beijing’s Internet censorship was ranked the world’s worst, according to a U.S. watchdog organization.
-
A new report co-authored by Bates Dean of Faculty Matthew Auer in this fall’s issue of the journal Index on Censorship pulls back the veil for the first time on the social media censorship surrounding Under the Dome.
-
A number of circumvention tools designed to bypass the Firewall have been shut down in the past year, including projects such as Shadowsocks, whose developer was visited by the police. Outside of China, anti-censorship activists and developers have also been hit, with groups such as GreatFire.org suffering major DDoS attacks attributed to the Chinese government. Currently, China is in the process of finalizing a new Internet security law that will bolster Internet censorship and further strengthen information control within the country.
-
While the British press were speculating as to the cause of Peng’s powdery complexion, netizens saw their photos vanish from the internet as censors stepped in to maintain the illusion of a gaffe free state visit.
The photos were taken at a banquet held by the Lord Mayor of London in Xi Jinping’s honor which took place at Guildhall, London on Wednesday. The usually rather stylish Peng was seen with powdery white smears around her forehead, nose and upper lip.
-
According to the American Library Association (ALA), there were at least 311 reported challenges in 2014, with many going unreported. Some of the books on the list may serve as a surprise: “And Tango Makes Three” by Justin Richardson and Peter Parnell, a picture book about a zookeeper’s account of two male penguins caring for a baby penguin; “The Perks of Being a Wallflower” by Stephen Chbosky, written from a teenager’s perspective and covering such topics as substance abuse and sex; “The Kite Runner” by Khaled Hosseini, which chronicles the friendship of two boys from Afghanistan, yet has violence and offensive language.
-
In an authoritarian regime, nothing gets published or broadcast without state approval. I watched the inner workings of direct government control of the press during a visit to Turkmenistan. Every magazine and newspaper was run out of the same office. Many were edited by the same people, all wearing the same lapel pins, an image of the country’s then-dictator, Sapamurat “Turkmenbashi” Niyazov.
[...]
If NPR’s “Marketplace” has ever interviewed a communist about why capitalism sucks and should be replaced, I missed it. Biased? You betcha. Always. Inevitably.
Here in the United States, censorship is usually self-directed. No one from the State Ministry of Propaganda calls The New York Times to tell them what’s fit to print. They make those decisions on their own. But those calls are informed by who those editors are — the elite schools from which they graduated (Columbia Journalism School), their class background (parents rich enough to send them to Columbia J-School), input from their friends and colleagues (other people whose parents are rich enough to send them to Columbia J-School). Who they are determines what makes it into print.
-
Some 150 film professionals and institutions from Turkey, including documentary directors, critics and festival organizers, have announced that they will not be attending the Antalya International Film Festival until the festival’s management lifts its censorship of domestically produced documentaries.
-
Mobilizing for Digital Freedom has sent an open letter to the Prime Minister’s Office of Turkey to express their concerns about the censorship and restrictions being imposed on Turkish journalists and websites, calling on the Prime Ministry to end this censorship ahead of the Nov. 1 snap election.
The letter includes the signatures of various human rights, media, and political organizations in Turkey and around the world. In the letter, Access states that they sent the letter to “request the cessation of online censorship of independent news organizations and journalists. We demand authorities refrain from imposing limitations on access to the Internet or specific online services and remind the government of its duty to protect the rights of people in Turkey to freely seek, receive, and impart information and ideas through any media and regardless of frontiers.”
-
We are writing to you before the November 1, 2015 general elections, to request the cessation of online censorship of independent news organizations and citizen journalists. We demand authorities refrain from imposing limitations on access to the Internet or specific online services and remind the government of its duty to protect the right of people in Turkey to freely seek, receive, and impart information and ideas through any media and regardless of frontiers.
-
-
The UK Prime Minister has doubled down on his Great Firewall of Cameron, which is an arrangement whereby the UK ISPs “voluntarily” agreed to block websites that had been secretly ruled to be pornographic, unless customers specifically asked them not tp.
-
The Ubud Writers and Readers Festival has cancelled events discussing the 1965 Indonesian massacres, after police threatened to revoke the festival permit.
-
Over 300 radio and TV stations in Ecuador could disappear overnight, according to a warning issued by Ecuadorian NGO Fundamedios on Wednesday, October 21.
The Agency for Regulation and Control of Telecommunications (Arcotel) is currently reviewing hundreds of network licenses, and claims that the government agency that originally issued them was “not authorized” to do so.
Arcotel’s list includes media outlets whose licenses were automatically renewed by the Telecommunications Superintendency, formerly known as Supertel, between 1995 and 1997.
-
Internet censorship will inevitably impact Malaysia’s Gross Domestic Product (GDP) and discourage businesses from operating here, the Human Rights Watch (HRW) said today.
HRW Asia Director Brad Adams added that research from China, known for its multiple bans on many popular websites like Facebook and Twitter, has shown that the move to stifle Internet freedom has affected the country’s monetary gains.
-
A top scientist with the U.S. Department of Agriculture (USDA) filed a whistleblower complaint Wednesday that accuses the agency of harassment and retaliation for his work showing harmful effects on monarch butterflies from a class of widely used insecticides know as neonicotinoids, or neonics.
[...]
Since late March, I have been subjected to a sudden but escalating pattern of impediments and disruption of my scientific work, restraints on my ability to communicate with scientific colleagues, as well as the media and a growing professional toll that is making further scientific work in ARS untenable. This abrupt onset of actions undoubtedly appears to have been prompted by the scientific activities that are supposed to be specifically safeguarded and encouraged under the USDA Scientific Integrity Policy.
-
This follows the European Parliament vote on net-neutrality regulations, which will ban the current voluntary agreement that the Government pressured Internet Service Providers into accepting, where they provide filters for the Internet and encourage customers to use them. Some of these filters are now switched on by default.
We’ve said it before, and we will keep saying it: filters are flawed. They block lots of “good” websites and let through many “bad” ones (and anyway, who gets to decide the difference?) They apply equally to your seven-year old and your 17 year-old despite their different needs. They affect many more people than just children, and most housholds switch them off, as they just get in the way.
-
Privacy
-
Edward Snowden’s efforts to inform the American public just how far the NSA tick is dug in to the American information streams revealed that while the United States, with that pesky 1st Amendment, does not yet have something like China’s “Great Firewall” actively blocking access and dissemination of information that the government doesn’t like, what the US government does have is a pervasive, never-sleeping information Panopticon where everything every American (and as much of the entire world as they can reach) does online, or with their cell phone, is saved, supposedly “just in case”, and saved forever, while also being sifted for “key words” or phrases, you know, “just in case”.
-
The future just got a bit brighter for Edward Snowden.
The European Union called on its member states to protect the former NSA contractor, recommending in a close vote Thursday that states drop charges against the fugitive whistleblower and reject U.S. extradition requests.
The 285-281 vote in the European Parliament suggested that states “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistleblower and international human rights defender.”
-
Police are to be given the power to view everyone’s entire internet history in a new surveillance bill to be published next week, according to reports.
The proposed legislation will make it a legal requirement for telecoms and internet service providers to retain all of the web browsing history for all customers for a period of 12 months, according to the Daily Telegraph.
Authorities such as the police, intelligence services and the National Crime Agency would be able to access specific web addresses people had visited, but would need approval from a judge to view the content of websites, emails and social media messages.
-
Theresa May will next week refuse to allow judges to sign off spying warrants after the government’s top lawyer warned they could paralyse the intelligence agencies.
The major reform has been called for by civil liberty campaigners and backed by a top QC’s independent report.
But The Sun can reveal that the Home Secretary has been told by the Attorney General that all judges’ spying decisions could be judicially reviewed under controversial human rights laws.
-
The director of the FBI confirmed to Congress last week that the agency flew surveillance aircraft over Ferguson, Missouri, and Baltimore during the protests following the police killings of Michael Brown and Freddie Gray. Today the ACLU is releasing FBI and FAA documents with new details about the Baltimore surveillance flights.
The new internal documents, obtained through Freedom of Information Act requests, reveal that the government was doing more than just monitoring the situation with regular cameras. The FBI was using advanced technology like infrared and night-vision cameras, and it is holding on to surveillance video it recorded from the sky.
-
Today, the 100,000th person signed our petition calling on President Obama to reject compelled backdoors in our communications.
The campaign, hosted at SaveCrypto.org, uses the White House’s We the People API to feed signatures into a petition hosted on Obama’s preferred petition platform. The campaign was the work of over 40 nonprofits and tech companies, including Access Now, Fight for the Future, OpenMedia, Mozilla, Sum of Us, Twitter, Google, and DropBox. President Obama has promised to respond to any petition that gets 100,000 signatures within 30 days.
-
Peers are preparing for a fresh showdown with the Government over plans to allow police to examine people’s online browsing histories. They are also concerned that the Government has rejected calls for judges, rather than ministers, to issue eavesdropping warrants.
The moves, which come days after the House of Lords torpedoed George Osborne’s tax credit plans, reflect growing anxiety over the impact of a wide-ranging surveillance Bill to be published next week.
-
Is there a tear in the spy fiction continuum? On Monday, the new James Bond movie Spectre premiered to the sort of five-star reviews normally reserved for subtitled documentaries about extraordinary rendition. On Wednesday the Times was given unprecedented access to GCHQ, which it ran, tie-in style, beneath the splash headline “For your eyes only”. And in a further coup for state-of-the-art news planning technology, next week sees the publication of the draft investigatory powers bill, with senior police officers demanding the right to view the web-browsing history of every internet user in the country.
I don’t know who’s running this mutually masturbatorial PR campaign – my guess is a slightly disappointing nuclear publicist in the mould of Jonathan Pryce’s media baron in Tomorrow Never Dies. But I will of course withdraw that remark if they can produce a fourth nipple or a properly shaggable concubine with a sledgehammer single entendre name. Something like Snowden Asfaka.
-
SNOOPERS’ CHARTER VERSION 2.0, otherwise known as the Investigatory Powers Bill, could allow police to view the web browsing history of everyone in Britain.
A report at The Times (paywalled) said that senior police officials have lobbied the government to force telecoms companies to retain data for 12 months that would reveal specific web addresses visited by customers.
This could mean that, under the Investigatory Powers Bill that is expected to be introduced by home secretary Theresa May next week, ISPs will be required to retain customers’ web browsing histories for a year.
Access to this data would then be granted to police, the National Crime Agency, intelligence agencies and HM Revenue and Customs, according to the report. However, approval from a judge would be required to view the content of websites, emails and social media messages.
-
Want to travel from anywhere to anywhere in the United States without being hassled by law enforcement officers? Good luck with that, citizen.
USA Today’s Brad Heath pointed out an interesting footnote in an asset forfeiture filing that made the assertion that traveling from Chicago to Los Angeles is inherently suspicious. (One presumes the opposite is also true.)
-
French socialists have, once again, betrayed liberties to strenghen surveillance! Claude Moraes’ report has been adopted today by the European Parliament. This report was condemning mass surveillance and calling for an investigation of French surveillance laws. But thanks to the pressure exerted by French Socialist MEPs on their party, any mention of investigation into French laws has been erased.
-
Federal prosecutors have said that they are moving forward in their attempt to compel Apple to unlock a seized iPhone 5S running iOS 7, even after the defendant in a felony drug case has now pleaded guilty.
The judge in the case, United States Magistrate Judge James Orenstein, said in a Friday court filing that he is confused.
The defendant, Jun Feng, whose trial was scheduled for next month, was originally charged with three counts of possessing and distributing methamphetamine.
On Thursday, Feng pleaded guilty to one count of conspiracy to distribute and possess with intent to distribute methamphetamine.
-
Edward Snowden said the United States spies on ally South Korea as part of its massive surveillance network called “Five Eyes.”
Speaking from Moscow via video, Snowden made the remarks after a screening of the 2014 documentary Citizen Four, which is to be released in Korea on Nov. 19. Snowden said South Korea is one of 38 countries under National Security Agency surveillance, a list that includes close U.S. partners France and Germany, South Korean newspaper Kyunghyang Sinmun reported.
The former NSA contractor told reporters that Seoul and Washington already share a significant amount of classified military information to track North Korea movements, but added that he didn’t see anything wrong with the sharing of information.
-
The public defender representing 41-year-old Martin told the judge he has no criminal record, he works for the National Security Agency as a mathematician and he is pursuing his Ph.D. at Cornell University in math, according to the statement. The attorney also said Martin taught math at James Madison University.
-
Adam Fuchs and his small team labored for years inside the National Security Agency on a system that would enable analysts to access vast troves of intelligence data and spot hidden patterns.
“We very much had a startup feel,” Fuchs said of the team’s office at Fort Meade with whiteboards and old furniture.
-
Experts in the cybersecurity space have called into question how effective CISA will actually be in the ongoing blitz of cyberattacks.
“In theory it is a great idea, but when we take the legislation from theory into practice it breaks into two areas. Information sharing is positive with synergistic benefits to the companies under attack. However, forcing engagement rules will slow the process down,” Shlomo Touboul, CEO of cybersecurity company Illusive Networks, said. “Cyber attackers are organized like malicious, agile start-ups that don’t require consensus for success, while government legislation and consortiums don’t move at the same speed as a cyberattackers.”
-
-
Symantec CEO Michael Brown voiced concerns about the act and says that — in its current form — it does not go far enough to protect privacy.
-
The largest tech companies in the world, from Google and Apple, to Reddit and Twitter, issued statements condemning the cyber-security bill called CISA, but to no avail. CISA (Cybersecurity Information Sharing Act of 2015) easily passed through the U.S. Senate’s vote on Tuesday, creating a new avenue for consumer data sharing that benefits anti-privacy entities like the NSA, reports The Guardian.
-
A US appeals court on Thursday refused to immediately halt the government’s bulk collection of millions of Americans’ phone records during a “transition” period to a new federal scheme that bans the controversial anti-terrorism surveillance.
-
-
-
-
-
-
-
-
-
-
A lawyer who won a federal judge’s determination that the National Security Agency’s spy-on-Americans program is “Orwellian” and likely unconstitutional is encouraging the judge to maintain his stance after a federal appeals court ruled the collection of phone metadata can continue.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Germany’s hard line on the transfer of its citizens’ personal data to the U.S. has come in for criticism from an influential European association of global digital businesses, which argues that severely limiting such transfers would cause market volatility.
Germany’s federal and regional data-protection authorities this week said they wouldn’t approve any new transfers of data to the U.S. — even for transfers based on arrangements different from the trans-Atlantic data-transfer pact knocked down by the European Union’s highest court.
The European Court of Justice this month invalidated a 15-year old agreement, known as Safe Harbor, which allowed businesses to move Europeans’ data, such as employee information, to servers in the U.S. The court ruled that Europeans’ data was insufficiently protected when transferred to the U.S., where it could be accessed by national intelligence services.
-
U.S. Commerce Secretary Penny Pritzker on Thursday pressed European Union officials to put in place a new “safe harbor” data transfer agreement to replace one struck down earlier this month by the European Court of Justice.
-
As a leader in the VPN industry, Khan warns there are mixed opinions on the subject of protection and privacy, “There are those who believe every internet user should have the right to privacy irrespective of the circumstances. On the other hand, many believe that privacy is a right but should not infer complete anonymity.”
-
CISA significantly weakens the Freedom of Information Act and puts decision-making power on FOIA requests into the hands of the Senate Intelligence Committee, the same body where current CISA legislation originated.
-
-
-
-
Under the guise of “cybersecurity,” the Senate on Tuesday passed a spying bill that “carves a giant hole in all our privacy laws and allows tech and telecom companies to hand over all sorts of private information to intelligence agencies without any court process whatsoever,” writes Trevor Timm at The Guardian.
-
-
In the UK, David Cameron’s administration has all but declared war on encryption. In the US, 63 percent of Americans approve of backdoors for the government to monitor encrypted business communications in response to a national security threat, according to a recent Vormetric survey.
But in Germany, the government openly advocates that all citizens use encryption and has even pushed forward a De-Mail service to help make that a reality.
In the country’s Digital Agenda, the German government made it clear that it aspired to be “one of the most secure digital locations” on the planet: “We support the use of more and better encryption and aim to be the world’s leading country in this area. To achieve this goal, the encryption of private communication must be adopted as standard across the board.”
It’s no secret that Germans value privacy, and Rik Turner, a British senior analyst with the IT and telecoms consulting firm Ovum, argued that the country’s embrace of encryption has geopolitical roots extending back to World War II.
-
Senators Chuck Grassley and Patrick Leahy are investigating why the Internal Revenue Service (IRS) is using a cellphone tracking system in its investigations. IRS Commissioner John Koskinen has already admitted they are using this technology but did not say in what capacity. The technology, known as cell-site simulators, send out a signal similar to a cell tower which could fool your cellphone into connecting to it. The technology does not monitor phone conversations but it does gather information (including text messages) about the device and can track the devices location as it moves.
-
Germany on Friday announced new measures to curb the activities of its foreign intelligence agency after a damning official report revealed improper collusion with the US National Security Agency.
Berlin will in future implement stricter guidelines governing cooperation between the BND foreign intelligence service and the NSA, deputy government spokeswoman Christiane Wirtz said in a statement.
-
An NSA catchword surveillance list contains numerous European and German targets, according to a German news magazine. According to its report, a German federal investigator has concluded that US spying was widespread.
-
A special investigation into the extent of mass surveillance carried out by the US National Security Agency (NSA) within Germany has unveiled a huge list of targets wanted by the US agency, including many European governments and companies.
-
The US National Security Agency (NSA) overstepped an intelligence-sharing agreement with Germany by requesting German technicians to snoop on allied governments‘ emails, a top-level inquiry has concluded.
Media obtained Friday the 300-page report by Kurt Graulich, a judge appointed to investigate how the BND, or Bundesnachrichtendienst, intercepted data streams from satellite links, fishing out messages by spotting email addresses, telephone numbers and words of interest.
Graulich is the only non-intelligence official to have been shown 40,000 of these so-called selectors which the BND challenged.
-
A German government-sanctioned special investigation has exposed a “clear breach” of intelligence-sharing agreements—including illegal surveillance of European authorities—between the U.S. National Security Agency (NSA) and its German counterpart, known as the BND.
-
When it was revealed in 2013 that the NSA and its UK equivalent, GCHQ, routinely spied on the German government, artists Mathias Jud and Christoph Wachter came up with a plan.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
In the face of Obama administration opposition, AT&T customers asked the Ninth Circuit on Wednesday to rule that a government mass surveillance program is unconstitutional.
Five people sued the National Security Agency seven years ago in Federal Court seeking a court order to dismantle a “digital dragnet” that allows the agency to tap into the fiber optic cables of U.S. telecommunications companies to intercept emails, text messages, phone records and other communications.
-
The Electronic Frontier Foundation has been busy lately, especially with all of the revelations coming from Edward Snowden. The organization has been busy taking on the NSA, but that doesn’t mean it won’t have time for other causes.
Now the EFF is taking on the California Supreme Court, urging an end to the gathering of personal prescription information by law enforcement and done without a warrant.
Prescriptions in question cover things such as pain, anxiety, attention disorder, insomnia and the like. Up until now, this was a treasure trove of information being gathered, though reasons for that netting of data are unclear.
-
Once you get in your car, get ready to be tracked, no matter how well your face is disguised. Law enforcement agencies all over the country use ALPRs (automated license plate readers) to track drivers’ locations and activities. ALPRs are cameras—mounted on police cars or placed in stationary locations like light poles—that detect when a car passes, capture a picture of that car, and record its license plate number. Accumulated location data creates a history of drivers’ movements that can provide private and intimate details on people’s lives, like where they work, where they live, where they worship, where they go throughout their day, and who they associate with. Law enforcement agencies like the NYPD have used ALPRs in exactly this way, trying to map out the entire Arab and Muslim community of New York and Newark. The Los Angeles Police Department and the LA County Sheriff’s Department scan three million plates every week.
-
John Miller reckons he can get into pretty much any safe. A court order to the owner is one option, another is a team he has with blow torches.
The reason John Miller has such a team is because he is Deputy Commissioner of the New York Police Department (NYPD) for intelligence and counter-terrorism.
Getting into safety deposit boxes and bank vaults has not been a challenge. But he says NYPD is now faced with a new problem.
-
The Pentagon’s principal spy agency is appointing a British Air Force officer as its first deputy director in charge of improving “integration” between U.S. intelligence units and spy agencies of other English-speaking countries.
U.S. intelligence agencies have long had close relationships with their British counterparts, but former and current U.S. intelligence officials said this is the first time they knew of a U.S. spy agency naming a foreigner to a top executive position.
-
-
The UK government wants backdoor access to communications for “everything people actually use”, Edward Snowden has claimed.
The former NSA contractor took to Twitter to criticise comments from Baroness Shields, the UK minister for internet safety and security, over her position on encrypted data.
Shields said the government didn’t want to introduce backdoors that allow security services to access encrypted information, but Snowden argued proposed warrants for access to data were in effect a backdoor.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The UK surveillance agency GCHQ had only a small public relations team up until June 2013. As the most secretive of the intelligence agencies, it did not really need anything more. The duties were not arduous, with inquiries from the national media invariably met with a blunt refusal to comment.
That attitude has not survived the shock of former CIA and NSA whistleblower Edward Snowden, who leaked tens of thousands of documents exposing GCHQ’s innermost secrets. Today, GCHQ’s new and expanding PR team is increasingly sophisticated, open to engagement with journalists in ways that were inconceivable before Snowden.
-
It seems that many organisations are now wanting to shift their data out of the UK and the US, thanks to concerns about surveillance and privacy.
This news comes courtesy of Artmotion (a data hosting provider), which questioned 1000 IT decision-makers in this country and the States, subsequently producing a report entitled Defending Data Privacy.
The headline figure is that 76 per cent of respondents said they would move their company’s data to another country, away from the UK or US, due to privacy concerns.
-
Over the last year, law enforcement officials around the world have been pressing hard on the notion that without a magical “backdoor” to access the content of any and all encrypted communications by ordinary people, they’ll be totally incapable of fulfilling their duties to investigate crime and protect the public. EFF and many others have pushed back—including launching a petition with our friends to SaveCrypto, which this week reached 100,000 signatures, forcing a response from President Obama.
This is in addition to multiple findings that the government’s “going dark” concern has proven completely unfounded in the past, along with former national security officers disavowing the concern all together. And given law enforcement’s continuing attacks on the public’s use of encryption, we think it’s time for a quick look at the long tradition of encryption use by some ordinary, and some not so ordinary, Americans.
-
In a return to what is being called ‘Cold War level’ tension, the New York Times reported on Sunday that Russia could be developing plans to sever key global internet communications – undersea data cables – “that carry almost all global internet communications” during possible “future wars”.
The Times report claims that there is “aggressive” movement near vital undersea cables, raising concern among several US military and intelligence officers.
-
Millennials are rather careless when it comes to using technology and sharing information online. We don’t think twice about entering personal information into an online form or telling the world where we are at any given moment and who we are with. So when we are told that the government is collecting this data, a common reaction is—Why should I care? I have nothing to hide. But how many of us understand the implications of having so much personal information up for grabs?
-
Hillary Clinton is wrong about Edward Snowden. Again.
The presidential candidate and former secretary of state insisted during the recent Democratic debate that Snowden should have remained in the United States to voice his concerns about government spying on U.S. citizens. Instead, she claimed, he “endangered U.S. secrets by fleeing to Russia.”
After accusing Snowden of stealing “very important information that has fallen into the wrong hands,” she added: “He should not be brought home without facing the music.”
Clinton should stop rooting for Snowden’s incarceration and get her facts straight.
-
New York Times reporter Eric Licthblau is returning to cover the Justice Department, a beat he left in 2009 amid threat of subpoena over a Pulitzer Prize-winning story on the National Security Agency’s warrantless wiretapping program.
Lichtblau, who was most recently covering 2016 campaign finance issues, drew the ire of the Bush administration early on for his reporting, leading to his Justice Department press credentials being temporarily revoked in 2003. Tensions only increased after The Times published Lichtblau and James Risen’s 2005 report on NSA surveillance, a story the paper initially held for 13 months under pressure from the White House.
Lichtblau told The Huffington Post that the Bush administration aggressively investigated the NSA leak and there were vague threats of subpoena in 2006 and 2007. But it wasn’t until Dec. 16, 2008 — after President Barack Obama won the presidential election but before the Bush administration left off — that Lichtblau received a letter threatening a subpoena if he didn’t provide the source information by Inauguration Day a month later. He did not comply. Still, the threat didn’t go away when Obama took office, and in early 2009, Lichtblau and Times editors decided it was best he leave the beat.
-
The tech sector is an ever-growing force in politics. No longer just a bunch of scrappy startups struggling for their place at the bargaining table, Silicon Valley’s top companies—Google, Facebook, Apple, and others—now spend millions of dollars a year lobbying for their industry’s interests.
Politicians like tech companies, not only because they paint a rosy picture of the future, but because they’re among the top job creators in the country. Plus, their idealistic, largely white-collar workforce tends to have deep pockets, turning the tech sector into a bigger source of campaign funding than other politically powerful and entrenched industries like defense and big pharma in recent years. Candidates are all too aware of this shift, so they make frequent stops at tech startups and carve out time on the campaign trail for fundraising trips to Silicon Valley.
-
Civil Rights
-
The propensity of the Saudis to use barbaric physical punishments is blithely passed off as a local tradition and custom, as if tying someone to a pole and flogging them nearly to death is somehow comparable to having a pole on a village green for dancing around on May mornings.
-
-
Internet/Net Neutrality
-
We’ve discussed many times now how zero rating, or the carrier act of letting some apps or services bypass a user’s broadband usage cap, sets a horrible, dangerous precedent. By its very nature, letting one company or service bypass usage caps immediately puts non-whitelisted services, small businesses or non profits at a disadvantage, tilting the entire playing field and distorting the entire democratic nature of the Internet. For some reason, this is a very difficult concept for some consumers to understand, so lathered up they are by the initial lure of getting something for “free.”
Of course you’re not getting something for free. Usage caps are entirely arbitrary, untethered from financial or network performance necessity. They’re an artificial construct, and allowing some services to bypass them (for a fee or otherwise) puts the ISP in the powerful position of picking winners and losers, instead of just doing its job (the delivery of bits). When it comes to net neutrality, the battlefield is no longer focused on ham-fisted throttling or blocking of services, it has shifted to more nuanced and clever abuses of gatekeeper power including interconnection, usage caps, and zero rating.
Permalink
Send this to a friend
Posted in America, Asia, Courtroom, Europe, GNU/Linux, Microsoft, Patents at 6:51 am by Dr. Roy Schestowitz
When competition is becoming lawyers’ business, generally unhinged from science and technology
Summary: A roundup of news of interest with a special focus on software patents, which severely affect one’s ability to liberally develop software and are potentially being expanded to countries outside the United States, where the Supreme Court may have already, in effect, put an end to them anyway
RETUNING to our main focus again, this post brings together all the news we were able to find about software patents towards the end of the week. It’s sub-divided into four parts.
Software Patents in India
As readers probably know by now, as we wrote half a dozen articles about this subject alone, India’s political system, which has a lot of power in the world, is surrendering to the lobbies of multinationals and offers them patents on software, effectively stomping on India’s massive population, software developers in particular. Here is a new “[t]ime-line of Software Patent Law in India” which explains the latest development as follows:
August 21, 2015: Guidelines for Examination of Computer Related Inventions released by IPO. Provide that:
– Mere use of mathematical formula in a claim to clearly specify the scope of protection being sought would not render the claim a mathematical method. Eg. Method of encoding, decoding, encryption
– While business methods are non-patentable, if the claimed matter specifies an apparatus or technical process for carrying out invention even in part, the claims to be examined as whole
– So long as a computer programme is not claimed in itself, but in a manner so as to establish industrial applicability and fulfils all other criteria of patentability, the patent should not be denied.
These loopholes are even worse than what we have in Europe (similar to New Zealand’s loopholes). If Narendra Modi and his colleagues fail to stop this, India will suffer from inflated pricing and many software houses (local) will shut down. Nothing has actually changed in India which justifies this latest change to guidelines. It probably boils down to lobbying and corruption. We know which companies want software patents in India; they’re not Indian companies but companies that exploit Indian labour for cost-savings, ensuring that India stays dependent on foreign-made systems with imperialistic back doors.
Software Patents in the US
SCOTUS, the US Supreme Court, has emerged as somewhat of a hero in the fight against software patents. We are grateful for Alice as it’s a huge game-changer. Patent lawyers are plotting to patent software nonetheless, even after the Supreme Court banned many of them. How typical. Expect a major war of words between people who actually produce software and patent lawyers whose role is parasitic at best (as well as their very rich clients and patent aggressors, i.e. companies like Microsoft).
Microsoft’s Dubious Software Patents
PatentVue, a patents glorification site which even celebrates Microsoft’s patent troll Intellectual Ventures, has just published the article “Microsoft Has a Diverse Software Focused Patent Portfolio”.
“If Ballmer was the extortion racket CEO (like the Mafia), then Nadella is the blackmail CEO. Nothing has changed.”Microsoft needs such patents so that it can attack, extort, and blackmail Android/Linux. Microsoft has been pressuring in favour software patents in Europe (often via lobbyists and proxies, e.g. Association for Competitive Technology, which keeps changing its name in order to dodge negative publicity). This year alone Microsoft attacked Samsung, Kyocera, Dell, and ASUS using software patents, forcing them — by means of patent blackmail — to put Microsoft spyware inside Android. If Ballmer was the extortion racket CEO (like the Mafia), then Nadella is the blackmail CEO. Nothing has changed.
Quoting the patent maximalists from PatentVue: “Earlier this month, Microsoft and Google announced a settlement to end nearly 20 patent-related lawsuits in the U.S. and Germany. The deal brought to close years of patent litigation surrounding various technologies, including gaming systems, mobile devices, and multimedia streaming.
“Envision IP analyzed Microsoft’s US patent portfolio to understand where the company has focused its patenting efforts, as well as to determine emerging technologies which Microsoft may be developing. At a high level, we identified 31,209 in-force, unexpired US patents owned by Microsoft and its subsidiaries. According to the company’s annual 10-K filed in July, Microsoft owns “over 57,000 US and international patents”. Also, according to Microsoft’s Patent Tracker Tool, the company owned 29,235 patents as of December 11, 2014.”
“It’s Microsoft’s utterly shameful patent assault on a Dutch company (and by extension on Linux) using discredited patents which probably never ought to have been granted in the first place.”Rather than produce software Microsoft has been busy bullying the EPO into granting it patents as soon as possible (many of these are on software), even without proper prior art search, checks for inventive step/s, suitability based on European patent scope and so on (there is a fast track now, so an even sloppier examination process is clearly inevitable). Speaking to patent maximalists with a Microsoft Windows Web site several years ago, Microsoft’s Marshall Phelps said that Microsoft would have 50,000 patents within two years. The EPO, as he explained it, “can’t distinguish between hardware and software so the patents get issued anyway” (more so if Microsoft pressures the examiners to do their job at a rush).
For those inside the EPO who don’t understand Microsoft’s insidious (uniquely so!) role in the EPO, including the pressure for a V.I.P. lane, we can humbly suggest a quick read though the TomTom case. It’s Microsoft’s utterly shameful patent assault on a Dutch company (and by extension on Linux) using discredited patents which probably never ought to have been granted in the first place.
Shooting the Mark Cuban (Messenger)
Mark Cuban, an influential person in the US, has expressed his opposition to software patents on many occasions and even put money where his mouth was (investment in Vringo notwithstanding).
“This isn’t what the patent system was supposed to be about.”Patent lawyers and nasty (at times exceptionally rude) proponents of software patents resort to an ad hominem attacks on Mark Cuban, still (ongoing smear campaign). Here is the latest such attack. Patent examiners (technical people) and software developers alike ought to know that their enemies are often patent lawyers and lobbyists, not just their main clients (cash cows), i.e. companies like Microsoft. These people have made a mockery of the patent systems with all sorts of loopholes and corporate/V.I.P. queues. This isn’t what the patent system was supposed to be about. At the beginning it was advocated to the public as the mechanism by which a lone inventor can protect himself or herself from a corporate raid on ideas. Now it’s all reversed. It’s protectionism for the world’s billionaires. Fix it or abolish it. █
“People that use Red Hat, at least with respect to our intellectual property, in a sense have an obligation to compensate us.”
–Steve Ballmer, Microsoft
Permalink
Send this to a friend
Posted in GNU/Linux, Microsoft at 5:24 am by Dr. Roy Schestowitz
“I would love to see all open source innovation happen on top of Windows.”
–Steve Ballmer, Microsoft CEO
Summary: Microsoft’s attempts to embrace, extend, extinguish GNU/Linux (convert GNU/Linux virtual instances into Windows, in the long term) an important reminder of a long-established modus operandi
JUST less than a fortnight ago we showed that the Azure 'department' at Microsoft tries poaching GNU/Linux people in events that are about the very opposite of Microsoft. Microsoft propaganda sites (treated as ‘news’ site nonetheless) are now amplifying Microsoft’s E.E.E. blog by saying: “If you’re looking for a job and possess some awesome open source chops, Microsoft might be looking for you. The Azure team is hiring, and they’ve laid out what they’re looking for over at the Microsoft Openness blog.”
“Now, Microsoft is showing its commitment to open source technologies,” Brian Fagioli wrote. No, they are just showing their E.E.E. strategy. Have they dropped the patent lawsuit? Have they stopped bullying FOSS rivals? Nope.
“Priorities may vary depending on the person, but if we want to make the world a better place we need to stop helping those whose ambitions are against public interests.”Microsoft is not about “Openness”, it’s about predation, bribes, blackmail, and mass surveillance. Days ago we mentioned how Microsoft had liaised with TASER (see the press release). Having given plenty of back doors for spooks, Microsoft now gets closer to very shady companies for income, even so-called ‘law enforcement’ (whose potentially-lethal/fatal tools are used domestically to torture dissidents like Matt DeHart in the US). Microsoft is also getting closer to the FOSS-hostile ‘security’ firm Trend Micro, based on puff pieces that accompany the press release or other puff pieces, e.g. [1, 2].
People should reject careers at Microsoft not just because it’s a proprietary software company. It’s an unethical company. Notoriously so. What comes first? Money? Freedom? Ethics? Priorities may vary depending on the person, but if we want to make the world a better place we need to stop helping those whose ambitions are against public interests. █
“Really, I’m not out to destroy Microsoft. That will just be a completely unintentional side effect.”
–Linus Torvalds
Permalink
Send this to a friend
Posted in GNU/Linux, Google, Microsoft, Mono at 4:44 am by Dr. Roy Schestowitz
Forking (to turn Android into a Microsoft common carrier), patent litigation (to threaten zero-cost advantage), and takeovers (to annihilate software freedom)
Summary: A glance at the current situation in the mobile market, where Microsoft has virtually no presence, with focus on how Microsoft is trying to intervene and wrestle with the market leader, Android
THE MOBILE market is a very lucrative one. Not only has it outgrown the desktop (and laptop) market but it also thrives — from a business point of view — because of a huge number of applications which many people pay for. There is a lot of money to be made in mobility, both on the software side and hardware side. Microsoft makes money from neither.
Microsoft tried hard to enter the mobile market but since the Windows Mobile days it barely ever succeeded. Nowadays, Microsoft’s mobile platforms continue to be called off and Microsoft tries to rebrand, most latterly with the Vista 10 label.
“There is a lot of money to be made in mobility, both on the software side and hardware side. Microsoft makes money from neither.”As many of the spendings are gradually moving away from the desktops, the revenues reported by Microsoft decline a great deal and Microsoft even reports losses. Then, financial games (or accounting tricks) are used to make up for it. According to Wall Street media, Microsoft now “raises money to repurchase stock and repay existing debt. It sold its longest portion, a 40-year bond, at a yield that was 1.8 percentage points more than comparable government debt, according to data compiled by Bloomberg. Mead Johnson Nutrition Co. and Dr Pepper Snapple Group Inc. also sold bonds today.”
This is not a sign of health; it’s rather the very opposite. Its due to a rapidly-slipping Windows dominance. Rest assured that Microsoft's force-feeding of Windows will only get worse, as the British media serves to reaffirm, as does the pseudo-British media (US company with co.uk domain and some writers who happen to be British but living abroad). Microsoft’s force-feeding of Vista 10 is painted as quite benign by Microsoft Peter, but most people find it infuriating.
“Microsoft’s force-feeding of Vista 10 is painted as quite benign by Microsoft Peter, but most people find it infuriating.”Going back to the situation in the mobile market, it could, in principle, help Microsoft find reprieve. Apple, for example, isn’t doing so badly, and that’s largely owing to its presence in the mobile market (especially where people have a lot money that they are willing to spend). Microsoft cannot sell mobile devices, hence it is unable to impose its APIs, patents, lock-in etc. on this market. This, in turn, harms Microsoft’s desktop monopoly. Based on new articles such as “Microsoft’s smartphone sales collapse and even Surface feels the pinch” or “Microsoft reports falling revenues, slowing Surface sales in latest quarter”, things won’t change for the better any time soon. To quote one report: “‘Mobile first, cloud first’ is Microsoft’s new mantra, but its fiscal first quarter financial results showed growth in only one of them. Indeed, the mobile hardware business saw its revenues fall by a huge 54% year-on-year, to $1.1bn at constant currency, a sad comedown from the glory days of Nokia, and with gross operating profit of just $100m.”
As readers of ours know by now, Microsoft is now attempting E.E.E. (embrace, extend, extinguish) of the leading mobile platform, Android, which is based on Linux. Microsoft tries to turn an open platform into its own proprietary back yard.
The Microsoft booster Tim Anderson now bashes Free software using a case of a company bought by a Microsoft proxy, Xamarin. To be fair to Anderson, maybe it was the editor’s own bait headline, “RoboVM: Open source? Sorry, it’s not working for us” (well, surely it worked well enough until Xamarin decided to take over because the project thrived and then got acquired).
Microsoft and Xamarin appear to be crushing the freedom of Android, one piece at a time, after Xamarin formally took over RoboVM [1, 2]. To quote from Anderson’s article:
The company, which was recently acquired by Xamarin, used to publish its core compiler under the GPL licence. However, users noticed that the latest published version on GitHub was 1.6, while the product itself is at 1.9.
So they turned from copyleft to proprietary. Xamarin sure is a kiss of death to software freedom. As The VAR Guy put it, “RoboVM has made its mobile app development platform closed-source. Previously, the platform was an open source product licensed under the GNU GPL.”
“Xamarin sure is a kiss of death to software freedom.”Quoting further: “So far, the company has not offered details about exactly what went wrong with its open source model. It has only made general statements about how its open code failed to attract many contributions and apparently made life easier for the company’s competitors.
“It’s also unclear to what extent RoboVM’s recent acquisition by Xamarin may have played a role in the decision to close-source the compiler. But we’re betting the timing was more than a coincidence.”
There was also a report from the Microsoft-connected ‘news’ network, 1105 Media, which contains a lot of details. Given this chronology, which probably serves to indicate time overlap between takeover negotiations and the transition to proprietary, there must have been a correlation. To quote: “The six-employee RoboVM last month announced iOS 9 support in a new release, version 1.8, the final release issued under the open source GPL license. Earlier this month, the company announced updated pricing, and shortly after came news of the Xamarin buyout. One disgruntled developer attributed these events to the company’s decision to revert to a proprietary source code model.”
Here are some other interesting parts:
“Cool,” wrote a poster identified as Carsten in reply to Müller’s message. “Now we understand. You were in talks with Xamarin for a while and one of the requirements was an updated price model (no more free stuff!) and closing down the source. Thanks for translating this process into corporate bs-bingo. Attract people for years with an open source model until you attract enough users and are acquired by the next bigger fish. Then we immediately go from open source feel good to updated pricing, closed source. Genius!”
[...]
“Complaints also abounded on a Reddit thread, and a couple Google Group discussions have sprung up to investigate interest in forking the project to keep it open source…”
Miguel de Icaza and his mates appear to love money a lot more than they love software freedom, so they squeeze this goose, RoboVM, for some golden eggs. In due course this can kill the project’s popularity. Cui bono?
“In due course this can kill the project’s popularity.”To quote someone who commented in LXer, “I have to admit, I’m a little confused. On one hand, Microsoft open-sources some components of the .NET framework, and on the other hand they closed-source a vital tool for some Android developers. I’m still convinced that Microsoft doesn’t care about FOSS or GNU/Linux, or their communities. They’re simply trying to nip a market trend in the bud… they’re competing in a manner that appears collaborative at first glance.
“I think it’s time we took a moment to re-evaluate how we look at corporate entities that offer open-source software, and if they are susceptible to buyouts, whether their projects are viable for the community to invest precious time and effort into. RoboVM would never have been such a huge loss if it had forked from the very beginning and managed by a non-corporate entity. We’ve already decided not to trust MySQL any more because of what Oracle has done to it. Why should we not apply this same decision to several other company-offered projects?”
Here is another comment:
In order to put this into perspective, it is important to keep in the forefront of our minds that we are not talking about some small company out there trying in earnest to make a go of it with a free-software project. We are talking about MICROSOFT.
Of course, we have seen this pattern repeated time and time again:
FEAR:
Oh my, a small company was taken advantage of by those evil free-software developers.
UNCERTAINTY:
Well, is this really Microsoft in action or is it Xamarin or is it RoboVM?
DOUBT:
We are all supposed to wonder now if a business model involving free-software is really a good idea… Doubt, please doubt, everyone.
blah, blah, blah… I am so bored by all these pattern repetitions.
Judging this based on the article from the Microsoft booster at The Register (especially the headline), there is indeed a lot of FUD right now, leading people to questioning of the Free software business models. Again, cui bono? █
“Gates is trying to make sure that he has a proprietary position in controlling the tools that allow you and me to access information. And that’s profitable by definition. How would you like to own the printing press?”
–PaineWebber Media Analyst Christopher Dixon
Permalink
Send this to a friend
10.30.15
Posted in Europe, Patents at 9:22 pm by Dr. Roy Schestowitz
Summary: Popular British paper covers the EPO scandals and focuses on revelations from Techrights
FOR THOSE who are not British, Private Eye, to quote Wikipedia, “has been a prominent critic and lampooner of public figures and entities that it deems guilty of any of the sins of incompetence, inefficiency, corruption, pomposity or self-importance and it has established itself as a thorn in the side of the British establishment.” It has a circulation of 228,264 people.
We were gratified to have found out that Private Eye, like Belgian TV for instance (also very mainstream, not some niche audience like a publication for technical readers or lawyers), decided to write about EPO abuses. It’s not very often that we find articles about these abuses in English, partly because EPO is centered around Holland and Germany (where the languages are different and rarely understood by British journalists).
“I’m not sure if you’ve seen this,” wrote a reader to us, “but Private Eye did a write up of the EPO showing favouritism to Microsoft in its latest issue.”
“A bit of a surprising neutral tone from the Eye and the opening line says they “are to be offered preferential treatment”. They already have been since April!”
Here is a camera copy of the article.
We have manually put that into textual form, as follows:
Patently Odious
A HANDFUL of global firms are to be offered preferential treatment by the European Patent Office (EPO) in an effort to improve the “epirit de service” on offer, according to leaked documents reported in German media.
Several of the big technology players have filed complaints against the EPO due to a backlog of hundreds of delayed applications at the office. Microsoft alone has around 600 separate applications in the pipeline and is one of the companies listed to be fast-tracked in the new pilot scheme as the EPO tries to repair its reputation with major applicants.
The EPO is run by the European Patent Organisation, an entity separate to the EU that has a wider membership including Turkey and Switzerland as well as the EU countries. The UK has been a member since 1977. the other companies being offered VIP treatment include Canon, Siemens, Fujitsu, BASF, Bayer, Ericsson, Qualcomm and Philips. The leaked documents suggest that Samsung and Huawei could join them, with other large firms being added if the pilot is successful. Thus Europe’s patent officers will be putting US or Far Eastern firms ahead of many European firms when dealing with patents.
Meanwhile, the EPO is in dispute with its own staff over various issues, including the hiring of British snooping firm Global Risk Consultants to investigate allegations of internal bullying and intimidation. There have been protests at the organisation’s offices in Munich and The Hague.
We are not sure what they mean by “Global Risk Consultants”, perhaps just another name for CRG or some kind of sub-division (or maybe an editorial error). It is described as a “British snooping firm”, which isn’t the description CRG publicly gives of itself, for obvious reasons. We wrote about CRG in some articles including the ones below. █
Permalink
Send this to a friend
Posted in Europe, Patents at 9:06 pm by Dr. Roy Schestowitz

Image courtesy: campact.de
Summary: Siegfried Broß explains why the discrediting allegations against the accused judge (a hard-working technical person) are just totally unacceptable
SUEPO has just shared this article from the Germany media. We are looking for someone who can provide an accurate translation of it. For now, however, we only have a partial translation, as published in SUEPO’s public pages. SUEPO says that it is an “interview with Siegfried Broß, a former judge of the German Constitutional Court, who considers that the European Patent Organisation suffers from structural deficiencies requiring a conference of the Ministers of its member states.” That’s an understatement; there are vastly bigger issues than structural deficiencies.
“The Unitary Patent is anything but necessary, yet the EPO actively promotes this because it’s an opportunity for more money and power. At whose expense?”SUEPO added the following excerpts from the article: “The disciplinary procedure against a member of the Boards of Appeal is unconstitutional [...] it does not respect presumption of innocence and [...] was initiated by the President of the EPO [...] The publication of discrediting allegations against the accused are totally unacceptable. [...] The Enlarged Boards of Appeal should refuse the request from the Administrative Council and stop the procedure in order to denounce the fundamental abuse. [...] An organisational separation of the Boards of Appeal from the management of the EPO should be seriously considered by the Administrative Council as it is necessary for the Unitary Patent.”
The Unitary Patent is anything but necessary, yet the EPO actively promotes this because it’s its opportunity for more money and power. At whose expense? It’s like like a continental ‘trade’ agreement, akin to TPP. It’s an organised passage of wealth from the already-impoverished (or small businesses) to few conglomerates and billionaires who tyrannically run them. By extension, in due course, this extends to foreign wealth holders and corporations. The Unitary Patent helps nobody except some bureaucrats, multi-national (or very large) corporations, and their lawyers. What’s in it for the public? Virtually nothing.
Not only SUEPO noticed the article above. One source sent us this very same interview with the former German Constitutional Court judge, quoting: “AC and Battistelli activities have no legal basis” (probably a direct quote/translation).
“You might be interested in this interview,” wrote the source, “with the former judge at the German Constitutional Court, Prof. Broß, on the EPO disciplinary case against the DG3 judge and the apparent lack of judicial independence, published yesterday on the website of the German legal magazine “Juve“.”
What we are hoping for right now is a full translation for future reference.
“So Benoît, who has been engaged in a “campaign of defamation”?”If someone could kindly provided us with a decent and complete translation promptly enough (it can be posted below in the comments section), that would be lovely. It helps reinforce what we already know — that what Benoît Battistelli does (potentially defaming board members he doesn't like, in cooperation with the media) is not just an embarrassment to the already-abusive EPO but also legally improper.
So Benoît, who has been engaged in a “campaign of defamation”? Team Battistelli, even complemented by new and professional PR placements, is going to have a difficult weekend, with even the International Labour Organisation on its tail. Historically, it has not been atypical for the criminal to accuse the accuser of being “criminal”. It’s projection and it’s the most desperate defence tactic. Team Battistelli should seriously consider stepping down (Battistelli reportedly threatened to resign), not continue this war that they simply can’t win. The longer this goes on, the more talented people this organisation will permanently lose. And that’s just bad for Europe in general. █
“The accomplice to the crime of corruption is frequently our own indifference”
–Bess Myerson
Permalink
Send this to a friend
Posted in News Roundup at 11:54 am by Dr. Roy Schestowitz

Contents
-
After 10 years of development, Melbourne open source company Cyber IT now has a fully mature prisoner interactive learning solution that is in use by four correctional institutions in the country.
Cyber IT chief executive Con Zymaris told iTWire that while the take-up so far had been only by public institutions, his company was speaking to private operators of prisons as well.
“But given the complex nature of each system, it will take at least three years to meet individual needs,” he said.
-
Nonprofit Technology Resources wants to save a pile of laptops from the scrapyard.
The digital access nonprofit is leaving its headquarters near the Community College of Philadelphia because it’s too big for their needs, and they can’t bring all the hundreds of donated laptops they’ve collected over the years, said president Ed Cummings, who also goes by “bernieS” in hacker circles. So the group is having a “Linux Laptop Pizza Party,” where they’ll be selling the laptops for as cheap as $20 and helping people install Linux on them. NTR is also looking for volunteers to help get laptops ready to use and donate.
“Lots of Linux hackers will be on hand to answer questions and help participants choose an older laptop and a Linux distro that will run well on it,” Cummings wrote in an email.
-
Desktop
-
Buying a laptop can be a confusing affair. Of course you want something powerful, but looks matter too. In other words, the entire experience makes a difference; consumers want the entire package to be well-thought out in both design and execution.
System76 now has such a laptop; the all-new Ubuntu-powered Oryx Pro is absolutely gorgeous, featuring a black aluminum chassis. Inside, however, is is equally beautiful, with Skylake processors (Core i7 only), DDR4 memory and NVIDIA graphics by default. You can even opt for a cutting-edge G-SYNC display. Yes, keeping true to its Oryx name (a type of antelope) this laptop is a Linux beast!
-
Xiaomi is best known for selling iPhone clones in the Chinese market. But now the company is getting ready to sell two models of Linux laptops.
-
Xiaomi likes to dabble in pretty much anything tech-related. This China-based smartphone OEM has released a number of interesting gadgets this year, and quite a few smartphones as well. That being said, rumors have been saying that the company is getting ready to announce a laptop for quite some time now, and Inventec has basically confirmed that fact recently. The company has said that the first Xiaomi-branded laptop will arrive early next year, which, of course, meant that we’ll see a ton more rumors along the way.
-
Google’s Chromebook Pixel is the ultimate Chromebook. It’s easily the most powerful, capable, and beautiful Chromebook. But at $999, it’s also an impractical product. Even if you’ve got the cash to burn, spending so much on a laptop that lives and dies by the web browser is a hard sell. I’ve got great news, though: other Chromebook makers are starting to approach the Pixel’s premium feel, and they’re doing it for way less money.
-
Just days after Google added “Chell” to Coreboot as the new mainboard for some forthcoming Skylake-powered Chrome OS device, Google engineers have added another new Skylake product.
-
System76, the American hardware manufacturer known for delivering the coolest and most powerful Ubuntu computers, is proud to announce the availability for a new laptop, called Oryx Pro.
-
Server
-
With last year’s September release of Oracle OpenStack for Oracle Linux, Oracle determined that only one release of a singular product was necessary, because updates every three months can be overwhelming for the market. Oracle recently announced the Kilo release, and OpenStack 2 will be based on Kilo. Wim Coekaerts, SVP of Linux and visualization at Oracle, divulged that OpenStack 2 will also be released as a Docker container for ease of access.
-
With vulnerabilities like last year’s Heartbleed and more recently VENOM, software that runs the modern Internet and cloud systems has never been more at risk and less secure. Many assume that to keep a system as secure as possible, you must eliminate any entry for an attacker. However, this is simply not the case. The key here is that IT teams really need to determine the probability that an attacker knows of an exploitable vulnerability.
Let’s examine this idea a little more closely through understanding the nature of risk as it relates to virtual and cloud environments. Once we have this framework, we’ll dive into putting this philosophy into practice.
-
Kernel Space
-
Renowned kernel maintainer Greg Kroah-Hartman revealed earlier the fact that the upcoming Linux 4.4 kernel branch would be an LTS (Long-Term Support) one, maintained for a couple of years.
-
-
I did my bachelor’s in Electronics Engineering, and embedded systems interested me a lot. Linux runs on millions of embedded devices and is a huge collaborative project — thanks to Linus Torvalds and the Linux community. I started following Linux in my college days.
When I actually started working on the Linux kernel, I saw some memory leaks in kernel code and observed that every contributor has a voice in the open source community. Therefore, I started sending small patches on LKML. I got great support from maintainers and, because of that, my interest was boosted.
-
If you’ve ever wondered what a World Without Linux would mean to you, you know it’s a ridiculous notion. That’s what the current World Without Linux video series attempts to illustrate in a fun and entertaining way that also gives gratitude to the thousands of developers and companies that support the operating system.
Included in the series are hidden easter eggs that require some level of Linux expertise to identify; though, if you’re a newbie, the clues and easter eggs are done in such a way that you can also surface the answers, putting you in the spotlight among Linux aficionados. It’s also a chance to win fun prizes – t-shirts, tattoos, pins – but perhaps most importantly, street cred among fellow Linux history buffs.
-
We’ve seen AMD already pushing open-source compiler patches for Zen and it seems they are ready to begin pushing Linux kernel changes too for their next-generation CPU architecture.
Aravind Gopalakrishnan of AMD posted two patches for Family 17h, a.k.a. Zen. The new feature patches can be found on the kernel mailing list until being mainlined. The patches are adding the CLZERO instruction so that it can be exposed via /proc/cpuinfo and adding the Scalable MCA cpuid bit.
-
Applications
-
Just a few moments ago, Kovid Goyal had the great pleasure of announcing the release and immediate availability for download of Calibre 2.42 for all supported operating systems.
-
-
Subsurface 4.5 (and Subsurface 4.5.1) just got released
-
-
Proprietary
-
Veeam’s new Backup for Linux is coming soon to deliver availability for Linux Servers in the Cloud and On Premises, and it’ll be free.
Veeam Software, the enterprise availability company, has announced Veeam Backup for Linux, a free standalone agent that delivers backup and recovery for Linux servers running in the public cloud, as well as for a few remaining physical Linux servers running on premises.
-
Instructionals/Technical
-
Games
-
Sid Meier’s Civilization: Beyond Earth is the direct sequel to the excellent Sid Meier’s Civilization V and much more than that. We now take a closer look at the Linux version ported by Aspyr Media, along with the latest DLC, Rising Tide.
-
Bundle Stars ( http://www.bundlestars.com ) has launched an all-encompassing new bundle that includes ten incredible Steam games that can played across Windows, Mac and Linux.
-
The game has been through a bit of an iffy time, but hopefully all this extra time to polish it up will be worth it. I’ve seen one of the previous Batman games like this played, and it looked genuinely good to play, so I’m hopeful this will be a good one too.
-
Batman: Arkham Knight was announced for SteamOS and Linux platforms a while back, with the promise of a fall release. As you would expect, that release of the game for these platforms has been delayed.
-
GOG have launched a bunch of new (classic/retro) Dungeons & Dragons games, and they support Linux too which is great.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Acting like QGroupBox it allows you to hide some of the more advanced options out the way till the user expands the header revealing the rest. A common web pattern, but lacking in Qt or KF5.
-
In three weeks the Plasma 5.5 freezes. So, time for a wallpaper contest. Most people love the default plasma wallpapers from Ken Vermette, but there are still some users how want to have more than one wallpaper available in plasma.
-
This KDE bug is a WONTFIX, so no hope from KDE upstream.
-
GNOME Desktop/GTK
-
-
-
-
David King, maintainer of the GNOME Logs software, an open-source project that provides users with a graphical tool for viewing systemd journal logs, has announced the release of the first milestone towards version 3.20.
-
-
New Releases
-
The Solus Project is happy to announce the availability of the first release candidate of the Solus operating system.
We would like to thank all of our community members for helping make this release possible. Together we have discovered and resolved a plethora of bugs, improved software, and ensured that the user experience under Solus is better than it has ever been before.
-
Now that the 0.24.0 version of the popular GParted partition editor software has been released, the time has come for various GParted-based Live CDs to integrate it and announce new stable builds.
-
RapidDisk is an advanced Linux RAM Disk which consists of a collection of modules and an administration tool. Features include: Dynamically allocate RAM as block device. Use them as stand alone disk drives or even map them as caching nodes to slower local disk drives.
-
The guys over Solus, the independent OS that aims to change the way you think about GNU/Linux distributions, have just announced the immediate availability for download and testing of the first RC (Release Candidate) build of the upcoming Solus 1.0 release.
-
Screenshots/Screencasts
-
Ballnux/SUSE
-
Jos Poortvliet wrote at the home of the Geeko today that some major KDE updates have landed in Tumbleweed. Leap nears ever closer to release as the wiki is populated. Elsewhere, Italo Vignoli said upcoming LibreOffice 5.1 will start twice as fast as its predecessor and Hunter Banks has solved the mystery of the vanishing Linux games on Steam.
-
Jos Poortvliet informs us that the rolling-release openSUSE Tumbleweed GNU/Linux operating system has received a new snapshot that adds some of the hottest KDE technologies available to date.
-
Slackware Family
-
The ChangeLog.txt entry of “Thu Oct 29 20:12:14 UTC 2015” counts 448lines, and a little less than half of that number consists of updates to packages; the rest is rebuilds. A massive package recompilation occured because several core libraries got updated and Pat is quite conscientious in getting all the library dependency issues resolved properly.
-
Red Hat Family
-
The open source community has centralized its support for Ceph by forming an advisory board to guide the development of the popular software-defined storage platform.
-
Instead of chasing venture capital dollars, companies competing around open source projects should instead take a more measured approach to earning customer dollars by selling enterprise value. It’s boring but, if Red Hat is any indication, it works.
-
Red Hat Inc (RHT) Discloses Insider Transaction. James M Whitehurst , CEO & President of Red Hat Inc sold 3,930 shares on Oct 19, 2015. The Insider selling transaction was disclosed on Oct 20, 2015 to the Securities and Exchange Commission. The shares were sold at $77.25 per share for a total value of $303,592.50.
-
-
Cowen and Company lowered shares of Red Hat (NYSE:RHT) from an outperform rating to a market perform rating in a research report sent to investors on Thursday morning, The Fly reports. Cowen and Company currently has $82.00 price objective on the open-source software company’s stock.
-
Fedora
-
So as we quickly approach the Fedora Workstation 23 release I been running Wayland exclusively for over a week now. Despite a few glitches it now works well enough for me to not have to switch back into the X11 session anymore.
-
Fedora will be finishing up their System V to systemd unit migration in the months ahead.
When Fedora 24 is branched from Rawhide in February, any packages still relying upon System V init scripts rather than systemd unit files will be retired. Packagers who maintain packages still needing sysVinit scripts need to apply for delays now if you can’t migrate off System V before February.
-
-
Red Hat’s Christian Schaller has written another status update concerning the state of Fedora Workstation 23 while also looking ahead to Fedora Workstation 24.
In regards to Fedora Workstation 23, Christian shares the GNOME Wayland experience is going well (he’s been running Wayland exclusively now for days), the system firmware update support is working its way out there, Google Drive support is present in GNOME’s Nautilus, ambient light sensor support is saving battery life for laptops, and XDG-APP is available in a tech preview form.
-
At tonight’s Fedora 23 Final Go/No-Go meeting number two, it was decided that several proposed blockers wouldn’t delay the release, but one other issue did. Christian Schaller wrote of some of new and improved features coming in Fedora 23 and Matt Asay today said, “Red Hat is boring.” The Ubuntu 16.04 release schedule was posted and Sam Varghese reported today on Linux distribution PrisonPC.
-
Debian Family
-
Debian has switched to FFmpeg in testing in July but the work on the package did not stop at that point. After careful testing we can now provide official packages for Jessie users through jessie-backports. See installation instructions here. FFmpeg becoming available in jessie-backports also enabled us to provide Kodi from Debian in the same official repository.
-
Derivatives
-
Choosing between Ubuntu and Debian for building your business strategy depends on your using preferences regarding the platform support, level of user control, ease of use, and some other key issues.
-
Canonical/Ubuntu
-
The desktop edition of Ubuntu 15.10 now available to download and use, it was released on October 22. This update certainly has a very fresh desktop interface and excellent developer tools.
The update also comes with a preview of the combined smartphone, tablet and desktop experience that is very popular these day in the tech community. Here are some of the things that are new in Ubuntu 15.10.
-
Midokura, the global innovator in software network virtualization, today announced the integration of its flagship Midokura Enterprise MidoNet (MEM) technology with Ubuntu OpenStack. Now, users can benefit from the power of an integrated cloud solution that combines industry-leading technology from Midokura with one of the most widely deployed commercial distributions of OpenStack.
-
-
Ubuntu 15.10 has been out for a little while now, and the reviews have started to come in from various sites. But what are the critics saying about Ubuntu 15.10? Is it worth installing on your system?
I’ve included snippets from reviews from around the web below that should give you an idea of what Ubuntu 15.10 has to offer, and if it’s worth upgrading to on your Ubuntu system.
-
-
The Ubuntu team is busy working on the OTA-8 update for mobile devices, and they are also preparing the terrain for an eventual rebase on the new Xenial Xerus.
-
Remember when we told you, guys, that Mark Shuttleworth, founder of Canonical and Ubuntu Linux, the world’s most popular free operating system, said that Snappy Ubuntu Core 16.04 LTS would support private snaps?
-
Canonical has announced the first commercial endorsement of Snappy Ubuntu Core, the transactionally updated open source OS for the cloud and embedded devices. The platform will soon power network-control hardware from several vendors.
-
-
After the short-term support release Ubuntu 15.10, the next long-term support release Ubuntu 16.04 has been opened for development. The release that is named “Xenial Xerus” has received initials packages. The final release of Ubuntu 16.04 is expected to come out in 30, April, 2016.
Ubuntu release cycle is pretty simple. There are two releases, short-term support and long-term support. The long-term support release comes after two years. LTS releases are announced with the support of five years so users can switch from one LTS to another LTS before their support of five years ends.
-
The latest Ubuntu Touch OTA-8 update is coming along, and some users are already testing the changes by using the RC proposed channel. The developers have also announced that they are targeting November 18 for the launch, but that hasn’t been decided just yet.
-
Since PM Narendra Modi announced his Make in India initiative, a large number of smartphone companies have announced their plans to manufacture their products in the country. Joining this list is Canonical, which made its debut in India in August.
Canonical is the company behind the Linux-based operating system, Ubuntu. It launched two smartphones in India earlier this year – the Aquaris E4.5 Ubuntu Edition and the Aquaris E5 Ubuntu Edition.
-
Canonical has announced that they’ll be sponsoring the upcoming TechCrunch Beijing 2015 Hackathon event that will take place next week, between November 2 and 3 in Beijing, China, held at Beijing Hi-Park.
-
-
-
Flavours and Variants
-
Roberto J. Dohnert from Black Lab Software, the company behind the well-known Black Lab Linux computer operating system, was happy to inform Softpedia earlier about the immediate availability for download and testing of Black Lab Linux 2015.10 RC4.
-
Linux Mint was mainly developed and released by Clement Lefebvre in France in 2006. Clement is one of the software developers who are notoriously reluctant and reclusive to give interviews but at the same time, he has stressed repeatedly that he has an aim to modify Ubuntu and achieve elegance to it. Practically, that meant focusing on incorporating user feedback, ease of use, and also choosing pleasant color layouts and schemes.
-
-
The subscription fee will give users unlimited, automatic cloud storage of their all of their Solu data. If a device is lost or broken, it’s OK, because everything is saved.
Solu runs on a Linux-based operating system called Solu OS.
-
Element14 on Tuesday revealed an exclusive agreement to offer OEM customers bespoke designs based on the Raspberry Pi platform.
Raspberry Pi — which has seen success in the educational and maker fields — is targeting commercial manufacturers and the Internet of Things, signing up Premier Farnell through the latter’s element14 brand to customize its boards.
-
Solu Machines will soon surpass its Kickstarter funding goal for a smartphone-like mini-PC with a Linux based, cloud oriented OS and a novel UI stack.
Kickstarter funding packages start at $388 for the Solu, which would join a fairly short list of mini-PCs with pre-installed Linux, and an even smaller group of ARM-based Linux mini-PCs. Solu is much more singular than that, however, in that it’s a battery-powered touchscreen device that can also drive a 4K display. It is not only replacing standard PC and phone paradigms with a fully cloud-based platform, but is also reinventing the user interface.
-
CompuLab’s SODIMM-style “CL-SOM-iMX6UL” COM runs Linux on an i.MX6 UltraLite SoC, and offers up to 32GB eMMC, WiFi/BT, and industrial temperature operation.
-
Axiomtek’s fanless “CAPA848” SBC runs Linux on an Intel Bay Trail Celeron N2807 processor, and offers up to 8GB of onboard RAM and -20 to 70°C operation.
-
Aaeon’s first SMARC module features quad- or dual-core Bay Trail SoCs, soldered RAM, eMMC, dual display outputs, PCIe expansion, and -40 to 80°C operation.
-
Phones
-
Tizen
-
Samsung Electronics is planning to merge its in-house developed operating system Tizen with its Internet of Things (IoT) platform IoTivity, looking to enhance the platform’s competitiveness, according to a Korean-language ChosunBiz report.
-
Samsung, the Korean giant, has launched another Tizen powered smartphone in the Indian market. The Samsung Z3 is priced at INR 8490 and will be available in India from October in Gold, Black and Silver.
-
Android
-
Earlier this week, Verizon introduced what it calls the world’s first shatterproof phone with the Droid Turbo 2. What looked like a Verizon exclusive no longer is; at least outside of the U.S. where the rest of the world will get the same phone under the Moto X Force name.
-
We also get a convenient rule of thumb now. iOS to Android installed base is now 1:4. So for every iPhone in use worldwide there now are 4 Android smartphones (this excluded tablets obviously where also Android leads but I don’t study such tiny markets as tablets or PCs, haha, mobile consumes all of my time in tech). Oh, if you want the ratio to include Windows? Then its 1:10:40 for every 1 Windows smartphone there are ten iPhones and for every 1 Windows smartphone owner you might find, there are 40 Android owners. Nobody makes Windows apps anymore…
Other than Android won these wars, iOS is a healthy niche market for wealthy customers, Tizen is hoping to pass Blackberry and Blackberry is switching to Android, there is one more obvious refrain for us all .Say it with me, readers: Windows Phone continues to remain dead (and Lumia unit shut-down watch is now to 18 months of life left) That the Q3 report. Tune in, in three months, for the Q4 and full year 2015 report.
-
-
-
-
The OnePlus X is many things. It’s a 5-inch phone that feels like it should be $500, but costs only $249. It’s a device with the aesthetic quality you might expect from an established tech brand, but it’s made by a Chinese startup less than two years old. It’s also a shameless tribute to the design of older iPhones you can only buy with an invitation.
-
BlackBerry is aiming to drum up more interest in its upcoming Android phone with a couple of new video ads.
Released Wednesday, the first ad is more technical as it spotlights a few of the key features in the Priv. The second one shoots for a kinder, gentler approach with a series of dreamlike images designed to convey the security built into the new phone.
The Priv represents a dramatic move for a company that once was king of the corporate smartphone market, but whose market share has dwindled to a fraction of a percent. It traditionally touted its BlackBerry software as the standard in security, but it’s now embracing Google’s Android software in an effort to give its customers wider access to apps and services.
-
You probably want that shiny new Nexus 6P, and I can’t blame you — it’s an amazing phone. Just don’t think you’ll be doing any repairs on it yourself.
The teardown experts at iFixit — which previously awarded the new Nexus 5X a score of 7 out of 10 — have given the Nexus 6P a score of 2. If you’re not familiar with the scoring system, low scores are bad.
-
-
-
-
-
-
It wasn’t too long ago that we put the major mobile operating systems head to head, but with big updates from both Google and Apple in the meantime, we think it’s worth another look at where they both stand. Is there a clear winner? Or are they barely distinguishable any more?
-
Google’s two operating systems will soon be one. Chrome OS is going to be combined with Android, and the combined OS could be revealed as soon as next year, according to The Wall Street Journal. The Journal reports that Chrome is essentially being folded into Android, because Android has emerged as the dominant operating system by quite a long stretch. Combining the two operating systems means setting up Android to run on laptops and desktop computers, which would require big changes, as well as supporting the Google Play Store. Chromebooks will reportedly receive a new name to reflect the new OS.
-
The new Director of Community at GitHub, Jono Bacon, delivered a keynote at All Things Open this year titled: The new era of community. His talk was largely a call action to do better job of leading, guiding, and engaging in open source communities. Here’s how.
-
The City and County of San Francisco joined Los Angeles County and Travis County, Texas, in their pursuit of open source voting systems, where the public can review the software code for evidence of ballot tampering.
The Local Agency Formation Commission (LAFCo) adopted a report titled “Study on Open Source Voting Systems” on Friday, recommending how the county can build its own in San Francisco.
-
I’m rebuilding one my home server and decided to take a look at the FreedomBox project as the base for it.
The 0.6 version was recently released and I wasn’t aware of how advanced the project is already!
They have a virtualbox image ready for some quick test. It took me longer to download it than to start using it.
-
Messaging is generally thought to be safer than PGP encrypted email because there aren’t emails sitting around for interested parties to decrypt at their leisure. Once a messaging session is over, the messages, if not logged, disappear.
-
Greenplum Database, Pivotal’s data warehouse solution, has come full circle. Once derived from the open source PostgreSQL, Greenplum is open source once again.
Greenplum could be used to yank the rug out from under the stagnant legacy players in data warehousing and analytic RDBMSes, but Oracle, Impala, and Teradata alone aren’t the competition. Rather, cloud leaders are also at risk.
-
Here’s a pet peeve of mine, because I see it time and time again: Folks work on software or projects, put in a ton of effort, and then do nothing to promote the project or release. (And, for bonus points, complain that they don’t understand why the project isn’t getting more attention!)
[...]
This isn’t necessarily intuitive for folks, I understand. But it is absolutely, vitally, necessary. Maybe, occasionally, a project is just so darn awesome that somebody happens to stumble on it via GitHub or whatever and word of mouth makes it a success – but typically, things get out into the world via consistent updates and communications to the right channels to get the word out.
-
The anonymity network Tor has long been the paranoid standard for privacy online, and the Tor Browser that runs on it remains the best way to use the web while revealing the least identifying data. Now the non-profit Tor Project has officially released another piece of software that could bring that same level of privacy to instant messaging: a seamless and simple app that both encrypts the content of IMs and also makes it very difficult for an eavesdropper to identify the person sending them.
On Thursday the Tor Project launched its first beta version of Tor Messenger, its long-in-the-works, open source instant messenger client. The app, perhaps more than any other desktop instant messaging program, is designed for both simplicity and privacy by default: It integrates the “Off-the-Record” (OTR) protocol to encrypt messages and routes them over Tor just as seamlessly as the Tor Browser does for web data. It’s also compatible with the same XMPP or “Jabber” chat protocol used by millions of Facebook and Google accounts, as well as desktop clients like Adium for Mac and Pidgin for Windows. The result is that anyone can download the software and in seconds start sending messages to their pre-existing contacts that are not only strongly encrypted, but tunneled through Tor’s maze of volunteer computers around the world to hide the sender’s IP address.
-
Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. It supports a wide variety of transport networks, including Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others; enables Off-the-Record (OTR) Messaging automatically; and has an easy-to-use graphical user interface localized into multiple languages.
-
Events
-
Yesterday I conducted my presentation about “99.999% available OpenStack Cloud – A builder’s guide”. The room was full. If you could not join, you can find the slide deck on slideshare and the video is also already available online.
-
LISA is an annual technical conference for IT operations professionals, organized by The USENIX Association. The first LISA was held back in 1986, and the event still has a reputation for delivering top-notch technical content and an exceptional hallway track. This year, Amy Rich (Mozilla Corporation) and Cory Lueninghoener (Los Alamos National Laboratory) co-chaired the conference.
-
SaaS/Big Data
-
Sets up internal platform as a service in partnership with systems integrator, NTT Data
Japanese brewer and drinks producer Kirin has built a platform as a service (Paas) using OpenStack as its private cloud platform, reducing operational IT costs by automating server test and deployment.
Kirin, which has almost 40,000 employees, is headquartered in Tokyo, and does around half of its business overseas.
-
-
-
-
-
-
-
-
-
-
-
-
-
Crunchy announces that open source software pioneer Tom Lane has joined its team of elite PostgreSQL developers.
-
-
Oracle/Java/LibreOffice
-
The Open Document Format (ODF) is one such format. ODF was specified by the Organization for the Advancement of Structured Information Standards (OASIS), an industry consortium which aims to produce standards for e-business.
Key players in OASIS include the tech giants Sun Microsystems (now part of the Oracle) and IBM. Sun has been one of the main drivers of the format as it grew out of the format used by its free OpenOffice application. In 2006 the Open Document Format was approved jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as an international standard for office software.
Sun promised not to enforce any of its patents against implementations using the OpenDocument standard, although there can be much uncertainty associated with patents.
-
The first major point release for LibreOffice, the 5.1 branch, is being worked on this weekend during the 1st Bug Hunting Session. This promises to be an important upgrade that should really make a difference.
-
Thanks to CIB, who sponsored the event with their office location, drinks and food, we again had a LibreOffice Hackfest at Hamburg on Saturday/Sunday October 24/25, and a get-together on Friday evening with the opportunity to meat also some long time colleagues from Sun and Star.
-
Education
-
The Lawrence school district is taking part in a new U.S. Department of Education campaign, #GoOpen, to encourage states, school districts and educators to use openly licensed educational materials.
The Lawrence school district is one of 10 districts nationwide that have taken up the #GoOpen challenge to replace at least one textbook with openly licensed educational resources within the next year.
-
Electronic Payments
-
On October 28th, 2015, BitGo, a digital asset security platform, is set to launch the first-of-its kind automated, open source Key Recovery Service (KRS) software for provisioning cold backup keys. BitGo has stated that this new KRS offering is part of their commitment to providing the most secure digital asset vault in the world while also ensuring wallet users maintain control of their digital assets.
-
-
-
-
-
-
-
Semi-Open Source//Openwashing
-
Video-streamer and junior filmed entertainment production house Netflix has updated its open source policies, with a notable change being a decision to release code pre-packaged in Docker’s container formats.
-
-
BSD
-
I started using OpenBSD in 1998 (version 2.3 or 2.4) to host a BBS that I was running. I switched from Slackware Linux to OpenBSD because of its focus on security and eventually stuck with it because of its simple design and ease of administration. The ports system was a big draw for me as well.
-
I’m currently self-employed, with a focus on open source development and consulting for companies interacting with open source projects.
Besides OpenBSD, I have been contributing to Apache Subversion since 2007. One of my main jobs is to provide support, workshops, and consulting for Subversion, plus fixing bugs and working on new features. I am somewhat involved in the Apache Software Foundation as a whole, but at this point in time my contributions there are more symbolic in nature, mostly because of lack of time and focus.
-
FSF/FSFE/GNU/SFLC
-
On my 21st birthday in 1998, I received a phone call from Richard Stallman, founder of the GNU Project and Free Software Foundation (FSF), to tell me the root password of the GNU Project’s web server.
I’d learned about something called UNIX a great many years prior, and in 1993, on a two-week language course in Swansea, Wales, I managed to up my storage quota on the university’s Pyramid system from 2MB to 4MB, enough to download Slackware from the University of Vaasa’s FTP server and bring it back home with me.
-
Licensing
-
The lawsuit continues to progress. VMware has filed a statement of defense, in which they assert arguments for the dismissal of the action. Christoph, with the assistance of his lawyer Till Jaeger, has filed his response to these arguments. Unfortunately, VMware has explicitly asked for the filings not to be published and, accordingly, Conservancy has not been able to review either document. With the guidance of counsel, Christoph was able to provide Conservancy with a high-level summary of the filings from which we are able to provide this update. VMware’s statement of defense primarily focuses on two issues. First, VMware questions Christoph’s copyright interest in the Linux kernel and his right to bring this action. Second, VMware claims vmklinux is an “interoperability module” which communicates through a stable interface called VMK API.
-
Software Freedom Conservancy has spat out a “high level” update on the GPL enforcement case it is backing against VMware, ahead of an expected first hearing next year.
SFC said that VMware had filed its defence against the suit brought by German kernel developer Christoph Hellwig back in March, which alleges VMware’s proprietary ESXi hypervisor products use portions of the code that Hellwig wrote for the Linux kernel, in violation of the terms of version 2 of the GPL.
-
Openness/Sharing
-
“Creating an open governance process requires a larger commitment and a more engaged dialogue between the government, civil society, citizens and the private sector. Having an efficient administration can drive a better communication between public institutions, civil servants, and other stakeholders,” according to an evaluation report published by the Romanian government, which will form the basis of its second OGP Action Plan (2014-2016).
-
I’m fascinated by what the open community takes for granted. Outside FOSS, free and open source software, the idea that work needs to have a solid foundation before being released is deeply seeded. But, in open source communities we say, “Release early, release often,” a phrase I regularly substitute now for: “Throw it into the world as soon as you can formulate words around it.” Heck, even if you aren’t coherent, someone might still understand you. Go ahead and share!
-
Open Hardware
-
Our next choice had social repercussions. When you adopt a CPU/operating-system combination, you also adopt its developers. We decided against Google Android because it’s optimized for phones and tablets, its graphical display typically shows only one application at a time, and its touch-screen paradigm is too imprecise for computer-aided design work. Therefore, in order to create a system that our target market of developers and creators could use, we decided to run on our ARM chip a version of Linux called GNU/Linux. GNU, which authored both the OS libraries and the license that the Linux kernel uses, is a coder’s organization, right down to the self-referential acronym itself (it stands for “Gnu’s Not Unix”).
-
Andrew “bunnie” Huang & Sean Cross tell, in great detail, how they created the Novena laptop, using solely open source software and hardware. For anyone familiar with or even interested in how computers really work, it’s quite a gripping tale. I believe their work could have lasting beneficial effects on the hobbyist computing and open source communities.
-
The open-source robotic arm called Dobot that can be used by everyday consumers and experience makers alike has now raised over $430,000 on crowdfunding website, Kickstarter, with funds still rising.
-
Programming
-
Python is everywhere. These days, it seems it powers everything from major websites to desktop utilities to enterprise software. Python has been used to write all, or parts of, popular software projects like dnf/yum, OpenStack, OpenShot, Blender, Calibre, and even the original BitTorrent client.
-
While DZone was at JavaOne 2015 this week, Azul Systems released an early access version of Zulu, which is a certified OpenJDK build / JVM, that supports the latest JDK 9 features.
-
Hardware
-
ORACLE HAS STARTED SHIPPING systems based on its latest Sparc M7 processor, which the firm said will go a long way to solving the world’s online security problems by building protection into the silicon.
The Sparc M7 chip was originally unveiled at last year’s Openworld show in San Francisco, and was touted at the time as a Heartbleed-prevention tool.
A year on, and Oracle announced the Oracle SuperCluster M7, along with Sparc T7 and M7 servers, at the show. The servers are all based on the 32-core, 256-thread M7 microprocessor, which offers Security in Silicon for better intrusion protection and encryption, and SQL in Silicon for improved database efficiency.
-
Security
-
Back in summer I have read a new book published by one of the core Intel architects about the Management Engine (ME). I didn’t quite like what I read there. In fact I even found this a bit depressing, even though Intel ME wasn’t particular news to me as we, at the ITL, have already studied this topic quite in-depth, so to say, back in 2008… But, as you can see in the linked article, I believed we could use VT-d to protect the host OS from the potentially malicious ME-based rootkits (which we demonstrated back then).
-
Researchers at Symantec say they have discovered a form of malware that attacks MySQL on Windows servers, using them to launch distributed denial of service attacks.
-
Following our notification, Symantec published a report in response to our inquiries and disclosed that 23 test certificates had been issued without the domain owner’s knowledge covering five organizations, including Google and Opera.
However, we were still able to find several more questionable certificates using only the Certificate Transparency logs and a few minutes of work. We shared these results with other root store operators on October 6th, to allow them to independently assess and verify our research.
Symantec performed another audit and, on October 12th, announced that they had found an additional 164 certificates over 76 domains and 2,458 certificates issued for domains that were never registered.
-
COOKING AND HEATING ENABLER British Gas has confessed to a data loss that has seen the details of many of its customers released online.
British Gas has written to affected customers to tell them that, while it may not have been hacked, the effect is the same. It has somehow managed to leak information that has found its way onto the internet and in the direction of ne-er-do-wells.
Reports have it that 2,399 email addresses and passwords have been leaked online. A package of emails and passwords is a pretty good haul for an online exploiter, particularly if the same details are used for access on other sites and services.
-
Defence/Police/Secrecy/Aggression
-
Some brave television figures refuse to go along with the established “norm”. It was Channel 4 news presenter Jon Snow who coined the phrase “poppy fascism” a few years ago when he was publicly berated by BBC journalists and other media outlets for refusing to don the flower during his nightly broadcasts. It remains to be seen if the Channel 4 news anchor will this year cave to public pressure – a pressure which seems to be growing every year.
-
EVEN DEATH WON’T GET YOU OFF the U.S. terrorism watchlist. As of last July, over 3,500 suspected terrorists included in the U.S. government’s central terror database were “confirmed dead” and another 13,000 were “reportedly dead,” yet many of their names continued to be actively monitored in databases like the no-fly list, according to an intelligence assessment prepared by the Department of Homeland Security in August of this year.
-
The UN General Assembly on Tuesday called for an end to the decades-long US embargo on Cuba in a resolution adopted by a near-unanimous vote, three months after US-Cuba diplomatic ties were restored.
The United States and Israel voted against the non-binding resolution, but a resounding 191 countries supported the measure in the 193-member assembly, the highest number ever.
-
But we must face reality: The occupation has become permanent. Nearly half a century after the Six-Day War, Israel is settling into the apartheid-like regime against which many of its former leaders warned. The settler population in the West Bank has grown 30-fold, from about 12,000 in 1980 to 389,000 today. The West Bank is increasingly treated as part of Israel, with the green line demarcating the occupied territories erased from many maps. Israeli President Reuven Rivlin declared recently that control over the West Bank is “not a matter of political debate. It is a basic fact of modern Zionism.”
-
Any day now, our Saudi Arabian allies may behead and crucify a young man named Ali al-Nimr.
-
Saudi Arabia’s ambassador to the UN has admitted a “mistake” was made when Riyadh-led coalition jets bombed a Doctors Without Borders hospital in Yemen, but says the medical charity provided incorrect geographic coordinates for the facility, leading to the incident.
MSF, as the organization is known by its French acronym, reported on Tuesday that a hospital they supported in Haydan district in the northern Saada province was hit by several airstrikes starting at around 10:30PM local time on Monday. Initial blasts occurred outside the building, and all staff and patients were able to flee before it was destroyed by subsequent airstrikes. One MSF employee suffered minor injuries.
In a statement, MSF said that the hospital’s GPS coordinates “were shared with Coalition forces. They are sent every week to the Coalition operations room, and the last time they were shared was on October 24.” The organization also said that it’s logo had been painted on the facility’s roof and was visible from the air.
-
Airstrikes carried out late last night by the Saudi-led coalition in northern Yemen destroyed a hospital supported by the international medical humanitarian organization Doctors Without Borders/Médecins Sans Frontières (MSF), MSF announced today.
The small hospital, in the Haydan District in Saada Province, was hit by several airstrikes beginning at 10:30 p.m. last night. Hospital staff and two patients managed to escape before subsequent airstrikes occurred over a two-hour period. One staff member was slightly injured while escaping. With the hospital destroyed, at least 200,000 people now have no access to lifesaving medical care.
-
Lebanese security forces are interrogating a Saudi prince on charges of carrying drugs on his private plane after they allegedly retrieved 2 tons of narcotics from the aircraft, local media reported.
Abd al-Muhsen bin Walid bin Abd al-Aziz Al Saud was detained on Monday in Beirut’s Rafik Hariri International Airport.
The prince was about to conduct a flight on his private plane to Saudi Arabia.
-
Saudi prince Abdel Mohsen bin Walid bin Abdulaziz was caught in an airport in Lebanon on Monday with over two tons of drugs.
Lebanese security found 40 suitcases full of more than 4,000 pounds of amphetamine pills and cocaine on the prince’s private plane, which was on its way to Saudi capital city Riyadh. A security source told AFP that this was the largest smuggling operation ever foiled by Beirut International Airport security.
While this may seem like just another case of rich and powerful aristocrats going wild, the implications of this drug bust are much more insidious: In Saudi Arabia, people are executed over drugs. And not rarely — several times a month, on average.
-
Hiramine’s NGO, Humanitarian International Services Group, or HISG, won special praise from the president for having demonstrated how a private charity could step in quickly in response to a crisis. “In the aftermath of Hurricane Katrina,” read Hiramine’s citation, “HISG’s team launched a private sector operation center in Houston that mobilized over 1,500 volunteers into the disaster zone within one month after the hurricane.”
But as the evangelical Christian Hiramine crossed the stage to shake hands with President Bush and receive his award, he was hiding a key fact from those in attendance: He was a Pentagon spy whose NGO was funded through a highly classified Defense Department program.
-
Transparency Reporting
-
This means that on the OBL raid, Donilon excluded the Attorney General in the same way Dick Cheney excluded John Ashcroft from key information about torture and wiretapping. I find that interesting enough, given hints that Holder raised concerns about the legal authority to kill Anwar al-Awlaki in the weeks after we missed him on December 24, 2009, which led to OLC writing two crappy memos authorizing that killing in ways that have never been all that convincing.
But Savage provides no explanation for why Krass was excluded, which is particularly interesting given that the month after OBL’s killing, Savage revealed that President Obama had blown off Krass’ advice on Libya (as I read it, the decision to blow off her advice would have happened after the OBL killing, though I am not certain on that point). The silence about Krass is also remarkable given that she was looped in on the initial Libya decision — and asked to write a really bizarre memo memorializing advice purportedly given after the fact.
-
Highly sensitive personal details about the head of the CIA from his hacked emails have been leaked, including his phone number, home address, passport number and how he once consulted a mental health expert.
The emails, obtained by WikiLeaks, show that John Brennan had concerns about the US spying on its own citizens and called for ‘firm criteria’, warning that the activities ‘must be consistent with our laws and reflect the democratic principles and values of our Nation’.
The files also show how a security firm he established was accused of ‘disingenuous’ behavior by the CIA in its bid to win a government contract for a terrorist watch list.
In a further memo released by the anti-secrecy agency, Brennan takes a swipe at former President George W. Bush for his ‘gratuitous’ labeling of Iran as part of a worldwide ‘axis of evil’.
-
On Twitter, Mr. Snowden, the former National Security Agency contractor who leaked millions of documents about electronic surveillance by the United States government, called the vote a “game-changer.” But the resolution has no legal force and limited practical effect for Mr. Snowden, who is living in Russia on a three-year residency permit.
-
The EU Parliament has just approved a measure (by a narrow 285 to 281 vote) telling EU member states to “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistle-blower and international human rights defender.” That’s pretty huge. Of course, as a resolution, it’s more symbolic than actually meaningful, because the member states may not follow through on the request. But it is an important step in the right direction.
At the same time, the EU Parliament reviewed some other issues concerning mass surveillance, including the whole EU-US safe harbor setup. As we noted, the EU Court of Justice recently tossed out that agreement, which is really creating a huge mess for the internet right now. The EU Parliament “welcomed” the ruling, and pushed for alternatives to the safe harbor agreement. As we noted, the safe harbor agreement was a bit of a mess, but it’s important to have something in place to allow the internet to function — and the real problem was the NSA surveillance program.
-
The European Parliament voted on Thursday to call on its member states to welcome “human rights defender” Edward Snowden to Europe with open arms.
The member states should “drop any criminal charges against Edwards Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as a whistle-blower and international human rights defender,” read the resolution.
-
Environment/Energy/Wildlife
-
A predictive population model suggests that lion populations in West, Central, and East Africa are likely to be halved in the next 20 years.
-
National park officials say 22 more elephants have been killed by cyanide in Zimbabwe, adding to a worrying poaching trend.
A source with knowledge of an investigation of the killings says 78 elephants have been poisoned in the country this month.
The elephants were found in the remote Sinamatella area of Hwange National Park on Monday, Zimbabwe national park officials say. The park received international attention in July as the site where American dentist Walter Palmer shot and killed Cecil the lion.
-
Nobel Prize-winning economist and Columbia University professor Joseph Stiglitz warns about the dangers of the TPP, the Trans-Pacific Partnership. “We know we’re going to need regulations to restrict the emissions of carbon,” Stiglitz said. “But under these provisions, corporations can sue the government, including the American government, by the way, so it’s all the governments in the TPP can be sued for the loss of profits as a result of the regulations that restrict their ability to emit carbon emissions that lead to global warming.”
-
There is nothing as awe-inspiring as watching the brutal power of a lion capturing its prey. At close range, their throaty roars thump through your body, raising a cold sweat triggered by the fear of what these animals are capable of doing now, and what they once did to our ancestors. They are the most majestic animals left on our planet, and yet we are currently faced with the very real possibility that they will be functionally extinct within our lifetime.
In fact, lion populations throughout much of Africa are heading towards extinction more rapidly than previously thought, according to new research by Oxford biologist Hans Bauer and colleagues, published in PNAS. The team looked at 47 sites with credible and repeated lion surveys since 1990, and found they were declining everywhere in Africa aside from four countries: Botswana, Namibia, South Africa and Zimbabwe.
-
I’ve often wondered how the media would respond when eco-apocalypse struck. I pictured the news programmes producing brief, sensational reports, while failing to explain why it was happening or how it might be stopped. Then they would ask their financial correspondents how the disaster affected share prices, before turning to the sport. As you can probably tell, I don’t have an ocean of faith in the industry for which I work. What I did not expect was that they would ignore it.
[...]
At the climate summit in Paris in December the media, trapped within the intergovernmental bubble of abstract diplomacy and manufactured drama, will cover the negotiations almost without reference to what is happening elsewhere. The talks will be removed to a realm with which we have no moral contact. And, when the circus moves on, the silence will resume. Is there any other industry that serves its customers so badly?
-
IT’S the biggest environmental disaster in our region and Australia cannot avoid being affected by its enormous reach.
A sickening haze that has spread across southeast Asia is being described as a “crime against humanity” and has NASA warning of a disaster of its kind never before seen.
For more than two months, raging forest fires on the Indonesian island of Sumatra have released vast plumes of smoke that has spread across neighbouring countries including Malaysia, Singapore, southern Thailand, Vietnam, Cambodia and the Philippines.
-
PR/AstroTurf/Lobbying
-
Censorship
-
Axel Springer’s war with ad-blocking firm Eyeo’s Adblock Plus continues to rage.
According to AdBlock Plus, the German publisher has tried to quash conversations about how to get around the wall that Axel Springer erected to keep ad block users from accessing its tabloid site Bild. Adblock Plus is claiming Axel Springer’s approach smacks of censorship.
-
Worst of all, the march took place in a country that is one of the most hostile to free speech rights in the West, as France quickly demonstrated in the days after the march by rounding up and prosecuting Muslims and other anti-Israel activists for the political views they expressed. A great, best-selling book by French philosopher Emmanuel Todd released this year argues that these “free speech” marches were a “sham,” driven by many political sentiments — nativism, nationalism, anti-Muslim bigotry — that had nothing to do with free speech.
-
ORG has responded to the Prime Minister’s calls for legislation that will implement filters for adult content. This follows the European’s Parliament vote for net neutrality regulations, which will ban the current voluntary agreement made between ISPs and the government to provide filters, which some providers switch on by default.
-
The EU’s new net neutrality “protections” are largely deserving of the scare quotes, what with their myriad loopholes and built-in provisions that allow ISPs to throttle/manipulate traffic to prevent “congestion” — something that has yet to be the actual source of any ISP’s “traffic $haping” efforts.
But what the rules did do is throw off David Cameron’s ongoing plans for a porn-free UK. And, of course — considering Cameron has no idea how ISP-level filters work, much less aware of numerous logical fallacies “supporting” his claims this will actually prevent porn consumption by minors — the Prime Minister was the last to know.
-
The Serbian government’s use of “soft” censorship remains a threat to press freedom, a report issued on Thursday by the World Association of Newspapers and News Publishers, WAN-IFRA, and the Center for International Media Assistance, CIMA, in Washington says.
The report, “Media reform stalled in the slow lane: Soft censorship in Serbia”, was published with the support of the Open Society Foundation while BIRN Serbia was a research partner.
The report noted that Serbia lacks a functional, vital and competitive media market.
“Taxpayers’ funds are now one of the most important sources for survival of media outlets. However, public monies are deployed with partisan intent,” the report said.
-
The censorship of the Ubud Writers and Readers Festival has spread from sessions discussing the 1965 anti-communist massacres to other politically sensitive topics on the resort island.
A panel has now been scratched on the controversial reclamation of land in Benoa Bay in southern Bali for a massive luxury development that critics say will devastate the environment.
-
Last week, the UWRF organizer, however, was forced to drop all sessions that were to look at the massacre of communists in Indonesia in the 1960s following pressure from local authorities.
-
Panel sessions and a film on the 1965 anti-communist massacres in Indonesia were prohibited at an international literary festival in Bali due to a 1966 government regulation banning communism and Marxism-Leninism, according to a Balinese police chief.
Gianyar police chief Farman told Fairfax Media there was also a 1999 criminal code which made the spreading of communism, Marxism and Leninism in public a punishable offence with a maximum sentence of 12 years’ jail.
-
The Ubud Writers and Readers Festival (UWRF) has cancelled events discussing the 1965 Indonesian massacres, after police threatened to revoke the festival permit.
I research and write about the massacres’ impact on Indonesia. I was to moderate one of the five events that were dropped from this week’s festival.
-
A week ago I received a message from Janet DeNeefe, director of the Ubud Writers and Readers Festival.
“I just wanted to let you know that the UWRF is being censored this year, and we have been told to remove all programs to do with ‘1965’,” she wrote. “Or else next year they will not give us a permit to hold the festival.”
-
Governments around the world are expanding censorship and surveillance of the internet as overall online freedom declined for the fifth consecutive year, according to a report from a group that tracks democracy and human rights.
Nearly half of 65 countries examined have seen online freedom weaken since June 2014, Freedom House said in an annual survey released on Wednesday.
One of the steepest declines occurred in France, which passed a law that many observers likened to the US Patriot Act in the wake of the Charlie Hebdo terrorist attacks earlier this year, according to the report.
Ukraine, mired in a territorial conflict with Russia, and Libya also experienced sharp drops.
The report highlighted China as the country with the most severe restrictions on internet freedom, followed by Syria and Iran.
Sri Lanka and Zambia, both of which recently underwent changes in government leadership, were credited with making the biggest improvements in overall online freedom.
-
The annual report by non-government watchdog Freedom House said the setbacks were especially noticeable in the Middle East, reversing gains seen in the Arab Spring.
Freedom House found declines in online freedom of expression in 32 of the 65 countries assessed since June 2014, with “notable declines” in Libya, France and Ukraine.
The researchers found 61 percent of the world’s population lives in countries where criticism of the government, military or ruling family has been subject to censorship.
And 58 percent live in countries where bloggers or others were jailed for sharing content online on political, social and religious issues, according to the “Freedom on the Net 2015″ report.
-
Prime Minister David Cameron has promised to counter a European Union ruling that branded his internet porn filters illegal. He reiterated his stance that children must be protected from adult material online.
The EU ruling states that information must be allowed to travel through the internet “without discrimination, restriction or interference.” The measures are intended to allow data companies to reduce roaming charges.
The British government says it will protect internet companies from the EU laws and make it a legal right for the firms to use porn filters.
Speaking in the House of Commons on Wednesday, Cameron said parents should be able to control the materials their children are exposed to.
-
Prime Minister David Cameron confirmed today that the Tory government planned to legislate on smut filters, following yesterday’s net neutrality ruling in the European Union.
Cameron told MPs during PMQs that he had “spluttered over my cornflakes” when he read this morning that the EU measures would fail to think of the children by protecting their prying eyes from “indecent images”.
“I think it’s absolutely vitally important that we enable parents to have that protection for their children from this material on the internet,” he told the Palace of Westminster.
“We worked so hard to put in place these filters,” the PM added. “But I can reassure her [Conservative MP for Derby North, Amanda Solloway] because we actually secured an opt-out yesterday so we can keep our family-friendly filters to protect children.”
-
This rather shows the bias inherent in the Independent’s editorial style, for these filters applied not just to porn sites, but to websites that dealt with topics and lifestyles that somehow made David Cameron and his government uncomfortable — such as those dealing with the Occult.
-
Sometimes politicians make me mad enough to scream at my computer. Today is a great example of that as the British Prime Minister, David Cameron, has restated his claim that he will block internet-based porn and adult content to “protect children”.
But this isn’t about protecting children at all, it’s about controlling the internet and stopping British people’s freedom to browse as they wish without having to subject themselves to a registration process in order to watch adult material. The whole idea of blocking porn to protect “children” is a fiction, you can’t protect children from porn – it’s impossible. And anyway “children” don’t watch porn, young adults do. Getting the government to understand the difference between a child and an adolescent is impossible though.
-
The future of information suppression may be much harder to detect—and thus enormously more difficult to counteract. The digital censors of tomorrow will not require intimidation or force; instead, they can exploit the dark art of “shadow-censorship.”
Shadow-censorship is a way to control information by secretly limiting or obscuring the ways that people can access it. Rather than outright banning or removing problematic communications, shadow-censors can instead wall off social-media posts or users in inaccessible obscurity without the target’s knowledge. To an individual user, it just looks like no one is interested in his or her content. But behind the scenes, sharing algorithms are being covertly manipulated so that it’s extremely difficult for other users to view the blacklisted information.
In theory, there are a variety of ways that shadow-censorship could be applied on platforms like Twitter, Facebook, and YouTube. Users may be automatically unsubscribed from blacklisted feeds without notice. Social media analytics can be selectively edited after the fact to make some posts look more or less popular than they really were. Individual posts or users can be flagged so that they are shown in as few feeds as possible by default. Or provocative content that originally escaped selective filtering may be memory-holed after the fact, retrievable only by the eagle-eyed few who notice and care to draw attention to such curious antics.
-
In a surprising development this past week, Russia has notified all scientists at Moscow State University (MSU) that they must submit their research papers to the state security service before they will be permitted to publish them. Nature News reports that Russia is imposing this policy on universities and research institutes throughout the country.
-
The history of censorship in Russian media runs for pages and pages. There’s little point dealing with Soviet censorship here, but the 1990s, which many people remember as a time when press freedom prevailed, are different. Journalists of the time reminisce about how they used to push bureaucrats’ doors open, the public officials scared of them: bureaucrats and politicians had never been so vulnerable.
The media, however, was another part of the country’s terrain of political conflict—just as articles could be pulled, so could journalists. Take Dmitry Kholodov, for instance, a journalist for Moskovsky komsomolets who died as he collected a booby-trapped suitcase in 1994. Ministry of Defence officials weren’t pleased with Kholodov’s coverage of army corruption and, having asked their subordinates to ‘shut him up’, their subordinates took the order literally.
-
South Korean journalists released a statement on Tuesday urging that the Ministry of Unification (MoU) demand that North Korea not interfere in their reporting during family reunions.
The journalists from 38 media outlets criticized North Korea for interfering in their reporting during the family reunions that finished Monday at Mount Kumgang, North Korea. North Korea examined the journalists’ computers and USB drives, they said, returning the devices a day later despite the journalists’ complaints.
-
Zimbabwe should abolish the censorship board and other bodies censoring or regulating artistic expressions in order to comply with Zimbabwe’s new constitution. Instead a new classification board should be mandated to issue age recommendations to protect children. This was a recommendation made by arts practitioners, artists, journalists and human rights lawyers at a workshop on artistic freedom, held on 23-24 October 2015 in Harare, Zimbabwe.
[...]
It says the effects of art censorship or unjustified restrictions of the right to freedom of artistic expression and creativity deprive artists of means of expression and livelihood and generate important cultural, social and economic losses to society.
-
Part of a major international exhibition planned for Melbourne has been thrown into doubt after toymaker, Lego, refused to supply building blocks for the project.
External Link: Ai Weiwei instagram
Chinese dissident artist Ai Weiwei said Lego refused his studio’s request for a bulk order of Lego to create an artwork to be shown at the National Gallery of Victoria.
-
Dissident Chinese artist Ai Weiwei says Lego refused to sell him toy bricks for his artwork, calling it an “an act of censorship and discrimination.”
-
An Australian gallery has set up a collection point for Lego for a work by artist Ai Weiwei, after the Danish company refused a bulk order from him.
The National Gallery of Victoria (NGV) wants Australians to donate the toy bricks by pouring them through the sunroof of a car parked at the gallery.
-
Chinese artist Ai Weiwei has begun gathering the building blocks for his next artwork, asking fans from all over the world to donate their Lego pieces for use in his next project.
-
There has been a recent development concerning the removal of critical channels from TV streaming platforms in which newly emerged video footage provides evidence that such movements are politically motivated, as the chief advisor of President Recep Tayyip Erdoğan is featured urging a minister to drop critical TV channels from the state-owned Turkish Satellite Communications Company (Türksat) — a move that has attracted widespread criticism.
-
The United States has reiterated its concern over the hostile takeover of five media outlets in Turkey, saying that Turkey is not keeping with its own democratic values.
-
Cops sprayed water cannon to disperse crowds in front of the offices of Kanalturk and Bugun TV in Istanbul, a live broadcast on Bugun’s website showed.
The media groups are owned by Koza Ipek Holding, which has links to Islamic preacher Fethullah Gulen. The authorities on Tuesday took over 22 companies owned by Koza Ipek in an investigation of alleged financial irregularities, including whether it funded Gulen. The company denies wrongdoing.
-
-
Vile comments and phenomena such as trolling are simply a small part of the avalanche of electronic detritus that we have to learn to cope with as the internet revolution progresses. Dubious and unethical practices have proliferated and yet, the only sustained attempt to moderate the internet, in China, is notable for its failures as Chinese internet users have quickly learnt how to dodge censors and spread news and opinions in flash comments reaching hundreds of millions.
Racist and violent comments can easily be identified, and then simply ignored. Many websites urge users “not to feed the trolls”, even with traffic signs. In Brazil, trolls are called pombos enxadristas (chess player pigeons), and the advice is not to play them, since all they can do is defecate on the board and knock over the pieces.
-
Malaysian cartoonist Zulkiflee Anwar Haque, aka Zunar, is facing nine simultaneous charges under the country’s Sedition Act and will appear in court on 6 November. He could be sentenced to 43 years in prison for drawing cartoons that mock Malaysia’s corrupt government officials.
Ahead of his court appearance, Zunar is coming to the UK to display a small selection of his work as part of the permanent exhibition at the Cartoon Museum and several other events.
-
Repressive regimes have sought to quell the speech of dissidents throughout history, and long before the advent of the Internet. It therefore is not entirely surprising that attempted censorship by governments will continue in the online world. But, hopefully, the Internet will help to foster free speech and communication, and will not be a means of governmental surveillance on citizens.
-
Filmmaker Quentin Tarantino exercised his First Amendment rights by speaking at a New York City protest against police brutality. At the October 24 event, he denounced “police terror,” and reportedly said this: “I have to call a murder a murder, and I have to call the murderers the murderers.”
In response, Patrick Lynch, the head of New York’s Patrolmen’s Benevolent Association union, called Tarantino a “cop-hater” and said that it was “time for a boycott of Quentin Tarantino’s films.” A union affiliated with the Los Angeles Police Department has reportedly endorsed the boycott as well.
-
The hullabaloo around the Thai film Arpat, which features a misbehaving young monk, is the latest example of problems caused by what some people in the film industry perceive as flaws in the Film and Video Act 2008.
Some of the controversial aspects of the law, which was passed by the coup-appointed National Legislative Assembly, include the composition of the censor committees, and the measure that allows a film to be banned for national security reasons.
Also criticised were a conservative interpretation of the rules, and most importantly strict state control over film, compared to lighter regulation of other cheaper and more accessible media such as television and print.
-
Kanu Behl, the debutant director of Titli which releases this Friday, October 30, along with producer Dibakar Banerjee, teamed up with TVF to make an episode on censorship in India. The fun video Censor Qtiyapa which released online on October 26, has gone viral and got more than two lakh views in less than 24 hours.
The video featuring eminent filmmakers Mahesh Bhatt, Sudhir Mishra, Hansal Mehta, Kamal Swaroop, Ajay Bahl, producer Guneet Monga, Vasan Bala along with the Titli director and producer is directed by Shlok Sharma (director of Haramkhor).
Excited about the tremendous response, the director Kanu Behl says, “The response to the video has been overwhelming. Close to 2 lakh hits in less than 24 hours, as we write this. It’s interesting to know that the audience across the board can bite in to the humour and get all the nuances of a film maker’s labour pains!”
-
Copyright holders have asked Google to remove more than 1,000,000,000 allegedly infringing links from its search engine in recent years. The remarkable milestone, reached this week, is at the center of an ongoing debate over how search engines are expected to deal with pirate sites.
-
We recently wrote about some concerns about the new Data Protection Directive that is being set up in Europe. The law is driven by people with good intentions: looking to better protect the privacy of European citizens. Privacy protection is an important concept — but the current plans appear to be so focused on privacy protection that it gives very little regard for the unintended consequences of the way it’s been set up. As we wrote in our last post, Daphne Keller at Stanford’s Center for Internet and Society is writing a series of blog posts raising concerns about how the new rules clash with basic concepts of free speech. She’s now written one about the immensely troubling setup of the “notice and takedown” rules included in the General Data Protection Regulation (GDPR). For years, we’ve been concerned by problematic notice and takedown procedures — we’ve seen the DMCA frequently abused to stifle speech, rather than for genuine copyright challenges. But, for some reason, people often immediately leap to “notice and takedown solutions” for any kind of content they don’t like, they and the drafters of the GDPR are no different.
-
Privacy
-
The military surveillance blimp that broke free of its mooring at Aberdeen Proving Ground Wednesday morning has returned to Earth after a four-hour, 160-mile, power line-snapping odyssey, authorities said.
NORAD spokesman Michael Kucharek said the runaway aircraft was on the ground near Moreland Township, Pa. — 160 miles north of its mooring in Edgewood — and was deflating. The blimp had slowly been losing helium, he said, and appears to have drifted to the ground.
-
Military officials scrambled Wednesday to retrieve an unmanned Army surveillance blimp that detached from its moorings in Maryland and drifted north over Pennsylvania.
Two American fighter jets tracked the blimp, military officials said, that had been tethered at Aberdeen Proving Ground and broke free around noon.
-
In just a few days, the Army will launch the first of two massive blimps over Maryland, the last gasp of an 18-year-long $2.8-billion Army project intended to use giant airships to defend against cruise missiles.
And while the blimps may never stave off a barrage of enemy missiles, their ability to spot and track cars, trucks and boats hundreds of miles away is raising serious privacy concerns.
-
The most outspoken group opposing the bill, Fight For the Future, noted in a scathing statement that the vote would be one we one day look back at as being formative for the internet.
“This vote will go down in history as the moment that lawmakers decided not only what sort of Internet our children and our children’s children will have, but what sort of world they will live in,” the group wrote in an emailed statement. “Every Senator who voted for CISA has voted for a world without freedom of expression, a world without true democracy, a world without basic human rights.”
It may not be that simple, but then again, maybe it is. So here’s a list of who voted for CISA, who voted against it, and who abstained. Republican presidential candidates Marco Rubio, Ted Cruz, Rand Paul, and Lindsey Graham are all in Denver for Wednesday’s debate. Paul is anti-CISA but didn’t think it was worth sticking around in Washington for the vote.
-
-
-
Despite the promising, if difficult to verify, statistics, the program has not gone without complaints in India, the world’s largest democracy. Critics argue that by controlling which companies and individuals can offer services on Internet.org, Facebook is creating a walled-off kingdom in which it decides the beneficiaries of its initiative.
-
Email was never designed to be private. When the Simple Mail Transfer Protocol (SMTP) was first invented, it didn’t come with protections or ways to check that a message really came from where it claimed to. Those came later, with the addition of extensions like STARTTLS for encrypting communications and others for authenticating messages.
-
The federal government has been fighting hard for years hide details about its use of so-called stingray surveillance technology from the public.
The surveillance devices simulate cell phone towers in order to trick nearby mobile phones into connecting to them and revealing the phones’ locations.
Now newly released documents confirm long-held suspicions that the controversial devices are also capable of recording numbers for a mobile phone’s incoming and outgoing calls, as well as intercepting the content of voice and text communications. The documents also discuss the possibility of flashing a phone’s firmware “so that you can intercept conversations using a suspect’s cell phone as a bug.”
-
Researchers have devised a low-cost way to discover the precise location of smartphones using the latest LTE standard for mobile networks, a feat that shatters widely held perceptions that the standard is immune to the types of attacks that targeted earlier specifications.
The attacks target the LTE specification, which is expected to have a user base of about 1.37 billion people by the end of the year, and require about $1,400 worth of hardware that run freely available open source software. The equipment can cause all LTE-compliant phones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates, although such attacks may be detected by savvy phone users. A separate method that’s almost impossible to detect teases out locations to within an area of roughly one square mile in an urban setting.
-
The European Union said on Monday it agreed in principle with the US on a new trans-Atlantic data transfer pact that’s still in the works, reports The Wall Street Journal.
Earlier this month, a European court invalidated Safe Harbor, a 15-year old agreement that included laws which allowed technology companies to move user data between data centers if they guaranteed it would receive an “adequate level” of protection.
The ruling came after Austrian privacy activist Max Schrems brought a case against Facebook in Ireland claiming that his privacy had been violated by the NSA’s mass surveillance programs. Following the court’s decision, Irish authorities said last week that they plan to investigate the social network’s data transfers under the act.
-
A new transatlantic data-sharing agreement is within reach after the “Safe Harbour” deal used by thousands of companies to comply with EU privacy law was struck down by the highest EU court this month, U.S. Secretary of Commerce Penny Pritzker said.
The so-called “Safe Harbour 2.0″ agreement currently being negotiated would meet European concerns about the transfer of data to the United States, Pritzker told journalists in Frankfurt on Thursday during a visit to Germany.
-
The NSA’s blanket surveillance of Europeans will be subject to judicial review, according to EU Justice Commissioner Vera Jourová.
At a committee meeting of the European Parliament this week, Jourová provided details of the replacement to the struck-down safe harbor framework, which until this month allowed people’s personal information to flow across the Atlantic and into American servers.
She told the hearing the new agreement would move away from the previous self-regulatory approach to one that allows for “pro-active” enforcement and sanctions.
-
-
Data protection authorities in Germany have announced that they will review the legality of internet giants’ data transfers from the EU to the US, after the European Court of Justice ruled that Europeans’ data isn’t safe from intelligence services on US-based servers.
-
When word got out that both the US’ NSA and the UK’s GCHQ were likely using purpose-built Regin malware for their spying campaigns, that raised more than a few alarm bells… including in the German government, apparently. The country’s prosecutor’s office has launched an investigation into a report that Regin infected (and thus monitored) the laptop of a Chancellery division leader. Officials aren’t jumping to conclusions yet, but it’s easy to guess where their suspicions lie — the concern is that allies are hacking into the devices of multiple German higher-ups, not just its Chancellor. If the evidence holds up, it could worsen political relationships that have already turned a bit sour.
-
German Chancellor Angela Merkel may not be the only high-ranking leader from that country to be spied on by the National Security Agency. According to a report published over the weekend, German authorities are investigating whether the head of the German Federal Chancellery unit had his laptop infected with Regin, a highly sophisticated suite of malware programs that has been linked to the NSA and its British counterpart, the Government Communications Headquarters.
-
State surveillance programs spell serious consequences for business — could Canada be next?
-
As part of the campaign, which is called Intelexit, the group have sought to place billboards as close as possible to the intelligence agency’s buildings across the world.
A billboard posted near the NSA outpost and military base in Darmstadt, Germany, for example, said: “listen to your heart, not to private phone calls.”
The group is planning to place a billboard outside GCHQ headquarters in Cheltenham, UK. It is expected to read “the intelligence community needs a backdoor,” in a jibe at the UK and US governments, who are attempting to push through legislation allowing them to de-crypt all encrypted digital communications between their citizens.
-
While nobody was watching, the Senate a couple of days ago passed something called the Cybersecurity Information Sharing Act (CISA), which passed at least partly because if you say “Cyber warfare, boogedy-boogedy!” around nervous legislators these days, they’ll pass a bill agreeing to have the NSA plant microchips in their spleens. The bill passed by one of those bipartisan majorities so beloved by Beltway pundits, 74-21. Now it goes to conference, and its final passage may be stalled because of the currently fluid state of the House Republican leadership.
-
As a cybersecurity bill, CISA is a joke: It doesn’t address the security problems that create the conditions for hacks. What it will create a streamlined information pipeline for the NSA.
-
Back in August, the NSA released an updated advisory that was at once interesting and expected: It said that the world had to prepare for the oncoming impact of quantum computers, and the possibility that these devices could render existing computer cryptography almost completely obsolete. They called for the cryptographic community to invest heavily in developing so-called post-quantum cryptographic solutions that could survive this hypothetical watershed invention. And, as you might imagine, this advisory has very nearly driven the internet insane. Now, two security researchers have published a paper compiling all the various theories surrounding this advisory, and trying to make sense of the situation.
-
Global online freedom declined for a fifth consecutive year as governments around the world stepped up surveillance and censorship efforts, a study showed Wednesday.
The annual report by non-government watchdog Freedom House said the setbacks were especially noticeable in the Middle East, reversing gains seen in the Arab Spring.
Freedom House found declines in online freedom of expression in 32 of the 65 countries assessed since June 2014, with “notable declines” in Libya, France and Ukraine.
-
Too little has been done to safeguard citizens’ fundamental rights following revelations of electronic mass surveillance, say MEPs in a resolution voted on Thursday. They urge the EU Commission to ensure that all data transfers to the US are subject to an “effective level of protection” and ask EU member states to grant protection to Edward Snowden, as a “human rights defender”. Parliament also raises concerns about surveillance laws in several EU countries.
-
The UK government has said that it recognises the “essential role that strong encryption plays in enabling the protection of sensitive personal data and securing online communications and transactions,” and does not “advocate or require the provision of a back-door key or support arbitrarily weakening the security of internet applications and services.” However, speaking in the House of Lords, the Parliamentary Under-Secretary of State at the Department for Culture, Media and Sport, Baroness Shields, went on to say: “This is not about creating back doors; this is about companies being able to access communications on their network when presented with a warrant.”
Shields singled out “an alarming movement towards end-to-end encrypted application” for criticism. She said that David Cameron “expressed concern that many companies are building end-to-end encrypted applications and services and not retaining the keys. The Prime Minister has repeatedly said that there cannot be a safe place for terrorists, criminals and paedophiles to operate freely, with impunity and beyond the reach of law.” For this reason, she claimed, “It is absolutely essential that these companies which understand and build those stacks of technology are able to decrypt that information and provide it to law enforcement in extremis.”
-
UK police are lobbying the government to be given access to every UK Internet user’s Web browsing history as part of the new Snooper’s Charter—the Investigatory Powers Bill—which is expected to be published next week. According to The Guardian, the police want to revive the controversial plan for ISPs to store details about every website visited by customers for 12 months, an idea first mooted in the original Communications Data Bill, which was dropped after opposition from the Liberal Democrats when they were part of the previous coalition government.
Richard Berry, the National Police Chiefs’ Council spokesman for data communications, is quoted as saying: “We essentially need the ‘who, where, when and what’ of any communication”—who initiated it, where were they and when did it happened. And a little bit of the ‘what’, were they on Facebook, or a banking site, or an illegal child-abuse image-sharing website?”
-
Police are to get the power to view the web browsing history of everyone in the country.
Home Secretary Theresa May will announce the plans when she introduces the Government’s new surveillance bill in the House of Commons on Wednesday.
The Telegraph understands the new powers for the police will form part of the new bill.
-
There are a few ways law enforcement agencies acquire cell tower spoofers. Very rarely do agencies pay for these expensive devices themselves. (Meaning with their funds drawn from their own departments. Obviously, no government agency is self-funded.) In most cases, funding in whole or in part is obtained from the DHS — something nearly any agency can obtain simply by checking [X] BECAUSE TERRORISM when applying for a Homeland Security grant.
-
Techniques like Open Source Intelligence (OSINT) gathering and a proper understanding of the Dark Web is the first step in combating the Internet’s dark places. With an understanding of how to use open source encrypted anonymity services safely, organisations can explore OSINT sources – which include web-based communities, user-generated content, social-networking sites, wikis, blogs and news sources – to investigate potential threats or analyse relevant information for business purposes.
Whether that’s using Deep and Dark web sites and directories to support intelligence gathering for investigation purposes, manage incidents or to combat cyber crime.
-
You gotta love this twisted logic.
In May, a federal appeals court declared the National Security Agency’s bulk telephone metadata collection program illegal because it wasn’t authorized under the Patriot Act, as the Obama administration and its predecessor administration had maintained.
Then, in June, Congress semi-dismantled the program with the passage of the USA Freedom Act, which President Obama signed on June 2. As part of the new act, Congress authorized a spying transition period of sorts where the old tactics could continue until new laws were in place.
-
IronNet, a cybersecurity company founded by the former director of the National Security Agency and head of U.S. Cyber Command, secured $32.5 million in a Series A funding round.
-
-
Former US National Security Agency (NSA) director Keith Alexander’s cyber security start-up, IronNet Cybersecurity, said yesterday it had raised $32.5 million in a “Series A” funding round led by Trident Capital Cybersecurity.
-
A former National Security Agency (NSA) subcontractor from Augusta has pleaded guilty to charges that he filed falsified time sheets.
-
-
Previous investigations by the ACLU have shown that Stingrays are used by many government agencies—including the DEA, FBI, NSA, and local and state police—across many states. Their use is so widespread in part because they only require a relatively low-level court order for use, which makes them an enticing alternative to attempting to get actual cell tower records with a warrant.
-
-
-
The American Civil Liberties Union suffered major defeats on Friday, when two of its cases involving clear violations of civil rights and civil liberties were dismissed, both undone by the judiciary’s deference to executive-branch secrecy.
-
The court modeled its opinion on the US Supreme Court’s 2013 decision in Clapper v. Amnesty International [JURIST report] that on matters of unconstitutionality surrounding intelligence gathering, the court is to be particularly rigorous.
-
Civil Rights
-
Police have used special powers from the counter-terrorism laws in order to seize a laptop that belongs to a journalist from BBC Newsnight, it has emerged.
The BBC and Secunder Kermani, who joined the broadcaster’s flagship current affairs programme last year and has reported extensively on UK-born jihadis, were the target of an order officers obtained from a judge under the Terrorism Act.
Police sought the order to read communications between Kermani and a man in Syria who had publicly identified himself as a member of Islamic State and who had featured in Newsnight reports.
-
Police have used powers under the Terrorism Act to seize the laptop of a young Newsnight journalist in a case that has shocked BBC colleagues and alarmed freedom of speech campaigners, The Independent can disclose.
Officers obtained an order from a judge that was served on the BBC and Secunder Kermani, who joined the flagship BBC2 news show early last year and has produced a series of reports on British-born jihadis.
The development has caused alarm among BBC journalists. The editor of Newsnight, Ian Katz said: “While we would not seek to obstruct any police investigation we are concerned that the use of the Terrorism Act to obtain communication between journalists and sources will make it very difficult for reporters to cover this issue of critical public interest.”
-
Media figures defended a school resource officer who was seen on video violently “slamm[ing] to the ground” a student in South Carolina, and blamed the student for not showing the officer and her teachers respect.
-
Niya Kenny, 18, is speaking out after she was taken into custody in her Spring Valley High School math class. She says she was standing up for her classmate who was being arrested by Student Resource Officer Ben Fields.
-
Officer Ben Fields, the South Carolina deputy who slammed and then threw a female high school student across a classroom this week, has been fired after video of his physical assault went viral. While the young girl recovers from injuries she sustained from the attack, according to her lawyer, officials have refused to drop criminal charges of disrupting a classroom against her and now one of the few students who protested against her violent arrest is speaking out about the fired deputy’s longstanding reputation at Spring Valley High.
-
United Nations police fired tear gas during clashes with ethnic Albanians protesting in the Kosovo capital yesterday against a UN plan on the fate of the breakaway Serbian province.
-
Europe’s worst migration crisis since World War II risks triggering “tectonic changes”, a top EU official warned Tuesday, as figures showed more than 700,000 newcomers have reached the continent’s Mediterranean shores this year.
-
The DC Appeals Court has just come to an unfortunate conclusion: because terrorism exists, your rights as a citizen will not be upheld if you travel outside of the United States. This summary of the case is from Lawfare’s David Ryan, whose article claims this is a “victory” for the DOJ, rather than a loss for the American public.
-
The Department of Justice won a significant victory yesterday when the D.C. Circuit held in Meshal v. Higgenbotham that a plaintiff cannot state a cause of action under Bivens for alleged constitutional violations that occur during a terrorism investigation in a foreign country.
-
Alaa is currently serving a five-year sentence for his role in a protest just two days after the passing of Egypt’s 2013 anti-protest law. While many others involved in the protest were pardoned after serving their first year, Alaa, along with Ahmed Abdel Rahman, has remained imprisoned. Since January 2011, when Egypt rose up against Hosni Mubarak, Alaa has spent more than 500 days in prison. His first arrest after the revolution coincided with his second trip to the United States, to attend RightsCon. He left San Francisco to fly directly back to Cairo, where he immediately faced a military prosecutor and a set of trumped-up charges that kept him in jail for 55 days. He has since been in and out of prison several times. He missed the birth of his first child, Khaled, and the death of his father last summer. He has undoubtedly missed so much more.
-
I am a free speech absolutist. Free speech, however, does not protect criminality, or threats of violence.
Threats of violence must be taken seriously and prosecuted by law enforcement.
That’s why — like The Rebel — I’m watching the case of “Israel vs Facebook” very closely.
There’s no reason why companies such as Twitter or Facebook should be protected from legal actions when clear and present threats are being uploaded and circulated on their networks. As private companies, they can decide who is allowed to have an account or not, but they have a responsibility to existing criminal laws regarding threats of violence against general or specific targets.
-
A senior scientist at the U.S. Department of Agriculture filed a whistleblower complaint on Wednesday accusing the federal agency of suppressing research findings that could call into question the use of a popular pesticide class that is a revenue powerhouse for the agrichemical industry.
Jonathan Lundgren, a senior research entomologist with the USDA’s Agriculture Research Service who has spent 11 years with the agency based in Brookings, S.D., said that retaliation and harassment from inside USDA started in April 2014, following media interviews he gave in March of that year regarding some of his research conclusions.
Lundgren’s work has included extensive examination of a class of insecticides known as neonicotinoids, or neonics, which are widely used by U.S. farmers to control pest damage to corn and other crops, helping protect production. The insecticides are sold in forms that both are sprayed on plants or coated on seeds before they are planted. They are also used on plants sold by lawns and garden retailers.
-
At the end of September, Brad Heath and Meghan Hoyer of USA Today published a DEA disciplinary log they’d obtained through an FOIA request. The document was obviously misnamed, as it showed plenty of misconduct by DEA agents, but not much in the way of discipline.
-
This week, the U.S. Department of State’s Defense Trade Advisory Group (DTAG) met to decide whether to classify “cyber products” as munitions, placing them in the same export control regime as hand grenades and fighter planes. Thankfully, common sense won out and the DTAG recommended that “cyber products” not be added to the control list. EFF and Access Now filed a brief joint statement with the DTAG urging this outcome and we applaud the DTAG’s decision.
There were a number of problems with the proposal to place “cyber products” on the U.S. Munitions List, but most importantly, no one knows how “cyber products” would be defined. As we’ve long argued in other contexts, trying to draw definitions around “defensive” and “offensive” tools is essentially impossible and any vagueness would have significant chilling effects on the security community. In essence, we think that the threshold problem of defining which “cyber products” are subject to control is likely an insurmountable obstacle to effective regulation.
-
Saudi blogger Raif Badawi was sentenced last year to a decade in prison and 50 lashes a week for 20 weeks—a punishment that has been carried out once so far—for the crime of insulting Islam on his website. On Thursday, the European Parliament awarded Badawi the Sakharov Prize, its human-rights award.
“The conference of Presidents decided that the Sakharov Prize will go to Saudi blogger Raif Badawi,” Martin Schulz, the parliament’s president, said. “This man, who is an extremely good man and an exemplary good man, has had imposed on him one of the most gruesome penalties that exist in this country which can only be described as brutal torture.”
Schulz called on Saudi King Salman to release Badawi, who was arrested in 2012 and initially sentenced to 600 lashes and seven years in prison—a punishment that was increased to 1,000 lashes and 10 years in prison after an appeal. Badawi was accused of insulting Islam on his website Free Saudi Liberals, which served as a forum for debate.
-
Internet/Net Neutrality
-
Unfortunately, MEPs have created large loopholes and left ambiguity in much of the legislation. Net neutrality is the principle whereby Internet access providers treat internet traffic equally. Because of the vagueness of the new regulations, telecoms regulators in EU Member States will now have to decide whether telecoms companies in their country will be able to prioritise different categories of data.
-
Wi-Fi is an incredible success story– carrying the majority of Internet traffic, responsible for over $90 billion in economic value for the United States in 2013 and a powerful force in closing the digital divide. The success of Wi-Fi demonstrates the power of unlicensed spectrum. But how did we get here? The story of how technologies like Wi-Fi have come to have such a significant impact on our lives will help us think about the future of unlicensed spectrum.
-
For many years now, the General Accounting Office has warned the FCC that if it’s going to throw billions of dollars at giant ISPs, it might just want to track how that money is spent. GAO reports like this one from 2009 (pdf) noted that not only has the FCC historically done a dismal job at tracking subsidy spending, most government broadband policies have been based on flawed, incomplete or downright hallucinated data (just check out our $300 million US broadband map). In other words, for the better part of fifteen years our government not only didn’t really know where broadband funding was needed, it couldn’t be bothered to track if it was actually going there.
-
Facebook founder Mark Zuckerberg has hit out at net neutrality advocates who claim that zero-rating – the practice of offering access to certain popular online services for free – should be prohibited.
-
-
INTERNET providers will be barred from charging online businesses for “fast lanes”—that is, giving priority to their traffic—except for certain specialised services, such as videoconferencing or telesurgery. They also must not block or slow traffic other than reasonably to manage their networks, such as to avoid congestion.
-
Intellectual Monopolies
-
LEGOs. Yes, the basic building block of our youthful imagination also holds a rather ugly over-protective side, in which it uses whatever tool happens to be nearest by to smash up any use of its products that it doesn’t fully endorse. Which, when you think about it, is really weird for a company that makes products that are essentially all about imaginative uses. Children building their own colorful castle? Awesome! But an adult using LEGOs to create political art? Oh, no, no, no.
-
Will IP matter? The question seems to arise in the wake of every new disruptive technology. It is no surprise, therefore, that it is being asked in connection with 3D printing, where digital content, easily distributed over the network, is married to the potential for making a myriad of objects in any location where a 3D printer can be operated (think: your home). If the concern a decade ago was how to regulate the downloading of a movie or a song, today it is how to regulate the downloading of a digital file containing all the instructions to make a perfect copy of a product, down to its trade mark. Recalling the discussion a decade or two ago regarding the downloading of digital songs and movies, suggestions are made for various technological solutions. More generally, calls are made for a cultural make-over, where the consumer will habitually come to prefer the genuine product, e.g., using authorized digital instructions and the correct product materials, within the context of 3D printing.
-
Copyrights
-
Efforts by Kim Dotcom’s legal team to have his extradition hearing thrown out have failed today. As a result the Megaupload founder will begin his defense next week, presenting legal argument that he hopes will stop New Zealand authorities sending him to the United States. Defiant, Dotcom insists that he “won’t be silenced by bullies!”
-
Most academic journals charge expensive subscriptions and, for those without a login, fees of $30 or more per article. Now academics are using the hashtag #icanhazpdf to freely share copyrighted papers.
Scientists are tweeting a link of the paywalled article along with their email address in the hashtag—a riff on the infamous meme of a fluffy cat’s “I Can Has Cheezburger?” line. Someone else who does have access to the article downloads a pdf of the paper and emails the file to the person requesting it. The initial tweet is then deleted as soon as the requester receives the file.
-
Techdirt has been writing about open access for many years. The idea and practice are certainly spreading, but they’re spreading more slowly than many in the academic world had hoped. That’s particularly frustrating when you’re a researcher who can’t find a particular academic paper freely available as open access, and you really need it now. So it’s no surprise that people resort to other methods, like asking around if anyone has a copy they could send. The Internet being the Internet, it’s also no surprise that this ad-hoc practice has evolved into a formalized system, using Twitter and the hashtag #icanhazpdf to ask other researchers if they have a copy of the article in question. But what is surprising is that recently there have been two articles on mainstream sites that treat the approach as if it’s really quite a reasonable thing to do.
-
New research from the European Commission’s Joint Research Centre shows that Spotify has helped to reduce the level of piracy in the countries where it is available. The work also reveals that Spotify reduces the number of digital track sales, but that those losses are cancelled out by the licensing fees paid by Spotify.
Permalink
Send this to a friend
Posted in Europe, Patents at 7:00 am by Dr. Roy Schestowitz
Summary: The revolt against the Battistelli regime culminates with explicit denunciation of an unprecedented assault on truth-tellers within the organisation
AS MANY people already know (especially those who have been paying close enough attention), the EPO’s thuggish management has a notorious track record and villainous pattern of using threats and menacing letters to remove access to information, and that is why we have decided to make copies of the following documents just shared by SUEPO. Many people need to read this because it’s about Benoît Battistelli and his ilk trying to shoot down a technical judge for merely discussing truthful information. This was last year's culmination of Benoît Battistelli's war against truth-tellers and it deserves broader reach, even worldwide attention. Will mainstream media (e.g. the BBC) finally decide to give this coverage? It’s well overdue.
SUEPO has just put in public circulation an alarming statement. It is not alarmist as based on information we have (from multiple independent sources) it’s simply too factual. Techrights is more censorship-resistant than SUEPO because there is little in terms of threats that the EPO can legally do to us, hence we decided to make copies of the English [PDF]
French [PDF]
, German [PDF]
, and Dutch [PDF]
versions. Here is it in HTML form and as images below. Cracking our servers and/or DDOS attacks may be the only way for EPO to censor this information, as the EPO’s ringleaders have already banned our site (internally). █

Permalink
Send this to a friend
« Previous entries Next Page » Next Page »