𝕿𝖊𝖈𝖍𝖗𝖎𝖌𝖍𝖙𝖘 Bulletin for Monday, March 15, 2021 ┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅ Generated Tue 16 Mar 02:39:47 GMT 2021 Created by Dr. Roy Schestowitz (𝚛𝚘𝚢 (at) 𝚜𝚌𝚑𝚎𝚜𝚝𝚘𝚠𝚒𝚝𝚣 (dot) 𝚌𝚘𝚖) Full hyperlinks for navigation omitted but are fully available in the originals The corresponding HTML versions are at 𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈 Latest in 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒕𝒙𝒕 and older bulletins can be found at 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒕𝒙𝒕-𝒂𝒓𝒄𝒉𝒊𝒗𝒆𝒔 Full IPFS index in 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒊𝒑𝒇𝒔 and as plain text in 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒊𝒑𝒇𝒔/𝒕𝒙𝒕 Gemini index for the day: gemini://gemini.techrights.org/2021/03/15/ ╒═══════════════════ 𝐑𝐄𝐂𝐄𝐍𝐓 𝐁𝐔𝐋𝐋𝐄𝐓𝐈𝐍𝐒 ════════════════════════════════════╕ Previous bulletins in IPFS (past 21 days, in chronological order): QmQvNZS1LAZnMM4hxFg93Fkzav1osAZoLLmACVyNWTvBEG QmP4sJsHWybFCR6L9YwJ4D9c4ty548pLdtooQKSTcnsvBj QmTJDPW4SySqJM91re39cWCksjMPCgmn9cidUgKb9EK8oY QmSw9S6gbPuCY6EoCWq13EveMmEX357wVLwTQEQyXkXLTn QmRLg7W2bYpr1JiQ6rXJd3frzGWwDsyWcVgiT5DQhV2Ma7 QmXwactwdWFj2TLvAXdStVi238in5okXcVFgsCkGsqexMZ QmcSwMjzRJLVJJk1ktjRc1CEDJ92YWeVn9qVE8ATewiQty QmcR4sVbAs9c71Bh9t9M8xCk5YQJAHUKEK9hpNtc3ZUxnk Qmf4okseUL3sX9QU1gV324WnMKDmVEvoX2vboMhRWAVa9A QmW4WcUNmujGK5kcyYfeyVfYpji6GmKLMaxty6WdhcgNhU QmWJmmXoWSvDVv1GXCBeefymKQ4ous4fqKHL8U96jvMRWM QmZABDo4xMH4KexrW2Lkih6fAve7ujxsBUWpbp6uCF4KY7 QmVqgUwgy82Dv9wbRCHDf8Az5JAxCfFrTdgSmUg7JHckhG QmbwY85pQ1AiuwtWfdbNfv9gxDga5UyiXJrZ1QHd6hbsj7 QmWp121r1GXcbyqSwDPppCeSNezNLzAkSn1ouaS1a1jokb QmdoZcf4iwb2ztjbdiuYHAC9yqNAxqjJ7bLxyu4mWe3eir Qmeh8C9MD58oRRQTZMdxXzz1fPnkNNkZLDGMUBXUZtfYcA QmQwVB9CHJEF8FeK5qE4nVrEt3T4j18queqDGsX1tco7Hu QmbvjnjBPkV9NuX5KzgE4i1MMMvJAtyqXZsxGtid1PSaxN QmR4biofPhoiD3JC7c8mnGqxWSMBkqoxwCBZQ7dT7pthDc QmSA9tsJUQyqpRRdqkKF9RwzKJcTetjDtoCFf54WRpJzdT ╒═══════════════════ 𝐈𝐍𝐃𝐄𝐗 ═══════════════════════════════════════════════════╕ ⦿ Why You Should Avoid DuckDuckGo (DDG) 2021 Edition, Now Microsoft-Hosted and With Extra Privacy Risks | Techrights ⦿ Europe’s Second-Largest Institution (EPO) is Not Only Violating the Law But Also Acting in Defiance of the Universal Declaration of Human Rights | Techrights ⦿ European Patent Office as Apparatus of American/Corporate Imperialism (by Surveillance and More) | Techrights ⦿ EPO and Microsoft Collude to Break the Law - Part VII: Lipstick on a Pig… | Techrights ⦿ EPO and Microsoft Collude to Break the Law - Part VIII Addendum | Techrights ⦿ EPO and Microsoft Collude to Break the Law - Part VIII: The Aftermath of Schrems II in Europe | Techrights ⦿ Response to the EPO’s Response to Techrights About Microsoft ’Cloud’ (Still Failing to Justify the GDPR Violations) | Techrights ⦿ IRC Proceedings: Sunday, March 14, 2021 | Techrights ⦿ Links 15/3/2021: Linux.dev and Wine-Staging 6.4 Released | Techrights ⦿ More Than a Month Later Raspberry Pi Foundation is a Microsoft Censor | Techrights ䷼ Bulletin articles (as HTML) to comment on (requires login): http://techrights.org/2021/03/15/duckduckgo-in-2021/#comments http://techrights.org/2021/03/15/epo-and-universal-declaration-of-human-rights/#comments http://techrights.org/2021/03/15/epo-corporate-imperialism/#comments http://techrights.org/2021/03/15/epoleaks-report-march-2021-part-7/#comments http://techrights.org/2021/03/15/epoleaks-report-march-2021-part-8-addendum/#comments http://techrights.org/2021/03/15/epoleaks-report-march-2021-part-8/#comments http://techrights.org/2021/03/15/epo-waffle-on-microsoft/#comments http://techrights.org/2021/03/15/irc-log-140321/#comments http://techrights.org/2021/03/15/linu-dot-dev/#comments http://techrights.org/2021/03/15/microsoft-spy/#comments ䷞ Followed by Daily Links (assorted news picks curated and categorised): ䷩ 𝚕𝚒𝚗𝚎 73 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/duckduckgo-in-2021/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/duckduckgo-in-2021/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ Why_You_Should_Avoid_DuckDuckGo_(DDG)_2021_Edition,_Now_Microsoft-Hosted_and With_Extra_Privacy_Risks⠀✐ Posted in Deception, Microsoft, Search at 9:21 pm by Dr. Roy Schestowitz Reddit seems to be censoring such revelations right now (even a year after publication), as if sponsors are more important than facts =============================================================================== There are substantial privacy and civil liberty issues with DuckDuckGo. Here they are spotlighted: 1. Nefarious History of DDG founder & CEO: 1. DDG’s founder (Gabriel Weinberg) has a history of privacy abuse, starting with his founding of Names_DB, a surveillance capitalist service designed to coerce naive users to submit sensitive information about their friends. (2006) (expand related trivia on Reddit censorship) The “history” link above refers to a Reddit post rich in accurate facts– verifiable facts. The moderator (trai_dep) added_flair to falsely flag the content as “speculative” to cast doubt (to create FUD whilst falsely accusing the other of just that – to project. The pot_is_calling_the_kettle_black). No counter evidence was given. Then over a year later Reddit censored the post in a manner that suggests a rogue/buggy robot_“automatically”_filtered_it_as_“spam”. They duck accountability by blaming the bot. Obviously nothing in the post could even remotely be construed as spam. Are we to believe that a robot would censor an old archived post, and no human reviews censorship by some unleashed bot loose in the wild? Anyway, this is why the link is a mirrored WaybackMachine document. 2. Weinberg’s motivation for creating DDG was not actually to “spread privacy”; it was to create something big, something that would compete with big players, according to an interview between Weinberg and Susan Adams. As a privacy abuser during the conception of DDG (Names Database), Weinberg sought to become a big-name legacy. Privacy is Weinberg’s means (not ends) in that endeavor. Clearly he doesn’t value privacy — he values perception of privacy. 2. Direct Privacy Abuse: 1. DDG was_caught violating its own privacy policy by issuing tracker cookies, according to Alexander Hanff (CEO_of_Think_Privacy and a data security and ethics expert on_staff_at_Singularity_University). 2. DDG was_again_caught violating its own privacy policy by fingerprinting browsers. DDG responded not with counter evidence, but simply a plea to trust them. 3. DDG’s third violation (2021): Microsoft hosts DDG’s service and also supplies_Bing_search_results for the same transaction. This means Microsoft sees both sides of the transaction and can link your IP address (i.e. identity) to your search query that Bing processes. DDG makes this false statement: “we never share any personal information with any of our partners. The way it works is when we call a partner for information, it is proxied through our servers so it stays completely anonymous. That is, any call to a partner looks to the partner as it is from us and not the user itself, and no user personal information is passed in that process (e.g. their IP address). That way we can build our search result pages using these 100s of partner sources, while still keeping them completely anonymous to you“ (emphasis added). While it may be true that DDG doesn’t transmit users’ IP addresses to Microsoft, Microsoft has already seen users’ IP addresses via Azure. That combination of data given to Microsoft makes DDG’s statement a lie. The MS_Azure_privacy_policy refers us to the general MS_privacy_policy, which confirms that Microsoft collects IP addresses. DDG can change their hosting provider at any time. And they have– they migrated from Amazon AWS to Microsoft. As of the drafting of the article herein, DDG is still MS-hosted. To verify for yourself that DDG is still MS-hosted as you read this, Linux Tor users can run: torsocks whois "$(torsocks dig +tcp +short +time=4 +tries=1 duckduckgo.com @resolver1.opendns.com)"; web users can verify by obtaining DDG’s IP address from digweb and then visit https://ipinfo.io/ . 4. DDG’s app sends_every_URL you visit to DDG servers. (discussion). 5. DDG is currently collecting users’ operating systems and everything they highlight in the search results. (to verify this, simply hit F12 in your browser and select the “network” tab. Do a search with JavaScript enabled. Highlight some text on the screen. Mouseover the traffic rows and see that your highlighted text, operating system, and other details relating to geolocation are sent to DDG. Then change the query and submit. Notice that the previous query is being transmitted with the new query to link the queries together) 6. When clicking an ad on the DDG results page, all data available in your session is sent to the advertiser, which is why the Epic browser project refuses to set DDG as the default search engine. 7. DDG blacklisted Framabee, a search engine for the highly respected framasoft.org consortium. 3. Censorship: Some people replace Google with DDG in order to avoid censorship. DDG is not the answer. 1. DDG is complying with the “celebrity threesome injunction”. 4. Harmful impact on net neutrality: 1. DDG attempts to play both sides of the network neutrality fight. DDG donated $50k (as of 2020) to an opponent_of_net_neutrality who ironically calls themselves “TechFreedom”. Then DDG also donated $50k to an opponent of TechFreedom, “Public Knowledge”, who actually calls_for “NO rules preventing blocking of website”, yet Public Knowledge blocks Tor users from their own website by issuing a “403 forbidden” error. Public Knowledge intends to coach Congress on “How Interoperability Can Rein In Big Tech”, yet they themselves have broken interoperability with Tor as they make themselves electronically unreachable outside of Facebook, Twitter, Youtube, and Gmail. 5. CloudFlare: DDG promotes one of the most pernicious privacy_abusing tech giants and adversary to the Tor community: CloudFlare Inc. DDG results give high rankings to CloudFlare sites, thus leading users into the largest privacy abusing walled garden on the web. Supporting CloudFlare compromises privacy, net neutrality, democracy, and anonymity: 1. Anonymity: CloudFlare DoS attacks Tor users, causing substantial damage to the Tor network. 2. Privacy: All CloudFlare sites are surreptitiously MitM’d by design. 3. Net neutrality: CloudFlare’s attack on Tor users causes access inequality, the centerpiece to net neutrality. 4. DDG T-shirts are sold using a CloudFlare_site, thus surreptitiously sharing all order information (name, address, credit card, etc) with CloudFlare despite their statement at the bottom of the page saying “DuckDuckGo is an Internet privacy company that empowers you to seamlessly take control of your personal information online, without any tradeoffs.” (2019) 5. DDG hired CloudFlare to host spreadprivacy.com (2019) DDG also donated over $186k to a series of privacy-abusing CloudFlare sites run by “Demand Progress”, “Fight for the Future”, and “Access Now”. Despite getting nearly $70k from DDG, FFTF continues to expose their own patrons to the very evil they claim to be fighting. Demand Progress, who received $100k from DDG, posts their claim to “contest concentrated corporate power” directly on their_CloudFlare_site, as well as the claim that they educate people on “the impacts of corporate power over our economy and democracy” as they “confront corporate bad actors”, all of which is bluntly unaligned with their CloudFlare patronage. Access Now, who received $16k from DDG, also used CloudFlare to block Tor users, hypocritically acting against their own_mission to “fight for a free and open internet, advocating for the Net Neutrality principle that internet access should be offered to everyone on a nondiscriminatory basis, without favoring certain websites, applications, or services.” DDG apparently does little inspection on those they donate to, as if they’re merely selecting recipients with names that promote their privacy propaganda strategy to boost user loyalty. 6. Harmful Partnerships with Adversaries of Privacy Seekers: 1. DDG gets_paid a commission when users visit eBay from DDG. Note that eBay has been_caught sending JavaScript that snoops on their own customers by port scanning the LAN and reporting back to eBay. Moreover, eBay transactions are impossible without using PayPal, and PayPal_abuses_privacy in countless ways. 2. DDG gets_paid a commission when users visit privacy-abuser Amazon. 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇image_of_JavaScript_event_that_runs_when clicking_a_DDG_result⦈_ DDG also uses_AWS_to_crawl the web, which Amazon profits from. The Amazon partnership triggers substantial ethical issues: 1. Amazon is making an astronomical investment in facial recognition which will destroy physical travel privacy worldwide. 2. Amazon uses Ring and Alexa to surveil neighborhoods and the inside of homes. 3. Amazon paid $195k to fight privacy in CA. (also see http://cal-access.sos.ca.gov/Campaign/Committees/ Detail.aspx?id=1401518&view=late1) 4. Amazon runs sweat shops, invests in climate denial, etc. The list of non-privacy related harms is too long to list here. 3. DDG feeds privacy-abuser Microsoft by patronizing the Bing API for search results, using_Microsoft’s_ad_network, using Outlook email service, hiring Microsoft to host DDG’s search site and host DDG’s_crawler. 1. The Dutch government commissioned a_study which found Microsoft Office products to have several_GDPR_violations. 2. Microsoft finances AnyVision to equip the Israeli military with facial recognition to be used against the Palestinians who they oppress. 3. Microsoft paid $195k to fight privacy in CA. (also see http://cal-access.sos.ca.gov/Campaign/Committees/ Detail.aspx?id=1401518&view=late1) 4. DDG hires Microsoft for email service: torsocks dig @8.8.8.8 mx duckduckgo.com +tcp | grep -E '^\w' ==> “…duckduckgo-com.mail.protection.outlook.com” 4. (historic) DDG is was previously partnered with Yahoo (aka Oath; plus Verizon and AOL by extension). (click to expand details) DDG helped Yahoo profit for several years by patronizing Yahoo’s API for search results, and also through advertising. Mention of Verizon, Yahoo, and Oath have been quietly scrubbed from DDG’s disclosures. There was no official announcement, so we cannot confirm whether there are still ties to Verizon et al. The Verizon corporate conglomerate is evil in many ways: 1. Yahoo, Verizon, and AOL all supported CISPA (unwarranted surveillance bills) 2. Yahoo, Verizon, and AOL all use DNSBLs to block individuals from running their own mail servers, thus forcing an over-share of e-mail metadata with a relay. 3. Verizon and AOL both drug test their employees, thus intruding on their privacy outside of the workplace. 4. Verizon is was an ALEC member (a powerful superPAC designed to put corporate political interests ahead of human beings). (edit: Verizon dropped ALEC membership in 2018) 5. Verizon supports the TTP treaty. 6. Yahoo voluntarily ratted out a human rights journalist (Shi Tao) to the Chinese gov w/out warrant, leading to his incarceration. 7. Yahoo recently recovered “deleted” e-mail to convict a criminal. The deleted e-mail was not expected to be recoverable per the Yahoo Privacy Policy. 8. Verizon received $16.8 billion in Trump tax breaks, then immediately laid off thousands of workers. 9. (2012) Will block or degrade calls to disrupt customer use, at the request of law enforcement, with no_court_oversight. 10. (2014) Verizon fined $7.4 million for violating_customers’ privacy 11. (2016) Verizon fined $1.35 million for violating_customers’ privacy 12. (2018) Verizon paid $200k to fight_privacy_in_CA. See also California_records. 13. (2018) Verizon apparently caught taking_voice_prints 14. unfavorable record retention policy (scroll down to Verizon) 15. (2015) Only 2 stars on EFF_transparency_report 16. (2016) Yahoo was caught surreptitiously monitoring Yahoo Mail messages for the NSA, resulting in EFF_lawsuit 7. Advertising Abuses & Corruption: 1. DDG exploited_a_room at FOSDEM for commercial gain, to deliver a sales pitch despite its proprietary non-free server code, then dashed out without taking questions. Shame on FOSDEM organizers for allowing this corrupt corporate abuse of precious resources. 2. Tor Project accepts an annual $25k “contribution” (read: bribe) from DDG, so you’ll find that DDG problems are down-played by those close to the Tor Project (e.g. EFF). This is likely why Tor Browser always defaults to using DDG (which DDG conceals from their disclosure) and why Tor Project endorses DDG over Ss — ultimately against the interests of the privacy-seeking Tor community. This default search engine exploits The_Tyranny_of_Convenience. The EFF also pimps DDG — a likely consequence of EFF’s close ties to Tor Project. 3. (click to expand details on how Tor Project responds to criticism about their loyalty toward DuckDuckGo [their benefactor] in IRC) 18:20 < psychil> if torbrowser is going to be recommended, it should also be open to scrutiny. in the absence of that transparency, you create an untrustworthy forum. 18:20 < psychil> we've seen a loyalty from TB toward duckduckgo, but DDG is in partnership with Verizon, Yahoo, AOL et. al. 18:21 < psychil> all CISPA-sponsoring companies 18:22 < psychil> if ppl choose to trust them fair enough, but this trust shouldn't be pushed on every user weighing their choice of browsers 18:26 -!- mode/#tor [-b psychil@*!*@*] by ChanServ 18:27 < YY_Bozhinsky> psychil: i am using Tor (thanks to Tor Devs)... PLUS brain - good bundle. I am happy. And please, don't rush to change Reality (do it slowly with love and respect). Because it's home for many ppl. They construct their lives in it. Think twice before ruining that. Please. 18:27 -!- mode/#tor [+b psychil!*@*] by ChanServ 18:27 -!- psychil was kicked from #tor by ChanServ [wont stop the FUD] Tor Project is notoriously fast to censor any discourse (no matter how civil) when it supports a narrative that doesn’t align with their view / propaganda. =============================================================================== Editor’s note: We published a (now-outdated) version before. The author notes: “The significant changes are: DDG is now MS-hosted (2.3), DDG gets commission when Amazon or eBay links are followed, Verizon-Yahoo is no longer a partner, and there’s more dirt on DDG donees (TechFreedom, “Public Knowledge”, “Demand Progress”, “Fight for the Future”, and “Access Now”)” ⠐⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣗⣶⣾⣻⣻⣿⣿⣿⣟⣛⣿⣿⣻⣿⣿⣿⣿⣿⣯⣯ ⣤⣄⣄⣤⣤⣤⣤⣤⣄⣤⣠⣤⣀⣤⣄⣀⣠⣤⣀⣠⣤⣀⣤⣤⣀⣠⣤⣄⣠⣄⣄⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣬⣬⣤⣤⣤⣤⣤⣤⣤⠀⣿⣿⣿⣭⣼⣭⣼⣿⣯⣼⣭⣭⣥⣼⣯⣭⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣯⣯⣿⣿⣿⣿⣿⣽⣭⣿⣽⣽⣿⣿⣽⣽⣯⣯⣯⣿⣽⣽⣿⣿⣿⣿⣿⣿⣿⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣯⣯⣭⣭⣯⣽⣭⣽⣽⣭⣽⣭⣭⣯⣩⣿⣯⣽⣭⣭⣭⣿⣯⣯⣿⣿⣽⣭⣽⣽⣽⣿⣿⣿ ⣿⣿⣷⡷⡿⣿⣿⣿⣿⣷⣷⡺⣶⠾⢛⣷⡶⢟⣶⠿⣿⢿⣶⡺⡿⢶⣞⣿⣶⣿⣿⣶⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣏⣟⣛⣛⣛⣛⣹⣽⣿⣉⣿⣯⣙⣯⣏⣋⣝⣿⣏⣩⣻⣉⣹⣯⣏⣹⣿⣏⣩⣿⣍⣟⣭⣿ ⣿⣿⣿⣿⣻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⣟⣛⣛⣛⣛⣛⣏⣿⣟⣻⣿⣟⣛⣛⣛⣛⣛⣻⣟⣻⣟⣉⣟⣻⣛⣿⣿⣉⣽⣯⣹⣻⣽ ䷩ 𝚕𝚒𝚗𝚎 441 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/epo-and-universal-declaration-of-human-rights/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/epo-and-universal-declaration-of-human-rights/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ Europe’s_Second-Largest_Institution_(EPO)_is_Not_Only_Violating_the_Law_But Also_Acting_in_Defiance_of_the_Universal_Declaration_of_Human_Rights⠀✐ Posted in Europe, Law, Microsoft at 8:04 am by Dr. Roy Schestowitz “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.” –Article_12_of_Universal_Declaration_of_Human_Rights 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇Universal Declaration of Human Rights⦈ Summary: EPO staff and stakeholders working from home are having their basic rights grossly violated by António_Campinos and his cohorts, who very well understand that they break the law but hope that nobody will notice Days ago an article was published about “The_Struggle_for_Technology Sovereignty_in_Europe” (outsourcing to US firms disguised as ‘European’ is a joke at our expense). “As I explained this morning, Microsoft is funded partly by the US government (i.e. American taxpayers) and the US military…”“From now on,” it says, “every country or group of countries must ask itself whether it produces the technologies it needs or has guaranteed, unfettered, long-term access to them. A country that answers no is vulnerable to technological coercion that is no less severe than the military coercion of yesteryear.” An article from yesterday, entitled “How_the_U.S._is_Able_to_Dictate_to_the Rest_of_the_World,” talks about financial aspects as follows: The U.S. moves against any country that dares to act on a belief that its resources should be for its own people’s benefits rather than maximizing profits of multinational corporations or prioritizes the welfare of its citizens over corporate profit or simply refuses to accept dictation in how it should organize its economy. The military is frequently put to use, as are manipulation of the United Nations and the strong arms of the World Bank and International Monetary Fund (IMF). But sanctions are a frequently used tool, enforced on countries, banks and corporations that have no presence in the U.S. and conduct business entirely outside the United States. The U.S. can impose its will on national governments around the world, using multilateral institutions to force governments to act in the interest of multinational capital, even when that is opposite the interests of the country itself or that country’s peoples. And when a country persists in refusing to bend to U.S. demands, sanctions imposing misery on the general population are unilaterally imposed and the rest of the world is forced to observe them. In short, the U.S. government possesses a power that no country has ever held, not even Britain at the height of its empire. And that government, regardless of which party or what personality is in the White House or in control of Congress, is ruthless in using this power to impose its will. As I explained_this_morning, Microsoft is funded partly by the US government (i.e. American taxpayers) and the US military; its aim is — inter alia — to serve objectives of hegemony imperialism, partly by economic espionage (where they seems fitting to the goals higher up). The fact that EPO management has made a deal to outsource all its important data to Microsoft (even highly confidential data because the ‘encryption’ is totally_fake) will be explored in part 8 of the series. We intend to publish that shortly. The previous parts are listed below. █ * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Intro):_A_Fresh_Data Protection_Scandal_Brewing_at_the_EPO? * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Start_of_Series): Enter_the_“Cloud_of_Unknowing…” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_II:_Steve_Rowan Announces_Microsoft_“Outlook_Migration” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_III:_The_PATRIOT_Act and_Mass_Surveillance * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_IV:_The_US_CLOUD_Act Passes_Without_Public_Debate * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_V:_The_EU_GDPR * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VI:_A_Not-so-safe Harbour * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VII:_Lipstick_on_a_Pig… ⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⡇⠀⠀⢀⠂⠀⠀⠀⠀⠀⠐⠄⠘⢀⠀⠀⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⡀⠋⢀⣿⠇⠀⠀⠀⠀⠀⠀⢸⡆⢰⠀⡃⠀⠐⣼⡇⢸⢈⡉⢹⠉⡍⢯⡏⢯⡏⠏⡉⠫⡿⠹⡏⢹⣿⠉⡏⠋⠩⡝⣽⡍⢹⣿⡉⣯⠹⢹⣏⢩⡍⣯⠉⠋⡏⠋⡙⢹⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⡇⠀⠀⢀⠠⠈⠓⠀⠒⢶⠀⠀⠀⠀⠀⠀⠀⢸⣷⣾⣦⣧⣤⣬⣼⣷⣬⣦⣿⣼⣬⣷⣼⣧⣭⣤⣧⣤⣧⣵⣦⣧⣭⣼⣤⣥⣧⣬⣴⣭⣤⣬⣤⣦⣬⣴⣬⣴⣤⣥⣽⣤⣦⣧⣦⣷⣼⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠤⣀⠀⠀⠀⡀⠢⠈⠀⠀⠀⠀⢸⣿⣿⣿⣿⣿⣶⠀⢰⣷⠀⠀⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡆⠀⢰⡆⠉⢻⡿⢿⣿⣿⣿⡿⢻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡿⢿⠿⠿⣿⣿⠀⢘⣛⠀⢸⡛⢻⠛⢿⠛⢟⠻⠟⠻⡿⢛⠻⡟⠻⠟⢿⣿⣿⡇⠀⢘⠃⢤⣿⠒⢺⠿⡛⠟⡇⠸⠛⢿⡋⢙⡟⡛⢿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣬⢸⡇⡁⣱⣿⣿⠀⢸⣿⠀⢸⠀⢸⠀⢸⠀⣿⠀⡏⠀⠗⢨⠀⡇⠀⡇⢸⣿⣿⡇⠀⢸⡇⠀⣿⡇⢸⢄⣃⣰⡇⢰⡇⢸⡇⢸⠀⣀⢹⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣶⣶⣶⣿⣿⣿⣷⣿⣿⣶⣶⣶⣷⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣷⣶⣶⣶⣶⣶⣶⣿⣿⣶⣶⣶⣿⣶⣶⣶⣶⢠⣤⡄⣶⣶⣶⣶⣷⣶⣶⣶⣾⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠟⠛⠛⠛⠻⠿⠿⠿⠿⠿⡿⢻⠿⠿⠿⠿⠿⠿⠿⠿⠿⢿⠿⠿⡿⠿⠿⡿⠿⠿⢿⠿⢿⣿⡿⡿⠿⣿⣿⢿⣿⣿⣿⣿⢿⣿⣿⡿⣿⣿⣿⣿⣿⣿⢿⣶⣶⣾⣿⣿⣿⣿⣿⢿⠿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣀⣂⣀⣂⣈⣏⣁⣉⣟⣝⣩⣛⣛⣙⣛⣟⣝⣙⣛⣚⣛⣚⣙⣋⣳⣛⣛⡛⣒⣚⣙⣓⣺⣿⣗⡒⣒⣖⣒⣚⣚⣶⣶⣶⣾⣷⣶⣶⣶⣶⣶⣶⣷⣶⣷⣶⣶⣷⣶⣶⣶⣶⣷⣾⣶⣶⣾⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠦⠧⠶⠦⢶⢬⣤⣤⡼⣶⣤⢧⣤⣶⣧⣼⡤⣿⢤⣤⣼⣿⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡏⠉⠉⠉⢹⣉⣛⣙⣻⣛⣛⣻⣛⣛⡻⣛⣋⣛⣻⣛⣛⣛⣛⣻⣛⣟⣛⣛⣛⣿⣻⣛⣻⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⢰⠒⠒⡖⠒⠓⡖⠒⢲⠒⠒⠒⠑⡞⠲⡶⠶⠶⠢⠶⡾⢲⠶⠷⠲⠶⢶⠶⢾⣿⡯⠽⠯⠬⡽⠭⠤⠧⠽⡷⢥⠭⠾⠬⡬⠭⠽⡬⠏⡭⠭⠭⠭⡭⠵⡭⡭⠭⡭⣯⣭⣭⣽⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣥⣽⡭⣭⡭⡏⡬⡭⣭⡭⡽⣭⢭⣭⡭⣯⣭⢭⣽⣭⣍⣹⣭⣭⣽⣍⣍⣏⣭⣍⣉⣯⣹⣿⡟⠛⠛⠛⠻⠿⠿⠿⠿⢿⠿⠿⠿⠿⠟⠾⢿⢿⠿⠾⢷⠾⠾⢷⠿⢾⠶⠶⠶⠾⡿⡿⢿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠒⡖⠒⡖⠒⠓⢲⠒⠒⡒⠐⢲⠒⡖⠰⡶⠦⠶⠾⠶⠾⠶⠲⣷⣶⣶⣶⣦⣶⣶⣶⣶⣾⣿⣇⣲⣒⣒⣘⣹⣛⣛⣋⣛⣻⣋⣻⣙⣛⣉⣙⣛⣙⣛⣛⣳⣫⣋⣛⣛⣛⣛⣻⣿⣿⣿⣾⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠉⠉⠉⠉⢙⣏⣛⣛⣛⣛⣹⢩⣛⣛⣟⣟⣛⣟⣛⣻⣛⡛⣛⣙⣻⣛⣛⣛⣟⣛⣛⣛⣻⣿⣇⣈⣉⣉⣉⣉⡉⣯⣽⣭⡭⡭⣯⢭⣭⣽⣿⣿⣿⢿⣿⣿⡿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠤⠧⢧⠄⠥⠤⡤⢤⠧⠤⠤⠬⠭⢭⠥⡥⠭⠭⢭⠽⢭⣥⣭⣭⣭⣭⣭⣧⣭⣧⣭⣭⣽⣿⡗⣒⣒⣒⡷⢲⣓⡒⣶⠶⡖⡗⢖⡖⠲⢶⠶⠲⡷⠶⡶⢒⠷⠖⠶⢾⢶⠗⢷⠶⠲⠲⢾⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠓⠚⠛⠛⠛⡟⠿⠷⠿⠻⠻⢿⠷⠿⠿⢿⠗⠿⠺⠟⠶⠿⠿⠿⢿⠻⠿⠟⠿⠟⠿⠿⢿⣿⣭⣭⣽⡭⢭⣭⣭⣭⡭⣭⣯⢭⣽⣭⣩⣭⣍⣯⢭⣭⣽⣭⣍⣭⣹⣭⣽⣩⣭⣍⣍⣍⣹⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣤⣤⣄⣦⣬⣩⣍⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣒⡒⣒⣲⣚⡖⣳⣒⣖⠗⡒⡾⠖⢲⡳⡶⠲⠶⡶⠶⢳⠲⠷⠶⠶⠶⠶⢷⠮⠶⠶⠶⢾⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠠⡭⡭⠭⠬⠭⠬⠬⢧⠥⠭⠴⡭⠭⢭⡭⣭⠭⣭⠬⣧⢬⡭⡭⣭⣅⠭⣭⢽⣿⣭⣭⣭⡭⣯⣭⣽⢭⣭⣭⣭⣭⣭⢿⡽⣭⣭⣭⣯⣭⣭⣯⣭⢭⣭⣭⠯⣉⢏⣉⣭⣉⣹⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣒⣲⣓⣒⣚⢗⣓⣒⣒⣒⣐⣲⣛⣒⡒⣒⣛⠒⣒⣗⢚⣒⣺⣒⣲⣒⣓⣒⣗⣒⣖⣓⣺⣿⣒⣒⣒⣒⣲⣓⣒⣒⣒⡒⡖⣲⢞⡖⡒⣳⢖⠲⡺⠲⠺⢶⠶⠲⡷⠺⢶⠶⠶⠞⠖⠶⢾⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⡿⢿⠿⢿⠛⡛⢛⡛⣛⢛⠛⣛⣛⣛⢛⣛⣛⣛⣛⣿⣿⣿⣿⣿⣟⣻⣿⣟⣻⣛⣛⣛⣻⣛⡛⣛⣟⣻⣛⣟⣛⣻⣻⣿⣿⣿⣿⣛⣟⣛⣛⣛⣛⣛⣟⣛⣛⣛⣻⣛⣛⣛⣛⣛⣻⣻⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣧⣭⣤⣬⣭⣥⣭⣥⣭⣬⣥⣥⣤⣥⣬⣤⣴⣾⣶⣿⣿⣿⣿⣿⢂⢒⡒⣖⢲⣒⣲⡒⡒⣖⣒⣚⣛⣛⣛⣛⣛⣛⣻⣿⣿⣿⣷⣂⣔⣂⣂⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣾⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⡟⣒⡒⣚⣒⡒⢒⣒⣒⣒⢒⣒⡒⡒⣐⡒⣒⣒⣒⣿⣿⣿⣿⣿⣭⣭⣭⣭⣭⣭⣥⣭⣭⣭⣥⣬⣤⣶⣷⣾⣾⣾⣾⣿⣿⣿⣯⣥⣴⣤⣤⣴⣤⣤⣤⣴⣶⣶⣶⣶⣶⣶⣶⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⡧⠬⠤⠤⢥⠬⠤⠤⠬⠤⠦⠥⠴⠤⠬⠤⠶⡶⠶⣿⣿⣿⣿⣟⣛⣛⣛⣓⣚⣒⣒⣒⣚⣒⣒⣒⣓⣒⣒⣒⣟⣛⣻⣿⣿⣿⣿⣛⣛⣛⣛⣈⣩⣙⣉⡉⣉⣩⣉⢉⣉⣍⡉⢭⣉⣹⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣍⣈⢩⣉⣁⣉⢉⢉⣉⡉⢭⡉⠉⣍⢩⢉⠭⡭⡯⣿⣿⣿⣿⣿⣶⣶⣶⣶⠶⠶⠶⠶⠶⠾⠿⠿⢿⠿⠿⠿⠿⠿⢿⣿⣿⣿⣷⠶⠿⣿⡿⡿⠿⠿⠿⡿⠿⠿⠿⠿⠿⠿⢿⢿⠿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣗⣒⣐⣒⣓⣲⣒⣒⣒⣶⣶⣶⣴⣶⣶⣷⣶⣶⣶⣿⣿⣿⣿⣟⣀⣀⣛⣈⣣⣚⣑⣉⣋⣉⣙⣉⣃⣋⣈⣃⣉⣋⣼⣿⣿⣿⣯⡭⠩⠭⢭⡭⡩⢭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠥⠬⢿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⡟⠛⡟⠛⠭⠭⠩⠩⠭⢭⣭⣭⣭⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⠖⠚⠒⠒⣒⣒⣒⣒⣒⣒⣚⣛⣛⣛⣛⣛⣛⣛⣻⣿⣿⣿⡗⡒⢖⠒⡚⣖⠒⠓⡖⣒⢒⢒⣒⡒⣒⣒⣒⣂⣂⣻⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⡿⠭⠭⠿⠏⠛⠛⠋⠙⠛⠛⠛⠛⠛⠛⠛⢻⣛⣛⣿⣿⣿⣿⡿⠏⠪⠋⠚⠖⠗⠛⠟⠻⠛⢛⠛⠛⠛⢟⣛⣟⣛⣿⣿⣿⣿⡏⠟⡓⠛⠛⢓⡛⠒⠓⢒⢚⣚⢒⢒⡛⣛⢛⢛⣛⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣛⣛⣻⣛⣻⣻⣛⣻⣟⢿⣛⣻⢛⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⣛⣿⣟⣛⣛⣛⣛⣛⣛⣛⣻⣛⣛⣛⣻⣛⣻⣿⣿⣿⣿⣯⣭⣭⣭⣭⣭⣭⣭⣿⣿⣿⣿⣿⣿⣾⣶⣶⣶⣶⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣶⠶⠶⣶⠶⠶⠶⠶⠶⠶⠶⠶⠶⠶⠶⠶⠶⠾⠿⣿⣿⣿⣿⣗⣒⣒⣒⣒⣒⣒⣚⣒⣒⣒⣛⣛⣛⣛⣛⣿⣿⣿⣿⣿⣿⣿⡟⣛⣚⣛⣛⣓⣒⣒⢓⣒⣚⣲⣓⢑⣒⣒⣃⣁⢂⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣭⣭⣭⣭⣭⣭⣭⣽⣿⣿⣾⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⡿⢿⠏⡍⠭⡝⣭⠍⡯⠹⢭⠭⠭⡽⠽⠭⡭⣿⣿⣿⣿⡧⠤⠤⠬⠤⠤⠬⠤⠤⠤⠠⡤⠤⠤⠤⠴⠀⠆⠀⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠛⠒⠊⠛⠒⠒⠒⠒⠒⠒⠒⠒⠂⠐⠒⢒⠐⠒⡒⣿⣿⣿⣿⡗⠒⢒⣒⡒⢒⣖⡒⣒⢖⢒⣒⣒⣻⣒⣒⣲⣚⣒⣿⣿⣿⣿⡯⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣭⣭⣭⣭⣭⣭⣭⣥⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣿⣿⣿⣿⣿⣞⣓⣷⣞⣒⠟⣟⢲⣺⠖⡾⣶⡟⣿⢻⠿⢿⠿⣿⣿⣿⣿⣗⣒⣒⣒⣒⣒⣓⣑⣓⣛⣈⣡⣉⣉⣌⣉⣨⢉⣈⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠛⢒⠚⠞⠒⠒⡒⢒⡲⠒⢒⣒⢒⢒⣒⣒⣒⣒⣒⣿⣿⣿⣿⡗⠒⠒⠒⡒⠒⡚⢒⣒⢒⡒⢒⡒⣒⣓⣒⣒⣒⣒⣿⣿⣿⣿⡧⢬⣴⣵⣤⣵⣷⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣷⣛⣺⣿⡟⡿⠿⠟⠻⠟⠻⠟⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣛⣚⣿⣟⣟⣻⣻⣺⣟⣿⣻⣟⣟⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⣥⣬⣥⣦⣤⣤⣥⣤⣤⣴⣶⣶⣶⣶⣶⣶⣾⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⡶⠶⢶⣶⠶⠶⠶⣶⠶⠶⠾⠿⠿⠿⢿⢿⠿⢿⠿⣿⣿⣿⣿⣗⣒⣒⣒⣒⣒⣒⣒⣒⣒⣒⣛⣻⣛⣛⣛⣛⣿⣿⣿⣿⣿⣿⣟⣚⢛⣺⣳⣫⣉⣉⣈⣌⣏⣁⣉⣍⣉⣩⣉⣩⣍⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠭⠭⠭⠭⡍⡭⡭⠩⡭⢩⠉⠍⠭⠬⡍⠭⠭⠭⢍⣿⣿⣿⣿⡿⠿⠽⠿⠭⠯⠭⢭⠭⠭⠭⠭⠭⠭⠭⠭⠭⣿⣿⣿⣿⣿⣿⣗⣒⣒⣒⣒⣒⣒⣒⣒⣒⣒⣚⣛⣛⣛⣛⣛⣛⣛⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⡶⠶⢦⣶⢶⠾⠿⢿⠿⠿⠿⢿⡿⠿⡿⠿⠿⢿⢿⣿⣿⣿⣿⣗⣒⣒⣒⣒⣛⣟⣛⣻⣛⣛⣛⣟⣟⣛⣿⣟⣟⣛⣿⣿⣿⣿⣧⣤⣤⣴⣤⣤⣬⣴⣶⣶⣾⣶⣶⣶⣶⣶⣶⣶⣶⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠭⠭⠍⠭⠭⠭⠩⡭⠭⠬⠭⠉⠭⠭⠭⠭⠭⠬⢽⣿⣿⣿⣿⣗⠒⡞⠛⡟⠛⠛⢛⣛⣛⡛⣛⣛⢛⣛⣛⣛⣛⣛⣿⣿⣿⣿⣟⣚⣛⣛⣃⣉⣉⣏⣉⣉⣉⣏⣉⣹⣍⢏⠍⠭⠭⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣒⣒⣒⣒⣛⣛⣛⣛⡛⣛⣛⣛⣛⣛⣻⣛⣛⣛⣻⣿⣿⣿⣿⡧⢤⢥⠭⢥⠭⢬⢬⠤⠤⠬⠥⡤⠬⠤⠤⠤⢤⣬⣿⣿⣿⣿⣷⣶⣶⢶⠶⡶⠾⠿⠿⠿⠿⠿⠿⠿⠿⠿⡿⡿⠿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠂⠳⠂⠒⠖⠐⠓⠐⠣⠒⠲⠐⠐⠒⠐⠶⠓⠒⢺⣿⣿⣿⣿⡿⠿⣿⡿⢟⠛⣛⡛⠟⢛⣛⡟⡟⣛⢟⣻⣻⣛⡟⣿⣿⣿⣿⣯⠭⠭⠭⠭⠭⠽⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⠭⢭⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣽⣿⣿⣿⣿⣿⡯⠭⠭⠭⠭⠭⠭⠭⢭⠭⠭⢭⠯⠭⠭⠥⠭⠭⠭⣿⣿⣿⣿⣏⣋⣹⣉⣙⣉⣉⣍⣉⣩⣍⣩⡭⣭⢩⠩⠍⢩⠭⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠃⠖⠓⠓⠲⠒⠐⠐⠲⠲⠒⠒⠒⠒⠒⠲⡒⠒⢺⣿⣿⣿⣿⣗⣒⣒⣐⣒⣒⣒⣶⣶⣶⣶⣶⣾⣶⣶⣶⣷⣶⣾⣿⣿⣿⣿⣲⢴⣶⣲⣒⣖⣒⣒⣒⣒⣒⣒⣒⣒⣒⣒⣒⣶⣾⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣭⣥⣿⣿⣿⣿⣿⣿⣿⣿⡿⠟⠿⠿⣭⠭⣭⣍⢭⡍⣭⣭⡭⣭⣯⣭⢯⠭⢭⣿⣿⣿⣿⣽⣴⣺⣰⣴⣌⣂⣆⣐⣰⣲⣒⣲⣂⣒⣶⣶⣶⣶⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣓⣛⣛⣓⣊⣒⣐⣒⣒⣒⣖⣲⣒⣲⣶⣶⣶⣶⣾⣿⣿⣿⣿⣗⣒⣒⣲⣚⣒⣒⣒⣒⣛⣛⣻⣛⣛⣛⣻⣿⣿⣿⣿⣿⣿⣿⣛⣛⣻⣻⣫⣍⣩⣽⡭⣭⢭⣭⡭⡽⢭⢭⠭⠭⣭⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣤⣴⣤⣥⣦⣦⣦⣴⣶⣶⣶⣶⣶⣷⣶⣶⣶⣶⣾⣿⣿⣿⣿⣗⣒⣒⣒⣒⣒⣚⣒⣚⣛⣛⣛⣛⣛⣛⣛⣛⣛⣻⣿⣿⣿⣿⣦⣴⣖⣶⣒⣖⣒⣒⣚⣒⣒⣒⣲⣶⣶⣶⣾⣶⣾⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⡿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⠀⢠⠀⠀⠀⡄⠀⢠⠀⠀⠀⠀⡄⠀⠀⠀⢀⠀⠀⢄⠀⠀⢀⠀⢠⠀⠀⡄⡀⠀⡄⠰⡀⠀⡀⠀⠀⠀⠀⠀⠀⠀⣿⣛⣛⣛⣛⣛⣛⣟⣛⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⠀⠸⠀⠀⠀⠈⠆⠸⠀⠀⠀⠀⠇⠀⠀⠀⠘⠀⠀⠀⠃⠀⠘⠄⠸⠀⠀⠇⠃⠀⠃⠀⠘⠀⠈⠁⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ䷩ 𝚕𝚒𝚗𝚎 591 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/epo-corporate-imperialism/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/epo-corporate-imperialism/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ European_Patent_Office_as_Apparatus_of_American/Corporate_Imperialism_(by Surveillance_and_More)⠀✐ Posted in Europe, Microsoft, Patents at 5:18 am by Dr. Roy Schestowitz Video_download_link http://techrights.org/videos/epo-corporate-espionage.webm Summary: I interject with my own (personal) opinions and interpretation of the situation at the EPO, which is basically sending all of its important data to the United States like some kind of a gift, in spite of the GDPR forbidding such a practice TWENTY years ago a young Computer Science/Software Engineering student I was taught some of the basics of networking, including IPv6 (which we’ve still not fully adopted since then). We’re moving backwards in a lot of ways, including the outsourcing of servers to a bunch of monopolies — a cabal of surveillance giants from another country or countries. Have we lost the skills and talent needed to operate servers domestically (or on-site)? Or… maybe… are we just unable to compete economically with foreign hosting companies that are partly subsidised by the military (Microsoft is partly subsidised_by_American taxpayers)? They keep telling us (in US media) that “The Clown” will save us money and is the “wise” (or “smart”) choice, but on what basis? Whose agenda or objectives are served? “If the European Patent Office has the word “European” in it, why does it send all its information to the US? Who owns the European Patent Office?”Wikipedia defines_“full-spectrum_dominance” as follows: “Full-spectrum dominance also known as full-spectrum superiority, is a military entity’s achievement of control over all dimensions of the battlespace, effectively possessing an overwhelming diversity of resources in such areas as terrestrial, aerial, maritime, subterranean, extraterrestrial, psychological, and bio- or cyber- technological warfare. “Full spectrum dominance includes the physical battlespace; air, surface and sub-surface as well as the electromagnetic spectrum and information space. Control implies that freedom of opposition force assets to exploit the battlespace is wholly constrained.” We’ve highlighted (bold face) the parts about control of minds, not just physical things. Wikipedia then quotes the famous_Harold_Pinter_speech (I’ve watched it several times myself), in which he referred to the term in his 2005 Nobel Prize acceptance as follows: “I have said earlier that the United States is now totally frank about putting its cards on the table. That is the case. Its official declared policy is now defined as “full spectrum dominance”. That is not my term, it is theirs. “Full spectrum dominance” means control of land, sea, air and space and all attendant resources.” If the European Patent Office has the word “European” in it, why does it send all its information to the US? Who owns the European Patent Office? For the uninitiated, here are previous parts in this series: * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Intro):_A_Fresh_Data Protection_Scandal_Brewing_at_the_EPO? * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Start_of_Series): Enter_the_“Cloud_of_Unknowing…” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_II:_Steve_Rowan Announces_Microsoft_“Outlook_Migration” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_III:_The_PATRIOT_Act and_Mass_Surveillance * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_IV:_The_US_CLOUD_Act Passes_Without_Public_Debate * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_V:_The_EU_GDPR * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VI:_A_Not-so-safe Harbour * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VII:_Lipstick_on_a_Pig… The next part will be published later today. Remember that “clown computing” means not only surveillance but also censorship (on behalf of governments and corporations); when Wikileaks exposed_a_lot_of_crimes in 2010 AWS (Amazon) deplatformed the site. Amazon receives a lot of money (federal contracts) from the government and the military, not to mention all sorts of tax breaks and special fares that render Amazon almost impossible to compete with. Some might call it state monopoly. Some might even compare that to the worst elements of “fascism” or “Communism”. █ ䷩ 𝚕𝚒𝚗𝚎 689 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/epoleaks-report-march-2021-part-7/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/epoleaks-report-march-2021-part-7/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VII:_Lipstick_on_a_Pig…⠀✐ Posted in Europe, Law, Microsoft, Patents at 4:01 am by Dr. Roy Schestowitz Previous parts: * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Intro):_A_Fresh_Data Protection_Scandal_Brewing_at_the_EPO? * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Start_of_Series): Enter_the_“Cloud_of_Unknowing…” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_II:_Steve_Rowan Announces_Microsoft_“Outlook_Migration” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_III:_The_PATRIOT_Act and_Mass_Surveillance * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_IV:_The_US_CLOUD_Act Passes_Without_Public_Debate * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_V:_The_EU_GDPR * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VI:_A_Not-so-safe Harbour * YOU ARE HERE ☞ Lipstick on a Pig… 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇Safe_Harbour_pig⦈_ The Privacy Shield was derided by its critics as “lipstick on a pig” Summary: The Schrems II judgment has significant implications for “cloud computing” services As we saw in the last part, following the invalidation of the Safe Harbour by the CJEU in its “Schrems_I” judgment a revised framework for regulating transatlantic exchanges of personal data was pulled out of the hat in the form of the Privacy Shield. From its very inception the robustness of this arrangement was questioned and it was derided by its critics as “lipstick_on_a_pig”. The hurried manner in which the Privacy Shield was cobbled together meant that it always smacked of being a flaky and legally unsound last minute political compromise between the EU and the Obama Administration. In the eyes of its critics it was nothing more than a comfort_blanket to calm post-NSA revelations nerves among non-US cloud services buyers, rather than a legally sound framework to protect data from intrusive examination by American intelligence services. “The hurried manner in which the Privacy Shield was cobbled together meant that it always smacked of being a flaky and legally unsound last minute political compromise between the EU and the Obama Administration.”The first signs that the revised arrangement might not last very long came in January 2017 during the early days of the Trump Administration when the incoming POTUS signed off on a new_Executive_Order on “Enhancing Public Safety in the Interior of the U.S.” Among other elements, this Executive Order directed US government agencies to “ensure that their privacy policies exclude persons who are not United States citizens or lawful permanent residents from the protections of the Privacy Act regarding personally identifiable information”. This prompted certain commentators, such as MEP Jan-Philipp Albrecht, to express concerns about the tenability of the Privacy Shield and to call for its suspension pending clarification of the legal implications of Trump’s Executive Order. The European Commission was quick to dismiss_these_concerns. Others who remained sceptical about the tenability of the Privacy Shield arrangement confidently – and accurately – predicted that its days were numbered. “The Schrems II judgment has significant implications for “cloud computing” services.”The final nail in the coffin came in 16 July 2020 when the CJEU delivered its judgment in the case of Facebook Ireland Ltd. v. Maximillian Schrems – known as “Schrems_II” – which not only invalidated the Privacy Shield agreement but also put other data transfer mechanisms into significant doubt. The CJEU found that due to the possibility of access to personal data of EU citizens by US authorities, the Privacy Shield infringed EU data protection regulations because it did not provide adequate GDPR‑compliant protection of personal data. 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇Privacy_Shield⦈_ The Schrems II judgment has significant implications for “cloud computing” services The Schrems II judgment has significant implications for “cloud computing” services. Private companies and public sector bodies have increasingly started to make use of cloud services in recent years and this trend is likely to continue in future. The majority of cloud services are provided by vendors located in the US. The servers for the purchased services are partly located in the US, partly in Europe. And this is where it gets interesting. Even if a server is located in the EU, US authorities may access the stored data. This access is possible because of the FISA (Foreign Intelligence Surveillance Act) 702 and the EO (Executive Order) 12.333 which apply to all Electronic Communication Service Providers headquartered in the US. “The majority of cloud services are provided by vendors located in the US. The servers for the purchased services are partly located in the US, partly in Europe.”Merely relocating the data to an EU-based region in these clouds is not sufficient, because the problem is not geographical in nature. The decisive issue here is that US-owned cloud vendors are subject to US jurisdiction and US legislation can be used to them to hand out customer data to the US government, even if the servers storing that data happen to be located on foreign soil. 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇USA_spying_on_EU⦈_ Even if a server is located in the EU, US authorities may access the stored data via FISA (Foreign Intelligence Surveillance Act) 702 and the EO (Executive Order) 12.333 which apply to all Electronic Communication Service Providers headquartered in the US. In essence, the Schrems II judgment means that US-based cloud providers such as Google, Amazon Web Services (AWS), and Microsoft Azure cannot_be_used_to_store data_about_European_citizens_in_a_GDPR-compliant_manner. In December 2020 it was reported that the Swedish data protection authority had imposed the first GDPR-based fine for lack of adequate protection of sensitive data stored in a US‑based cloud platform after the Schrems II decision. “In December 2020 it was reported that the Swedish data protection authority had imposed the first GDPR-based fine for lack of adequate protection of sensitive data stored in a US‑based cloud platform after the Schrems II decision.”In that case the_Umeå_University_in_Sweden_was_fined_SEK_550,000 (approx. € 54,000) because it was found to have processed special categories of personal data concerning sexual life and health using storage in a cloud service of a US-based provider, without sufficiently protecting the relevant data. The Swedish data protection authority referred to the Schrems II judgment and took the stance that per se a data transfer to the US triggers a high risk for personal data because data subjects are limited in protecting and enforcing their privacy rights. In the next part we take a further look at the fallout from Schrems II in Europe and how the judgment has given new impetus to the discussion about European “data sovereignty”. █ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⠿⠛⠛⠋⠉⠉⠀⠀⠀⠈⠉⠉⠛⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⠛⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠙⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠋⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠉⠙⠛⠛⠻⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⠀⠀⠀⡉⠙⠿⣿⣿⡿⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠁⠀⠠⠀⠀⠀⢻⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣇⠀⠀⠁⠀⢀⢀⡙⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢁⣤⣤⣤⠀⠈⢀⣼⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⡋⣰⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠂⠀⢀⣝⣿⣿⣿⠀⢀⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣇⠀⠀⠀⠀⢢⠉⠁⠒⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢤⠆⠀⠀⣠⣄⡈⠟⡿⠴⣀⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠀⠀⠀⠀⠀⠀⠀⠐⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣧⣑⠒⣿⣿⣿⣿⣦⡂⢶⢑⡹⡿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠛⠁⠀⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢊⠀⣀⠠⡢⢂⠄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠐⠀⠀⡠⠶⠦⢭⣭⣾⣿⣿⢿⣿⣻⣿⠃⠈⣐⣿⡿⣪⣿⣏⠛⠍⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠐⠀⠀⠀⠀⡰⣷⠀⢠⡢⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠠⢶⣂⢀⣾⡿⣻⢿⡏⣠⡈⠙⠿⣿⣶⣿⣿⣿⣾⣿⢟⠁⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠟⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠂⠀⠀⠀⠀⠉⠀⠀⠘⢙⡋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠠⣀⣀⣽⣿⣸⢿⢿⢿⣮⡑⠲⢂⡈⠛⢷⣾⣿⢿⠿⣷⢂⠻⢿ ⣿⣿⣿⣿⡿⠋⠁⠀⠀⠀⠀⠀⠀⠠⢀⠚⠅⠂⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢔⠄⠀⠀⠀⠀⠀⠀⠁⢠⣾⡟⣱⣸⣿⣿⣿⣽⣼⡿⠿⣷⣦⠁⠃⣰⣿⣿⣿⠊⠀⣾⣷⣿ ⣿⣿⣿⠟⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠐⢂⣴⣾⡿⣻⣿⣿⡻⢻⣿⣿⣿⢽⢩⡪⠺⣷⣶⡟⢻⣿⠃⠠⢠⣿⣿⣿ ⣿⣿⣁⣀⣴⣤⣤⣄⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠠⠀⠀⠀⠀⠀⠀⠀⠉⠂⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠒⢶⣶⡙⢿⣿⣾⡻⢿⣿⣾⣝⢷⣿⣿⣿⡏⡼⠛⠀⢠⣾⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠂⠀⠀⠀⠀⠀⠠⣂⠀⡀⢀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣤⣤⣶⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠙⠛⠊⠛⠛⠿⣶⡨⣻⣿⢀⣛⢿⣿⢰⠀⢀⠂⢸⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⡿⠋⠀⠀⠀⠀⠀⠀⠀⠀⠈⠂⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣰⣿⣿⣿⣿⣿⣿⣿⣦⡀⠀⠀⠉⠁⠄⠀⠀⠀⠈⠁⠀⠀⠀⠀⠉⠻⠿⠿⠨⣿⣃⢹⡌⣁⡐⠁⠘⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⠟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣴⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣄⠀⠀⠺⠀⠀⠲⠶⣶⣤⣄⣀⣀⣀⣀⣀⣰⣾⣷⣭⣽⣿⣁⡹⣿⣿⣤⣸⣿⣿⣿ ⣿⣿⣿⣿⠟⠋⠁⠀⠀⠀⠀⠊⠀⠀⠀⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣀⣤⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣦⡀⠀⠀⠀⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠇⣹⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣯⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣠⣴⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣄⠀⠁⠀⠀⠉⠻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣷⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣀⣠⣤⣶⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣄⠀⠀⠁⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣷⣶⣶⣶⣶⣶⣶⣶⣶⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⠀⠀⠀⢩⢩⣭⣿⣾⣟⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣾⣶⣾⠁⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠠⠰⠸⠿⠿⠿⠿⠿⠿⠿⠿⠿⢿⣿⣿⡿⠿⠿⠿⠿⣿⣿⣿⣿⣿⠿⠿⠿⠿⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⣿⢿⣿⣿⣿⣿⣿⣿⡿⠿⠿⠿⠿⢿⣿⣿⣿⣿⣿⠿⠿⠛⠛⠋⠀⠀⠁⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⡀⠀⠒⣿⣿⢀⡄⠀⠀⠄⢼⣿⣿⣿⣿⠰⠬⠤⣴⠅⢟⣻⡭⠭⠭⢭⢭⣽⣟⡻⠖⠻⣿⣺⠛⣿⣿⣿⣿⡇⠂⣠⡀⢴⡆⣿⣿⣿⢯⣥⣤⣤⣤⣤⣀⣀⣠⡀⠌⠉⠂⠀⠀⠀ ⠀⠐⠨⡄⠀⠀⠀⠀⠀⣀⣀⣀⣀⣈⣁⣀⣸⣿⣿⠠⠀⠀⣀⡀⢸⣿⣿⣿⣿⠶⠾⢈⠁⢨⣯⣶⣾⣿⣿⣿⣿⣷⣶⣯⣑⢌⠉⠙⡏⣿⣿⣿⠿⡇⠆⢉⠀⢛⡃⣿⣿⡇⢛⣛⠙⠉⣩⣿⠯⠉⠁⠀⠀⠀⠀⠈⠁⠀ ⠀⠀⠠⠲⠀⠀⠀⠀⠀⠛⠛⡛⠛⠛⠛⠛⣿⣿⣿⠀⠀⢒⣋⢒⣺⣿⣿⣿⣷⠛⠐⠂⢲⡰⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢽⡅⢙⣤⢤⣭⣱⢛⣾⡦⠄⠭⡅⣴⡆⣿⣿⡇⣶⣶⣶⣾⢶⣾⣥⣴⡒⡲⢶⢴⠢⠀⠀⠀ ⠀⢀⣀⣘⠀⠀⠀⠀⠀⠀⣴⠄⠀⠀⠀⠀⣽⣿⣿⠀⠤⡀⠤⣴⢸⣿⣿⣿⡟⠌⣠⣾⣾⣿⣿⣿⡿⠿⠿⠿⠿⢟⣯⠝⣄⣚⢩⣵⢶⣾⡵⠿⡯⢿⠆⠶⠆⠸⠕⣿⣿⣿⣮⡛⠾⠭⠉⠉⠉⠉⠉⠉⠀⠙⠫⠁⠀⠀ ⠀⠉⠈⣭⠀⠀⠀⠀⠀⣶⣴⣶⣶⣶⣶⣶⣿⢿⣿⠒⠀⠀⢔⠄⢺⣿⣿⡿⡾⠐⠿⠿⠯⠯⠿⡫⣠⡤⣶⡗⣦⣴⡟⡹⣸⣿⡘⣿⡗⢿⣷⣯⣽⣿⣟⢻⣿⣿⣇⣿⣛⠻⢿⣻⣓⣲⢫⣽⣛⠼⣗⣒⣒⣂⡌⠂⠀⠐ ⠀⠀⠶⠒⠀⠀⠀⠀⠀⠛⠛⠛⠛⠛⠛⠛⠛⣿⣿⣇⠉⡛⠛⣙⣈⢛⣻⢃⣁⠪⠤⠆⣒⣠⣿⢳⣾⢸⣿⢿⣆⢹⣿⡙⣹⢿⣯⢹⠿⣟⣿⢖⠯⣾⣫⠬⠅⠭⣹⣯⣷⠈⠆⠀⠀⠀⠺⠿⠿⠇⠀⠈⠀⠀⠀⠄⠀⠀ ⠀⠀⣴⡥⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⠆⠀⢀⣿⣿⣿⣶⡤⠄⢩⡍⣴⢾⣬⡕⣷⣮⣹⣷⢹⣿⣽⣿⣠⣿⡾⢿⣯⡿⣟⣛⢨⡕⠔⣳⣳⢳⣾⣿⣿⡿⣿⡿⣳⣿⣿⣿⣧⡻⠿⣿⠿⠿⡿⠿⠿⠿⠿⠶⠂⠀⠀⠀⠀ ⠀⠐⠨⠱⣤⣄⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣿⣿⣿⣿⣿⣜⣶⠻⣗⣓⣿⣷⣹⣿⢿⣿⡎⢞⠿⡿⡸⣯⡙⣔⣜⣧⣿⣶⣿⣿⣮⡍⡝⣚⣛⣉⣩⣅⣶⣟⣻⣛⣛⣻⣿⣿⣖⣁⣥⣁⣉⣁⣀⣀⡐⣾⡧⡤⠀⠀⠀ ⠀⡈⣹⡟⠛⠛⠛⠛⠻⣿⣿⣿⣿⣻⡏⠛⢻⣿⣿⣿⣿⣿⣿⣺⣮⣜⢟⠞⣿⡆⣿⣷⡍⢝⣇⣲⣥⣿⣾⣿⣿⣿⣿⣿⠿⠛⠛⠛⠹⣷⡟⠛⢻⣿⣽⣿⡏⠙⢻⣿⣿⣯⣽⣭⣽⡟⠋⠋⣭⢽⣭⠡⠃⠉⠁⠁⠀⠀ ⠀⠀⠠⠁⠀⠀⠤⠀⠀⢨⠋⠉⠋⢉⡗⠐⢺⠉⠉⣿⠟⠉⣻⠇⠿⣻⡷⠬⣏⠛⠊⠈⠙⠻⣟⠛⠻⣿⠋⠉⣿⣿⣿⣿⠀⠐⠂⠀⢤⣽⠇⠀⠘⠉⠙⢿⡇⠀⢺⠿⠛⠉⠉⠛⠿⡇⠀⠀⠿⠚⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠂⠀⠀⠀⠀⢤⠾⠠⠀⢴⠶⠇⠀⠸⣧⠀⠘⠀⢠⣿⠒⠂⣀⠀⠀⣾⠧⠀⣄⡳⠤⠺⠆⠀⠋⠀⣸⣿⣿⠿⠛⠅⢂⣀⡀⠀⢹⡁⠀⣰⡂⢀⣘⡇⠀⢸⡇⠀⠈⣋⡀⢀⡃⠀⢀⣃⣀⣀⡂⠀⠀⣀⣀⠀⠀ ⠀⠀⠀⠁⠀⠀⣿⣿⣟⣻⣀⡀⣸⣾⣇⣀⣸⣿⣆⣀⣀⣿⣿⣄⣀⣉⣀⣀⣻⣦⣀⣈⢀⣀⣮⣝⡀⠀⢀⠁⢶⣒⣩⣥⣄⣤⠈⠀⣠⣽⣏⣁⣭⣅⢉⣸⣇⡀⣸⢣⣀⢀⡁⣀⢀⣥⣀⣘⡗⠀⠀⢀⢀⢀⢩⡍⡀⠀ ⠀⠀⢀⣀⣀⣱⢃⣽⣿⣿⡟⣯⣿⣿⣿⣿⣿⣿⣿⣿⡟⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⣿⣀⣀⣠⣮⣿⣿⣿⣿⣏⣿⣿⣿⣿⡯⣿⣿⣿⣿⣿⣿⣿⣿⣿⢹⣾⣿⣿⣭⢹⣾⣿⣭⣧⠀⠀⠀⠤⠤⠀⠈⠁⠀⠀ ⠀⠐⠈⠨⣭⣿⣶⡿⠸⠾⢶⣿⡿⡸⠾⠿⢿⡿⣿⣻⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⣗⣶⡶⠲⠶⢆⡺⠛⠛⠛⢃⣶⣞⡀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢐⣶⣶⡶⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢲⣶⣶⣶⣦⠀⠠⠀⠀⠀⣶⣦⣠⣶⣶⣶⣦⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡀⠀⠀⠀⣿⣇⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⣇⠀⠈⢻⣿⣿⡏⠀⠀⠀⠀⠀⣫⣿⣿⣾⣿⣽⢷⣿⣷⣿⣇⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠠⣤⣌⢝⣿⠀⠘⠛⣻⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⢁⠠⡔⠹⠯⠀⠀⠀⠀⠀⠀⠀⠘⠛⢻⣿⣿⢷⣿⣿⣿⣿⣿⣷⣤⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣀⣀⣀⣀⣀⠀⠀⠀⠀⠀⠀⣠⣤⣤⣤⡄⠀⠀⠀⢨⣽⣿⣿⠆⠀⠀⠀⣽⣿⣷⠀⠀⢰⣶⣶⣶⣶⣶⣶⣦⣶⣴⣶⣶⣶⣲⣶⣶⣶⣶⣶⣦⣶⣶⣶⣶⣶⣶⣶⣶⡎⣿⣿⣿⣿⡄⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣬⣭⠛⢻⣿⡇⢀⣀⣀⣛⠿⠿⠟⠀⠀⢰⣶⣾⣿⣿⠆⡀⢸⣿⣿⣿⣏⠉⠉⢙⠩⠹⠩⠉⢹⠁⡍⣉⠉⠩⠉⠉⡏⠉⠉⠉⣿⣿⣿⣿⡇⣿⣿⣿⡿⢷⣾ ⠀⠀⠀⢀⣀⣀⣀⣀⣀⣀⣉⣉⣉⣉⣉⣉⠀⠀⠀⠀⠀⣿⣿⠄⢸⣿⡇⡸⠿⣿⣿⠀⠀⠀⠀⠒⠻⠿⣿⣿⣿⡿⠟⢸⣿⣿⡟⣿⣿⣿⣿⣿⠛⠛⡟⡟⠻⣻⢛⠛⢟⠛⢻⣿⣿⣿⣿⣿⣿⣿⣿⡇⣾⣶⣷⣿⣿⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠛⢻⡓⡛⠛⡇⣇⠅⣿⣿⠀⠀⠀⡠⠤⠕⠨⠽⠩⠯⠤⠀⢸⣯⣽⡍⣪⣿⣿⣿⣿⣶⣶⣷⣶⣾⣶⣷⣶⣷⣶⣾⣿⣿⣿⣿⣿⣿⣿⣿⡇⣿⣿⣿⣿⣿⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠈⠁⠈⡀⢁⠷⡵⣿⢿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣼⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⣫⣭⣭⣭⣬⣭⡛⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⣿⣿⣿⣿⣿⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠧⠦⠴⠧⠤⠼⠀⠀⠀⢤⣠⣀⣀⣷⣶⣾⣿⣿⢸⣿⣿⣿⣿⡿⠟⠩⠭⠭⢸⣍⣉⣉⣉⣉⣉⡉⠨⠭⠭⠝⠻⣿⣿⣿⣿⣿⡇⢟⣝⣾⣽⡽⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠙⠻⣿⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⡇⡩⠭⠭⠭⢨⣭⣭⣭⣭⣭⣭⡭⠨⠭⠭⠭⡁⣿⣿⣿⣿⣿⡇⣿⣿⣿⡽⡿⣎ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢾⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⡇⠀⠄⠀⠀⢸⣥⣤⣤⣤⣤⣤⣤⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⡇⣿⣿⣿⣧⢯⢿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⡇⢲⣶⣶⣶⢸⣂⣀⣀⣀⣀⣀⣀⢰⣶⣶⣶⠂⣿⣿⣿⣿⣿⡇⣿⣿⣿⣿⣿⠏ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡀⡀⠀⠀⠀⠀⠀⠀⠀⠀⡀⠀⠀⠀⠀⢀⠀⠀⠀⠀⢀⣄⠀⠀⠨⠬⠹⣿⣿⢛⡘⣿⣿⣿⣿⡇⢉⡉⠉⠉⢰⡤⠤⠤⠤⠤⠤⠔⠈⠉⠉⠉⠁⣿⣿⣿⣿⣿⡇⣿⡿⣯⣯⣭⠇ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢂⠲⡰⠀⢠⣤⣤⣤⢀⡄⠀⠃⠀⠀⠉⡡⠰⠀⡁⡶⢴⡟⡛⡇⠀⠠⠀⠄⠸⠿⠸⡏⠼⢿⠿⣿⡇⢄⣀⣀⣀⢨⠤⠤⠤⠤⠤⠤⠤⢀⣀⣀⣀⠀⣿⣿⣿⣿⣿⡇⣾⣿⣿⣿⡟⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠀⠀⠀⠀⠈⠉⠀⠁⠀⠀⠈⠁⣾⣦⣈⣀⣄⣿⣯⣥⣥⣥⣷⣧⣌⣈⡸⣤⡍⢉⣁⣽⣿⣿⣇⣒⣒⣒⣒⠸⠥⠤⠤⠤⠤⠤⠤⢐⣒⡒⣒⣂⣿⣿⣿⣿⣿⡇⣿⣿⣿⡫⣿⣦ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⣿⣿⢷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡶⠆⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⡷⠟⠛⠳⠟⠁ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣴⣿⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠉⠉⠀⠀⠸⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠯⠇⠀⠀⠀⠀⠞⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢨⣿⣟⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠋⠀⠀⠀⢠⡀⠀⠀⠀⠀⠀⠀⠀⢶⣶⠀⠀⠀⠀⠀⠀⠀⠀⠒⣶⠀⠀⠂⠀⠀⠲⣶⣶⣶⠂⠀⠀⠀⠀⠀⢙ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠺⠿⠵⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠂⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠻⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⣸⠃⠀⠀⠀⠀⠀⠈⢛⣛⣓⠎⠁⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⠿⠿⠿⢿⢿⠟⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⣤⣤⣤⠂⠃⠀⠀⠀⠀⠀⠀⠀⠈⠿⡧⠀⠀⠀⠀⠀⠀ ䷩ 𝚕𝚒𝚗𝚎 933 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/epoleaks-report-march-2021-part-8-addendum/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/epoleaks-report-march-2021-part-8-addendum/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VIII_Addendum⠀✐ Posted in Deception, Europe, Microsoft, Patents at 8:31 pm by Dr. Roy Schestowitz Video_download_link http://techrights.org/videos/letter-privacy-berlin.webm Summary: The letter or the press release issued half a year ago explains the severity of the scandal we’ve been dealing with in recent days and will likely deal with well into April APPENDICES or addenda typically come at the end of a series, but this time we’d like to interject for a bit, especially when covering pertinent documents alluded to previously albeit not discussed in an in-depth fashion. “The above text says nothing about security incidents, which may compromise data and render it accessible to virtually everybody in the world.”This one merits further emphasis and an explanation of context/s. The video above is an informal discussion about this_press_release [PDF] which is only half a year old. It was mentioned in Part_VIII and its text is as follows (we also have an_HTML_version_here): 711.424.1 Press Release 17 July 2020 § After “Schrems II”: Europe needs digital independence⠀➾ After the adequacy of the “EU-US Privacy Shield” was invalidated by a recent decision issued by the Court of Justice of the European Union (CJEU), the Berlin Commissioner for Data Protection and the Freedom of Information, Maja Smoltczyk, is now calling on data processors in Berlin to move any personal data stored in the USA to Europe. In its decision of 16 July 2020 (“Schrems II”, C-311/18), the CJEU stated that the US authorities’ access to data belonging to European citizens is too extensive. As a result, personal data may generally no longer be transferred to the USA until the legal situation changes. There are some exceptions, especially in special cases stipulated by law, such as when booking a hotel room in the USA. One of the findings noted in the CJEU decision concerns the government surveillance measures in the USA, which involve the mass collection of personal data with no clear limitations. This contradicts the Charter of Fundamental Rights of the European Union (Paragraph 180 et seq. of the Decision). The CJEU also indicates that European citizens are unable to request a judicial review of the surveillance measures carried out by the US authorities. This violates the European fundamental right to effective legal protection. Personal data may only be transferred to third countries that ensure a level of data protection that is equivalent to the essence of the European fundamental rights. As the findings of the highest European court suggest that is not the case in the USA, the decision issued by the CJEU has invalidated the adequacy of the “EU-US Privacy Shield”, which was previously the basis for many personal data transfers to the USA. By contrast, the CJEU has ruled that “standard contractual clauses” are admissible under certain conditions; standard contractual clauses can be established between European companies and providers in third countries to ensure the European level of data protection abroad. Before the first data transfer, however, the CJEU emphasises that both European data exporters and third-country data importers are obliged to check whether the data could potentially be accessed by government authorities in the third country in a manner that goes beyond the access rights granted under European law (Paragraphs 134 et seq. & 142 of the Decision). If such rights of access are enjoyed by the government authorities, data may not even be exported on the basis of standard contractual clauses. Any data that has already been transferred to any such third countries must be retrieved. Contrary to the prevalent practice to date, data cannot be exported merely on the basis of standard contractual clauses (Paragraph 126 et seq. of the Decision). Press Officer: Dalia Kues Office: Cristina Vecchi Email: presse@datenschutz-berlin.de Friedrichstr. 219 D-10969 Berlin Tel.: +49 301 388 9900 Fax: +49 302 155 050 ===================================================================== The CJEU emphasises that the data protection supervisory authorities must prohibit unlawful data exports according to these new standards (Paragraphs 135 & 146 of the Decision), and that data subjects may claim damages for the unlawful exportation of personal data (Paragraph 143 of the Decision). This may especially include non- material damage (solatia); the amount of compensation must act as a deterrent in accordance with European law. The Berlin Commissioner for Data Protection and the Freedom of Information calls on all controllers under her supervision to observe the CJEU’s decision. Controllers who transfer personal data to the USA, especially when using cloud-based services, are now required to switch immediately to service providers based in the European Union or a country that can ensure an adequate level of data protection. Maja Smoltczyk: “The CJEU has made it refreshingly clear that data exports are not just financial decisions, as people’s fundamental rights must also be considered as a matter of priority. This ruling will put an end to the transfer of personal data to the USA for the sake of convenience or to cut costs. Now is the time for Europe to become digitally independent. The CJEU has explicitly obliged the supervisory authorities to prohibit all unlawful data transfers, and we gladly accept the challenge. Of course, that not only applies to data transfers to the USA, which have already been outlawed by the CJEU; we must also check whether similar or perhaps even greater problems are involved in data transfers to other countries, such as China, Russia or India”. The above text says nothing about security incidents, which may compromise data and render it accessible to virtually everybody in the world. It happened many times in the past. The very practice of outsourcing data — no matter if within one’s national jurisdiction or outside it — is a bad idea. They just need to hire competent security professionals, employed in-house and regulated by rules and regulations of the employer, not only national laws. In light of new revelations we expect this scandal and its coverage to last well into springtime. This is a very big deal, not just to the EPO and to Microsoft. More people are becoming involved now. █ ䷩ 𝚕𝚒𝚗𝚎 1104 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/epoleaks-report-march-2021-part-8/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/epoleaks-report-march-2021-part-8/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VIII:_The_Aftermath_of Schrems_II_in_Europe⠀✐ Posted in Deception, Europe, Law, Microsoft, Patents at 8:27 am by Dr. Roy Schestowitz Previous parts: * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Intro):_A_Fresh_Data Protection_Scandal_Brewing_at_the_EPO? * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_I_(Start_of_Series): Enter_the_“Cloud_of_Unknowing…” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_II:_Steve_Rowan Announces_Microsoft_“Outlook_Migration” * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_III:_The_PATRIOT_Act and_Mass_Surveillance * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_IV:_The_US_CLOUD_Act Passes_Without_Public_Debate * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_V:_The_EU_GDPR * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VI:_A_Not-so-safe Harbour * EPO_and_Microsoft_Collude_to_Break_the_Law_—_Part_VII:_Lipstick_on_a_Pig… * YOU ARE HERE ☞ The Aftermath of Schrems II in Europe 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇Non-EU cloud services⦈ Non-EU cloud services could be spying on your data! Summary: “…it is something of a mystery as to why a patent office bearing the name “European” would decide to hitch its horse to the Microsoft bandwagon as the EPO has done.” One of the most immediate effects of the Schrems II judgment was to reignite the discussion about “data sovereignty” in Europe. On 17 July 2020, the day after the CJEU delivered the Schrems II judgment, Berlin’s Commissioner for Data Protection and the Freedom of Information, Maja Smoltczyk, issued a press_release entitled “After “Schrems II”: Europe needs digital independence”: “A couple of months later, in October 2020, ambitious plans for an “EU cloud initiative” were announced and it was reported that the EU intended to spend up to €10 billion over the next seven years to help build up a homegrown cloud computing sector capable of competing with foreign multinational corporations such as Amazon, Google and Alibaba.”“The CJEU has made it refreshingly clear that data exports are not just financial decisions, as people’s fundamental rights must also be considered as a matter of priority. This ruling will put an end to the transfer of personal data to the USA for the sake of convenience or to cut costs. Now is the time for Europe to become digitally independent.” A couple of months later, in October 2020, ambitious plans for an “EU cloud initiative” were announced and it was reported that the EU intended to spend up to €10 billion over the next seven years to help build up a homegrown cloud computing sector capable of competing with foreign multinational corporations such as Amazon, Google and Alibaba. Since the beginning of the new Von der Leyen Commission, EU policymakers have been pushing_for_greater_independence_from_US_and_Chinese_technology, in particular in the field of data. The EU Commissioner for the Internal Market, Thierry Breton, has repeatedly stated that he wants Europe to win the “battle for industrial data” and for European data to be “stored and processed in Europe”. It remains to be seen how much substance there is to the rhetoric of EU technocrats like Breton and whether or not the ambitious plans for the “EU cloud initiative” will in fact blossom and bear fruit. Whatever the longer-term outcome may be, there seems to be a discernible increase in the number of European cloud service providers claiming to provide “CLOUD Act-safe” alternatives to the offerings of large US corporations such as Google, Amazon or Microsoft. “It remains to be seen how much substance there is to the rhetoric of EU technocrats like Breton and whether or not the ambitious plans for the “EU cloud initiative” will in fact blossom and bear fruit.”This rapidly growing sector includes smaller providers such as the German-based IONOS headquartered in Berlin and the Austrian-based Anexia headquartered in Klagenfurt. Against the backdrop of well-founded legal and political concerns about reliance on US-based cloud providers and clearly articulated aspirations to European “data sovereignty”, it is something of a mystery as to why a patent office bearing the name “European” would decide to hitch its horse to the Microsoft bandwagon as the EPO has done. Perhaps some bean-counter at the EPO came to the conclusion that there was a “sound business case” for this move. But, as Berlin’s Data Protection Commissioner has noted, such decisions about outsourcing data processing are “not just financial decisions”. They also have important legal and political aspects which deserve to be given serious consideration. “…it is something of a mystery as to why a patent office bearing the name “European” would decide to hitch its horse to the Microsoft bandwagon as the EPO has done.”Before committing to any decision of this kind it’s always a good idea to “know your vendor” and to make sure that they are fully compliant with the local data protection regulations. Bearing that in mind, in the next part we will turn our attention to the EPO’s chosen cloud service provider and take a look at some of its run-ins with various European data protection authorities. █ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠋⠉⠹⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⡿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣭⣥⣤⠀⠀⠀⠀⠈⠉⠀⠀⠀⠀⠀⠘⢽⣿⣿⣿⣿⣿⡿⣿⢿⣿⣿⣿⣿⣛⣻⣻⣿⣿⣿⣿⣿⣿⡟⠻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠟⢻⣿⣿⣿⣿⣿ ⣿⣿⣿⡇⣿⣿⡟⠛⡿⠿⠿⡿⡿⢿⡿⡿⡟⢿⡿⢿⢿⣿⢆⢈⡛⡀⠀⠀⠀⠀⠀⢀⣄⠀⢺⣿⣿⣿⣿⣿⣧⣾⣿⣿⣿⣿⣿⣿⣿⢟⣻⣿⣿⣿⣿⠿⠿⠟⠊⠛⢻⣿⣿⣿⣿⣿⣻⣿⣿⠋⠀⠀⠀⢛⣿⣿⣿⣿ ⣿⣿⣿⡇⣿⣀⣰⣶⣧⣴⣤⣬⣴⣤⣤⣤⣤⣼⣥⣬⣤⣥⣤⣤⡇⣿⡆⠀⠀⠀⠀⣤⡤⠤⠛⢿⣿⣿⣿⣿⠿⠿⣿⣿⣿⢸⣿⣿⣧⢿⣿⣯⣯⣯⣦⣤⣤⣤⣤⣤⣤⣤⣤⣤⣿⣿⣭⣭⣿⡁⠐⠶⠀⠨⢿⣿⣿⣿ ⣿⣿⣿⡅⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠋⠉⠙⠛⠛⠛⢃⣿⣧⠀⢀⣶⡇⣿⣗⣸⠠⠝⠿⠿⠿⠷⠻⢏⣾⣿⣿⠐⠁⠁⠀⢸⣿⠉⣭⠯⣍⢹⡟⢻⠛⠛⠿⠿⠻⠟⡟⣛⠻⠻⠿⠟⢻⣿⠀⠀⣴⣬⣿⣿ ⣿⣿⣿⣷⣤⣠⣷⣶⣶⢰⣶⠶⡶⡶⣶⠶⠶⠄⠀⠀⠀⠀⠈⠛⢻⣿⣿⣿⣾⣿⡇⣿⣿⣿⣖⣒⣒⣚⣒⣖⣖⣺⣿⣿⣿⠀⠀⠀⠀⢸⣿⣄⣉⣏⣉⣸⣴⣦⣤⣬⣤⣤⣥⣤⣷⣭⣴⣥⣤⣮⣼⣿⢸⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⢸⣏⠉⢰⢁⠀⡦⢍⣆⠈⠛⠀⠀⠀⢀⣀⡹⣿⣿⣿⣿⣧⣭⣭⣭⣭⣭⣍⡉⠉⠉⠉⠉⠉⠉⠉⠀⠀⠀⠀⠘⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⡛⣛⣛⣛⣛⣛⣼⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⢸⣿⣟⣿⣟⣿⣿⣷⣿⠀⠁⠂⠀⢀⣬⣽⣿⠾⠿⢿⣿⣿⣿⣿⡟⣿⣿⣷⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⠀⠀⠀⠀⠀⠀⠀⠀⣀⣴⢟⣻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣌⣉⣉⡉⠉⠉⠉⠉⠉⠀⠀⠀⢰⣿⣿⣿⠋⠀⠀⠈⢻⣿⣿⣿⡇⣿⣿⠏⠻⣿⠩⢭⠙⡝⣩⢹⡩⢽⢩⣹⠏⢻⢹⣿⠩⢽⣿⠀⠀⠀⠀⠀⠐⣷⣌⠿⢟⣸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡁⠠⠦⠀⢹⣿⣿⣿⡇⣿⣧⣤⣤⣽⣶⣾⣶⣾⣶⣾⣶⣾⣶⣾⣾⣶⣶⣾⣶⣾⣿⠀⠀⠀⠀⠀⠀⣺⣿⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣻⣿⣿⣿⣿⣾⡆⢹⡏⠖⠛⠛⠙⠛⠙⠙⡯⠮⠙⠛⠗⠂⣶⣶⢸⣿⣿⣿⣧⠉⠉⠉⠉⠉⠉⠉⠉⠉⠉⠉⣉⠉⠉⠉⣉⣉⣉⡉⠉⢉⣩⣄⠀⠀⣤⣴⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣶⣶⣾⣿⣿⣿⣿⣿⣶⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠦⠶⣿⣿⣿⣿⣧⢠⣿⣿⣿⣇⣄⢈⣿⣿⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣷⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⠄⠀⠀⠀⠀⠠⣤⣤⣾⣿⣿⣿⣿⣷⣤⣤⣴⣦⡄⠀⠀⠀⠀⠀⠀⢀⣼⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⣹⣿⠟⢹⣷⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⠀⠀⠀⠀⠀⠈⠉⠙⠻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣇⠀⠀⠀⠀⠀⢰⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣮⡿⢤⣾⣽⣿⣯⣏⠛⢿⣻⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣆⠀⠀⠀⠀⠀⠀⠀⣴⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⢸⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠾⠛⢻⡟⢷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡷⠀⠀⠀⠀⢀⣀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡀⠀⠀⠀⢰⣿⡇⣸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠛⠁⠀⠀⠀⠁⠘⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⢀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⠀⠀⢀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⡀⠀⠀⠀⢠⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠃⠀⢀⣰⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣿⣿⣿⣶⣄⣀⣾⣿⣿⣿⣿⢻⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ䷩ 𝚕𝚒𝚗𝚎 1255 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/epo-waffle-on-microsoft/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/epo-waffle-on-microsoft/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ Response_to_the_EPO’s_Response_to_Techrights_About_Microsoft_‘Cloud’_(Still Failing_to_Justify_the_GDPR_Violations)⠀✐ Posted in Deception, Europe, Microsoft, Patents at 8:47 pm by Dr. Roy Schestowitz Video_download_link http://techrights.org/videos/epo-damage-control.webm Summary: In another ‘damage-limiting’ or face-saving exercise, as soon as we published details about the illegal Microsoft deal (outsourcing all key data to the US) EPO management issued a baffling and severely flawed statement to staff; the video above is an informal response to it FOR those who don’t know, Microsoft has given us a gift — a timely worldwide (global) downtime that serves as a cautionary tale to outsourcers (a.k.a. “clown computing” experts and gurus). “The long track record of lying makes line managers and top-level managers anything but credible.”Recently there has been downtime in GitHub, LinkedIn, and now Azure… Microsoft E-mail_servers_are_down_in_unprecedented_numbers and GitHub_became_a censorship_machine_looking_to_cover_up_a_massive_blunder. Microsoft itself got cracked not too long ago (its source code got copied across after Microsoft’s internal operations had been hijacked) and no amount of lying or excuses could stick for very long. In fact, all this confidential data may have already been leaked. Azure too had a major data breach only weeks ago. The list goes on and on… so we’re omitting links (reports about this are all over the place and very easy to find; some are as recent as hours ago and our Daily Links contain many). To give just one example, hours ago there was “Microsoft customers locked out of Teams, Office, Xbox, Dynamics – and Azure Active Directory breakdown blamed” in British_press that’s in Microsoft's_pocket (which one can expect to parrot Microsoft’s face-saving excuses). But this post isn’t about Microsoft losing control of just about everything… everything. It’s a catastrophe for them. This post is about the EPO’s (management) ‘love letter to Techrights’. “Latest statement,” a source told us, seem to concern us directly. “The latest statement issued on the EPO Intranet about using Microsoft cloud services is [shared] for information. This statement was published internally on Friday (12 March) – no time-stamp given. Quite possible that it is a reaction to the Techrights_posting_on_Friday… :-)” We’ve examined it closely. Clearly a response to the series and a very weak response. Very weak. Unlike (I think) trying to bribe pay my friends. The problem they have at the management of the EPO is that their staff trusts Techrights, not their managers. The long track record of lying makes line managers and top-level managers anything but credible. As somebody put_it yesterday in relation to the_e-EQE_blunder: “For those who are seasoned observers of the EPO, it is no surprise that their management would decide to issue a self-congratulatory statement that others might find difficult…” The words discussed in the video above are available as_a_raw_text_file or as simplified HTML below: Home > Organisation > DG 1 > The Vice-President > Announcements > 2021 12.03.2021 § Follow-up information on the use of MS cloud services in DG 1⠀➾ The VP 1 news item “Outlook Migration to the Cloud” of 04.02.2021 was based on the following main rationale: Given Microsoft’s obligation under US law to grant security and intelligence agencies access to data stored in its cloud, very sensitive data of the Organisation itself and data our applicants expect us to treat with special care need to be encrypted. This includes information classified as “EPO strictly confidential” (information unauthorised disclosure of which could compromise or cause severe damage to the EPO or could cause damage to an identifiable individual or his or her reputation), and additionally the highly sensitive data of unpublished patent applications and information relating to unpublished patent applications. Considering the feedback received after publication of VP 1′s item of 04.02.2021 and the results of further investigations with major stakeholders (BIT, DPO, Patent Law, Procedural Support, HR, PD Communication), the documents which are to be treated in the same way as “EPO strictly confidential” information for the purposes of the patent grant process, and so must not be sent by email without encryption, have been limited to: i. application documents of unpublished applications (EP, PCT, national) ii. search reports, search opinions, communications and decisions relating to unpublished applications iii. search statements resulting in the disclosure of unpublished application documents (Guidelines B-III, 2.4; B-IV, 2.4) Previous section (iv) has been deleted. The documents mentioned there, e.g. documents which are marked as non-public in DI+, can be sent without encryption. This also applies to draft (oppo) decisions, legal opinions and votums. There have been requests for a comprehensive list of documents/ information used in the patent grant process and its administration which can be shared using MS cloud services without encryption. Due to the endless possibilities of exchanging data using MS cloud services, this is unfortunately not possible. However, if you are dealing with information which you consider to be highly sensitive or strictly confidential, you may, of course, apply the rationale set out above and encrypt it. Units dealing frequently with highly sensitive data (e.g. Investigation Unit, HR or Health & Safety) have their own encryption policies and will provide you with guidance on this on request. Call for CKT Daytips If you have ideas about ways to efficiently share data relating to unpublished patent applications either without using MS cloud tools or by clever encryption, please forward them to the CKT Daytip team. Points to consider In the meantime, please also consider the following points: - It is recommended that you apply the rationale defined above to all MS cloud services and products and to Skype for Business. - It is recommended that you share the text of an unpublished application (possibly annotated) by copying and pasting the link to DI+ into an email. - For consultations during the search phase (e.g. on CII or CPC classes), it is possible to share the text of an unpublished application via screen-sharing in Skype or MS Teams but you should do this only if the session is not recorded or transcripted. Any chat session/whiteboard, however, is permanently stored and should not be used for sharing unpublished material. - No encryption is necessary for any exchanges with applicants per email (i.e. proposal of amendments) as, by then, examination of the patent application has already progressed to the stage that it has been published. - Scans of annotated unpublished patent documents made on network printers should go on to a USB-stick and not to an email address. Further instructions on USB scanning will be provided as soon as possible. Please delete the file on the stick immediately after transferring it to your laptop/PC. The above was published on the EPO’s Intranet, so the target audience was pretty much all staff, especially DG 1. Notice how many times they mention “encryption” (even if it’s all fake encryption, Microsoft gets access to everything and so does the US Government) and the lack of justification based on the law. They know they walk on water or quicksand here… █ ䷩ 𝚕𝚒𝚗𝚎 1455 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/irc-log-140321/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/irc-log-140321/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ IRC_Proceedings:_Sunday,_March_14,_2021⠀✐ Posted in IRC_Logs at 2:49 am by Needs Sunlight 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇H 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇HTML5_logs⦈_ #techrights_log_as_HTML5 #boycottnovell_log_as_HTML5 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇H 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇HTML5_logs⦈_ #boycottnovell-social_log_as_HTML5 #techbytes_log_as_HTML5 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇t 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇text_logs⦈_ #techrights_log_as_text #boycottnovell_log_as_text 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇t 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇text_logs⦈_ #boycottnovell-social_log_as_text #techbytes_log_as_text Enter_the_IRC_channels_now =============================================================================== § IPFS Mirrors⠀➾ CID Description Object type IRC log for  QmPzxpwubFVqiJV89XHqX1Vouj2PbLBgnA41XhS1zDQj3b #boycottnovell 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #boycottnovell  QmccWPBTSNhEFhyg9BSVsQMchLMwGKRvcCe3if8C8Pn25d (full IRC log 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ as plain/ASCII text) IRC log for #boycottnovell-  QmaWkchLpZSjBwZPpZwRU3cujBzDr7cAPf3uTDZjSLZnxA social 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #boycottnovell-  QmdLrvncZJgiispehGGnttMXDnJYmgkzYvrbjsMsP6bR6P social 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ (full IRC log as plain/ASCII text) IRC log for  QmZncUqYBbPvjJG5FhbXWJ3fHXeBQ1xhwi3B2cm6GQ1eMn #techbytes 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #techbytes  QmXNeTUdfKYyATiisJFaK4hKxeLxusztz8uFbwKeZcJ5US (full IRC log 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ as plain/ASCII text) IRC log for  QmdFQKFVbUZ8xAnyhp97MRgpTjiQ9x6L2CoFLYijP8AUoE #techrights 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #techrights  QmWdiCRqXPjZW4gmP6M9LvcjuLa98LRfG8JdjybhTin1oK (full IRC log 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ as plain/ASCII text) 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇IPFS logo⦈ § Bulletin for Yesterday⠀➾ Local_copy | CID (IPFS): QmSA9tsJUQyqpRRdqkKF9RwzKJcTetjDtoCFf54WRpJzdT ䷩ 𝚕𝚒𝚗𝚎 1569 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/linu-dot-dev/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/linu-dot-dev/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ Links_15/3/2021:_Linux.dev_and_Wine-Staging_6.4_Released⠀✐ Posted in Site_News at 12:01 pm by Dr. Roy Schestowitz 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇GNOME bluefish⦈ § Contents⠀➾ * GNU/Linux o Distributions o Devices/Embedded * Free_Software/Open_Source * Leftovers * § GNU/Linux⠀➾ o § Desktop/Laptop⠀➾ # ⚓ System76_Adds_Thelio_Mira_to_Linux_Desktop_Line⠀⇛ The powerful Thelio Mira runs Ubuntu-based Pop!_OS (or Ubuntu 20.04 LTS, 64-bit) and includes a carefully engineered cooling system “to prevent throttling and allow your pro-grade components to perform to their maximum potential.” Like other System76 offerings, the Thelio Mira also features handcrafted details, such as the solar system design of the exhaust vent and the stylized mountains on the powder-coated aluminum chassis. o § Audiocasts/Shows⠀➾ # ⚓ Josh_Bressers:_Episode_262_–_A_discussion_with_Loris_and Pop_from_Sysdig⠀⇛ Josh and Kurt talk to Loris Degioanni and Dan from Sysdig. Sysdig are the minds behind Falco, an amazing open source runtime security engine. We talk about where their technology came from, they huge code donation to the CNCF and what securing a modern infrastructure looks like today. o § Kernel Space⠀➾ # ⚓ Porting_Linux_to_Apple_M1_Macs_is_proving_trickier_than previously_imagined⠀⇛ The crowdsourced Asahi Linux project has published its first detailed status report to summarize the progress, and challenges, of getting Linux to run natively on the Apple M1 Macs. Porting an operating system as complex as Linux to a system-on-a-chip as closed as the Apple Silicon wasn’t going to be a walk in the park. The project’s first detailed progress report gives a glimpse of Apple’s unique boot process, and the challenges it presents to getting another operating system to run on the hardware. “The way they [Apple Silicon Macs] work is more akin to embedded platforms (like Android phones, or, of course, iOS devices), but with quite a few bespoke mechanisms thrown in. However, Apple has taken a few steps to make this boot process feel closer to that of an Intel Mac, so there has been a lot of confusion around how things actually work,” wrote Asahi’s founder and lead developer, Hector Martin. # ⚓ The_Reverse-Engineered_Corsair_PSU_Linux_Driver_Continues To_Be_Improved_Upon_–_Phoronix⠀⇛ Added for Linux 5.11 was an independently- developed, reverse-engineered Corsair power supply driver for the company’s desktop PSUs supporting their USB-based “LINK” interface for exposing voltage, temperature, current, and Wattage under Linux. This open-source “corsair-psu” driver has continued maturing as well since being mainlined. The Corsair-PSU driver was added to Linux 5.11 and supports Corsair LINK-enabled power supplies such as the RMi / HXi / AXi power supply families. This driver is a conventional HWMON driver and allows for the sensors to be exposed through conventional sysfs interfaces for easy querying by user-space tools. # ⚓ Lenovo_Continues_Improving_Their_Linux_Support_Down_To_The Hardware_Sensors_–_Phoronix⠀⇛ One of the great Linux hardware milestones of 2020 was Lenovo beginning to offer Linux pre-loads on their desktops/laptops with the likes of Fedora and Ubuntu. But it’s been great just not for having another major OEM offering Linux pre-loads but because they have also been engaging directly on Linux support improvements both through their engineers and at partners like Red Hat. That upstream support work has continued nicely. Since Lenovo began offering Linux pre-loads, their own engineers and Linux partners have worked on Lenovo hardware support improvements including the likes of palm sensor support, ACPI Platform Profile support, and various other improvements to benefit their devices under Linux. # § Kernel.org⠀➾ # ⚓ Linux.dev_mailing_list_service⠀⇛ We are pleased to announce the availability of a new mailing list service running under the new lists.linux.dev domain. [...] Linux development started in 1991 and has been ongoing for the past 30 years at an ever-increasing pace. Many popular code collaboration platforms have risen throughout these three decades — and while some of them are still around, many others have shut down and disappeared without offering any way to preserve the history of the projects they used to host. Development via mailed-in patches remains the only widely used mechanism for code collaboration that does not rely on centralized infrastructure maintained by any single entity. The Linux developer community sees transparency, independence and decentralization as core guiding principles behind Linux development, so it has deliberately chosen to continue using email for all its past and ongoing collaboration efforts. o § Benchmarks⠀➾ # ⚓ Lenovo_M93_Ultra_Small_PC_–_Benchmarks_–_Week_2⠀⇛ This is a weekly blog looking at the Lenovo M93 Ultra Small Desktop PC running Linux. For this week’s blog, we’ve run a variety of benchmarking tests on the Lenovo M93 together with four other systems to put the results into context. All the tests use the Phoronix Test Suite, unless otherwise stated. For ease of reference, each system’s specifications are listed on every page. Together with the Lenovo M93 Ultra Small PC, we’ve run benchmarks on two Mini PCs from AWOW, the AK41 and the NYI3. We’ve also included a laptop from ASUS (UX305FA), and a Mini PC from Gigabyte (BXBT- 1900). They are all low-power machines. All the machines are running identical versions of software, and configured to ensure consistency between results. The Manjaro rolling distro is used. Let’s kick off the benchmarks with some system tests. # ⚓ AMD_EPYC_7003_“Milan”_Linux_Benchmarks_–_Superb Performance⠀⇛ It’s been one and a half years already since the EPYC 7002 “Rome” processors launched. It’s hard to think it’s been that long due not only to the pandemic but the incredible performance of these Zen 2 server processors. The EPYC 7002 series continues to largely outperform Intel’s Xeon Scalable processors and while Ice Lake is coming soon, for now AMD is expanding their lead with today’s EPYC 7003 “Milan” processor launch. We have begun our testing of AMD EPYC Milan processors in recent weeks under Linux and have preliminary performance figures to share today as well as more information on these next-gen server/HPC processors. o § Applications⠀➾ # ⚓ Best_Task_Managers_for_Linux⠀⇛ This article will cover a list of useful task management applications available for Linux. These applications allow you to view resource consumptions of individual processes and allow you to set up alerts and manage their behaviour. The term “resource consumption” here mainly refers to CPU, memory and network usage. Task management tools allow you to better control your system by providing useful information about resource consumption of individual processes. These tools are especially useful for system admins, application developers and gamers who routinely monitor process behavior. # ⚓ 7-zip_is_Officially_Available_on_Linux_(in_Alpha_for_now)⠀⇛ The popular open-source file archiver 7-Zip is now officially available for Linux. The developer released 7-Zip 21.01 alpha build for Linux x86, x86-64, ARMv7, and ARM64 architectures. Although Linux users could get support for the 7- Zip archive format through an unofficial program known as p7zip, the project was last updated in 2016. With the arrival of an official 7-Zip program for Linux, users will be able to receive updated support on their Linux system, unless you’re already comfortable with PeaZip o § Instructionals/Technical⠀➾ # ⚓ How_to_install_and_use_GParted_on_Linux_Mint_–_Linux_Hint⠀⇛ Gparted is a popular and free tool for Managing disks on Linux. Using GParted, we can create and manage the disk partitions. It allows us to create the new partition tables, partitions, views the disk information, etc. I am using Linux Mint 20 for executing the commands and preparing this post. # ⚓ vmadm:_helping_me_manage_my_local_libvirt_VMs⠀⇛ vmadm can also generate an SSH host certificate, an SSH host key signed with an SSH CA key. This allows me to log into a new VM without having to accept its host key – even if the host key has changed from the previous VM with the same name. # ⚓ How_to_Install_Drupal_8_on_Fedora?_–_Linux_Hint⠀⇛ Drupal is a free and open-source Content Management System (CMS). It is released under GNU General Public License (GPL) terms, which is one of the most successful projects ever for open source. Almost 2.5 percent of the world’s website uses Drupal since it offers high standard features such as simple authoring of content, stable performance, and excellent security. # ⚓ How_to_move_from_Ops_to_DevOps,_Step_by_Step [Ed: Swapping between silly buzzwords]⠀⇛ # ⚓ How_to_Install_Flameshot_Screenshot_Tool_in_Linux⠀⇛ Flameshot is an open-source screenshot tool available for Linux, Mac, and Windows. It is created with C++ and QT5 language. Every popular Linux distribution comes with a screenshot tool but they lack few functionalities that flameshot offers. # ⚓ How_to_Install_Chromium_on_Ubuntu_20.04_(LTS)_and_20.10_– Linux_Hint⠀⇛ Chromium is an open-source, multi-platform web browser that is launched and managed by Google. Chromium is a fast, stable, and secure web browser. Many other browsers, such as Edge and Opera, are even based on Chromium code. Chromium and Chrome sound similar, but there is a small difference between the two browsers. Chrome is not open-source and contains many proprietary features that belong exclusively to Google. If Chrome is known as the supreme leader of web browsers, Chromium holds the major parts of browsers together. # ⚓ Setup_or_Change_Time-Zone_using_set-timezone_Command_– Linux_Hint⠀⇛ Your computer sets the time and date when it syncs with an online server. In some cases, the date and time may change when the computer is connected to a server with a different time zone. So, you may need to modify the time zone in this case. Your system’s time zone is set automatically during the installation process of Ubuntu, but it can be modified. This article shows you how to set up or change the time zone of your Ubuntu 20.04 (LTS) or 20.10 system. # ⚓ How_To_Install_and_Configure_Putty_SSH_Client_on_Linux Desktop⠀⇛ Putty SSH client is a free and open-source SSH client that you can use on a Linux system to connect your server, system, network storage, and other SSH clients remotely. Putty allows you to save your sessions on your local Linux directory. Despite having the Linux bash, you might wonder why you would need to install the Putty tool on your Linux system? Well, the answer would be, most servers are built on Linux, but clients might be using Windows, macOS, or other operating systems. It is hassle-free to have the same remote client tool for both ends. # ⚓ How_to_Install_Ntopng_on_Ubuntu_20.04⠀⇛ Ntopng is free, open-source software that provides a web interface for real-time network traffic monitoring. It is the next-generation version of the original ntop which shows the network usage, statistics, and analytic. It supports different operating systems like Linux, Mac OS, BSD, and Windows. There are professional and enterprise editions of Ntopng which have licensing requirements, and the free community edition. In this tutorial, we will learn how to install ntopng tool on Ubuntu 20.04 and use it to monitor the local network. # ⚓ How_to_Install_Ansible_AWX_on_Ubuntu_20.04_LTS⠀⇛ Ansible AWX is a free and opensource front-end web application that provides a user interface to manage Ansible playbooks and inventories, as well as a REST API for Ansible. It is an open source version of Red Hat Ansible Tower. In this guide, we are going to install Ansible AWX on Ubuntu 20.04 LTS system. We have previously penned down a guide on how to install Ansible AWX on CentOS 8. # ⚓ How_to_Use_Clonezilla_Live_to_Back_Up_Your_Hard_Drive⠀⇛ This tutorial is going to show you how to use Clonezilla Live to back up your hard drive. Clonezilla is a free open-source and reliable tool for bare metal backup and recovery of disk drives. # ⚓ How_to_connect_to_remote_Windows_machine_from_Lubuntu_linux using_Remmina⠀⇛ Remmina is a remote desktop client for computer operating systems. It supports the Remote Desktop Protocol (RDP), VNC, NX, XDMCP, SPICE and SSH protocols. Why use Remmina? Remmina is an easy, extremely convenient and widely used client for access to remote machines. Undoubtedly, as administrators we have to constantly change our needs to connect to a Linux machine, a Windows server with a terminal with an emulator, SSH or whatever we can think of. That is why the flexibility of this application is exceptional and we recommend it to you. # ⚓ How_to_install_KDE_Plasma_GUI_on_Kali_Linux_Desktop_–_Linux Shout⠀⇛ KDE Plasma GUI Desktop installation on Kali Linux will allow users to easily change their Desktop environment from the default XFCE if they don’t like it… Kali Linux is an open-source Debian-based security Linux distro that comes with various tools to perform hacking and penetration testing. Although the developers have made the XFCE interface very simple and easy to use, yet if someone is not comfortable with that then he or she free to change the Kali Linux desktop environment with some other available options such as KDE, GNOME, Cinnamon, Budgie, and more… However, here we will talk only about the KDE Plasma, developed and maintained by the huge community of KDE (K Desktop Environment) that also provides a large number of free and open- source software. # ⚓ How_to_store_AWS_user_access_key_and_secret_key_in Jenkins⠀⇛ You can store your AWS keys securely in Jenkins credentials. If you want to interact with AWS from your Jenkins server, you can store your AWS IAM user keys securely in Jenkins rather than openly using the keys in your Jenkins Pipeline. “CloudBees AWS Credentials” Jenkins plugin allows storing AWS IAM user credentials within the Jenkins Credentials API. We can then use these credentials in our pipeline and inject them in the pipeline with the “withAWS” step. To use “withAWS” step, we need to install the “AWS Steps Plugin” plugin. In this article, we will install the “CloudBees AWS Credentials” plugin and store the AWS IAM user’s secret key and access key in Jenkins using this plugin. We will install the “AWS Steps Plugin” so that we could use “awsStep” to inject the credential we created. We will perform S3 Upload Object and Download Object operation from within the pipeline to test the credential we created. # ⚓ How_To_Install_ReactJS_on_Ubuntu_20.04_LTS_–_idroot⠀⇛ In this tutorial, we will show you how to install ReactJS on Ubuntu 20.04 LTS. For those of you who didn’t know, React is an open-source JavaScript library for creating web frontend and UI components. It is developed and maintained by Facebook and a large community of developers. ReactJS can be used in the development of Web Applications or Mobile Apps. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by- step installation of the ReactJS on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint. # ⚓ How_To_Install_Mageia_8_(Dualboot,_UEFI,_and_VM_Methods Included)⠀⇛ This tutorial explains how to install Mageia 8 operating system to your computer. This will be a little bit different to installing Ubuntu as the installer requires two stages of installation separated with a restart (similar to Fedora’s one). You can practice this to be normal, dualboot, or virtual machine as you wish for either 32 bit or 64 bit type of computers. Now let’s go! # ⚓ Display_Linux_System_Information_In_Terminal_Using_Macchina –_OSTechNix⠀⇛ There are many tools and methods exists to display a system’s details in Linux. You can use tools like ScreenFetch, Neofetch, Inxi to get the Linux system information. You can also use Python’s import module to view the details of a Linux system. Today, we will see yet another similar tool. Let us give a warm welcome to a newcomer named Macchina to the club! Using Macchina, we can get the basic system information of a Linux machine in the Terminal. Macchina is a basic system information fetcher. It is similar to Neofetch but with a focus on performance and minimalism. It is even faster than Neofetch tool. For those wondering, Macchina is an Italian word for Machine. Macchina is free and open source program written in Rust programming language. It supports Linux, BSD and the Windows support is coming soon. o § Wine or Emulation⠀➾ # ⚓ Wine_staging_6.4_release⠀⇛ Binary packages for various distributions will be available from: https://www.winehq.org/download Summary since last release * Rebased to current wine 6.4 (686 patches are applied to wine vanilla) Upstreamed (Either directly from staging or fixed with a similar patch). * kernel32: Implement K32GetMappedFileName. * wow64cpu: Add stub dll. * ntdll: Add a stub implementation of Wow64Transition. * aclui: Add basic ACE viewer. * ntdll: Implement RtlQueryRegistryValuesEx * setupapi/tests: Add more tests for SPFILENOTIFY_FILEINCABINET handler. * setupapi: Fix CabinetName passed to SPFILENOTIFY_CABINETINFO handler. * setupapi/tests: Add tests for cabinet name passed to SPFILENOTIFY_FILEEXTRACTED. * setupapi: Fix parameters of SPFILENOTIFY_FILEINCABINET handler. * ddraw: Create rendering targets in video memory if possible. Added: * [50624] Waves Central 12.0.5 fails to start. Updated: * ntdll-NtAlertThreadByThreadId * ntdll-Junction_Points Where can you help * Run Steam/Battle.net/GOG/UPlay/Epic * Test your favorite game. * Test your favorite applications. * Improve staging patches and get them accepted upstream. As always, if you find a bug, please report it via https://bugs.winehq.org Best Regards Alistair. # ⚓ Wine-Staging_6.4_Released_With_686_Patches_Rebased_Against Upstream⠀⇛ Building off Friday’s release of Wine 6.4 is now Wine-Staging 6.4 with an extra 686 patches atop this code-base for allowing Windows games and applications to run on Linux. Wine-Staging 6.4 comes in at 686 patches in size, which is slightly fewer than the prior bi-weekly release candidate. Wine-Staging 6.4 upstreamed its WOW64CPU DLL stub, a basic ACE viewer added with ACLUI, NTDLL additions, K32GetMappedFileName support in Kernel32m and SETUPAPI fixes were all now accepted in mainline. # ⚓ How_to_Install_Wine_on_Ubuntu_to_Run_Windows_Software⠀⇛ When Windows users start using Linux, the major problem that they face is the unavailability of certain software. But with the help of a compatibility layer like Wine, you can use Windows applications on Linux easily. In this article, we are going to talk about what Wine is and how you can install it on your Ubuntu system. [...] Wine (originally an acronym of Wine Is Not an Emulator) supports Windows software and applications. The development of Wine has completely transformed gaming for Linux users. Similar compatibility layers such as Proton and CrossOver have also been developed to allow users to take full advantage of their Linux systems. o § Games⠀➾ # ⚓ Bonesweeper_mixes_Palaeontology_with_Minesweeper_where_you assemble_fossils_|_GamingOnLinux⠀⇛ Created by developer Cheeseness, who also made the wonderful Hive Time and again using Godot Engine, it’s currently in the Prototype stage but it’s already very playable and shows off what a brilliant idea it is. You visit dig sites to excavate bones by digging around them like you would in Minesweeper but without the failure as wrong clicks only slow you down, then when you’ve got enough fossils between digs you can then assemble their skeletons. # ⚓ Be_a_jerk_cloud_in_Rain_on_Your_Parade_–_releasing_April_15 |_GamingOnLinux⠀⇛ Ever wanted to just fly high, be a cloud and rain all over everything? Well you will be able to on April 15 when Rain on Your Parade releases letting me be a total jerk cloud. A nice casual comedy game about causing chaos, what’s not to love about this one? “Travel the world as a cute cardboard cloud set to rain on everyone’s parade! Help Cloudy the Cloud on its adventure to the mythical rain paradise: Seattle. Along the journey, you’ll face an array of unique settings, challenges, spoofs, and satire. Unlock new powers, meet quirky characters, draw custom cloud faces, collect cool hats, accessories, and so much more!” # ⚓ Luck_be_a_Landlord_gives_slot_machines_a_little_deck- building_flavour_|_GamingOnLinux⠀⇛ Luck be a Landlord is a fresh game out in Early Access from TrampolineTales that claims it’s a “roguelike deckbuilder about using a slot machine to earn rent money and defeat capitalism”. I will admit, that kind of description suckered me right in, I had to give this one a go. Built with Godot Engine, it has great Linux support too and there’s even a demo to try before you buy and try your luck. The idea is that you’ve moved into a new place that came with a slot machine, you use this to acquire money to pay your rent. Over time you build up the symbols on it like you’re creating a deck to increase your chances. There’s plenty of luck involved of course since it uses slot machine mechanics but there’s also plenty of strategy in how you build up the symbols and how they interact with each other. # ⚓ Neverwinter_Nights:_Enhanced_Edition_getting_another_major upgrade_|_GamingOnLinux⠀⇛ Showing some big continued dedication to Neverwinter Nights: Enhanced Edition, Beamdog have put up another huge Beta version with some pretty major additions. Development Build 8193.21 is available to try out on Steam (other platforms when stable), and it can be used along with any servers for multiplayer with the .20.1 release as normal so it’s easy to test out in your favourites. [...] Really great work from Beamdog all around here, especially the fractional scaling options enabling players to tweak the UI and text to their liking. I wish more games had that. # ⚓ The_Co-op_News_Punch_Podcast_–_Episode_27,_the_one_with_too much_gain_|_GamingOnLinux⠀⇛ The second GOL Podcast episode of 2021 is here, come get it while it’s hot and ranty as we cover a range of weird and wonderful topics in Linux, open source, gaming and more. As usual, it’s a very casual and frank chat between two friends (myself) and GOL contributor / Linux livestreamer Samsai about many different Linux- related topics. Apologies for my audio on this one, sadly the gain on my microphone amp was up far too high without me realising and so it’s definitely not as clear as previous episodes. o § Desktop Environments/WMs⠀➾ # § K Desktop Environment/KDE SC/Qt⠀➾ # ⚓ White_or_black_lines_in_Konsole_output_with_Plasma scaling⠀⇛ I love buying new hardware. Apart from the obvious joy of having a new toy, there’s an almost certainty that I’m going to face some fresh problems, related to this or that operating system. Karma definitely did not disappoint when I recently got meself a Lenovo IdeaPad 3, which I loaded with three operating systems, Kubuntu 20.10 included. In this Plasma-powered Groovy instance, I also set the HD scaling to 1.25, in order to be able to use the system comfortably on the 14-inch FHD screen. If you’ve followed my adventures with Plasma, specifically the good, the bad and the ugly of desktop scaling on my Slimbook, and then the fine results in Plasma 5.20, then you know things have improved massively, and there should be no issues. And yet there were. Some. Small ones. Weird ones. In Konsole specifically. I noticed white – or black – lines showing in the terminal output, whenever I’d move the cursor up and down. An issue that my sweet OCD demons cannot abide. # ⚓ Save_and_Load_KDE_Plasma_Configurations_with_This Applet⠀⇛ # § GNOME Desktop/GTK⠀➾ # ⚓ Kooha_is_a_Nascent_Screen_Recorder_for_GNOME_With Wayland_Support⠀⇛ There is not a single decent screen recording software for Linux that supports Wayland display server. GNOME’s built-in screen recorder is probably the rare (and lone) one that works if you are using Wayland. But that screen recorder has no visible interface and features you expect in a standard screen recording software. Thankfully, there is a new application in development that provides a bit more feature than GNOME screen recorder and works okay-ish on Wayland. # ⚓ Epiphany_Browser_in_GNOME_40_will_Feature_a_New_Tab bar⠀⇛ Epiphany Browser or known more popularly as GNOME Web, the default browser of the GNOME desktop environment is getting a major overhaul to one of it’s most used section, the tab bar. It was pretty simple, but now it is shaping up as a modern experience to compete with the likes of other popular browsers available for Linux. The new tab bar is a complete rewrite and now features two distinct widgets called HdyTabView and HdyTabBar that can be now used to implement the updated tab and will replace the existing widget called GtkNotebook. Ignore the technical jargon, overall, the old widget had many usability issues and was overall very tacky and outdated. So, the new widgets offer a host of usability improvements and have a very modern feel to it. o § Distributions⠀➾ # § SUSE/OpenSUSE⠀➾ # ⚓ SUSE_partners_with_the_University_of_Haifa_to_drive efficiency_and_ensure_uninterrupted_teaching_during_the global_pandemic⠀⇛ In 2015, the University of Haifa embarked on a journey of digital transformation focused on improving its student experience, and reducing costs, but would go on to achieve even more than this with its SUSE-based, modern data center. # § IBM/Red Hat/Fedora⠀➾ # ⚓ No_quarters_needed:_The_Red_Hat_Arcade_is_now_live!⠀⇛ Video games are not commonly known for being open source–either themselves or in their development. Red Hat would like to see that change, and this year we launched Red Hat Arcade, where you can play open source games built by Red Hatters using open source tools, assets, and engines. # ⚓ Coming_to_the_virtual_stage_at_Red_Hat_Summit_2021⠀⇛ While a lot has changed over the last year, one thing that hasn’t — the Red Hat Summit mainstage will be packed with powerful stories about the role enterprise open source tools play and the innovations that are changing the industry. This year, we’ll be bringing together speakers from around the world and across sectors to share how they are building better solutions for their customers and for themselves. Now in its 17th year, Red Hat Summit is the premiere open source technology event that brings together thousands of IT professionals for a high-energy event focused on innovation, education and collaboration. Red Hat Summit 2021 will be a three-part event that will kick off with a free, immersive multi-day virtual experience on April 27-28, 2021. And you won’t have to miss a moment, if you’re unable to attend or just want to rewatch, we’ll be recording much of our content including the keynotes and special guests, and it will be available for up to one year after the event. # ⚓ Planning_your_containerization_strategy_on_Red_Hat OpenShift_–_Red_Hat_Developer⠀⇛ There’s no question about the benefits of containers, including faster application delivery, resilience, and scalability. And with Red Hat OpenShift, there has never been a better time to take advantage of a cloud- native platform to containerize your applications. Transforming your application delivery cycle and shifting from traditional infrastructure to cloud-native can be daunting, however. As with any path toward a solution, it helps to break down the process into segments to better understand how to get from point A to point B. This article provides a framework for approaching the conversation with your application team to ensure that your application is containerized and hosted on OpenShift as quickly and easily as possible. Figure 1 is an overview of how to structure an effective containerization conversation. We’ll go over each step in the next sections. # ⚓ Ben_Cotton:_Applying_the_Potter_Stewart_rule_to release_blockers⠀⇛ For the most part, you want your release blockers to be defined by specific criteria. It’s even better if automated testing can use the criteria, but that’s not always possible. The point is that you want the process to be predictable. A predictable blocker process provides value and clarity throughout the process. Developers know what the rules are so they can take care to fix (or avoid!) potential blockers early. Testers know what tests to prioritize. Users know that, while the software might do something annoying, it won’t turn the hard drive into a pile of melted metal, for example. And everyone knows that the release won’t be delayed indefinitely. Having a predictable blocker process means not only developing the criteria, but sticking to the criteria. If a bug doesn’t violate a criterion, you can’t call it a blocker. Of course, it’s impossible to come up with every possible reason why you might want to block a release, so sometimes you have to add a new criterion. [...] This came up in last week’s Go/No-Go meeting for Fedora Linux 34 Beta. We were considering a bug that caused a delay of up to two minutes before gnome-initial-setup started. I argued that this should be a blocker because of the negative reputational impact, despite the fact that it does not break any specific release criterion. I didn’t want first time users (or worse: reviewers) to turn away from Fedora Linux because of this bug. QA wizard Adam Williamson argued against calling it a blocker without developing a specific criterion it violates. To do otherwise, he said, makes a mockery of the process. I understand his position, but I disagree. While there are a variety of reasons to have release blockers, I see the preservation of reputation as the most important. In other words, the point of the process is to prevent the release of software so bad that it drives away current and potential users. # ⚓ Next_Open_NeuroFedora_meeting:_15_March_1300_UTC⠀⇛ Please join us at the next regular Open NeuroFedora team meeting on Monday 15 March at 1300UTC in #fedora-neuro on IRC (Freenode). The meeting is a public meeting, and open for everyone to attend. # ⚓ Run_WebSphere_Liberty_and_Open_Liberty_on_Microsoft Azure [Ed: IBM works for Microsoft and the latest summit is also sponsored by Microsoft]⠀⇛ Looking to modernize your existing Enterprise Java applications and move them to the Microsoft Azure Cloud? Deciding on the approach to develop and deploy your next generation cloud-native application on Azure? Through an ongoing collaboration between IBM and Microsoft around the WebSphere product family, we have created simple guides to help you achieve your business goals. # § Debian Family⠀➾ # ⚓ SparkyLinux_2021.03_“LXQt”_overview_|_powered_by debian⠀⇛ In this video, I am going to show an overview of SparkyLinux 2021.03 “LXQt and some of the applications pre-installed. o § Devices/Embedded⠀➾ # ⚓ JingPad_A1_is_a_Linux_tablet_powered_by_JingOS⠀⇛ Shortly after introducing a new Linux-based operating system for tablets and phones called JingOS, Chinese company Jingling has unveiled the first tablet that will ship with the operating system pre-installed. The JingPad A1 is an 11 inch tablet with support for optional pen and detachable keyboard accessories. It’ll also support 4G and 5G cellular networks. But the main thing setting this tablet apart from others is the software. It’s powered by Jingling’s custom Linux distribution that’s been optimized to offer a touch-friendly user interface inspired by iOS and Android. Underneath the pretty UI though, it’s basically a Linux distro which means you should be able to run desktop programs as well as mobile apps. # ⚓ Arduino_Blog_»_Arduino_Day_Challenge:_Submit_your_project by_March_24th_for_a_chance_to_win_some_Arduino_hardware!⠀⇛ Arduino Day isn’t just Arduino’s birthday. It’s a celebration of the Arduino Community and its achievements. Creativity is the fuel that motivates our users to experiment, build amazing projects, push the boundaries of open-source hardware and software and have a positive impact on people’s lives. # ⚓ Top_5_Arduino_Libraries_for_Linux⠀⇛ The library that you use for your Arduino project depends on the demands of the project. At first, you may prefer simplicity for your small experiments; later, you may need more speed, special hardware, and better control of your microcontroller. You can make basic tasks work correctly with the simple scripts that you learn as a beginner. When you build a system, you will need many tasks and several input/output devices. For a robotics project, there are various requirements of IoT projects. An IoT project will need to communicate with other systems, such as a server that collects data or even a web server. For media, you need to find the source of the files and how to decode for playing the files. # ⚓ NORVI_ENET_DIN-Rail_ESP32_Industrial_Controller_adds Ethernet_port⠀⇛ There’s limited information about software support on the product page. But since it’s just an evolution of NORVI IIoT (even the dimensions are the same), with Ethernet replacing RS-485, NORVI ENET should be programmable with the Arduino IDE as the company provides Arduino libraries and sample sketches for inputs, outputs, RTC, temperature sensor, and the I2C display. # ⚓ Raspberry_Pi_400_vs._Raspberry_Pi_4,_Which_Is_Best_For You⠀⇛ Compare latest Raspberry Pi 400 vs Raspberry Pi 4. The both has almost the same specifications. Find out which is best for you. The Raspberry Pi 4 Model B was released in June 2019 with a 1.5 GHz 64-bit quad core ARM Cortex-A72 processor, on-board 802.11ac Wi-Fi, Bluetooth 5, full gigabit Ethernet, two USB 2.0 ports, two USB 3.0 ports, and dual-monitor support via a pair of micro HDMI ports for up to 4K resolution. # ⚓ Raspberry_Pi_CM4_boards_offer_dual_Ethernet,_4G_LTE⠀⇛ Since the launch of Raspberry Pi CM4 and CM4Lite systems-on-module last October, we’ve seen carrier boards bring their own set of features including industrial communication interfaces, a stereoscopic camera, four SATA ports to build a NAS, a DIN-rail based industrial controller, and more. But so far, I have not seen a Raspberry Pi CM4 carrier board with dual Ethernet ports. Seeed Studio’s “Dual Gigabit Ethernet Carrier Board for Raspberry Pi Compute Module 4” was brought to our attention this morning, but there’s another one with 4G LTE connectivity, Fast+Gigabit Ethernet ports, and extra I/Os courtesy of MCUZone’s CM4-4G IO board. Let’s have a look at both of them. # § Mobile Systems/Mobile Applications⠀➾ # ⚓ Google_Chrome_89_for_Android_will_allow_users_to quickly_scan_a_page_before_opening_the_link⠀⇛ # ⚓ Google_Earth_has_a_hidden_time-traveling_time-lapse mode_–_9to5Google⠀⇛ # ⚓ Google_Accidentally_Leaks_The_Names_Of_Multiple_New Android_Phones⠀⇛ # ⚓ Samsung_Galaxy_Tab_S6_Lite_nets_One_UI_3.1_and Android_11_update_with_DeX_support_–_NotebookCheck.net News⠀⇛ # ⚓ Samsung_Galaxy_A42_5G_starts_receiving_Android_11 update_–_Mobiles_News_|_Gadgets_Now⠀⇛ # ⚓ Oppo_F15_Starts_Receiving_Android_11-Based_ColorOS 11.1_Update:_Report_|_Technology_News⠀⇛ # ⚓ How_to_install_a_new_launcher_on_Android_10_| AndroidGuys⠀⇛ # ⚓ Add_Rocket_Fuel_to_Your_Apps_With_This_Discounted Android_Jetpack_Crash_Course_|_PCMag⠀⇛ # ⚓ NDDB_launches_Android-based_dairy_surveyor_app_| Business_Standard_News⠀⇛ # ⚓ These_Android_devices_are_eligible_for_64-bit Chrome⠀⇛ # ⚓ Oppo_Reno2_Z_ColorOS_11_Beta_(Android_11)_begins rolling_out_in_India⠀⇛ # ⚓ OnePlus_Nord’s_Android_11_update_fixed,_rollout resumes_–_GSMArena.com_news⠀⇛ # ⚓ How_to_download_music_from_Spotify_on_your_iOS, Android_or_Computer_devices?⠀⇛ # ⚓ Signal_lets_you_wirelessly_transfer_chats_between Android_devices_on_latest_beta⠀⇛ # ⚓ Android_TV_Set_Top_Box_Market_Rising_Trends_and Technology_Outlook_2021_to_2027_–_The_Courier⠀⇛ # ⚓ Wanna_See_the_Earth’s_Past?_Google_Earth_on_Android May_Soon_Let_You_Rewind_the_Years⠀⇛ # ⚓ Google_is_pushing_64-bit_Chrome_on_Android_–_gHacks Tech_News⠀⇛ # ⚓ How_to_Enable_“OK_Google”_Detection_on_Android_Wear OS_|_Beebom⠀⇛ # ⚓ Google_has_started_pushing_out_64-bit_Chrome_browser for_those_Android_devices_which_have_8GB_RAM_and Android_10_version_/_Digital_Information_World⠀⇛ # ⚓ Android_11_Pixel_phones_first_to_get_MDF_security certification_–_9to5Google⠀⇛ # ⚓ Motorola_brings_Android_11_updates_to_a_nice_pair_of affordable_mid-range_phones_–_PhoneArena⠀⇛ # ⚓ realme_narzo_30_Pro_and_narzo_30A_scheduled_to_get Android_11_beta_in_Q3_2021_–_Gizmochina⠀⇛ # ⚓ Redmi_Note_8T_Android_11_update_unlikely_as_per Xiaomi_community_mod⠀⇛ # ⚓ Moto_G8_and_Moto_G8_Power_start_receiving_stable Android_11_udpate⠀⇛ # ⚓ Samsung_Galaxy_A42_5G_Starts_Receiving_Android_11- Based_One_UI_3.1_Update:_Report_|_Technology_News⠀⇛ # ⚓ Stable_OxygenOS_11_w/_Android_11_out_for_OnePlus_Nord –_9to5Google⠀⇛ # ⚓ Android_Users_Can_Finally_Preview_Pages_in_Chrome⠀⇛ # ⚓ Best_Free_Android_Apps_and_Games_of_the_week_– GizChina⠀⇛ # ⚓ The_Best_Casual_Games_for_iOS_and_Android_[March 2021]_|_NDTV_Gadgets_360⠀⇛ # ⚓ The_Best_Learning_Apps_Available_For_Android⠀⇛ # ⚓ India-bound_Volvo_XC60_facelift_unveiled_with_new Android-based_infotainment⠀⇛ # ⚓ Fast_Chargers_For_Android_Smartphones_So_There’s_No Waiting_For_Your_Phone_To_Charge_|_Most_Searched Products_–_Times_of_India⠀⇛ o § Free, Libre, and Open Source Software⠀➾ # ⚓ The_Apache_Software_Foundation_Operations_Summary:_1 November_2020_–_31_January_2021⠀⇛ # ⚓ How_to_Be_a_Good_Open_Source_Project_Owner_–_The_Ultimate Guide⠀⇛ Have you ever thought about having your own open source project? I bet you have — you’re reading this article. Maybe you are thinking about it right now. Maybe you came here to learn what to expect, what challenges you’re going to face, and how to deal with them. Well, you’ve come to the right place. The following guide is based on my personal experience in owning an open source project. And I do mean owning – not just contributing to – an open source project. There is a big difference, and we’re going to learn why. # ⚓ Signal_Beta_v5.5.0_Update_Brings_Ability_to_Quickly_Migrate Chats_to_New_Phone:_Report⠀⇛ Signal, the messaging app whose USP is secure messaging, now reportedly has an easier way to migrate chats over from old Android devices to new ones. The feature, however, is for now only available in the beta v5.5.0 version of the Signal. Signal gained popularity after a change in WhatsApp’s privacy policy was announced earlier this year. Ever since, Signal has seen approximately more than 50 million downloads on Google Play Store. The new feature should make the app easier to use than before once a stable version is released to the general public. In a report by TestingCatalog, Signal has now introduced an easier and safer way to migrate chats from your old Android device to your new one in the beta v5.5.0. To migrate contacts, head over to Settings > Chats > Transfer Account, where a new screen appears that guides the user with the migration process. The process of migrating from your old device to the new one can be done over a local Wi-Fi Direct connection. # § Events⠀➾ # ⚓ Linux_Application_Summit:_Call_For_Papers⠀⇛ The last event I went to before The Event was Linux Application Summit (LAS) in Barcelona, Spain back in November 2019! Time flies. LAS is a community organised event, sponsored and supported by the GNOME and KDE projects. The conference is “designed to accelerate the growth of the Linux application ecosystem by bringing together everyone involved in creating a great Linux application user experience.”. # § Web Browsers⠀➾ # § Chromium⠀➾ # ⚓ 9_of_the_Best_Chrome_Extensions_for_Students⠀⇛ Most students today rely on information available online to complete their projects and assignments. Those who are using the Chrome browser by Google have a variety of Chrome extensions available for them that will help with research and completing schoolwork. This article looks at the best Chrome extensions that every student should install and use. # § Mozilla⠀➾ # ⚓ 6_things_to_know_about_using_WebAssembly_on Firefox_|_Opensource.com⠀⇛ WebAssembly is a portable execution format that has drawn a lot of interest due to its ability to execute applications in the browser at near- native speed. By its nature, WebAssembly has some special properties and limitations. However, by combining it with other technologies, completely new possibilities arise, especially related to gaming in the browser. This article describes the concepts, possibilities, and limitations of running WebAssembly on Firefox. # ⚓ Wladimir_Palant:_DuckDuckGo_Privacy_Essentials vulnerabilities:_Insecure_communication_and Universal_XSS⠀⇛ A few months ago I looked into the inner workings of DuckDuckGo Privacy Essentials, a popular browser extension meant to protect the privacy of its users. I found some of the typical issues (mostly resolved since) but also two actual security vulnerabilities. First of all, the extension used insecure communication channels for some internal communication, which, quite ironically, caused some data leakage across domain boundaries. The second vulnerability gave a DuckDuckGo server way more privileges than intended: a Cross-site Scripting (XSS) vulnerability in the extension allowed this server to execute arbitrary JavaScript code on any domain. Both issues are resolved in DuckDuckGo Privacy Essentials 2021.2.3 and above. At the time of writing, this version is only available for Google Chrome however. Two releases have been skipped for Mozilla Firefox and Microsoft Edge for some reason, so that the latest version available here only fixes the first issue (insecure internal communication). # § SaaS/Back End/Databases⠀➾ # ⚓ PostgreSQL_NTILE_Window_Function⠀⇛ Window methods in PostgreSQL have been cast off to equate diverge data and are essential for analytical and other PostgreSQL use cases. The NTILE() method followed by the OVER clause in PostgreSQL is discarded to divide organized rows in somewhat like series of graded buckets. Buckets are not anything more than a set of ranked groups. Throughout this article, you’ll discover how to split sorted rows in a partition into a given figure of ranked buckets using the PostgreSQL NTILE() feature. The NTILE() method allocates a bucket number to every group beginning at 1 in a set, demonstrating the set to which the row has its place. # ⚓ PostgreSQL_Create_Trigger_After_INSERT/UPDATE/ DELETE⠀⇛ Whenever a defined change action (SQL INSERT, UPDATE, DELETE, or TRUNCATE declaration) is conducted on a defined table, a trigger is a series set of events that are executed automatically. Triggers can be used to impose business rules, authenticate input information, and maintain an audit trail. SQL triggers are implemented according to the SQL format. It includes structures used in several programming languages allowing you to declare local variables, monitor the flow of the process with declarations, allocate statement outcomes to variables, and handle errors. Furthermore, once you construct a trigger for something, like a table, the trigger is immediately removed as soon as the table is removed. We’ll look at how PostgreSQL Triggers function throughout this segment. # ⚓ How_to_Use_PostgreSQL_ARRAY_AGG_Function?⠀⇛ The ARRAY_AGG() aggregate method is one of the methods used in PostgreSQL, which takes several input values and concatenates them into an array, including NULL values. It returns an array with every value from the input group as a part. To sort the result set via the PostgreSQL ARRAY_AGG function, you will be using the ORDER BY phrase. You can also use the WHERE clause when required. To understand the aggregate ARRAY_Agg() method, you have to perform several examples. For this purpose, open the PostgreSQL command-line shell. If you want to switch on the other Server, do so by providing its name. Otherwise, leave the space empty and hit the Enter button to jump on Database. If you want to use the default database, e.g., Postgres, then leave it as is and press Enter; otherwise, write the name of a database, e.g., “test”, as shown in the image below. If you want to use another port, write it out, otherwise just leave it as it is and tap Enter to continue. It will ask you to add the username if you want to switch to another username. Add the username if you want , otherwise, just press “Enter”. In the end, you have to provide your current user password, to start using the command-line using that particular user as below. After successful entries of all the required information, you are good to go. # § CMS⠀➾ # ⚓ WordPress_extortion_–_we_are_moving!⠀⇛ WE REFUSE TO SUCCUMB TO THE BLACKMAIL BY WORDPRESS.COM and we will not write another article other than this notice and a note of where we have moved to in protest to the blackmail WORDPRESS.COM is using upon us. How is this for advertising? For some months now wordpress introduced a very horrible way to edit, which I am using now, and made it really hard to start a document, then exit, then edit it with the traditional very functional editor they now call Classic. Since not enough people I suppose adopted it or bought a subscription to the site, they now removed the classic editor and made it available as an “addon” feature to the paying subscribers. Decisions about “how to make money” are hardly challenged by logical/ rational arguments, they are solely made by the money maker. If hundreds and hundreds of readers every day of the year who visited this site, getting exposed to all this wordpress advertising, wasn’t enough of payment to provide us with “classic editing” then we must make out own decisions and somehow end this relationship before it turns more abusive and exploitative. # § Openness/Sharing/Collaboration⠀➾ # § Open Data⠀➾ # ⚓ Swedish_Government_Network_for_Open_Source_and Data_Organizes_workshop_on_Open_Source_in European_Public_Services⠀⇛ Knowledge-sharing and collaboration is in the essence of the open source culture. In Sweden, public entities have adopted this mindset in order to improve in the way they use and collaborate on open source software and data. In the newly formed Network Open Source and Data (NOSAD), public entities gather to share best practices and lessons learned through monthly workshops, but also collaborate on community initiatives such as a catalog of open source software used within the public services. o § Programming/Development⠀➾ # ⚓ AMD_AOCC_3.0_Released_As_Zen_3_Optimized_LLVM_Clang_12 Based_Compiler_–_Phoronix⠀⇛ With today’s AMD EPYC 7003 “Milan” launch there is also the public availability of AOCC 3.0 as their LLVM/Clang downstream now carrying patches for optimized Zen 3 support. AOCC 3.0 is AMD’s downstream of LLVM/Clang focused on offering leading AMD CPU support. With AOCC 3.0 they have re-based against the in-development LLVM 12 trunk code while have enablined additional tuning/optimizations around the EPYC 7003 series. AOCC 3.0 also continues to carry patches/ configuration in tuning for AMD’s Math Library (AMDLibM), FLANG is enabled for Fortran support, OpenMP is enabled by default, and other tweaks in aiming to deliver the fastest AMD Linux binaries. # ⚓ znver3_tuning_part_1⠀⇛ I plan to commit some retuning of znver3 codegen that is based on real hardware benchmarks. It turns out that there are not too many changes necessary sinze Zen3 is quite smooth upgrade to Zen2. # ⚓ GCC_Compiler_Sees_New_Patch_With_Tuning_For_AMD_Zen_3_ (Znver3)_–_Phoronix⠀⇛ GCC is in the process of seeing better support for AMD Zen 3 processors with its znver3 target. Back in December the GCC 11 compiler picked up initial support for AMD Zen 3 (znver3). That support was just enabling the newly-supported CPU instructions found with this latest-generation Zen microarchitecture. Unfortunately missing at that time was any tuning for allowing the compiler to make more informed decisions over instruction scheduling with the instruction costs, etc. So it’s been carrying the same data as Zen 2 that is also largely carried over from the original Zen compiler code. Now today, a few weeks prior to the GCC 11 stable release, a new Zen 3 compiler patch has surfaced. Longtime GCC developer Jan Hubicka of SUSE has provided a “tuning part 1″ patch for the GCC Znver3 code. # ⚓ How_to_Overload_Operators_in_C++⠀⇛ Classes are user-defined types. They allow us to represent the meaning of various entities. Defining an operator for a class gives us a better way to deal with objects. So how can we define operators for our classes, and how should we use such operators? I will show you how in this article. # ⚓ GitOps_vs._DevOps:_What’s_the_difference?⠀⇛ Now there is an evolved version of DevOps called GitOps: GitOps is the practice of using Git as the single source of truth. Many enterprises are seeking to move to a GitOpos model because it provides a more standardized and governed system yet offers the flexibility and automation that today’s companies desire. [...] But what does GitOps mean for the open source model? Git is an open source technology based on the GNU General Public License version 2. Because GitOps inherits most of its technologies from DevOps, you can enjoy the same variety of open source tool integrations such as Ansible, Terraform, Jenkins, and more. # ⚓ Learn_how_file_input_and_output_works_in_C⠀⇛ If you want to learn input and output in C, start by looking at the stdio.h include file. As you might guess from the name, that file defines all the standard (“std”) input and output (“io”) functions. The first stdio.h function that most people learn is the printf function to print formatted output. Or the puts function to print a simple string. Those are great functions to print information to the user, but if you want to do more than that, you’ll need to explore other functions. # ⚓ Resurrecting_Fortran⠀⇛ We have finished the first chapter on a long journey of resurrecting Fortran: forming an initial core community of developers and users with enough momentum around the new Fortran website and projects at fortran-lang.org. There is still have a long way to go to, but this was a necessary (although not sufficient) achievement and I feel this was a once in a life time event. The timing was right, we were ready, and we also got lucky. In this blog post I have tried to write up the details about the pivotal moments from my perspective. I have asked Milan Curcic who has been a co-founder of this effort to do the same (please see his blog post), more on that below. Brad Richardson has also written about his perspective. This has been the most unusual experience for me, nothing like what I anticipated, but two years ago things seemed to fall into place and set up just right. I had to give it everything I had in order to give it a proper chance. I took the bull by the horns. This blog post is long, but you might find it useful to get ideas how to form other such communities. # § Perl/Raku⠀➾ # ⚓ 6guts:_Towards_a_new_general_dispatch_mechanism_in MoarVM⠀⇛ My goodness, it appears I’m writing my first Raku internals blog post in over two years. Of course, two years ago it wasn’t even called Raku. Anyway, without further ado, let’s get on with this shared brainache. # § Python⠀➾ # ⚓ How_to_create_a_pivot_table_in_Pandas_Python_–_Linux Hint⠀⇛ In panda’s python, the Pivot table comprises sums, counts, or aggregations functions derived from a data table. Aggregation functions can be used on different features or values. A pivot table allows us to summarize the table data as grouped by different values, including column categorical values. Before using panda’s pivot table, make sure you understand your data and questions you are trying to solve through the pivot table. By using this method, you can produce powerful results. We will elaborate in this article, how to create a pivot table in pandas python. # ⚓ Introduction_To_Python_Tkinter_GUI_Programming⠀⇛ Commonly there are 2 types of interfaces for desktops – command-line interface (CLI) where users interact with the system by writing commands, and a Graphical User Interface (GUI) where users interact with the system through visual widgets such as buttons, menus, windows etc. Python provides a lot of libraries to create cross-platform GUIs such as Tkinter, Pymsgbox, Pyqt, and much more. In this series of articles, we will study the Tkinter package. * § Leftovers⠀➾ o § Science⠀➾ # ⚓ Who_Would_Kidnap_a_Space_Telescope?⠀⇛ The topic came up at a recent meeting about NASA’s James Webb space telescope, named for a former administrator of the space agency. Later this year, the telescope will travel by ship to a launch site in South America, passing through the Panama Canal to reach French Guiana. Webb, with a mirror as tall as a two-story building and a protective shield the size of a tennis court, is too large for a plane. Its departure date will be kept secret, someone said at the meeting, to protect against pirates who might want to capture the precious cargo and hold it for ransom. Christopher Conselice, an astrophysicist at the University of Manchester who attended the meeting, was at first baffled by the concern because, well, pirates, but it quickly clicked. o § Hardware⠀➾ # ⚓ These_Bluetooth_Dice_Let_You_Send_Your_Rolls_to_Your_Online DnD_Game⠀⇛ Both the lights and the Bluetooth run on small batteries and one die lasts around five hours on a charge. You can also turn off the LEDs to get in 20,000 rolls before the battery dies. Charging is wireless and uses an inductor hidden under one of its faces. The dice are sold separately or in kits containing D20, D12, D10, D8, D6, and D4 models. Of course, they are still dice and must offer completely random rolls. Pixels’ creators have resorted to using internal counterweights so that they are perfectly balanced. The only downside to this is that the internal electronics are completely encapsulated in resin, so they are not repairable. That said, the Pixels will also be waterproof. # ⚓ Eaton_EMA114-10_ePDU_–_initial_configuration⠀⇛ On Friday, the latest addition to the #homelab turned up. An Eaton EMA114-10 PDU. A PDU is a Power Distribution Unit. Think of it as a step up from a power strip. o § Health/Nutrition⠀➾ # ⚓ Opinion_|_Coverage_of_Texas’_Declaration_of_Covid_Victory Left_Out_Rapidly_Rising_Toll⠀⇛ Readers would never guess that people are being vaccinated in Texas at a slower rate than in any other state. # ⚓ ‘Disturbing’:_Rich_Nations_Vaccinating_Person_Per_Second While_Blocking_Effort_to_Share_Recipe_With_Poor_Countries⠀⇛ “There is no reason we have to prioritize the profits of pharmaceutical companies over the dignity of people in other countries,” said U.S. Rep. Ro Khanna. # ⚓ Dutch_police_break_up_anti-government_protest_on_election eve⠀⇛ However anger at the imposition of the country’s first curfew since World War II in January led to the worst riots the Netherlands has seen for decades. The Netherlands has seen a string of anti-lockdown demonstrations, and populist parties have been calling for a relaxation of the rules, the strictest since the start of the pandemic. # ⚓ Capitalist_Economies_Overproduce_Food_—_But_People_Can’t Afford_to_Buy_It⠀⇛ # ⚓ Conspiracy_Theories_Are_Killing_Us_—_and_Trump’s_Departure Hasn’t_Ended_Them⠀⇛ o § Integrity/Availability⠀➾ # § Proprietary⠀➾ # ⚓ PoC_for_Microsoft_Exchange_Server_re-appears_on GitHub_with_comments⠀⇛ “This is huge, removing a security researchers code from GitHub against their own product and which has already been patched. This is not good.” The comment referred to by Vess was this: “Why does GitHub remove this exploit because it is against the acceptable use policy – but tons of other proof of concept exploits and frameworks are OK? “Is it because GitHub is owned by Microsoft? # § Pseudo-Open Source⠀➾ # § Entrapment (Microsoft GitHub)⠀➾ # ⚓ pCloud_Now_Lets_You_Back_up_Your_PC_and Keep_Old_Versions_for_up_to_1_Year [Ed: This article seems like paid-for SPAM. Also: Calling your service or software "clown" something is very bad as a selling point. Anything "clown" is nowadays (should be at least!) synonymous with surveillance] ⠀⇛ pCloud is a quite popular cloud storage solution for Linux users. It already offers a native client to help you sync files and folders to the cloud. Even though you already get the ability to automatically sync files/folders to the cloud using the sync client, there was no dedicated PC Backup feature that focuses on backing up your entire system and retain the old version for up to 1 year. However, recently pCloud announced the introduction of ‘pCloud Backup‘ feature. # § Security⠀➾ # ⚓ These_Linux_vulnerabilities_have_existed_for YEARS⠀⇛ These 3 newly discovered vulnerabilities in Linux have been around since 2006 and it raises the uncomfortable question: is Linux getting too big to be sustainable? # ⚓ Decade-old_Linux_kernel_vulnerabilities_are threatening_device_security⠀⇛ Researchers have identified three major vulnerabilities in the Linux kernel that have existed for more than a decade. According to cybersecurity firm GRIMM, these bugs could allow attackers to elevate their privileges from basic to root, opening the door to data theft, malware and ransomware distribution, escalation of privilege and DDoS attacks, Bleeping Computer reported. The vulnerabilities (CVE-2021-27365, CVE-2021-27363 and CVE-2021-27364) have since been fixed and patches for the mainline Linux kernel became generally available on March 7. Linux users have been urged to patch their systems immediately. Despite their relative severity, the vulnerabilities aren’t particularly easy to exploit, requiring local access to the target device. This means attackers would either need to access the device physically or chain the Linux bugs with other vulnerabilities. # ⚓ Decade-old_Linux_kernel_bugs_are_putting devices_at_risk⠀⇛ Cybersecurity company GRIMM found the vulnerabilities lurking in the kernel’s iSCSI (Small Computer System Interface) subsystem that can be exploited to gain root privileges on Linux machines. [...] Nichols believes the bugs were introduced during the early development of the iSCSI module over a decade and half ago. The module helped access shared data storage facilities. As Nichols notes, while SCSI is still in use today its use isn’t as prevalent as it was back in the day. This is why the vulnerable module isn’t loaded by default on most desktop distros. Another saving grace of sorts is that the bugs exist in a piece of code that isn’t remotely accessible, which means the attackers need physical access to the device to exploit them. However, this still makes them potentially dangerous because of how the kernel handles modules. “The Linux kernel loads modules either because new hardware is detected or because a kernel function detects that a module is missing. The latter implicit autoload case is more likely to be abused and is easily triggered by an attacker, enabling them to increase the attack surface of the kernel,” reasons Nichols. Patches for all three vulnerabilities have been added to the mainline kernel last week, and have also been backported to other Long Term Support (LTS) kernel branches currently supported. # ⚓ 3D_Software_Blender’s_Official_Website_Is_Down After_a_[Cr]acking_Attempt⠀⇛ A lot of websites get hacked every day – however, it is always inconvenient for a product/service website to be taken down after a hacking attempt. In some cases, the hackers push malicious files that a user downloads thinking it as an official package just like CCleaner potentially put millions of computers at risk after it was hacked. Now, in a recent tweet by Blender, they’ve officially informed that their website (Blender.org) is currently undergoing maintenance after a hacking attempt. # ⚓ Google:_This_Spectre_proof-of-concept_shows_how dangerous_these_attacks_can_be⠀⇛ # ⚓ Flurry_of_reboots_signal_Exchange_Server patching⠀⇛ Around half of all servers running Outlook Web Access (a service included with Microsoft Exchange Server) were rebooted in the five days after the emergency patch was released. Some of these have since been rebooted again, so will appear later in the above graph. Rebooted machines are likely to have been updated, but the absence of a reboot after 2 March does not necessarily indicate vulnerability. Anecdotally, most servers have requested a reboot after being updated, but some may only require services to be restarted – although administrators may have opted to reboot the servers anyway. Microsoft’s original fixes can only be applied to servers that already have the latest cumulative updates of Exchange Server already installed; however, amidst mass exploitation of the vulnerabilities, Microsoft also released a set of security updates that can be applied to older and unsupported Exchange servers that do not—or cannot—have the latest cumulative updates installed. [...] On 6 March, four days after the original security updates were released, Netcraft found more than 99,000 Outlook Web Access servers were still running versions flagged as definitely vulnerable by Kevin Beaumont. However, applying Microsoft’s updates even in a timely fashion could have been like shutting the barn door after the horse had bolted, as more than 10% of all visited Outlook Web Access installations were already compromised with attackers’ web shells installed. These provide the criminal with continued administrative access to the compromised servers after the security updates had been applied. # § Privacy/Surveillance⠀➾ # ⚓ Google_Must_Face_Suit_Over_Snooping_on ‘Incognito’_Browsing⠀⇛ The consumers who filed the case as a class action alleged that even when they turn off data collection in Chrome, other Google tools used by websites end up amassing their personal information. A federal judge on Friday denied the Alphabet Inc. unit’s initial request to throw out the case. # ⚓ US_Congresswoman_proposes_national_data privacy_law⠀⇛ Washington DC congresswoman Suzan DelBene has introduced legislation that would create a national data privacy law in the US. With no federal law currently in place to protect the data of US citizens, a number of states have enacted their own legislation to do so instead. The California Consumer Privacy Act (CCPA) was enacted in 2018, for instance, while Massachusetts has its own Data Breach Notification Act. # ⚓ “What_the_Government_Is_Asking_for_Would Weaken_Security_for_All”⠀⇛ Is WhatsApp reading along as you write messages and saving your chats? In an interview, company CEO Will Cathcart explains what happens with user data and why he is concerned about proposed changes to German surveillance laws. o § Defence/Aggression⠀➾ # ⚓ Barack_Obama_and_the_Cunning_of_American_Exceptionalism⠀⇛ Ideals Against Reality The book’s readers are thus likely to experience dissonance. On the one side we have the realities, shortcomings, failures, and injustices that characterize the American system and model, and, on the other side the diametrically opposite promised America Obama paints. This dissonance is native to the text of A Promised Land, wherein Obama contradicts his propaganda for the American model with a constant (though generally moderate and shallow) criticism of the American system that did not allow him to implement the change he putatively espoused. Obama resolves this general dissonance through the false dichotomy between the reality of America and American ideals, America “that was promised,” or the American Dream. # ⚓ Pathological_Entitlement_and_the_Supremacist_Mindset⠀⇛ The spirit of this deity, it is said, has transmogrified through every other deity known to humankind, and wound up, thanks to some superhuman (and therefore totally not self-serving) coincidence, manifest in the flesh as the founder of CPAC Japan. As another coincidence of mind- melting proportions, this deity is also deeply fiscally conservative and politically reactionary of a bent that views compassion as a weakness. If I didn’t know better, I would think Happy Science (as this ‘new religious movement’ is known) were pulling the entire thing out of their asses, like an even nastier L. Ron Hubbard. This latter fact, in particular, must inevitably raise a few questions—principally, whether or not the GOP remains a gaggle of thieves willing to sell each other’s grandmothers out at a moment’s notice to save their own skin politically, an end-of-times spectacle of an increasingly unstable oligarchy too drunk on its own material excess to save itself from its own decadence and corruption? Another question that springs to mind is whether it’s now in fact degenerated even further into something even more horrible again—a raging collective psychosis of pathological entitlement, collective narcissism, hypernationalist tribalism and jingoism, and death-cult supremacism. # ⚓ How_the_U.S._is_Able_to_Dictate_to_the_Rest_of_the_World⠀⇛ The U.S. moves against any country that dares to act on a belief that its resources should be for its own people’s benefits rather than maximizing profits of multinational corporations or prioritizes the welfare of its citizens over corporate profit or simply refuses to accept dictation in how it should organize its economy. The military is frequently put to use, as are manipulation of the United Nations and the strong arms of the World Bank and International Monetary Fund (IMF). But sanctions are a frequently used tool, enforced on countries, banks and corporations that have no presence in the U.S. and conduct business entirely outside the United States. The U.S. can impose its will on national governments around the world, using multilateral institutions to force governments to act in the interest of multinational capital, even when that is opposite the interests of the country itself or that country’s peoples. And when a country persists in refusing to bend to U.S. demands, sanctions imposing misery on the general population are unilaterally imposed and the rest of the world is forced to observe them. In short, the U.S. government possesses a power that no country has ever held, not even Britain at the height of its empire. And that government, regardless of which party or what personality is in the White House or in control of Congress, is ruthless in using this power to impose its will. # ⚓ Opinion_|_The_ICC_and_Israel’s_Charge_of_Anti-Semitism⠀⇛ The ICC is on Israel’s target list. # ⚓ Opinion_|_Unless_Biden_Acts,_Trump’s_Assault_on_Human Rights_Will_Continue⠀⇛ We are asking a court for protection from Trump’s sanctions against the International Criminal Court. # ⚓ Cult_recovery_experts_explain_how_to_“deprogram”_QAnon adherents⠀⇛ Indeed, what makes “treating” QAnon tricky is that it technically doesn’t neatly fit into the idea of a cult. That’s a conundrum for therapists. Indeed, while there is a well-defined routine for cult recovery, there isn’t quite the same for something like QAnon, which is in a gray area. # ⚓ Nigeria_intensifies_search_for_39_kidnapped_students⠀⇛ Gunmen stormed the Federal College of Forestry Mechanisation in Mando at the outskirts of the state capital, Kaduna city, late Thursday and took 39 students away while the military rescued 180 after a fierce battle. # ⚓ Nigeria_kidnappings:_The_Chibok_captive_who_defied_Boko Haram⠀⇛ During the three years she spent with Boko Haram, Naomi refused to bow down to pressure to marry one of their fighters, or convert to Islam. Instead she and another classmate wrote secret diaries in textbooks they were given to write Islamic verses. She kept them hidden in a makeshift pouch tied to her leg. “We decided that we should write down our stories,” she tells me, “so that if one of us got to escape, we could let people know what happened to us”. She shows me one of the diaries, a lined text book with a fraying cover. In it is a letter to her dad, written just before Christmas of the year they were kidnapped. # ⚓ TV_channel_investigation_shows_how_ISIS_Jihadists_found safe_haven_in_Germany⠀⇛ The M6 flagship program “Enquête Exclusive” showed how ISIS Jihadists managed to slip through the cracks by posing as asylum seekers, and how they ended up being greeted with open arms and offered a safe haven in Germany, because of the dangerous laxity of German authorities. # ⚓ Sri_Lanka_to_ban_burqas,_close_over_1,000_madrassas_to combat_‘religious_extremism’⠀⇛ The wearing of burqas was temporarily banned in 2019 after the Easter Sunday bomb attacks on churches and hotels in Sri Lanka that killed more than 260 people. Two local Muslim groups that had pledged allegiance to the Islamic State group have been blamed for the attacks at six locations — two Roman Catholic churches, one Protestant church and three top hotels. Weerasekara also said the government will ban more than 1,000 madrassas, saying they are not registered with the authorities and do not follow the national education policy. # ⚓ Alexander_Reid_Ross,_disgraced_author_of_several_retracted articles,_works_with_ex-cops,_CIA_spies,_and_DHS_agents⠀⇛ # ⚓ 5_former_OPCW_officials_join_prominent_voices_to_call_out Syria_cover-up⠀⇛ # ⚓ Protesters_and_Lawmakers_Demand_Justice_for_Breonna_Taylor One_Year_Later⠀⇛ o § Environment⠀➾ # § Energy⠀➾ # ⚓ Texas_Blackouts_Are_the_Outcome_of_Systems_for Private_Gains_at_Public_Expense⠀⇛ # ⚓ Opinion_|_As_Solar,_Wind_Costs_Plummet,_Coal,_Gas Vastly_Over-Priced_in_Bubble_That_Could_Burst_Worse Than_2008⠀⇛ What do you call it when people invest $2 trillion into an industry that is becoming worthless? That, my friend, is a bubble. # ⚓ The_Netherlands_joins_movement_to_end_use_of_fossil fuel_cars_by_2030⠀⇛ Austria, Belgium, Denmark, Greece, Ireland, Lithuania, Luxembourg and Malta also signed the letter. By 2030, the EU wants to cut back greenhouse gas emissions by 55 percent compared to 1990. The end goal is to achieve climate neutrality by 2050. o § Wildlife/Nature⠀➾ # ⚓ [Old] Secrets_of_the_Lawn_Lobster_Chimneys!⠀⇛ Mysterious miniature “chimneys” have emerged in wet meadows and moist lawns all across our county. They are gateways to the secret underground world of several species of crayfish, collectively known as Chimney Crayfish. Mudbugs and crawdads are two other frequently used common names for crayfish, a group of arthropods that look very much like miniature lobsters. I like to use the eye-catching title of Lawn Lobsters to describe them when writing about them, and that’s just what I did four years ago when creating text for an interpretive sign for Oakland County Parks that featured the chimney construction skills of Cambarus Diogenes, a local species commonly known as the Devil Crayfish. It is also one of the most widely spread crayfish of the United States. * § Finance⠀➾ o ⚓ How_Bidenomics_Unites_America⠀⇛ That was the end of welfare as we knew it. As Clinton boasted in his State of the Union address to Congress that year, “the era of big government is over.” o ⚓ Biden’s_Spending_Bill_Is_Huge,_But_Comparing_It_to_the_New_Deal Is_a_Stretch⠀⇛ o ⚓ Bernie_Sanders:_US_Public_Cares_Far_More_About_Bold_Relief_Than Bipartisanship⠀⇛ “When the American people get those $1,400 checks, they’re not going to be sitting around saying, ‘Oh, my goodness, this is not good, we didn’t have any Republican support.’” o ⚓ Congress_Urged_to_Take_‘Immediate_Action’_to_Stop_Debt_Collectors From_Snatching_Relief_Checks⠀⇛ A legislative fix is needed, said one observer, to prevent “a flood of new judgments from debt collectors to siphon stimulus funds out.” o ⚓ Stripe_raises_$733_milion_in_latest_funding_round_to_support global_expansion⠀⇛ Internet payments software provider Stripe has raised $733 million (US$600m) with completion of a funding round, with the capital to be used for investment in its European operations and to expand its Global Payments and Treasury Network to support what it says is “surging demand” from enterprise heavyweights. o ⚓ The_spam_attack_on_the_Nano_network_–_summarised⠀⇛ In other words – running at a sustained transaction throughput of over double the maximum throughput of the two largest chains combined, one could send a Nano transaction and have it confirmed in the other person’s wallet faster than you could say “this is amazing”. These 4.6 million transactions took less energy to process than a single Bitcoin transaction would, and while a single Bitcoin transaction would set you back about $13.72, these 4.6 million transaction cost exactly $0 in fees. * § AstroTurf/Lobbying/Politics⠀➾ o ⚓ Opinion_|_The_Rise_of_Legislative_Anti-Democracy⠀⇛ It isn’t just voter suppression. State lawmakers from Arizona to Pennsylvania are trying to thwart any form of democracy that threatens their power. o ⚓ NY_Vaccine_Czar_Reportedly_Questioned_County_Officials_on_Loyalty to_Cuomo⠀⇛ “Using vaccine distribution as a tool to control local officials is despicable and a clear abuse of public trust.” o ⚓ Opinion_|_The_Filibuster_Is_a_Labor_Issue⠀⇛ The PRO Act will not pass unless we end the filibuster. Those two things are a package deal. o ⚓ Facebook_halts_project_for_undersea_data_cable_to_Hong_Kong_over US-China_tensions⠀⇛ In June, the US Department of Justice recommended that a trans-Pacific undersea cable proposed by Google and Facebook bypass Hong Kong. The cable, named the Pacific Light Cable Network, was originally intended to link the United States, Taiwan, Hong Kong and the Philippines. The Hong Kong landing station “would expose US communications traffic to collection” by Beijing, the department said. The FCC gave Google permission in April 2020 to operate the link between North America and Taiwan. * § Censorship/Free Speech⠀➾ o ⚓ Police_disruption_of_a_vigil_for_a_murdered_woman_sparks outrage⠀⇛ Rules designed to limit the spread of covid-19 have allowed police to crack down on protests. A nurse who organised a socially distanced protest against low pay in the NHS, for instance, was handed a £10,000 ($14,000) fine earlier this month. Critics say that the criminal- justice bill is, in effect, extending draconian restrictions on liberty which the public have accepted as the price of suppressing the pandemic into the post- pandemic era. The government has a particular interest in giving the police extra powers this year. COP26, a high- profile international climate conference, is being held in Glasgow in November. Boris Johnson will not want to be upstaged by an angry mob in front of a global audience. The bill, on which Parliament will vote on March 15th, is a rag-bag of measures designed to please social conservatives. As well as stiffening sentences for child murderers and sex offenders, it also proposes tougher laws against protests and mass gatherings by broadening the range of circumstances that allow police to block them or limit their size. At present the police can impose restrictions on protests only if they risk causing serious property damage or disruption to communities. If the bill is enacted, protests carried out by a single person may be subject to restrictions, and the noise that they produce will also be grounds for restricting them. Activists who deface war memorials and statues—which some BLM members have done—could face ten years in jail. o ⚓ LinkedIn_China_suspends_new_sign-ups_to_‘respect_law’⠀⇛ It is one of few international tech platforms to enjoy access to China, where all subjects considered politically sensitive are censored in the name of stability and internet giants are urged to block unwanted content online. o ⚓ ‘Anti-Riot’_Measures_Open_a_Wide_Door_to_Censorship_|_Opinion⠀⇛ These proposals would have more insidious effects. Laws don’t have to be called the Censorship Act of 2021 for those in power to use them to target people and ideas with which they disagree. That’s the likely outcome if states enact “anti-riot” bills with overly broad language that make it easy for authorities to shut down First Amendment activity and arrest protesters whose ideas they don’t like. The proposals tap into legitimate concerns about real problems to justify policies that risk eroding civil liberties without enhancing public safety. I agree with policymakers who want to address violence, which is never an acceptable method of political action by individuals. Rioting is not free speech. But what some state legislators are now proposing goes far beyond addressing violence. o ⚓ My_fight_to_stop_the_Chinese_censors_sanitising_Dante⠀⇛ My book on Dante Alighieri was due to come out in Chinese translation later this year, but first I had to consent to sizeable cuts. Even by the standards of other authoritarian states the Beijing censors struck me as overzealous. It seems odd that the medieval Italian poet could cause such unease among modern-day totalitarians. A sanitised Chinese communist version of my book did not sit well with the 700th anniversary of Dante’s death in 1321, and in the end I withheld permission. The cuts were the work of Beijing’s blandly named Institute for World Religions. The institute undertakes ‘book cleansing’ operations on behalf of the state. No book can be published legally in China today without being vetted. In their solemn appraisal the censors insisted that all references to Islam be removed. Why? o ⚓ Toolkit_case:_Disha_Ravi_finally_breaks_silence,_says_her autonomy_violated,_recalls_days_in_Tihar_Jail⠀⇛ Disha took to Twitter to post a four-page statement “to present a narrative that is my own”. It may be recalled that Disha remained behind bars for 10 days after being arrested by Delhi Police on February 13 in connection with the Toolkit case. The controversial Toolkit was tweeted by Swedish activist Greta Thunberg. o ⚓ U.S._Congressional_Commission_Joins_Calls_For_Belarusian Blogger’s_Release⠀⇛ The day before, the U.S. Agency for Global Media (USAGM), which oversees RFE/RL and other U.S international broadcasters, called the “false charges” against Losik “unacceptable.” “Belarusian authorities should drop all charges against Ihar and immediately release him,” acting USAGM Chief Executive Officer Kelu Chao said in a statement. o ⚓ Jailed_Belarusian_Vlogger_Syarhey_Tsikhanouski_Faces_15_Years_In Prison_As_Final_Charges_Delivered⠀⇛ Belarusian video blogger Syarhey Tsikhanouski, who has been in pretrial detention since May, has been served with final charges that could see him imprisoned for up to 15 years after he expressed his willingness to take part in an August presidential election against authoritarian ruler Alyaksandr Lukashenka. The Investigative Committee of Belarus said on March 11 that the investigations against Tsikhanouski, opposition politician Mikalay Statkevich, and their associates had been completed. According to the final charges, Tsikhanouski is accused of organizing mass disorder, incitement of social hatred, impeding the Central Election Commission’s activities, and organizing activities that disrupt social order. o ⚓ This_Iranian_pop_song_is_“more_dangerous_than_polio”⠀⇛ Tehran Tokyo is quickly turning into the California-based Mankan’s biggest hit. Since being posted online, the Instagram teaser video now has over eighteen million views and has received a record-setting 4.5 million plays on Persian language music website Radio Javan within forty-eight hours. Iranian officials typically view Tehrangeles pop music like Mankan’s as part of a Western cultural invasion or “soft war” to subvert the Islamic Republic. However, in this particular case Iranian authorities and conservatives alike are expressing outrage at the “pornographic” content of the video—despite it having no pornography. o ⚓ Saudi_Arabia’s_film_industry:_Between_glitz_and_censorship⠀⇛ However, despite the encouragement to produce, Saudi films are subject to the strict censorship of the Kingdom, as well as its financing. According to a report by the British Council in Saudi Arabia, 43% of respondents said that lack of commercial funding is one of the biggest obstacles, with the film industry receiving financial and artistic support from three government-backed institutions — the King Abdulaziz Center for World Cultures, a new film commission overseen by the Saudi Culture Ministry and the Red Sea Film Festival. * § Freedom of Information/Freedom of the Press⠀➾ o ⚓ Reporters_at_Macau_broadcaster_told_to_support_‘Hong_Kong governed_by_patriots’,_ordered_not_to_oppose_the_authorities⠀⇛ The Chinese-language press in the former Portuguese colony which returned to China in 1999 has faced informal censorship for years, but the Portuguese-language press is “another world,” said a reporter working at a Chinese news outlet in the city. He has declined to give his name for fear of retribution. o ⚓ UK’s_envoy_to_China_Caroline_Wilson_defends_press_freedom_article after_scolding_from_foreign_ministry⠀⇛ “Foreign media in China is independent and supervises the behaviour of both the local government and the Chinese government,” she wrote. “I think they act in good faith and play an active role as a supervisory agency of government actions, ensuring that people have access to accurate information, and protecting those who have no voice,” she added. China’s departing ambassador to the UK Liu Xiaoming wrote over 170 articles for UK news publications in his 11 years at the post, including op-eds defending the controversial Huawei 5G network in the Telegraph. He quit last December and will be replaced by China’s Vice- Foreign Minister, Zheng Zeguang. * § Civil Rights/Policing⠀➾ o ⚓ Vaccine_Passports_Risk_Worsening_Pandemic_Inequalities⠀⇛ o ⚓ The_Foilies_2021⠀⇛ The day after the 2021 inauguration, Sen. Chris Murphy of Connecticut took to Twitter to declare: “Biden is making transparency cool again.”  This was a head-scratcher for many journalists and transparency advocates. Freedom of Information—the concept that government documents belong to and must be accessible to the people—has never not been cool. Using federal and local public records laws, a single individual can uncover everything from war crimes to health code violations at the local taqueria. How awesome is that? If you need more proof: there was an Australian comic book series called “Southern Squadron: Freedom of Information Act”; the classic anime Evangelion has a Freedom of Information Act cameo; and the Leeds-based post-punk Mush received 7.4 stars from Pitchfork for its latest album “Lines Redacted.”  OK, now that we’ve put that down in writing we realize that the line between “cool” and “nerdy” might be a little blurry. But you know what definitely is not cool? Denying the public’s right to know. In fact, it suuucks.  o ⚓ Why_We_Stay_Silent,_Why_We_Stay_Friends:_Unlearning_My_Role_in Misogyny⠀⇛ Not everyone who participates in the misogynistic parts of our society benefits from it, writes Gemma Clarke. o ⚓ Vigilant_over_Vigils⠀⇛ In one sense, I am delighted that the heavy-handed police action at the vigil for Sarah Everard has brought about public revulsion at the attack on free speech and the right of assembly, just as Priti Patel prepares to bring in the dreadful policing bill which represents the biggest single threat to freedom of assembly in the UK for 200 years. Its foundational principle is that the right of freedom of assembly is subordinate to the right to drive a SUV anywhere and any time you please, without having to detour around people taking part in democratic expression. It has a subsidiary principle that all public manifestations of political dissent will be intimidated by massive police presence, and that the cost of that massive intimidatory presence will in itself be reason to ban the demonstration. Which would be delightfully Kafkaesque were it only a joke. * § Monopolies⠀➾ o § Patents⠀➾ # ⚓ Patent_case:_Fensterflügel,_Germany⠀⇛ The Federal Court of Justice recently addressed the scope of the so-called principle of concentration pursuant to sec. 145 Patent Act. If the patentee has filed an action, a second action based on a different patent against the same defendant is inadmissible in relation to the same or similar embodiments. The FCJ has now clarified that this does not apply to a second action based on the same patent. # ⚓ French_court_decides_no_sequencing_in_biodegradable packaging_case [Ed: Sadly, this article seems like an ad for some law firms, dressed up as "news"]⠀⇛ If patent courts should hear issues of infringement and validity separately is creating debate among French litigators. It is custom in France for the patents courts to rule on findings of invalidity and infringement together. This is similar to the UK and Dutch court systems, which also hear both issues in one patent hearing. However, in Germany, courts rule on patent validity and infringement separately – the so-called bifurcation system. Some recent cases have heightened worries among French patent litigators, that the courts may dilute the practice of hearing infringement and validity separately. However, a recent ruling between Cellulopack and Packbenefit shows the opposite. # ⚓ New_UK_judge:_FRAND_anti-anti-suits_could_create_‘total mess’ [Ed: Judges who talk to a think_tank_of_patent litigation_companies may not realise the degree of self- harm]⠀⇛ The newly appointed judge at the England and Wales High Court says judicial authorities may need to show restraint to avoid running into a “total mess” in FRAND patent disputes. Speaking exclusively to Managing IP, Mr Justice James Mellor says the rising trend of anti-anti suit injunctions is not sustainable. “It does create a potentially very difficult situation. It is going to require some forbearance amongst judicial authorities across the world, otherwise we are just going to get into a total mess,” says Mellor. Anti-anti-suit injunctions aim to get a court to stop the infringement proceedings of a company in an anti-suit injunction in another country. In each instance, one jurisdiction is pitted against another as standard essential patent owners and implementers go to war over fair, reasonable and non-discriminatory (FRAND) licensing terms. # ⚓ WHO_Head_Pushes_for_Waiver_of_Some_Intellectual_Property Rights [Ed: If you are not the Head of WHO and you express such an opinion Twitter_may_ban_you]⠀⇛ # ⚓ China_extends_lead_over_U.S._in_global_patents_filings, U.N._says [Ed: This says nothing whatsoever about the actual quality of the patents and seems like shallow lobbying by alarmism, calling for more patents and lawsuits to be filed]⠀⇛ China was the biggest source of applications for international patents in the world in 2020 for the second consecutive year and extended its lead over No. 2 filer the United States, the U.N. patent agency said on Tuesday. [...] “The trend is that innovation remains resilient and the sense is that the world needs more innovation … during a crisis,” said Tang. The biggest single filer under this system last year was China’s Huawei Technologies Co Ltd for the fourth consecutive year and second was South Korea’s Samsung Electronics Co Ltd, WIPO said. Singapore’s Tang began his term in October and received strong support from Western countries including the United States in a highly politicised race against a Chinese candidate for the top job last year. # ⚓ New_Apple_Patent_Describes_a_System_That_Detects_Light Through_Display_for_Face_ID_and_Touch_ID [Ed: Apple not only spies on you but also seeks patents or monopolies on the surveillance]⠀⇛ It has been rumored that Apple will eliminate the notch in the future iterations of the iPhone. So far, we have not heard any solid news pertaining to the subject. With that said, Apple has filed a new patent application in which it shares details on a technology that will detect light through the display. The technology can be used in future iPhone models for Face ID and Touch ID. Let’s dive in to see some more details on the Apple patent and how the company aims to implement it. # ⚓ Apple_patent_application_describes_a_simple_way_to_boost battery_life [Ed: So simple that USPTO will still grant on a patent on simple things?]⠀⇛ # ⚓ A_Matter_of_‘Principal’:_A_Critique_of_the_Federal Circuit’s_Decision_in_Arthrex_V._Smith_&_Nephew,_Inc. [Ed: The war on PTAB presses on, led by people who loathe patent quality and want to protect fake patents from scrutiny]⠀⇛ The Supreme Court recently granted certiorari in United States v. Arthrex. In that case, the Court of Appeals for the Federal Circuit held that administrative patent judges are principal officers of the United States under the Appointments Clause, and therefore must be appointed by the President and confirmed by the Senate. This note provides a critique of the Federal Circuit’s opinion in Arthrex by arguing that the Federal Circuit misunderstood the substance of the three-part test articulated by the Supreme Court in Edmond v. United States. # ⚓ Unified_Patent_Court_put_on_hold_–_again [Ed: More patent propaganda from patent profiteers. No, UPC is dead, not on hold, for a lot of reasons including Brexit. Stop syndicating news from law firms disguised as "news" sites or "gazette"]⠀⇛ In 1973, the European Patent Convention (EPC) was signed, creating the European Patent Office. The office was established as a single institution for prosecuting a patent application, from which was granted the European patent, itself a bundle of national patents. The convention entered into force in 1977 with seven contracting states; it now covers 38. The EPC has brought a number of advantages. A single patent prosecution system for 38 states simplifies and considerably reduces the cost of prosecuting a patent in Europe. An opposition procedure allows for central revocation of the bundle of rights (albeit limited to a period of nine months after grant), which again can reduce time and cost. The harmonisation of the laws of validity also mean a certain amount of predictability. [...] Progress of the UPC has, however, been frustrated again. Shortly after the passing of the bill, two constitutional complaints were filed before the FCC. The complaints included an application for an interim injunction to prevent the ratification of the UPC by the German Federal President, Frank- Walter Steinmeier. We have now learned that the president will wait for the outcome of the complaints before ratifying it. This outcome is difficult to predict. The FCC may find the complaints unfounded or inadmissible, meaning that the delay will be limited. However, if admitted, the process could take years. # § Software Patents⠀➾ # ⚓ In_re_Board_of_Trustees_of_the_Leland_Stanford_Junior University_(Fed._Cir._2021)⠀⇛ The Federal Circuit affirmed a decision by the U.S. Patent and Trademark Office Patent Trial and Appeal Board (PTAB) rejecting claims for failure to satisfy the subject matter eligibility standard under 35 U.S.C. § 101, in ex parte examination of claims to methods and related computing systems for genetic haplotyping in In re Board of Trustees of the Leland Stanford Junior University. [...] Completing its Alice analysis, the Board concluded that the claims did not satisfy the requirements of step 2 either, insofar as they did not “include additional limitations that, when taken individually or as a whole, provide an inventive concept that transforms the abstract idea into patent eligible subject matter” (an analysis that illustrates one again the wisdom Congress demonstrated generations ago in substituting obviousness for “inventive concept”). The recited steps “did not go beyond the well-known, routine, and conventional” according to the Board. And in the philosophical coup de grace stemming from dicta in Justice Thomas’s opinion in AMP v Myriad Genetics, the Board stated that the claimed invention was patent-ineligible “although the claims may provide a valuable contribution to science.” Certain other claims, which recited as an affirmative step “providing the drug for treatment” did not transform the genetic analysis claims to patent-eligible ones for failing to satisfy the “five specificities” recited by Judge Lourie in Vanda Pharmaceuticals Inc. v. West-Ward Pharmaceuticals International Ltd., 887 F.3d 1117 (Fed. Cir. 2018), because “they are not directed to a specific method of treatment, do not identify specific patients, do not recite a specific compound, do not prescribe particular doses, and do not identify the resulting outcome.” The Federal Circuit affirmed (not surprisingly, under the circumstances) in an opinion by Judge Reyna joined by Chief Judge Prost and Judge Lourie. The opinion recited the Court’s familiar litany of purported obeisance to the Supreme Court’s subject matter eligibility jurisprudence, down to Gottschalk v. Benson, 409 U.S. 63 (1972), and Parker v. Flook, 437 U.S. 584 (1978), with regard to claims relying on mathematical algorithms. After parsing claim 1 according to the context of its analytical steps, the Federal Circuit held that the Board was correct in finding this claim patent- ineligible because “Claim 1 recites no concrete application for the haplotype phase beyond storing it and providing it upon request.” The Court’s response to Stanford’s argument that “the specific application of the steps is novel and enables scientists to ascertain more haplotype information than was previously possible” was that “we are not persuaded” even if they were to accept Stanford’s argument, nor was this panel convinced even if the invention provides the claimed advance in genetic analysis that the process is “an improved technological process” (which raises the question of the wisdom of denying patent eligibility to an invention that provides an improvement in genetic analysis that does not require a concommittant improvement in the technological process). o § Copyrights⠀➾ # ⚓ DC_Comics_Tells_Artists_to_Stay_Out_of_NFT_Business_or Else⠀⇛ There’s a lot to take in here, and of course, DC Comics absolutely owns Wonder Woman, Batman, and all its characters, and it has every right to want to hold dominion over that intellectual [sic] property [sic] in the NFT industry. The company would probably do the same with physical fan art of DC Comics characters, if it could think of any possible way of managing that on an ongoing basis. # ⚓ Texas_Man_Ordered_to_Pay_$1.6_Million_Damages_for_Selling Pirate_Boxes_on_Facebook⠀⇛ A federal court in Texas has granted a default judgment against a local resident who sold pirate streaming boxes through Facebook. The man, who was identified following an undercover operation, has to pay $1.6 million in damages claim to the Philippine media giant ABS-CBN. # ⚓ The_Dissident:_Uploaded_to_Torrent_Sites_For_Exposure, Delisted_Via_DMCA⠀⇛ The incredible story behind the alleged state- sponsored killing of journalist Jamal Khashoggi is told by director Bryan Fogel in his new movie ‘The Dissident’. Unusually, people connected to the documentary are reportedly uploading copies to torrent sites, to give it exposure in the Arab world. At the same time, however, an anti-piracy campaign is making copies harder to find. # ⚓ Cancellation,_Culture,_and_Copyright⠀⇛ Horton has probably heard that on March 2nd Dr. Seuss Enterprises decided to cease publication of six books that contain “portray[als of] people in ways that are hurtful and wrong.” This produced the cycle of controversy and performative contrarianism that has become as familiar as the list of places Sam won’t eat green eggs and ham. What separates this incident from more recent cancellations is that this time it has turned (at least in part) into a discussion of copyright terms and ownership of works written by those now long dead. The problem of “disappearing works”, when those who hold the rights to something don’t reproduce it, is it falls down the memory hole, never to be seen again, is not a new one. Unlike trademarks, the Copyright Act does not have a use-it-or-lose-it clause. There is a universe like ours but (thankfully) not ours where Orson Welles’s The Other Side of the Wind was one work to suffer such a fate due to coordination issues among various rights holders. While Disney’s “vault” is more of a marketing strategy than a final resting place for older films, there are movies like Song of the South, which likely won’t be made available. ䷩ 𝚕𝚒𝚗𝚎 4871 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/03/15/microsoft-spy/#comments Gemini version at gemini://gemini.techrights.org/2021/03/15/microsoft-spy/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 03.15.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ ✐ More_Than_a_Month_Later_Raspberry_Pi_Foundation_is_a_Microsoft_Censor⠀✐ Posted in Deception, Microsoft at 7:40 am by Dr. Roy Schestowitz Video_download_link http://techrights.org/videos/censoring-forums.webm Summary: The company built on top of much goodwill and volunteering keeps censoring its forums; it’s doing that on behalf of Microsoft whilst ignoring the facts entirely THE Raspberry “SPY” seems like a lost cause; given this_latest_update_from Raspberry_Pi_staff, it almost feels or seems like there’s as much loyalty to Microsoft as there is to the Raspberry Pi Foundation (Limited). It’s stuff such as this which reaffirms our position about the Raspberry Pi, a de facto Trojan horse for Microsoft inside institutions it wants to survey. It’s no secret that Microsoft spies in this fashion; EDGI is one among many examples. “The business model becomes the same as corporate media’s (indoctrination and advertising).”Incidentally, it seems as though Twitter's_absolutely_insane censorship_regime (likely more self-harming than anything else) has taken another turn for the worse. “So, I saw that Emmanuel Goldstein got banned from birdsite for tweeting the word Memphis,” said_some_guy_in_a_BSD-centric Mastodon_instance. “I tested it and was immediately banned. This is fine.” Judging by some of the stuff we’ve been hearing for a while, Twitter is circling down the toilet and in a number of years not much will remain inside that site except conformist nonsense parroted around celebrities and politicians. The business model becomes the same as corporate media’s (indoctrination and advertising). █ ╘══════════════════════════════════════════════════════════════════════════════╛ ¶ Lines in total: 4922 ➮ Generation completed at 02:41, i.e. 76 seconds to (re)generate ⟲