06.29.22

Links 29/06/2022: Russians Moving to GNU/Linux

Posted in News Roundup at 6:13 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

    • Audiocasts/Shows

    • Applications

      • Its FOSSVim 9.0 is Here With a New Script Language Promising Performance Boost

        Vim, the terminal text editor is back with a major update.

        The Vim 9.0 release includes several tiny improvements along with a new script language (Vim9 script).

        Here, let me highlight the key changes.

      • Linux LinksBest Free and Open Source Alternatives to Autodesk 3ds Max


        Autodesk, Inc. is an American multinational software company that makes software products and services for the architecture, engineering, construction, product design, manufacturing, media, education, and entertainment industries. It bills itself as a “… leader in 3D design, engineering and entertainment software”.

        The company was founded in 1982 by John Walker, who was a joint developer of the first versions of AutoCAD, the company’s best known software application. Autodesk is listed on the Nasdaq stock exchange, it has over 11,000 employees, and is headquartered in the San Francisco Bay Area.

        While Autodesk develops many high quality applications they are proprietary software. And the vast majority of their products are not available for Linux. This series looks at the best free and open source alternatives.

      • 9to5LinuxHP Linux Imaging and Printing Drivers Now Support Ubuntu 22.04 LTS and Fedora 36


        HPLIP 3.22.6 is here exactly two months after the HPLIP 3.22.4 release, which only added support for the Manjaro Linux 21.2 distribution and several new printers, to add support for more recent distributions, including Ubuntu 22.04 LTS, Fedora Linux 36, and MX Linux 21.1.

        This means that you can now use your HP printer or scanner device on any of these new Fedora, Ubuntu or MX Linux distributions if you install the HP Linux Imaging and Printing 3.22.6 version.

    • Instructionals/Technical

      • uni TorontoWishing for a simple way to set up multi-interface symmetric routing on Linux

        Setting this up with Linux’s policy based routing is straightforward and almost mechanical. However, the setup has a lot of moving parts and there’s no current automation for it that I know of. You can build your own, of course, but then that means you’re stuck maintaining and operating your own automation; at that point you (we) start asking if you (we) really need symmetric routing, or if it’s just a nice to have thing.

      • Didier StevensQuickpost: Cracking PDF Owner Passwords

        I added code to John the Ripper to crack PDF owner passwords (JtR cracks PDF user passwords only).

      • TecMintHow to Change and Reset Forgotten Root Password in RHEL 9

        While installation of RHEL 9, the installer recommends we choose a complex password and while making the password complex enough, the chances of forgetting our password are quite high. And things get even more complex when your user is not even added to the wheel group (which allows a normal user to elevate root privileges for a small amount of time).

        This tutorial will guide you on how you can change your forgotten root password in 3 scenarios and we are quite sure that you’ll be able to recover your forgotten password at the end of this guide.

      • UNIX CopHow to install ntopng on Ubuntu 22.04?

        In this post, you will learn how to install ntopng in Ubuntu 22.04. This powerful network monitoring tool is a marvel that we can always install to take advantage of it.

      • TecAdminWhat is the /etc/aliases file – TecAdmin

        /etc/aliases is a text file used to store email aliases on a Linux system. Email aliases are basically nicknames for email addresses. They allow you to send emails to a group of people using a single address, or to redirect emails from one address to another.

        /etc/aliases are typically used to store aliases for the system’s mail server. However, it can also be used to store aliases for any other purpose.

        For example, you could use /etc/aliases to create an alias for your own email address. This file is stored in the /etc directory, which is the standard location for system-wide configuration files. /etc/aliases are usually managed by the system administrator. However, you can also edit /etc/aliases yourself if you need to add or change an alias.

      • ELinuxHow to Install LXC to Create Linux Containers on RHEL/CentOS/Rocky Linux

        In this article, I will take you through the steps to install LXC (Linux containers) on RHEL/CentOS/Rocky Linux but before that let’s understand the first LXD. It is a free and open source next-generation system container and virtual machine manager. LXD provides a template that contains images of almost all the major Linux distributions. These images can be used to create Linux containers using the LXC utility. This is a CLI-based client utility provided by LXD. When running a virtual machine, LXD uses the hardware of the host system, but the kernel is provided by the virtual machine. Therefore, virtual machines can be used to run, for example, a different operating system.

      • Its FOSSFinding Your Router’s IP Address (Default Gateway) in Ubuntu and Other Linux

        You probably already know how to get your system’s IP address in Linux.

        But how do you know the IP address of your router?

      • LinuxSecurityGuide to Web Application Penetration Testing

        Web application penetration testing is a technique that aims at evaluating web applications and gathering information concerning the possible vulnerabilities and security flaws in the system. The technique involves a series of steps that include identifying vulnerabilities and gathering detailed information on how these vulnerabilities could compromise the web application and impact business.

      • Linux HandbookHow to Cut, Copy and Paste Text in Nano editor?

        GNU Nano is an editor that has a minimal learning curve and hence is widely used for beginner-level guides.

        That doesn’t mean that it is as easy to use for beginners as a graphical text editor. Why? because you still have to rely on the keyboard shortcuts to do the basic things such as save, undo, etc.

        How about cut, copy and paste in Nano? Does it require specific keyboard shortcuts too?

        Well, yes and no. You can use the mouse to copy-paste. There are also keyboard shortcuts for the same purpose. To cut, you must use shortcuts.

      • Trend OceansHow to Exclude Packages from Transactions using DNF in RHEL Linux

        While updating packages in your system, you might not want to allow specific packages from transactions, such as updates, for various reasons, such as bugs or instability in the latest release.

        Packages such as Kernel, PHP, MySql, Apache, Nginx, Python, etc., are regularly used on the running server. Updating them into unstable releases might lead to a catastrophe event.

    • Games

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Old VCROverbite Palm 0.2

      [...] This update includes Shawn Mulligan’s Sony Clié key patch (thanks!) plus more aggressive memory management and menu compression, which should not only increase the number and length of documents that 68K Palms with their pathetic dynamic heaps can view but also cut down on the fatal Plua-generated “out of memory” errors that our memory heuristics failed to anticipate. [...]

    • Web Browsers

      • PC WorldThe one feature that finally let me switch from Chrome to Vivaldi

        Which brings me to Vivaldi, the hot young single new to town in my increasingly tortured metaphor. Vivaldi reminds me a lot of what Firefox was back when I was in college: a browser designed with power users in mind, includes a ton of tools and options for tweaking, and it doesn’t mind one bit if you feel like adding on some more. It’s far from perfect, especially when it comes to moving tabs around, but it’s well worth checking out. For a more in-depth look at switching from Chrome to Vivaldi, check out Mark Hachman’s great write-up on the topic.

        But I’m here to talk about that one particular tool I can’t live without. I’ve tried Vivaldi at least twice in the past, the most recent being about a year ago, at which point it still didn’t have that essential (for me, at least) shortcut tool. Or maybe it did, and I just didn’t dig around enough to find it: you have to right-click on the active tab, then click. Either way, it’s working, and I can replicate my meticulous collection of websites masquerading as individual apps. Huzzah!

    • Programming/Development

      • APNICIs zero trust living up to expectations?

        Zero trust has been on my radar for almost a decade, as it was part of the environment that enabled network virtualization to take off. We’ve told that story briefly in our SDN book — the rise of microsegmentation as a widespread use case was arguably the critical step that took network virtualization from a niche technology to the mainstream. The term goes back at least to 2009, when it was coined by Forrester analyst John Kindervag and it is possible to draw a line back from there to the principle of least privilege as framed by Saltzer and Schroeder in 1975. That principle states:

        “Every program and every user of the system should operate using the least set of privileges necessary to complete the job.”

      • Manuel MatuzovicAnalyzing pages in a particular state with Lighthouse

        Historically, Lighthouse has analyzed the cold pageload of a page only. Clicking the “Generate report” button reloads the page before Lighthouse runs its tests. This can be problematic when you want to run tests on parts of the UI that are only visible when the user interacts with it. For example, a fly-out navigation, a modal window, or the content in a disclosure widget.

        That has changed with Lighthouse v10. A new experimental feature in Chrome DevTools allows us now to analyze the page in a particular state. Here’s an example: [...]

      • Nolan LawsonSPAs: theory versus practice

        I’ve been thinking a lot recently about Single-Page Apps (SPAs) and Multi-Page Apps (MPAs). I’ve been thinking about how MPAs have improved over the years, and where SPAs still have an edge. I’ve been thinking about how complexity creeps into software, and why a developer may choose a more complex but powerful technology at the expense of a simpler but less capable technology.

        I think this core dilemma – complexity vs simplicity, capability vs maintainability – is at the heart of a lot of the debates about web app architecture. Unfortunately, these debates are so often tied up in other factors (a kind of web dev culture war, Twitter-stoked conflicts, maybe even a generational gap) that it can be hard to see clearly what the debate is even about.

      • HishamTurns out gcc has imperative argument handling

        Everything in it has a reason, of course, but the end result is that you get a weird mix where the order matters for some args and not for others PLUS there are imperative arguments: [...]

      • Matt RickardHistory of Version Control Systems: Part 2

        The second generation of version control systems introduced project-level concepts like repositories and new ways to collaborate – merging as an alternative to locking, branches, and networked file systems.

        Some of the most popular VCSs in the second generation were CVS, ClearCase, and Perforce.

      • Tim BraySmall Tables

        The problem · As described in a (pretty short) previous episode of this Diary, Quamina matches Patterns to Events, which are flattened into field-name/value pairs for the purpose. We try to match field names and values from Events to those offered in a Pattern. Matching names is easy, they’re immutable strings both in Events and Patterns, and thus the following suffices.

  • Leftovers

    • Education

    • Hardware

      • James BrownReflecting on Photography Gear; Leaving Micro Four Thirds

        I did some research and played with some gear, and, well, where I’ve landed is Fujifilm, right back where I was from 2005 through 2008. I started off with an X100V a few months ago as a compact, carry-everywhere camera to take pictures of my son with9, and a few weeks ago I decided to trade in all of my m43 gear to the local camera shop10 and get an X-T4 as an interchangeable-lens “big camera”11. Something just clicked with me and the manual controls really make sense to me now — why would you ever want a PASM dial when you can just have an aperture ring with an A setting and a shutter dial with an A setting?

      • CNX SoftwareArm Immortalis-G715 GPU supports hardware-based ray tracing – CNX Software

        Arm has unveiled the new Immortalis family of flagship GPUs with support for hardware-based ray tracing starting with the Immortalis-G715 GPU, as well as two new premium Mali GPUs namely Arm Mali-G615 and Mali-G715.

        Software-based ray tracing was already implemented on Arm Mali G710 on SoC’s such as the MediaTek Dimensity 9000, but the hardware-based ray tracing in the Immortalis-G715 delivers over 300 percent performance improvements, and only uses 4% of the shader core area. This will be mostly used in games to generate realistic lighting and shadows as can be seen in the “before vs after” video demo below.

      • TechTargetNew HPE ProLiant servers with Arm target energy savings

        The new Arm-based HPE ProLiant RL300 Gen11 is a single-socket system that incorporates the Ampere Altra and Ampere Altra Max cloud-native processors. The new chip contains 128 cores and is designed to take advantage of the energy saving capabilities of the Arm processor, the company said during its HPE Discover conference this week.

      • The Next PlatformHPE Is The First Big OEM To Adopt Ampere Computing Arm Chips

        Hewlett Packard Enterprise has been an early and enthusiastic supporter of alternate processor architectures outside of the standard Xeon X86 CPUs that comprise the vast majority of its revenues and shipments, particularly with Arm server chips starting in 2011.

    • Health/Nutrition/Agriculture

    • Proprietary

      • India TimesGoogle to shut down Hangouts, tell users to switch to Chat

        The company mentioned that users who wish to keep a copy of their Hangouts data to use Google Takeout — to download their data before Hangouts is no longer available in November 2022.

      • The VergeGoogle Hangouts is shutting down in November

        As for users who use Hangouts in Gmail on the web, Google says it won’t start prompting users to make the switch to Chat until July. Hangouts will remain usable on its desktop site until November, and Google says it will warn users “at least one month” in advance before it starts pointing the Hangouts site to Chat.

    • Security

      • NeowinFabricScape: Microsoft patches Azure security flaw affecting only Linux workloads [Ed: Microsoft is now a prime source of anti-Linux FUD, serving to distract from vastly more urgent and critical (usually not even patched) holes in Windows]

        Like most cloud and local environments, Microsoft Azure also acts as an attack vector for malicious actors. Since a security flaw in Azure can potentially impact millions of consumers, it is essential that Microsoft patches such problems in a timely manner. Now, the company has revealed details about one such issue that it recently patched in Azure Service Fabric.

      • [Old] Terence EdenI’ve locked myself out of my digital life

        Imagine…

        Last night, lightning struck our house and burned it down. I escaped wearing only my nightclothes.

        In an instant, everything was vaporised. Laptop? Cinders. Phone? Ashes. Home server? A smouldering wreck. Yubikey? A charred chunk of gristle.

        This presents something of a problem.

        In order to recover my digital life, I need to be able to log in to things. This means I need to know my usernames (easy) and my passwords (hard). All my passwords are stored in a Password Manager. I can remember the password to that. But logging in to the manager also requires a 2FA code. Which is generated by my phone.

      • TechRadarMicrosoft promises official fix for Windows VPN issues, but you’ll have to wait

        The fixes for a number of VPN issues that have been plaguing some Windows versions since this month’s Patch Tuesday are coming. Microsoft has finally confirmed that last month’s Patch Tuesday introduced connectivity issues on servers with Routing and Remote Access Service (RRAS) enabled, noting that client endpoints could also struggle to connect to these servers, experiencing connection drops. The fixes will most probably be arriving as part of July’s Patch Tuesday, meaning affected users will need to exercise just a little more patience.

      • Privacy/Surveillance

        • EFFEFF to European Court: Keep Encryption Alive

          In Telegram Messenger LLP and Telegram Messenger Inc. v. Russia, the company behind the popular messaging app Telegram refused to hand over confidential private user information to the Russian Federal Security Service. A Russian court subsequently convicted, fined, and briefly blocked internet access to Telegram. Following those actions, Telegram asked the ECtHR to find violations of its right to free expression, right to fair trial, and right to adequate legal remedies.  

          EFF and our partners filed an amicus brief before the ECtHR, asking the ECtHR to safeguard encrypted online communications. Electronic communications have long become one of the main avenues of seeking and receiving information, and participating in activities and discussions, including on issues of political and social importance. Free expression rights are at stake, both for the individuals that use encrypted electronic messaging applications, and the intermediaries that offer them.  

          As the UN Special Rapporteur on the Freedom of Opinion and Expression noted in his 2015 report, privacy is a “gateway for freedom of opinion and expression.” Encryption is key to free and safe communications, particularly for journalists, human rights defenders, lawyers, activists, and dissidents. That is why we invited the ECtHR to consider the risks to Internet users in Ukraine, and activists in Russia, if their private communications or their identities were revealed to the Russian authorities in the course of the current conflict.

        • Democracy NowEncrypt, Obscure, Compartmentalize: Protecting Your Digital Privacy in a Post-Roe World

          Reproductive health advocates are urging Congress to pass the My Body, My Data Act, which will prevent consumer data that is related to reproductive health from being used as criminal evidence. Protecting how sensitive personal information is collected and stored online is critical to combating anti-abortion laws, says Daly Barnett, staff technologist at the Electronic Frontier Foundation. Barnett also shares practical advice for securing your online privacy now, such as utilizing encryption and creating a culture of consent. “Privacy should just be a default for people,” says Barnett. “It shouldn’t be something that the end users have to fight for, especially when the data is potentially dangerous, that could be used as criminal evidence.”

        • New York Times‘An Invisible Cage’: How China Is Policing the Future

          While largely unproven, the new Chinese technologies, detailed in procurement and other documents reviewed by The New York Times, further extend the boundaries of social and political controls and integrate them ever deeper into people’s lives. At their most basic, they justify suffocating surveillance and violate privacy, while in the extreme they risk automating systemic discrimination and political repression.

        • New York TimesLost and Found: USB Sticks With Data on 460,000 People

          The final thing the technician was supposed to do after a shift last week was clear the USB sticks of their confidential information. Instead, once he had transferred the data, he dropped the tiny storage devices into his bag and headed to an izakaya. There, he spent about three hours drinking sake with three colleagues, then stumbled into the streets before eventually passing out.

          By the time he woke up around 3 a.m. last Wednesday, his bag — containing the two USB drives, one of them a backup device with the same information — was gone. So was his precise memory of what had happened.

          Also missing, embarrassed officials in Amagasaki, an industrial city northwest of Osaka, explained at a news conference, were the names, birthdays and ID numbers of about 460,000 people: the entire population of the city. Their home addresses and bank details were in the trove of data, too.

        • John GruberHow to Temporarily Disable Face ID or Touch ID, and Require a Passcode to Unlock Your iPhone or iPad

          I’ve written about this — e.g. here and here — but because I consider it one of the single most important things to know about iOS, I should write about it more often. Even if you’re not the sort of person who typically shares iPhone tips with your friends and relatives, this is one that you should spread the word about.

          The problem is this: if you use Face ID or Touch ID on your device (and you almost certainly should), what happens if law enforcement (or anyone else for that matter) takes your device and physically forces you to unlock it biometrically? There is some legal precedent supporting the notion that police can force you to do this, but can’t force you to provide them with a passcode or passphrase.

          Here are two essential things everyone should know.

        • Scribe“Magic links” can end up in Bing search results — rendering them useless.

          The only logical explanation was that Microsoft was sharing email data (links included) with Bing for indexing. We all know that these ESPs harvest our data, but surely they don’t index private email content…right?

        • Stacy on IoTLet’s ask a teen about Amazon’s really odd idea for Alexa

          In other words, they weren’t having any of it. Now, my child isn’t a representative sample of the population by any stretch. But the fact that a 15-year-old was so quickly able to pinpoint how creepy this example is and express their horror within just moments of hearing about it had me wondering what, exactly, the folks at Amazon were thinking.

        • TorTor is much slower latterly than it used to be
  • Defence/Aggression

    • ScheerpostRussian Exiles

      A century ago, the October Revolution of 1917 and the Civil War that followed it generated a vast wave of Russian exiles…

    • The NationIt Was a Coup, and Trump Fully Intended to Lead It

      That was the signal on January 6 from the man who, as Thompson said at the opening of these hearings, was at the center of a conspiracy to launch a coup against the United States. There will be more testimony from more Republicans with close ties to Trump that will detail the former president’s wrongdoing, but the proof and the evidence is accumulating for the Department of Justice to charge Trump and his top aides with seditious conspiracy to overturn the results of an election and illegitimately maintain Trump’s tenure as president. Hutchinson’s testimony may inspire more aides and allies of the former president to step up, as Thompson and Cheney urged them to do on Tuesday. But it is now clear that January 6th Committee member Adam Kinzinger (R-Ill.) was right when he said last week, “I think what we’re presenting before the American people certainly would rise to a level of criminal involvement by a president.”

      Kinzinger said that before Hutchinson testified. Now, Hutchinson has pulled the threads together.

    • India TodayHindu shopkeeper beheaded in Udaipur over social media post on Nupur Sharma, 2 held

      Reacting to the incident, BJP leader Amit Malviya said, “Two Muslim men behead Kanhaiya Lal, a Hindu shopkeeper, inside his shop in Udaipur. They then release a video of the act and another owning up the crime, brandishing machetes used and vow to kill Prime Minister Modi. Ashok Gehlot, however, has promised “thorough” investigation…”

    • ANF NewsErdoğan repeats announcement of new invasion in northern Syria

      One can be confident that Turkey will use all its political, economic and military capabilities to achieve its goals for 2023 (100th foundation day of the republic) and realise the “vision for 2053″ (600th anniversary of the Ottoman conquest of Constantinople), Erdoğan said, referring to his dream of a Grand Turk-Islamist empire. He also said that the “operations to redeem” the border with Iraq from “terrorist attacks” – meaning Turkey’s invasion of southern Kurdistan, which has been ongoing since mid-April – would continue successfully. The “new offensives” in Syria will be launched when all “weaknesses in the security corridor” have been eliminated, he stated.

    • ADFReport Details Scope, Illegal Practices Of China’s Fishing Fleet

      China commands the world’s largest distant-water fishing fleet (DWF), has the world’s worst illegal, unreported and unregulated (IUU) fishing record, and its crews are known to abuse foreign workers, according to the Environmental Justice Foundation (EJF).

      An EJF report released in March offers the first global analysis of China’s DWF. It was based on an analysis of China’s own limited fisheries data, which the nation made available in recent years. China’s fishing fleet has targeted African waters, especially the Gulf of Guinea, for decades.

    • Counter PunchMore Bloat For Bloated Defense Spending

      As of now, the top line defense budget figure is an astounding $847 billion, designed to counter inflation; the Russian invasion of Ukraine; and the Pentagon’s unwillingness to fund unneeded weapons systems.  Russia’s official defense spending in 2021 amounted to less than $65 billion, according to the Stockholm International Peace Research Institute, which provides authoritative data and analysis on military spending and armed conflict.  Russia’s pathetic military performance in Ukraine over the past four months argues against any increase in the Pentagon’s budget.

      The bipartisan frenzy for additional military spending was reflected in the remarks of Senate committee chairman Jack Reed (D/RI), who argued that the inflation demanded greater spending, and ranking member Jim Inhofe (R/OK), who said the defense bill was “everything I hoped for.”  And why not?  The entire global community spends about $2 trillion on defense, and the United States represents more than half of that figure when you add the military costs in the budgets of the intelligence community, the Veterans’ Administration, the Department of Energy, and the Department of Homeland Security.  This year’s defense bill is even named for Inhofe, who is retiring at the end of the 117th Congress, following 30 years of boosting defense spending in the Senate.

    • Counter PunchA Cold War with China, Global Warming, and Why We Can’t Have Nice Things

      The basic story is that cold wars cost money, lots of it. If we spend large sums of money building up our military to meet the challenge of our Cold War adversary, we won’t have the money needed to address climate change. It’s sort of like if you spend your whole paycheck on gambling and alcohol, you won’t have money to pay the rent and for your kids’ college education.

      To get an idea of what is at stake, we are currently projected to spend an average of 3.0 percent of GDP on the military budget over the next decade. During Reagan’s Cold War buildup in the 1980s, military spending peaked at more than 6.0 percent of GDP. Spending went to over 9.0 percent of GDP when we had actually hot wars in Vietnam and Korea.

    • TruthOutJanuary 6 Panel Moved Up Hearing Over Fear That Meadows Aide Is in Danger
    • ScheerpostThousands Take to Streets Against Upcoming NATO Summit in Madrid, Spain

      Protesters claimed that NATO was responsible for various wars, from Yugoslavia to Libya, and is pushing for an arms race across the globe. They demanded that NATO be disbanded to ensure peace and s…

    • ScheerpostNATO To Increase High-Readiness Forces To Over 300,000 Troops

      NATO Secretary-General Jens Stoltenberg announced Monday that the alliance will increase its high-readiness…

  • Transparency/Investigative Reporting

    • BellingcatRussia’s Kremenchuk Claims Versus the Evidence

      Yet as with other claims made by Russia, such as in Bucha and Kramotorsk earlier in the war, these do not appear to be supported by the available open source evidence and videos from the scene.

  • Environment

    • [Old] uni MassachusettsRewriting the History Books: Why the Vikings Left Greenland

      They then analyzed that 2,000 year sample for two different markers: the first, a lipid, known as BrGDGT, can be used to reconstruct temperature. “If you have a complete enough record, you can directly link the changing structures of the lipids to changing temperature,” says Isla Castañeda, professor of geosciences at UMass Amherst and one of the paper’s co-authors.

      A second marker, derived from the waxy coating on plant leaves, can be used to determine the rates at which the grasses and other livestock-sustaining plants lost water due to evaporation. It is therefore an indicator of how dry conditions were.

    • Copenhagen Post300-year-old ship journals to help understand climate change

      The journals were written during voyages made around the world – with the oldest record dating back to 1675.

      The organisations will compare past weather events to predict weather events, helping us to understand climate change and what to expect in the future.

    • Energy

      • YLEElectricity firms agree plans for third line between Finland, Estonia

        Finnish and Estonian electricity grid operators, Fingrid and Elering, have signed a letter of intent to begin planning the construction of a third subsea cable connection between the countries, Fingrid announced in a statement on Tuesday.

        Once completed the EstLink 3 connection beneath the Gulf of Finland will have an estimated capacity of between 700 to 1,000 megawatts, according to the company.

    • Wildlife/Nature

      • Pro PublicaGrain Elevator Project Could Destroy African American Historical Sites, Preservation Agency Says

        The federal agency charged with overseeing historic preservation policy has expressed concern that a Louisiana industrial project could inflict harm on African American historic sites. The move follows a ProPublica investigation that found an archeological consulting firm had gutted a report to the Army Corps of Engineers that originally detailed that harm.

        In a letter sent last week to the Army Corps, the Advisory Council on Historic Preservation said it is aware that the report commissioned by the developer of the project “has been challenged by the original author of the report.” It went on to state: “The ACHP requests that the Corps clarify how it will address this issue.” The Corps is considering a permit application from the project’s developer.

  • AstroTurf/Lobbying/Politics

    • India TimesTwitter India given ‘last chance’ to follow IT rules

      The Centre has granted Twitter India “one last opportunity” to comply with the country’s Information Technology Rules by July 4 or risk losing its immunity as an intermediary, people directly aware of the development told ET.

      The Ministry of Electronics and Information Technology’s (MeitY) action follows Twitter’s “repeated failures to act on the content take-down notices sent under Section 69 A of the IT Act” as well as on “non-compliance notices issued for not taking the content down,” officials in the know told ET.

      In the notice sent on Monday—which has been reviewed by ET—the ministry pointed out that the microblogging platform failed to comply with notices sent on June 6 and June 9.

    • Jacobin MagazineBiden’s Campaign for “Digital Democracy” Is Really a Giveaway to Big Tech

      The Information Technology and Innovation Foundation — a think tank backed by Apple, Microsoft, and Uber — answers that democracies, unlike authoritarian states, would never abuse technology: “Authoritarian nations will use technology for authoritarian purposes. Democratic nations will use them for legitimate and civil-liberty-protecting purposes.”

      This kind of black-and-white thinking creates a self-reinforcing logic: when democratic states and their tech companies engage in surveillance, we can assume that it is for the cause of freedom, but when authoritarian states do it, it is for the purpose of social control. Was the NSA listening in on Angela Merkel’s phone calls a triumph of representative government? Are YouTube’s efforts to deplatform Palestinian activists justified by the will of the majority? Is Facebook facilitating genocide in Myanmar and Ethiopia “what democracy looks like”? Apparently so.

      In truth, spying on people and stealing their data is abhorrent regardless of the nature of the government performing or sanctioning that surveillance. Regrettably, surveillance capitalism has become a driving force in the global economy. Across the world’s democracies, republics, oligarchies, monarchies, theocracies, and dictatorships, accumulating data for profit has become the modus operandi of many companies.

    • Democracy NowInvestigation: Facebook Is Helping Anti-Abortion Clinics Collect Highly Sensitive Info on People

      We look at the fight for privacy rights in a post-Roe America amid concerns that anti-abortion activists could use identifying data from online platforms like Facebook to target abortion seekers. Investigative reporter Grace Oldham describes how this data is already being used by medically unlicensed “crisis pregnancy centers” that actively lure patients to discourage them from seeking abortions. These anti-abortion clinics put people who are considering an abortion at risk to misinformation on reproductive health, or worse, open them to criminal prosecution, says Oldham, whose recent report for Reveal is headlined “Facebook and Anti-Abortion Clinics Are Collecting Highly Sensitive Info on Would-Be Patients.”

    • Foreign PolicyAmerica Is Losing Its Value Proposition

      The first of these legs was, of course, the country’s economic strength, which gave it the ability to accomplish astonishing feats. During World War II, this meant producing a staggering 122 aircraft carriers, as well as airplanes in correspondingly great quantities. Broad-shouldered efforts like these armed not only U.S. forces but also those of its allies, including the Soviet Union, helping to ensure the defeat of Japan and Germany. Once peace was won, American wealth famously underwrote recovery in Europe and Asia, including among its just-defeated principal adversaries.

    • The HillRussian-backed [crackers] target Lithuanian websites [iophk: Windows TCO]

      Lithuania’s acting director of the National Cyber Security Centre, Jonas Skardinskas, said the disruption was an ongoing distributed denial of service (DDoS) attack that targeted the country’s Secure National Data Transfer as well as other governmental institutions and private companies.

    • Silicon AngleRussian hacking group takes responsibility for DDoS attacks on Lithuania [iophk: Windows TCO]

      The cyberattacks follow a decision by Lithuania to restrict the transit of steel and ferrous metals to Kaliningrad, a Russian exclave on the Baltic Sea that can only be accessed by land through Lithuania or Poland. Lithuania restricted the goods because of European Union sanctions, but the decision enraged the Kremlin, who denounced the move as unprecedented and unlawful.

    • The Baltic TimesIT system disruptions cause passport issuance delays in Lithuania [iophk: Windows TCO]

      IT system disruptions have caused delays in passport issuance in Lithuania, Evelina Gudzinskaite, director of the Migration Department, confirmed to BNS on Monday.

      Some Lithuanian public agencies and companies have been the targets of cyber-attacks since last week.

      Gudzinskaite did not confirm to BNS that the disruption was due to an attack, but said that information about the incident had been sent to the Information Technology and Communications Department under the Interior Ministry.

    • The Gray ZoneRight-wing intelligence cabal seeks UK Home Secretary Priti Patel’s help to ‘neutralize’ environmentalist enemies
    • Misinformation/Disinformation

      • AxiosNobelist Maria Ressa: Social media is corroding U.S. democracy

        Why it matters: Ressa, a Filipino American co-founder of news organization Rappler, says the next wave of elections around the world, including the U.S. midterms in November, provides another opportunity for social media to spread disinformation, divide people against one another and incite violence.

  • Censorship/Free Speech

    • TechdirtChina Unveils New Regulations Requiring Sites To Pre-Censor All Comments

      Tech Review quotes people saying that it’s unlikely (for now) that Beijing will require everyone to pre-review every comment (recognizing that’s likely to be impossible), but that it will put pressure on sites to be much more proactive, and that it could force this “feature” to be used on highly controversial topics.

      It does seem that a straightforward reading of the law is that it requires sites to at least build out the functionality to pre-approve all comments if need be, even if it does not need to be on all the time.

      There are some other features in the new regulations, including granting more power to who can block comments, suggesting that content creators themselves will have more power to censor comments in response to their content (rather than relying on the service’s in-house censors to do so).

    • BBCUdaipur: India state on alert after murder over Prophet Muhammad row

      The victim, a tailor named Kanhaiya Lal, was killed in Udaipur district on Tuesday by two Muslim men, who filmed the act and posted it online.

      They claimed the act was in retaliation for the victim’s support for controversial remarks made by a politician on the Prophet Muhammad.

    • The VergeFacebook and Instagram will remove posts offering abortion pills

      Following the Supreme Court’s overturning of Roe v. Wade on Friday, social media users have shared posts offering to mail abortion pills to people whose access to abortion has been stripped away or will be soon.

      But users are finding their offers quickly removed or restricted, as reported by Motherboard and the Associated Press. A test Facebook post by an AP reporter offering to mail abortion pills was removed within one minute. A test by a Verge reporter yielded similar results, with a post offering abortion pills being flagged within two minutes.

      The sale, gifting, and transfer of firearms and marijuana are also prohibited under the same section of Meta’s restricted goods policy that bans pharmaceuticals. Yet test posts by the AP that offered to mail guns and weed were not removed; a similar test by The Verge offering to mail cannabis wasn’t immediately removed by Facebook.

    • Hollywood ReporterInstagram Blames “Bug” After Posts About Abortion Are Hidden From Public View

      “We’re hearing that people around the world are seeing our ‘sensitivity screens’ on many different types of content when they shouldn’t be. We’re looking into this bug and working on a fix now,” the Instagram communications team tweeted.

    • BIA NetJournalists protest ‘disinformation bill’: ‘Greatest censorship in Turkey’s history’

      Members of 10 several journalism groups attended the demonstration organized by the Confederation of Progressive Trade Unions of Turkey (DİSK) Press Union in Şişhane in İstanbul’s Beyoğlu district.

      They opened a banner that read, “No to the law of silencing, intimidation and incarceration! The press is free, it cannot be censored.”

      The bill that passed the parliament’s Justice Committee last week introduces prison sentences of up to three years for spreading disinformation. It also expands the authority of the Presidency Communications Directorate on news outlets.

    • CNNChinese censors scrub internet after senior party official gives speech on timeline of zero-Covid in Beijing

      Chinese censors scrambled to delete what appears to be a misleading quote by a senior Communist Party official published in state media Monday, which claimed the “zero-Covid” policy would remain in place in Beijing “for the next five years,” in an effort to tame an online backlash.

    • LawfareThe EU’s Proposal on CSAM Is a Dangerous Misfire

      The EU proposal would undo 20 years of progress in securing communications, while employing a set of technologies unlikely to achieve its stated goals. Even worse, the solutions it proposes for handling CSAM would create national security risks by weakening the best tool available for securing communications, end-to-end encryption, and defining a mission without the technology to accomplish it.

    • TruthOutFacebook Is Helping Anti-Abortion Clinics Collect Highly Sensitive Personal Data
    • NPRInstagram and Facebook begin removing posts offering abortion pills

      Almost immediately, Facebook and Instagram began removing some of these posts, just as millions across the U.S. were searching for clarity around abortion access. General mentions of abortion pills, as well as posts mentioning specific versions such as mifepristone and misoprostol, suddenly spiked Friday morning across Twitter, Facebook, Reddit and TV broadcasts, according to an analysis by the media intelligence firm Zignal Labs.

      By Sunday, Zignal had counted more than 250,000 such mentions.

    • The VergeMeet the Viking merchants of the internet

      Morningstar has also hit some bumps along the way, which further compounds her point about passion superseding all else. While she is able to earn money from her craft, her revenue streams are more limited than most. She no longer earns any income from YouTube or TikTok — her guess is that this is because of how she dresses — although still sees the platforms as valuable ways to advertise her other work streams like commercial smithing and modeling.

    • ANF News67-year-old receives ten months imprisonment for wearing a green-yellow-red scarf

      The Turkish state considers the wearing of the Kurdish national colours as “terror propaganda”. This is proven once again by the prison sentence against 67-year-old Kurdish woman Menci Orman. Orman and her daughter Şahide Orman Özek were charged with “terror propaganda” for wearing green-yellow-red scarves at the Newroz celebrations in 2015 and 2022 respectively. The trial at the Third Hevay Penal Court in Hatay began with a demand for the defendants’ acquittal. Her lawyer reported that Orman was questioned after her detention without a translator or lawyer, although she does not understand Turkish. The court nevertheless considered the fact that Orman held up a scarf in the Kurdish colours as “terror propaganda” and sentenced her to ten years in prison.

    • BangladeshOutrage as Hindu college principal is forced to wear garland of shoes in Bangladesh

      The incident took place in the wake of a Facebook post by a Hindu student who shared a photo of Indian BJP leader Nupur Sharma, who has been criticised for her remarks on Prophet Muhammad.

      According to locals, some Muslim students asked the Hindu student to delete the post after he went to the college.

      Tension mounted when rumours spread that acting Principal Swapan Kumar Biswas took the Hindu student’s side. Angry Muslim locals and students set the motorcycles of the principal and two teachers on fire. The mob also clashed with police.

      A video of the incident showed the locals and students putting a garland of shoes around Swapan’s neck, accusing him of belittling Islam.

    • ScheerpostA Football Coach’s Prayer is Not About Freedom. It’s About Coercion.

      In a decision riddled with lies, the Supreme Court rules that a football coach can, should they choose, become a dictator-priest.

  • Freedom of Information / Freedom of the Press

    • TruthOutJustice Thomas Wants to Make It Easier for People to Sue Media Outlets for Libel
    • The Telegraph UKWas Jill Dando really murdered by mistake?

      When former BBC undercover journalist Lisa Brinkworth met with her lawyers in Paris last September, they revealed some quite startling news. The 55-year-old – who has spent the past two decades trying to expose allegations of rape and sexual abuse in the fashion industry – was informed that when Jill Dando was murdered in 1999, it may have been she who was the intended target.

    • France24Public-sector journalists protest Macron plans to end media tax over fears for independence

      Some FRANCE 24 programming will be disrupted on Tuesday due to a strike across France’s state broadcasting sector over President Emmanuel Macron’s plan to abolish the TV licence fee and fund public media broadcasters through general taxation. Media unions say Macron’s proposal will undermine the independence of public service media and could lead to budget cuts.

    • BIA NetJournalists in İstanbul express solidarity with arrested Kurdish journalists

      “The ruling power, which is trying to reinforce its power through elections and warmongering, aims to intimidate the media that it cannot control,” she said. “For these exact reasons, on June 8, a day that will go down in history as a shame and disgrace, 20 Kurdish laborers of the free press were detained. After eight days in detention, our 16 friends were arrested unfairly and unlawfully. As if it wasn’t enough, the pro-government media targeted our friends with mise-en-scenes and fiction.

      “We won’t explain that our friends are journalists, because they were arrested because they are journalists. The operation carried out with baseless claims and mise-en-scene is obvious. What is being targeted is not only our friends, it’s not only their freedom and journalism, or journalism itself! It’s much more than that!”

    • BIA NetJamal Khashoggi’s fiancee protests bin Salman’s visit to Turkey

      Prince Mohammed bin Salman, of Saudi Arabia, visited Turkey yesterday (June 22) for the first time since the murder of The Washington Post columnist Jamal Khashoggi in 2018 at the kingdom’s consulate in İstanbul.

  • Civil Rights/Policing

  • Internet Policy/Net Neutrality

    • Internet Freedom FoundationUps and downs in the journey towards net neutrality

      We recently wrote to the Telecom Regulatory Authority of India (TRAI) and the Department of Telecommunications (DoT) about net neutrality. In our letter to TRAI, we expressed our sincere appreciation for actions taken to uphold net neutrality in India. In our letter to DoT, we conveyed our concerns with regard to the steps that still need to be taken to protect and uphold net neutrality.

  • Monopolies

    • Copyrights

      • Torrent FreakPiracy Domains Seized By US Because Verisign & GoDaddy Are American

        The Department of Justice and Homeland Security Investigations (HSI) have just announced the seizure of six music piracy domains. The seizures were straightforward due to Verisign and GoDaddy being American companies. However, additional facts regarding these seizures, including on whose behalf they were supposedly carried out, raise key issues that don’t make much sense.

      • Torrent FreakPirate Site Blocking Expands to Kenya with Landmark Court Order

        In a landmark case, Kenya’s High Court approved a permanent injunction that requires local ISPs to block 44 sports streaming sites. The case was filed by entertainment giant MultiChoice, which owns the broadcast rights to popular sports events. A proposal to repeal the applicable law was submitted in Parliament last year, but that ultimately failed.

  • Gemini* and Gopher

    • Technical

      • Programming

        • Lambda, the Ultimate Copilot

          Coming up with languages like C++ and Delphi and Java, my mind was kinda blown when I first saw Scheme.

          You could just put (print “Hello word”) in a file and that worked. That’s the start and end of it. Implicit name space declaration, return type, argument type, return values, main argument. No need for the Black Maria, goodbye to the Brixton sun.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Tuesday, June 28, 2022

Posted in IRC Logs at 2:53 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 Qma4SPNZnw5wwLpxwXmfgMytp87QRB4sjMieDyLsSVgLh4 IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmQSqa39F6XGHNQrCGLAjfVpnCiAcShfz6aQGXiHTJPKRW IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmWqnNQVCrHZyBAxNYjfPU4iMGeEksY4TzmBPSTb48QJiY IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmUMUoKzJvgqXd8Jp4KmLNf2VuVsYxW1ndfPr1HvxQozGX IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmNx7wKU4P9avjNLG5cNRgc3xbGMs7WZTLQ6jvgCCgdbCr IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmaJnRH57PsGdD1Y5xAdFvvgjJEC7jngCSzwZE8mu9AgNW IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmW2egGYut8oYS87PhdR6pfMri17xMk8kXBtKxxDR1AST7 IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmXzrBAUcLgPpTwpGviR6Nk78T7RLXD9rk3cwgbrmsoiPS IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmTanxCbrRzbMhGwCHPd6tznN3vqohgB6ksoqtyCiMnDFL

[Meme] The Delegates’ Munich Rally (June 29th 2022), Re-electing a Corrupt Dictator?

Posted in Europe, Patents at 12:52 am by Dr. Roy Schestowitz

 Munich Rally
Will EPO have António Campinos for another year or several more years? It might not even survive that long because this brings destruction upon itself…

Summary: The EPO's presidency is still being bought using bribes, so there’s no real democracy (auctions, not elections); The reference may be seen as offensive, but remember Benoît Battistelli‘s family ties to Nazism

N.B. Charlie McCreevy tried to paint efforts to rectify patent law (and the EPO) as “anti-Americanism”. It’s a straw man. He said: “The theme, or the background music, to both of these particular directives you could see as part of, anti-globalisation, anti-Americanism, anti-big business protests — in lots of senses, anti-the opening up of markets.” To whom? To banks?

Most “Job Applicants to an Examiner Position at EPO Who Were Offered a Job Did Not Take it”

Posted in Europe, Patents at 12:30 am by Dr. Roy Schestowitz

Desirability of EPO jobs has plunged for nearly a decade already [1, 2], deepening the crisis (the EPO cannot recruit people in accordance with the standards set/specified by the EPC)

To all those who think that the EPO is heaven on earth, according to my info in 2021 more than 50% – FIFTY – of the job applicants to an examiner position at EPO who were offered a job did not take it, many of them not even bothering to inform the EPO that they would not come. So to those who think that the working conditions at EPO are over the top, that the working atmosphere is cool or the kind of work one performs there is so exciting, well sorry but Gen Z and millennials may beg to differ
This new comment contains what seems like new information

Summary: One of many interesting comments left since Monday

CNX Software or CNX Microsofter?

Posted in Marketing, Microsoft at 12:15 am by Dr. Roy Schestowitz

Recent: The C in CNX Software is Not “Community” | Unethical Advertising, Published as So-called ‘Articles’, in CNX Software

CNX Software spam

CNX SoftwareSummary: Is the money worth it, CNX? You are putting off readers, very few of whom are likely to be using antique versions of Microsoft Office; better to focus on news, not spamfarming

Links 28/06/2022: Vim 9.0 and vnlog 1.33

Posted in Free/Libre Software at 12:00 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Applications

      • LWNVim 9.0 released

        Version 9.0 of the Vim text editor has been released. The biggest change would appear to be the addition of the “Vim9 Script” language for editor customization…

      • vnlog 1.33 released

        This is a minor release to the vnlog toolkit that adds a few convenience options to the vnl-filter tool.

    • Instructionals/Technical

      • Julia EvansNotes on running containers with bubblewrap

        Hello! About a year ago I got mad about Docker container startup time. This was because I was building an nginx playground where I was starting a new “container” on every HTTP request, and so for it to feel reasonably snappy, nginx needed to start quickly.

        Also, I was running this project on a pretty small cloud machine (256MB RAM), a small CPU, so I really wanted to avoid unnecessary overhead.

        I’ve been looking for a way to run containers faster since then, but I couldn’t find one until last week when I discovered bubblewrap!! It’s very fast and I think it’s super cool, but I also ran into a bunch of fun problems that I wanted to write down for my future self.

      • HowTo GeekFix: Why Isn’t Linux Detecting My Wi-Fi Adapter?

        Historically, Linux has had a somewhat strained relationship with Wi-Fi cards. In recent years, the situation has changed considerably—and for the better—but it is still possible to boot into your new Linux installation and get that sinking feeling when you realize you’ve got no Wi-Fi.

        Installation routines are very good at identifying the various components of the target computer and configuring itself to work with that hardware. But problems can still happen.

        Troubleshooting hardware issues is difficult, especially if the only computer you have on hand is the broken device. Obviously, not everything presented here will be applicable to all cases. But hopefully, something below will either fix your issue or point you in the right direction.

      • Network WorldOpen-sourced tool speeds up Linux scripts via parallelization | Network World

        MIT has open-sourced pa.sh (also called pash), a tool that can dramatically speed up Linux scripts by using parallelization, saving time and without risk of introducing errors.

        The process of parallelization first examines a script for code that can be run separately and independently, so not all scripts can benefit from the tool. But when pa.sh does find portions that can run independently, it runs them in parallel on separate CPUs. It also uses other techniques to get the code to run faster.

        Below is a demonstration I ran on my home Fedora box, first running a script on its own and then again using pa.sh. Note that this script was provided with the pa.sh tool and lends itself to parallelization. It’s not nearly as demanding as scripts that might process gigabytes of data in a scientific or artificial-intelligence lab, so the results are not dramatic.

      • HaikuOS[GSoC 2022] ARM port and device tree support Phase 1

        The following will show how to compile haiku on osx and run it on qemu (my version: hrev56168)

      • EarthlyBuilding in Kubernetes Using Tekton

        Continuous integration/continuous delivery (CI/CD) principles offer multiple benefits to software organizations, including faster time to market, higher-quality code, and simpler and faster fault isolation. Applications built using CI/CD pipeline best practices tend to see a huge increase in users over time, necessitating a migration from a large codebase and low-scalability monolithic architecture to a more manageable and efficient microservice architecture.

        Kubernetes is one of the most popular platforms for automating the management, deployment, and scaling processes of microservice applications. Because Kubernetes is complex, though, a framework can help developers and operations teams use the platform to follow CI/CD practices in building applications. This is where Tekton comes in.

      • DragonFly BSD DigestHetzner cloud and DragonFly

        When you are setting up a DragonFly machine on Hetzner, pay attention to this bug report for dhcp setup. The short answer is “use dhcpcd”.

      • MakeTech EasierEmacs Keyboard Shortcuts – Make Tech Easier

        Emacs is a fully-featured text editor that is both powerful and extensible out of the box, without needing to install any additional packages to make it work. With Emacs, you can easily manipulate text and files by executing Lisp commands. These commands, in turn, are then bound to a series of simple keybindings which allows you to focus on what you need to do.

      • ELinuxHow to easily encrypt/decrypt a file in Linux with gpg

        No matter what you’re doing on your computer, you need to do so with an eye to security — that means using strong passwords, storing files in safe locations, and in some cases encrypting files. Fortunately, for nearly every usage, there are tools to enable you to encrypt your data…from transferring data online to storing data on a locally attached storage, even encrypting your entire drive.

        Since gpg is built into almost every Linux system, you won’t have to install anything to get this working from the command line. I’ll also show how to gain this functionality within the Nautilus (GNOME Files) file manager tool.

      • dwaves.degnu linux – bash console – animated ascii art – sl steam locomotive
      • OMG UbuntuTerminal Tip: ‘duf’ is Prettier Alternative to the ‘df’ Command – OMG! Ubuntu!

        I wouldn’t call myself a command line ninja but I do have a soft spot for getting things done using a CLI.

        At the end of 2021 I wrote a list of the best command line apps I use on the regular. In that rundown I spotlighted btop, a powerful and engaging alternative to top, and intro’d ncdu, an awesome, interactive replacement for the regular du command, written in Ncurses.

        This week I came across a similarly flashy “replacement” for another command that I use from time to time: df.

        Df is a command line basic that relays file system disc space usage on a(ll) drive(s). There are ample options you can pass to Df to tailor the output to your needs (something the df man-page will walk you through better than I can):

      • Linux Made SimpleHow to install FNF Psych Engine 0.6 Week 7 on a Chromebook

        Today we are looking at how to install FNF Psych Engine 0.6 Week 7 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

        This tutorial will only work on Chromebooks with an Intel or AMD CPU (with Linux Apps Support) and not those with an ARM64 architecture CPU.

      • Using fwupdmgr to update NVME firmware – nullr0ute’s blog

        The fabulous fwupdmgr provides the ability to easily update firmware that is published to Linux Vendor Firmware Service (LVFS) but it can also be used to apply updates that aren’t necessarily in LVFS. One type of firmware that it supports updating is NVME firmware, that’s basically any NMVE, because the standard specifies a standardised mechanism for updating the firmware on all NVME devices.

        I had a need to update a NVME firmware in an aarch64 device to see if it fixed an issue I was seeing. The Crucial P2 supported options were of course x86 only. The ISO download actually contained a little LinuxOS in an initrd on the .iso. The advice from Richard the fwupd technical lead was to “Look for a ~4mb high entropy blob” so mounting it up, I mounted the iso, extracted the initrd, and then used fwupdmmgr to apply the new firmware.

  • Distributions and Operating Systems

    • Fedora Family / IBM

      • IBM’s AI-powered Mayflower ship crosses the Atlantic [Ed: This was a complete failure. It did not even reach its destination.]

        A groundbreaking AI-powered ship designed by IBM has successfully crossed the Atlantic, albeit not quite as planned.

        The Mayflower – named after the ship which carried Pilgrims from Plymouth, UK to Massachusetts, US in 1620 – is a 50-foot crewless vessel that relies on AI and edge computing to navigate the often harsh and unpredictable oceans.

      • HPE Allies With Red Hat and SUSE on Containers – Container Journal

        At the HPE Discover 2022 conference, Hewlett-Packard Enterprise (HPE) today expanded its reach into container environments via separate alliances with Red Hat and SUSE.

        The Kubernetes-based Red Hat OpenShift platform along with Red Hat Enterprise Linux (RHEL) operating system and Red Hat Ansible automation platform will be made available via the HPE GreenLake managed service, HPE said.

    • Debian Family

      • Daniel PocockConsent & Debian’s illegitimate constitution

        When an association is founded, whether it is incorporated or not, each member must give positive consent to be a member and to be bound by the organization’s constitution. Being a member and being governed by the constitution are inseparable. The constitution is effectively a type of contract between the members. If a contract is not signed, it is not valid and if a member has not assented to create the association, they are not a member at all.

        Between 1993 and 1998, the original authors of Debian worked together without a constitution. They achieved a lot.

        When a constitution was proposed in 1998, 357 co-authors of Debian were asked to vote on the constitution. This is not really voting though: people who gave a positive vote were agreeing to be members. People who gave a negative vote or did not vote at all have not consented to the constitution and therefore there is no way we can think of them as members of anything.

        The names of people who voted were published. Those people, just 86 developers, became members of an association by giving their positive assent to be governed by a constitution in their dealings with each other.

        That means there are 357 – 86 = 271 people, or 76 percent, who were satisfied to work on Debian as joint authors without any notion of an association.

        A few weeks after 86 people formed their association, Jonathan McDowell copied 489 keys into the Debian keyring repository. Some people have more than one key so it is not exactly 489 people. By combining the 86 confirmed members with all the people who did not choose to be a member, McDowell and others have made it hard for the rest of the world to distinguish who is a member and who is simply an author of Debian.

    • Open Hardware/Modding

      • Tom’s HardwareRaspberry Pi Restores Guitar Amp, Complete With Effects | Tom’s Hardware

        Restoring old hardware is always more fun when you can throw in a Raspberry Pi. This project, created by maker and developer David Silverman, does just that, using a Pi to power an old Vox guitar amplifier. Not only does it work as an amplifier, it also has a few special effects thrown in to create custom sounds.

        This Pi-powered guitar amp system is housed inside the cabinet of an old Vox amplifier that, according to Silverman, is no longer working. A Pi 3B+ brings back the original functionality, with the help of a class D amplifier and some custom Python scripts created by Silverman himself. The case has been modified to house the Pi and features panels with port access, as well as knobs for the effects array.

      • LiliputingLilbits: Anbernic Win600 (handheld gaming PC), PineNote (Linux-friendly E Ink tablet), Firefox 102 and Chrome OS 103 – Liliputing

        The Anbernic Win600 handheld gaming PC is expected to go on sale July 5th. While Anbernic has been offering ARM-based handheld consoles with Android or Linux-based software for years, this will be the company’s first model with an x86 chip. It ships with Windows 10 software and supports alternate operating systems – Anbernic has already posted a download image and installation instructions for Valve’s Linux-based Steam OS.

        [...]

        In other recent tech news from around the web, developers are making progress porting Linux to work with Pine64’s PineNote E Ink tablet, specs and pictures of Samsung’s next rugged phone have leaked, Mozilla has released a new version of the Firefox web browser, and Google has released a new version of the operating system that powers Chromebooks.

  • Free, Libre, and Open Source Software

    • OSI BlogSentry: Why we support OSI

      Sentry is a developer-first application monitoring tool that allows development teams to holistically monitor their application health from frontend to backend. Used by 3.5 million developers and 85,000 organizations including some of the world’s best-known companies including GitHub, Peloton, Cloudflare and more.

    • Web Browsers

      • Mozilla

        • Make Use OfFirefox 102 Lands on Linux With Upgraded Geolocation, PDF Viewer, but Will Users Care?

          Firefox 102 has just been released by the Mozilla Foundation. One major Linux-specific change is the addition of GeoClue geolocation support, as well as a new PDF viewer.

          Firefox 102 Linux Enhancements

          Firefox 102′s major enhancement for Linux is its support for the GeoClue service. GeoClue is a Linux-specific service for the D-bus message service that allows programs running on the same machine to communicate with each other. GeoClue is a service that approximates a user’s location and allows apps that use geolocation to function, such as mapping apps.

        • OMG UbuntuThunderbird 102 is Available to Download — And It Looks Amazing – OMG! Ubuntu!

          A new version of Thunderbird, the popular free, open source e-mail client, is available to download for Windows, macOS, and Linux.

          And from the off the update makes a great first impression thanks to refreshed app icons and colourful new mail folders.

          I know, I know: “new icons” sounds a bit fluffy on paper, but their reality is more impactful. In an app like Thunderbird icons are used everywhere. They’re not there to (just) look good but also convey purpose/intent as clearly and concisely as possible. They’re how people understand the app.

        • ThunderbirdThunderbird 102 Released: A Serious Upgrade To Your Communication

          Thunderbird 102 is here! On behalf of the entire Thunderbird team, I’m thrilled to announce the availability of our major yearly release. Thunderbird 102 is loaded with highly-requested features, and we think you’ll be delighted by them.

          It features refreshed icons, color folders, and quality-of-life upgrades like the redesigned message header. It ushers in a brand new Address Book to bring you closer than ever to the people you communicate with. Plus useful new tools to help you manage your data, navigate the app faster, and boost your productivity. We’re even bringing Matrix to the party!

    • FSF

      • FSFHelp others find free software: Watch and share Escape to Freedom

        “Escape to Freedom” is a new animated video from the Free Software Foundation (FSF), giving an introduction to the concepts behind software freedom: both what we gain by having it, and what rights are at stake.

        Join our lead freedom-seeker, Zara, as she learns the importance of free software, and guides herself through the labyrinth of challenges posed to her by contemporary digital society, which offers the tempting allure of convenience in exchange for important rights. In search of freedom, she learns how to seize control of her own seemingly predetermined narrative and helps others do the same — taking the ladder that leads to digital liberation step by step.

      • FSFFlock over to Mastodon on July 8 for an interactive session

        I hope this message finds you well, because we have some exciting news! On July 8, from 16:00-17:00 EDT (20:00-21:00 UTC), we are hosting a “Mastodon Hour.”

    • FSFE

      • FSFEGreece about to secure Router Freedom but leaves fiber out

        Greece is one step closer to securing Router Freedom, but regulators are excluding fiber (FTTH) connections from the legislation. A coalition of organisations, allies of the FSFE, is now requesting that lawmakers reconsider this and thus safeguard the freedom of all users.

        Since 2021, the regulatory process that defines the network termination point (the NTP) in Greece has been carried out by the Hellenic Telecommunications and Post Commission (EETT). Defining the NTP is necessary to determine whether users have the right to choose their own router and modem or if their Internet Service Providers (ISPs) have the final say over network equipment.

        In April 2022, we welcomed that the Greek regulator proposed legislation safeguarding Router Freedom for common networks, such as DSL and coaxial. This is a leap forward in safeguarding consumer rights. However, in the same proposal, EETT has explicitly excluded fiber connections (FTTH), a decision that has the potential of negatively impacting end-users’ rights. The proposed regulation sets the NTP for fiber connections in a position that would make the optical terminal equipment part of the ISPs’ networks, making home network access equipment the property of the ISP.

        The FSFE assisted a coalition of organisations to respond to the EETT’s public consultation, supporting the regulator to implement Router Freedom for all types of internet connection, including FTTH.

    • Programming/Development

      • MedevelBishop AI: A JavaScript-based Virtual Assistant With Natural Language Processing

        It was created in 2018, making it one of the newest open source software. And it is also released under the MIT license. The program is written in JavaScript, and built to handle Q/A style conversation.

        [...]

        Bishop AI is a MIT project; that’s why it is very likely that you will find it already packaged and available to install.

      • MedevelAI Based Virtual Assistant in Python

        Many automation tools aims to help user in many fields in their life such as opening any application on the system, play and control music, solve mathematical expressions, getting weather details, and more.

  • Leftovers

    • Hardware

      • CNX SoftwareKEEN Ranger PT 4G LTE camera supports animal and human detection [Ed: Another gimmick with "apps" and fake camouflage]

        I’ve tested a few security cameras with human and vehicle detection capabilities, but Reolink has now added animal detection via the KEEN Ranger PT trail camera mostly designed to monitor four-legged animals in the wild.

        It’s somewhat similar to the Reolink Go Plus 4G camera with solar power support and 4G LTE connectivity, but also offers a 360° view with pan/tilt control, a low-glow IR night vision, a 0.5s fast trigger speed, as well as GPS to track the position of cameras or sightings of animals on the mobile app.

      • HowTo Geek“Atari Was Very, Very Hard” Nolan Bushnell on Atari, 50 Years Later

        It’s been 50 years since Nolan Bushnell co-founded Atari, which brought video games to the mainstream. To celebrate, we asked Bushnell what he learned during the early years—and what we’ve lost sight of since then.

    • Health/Nutrition/Agriculture

      • John GruberThe Dissent

        There’s a lot to read regarding today’s 6-3 decision by the U.S. Supreme Court to overturn Roe v. Wade, making official what we’ve known was about to happen since a near-final draft leaked in early May. I humbly suggest starting with the dissent, written by all three dissenting justices, Breyer, Sotomayor, and Kagan. Their dissent begins on page 148 of the PDF decision.

    • Linux Foundation

      • FOSSLifeOpen Source Security Report Highlights Vulnerabilities in Code Dependencies [Ed: FUD as "studies"]

        Snyk and the Linux Foundation have released The State of Open Source Security, a joint research report that details various security risks resulting from the widespread use of open source software (OSS) in application development, including vulnerabilities found in dependencies.

      • Linux Foundation’s Site/BlogDelta Lake project announces the availability of 2.0 Release Candidate – Linux Foundation

        Delta Lake has been a Linux Foundation project since October 2019 and is the open storage layer that brings reliability and performance to data lakes via the “lakehouse architectures”, the best of both data warehouses and data lakes under one roof. In the past three years, lakehouses have become an appealing solution to data engineers, analysts, and data scientists who want to have the flexibility to run different workloads on the same data with minimal complexity and no duplication – from data analysis to the development of machine learning models. Delta Lake is the most widely-used lakehouse format in the word and currently sees over 7M downloads per month (and continues to grow).

      • Dark ReadingLinux Foundation Announces Open Programmable Infrastructure Project to Drive Open Standards for New Class of Cloud Native Infrastructure
      • Silicon AngleDatabricks donates Delta Lake framework and MLflow operations platform entirely to open source – SiliconANGLE

        Databricks Inc. opens its Data + AI Summit today with the announcement that it will release the entirety of its Delta Lake storage framework to open-source under the oversight of the Linux Foundation.

        That means there will no longer be any functional differences between the Databricks-branded Delta Lake and the open-sourced version. The company said it will similarly release its recent enhancements to the MLflow machine learning operations platform and Apache Spark analytics framework to open source. Databricks also rolled out several new features for its core Lakehouse data lake.

    • Security

      • Daniel StenbergOops, I spilled the beans | daniel.haxx.se

        Saturday June 18: I had some curl time in the afternoon and I was just about to go edit the four security advisories I had pending for the next release, to brush up the language and check that they read fine, when it dawned on me.

        These particular security advisories were still in draft versions but maybe 90% done. There were details, like dates and links to current in-progress patches, left to update. I also like to reread them a few times, especially in a webpage rendered format, to make sure they are clear and accurate in describing the problem, the solution and all other details, before I consider them ready for publication.

        I checked out my local git branch where I expected the advisories to reside. I always work on pending security details in a local branch named security-next-release or something like that. The branch and its commits remain private and undisclosed until everything is ready for publication.

        (I primarily use git command lines in terminal windows.)

        The latest commits in my git log output did not show the advisories so I did a rebase but git promptly told me there was nothing to rebase! Hm, did I use another branch this time?

        It took me a few second to realize my mistake. I saw four commits in the git master branch containing my draft advisories and then it hit me: I had accidentally pushed them to origin master and they were publicly accessible!

        The secrets I was meant to guard until the release, I had already mostly revealed to the world – for everyone who was looking.

      • The Register UKTencent admits to poisoned QR code attack on QQ account
      • Sysdig Adds Ability to Make Container Runtimes Immutable – Container Journal

        Sysdig today added a Drift Control capability to its container security platform that makes it possible to lock down runtime environments.

        Daniella Pontes, senior manager for product marketing at Sysdig, says IT teams can now maintain immutable instances of runtimes in production environments that can’t be modified.

        At the same time, Sysdig says it is partnering with Proofpoint to make threat intelligence feeds available to IT teams that have deployed its container security platform.

        The Sysdig container platform is built on Falco, an open source container runtime security platform that is being advanced under the auspices of the Cloud Native Computing Foundation (CNCF).

      • TechRepublicBest ways to incorporate security into the software development life cycle

        The software development life cycle is not a one-off process that software developers can implement in a linear form. Instead, there are phases of the SDLC that intertwine into many loops where thorough checks are carried out to ensure the proper outcome of the software.

        However, it’s not just enough to loop through the phases of SDLC without the proper integration of security checks in each phase. So, what, then, makes a secure software development life cycle?

      • Security WeekCISA Says ‘PwnKit’ Linux Vulnerability Exploited in Attacks [Ed: Well, CISA and the media also downplay all the actively-exploited holes in Windows. In corporate media, remote compromise of Microsoft Windows is treated as equally severe as a GNU/Linux users, already with access to a machine, running a command as a more privileged user. Amazing.]

        The US Cybersecurity and Infrastructure Security Agency (CISA) says a Linux vulnerability tracked as CVE-2021-4034 and PwnKit has been exploited in attacks.

        The flaw, which came to light in January, affects Polkit, a component designed for controlling system-wide privileges in Unix-like operating systems. Polkit is developed by Red Hat, but it’s also used by other Linux distributions.

        PwnKit has been described as a memory corruption issue that can be exploited for privilege escalation — it allows any unprivileged local user to elevate permissions to root.

    • Defence/Aggression

      • Marcy WheelerCassidy Hutchinson Proves that Trump Knew the Mob He Sicced on Mike Pence Was Armed

        Cassidy Hutchinson just gave absolutely historic testimony implicating Donald Trump, Mark Meadows, and other in January 6. (My live tweet is here.) The woman is incredibly poised and courageous. Her testimony might help to turn the tide against Trumpism in this country.

        But her testimony is not enough, yet, to charge Trump in January 6.

        Without taking anything away from her dramatic testimony, I’d like to boil down what she said that will be useful in holding Trump accountable.

  • Gemini (Primer)

06.28.22

Steven Vaughan-Nichols: Mouthpiece for Jim Zemlin, Salaried by (or via) ZDNet

Posted in Deception, Free/Libre Software, GNU/Linux at 11:39 pm by Dr. Roy Schestowitz

ZDNet and Zemlin are both funded by and connected to Microsoft

Steven Vaughan-Nichols puff pieces
All the fluff about OIN and the Linux Foundation is paid for. It’s a priority because of money.

narratives.zdnet.com
The business model (other than advertising for companies like Microsoft). Jim Zemlin’s PAC openly admits paying so-called ‘news’ sites to parrot the press releases. These folks brag about this in sponsorship brochures.

Summary: In ZDNet, all the latest 5 “articles” about “Linux” are just spam/puff pieces for the Linux Foundation (screenshot above), a front group of monopolies and foes of the GPL. ZDNet’s Steven Vaughan-Nichols also defamed the person behind the GPL. Follow through to narratives.zdnet.com and find: “Through ZDNet Narratives, our advertising partners tell their comprehensive product and solutions stories” (so it’s not journalism but narratives for sale or coin-operated pundits who cover what the sponsors tell them to)

RMS et al
Image source unknown; there’s this new letter in support of RMS (to quote, “June 24, 2022. Added a letter in support of Richard Stallman by Francisca Pacheco López.”)

Twitter: From ‘Engagement’ Bots to Fake Stats

Posted in Deception at 11:06 pm by Dr. Roy Schestowitz

Recent: Elon Musk is Right About Twitter Faking Its Importance and Using Doctored, Manipulated ‘Stats’ (or Bots) to Boost Valuation Based on Lies | Visual Proof That Twitter Very Likely Faked Its Magnitude the Moment Musk et al (KSA, Ellison and so on) Wanted to Buy

Twitter Fake Stats
I’ve not posted anything in nearly 4 months; this is clearly a mistake, but such mistakes fool and motivate “useds” in the platform (thinking Twitter has more impact than it really has)

Summary: Just like in YouTube, where SPAMnil still engages in clickfraud (bots that fake the number of views), Twitter is clearly misleading everybody to give a false sense of importance

« Previous entries Next Page » Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts