This page permanently redirects to gemini://gemini.techrights.org/2014/10/04/webos-is-back/.
● 10.04.14
● Links 4/10/2014: WebOS is Back
Posted in News Roundup at 4:58 pm by Dr. Roy SchestowitzContentsGNU/LinuxGNU/Linux
=> ↺ ‘Tux Machines’ DDOS Attack Moves to ‘TechRights’
- The DDOS attack that has rendered the popular Linux site Tux Machines virtually unreachable for nearly two weeks, now seems to be affecting sister site TechRights. Roy Schestowitz, publisher of both sites, told FOSS Force that the attack on TechRights began at about one o’clock Friday afternoon GMT.
Kernel Space
Graphics Stack
=> ↺ NVIDIA GeForce GTX 980 Dominates With OpenCL On Linux
- The GeForce GTX 980 dominates as well under OpenCL as it does with OpenGL. While the GTX 980 has just 2048 CUDA cores compared to 2,880 on the GTX 780 Ti, the Maxwell architecture is a heck of a lot more efficient and powerful than Kepler. My earlier GTX 980 Linux review is worth reading if you’re not yet up to speed with NVIDIA’s new GeForce GTX 900 series as the new graphics cards are real winners for Linux users as long as you don’t mind obliging to using proprietary hardware drivers on your systems.
=> ↺ Freedreno 1.3.0 DDX Brings Several Fixes
- Rob Clark has released an updated X.Org DDX driver for his Freedreno driver project that continues to strive towards reverse-engineering the Adreno graphics processors found on Qualcomm’s ARM SoCs.
=> ↺ Radeon 7.5 X.Org Driver Enables Hawaii, Adds New PCI IDs
- AMD’s Alex Deucher released a new version of the xf86-video-ati DDX driver for X.Org Servers on Wednesday night.
=> ↺ X@FOSDEM 2015: Call For Presentations About Mir, Wayland, Etc
- Luc Verhaegen has issued his annual call for speakers for those developers wishing to discuss their work on X.Org-related projects, including Wayland, Mir, Mesa, etc.
=> ↺ Intel’s DRM Driver Changes Coming Up For Linux 3.18
- I’ve been writing for a while already about the DRM graphics changes coming to Linux 3.18 even with Linux 3.17 not being quite out yet while courtesy of Intel OTC’s Daniel Vetter is a comprehensive list of the i915 DRM changes to be found for the next kernel development cycle.
Applications
=> ↺ checkmp3: Does exactly that
=> ↺ numfmt: Saving you a trip to Google
=> ↺ Backup Your Ubuntu Or Derivative System Via Timeshift 1.6.2 (For Ext) Or Timeshift BTRFS (For BTRFS)
- The latest version available is Timeshift 1.6.2, which has been released a while ago, coming with a brand new clone button for cloning the entire system, improved first snapshot size estimation, cleaned terminal output and support for saving backups on LUKS-encrypted partitions.
- While the regular Timeshift works only with the EXT file systems, the developer has forked it to work with BTRFS, under the name of Timeshift BTRFS.
=> ↺ qAndora – A Cross Platform, FOSS, Pandora Radio Player
- One of my goals for this year is to become proficient in a cross platform GUI tool kit. The toolkit I’ve chosen to get my hands dirty with is Qt because in addition to being cross platform it also has a fantastic amount of documentation.
- I always find I learn programming easier when I am building some practical instead of going through various tutorials that you just throw away when you are done. So with that, my “learn Qt” project is something I’m calling qAndora.
Proprietary
=> ↺ Univention Provides Active Directory Path to Linux
- Univention Corporate Server can be a cost-effective alternative to upgrading to Microsoft Server 2012.
Instructionals/Technical
=> ↺ How To Install Kadu 1.0 On Ubuntu 14.10, Ubuntu 14.04 And Derivative Systems
=> ↺ How To Install G’Mic 1.6.0.1 On Ubuntu 14.10, Ubuntu 14.04, Ubuntu 12.04 And Derivative Systems
=> ↺ How To Install AppGrid 0.199 On Ubuntu 14.10, Ubuntu 14.04 And Derivative Systems
=> ↺ How To Install Audacity 2.0.6 On Ubuntu 14.10, Ubuntu 14.04, Ubuntu 12.04 And Derivatives
=> ↺ How To Install Bikeshed 1.52 On Ubuntu 14.10, Ubuntu 14.04, Ubuntu 12.04 And Derivative Systems
=> ↺ How To Install Atom 0.135.0 On Ubuntu 14.10, Ubuntu 14.04, Ubuntu 12.04 And Derivative Systems
=> ↺ How To Install Angry IP Scanner 3.3.2 On The Most Popular DEB/RPM Based Linux Systems
=> ↺ How To Install Kernel 3.13.11.8 On Ubuntu 14.04, Linux Mint 17, Elementary OS 0.3, Pinguy OS 14.04 And Other Ubuntu 14.04 Derivative Systems
=> ↺ How To Install FrostWire 5.7.7 On Ubuntu, Debian, Fedora, CentOS, OpenSUSE, Mageia, OpenMandriva And Derivative Systems
=> ↺ Using GNU Global for local source code indexing
- If you are not a fan of using an online source code searching tool like lxr.kde.org, but are still tired of grepping for a particular class or function in the KDE Frameworks (and other projects as well), you might find the GNU Global tool quite useful.
Wine or Emulation
=> ↺ WineHQ – Wine Announcement
Games
=> ↺ GOL Survey Results: September
- Valve have released the Steam Hardware Survey results for September and thus, GOL’s first survey comes to an end. 670 people completed the survey, which is quite a nice sample – so thanks all of you who took the time to do it.
=> ↺ Dreamfall Chapters Adventure Game Release Date Announced In New Video
- Dreamfall Chapters is a highly anticipated sequel to The Longest Journey and Dreamfall: The Longest Journey. The game will finally released on October the 21st.
=> ↺ We Are Streaming Borderlands 2 (Updated With VODs)
=> ↺ NS2: Combat FPS Game Has A New Teaser
- The newest game in the Natural Selection series titled NS2: Combat has a new teaser trailer out and it’s looking good!
=> ↺ Crusader Kings II 75% Off on Steam and 2-Day Free Trial
- Crusader Kings II is a strategy game available on Linux, featuring single and multi-player, and set in various historical periods. Crusader Kings II was launched in 2012 and it received positive reviews.
=> ↺ J.U.L.I.A.: Among The Stars Sci-fi Adventure Released On Linux, Plus Some Thoughts
- For those that have read us for some time you will probably know I am a big space sci-fi fan, so J.U.L.I.A.: Among the Stars ticks literally every single box for me. Here’s my thoughts on the soon to be released Linux version.
- J.U.L.I.A.: Among the Stars was funded on Indiegogo and even though they didn’t hit the goal for Linux they still decided to bring it to our platform, and we have been lucky enough to be able to give it a run.
=> ↺ City-building Game Banished Is Still Being Ported To Linux, Woo
- Banished is a city-builder from Shining Rock Software LLC that was praised rather a lot when it came out, and the developer noted they planned a Linux version. We caught up with the developer to see when.
Desktop Environments/WMs
K Desktop Environment/KDE SC/Qt
=> ↺ Maui using KDE Frameworks 5
- In the past months cooperation has increased between Maui, KDE and LXDE developers, not only regarding libraries, but also key components such as SDDM (which has become the new standard for Qt based login managers) or Calamares, a new unified installer framework based on Qt.
- In the meantime, KDE also released their long awaited effort named KDE Frameworks 5. Frameworks 5 is a comprehensive set of technologies for the Qt ecosystem.
=> ↺ The Maui Project Switches To KDE Frameworks 5
- The Maui Project that’s been focusing on a Wayland desktop, their own Wayland compositor, and other tasks has decided to adopt the KDE Frameworks 5.
=> ↺ My very first commit to KDE
- After helping with a recent local KDE translation sprint, Andrej Mernik suggested that I should ask for direct commit access to the KDE localisations SVN, so I do not bug him or Andrej Vernekar to commit translations for me.
GNOME Desktop/GTK
=> ↺ Using GNOME Boxes to create and access local virtual systems on GNOME 3.14
=> ↺ GNOME 3.14 and Elementary OS Turning Heads, Bash Bashed
- The release of GNOME 3.14 on September 24 has earned good marks and Elementary OS is still getting positive reviews. Gearhead Mark Gibbs introduces users to Debian GNU/Linux. We have Scott Dowdle and Christian Schaller on Fedora 21 Alpha and Phoronix is reporting Rahul Sundaram suggests using Dash instead of Bash. We have more on Shellshock and its fallout as well as some gaming news from GamingOnLinux.com. And finally today is an opinion on Mark Shuttleworth’s September 30, 2014 post.
=> ↺ Is GNOME 3.14 winning back Linux users?
- The GNOME desktop has had a rough last few years. The transition from GNOME 2 to GNOME 3 left a bad taste in the mouths of many GNOME users, and some abandoned GNOME for other desktops. But PC World thinks that GNOME 3.14 could be just what the doctor ordered to bring some of those users back to the GNOME desktop.
Distributions
Red Hat Family
=> ↺ Scientific Linux 7.0 RC2 Is Ready For Testing
- For those seeking Scientific’s re-spin of Red Hat Enterprise Linux 7.0, it should soon be coming with today marking the availability of Scientific Linux 7.0 RC2.
- Pat Riehecky on the behalf of Fermilab and others announced Scientific Linux 7.0 x86_64 Release Candidate 2 as the latest available for testing — months after RHEL 7.0 shipped along with CentOS 7.0, Oracle Linux 7.0, etc.
=> ↺ Intel’s i7-5960X + X99 Motherboard On CentOS 7.0 Has Some Pains
- With this new system, the CentOS 7.0 x86_64 release didn’t fully support the hardware. The USB mouse didn’t work at all (for what it’s worth was a ROCCAT Lua), the Gigabit Ethernet wasn’t detected, and the installation process crashed for unknown reasons. The installation target was to an Intel 530 Series M.2 SSD.
Fedora
=> ↺ Software Freedom Day Hanoi: Fedora Report
=> ↺ Last bit on Shellshock, plus Fedora Governance, Flock, Fedocal, and F21
Debian Family
=> ↺ APT (Advanced Package Tool) 1.0.9.2 Fixes a Few Regressions and Problems
- APT (Advanced Package Tool) is a set of core tools inside Debian that allow users to install, remove, and keep applications up to date. A new version of APT is now out and brings even more improvements.
=> ↺ Better Know an OS: Debian GNU/Linux
- Debian GNU/Linux, more usually just called “Debian,” is an operating system distribution or “distro” where the kernel can be either Linux or kFreeBSD (the FreeBSD kernel). Wikipedia notes that “… there are 1,276 times as many Linux users as there are kFreeBSD users.” Adventurous geeks might also like to try the unofficially supported multi-server microkernel called GNU HURD. The distro is free and open source mostly under the GNU General Public License.
- The Debian project began in 1993 and the first release was in 1996. The most recent release, version 7.6, codenamed “Wheezy”, was released on July 12, 2014. The next release, version 8, codenamed “Jessie”, is currently in Beta 1 release.
Devices/Embedded
Phones
Ballnux
=> ↺ Tizen Samsung Gear S coming to Germany 17 October for Euro 399
- At this year’s IFA, Samsung has introduced a new SmartWatch, which goes by the name Gear S. This Smartwatch has a twist, actually a 3G integrated twist, but I’m sure you already know about that.
- In a press release, Samsung have announced that the Gear S will be available in Germany starting on the 17 October. The suggested retail price is Euro 399, which is what we anticipated for a european launch.
=> ↺ WebOS pops up in LG SmartWatch leak
- Like Samsung, which offers both Android Wear and Tizen-based smartwatches, LG has apparently decided to have a Plan B in hand, or rather on the wrist. According to The Verge, a developer website hosted by LG teased an upcoming SDK for a WebOS-based LG SmartWatch with a “Coming soon!” tag. An image on one of the screens showed a Bean Bird logo borrowed from LG’s WebOS based smart TVs, as well as a rough sketch of a round-faced watch (see below).
Android
=> ↺ How an iOS developer transitioned to Android
- iOS has long been a popular platform for some developers. But what happens when a longtime iOS developer decides to try his hand at programming for Android? Tom Redman shares how he learned to appreciate Android, and notes some of the differences between Android and iOS development.
=> ↺ How I Accidentally Became an Android Developer
- My name is Tom, and I’m Buffer’s Android developer, though you might be surprised to learn that before Buffer I had very little experience developing for Android.
=> ↺ Android Candy: Goodbye RDP, Hello Chrome Remote Desktop!
Free Software/Open Source
=> ↺ Open Source Lures The Killer App Closer
- A comment like that will draw some fire from IBM. Big Blue has megabucks invested in Linux and is tooting the Eclipse horn to prove its openness in developing software such as Rational Developer for i. Zend Technologies has had success with PHP, as has other application development vendors such as Profound Logic and BCD. And newcomer to the IBM i community, PowerRuby, has joined the app dev party as well.
Web Browsers
Mozilla
=> ↺ Mozilla might add Tor encryption to its Firefox web browser
- The proof of concept for this is already out in The Pirate Browser, a product of The Pirate Bay, which offers a Firefox Tor bundle designed to access banned websites, though not specifically to protect anonymity. Tor’s web browser, too, is a version of the open source Firefox web browser.
Funding
=> ↺ An update from the Pitivi 2014 summer battlefront
- You may have been wondering what has been going on since the 0.93 release and the Pitivi fundraising campaign.
FSF/FSFE/GNU/SFLC
=> ↺ The Reasons I Love GNUstep — Speaking for Free Software
- Recently, I had a discussion with RMS about being a speaker for Free Software. In the end I was told simply to record some of my talks and that I would be given some feedback, but during the discussion I explained why I think GNUstep is important to free software and I believe that this is something that I think is important for other people to understand as well:
Public Services/Government
=> ↺ Myanmar to build open source e-government platform
- Myanmar is to build an open source e-government platform with help from Vietnam.
- The first phase of the platform will be launched at the end of the year with functions allowing officials to manage citizen data and exchange information with other ministries and local governments, according to Vietnamese media reports.
- The platform will be upgraded in 2015 with cloud technology, and capabilities to handle more complex datasets and mobile users, it added.
Openness/Sharing
=> ↺ Licensing Lord of the Rings, Borderlands 2 on Linux, and more
=> ↺ How Crowdfunding and Open Source Research Will Fight Cancer
- What does an open source research approach mean for cancer? How will crowdfunding help develop better drugs faster? How will making a research project’s data accessible to anyone open up new avenues for research and innovation? A chemist who’s been writing software since his childhood aims to find out.
Leftovers
=> ↺ Apple boycotts COMPUTER BILD: An open letter to Tim Cook
- In a video COMPUTER BILD showed how easy it is to bend an iPhone 6 Plus. The reaction from Apple: no more testing devices and no more invites for COMPUTER BILD. It is time for an open letter to Tim Cook.
=> ↺ Apple’s Responds To Tech Mag Showing The Amazing Bending Phone By Freezing Them Out Of Bendy Apple Products
- If you’ve paid attention to anything tangentially related to technology news over the past couple of weeks, you’re probably familiar with “bendgate”, the feverish reaction to the realization that Apple’s newest iPhone 6 Plus includes the feature of a bending case if you accidentally sit on it or something. As an Android loyalist, these reports have been an endless source of entertainment thus far, but even that has now been trumped by Apple’s reaction to the issue. Apparently the company has decided that the best response to a technology news organization’s reporting on the bendy Apple phones is to threaten to freeze that publication out of future bendy phones and likely-bendy Apple events.
Security
=> ↺ Friday’s security updates
=> ↺ Apple reaction to Bash exploit shows contempt for users
- Of all the technology companies in the world, Apple is easily the biggest in terms of its cash pile. Yet when it comes to security issues, the company appears to be unwilling to invest enough resources to keep its users safe in a timely fashion.
=> ↺ 17,000 Macs infected with botnet controlled via Reddit
- Russian security company Dr. Web has discovered a flaw in the Mac OS X, which enables hackers to control infected computers using a search service at Reddit. The company says at least 17,000 unique IPs have been hacked, mostly in the US.
=> ↺ House intelligence chair wants US to develop protocols for waging offensive cyberwars
- Amidst reports of high-profile hacks targeting major American entities, a top congressional lawmaker said this week that that the United States must act immediately to iron out offensive and defensive rules for the cyber realm.
=> ↺ BadUSB returns: Hackers publish code that could infect millions of USB devices
=> ↺ Hackers discover gaping major security flaw in USB sticks
Defence/Police/Secrecy/Aggression
=> ↺ The Politics of Terror and Finding a Way Back
- Does ISIS pose a credible threat to the United States and its interests? And if so, what is the best way to manage that threat? If you had asked any politician in 2003, they most likely would have agreed that Saddam Hussein and Iraq under his reign posed a credible threat to the United States, and a 10-year war was started because of that belief.
=> ↺ Here’s Everything Wrong With the White House’s War on the Islamic State
- But now, with scarcely a whisper of serious debate, Obama has become the fourth consecutive US president to launch a war in Iraq—and in fact has outdone his predecessors by spreading the war to Syria as well, launching strikes not only on fighters linked to the Islamic State (IS, or ISIS) but also on the Al Qaeda–linked Nusra Front and Khorasan.
=> ↺ Fighter jets can’t destroy Daesh ideology
- A long-term solution to terrorism will be a comprehensive battle against dangerous ideas that occupy minds of some youths in Middle East
=> ↺ Jeremy Scahill on Obama’s Orwellian War in Iraq: We Created the Very Threat We Claim to be Fighting
- As Vice President Joe Biden warns it will take a “hell of a long fight” for the United States to stop militants from the Islamic State in Iraq and Syria, we speak to Jeremy Scahill, author of the book, “Dirty Wars: The World is a Battlefield.” We talk about how the U.S. invasion of Iraq in 2003 that helped create the threat now posed by the Islamic State. We also discuss the role of Baathist forces in ISIS, Obama’s targeting of journalists, and the trial of four former Blackwater operatives involved in the 2007 massacre at Baghdad’s Nisoor Square.
=> ↺ US has responsibility for Islamic State rise
- That’s how the US government has found itself since George W. Bush started a “war on terror” by invading Afghanistan in 2001 and Iraq in 2003, dragging US allies into a “coalition of the willing” that got mired in two wars for over a decade. Barack Obama, vowing to end the long and costly conflicts, withdrew American troops from Iraq (in 2011) and scheduled a wind-down in Afghanistan this year.
=> ↺ Jim Brock: Time to call off the drones, Mr. President
- Have you ever considered what life would be like if attack drones were visible over New York, Omaha, Nashville, Chicago, New Orleans, Denver and San Francisco?
- If our government were to deploy drones over American cities with the intent of targeting terrorists, what would our lives be like?
- Would we be comfortable with robot death machines flying through the sky like in a Ray Bradbury novel?
=> ↺ Check Out John Oliver on Drones
- Oliver’s funny, angry piece is a great summary of the lawlessness of the US’s drone policy, going from President Obama’s ill-advised drone striking the Jonas Brothers joke in 2009, to the fact that “imminent threat” and “civilian casualty” mean whatever the government wants them to mean.
=> ↺ Legality of Obama’s Drone Policy: A Conversation with Prof. Mary Ellen O’Connell
- Two U.S. presidents have authorized the use of drones to carry out attacks beyond armed conflict zones in Yemen, Pakistan and Somalia. The deaths of all persons from missile strikes is unlawful. The situation in Afghanistan is more complicated because it is the scene of a civil war. Because [ex-]President Karzai has demanded a zero civilian death rate and his policies are the only legitimate ones in the civil war, then civilian deaths are unlawful there, too. As for why international institutions have not done more, the U.S. has a veto that prevents the Security Council from taking up the matter.
=> ↺ London marchers say no to new Iraq war
- More than 2,000 people marched through London in the driving rain today, Saturday, against the bombing of Iraq.
=> ↺ US Should Consider Putting Plainclothes Soldiers in Schools, Call of Duty Director Says
- “The public won’t like it. They’ll think it’s a police state.”
=> ↺ Mass Arrests of American civilians
Transparency Reporting
=> ↺ National Security Agency probing cyber alert on Pakistan’s software
- The National Security Agency (NSA) is probing an alert from cyber security experts on weaponised surveillance software used by Pakistan and Bangladesh intelligence to spy on computers and mobile phones used by Indian politicians, journalists and security establishments. Several computers and mobile phones have already been exposed. Following the most recent Wikileaks release titled ‘Spyfiles 4’ on surveillance malware FinSpy, cyber security experts here claim that several computers and mobile phones of important people could have been compromised, exposing a huge chink in Indian cyber space.
- On September 15, Wikileaks released previously unseen copies of weaponised German surveillance malware, FinFisher, that had been used by intelligence agencies around the world to spy on journalists, political dissidents and others.Analysing the report in detail, cyber security experts at Cyber Security and Privacy Foundation (CSPF) here isolated records of Pakistan-based users, accessing FinFisher products to spy on Indians. “Several FinFisher products have been sold to a person/organisation in Pakistan.
=> ↺ CIA Can’t Let You Know How Much It Paid For A Single Amiga Computer In 1987 [Updated]
- Does the CIA actually believe some sort of irreparable rift in the National Security Complex might occur if this dollar amount from three decades ago (unadjusted for inflation) was made public? Probably not. Aftergood theorizes that it’s a blanket exemption used to redact more sensitive dollar amounts and this innocent cost just became collateral damage during the rush to declassify several dozen documents in response to an FOIA lawsuit court order.
Finance
=> ↺ The New York Times Has Had A Very, Very Rough Year
- The announcement on Wednesday that the paper was slashing hundreds of jobs and retooling its troubled digital products was just the latest in a string of bad news for the Times in 2014.
=> ↺ This Country Just Abolished College Tuition Fees
- Prospective students in the United States who can’t afford to pay for college or don’t want to rack up tens of thousands in student debt should try their luck in Germany. Higher education is now free throughout the country, even for international students. Yesterday, Lower Saxony became the last of seven German states to abolish tuition fees, which were already extremely low compared to those paid in the United States.
=> ↺ Nick Clegg accuses George Osborne of balancing books ‘on backs of poor’
- Deputy prime minister attacks his coalition partner’s austerity measures, and says ‘compassionate conservatism’ claim is dead
PR/AstroTurf/Lobbying
=> ↺ Facebook: The Political Playground And Agenda Arena
- Does social media dictate political discourse?
=> ↺ More Cable Companies Take TV Off Menu
- A growing group of small cable-TV providers are realizing that both they and their customers can live without expensive TV channels.
Censorship
=> ↺ Project Censored exposes top 25 most censored news stories of 2013-2014
=> ↺ The NSA is self-deleting books and articles they don’t like. Watch out!
- “I wrote that Snowden’s revelations had damaged US tech companies and their bottom line. Something odd happened. The paragraph I had just written began to self-delete. The cursor moved rapidly from the left, gobbling text. I watched my words vanish. When I tried to close my OpenOffice file the keyboard began flashing and bleeping.
- Over the next few weeks these incidents of remote deletion happened several times. There was no fixed pattern but it tended to occur when I wrote disparagingly of the NSA.”
=> ↺ World War II, Communism Subtext In Right To Be Forgotten
- From an American legal perspective, the recently established European Right to Be Forgotten (RTBF) is a disaster. It’s a confusing, vague, impractical and possibly even dangerous decision. But from a European historical perspective, it makes considerable sense.
=> ↺ Instagram blocked in China: Reports
Privacy
=> ↺ The NSA’s Clearance Rack Goes Public, Offering An Assortment Of Declassified Patents For Use In The Private Sector
- All the money being poured into the NSA (under the cover of darkness) over the past several years is paying off. Taxpayers who helped fund the NSA’s programs have the opportunity to pay even more money for the privilege of licensing the non-classified fruits of the agency’s labor.
=> ↺ Privacy and Social Media: It’s Complicated
- Given the government’s technological and legal power, it’s unclear that any social media network could ever really guarantee this first kind of privacy. Presumably there could be a breakthrough in cryptography that would allow for truly anonymous social networking–though this would provide a haven for the antisocial (stalkers, cybercriminals, etc.) as well as those who just don’t want the government to be rummaging through their email. Ideally, privacy-from-government would be restored with a Supreme Court decision that reaffirms that the Fourth Amendment means what it says: that government needs to have a reason to suspect you before it intrudes into your personal space.
=> ↺ Celebrities Threaten Google With $100 Million Lawsuit for “Facilitating” Hacked Nude Photos
- The letter suggests Google’s responsibility to celebrities like Jennifer Lawrence, Kate Upton, Rihanna, Arianna Grande and others goes well beyond the call to scrub search engines. Google is also blamed for how it’s allegedly accommodating those using YouTube and Blogspot to post the offending images.
=> ↺ Lawyer For Victims Of Nude Celebrity Hacks Threatens Google With $100 Million Lawsuit
=> ↺ Google Threatened With $100 Million Lawsuit Over Hacked Celebrity Pictures
- “Bad things will be on the Internet, and Google offers a ‘Safe Search’ function if users would rather not be shown that type of content,” Gorup said.
=> ↺ The Guardian wins an Emmy for coverage of NSA revelations
- Interactive NSA Decoded explained implications of the Edward Snowden leaks on mass surveillance by intelligence agencies
=> ↺ NSA Spying on Palestinian-Americans for Israel and for the U.S.
=> ↺ Germany handed law-protected private data to NSA for years
- Intelligence service BND failed to protect the private data of German citizens as it handed over internet data collected at a Frankfurt traffic hub to the US, German media report citing secret documents.
- The documents cited by VDR and EDR television and the newspaper Süddeutsche Zeitung, which broke the news together, were obtained from the federal government during an ongoing parliamentary investigation into US National Security Service spying on German soil.
=> ↺ German citizens’ communication data reportedly passed to NSA
- Germany’s BND foreign intelligence agency has for years passed data on German citizens to the NSA, according to media reports. All data on Germans was previously said to have been filtered out.
- From 2004 to 2008, raw data was siphoned from an internet exchange point in Frankfurt and forwarded to the NSA, the Süddeutsche Zeitung newspaper and regional public broadcasters NDR and WDR reported on Friday.
=> ↺ UK proposes changes to re-use of public information: ODI fears a backwards step
=> ↺ The Physical Web: Google’s Trojan Horse gift to the Internet of Things
- We’ve been told for a few years now that the Internet of Things — common household, industrial and public devices enabled with sensors — will transform how we work, play and interact with the world around us.
=> ↺ When Google Met WikiLeaks
- In recent years, the line between the outer world and the one online has become increasingly blurred. Much of cyberspace has come to mirror the outer structures of power. There wouldn’t be anyone who understands the severity of the infiltration of these coercive powers in the digital space better than the man who had to live under constant threat of their force. Even before revelations of NSA mass surveillance, Julian Assange warned the world. In his 2012 book Cypherpunks, he said “the internet, our greatest tool for emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen”. He further noted how the internet has become “a threat to human civilization” (p. 1).
=> ↺ The Infamous NSA Smiley Face Diagram Is Hanging In A New York Art Gallery
- It was a rare and unnerving look at how the NSA really felt about spying on Americans: a smiley face drawn next to a plan to circumvent encryption in Google’s cloud.
=> ↺ WikiLeaks Founder Fires NSA Data Accusations At Google’s Eric Schmidt
=> ↺ Two Pieces on Surveillance
- There is good reason to believe then, that the security establishment’s surveillance and monitoring plan, to the extent they even have one, not only isn’t working, but can’t work. If they are running a Panopticon it’s only a byproduct of the impossibility of their true goals, and therefore far less effective than it might be. It’s not difficult to peek behind the curtain to see the flaws in its inner workings and tailor one’s tactics accordingly. That few of us do so is more of a testament to the enormous weight of propaganda and indoctrination imposed by the media and school system than to any actual invulnerability of the surveillance state. When supposedly radical analysts take the propaganda at face value and repeat it the impact is doubled. After all, if one’s friends and one’s enemies are both telling the same story it must be true, right? Not necessarily. The first step in fighting the hopelessness machine is not believing everything it tells you. Or failing that, at least not repeating it…
=> ↺ Silicon Valley stands up to NSA
- Public demand for action on privacy issues led Google to quickly announce that it, too, would offer smartphone users additional protection. The Washington Post notes that this “is part of a broad shift by American technology companies to make their products more resistant to government snooping.”
=> ↺ Facebook Wants To Be Your Source For Healthcare Info
- Facebook is already a hotbed for your hypochondriac and conspiracy theorist friends to post poorly sourced or blatantly false medical information — like the bogus “Johns Hopkins Cancer Update” that pops up every few months — but the social network apparently wants to be more actively involved in the collecting and sharing of healthcare information to its users.
=> ↺ Why You Should Be Wary Of Facebook’s Plans To Enter Health Care
- Facebook is looking at users’ health care information as the new frontier and plans to create illness-based communities and health apps, according to a Reuters exclusive report.
=> ↺ Basu: Snowden betrayed government that betrayed public
- The ethical question is less what Snowden did than what the U.S. government has been doing.
=> ↺ October Surprise: Laura Poitras’ Edward Snowden Doc “CITIZENFOUR” Hits Theaters
=> ↺ Edward Snowden Documentary Announced for NYFF 2014
- The Film Society at Lincoln Center has announced that on October 10, journalist and filmmaker Laura Poitras’ documentary on Edward Snowden will be shown at Alice Tully Hall at 6 p.m. as part of the New York Film Festival. CITIZENFOUR is the third in Poitras’ trilogy about how America and the world have changed since 9/11 and will detail her interactions with Snowden, the man who released confidential security documents from the NSA and fled the country.Poitras was already making a film about the surveillance methods in the United States when Snowden contacted her online, wanting to share his story to the world. With two award-winning nonfiction films already released in the past few years, entitled My Country, My Country on the Iraq War and The Oath about Guantanamo, Poitras is no stranger to released hot-button films. Partnering with Glenn Greenwald, author of No Place to Hide: Edward Snowden, The NSA, and the U.S. Surveillance State, Poitras exchanged encrypted Internet messages with Snowden before meeting him in Hong Kong, the material exchanged there released to the world and erupted in a media and political firestorm in 2013. Her work has landed her film accolades, a MacArthur Fellowship in 2012, and helped her win a Pulitzer. During her reporting on the subjects, Poitras found herself being targeted as a national security risk, her struggles to get the story and keep her sources safe informing her work in this newest film.
=> ↺ You don’t “have nothing to hide”: How privacy breaches are quietly controlling you
- Government data collection is scary for many reasons. But least understood: what it does to our personal creativity
=> ↺ Nobel peace panel in focus as 2014 awards begin
=> ↺ Nobel Peace Prize Top Contenders: Japanese Anti-War Group and Edward Snowden
=> ↺ Edward Snowden Nominated for Nobel Peace Prize
- Edward Snowden is on the run from U.S. authorities after disclosing secret National Security Agency (NSA) programs involving the collection of telephone and email data to media outlets, including The Guardian and The Washington Post.
=> ↺ Wanted former NSA contractor nominated for Nobel Peace Prize
- Edward Snowden, who leaked thousands of top secret documents including information about two U.S. monitoring programs, is among the nominees for this year’s Nobel Peace Prize.
=> ↺ Whistleblower Snowden, Pope tipped for 2014 Nobel prizes
=> ↺ Challenging the NSA’s ‘Orwellian’ phone-records program
=> ↺ Congress may ban NSA phone data collection
- Senate Judiciary Chairman Patrick Leahy is pushing a bill that would stop the National Security Agency from collecting the phone records of millions of Americans, and he says he has the support of Republicans to pass it this year.
=> ↺ Failure to pass US surveillance reform bill could still curtail NSA powers
- If the Senate doesn’t pass the USA Freedom Act after the midterm elections, a key section of the Patriot Act could expire
=> ↺ Why ending metadata collection is ‘privacy theater’
- The USA FREEDOM Act as it stands will make Americans less safe while contributing little or nothing to their privacy. The bulk collection program the bill abolishes grew from a very real intelligence failure. In the run-up to 9/11, NSA intercepted calls to Yemen from a terrorist in San Diego, but in a costly deference to the civil liberties concerns of the 1990s, NSA had never developed a way to track calls back to the United States. The metadata program closed that gap.
=> ↺ Australian spy agencies given vast new powers
=> ↺ MI6 man appointed head of UK secret service
- A career MI6 officer has been appointed as the new head of Britain’s Secret Intelligence Service.
=> ↺ Britain’s new SIS spymaster Alex Younger appointed to lead fight
=> ↺ New head of MI6 named: Alex Younger ‘delighted’ to become real-life ‘M’ of Secret Service
=> ↺ MI6 appoints new secret service chief
=> ↺ Oops! U.K. city council destroys mural created by iconic artist
=> ↺ UK council red-faced after destroying mural by famous artist
=> ↺ During the miners’ strike, Thatcher’s secret state was the real enemy within
- The Tory leader’s eagerness to brand not only miners’ leaders but the Labour party as enemies of democracy was a measure of her extremism and determination for class revenge
=> ↺ The American Library Association’s Long Fight For Privacy
- If there was ever a seemingly unflappable group of individuals it is America’s librarians, who take the privacy of their patrons very, very seriously. Since the introduction of the Patriot Act the group representing our nation’s librarians has been fighting to protect its patrons from government intrusion.
=> ↺ In Pictures: 12 surprising ways personal technology betrays your privacy
=> ↺ Why the NSA Wants a Quantum Computer, with Brad Templeton
- Thanks to Edward Snowden, it’s been revealed that the NSA is currently researching how to create its own quantum computer. Templeton takes solace in that information because it means that they don’t already have one. And, he points out, they may never have one. After all, the machine is only the stuff of theory at this point. If someone were able to build one, Templeton says we’d know of its existence thanks to the legions of panicking Wall Street executives.
=> ↺ NSA claims of Snowden leaks aiding terrorists found unwarranted
- A new independent investigation by Flashpoint Global Partners (FGP) reveals that despite the claims by the National Security Agency (NSA), documents leaked by whistle blower Edward Snowden did not damage America’s National Security by alerting Al Qaida they were being spied on. There have been no real consequences and Al Qaida has not changed the way they communicate because of the leaks. Al Qaida changed the way they communicate long before the revelations by Snowden.
=> ↺ The NSA Plays Word Games to Legitimize Violations of Your Rights
- But imagine for a moment you caught an FBI agent in the act of rummaging through your mail, and he explained to you that he wasn’t going to actually read the letters. He was only planning on making copies of your mail in case the FBI needs to read them at a later date.
=> ↺ Who needs the NSA? Anyone could spy on your kids thanks to ComputerCop
- It doesn’t take an NSA spymaster to snoop on your digital doings. Thanks to a free software program, distributed by police departments all around the country, any creep with a basic knowledge of the Internet could be monitoring your children’s online activities.
=> ↺ ComputerCOP: The Dubious ‘Internet Safety Software’ That Hundreds of Police Agencies Have Distributed to Families
- For years, local law enforcement agencies around the country have told parents that installing ComputerCOP software is the “first step” in protecting their children online.
=> ↺ ComputerCOP: Keylogging Spyware, Distributed By Police And Federal Agents With Your Tax Dollars
- The EFF has put together a rather astounding bit of investigative reporting, digging into a program called “ComputerCOP” that is apparently handed out (in locally branded versions) by various law enforcement agencies — generally local police, but also the US Marshals — claiming to be software to “protect your children” on the computer. What the EFF investigation actually found is that the software is little more than spyware with weak to non-existent security that likely makes kids and your computer a lot less safe. Aren’t you glad your tax dollars are being spent on it?
=> ↺ Facebook Just Got A Lot Creepier
- Facebook just got a little more up in your business. Starting today, the ‘book will fully implement a new ad network called Atlas. In a spin it’s calling “people-based marketing,” Atlas will serve ads targeted to you based on your Facebook data. And, while it’s a Facebook property, Atlas will also serve up ads on non-Facebook sites.
=> ↺ Hong Kong Protesters Targeted with iOS Spyware, Chat Hacks
- These installations can be used for a variety of crowd control tactics, including impersonation of lead officials within the group, as well as broadcasted statements that could fool less informed users into thinking that negotiations have been a fruitless endeavor, encouraging them to leave the front lines or even head back home.
=> ↺ Ray McGovern speaks of the surveillance state at Shasta College
- Former CIA intelligence analyst Ray McGovern spoke at Shasta College to a packed auditorium the evening of September 16. McGovern served for 27 years as an intelligence analyst in the CIA. He has now grown quite concerned about the overreach of our security apparatus as reflected in the title of his talk, “The surveillance state: Are freedom and security compatible?”
=> ↺ After Salesforce, Oracle to open two datacentres in Germany
- Following its software-as-a-service rival Salesforce, Oracle has announced plans to open two new cloud datacentres in Germany which should be available for government and enterprise customers by the end of the year.
- Oracle already announced late last year that one new datacentre in Germany would be operational by the second half of 2014, and while that hasn’t happened yet, the database giant — whose execs have been talking up its cloud credentials this week — announced that the number of facilities in Germany would be bumped up to two. One will be located in Frankfurt and another in Munich.
=> ↺ Oracle To Open Two German Data Centres Following Spying Scandal
=> ↺ Oracle plans German DCs to soothe NSA-ruffled nerves
=> ↺ Oracle opens two German data centres in wake of NSA snooping scandal
- The two new facilities, located in Frankfurt and Munich, will go live in the next few weeks and will be completely operational before the end of the year. They join the two other European countries that already have their own data centres, the UK and the Netherlands.
=> ↺ Tech giants join the hunt for a more private Web
=> ↺ Open Internet Central to U.S. Trade Policy
- Administration officials say they are sympathetic to U.S. cloud service providers’ concerns that data-localization requirements, other restrictive policies and the fallout from Edward Snowden’s revelations cut off access to foreign markets.
=> ↺ Movement builds to ensure privacy for Internet users
- Before Edward Snowden, the National Security Agency and Prism made headlines, a group of technologists was dedicated to making the Internet more anonymous.
=> ↺ NSA Hearing in the D.C. Circuit Will Not Be Televised
- The U.S. Court of Appeals for the D.C. Circuit soon will hear argument over the merits of the government’s bulk collection of Americans’ phone records.
=> ↺ USA Defends NSA Spying But Won’t Explain
- Even if there were evidence that a domestic spying program was unconstitutional, interference by the courts could cause “exceptionally grave damage” to national security, the government told a federal judge.
- Urging U.S. District Judge Jeffrey White to deny the plaintiffs partial summary judgment and instead rule for the government, the Monday filing from the Department of Justice says that the National Security Administration’s information-collecting techniques do not violate the Fourth Amendment.
=> ↺ Gov. Brown Signs Ted Lieu Bill Prohibiting Mass Spying On Californians
- Gov. Brown signed into law Tuesday bipartisan legislation which bans the state from aiding the federal government in spying on Californians. The Senate Bill 828 was proposed by Senator Ted Lieu, D-Redondo Beach. It will take effect January 1, 2015.
=> ↺ California Enacts Laws Aimed at Revenge Porn, Data Breaches, NSA Spying
=> ↺ California Governor Signs Anti-Surveillance Bill
- California Gov. Jerry Brown on Tuesday signed a bill prohibiting the state from supplying “material support, participation, or assistance” in response to certain federal requests for metadata and electronic communications.
=> ↺ Web founder Tim Berners-Lee wants an online bill of rights
- Tim Berners-Lee, the man who invented the web (sidebar: that was 25 years ago, can you believe it?!), wants to ensure that the internet is free from government (or corporate) intrusion.
=> ↺ Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
=> ↺ Letter: Now the NSA has a risk officer; feel better?
- A recent news release advises us that the National Security Agency, in its infinite wisdom, has just appointed Anne Neuberger as the agency’s new “risk officer.”
=> ↺ “NSA Proof” iOS 8 claims… We have heard them before…
- Apple is truly ramping up the PR machine and has even managed to get a few people in government to make some rather outrageous statements on the new phone and iOS 8. One of the new stories going around is about how the new iPhone and iOS8 are suddenly “NSA Proof” because they have added data encryption. The fallacy of this claim is almost beyond belief and shows once again that most in the technical press have absolutely no memory.
=> ↺ Think Apple And Google Encryption Makes You Safe From Prying Eyes Of The NSA And Law Enforcement? Guess Again
=> ↺ Cops will continue spying on Apple (NASDAQ:AAPL)’s encryption but discreetly
- Kill switch is a built in OS that gives companies like Apple (NASDAQ:AAPL) or Google (GOOGL) the power to access user data to get rid of malicious software. The companies can also access data stored on mobile devices through kill switch. Although this feature was created for security reasons, it is unclear whether the new encryption will prevent its access or not.
=> ↺ Ad Haters: The Backlash Against Google And Facebook
- Social network Ello is capitalizing on discontent with online advertising.
=> ↺ It’s Time for a Real Debate on Reader Privacy
- Last week longtime local publisher Howard Owens, founder of the online news site the Batavian, launched a new publication covering Wyoming County in upstate New York. Buried in a parenthetical within his welcome message to readers was a fascinating promise: “We’ll also respect your privacy by not gathering personal data to distribute to multinational media conglomerates for so-called ‘targeted advertising.’”
=> ↺ The “he said, she said” of how the FBI found Silk Road’s servers
- Ulbricht attorney Joshua Horowitz, in a new legal filing, wrote that the “explanation of how the FBI discovered the server’s IP address is implausible.” [PDF]
- For starters, he said, the government has maintained no record of packet logs [PDF] of the FBI actually capturing leakage from the CAPTCHA.
=> ↺ Terms and conditions from hell may apply
=> ↺ Feds Could Access Foreign Online Data Under New Court Ruling
- Federal authorities are pushing for new rules to force American-owned internet companies to open all electronic data to intelligence agencies regardless of geography, sparking privacy concerns for consumers abroad.
=> ↺ Transatlantic ties too important to sweat the small stuff
- Theo Sommer: Ten years ago relations between Germany and the United States were rather strained because of divergent views over the Iraq War. And we thought that we should try to make the Americans understand our point of view and vice versa make the Germans understand the American point of view. And our whole aim was to convince people that the German-American, and the European-American relationship for that matter, is far too important to be sacrificed to the vagaries of the one or the other difference we might have.
=> ↺ Tech responds to calls for online anonymity
- Before Edward Snowden, the National Security Agency and Prism made headlines, a group of technologists was dedicated to making the internet more anonymous.
- They were viewed mostly as paranoid, weird and potentially criminal.
=> ↺ Privacy Lost
- This week on Four Corners, Frontline producer Martin Smith explores the secret relationship between Silicon Valley and the National Security Agency, investigating how the Government and tech companies worked together to gather and warehouse data. That data includes the communication of Americans and anyone else who communicates via US data systems.
=> ↺ Apple’s Encryption Will Slow, Not Stop, Cops And Spies
- While the newest Apple Inc. (AAPL:US) and Google Inc. (GOOGL:US) smartphones will automatically encrypt data stored on them, that won’t keep U.S. law enforcement and intelligence agencies from obtaining evidence linked to the devices.
=> ↺ The Little-Known Executive Order Behind Our ‘Collect It All’ Spy State
=> ↺ New docs show how Reagan-era executive order unbounded NSA
=> ↺ Reagan order ‘primary source’ for NSA spying
=> ↺ NSA relies on 1981 executive order signed by Reagan
=> ↺ New Documents Prove NSA Surveillance Programs Have Legal Basis
- The American Civil Liberties Union (ACLU) revealed on Monday that the U.S. government has released new documents that showed a 1981 Executive Order (EO) as a basis for the National Security Agency’s (NSA) surveillance programs.
=> ↺ ACLU: NSA Spying Authority Relies Heavily on Reagan-Era Executive Order
- According to documents obtained by the American Civil Liberties Union (ACLU) and discussed at length in a new post on the ACLU’s official blog by Alex Abdo (a staff attorney in the ACLU’s Speech, Privacy, and Technology Project), most of the National Security Agency’s (NSA) authority to collect data and spy on both international and domestic targets is derived from Executive Order 12333 – signed by President Ronald Reagan in 1981.
=> ↺ Reagan to blame for NSA spying?
=> ↺ Digging Deeper Into NSA Spying Uncovers Unexpected Link to Reagan Administration
- If Americans want to understand how their government justifies sweeping intelligence-gathering measures, they need to familiarize themselves with a little-known executive order from the Reagan era: E.O. 12333.
=> ↺ Neustar’s lobbying for key number-portability contract gets boost from Michael Chertoff
- Neustar’s lobbying effort to stop a key federal number-portability contract from slipping away to Ericsson’s (NASDAQ: ERIC) Telcordia unit took another turn via a report sent to the FCC from Michael Chertoff, a former secretary of homeland security. The report, from Chertoff’s security consulting firm, the Chertoff Group, concluded that the bidding terms for the contract related to national security were “insufficient in both scope and specificity when compared with widely accepted national and international standards.”
=> ↺ ‘Trusted Third Party’ Neustar Pays Chertoff Group To Talk FCC Out Of Handing Control Of Crucial Cell Phone Database To Foreign Company
- Thanks to some financial prompting and aligned priorities, the Chertoff Group (home of former DHS Secretary Michael Chertoff and former NSA boss Michael Hayden) is sending a letter [pdf link] to the FCC in hopes of preventing control of a crucial cellphone number database from ending up in the hands of a foreign company.
=> ↺ A toxic brew of money, national interest and ego
- “Put money, national interest, and ego together, and now you’re talking about shaping the world writ large.”
=> ↺ Move Over, Facebook: Welcome to the World of Anonymous Apps
- Today, our social media identities are deeply intertwined with our non-digital one, and the rise of social media has bred new kinds of problems. For Internet-goers, issues such as online privacy, Internet surveillance and data collecting have now become pertinent in their daily lives. It is in this climate of NSA snooping, data collecting and social media experimenting, that a new form of social networking has formed, an anonymous one.
- The second is the awareness on behalf of users that the information they are sharing online does not belong to them. There is a realization on the side of users that their online information is valuable to the government, data marketers and big corporations like Facebook. The latest examples are the online experiments conducted on behalf of Facebook in which the company tracked users’ emotions based on Facebook statuses. The same violation of privacy was seen with OkCupid where the dating site purposely set up bad matches in order to see how users would react to being mismatched.
=> ↺ Failure Is Success: How American Intelligence Works in the Twenty-First Century
- What are the odds? You put about $68 billion annually into a maze of 17 major intelligence outfits. You build them glorious headquarters. You create a global surveillance state for the ages. You listen in on your citizenry and gather their communications in staggering quantities. Your employees even morph into avatars and enter video-game landscapes, lest any Americans betray a penchant for evil deeds while in entertainment mode. You collect information on visits to porn sites just in case, one day, blackmail might be useful. You pass around naked photos of them just for… well, the salacious hell of it. Your employees even use aspects of the system you’ve created to stalk former lovers and, within your arcane world, that act of “spycraft” gains its own name: LOVEINT.
=> ↺ Intralinks Heads Off NSA Fears by Handing Crypto Keys to Customers
- Secure collaboration firm Intralinks has launched new capabilities designed to allow its customers to unilaterally manage their own encryption keys, ensuring that any cloud-based data can’t be accessed without their permission.
=> ↺ Authorities Think About Telling You If You’re Watchlisted from Warrantless Spying
- The Obama Administration might have to start letting people know when they’ve been flagged for terrorist connections based on information picked up from secret NSA spying programs.
- That could potentially affect the tens of thousands of individuals on the government’s no fly list, as well as those people and groups that the Treasury Department designates as foreign terrorists, The New York Times reported yesterday.
=> ↺ NSA working to repair relationships with U.S. tech firms
- The National Security Agency is working to repair its fractured relationship with major tech companies following disclosures by former agency contractor Edward Snowden that the NSA had been secretly pulling data from company servers for surveillance purposes.
=> ↺ Attorney for Edward Snowden to Speak In Boise Tonight
- Boiseans will be able to weigh in this evening on one of the most controversial issues of our times—the National Security Agency’s surveillance activities—when an attorney currently representing fugitive whistleblower Edward Snowden comes to the Treasure Valley.
=> ↺ Snowden lawyer backs up Sensenbrenner comments on NSA
=> ↺ Sen. Ron Wyden to Host ‘The Impact of Mass Surveillance on the Digital Economy’ Roundtable Next Week
- Senate Finance Committee Chairman Ron Wyden (D-Oregon) will host a “Chairman’s Roundtable” on Oct. 8 to discuss the impact of mass surveillance by the government (through agencies like the NSA) on the digital economy.
=> ↺ Orwellian privacy invasion
- On Sept. 18, a San Diego judge denied technological entrepreneur Michael Robertson’s request to access his own license plate data from police scanners.
=> ↺ Kudos to The Huntsville Times for intrepid reporting of NSA school monitoring debate: reader opinion
=> ↺ NoSpyProxy wants to put your data and identity out of reach of the NSA
=> ↺ Alabama high school says NSA was monitoring students on social media
=> ↺ World’s First NoSpyProxy Got over 100% Funded on Indiegogo
- The campaign aimed to raise $70.000 from their international community and privacy enthusiasts worldwide and €50.000 from their German supporters.
Civil Rights
=> ↺ New York City Dept. Of Education Suspends Special Needs Instructor For Helping Student With A Kickstarter Project
=> ↺ Why the Secret Service Story Could Actually Matter in the Midterms
=> ↺ Eric Holder is a Back Door Man (Tech Edition)
- Outgoing Attorney General Eric Holder is perpetuating a bipartisan raid on privacy, reports The Washington Post. He’s calling on tech makers to provide “backdoors” to products and services so that law enforcement can route around encryption and get bad guys such as “kidnappers and sexual predators.”
=> ↺ California Police Can Fly Drones Without Warrants
- Democratic Governor Jerry Brown rejected a bill on Sunday that would have required law enforcement authorities to secure a court-issued warrant before they can fly unmanned aerial vehicles in most cases.
=> ↺ Secret Talks And Back Channels Pervaded U.S. Relationship With Cuba
- The documents reveal a series of secret meetings that took place in hotels, airport lounges and restaurants from New York to Paris to Guadalajara and involved intermediaries like the chairman of Coca-Cola, who served as President Jimmy Carter’s representative, to Carter himself.
=> ↺ Tibetan singer Lolo features in Chinese dissident artist Ai Weiwei’s work
- The portraits also include NSA whistle-blower Edward Snowden and the late South African leader Nelson Mandela. It also feature less prominent people in global struggles for freedom — people Ai says have been “forgotten by society.”
=> ↺ Eric Holder blew it as attorney general. His replacement will, too,
- Systemic issues might be too much for any one person
=> ↺ Sudan’s ‘morality’ laws used to punish women, report finds
- Human rights abuses entrenched in legal system, with women facing flogging or jail for going about their daily lives
=> ↺ After Feigning Love for Egyptian Democracy, U.S. Back To Openly Supporting Tyranny
- It is, of course, very difficult to choose the single most extreme episode of misleading American media propaganda, but if forced to do so, coverage of the February, 2011 Tahrir Square demonstrations in Egypt would be an excellent candidate. For weeks, U.S. media outlets openly positioned themselves on the side of the demonstrators, depicting the upheaval as a Manichean battle between the evil despot Hosni Mubarak’s “three decades of iron rule” and the hordes of ordinary, oppressed Egyptians inspirationally yearning for American-style freedom and democracy.
=> ↺ Ferguson’s Strategy Regarding Journalists: Charge Insane Fees For FOIA Requests
- Say what you want, but one thing has become abundantly clear since the whole Ferguson debacle began: the people running and policing that city aren’t interested in your concerns. Throughout this entire process, the city and its police force have obfuscated the facts and people involved in the shooting of a civilian, they have cynically released information and videos when it suits them, and they’ve treated journalists covering the story with the kind of contempt they normally reserve for their own constituents. And now, utilizing a method previously beta-tested by both local and federal law enforcement agencies, they’ve decided the best way to respond to the ongoing outcry is to try to charge insane amounts for FOIA requests.
=> ↺ Ferguson demands high fees to turn over city files
Internet/Net Neutrality
=> ↺ Marriott fined $600,000 for jamming guest hotspots
- Marriott will cough up $600,000 in penalties after being caught blocking mobile hotspots so that guests would have to pay for its own WiFi services, the FCC has confirmed today. The fine comes after staff at the Gaylord Opryland Hotel and Convention Center in Nashville, Tennessee were found to be jamming individual hotspots and then charging people up to $1,000 per device to get online.
=> ↺ FCC Fines Marriott For Jamming Customers’ WiFi Hotspots To Push Them Onto Hotel’s $1,000 Per Device WiFi
- Hotel WiFi sucks. If you do any traveling, you’re aware of this. Though, from what I’ve seen, the higher end the hotel, the worse the WiFi is and the more insane its prices are. Cheap discount hotels often offer free WiFi, and it’s generally pretty reliable. High end hotels? I’ve seen prices of $30 per day or higher, and it’s dreadfully low bandwidth. These days, when traveling, I often pick hotels based on reviews of the WiFi quality, because nothing can be more frustrating than a crappy internet connection when it’s needed. But, even worse than the WiFi in your room, if you’re using the WiFi for a business meeting or event — the hotels love to price gouge. And, it appears that’s exactly what the Marriott-operated Gaylord Opryland Hotel and Convention Center in Nashville did. Except, the company went one step further. Thanks to things like tethering on phones and MiFi devices that allow you to set up your own WiFi hotspot using wireless broadband, Marriott realized that some smart business folks were getting around its (absolutely insane) $1,000 per device WiFi charges, and just using MiFi’s. So, Marriott then broke FCC regulations and started jamming the devices to force business folks to pay its extortionate fees.
DRM
=> ↺ Apple will face $350M trial over iPod DRM
- Apple will soon have to face a trial over accusations it used digital rights management, or DRM, to unlawfully maintain a lead in the iPod market, a federal judge has ruled. The plaintiffs’ lawyers, representing a class of consumers who bought iPods between 2006 and 2009, are asking for $350 million.
Intellectual Monopolies
=> ↺ Almost No One Wants To Host The Olympics, Because It’s A Costly, Corrupt Mess
- For many years, we’ve written about questionable activities by the Olympics, usually focusing on the organization’s insanely aggressive approach to intellectual property, which could be summed up as “we own and control everything.” Yes, the Olympics requires countries to pass special laws that protect its trademarks and copyrights beyond what standard laws allow. Of course, this is really much more about control and money
Copyrights
=> ↺ ‘Mash-ups’ now protected under copyright law – but only if funny
- Under a new exception to copyright law, anyone will be able to make creative montage from existing material – as long as it is funny
=> ↺ New UK Copyright Exception Allows Mashups — But Only If Judges Think They Are Funny
=> ↺ The Two Poles of Kiwi Journalism and A New Vanguard
- Mainstream Kiwi journalism in the wake of Dotcom, Assange, Snowden & Greenwald’s pre-election ‘Moment of Truth‘ event has fallen squarely along ideological lines.
- The media have yet to give any serious consideration to the possibility of any new political paradigm outside of the left-right sphere in which they remain firmly entrenched. The results are predictable and must be challenged.
=> ↺ Google Removes News Snippets From Complaining Publications In Germany; Publications Claim It’s ‘Blackmail’
- Earlier this year, we noted a somewhat ridiculous and cynical attempt by some German newspapers to demand payment from Google for sending them traffic via Google News — and not just a little bit, but 11% of gross worldwide revenue on any search that showed one of their snippets. There were a few issues that we noted here: first, anyone not wanting to appear in Google News can quite easily opt-out. Second, Google News in Germany doesn’t show any ads. Third, those very same newspapers were using Google’s own tools to appear higher in search, suggesting that they certainly believed they were getting value out of being in Google’s index.
=> ↺ Head Of City of London Police Unit That Operates Without Court Orders Worries About Online ‘Lawlessness’
- A year ago, Techdirt wrote about a new unit set up by the City of London Police to tackle crimes involving intellectual monopolies. Since then, there have been a flood of posts about its increasingly disproportionate actions, including seizing domain names, shutting down websites, inserting ads on websites, and arresting someone for running an anti-censorship proxy. This makes a PCPro interview with the head of that unit, Detective Chief Inspector (DCI) Andy Fyfe, particularly valuable, since it helps shed a little light on the unit’s mindset.
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages. Permalink Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
Proxy Information
- Original URL
- gemini://gemini.techrights.org/2014/10/04/webos-is-back
- Status Code
- Success (20)
- Meta
text/gemini;lang=en-GB
- Capsule Response Time
- 349.630227 milliseconds
- Gemini-to-HTML Time
- 37.113895 milliseconds
This content has been proxied by September (ba2dc).