This page permanently redirects to gemini://gemini.techrights.org/2016/07/30/sysadmin-day/.
● 07.30.16
● Links 30/7/2016: Sysadmin Day, Stardew Valley on GNU/Linux
Posted in News Roundup at 10:34 am by Dr. Roy SchestowitzContentsGNU/LinuxGNU/Linux
=> ↺ Open Source History: The Spectacular Rise and Fall of VA Linux
- What’s the most successful company in open source history? Red Hat (RHT) and Canonical would probably top most people’s lists. By one measure, however, VA Linux is far and away the most explosively popular Linux company to ever exist. That’s if you measure success based on the highest value of its stock, which peaked and then fell dramatically 16 years ago.
- If you haven’t heard of VA Linux, you probably grew up in the post dot-com bubble age. Once upon a time, the company was a huge presence in the open source world.
- Founded in 1993 as VA Research, the company known in its heyday as VA Linux initially sold computers with Linux preinstalled, aiming to compete with the likes of Dell. The company expanded rapidly, boasting $100 million in annual sales by 1998. In the same year, it received capital investments totaling $5.4 million from Intel and Sequoia Capital. The next year, an additional $25 million in funding arrived from an assortment of other backers.
=> ↺ Free, secure, easy — Linux as an alternative to Windows and Mac
- Linux was originally conceived as a project for programmers and software developers. Thus, Information Technology and Engineering students first likely encountered Linux in their coding classes because of its hassle-free setup.
- Fifth-year Electronics and Communications Engineering (ECE) student Donald Dimailig sees Linux as a programmer-friendly OS compared to Windows.
- “In Windows, you still have to download and install compilers and Java. However in Linux, everything you need is right there,” Dimailig said.
- “My robotics laboratory class involves a lot of programming so it is much easier to use Linux,” he added.
- People with working knowledge of Linux and other open source software have better luck getting careers in server and systems management since Linux is installed in almost 97% of all internet servers according to web analytics company W3Cook. Linux’s reliability and security have made it the OS of choice for web servers around the world.
Desktop
=> ↺ iTWire – Microsoft to reduce global workforce
=> ↺ Microsoft Faces Two Lawsuits For Aggressive Windows 10 Upgrade Campaign
- The series of lawsuits against Microsoft doesn’t seem to terminate sooner.
Server
=> ↺ Happy Sysadmin Day!
- To all you systems administrators out there, wherever and whomever you are: Happy Systems Administrators Day! That’s right, ladies, gentlemen and emacs users, the yearly holiday of sysadmin day is upon us!
- This year marks the 17th annual sysadmin day and with any luck 17-fold increase in appreciation to some of the most frequently un-and-under appreciated people in any organization. You deserve a hurrah, some cake and – for some among you – your own private island.
=> ↺ 11 Awesome Linux T-Shirts for Every System Administrator
- No, this article will not be about coding dresses, however, we will show you 11 Linux t-shirts that will make a system administrator to look better, fun and knowledgeable. I promise that the t-shirts that you will see below will make you want to have each one of them.
=> ↺ Amazon Cloud Revenue Hits $2.9B
=> ↺ ServerMania – Discover High Availability Cloud Computing, powered by OpenStack
- Cloud computing is fast growing in the world of computer and Internet technology, many companies, organizations and even individuals are opting for shared pool of computing resources and services. For starters, Cloud computing is a type of Internet-based computing where users consume hosted services on shared server resources.
- There are fundamentally three types of cloud computing available today: private, public and hybrid cloud computing.
Kernel Space
=> ↺ Broadband Forum, ON.Lab collaborate on SDN, NFV-based CORD concept
=> ↺ Broadband Forum and ON.Lab collaborate on CORD
=> ↺ CORD Project Welcomes Five New Collaborators
=> ↺ Broadband Forum and ON.Lab collaborate on CORD to advance broadband networks built on SDN, NFV and Cloud
=> ↺ New Open Source CORD Project Offers First Open Reference Implementation For Service Providers’ Central Office/Access Network
=> ↺ CORD for Telcos Now a Linux Project with Google’s Backing
=> ↺ Is automation the key to unlocking SDN and NFV potential?
=> ↺ Controlling access to the memory cache
- Access to main memory from the processor is mediated (and accelerated) by the L2 and L3 memory caches; developers working on performance-critical code quickly learn that cache utilization can have a huge effect on how quickly an application (or a kernel) runs. But, as Fenghua Yu noted in his LinuxCon Japan 2016 talk, the caches are a shared resource, so even a cache-optimal application can be slowed by an unrelated task, possibly running on a different CPU. Intel has been working on a mechanism that allows a system administrator to set cache-sharing policies; the talk described the need for this mechanism and how access to it is implemented in the current patch set.
=> ↺ Why Blockchain Matters
- If your familiarity with Bitcoin and Blockchain is limited to having heard about the trial of Silk Road’s Ross Ulbricht, you can be forgiven — but your knowledge is out of date. Today, Bitcoin and especially Blockchain are moving into the mainstream, with governments and financial institutions launching experiments and prototypes to understand how they can take advantage of the unique characteristics of the technology.
Applications
=> ↺ Open-Source Radio App Updated With New Features, Better Discover Experience
- Gradio is a great little open-source desktop radio player app for Linux — and it just got even better.
- The app now offers its own, independent volume control. This means you can adjust sound levels within the app, without affecting your system’s global sound levels, and nixes the need to dive into your desktop’s sound applet.
=> ↺ Wireshark 2.0.5 Released as the World’s Most Popular Network Protocol Analyzer
- The development team behind Wireshark, the world’s most popular open-source, cross-platform, and free network protocol analyzer software, announced the release of Wireshark 2.0.5 for all supported platforms.
- This is the fifth maintenance update to the Wireshark 2.0 series, which is currently the latest stable and most advanced branch of the open source project used by numerous security experts around the globe for analysis and troubleshooting of network issues, with the ultimate goal of hardening the security of their networks.
- According to the release notes, Wireshark 2.0.5 is here to resolved over 20 issues reported by users since the previous maintenance update, version 2.0.4, as well as to update the protocol and capture file support. It’s worth noting that Wireshark 2.0.5 promises to patch a total of nine security vulnerabilities.
=> ↺ New App Lets Linux Users Control Their Lighting from their Laptop
- A new app lets Philips Hue users control the colour or brightness of their room straight from the Linux desktop.
=> ↺ qutebrowser v0.8.1
=> ↺ Anonymous publishing with Riffle
- Preserving anonymity online is an understandably hot topic these days. But it can be confused with related concepts like privacy and secure communication. A new protocol called Riffle was recently published [PDF] by researchers at MIT; it offers a different take on anonymity than that implemented by other projects. A Riffle network could be used to implement an anonymous but verifiable blogging or publishing platform: one in which the messages are visible to everyone, but the identity of all users remains hidden.
- For comparison, the most well-known anonymity project is, no doubt, Tor, which enables users to access Internet services without revealing their physical location on the network. It is possible to use Tor to access publishing services like Twitter and, thus, to broadcast content to the Internet at large without revealing one’s identity. But Tor is just as useful at solving other problems, such as accessing remote servers that are blocked by a firewall. While important, that usage of Tor does not necessarily involve anonymity; one could, for instance, use it to log in to Facebook, and Tor alone does not prevent the use of web trackers by sites.
- Furthermore, Tor is the focus of near-constant attacks (against the network itself and against the algorithms that keep it working), and it may be vulnerable to large-scale traffic analysis—such as a national ISP could perform. One of the stated goals of Riffle is to prevent such traffic analysis, which has led to popular reports and online discussions referring to Riffle as a Tor competitor.
- But Riffle, in fact, tackles a narrower problem set. In a Riffle network, every message sent or file uploaded is eventually published in plaintext form where everyone can see it. The Riffle protocol offers strong guarantees that the identity of the message’s uploader cannot be discovered—even in cases where multiple servers in the network have been compromised.
=> ↺ Announcing Serval!
- Serval is launching on Tuesday the 2nd of August, 2016. It will be available under the GPLv2 and is completely free to use.
=> ↺ Tangent Animation studio will support the Blender Institute to hire two devs full time to work on Blender 2.8 and a third one for Cycles
=> ↺ 5 Best Calendar Apps for Linux Desktop
- Time is money, as goes an old saying, therefore you need to manage it very well. This then calls for proper planning of your daily schedule, future events, appointments and several other daily activities.
=> ↺ Pandora Client Pithos
Sees New Major Release
- Pithos 1.2.0 was released today and it includes a new explicit content filter option, new dialog design, along with other improvements and important bug fixes.
=> ↺ Terminix Now Available In PPA For Ubuntu 16.04 And Linux Mint 18 [Quick Update]
- Terminix was uploaded to the Debian Sid repositories recently. To make it easier to install and stay up to date with the latest Terminix versions, I used the official Debian packaging (thanks to the packagers!) and created a Terminix PPA for Ubuntu 16.04 and Linux Mint 18.
=> ↺ Geary – A Good Looking Modern Email Client for Linux
- Geary is a free and open source email client. It’s simple to setup and install, in a few minutes your done. No need to add extra features or add ons to install, it just works. The user interface is the easiest and simplest to use.
Proprietary
=> ↺ Skype 1.3 for Linux Alpha Now Available for Download
=> ↺ death of privacy
=> ↺ Skype for Linux Alpha 1.3 comes with several fixes and improvements
=> ↺ Microsoft releases Skype for Linux Alpha 1.3
=> ↺ PVS-Studio confesses its love for Linux
- This post is about love. About the love of the static code analyzer PVS-Studio, for the great open source Linux operating system. This love is young, touching and fragile. It needs help and care. You will help greatly if you volunteer to help testing the beta-version of PVS-Studio for Linux.
Instructionals/Technical
=> ↺ Static Library Nightmare (and how to fix it)
=> ↺ Fresh Installation of XenServer 7
=> ↺ How to Install and Configure Nextcloud on CentOS 7 / RHEL 7
=> ↺ How to use GeoIP with Nginx on Ubuntu 16.04
=> ↺ How To Safely Remove Old Linux Kernels In Ubuntu Or Linux Mint [Quick Tip]
=> ↺ Find Top 15 Processes by Memory Usage with ‘top’ in Batch Mode
=> ↺ Bulk Converting PNG or JPEG with ImageMagick Command Lines
=> ↺ How to send sound through Bluetooth on Linux
=> ↺ Learn How to Use Awk Built-in Variables – Part 10
=> ↺ 20 Basic Keystrokes for Navigating GNU Info
=> ↺ Find Top Running Processes by Highest Memory and CPU Usage in Linux
=> ↺ How to Install Pure-FTPd with TLS and virtual users on OpenSUSE Leap 42.1
=> ↺ How to Install Papirus Icon Theme on Ubuntu 16.04 and Linux Mint 18
=> ↺ How To Create And Edit Keyboard Shortcuts In Lubuntu (Openbox)
=> ↺ 10 Easy Examples of GNU sed Command Lines (Episode 5)
=> ↺ 10 Easy Examples of GNU sed Command Lines (Episode 6)
=> ↺ Sed command examples in Linux and Unix – How to use
=> ↺ forkstat’s Pretty Cool
=> ↺ Flatabulous Theme makes your desktop completely flat. Is it better? Findout by yourself!
=> ↺ Arc-Flatabulous: A Theme Born From Two Themes, You May Prefer This One Over Others
=> ↺ A Brief History of the Command Line
=> ↺ Rsync exclude directory (folder), files in Linux with examples
=> ↺ HowTo Install VMWare modules on Linux kernel 4.6
=> ↺ How to install htop on pfSense firewall
Games
=> ↺ Our Third Podcast, with Cybik, is Out Now
- Cybik comes back on how he came to know and use Linux in the first place, his gaming habits, how he got involved into the Skullgirls port, and shares with us his outlook on the Linux gaming landscape. The podcast is just an hour long and you can either download it below, and use our RSS feed (that has the additional benefit of making it easy for you to get new episodes from now on):
=> ↺ SWORDY, Day of Infamy, and more open gaming news
=> ↺ Acclaimed Farming Game Stardew Valley Out Now on Mac and Linux
=> ↺ Stardew Valley is now playable on Mac and Linux
=> ↺ Stardew Valley Finally Available for Mac and Linux
=> ↺ Stardew Valley now available for Mac & Linux!
Desktop Environments/WMs
K Desktop Environment/KDE SC/Qt
=> ↺ We’ve come a long way from where we began!
- After working for several weeks on our WikiRating:Google Summer of Code project Davide, Alessandro and I have slowly reached up to the level where we can now visualize the entire project in its final stages.
=> ↺ #30: GSoC with KDE Now – 8
- Hey ! I’m making KDE Now, an application for the Plasma Desktop. It would help the user see important stuff from his email, on a plasmoid. It’s similar to what Google Now does on Android.
=> ↺ Plasma 5.7.2, Qt 5.7.0, Applications 16.04.3 and Frameworks 5.24.0 available in Chakra
=> ↺ 20 Years of KDE, 10 Years for me and KDE’s influence on my Life
- Just recently I realised that I started contributing 10 years ago. Coming from fvwm2 I had just started using KDE shortly before. Contributing started for me with the German translation of an amaroK 1.4 release announcement with … room for improvement (Yes, Amarok was amaroK back then :)). I made some suggestions, the translation team’s coordinator from back then asked for more and I delivered.
- Two years later I started contributing to KDEGames a bit, mainly in KShisen to get some practice in software development.
=> ↺ [Krita] Interview with Liz de Souza
- My husband and I started using only Linux on our computers when we got married and I installed all paint programs I had available to test and find something that was close or better than Photoshop. I used GIMP for a couple of years, but more or less in 2012 I found Krita at the Ubuntu Software Center and tried it. And liked it. And never left it.
=> ↺ The Vision Quest
=> ↺ Update on my work at GCompris
=> ↺ Self Compiled KF5 / Plasma / Apps
=> ↺ Neon Updates – KDE Network, KDE Applications
GNOME Desktop/GTK
=> ↺ GSoC: final race and multi-disc implementation
- It’s been a while since I wrote a post here. A lot has happened since then. Now Gnome-games fully supports PlayStation games, with snapshoting capabilities. The next thing I’m working on is multi-disc support, specially for PlayStation titles. So far, there’s a working propotity although a lot needs to be re-engineered and polished. This last part of the project has involved working both in UI, persistance and logic layers.
=> ↺ This Week in GTK+ – 11
- In this last week, the master branch of GTK+ has seen 22 commits, with 6199 lines added and 1763 lines removed.
Distributions
=> ↺ [Solus] Replacement of Release Schedule
- In the not so distant past, Solus followed a static point release model. Our most current release at this time is 1.2, with a 1.2.1 planned to drop in the near future. However, we also recently announced our move to a rolling release model. As such, these two schools of thought are in contradiction of one another.
New Releases
=> ↺ First release of official ArchStrike ISO files!
Arch Family
=> ↺ Parabola GNU/Linux-libre 2016.07.27 Adds LightDM as Default Display Manager
- André Fabian Silva Delgado proudly announced the availability for download of the live ISO images of the Parabola GNU/Linux-libre 2016.07.27 operating system based on Arch Linux.
Slackware Family
=> ↺ July ’16 security fixes for Java 8
- On the heels of Oracle’s July 2016 security updates for Java 8, the icedtea folks have released version 3.1.0 of their build framework so that I could create packages for OpenJDK 8u101_b13 or “Java 8 Update 101 Build 13” (and the JRE too of course).
=> ↺ Pipelight update
- I decided to do an update of my “pipelight” package. I had not looked at it for a long time, basically because I do not use it anymore, but after I upgraded my “wine” package someone asked if I could please write up what could be done for wine-pipelight.
- As you know, pipelight is a Linux plugin wrapper for Mozilla-compatible browsers which lets you install and use Windows plugins on Linux. This configuration enables you to access online services which would otherwise be unavailable to you on a Linux platform. The pipelight plugin wrapper uses wine to load the Windows software.
Red Hat Family
Finance
=> ↺ Red Hat, Inc. (NYSE:RHT) Current Analyst Ratings
=> ↺ Friday Session Wrap for Red Hat, Inc. (NYSE:RHT)
Fedora
=> ↺ Fedora @ EuroPython 2016 – event report
Debian Family
=> ↺ Debian Needs Artwork, Sysadmin Horrors, VA Linux
- July 29 was System Administration Appreciation Day and OpenSource.com celebrated with five sysadmin horror stories. Tecmint.com put together a list of t-shirts for system administrators and The Register had a round-up of fun things to do. Back in Linuxland, Bits from Debian put out the call for new artwork for upcoming version 9.0 and Ian Murdock was honored at this year’s International Free Software Forum. And finally, VarGuy.com contributor Christopher Tozzi looked back at VA Linux today saying it was probably the most successful Open Source company.
=> ↺ Debian Project News – July 29th, 2016
- Welcome to this year’s third issue of DPN, the newsletter for the Debian community.
Derivatives
=> ↺ SteamOS Brewmaster 2.87 Released With NVIDIA Pascal Support
Canonical/Ubuntu
=> ↺ Tablet review: BQ Aquaris M10 Ubuntu Edition
- As employees have become more and more flexible in recent years thanks to the power and performance of mobile devices, the way we work has changed dramatically.
- We frequently chop and change between smartphones, tablets and laptops for different tasks, which has led to the growth of the hybrid market – devices such as Microsoft’s Surface Pro 3 and Apple’s iPad Pro – that provide the power and functionality of a laptop with the mobility and convenience of a tablet.
=> ↺ Snap interfaces for sandboxed applications
- Last week, we took a look at the initial release of the “portal” framework developed for Flatpak, the application-packaging format currently being developed in GNOME. For comparison, we will also explore the corresponding resource-control framework available in the Snap format developed in Ubuntu. The two packaging projects have broadly similar end goals, as many have observed, but they tend to vary quite a bit in the implementation details. Naturally, those differences are of particular importance to the intended audience: application developers.
- There is some common ground between the projects. Both use some combination of techniques (namespaces, control groups, seccomp filters, etc.) to restrict what a packaged application can do. Moreover, both implement a “deny by default” sandbox, then provide a supplemental means for applications to access certain useful system resources on a restricted or mediated basis. As we will see, there is also some overlap in what interfaces are offered, although the implementations differ.
- Snap has been available since 2014, so its sandboxing and resource-control implementations have already seen real-world usage. That said, the design of Snap originated in the Ubuntu Touch project aimed at smartphones, so some of its assumptions are undergoing revision as Snap comes to desktop systems.
- In the Snap framework, the interfaces that are defined to provide access to system resources are called, simply, “interfaces.” As we will see, they cover similar territory to the recently unveiled “portals” for Flatpak, but there are some key distinctions.
- Two classes of Snap interfaces are defined: one for the standard resources expected to be of use to end-user applications, and one designed for use by system utilities. Snap packages using the standard interfaces can be installed with the snap command-line tool (which is the equivalent of apt for .deb packages). Packages using the advanced interfaces require a separate management tool.
=> ↺ Ubuntu 15.10 (Wily Werewolf) Reaches End Of Life Today (July 28)
Flavours and Variants
=> ↺ Ubuntu MATE 16.10 Yakkety Yak Gets A Unity HUD-Like Searchable Menu
- MATE HUD, a Unity HUD-like tool that allows searching through an application’s menu, was recently uploaded to the official Yakkety Yak repositories, and is available (but not enabled) by default in Ubuntu MATE 16.10.
Devices/Embedded
Phones
Android
=> ↺ Android 7.0 Nougat could be release as soon as next month
=> ↺ Android gains anti-spam caller ID feature
=> ↺ Modular Moto Z Android phone supports DIY and RPi HAT add-ons
- Motorola and Element14 have launched a development kit for creating add-on modules for the new modular Moto Z smartphone, including an adapter for RPi HATs.
- We don’t usually cover smartphones here at HackerBoards because most don’t offer much opportunity for hardware hacking. Yet, Lenovo’s Motorola Mobility subsidiary has spiced up the smartphone space this week by announcing a modular, hackable “Moto Mods” backplate expansion system for its new Android-based Moto Z smartphones.
=> ↺ Samsung Galaxy Android Nougat Update Info (2016)
=> ↺ The Superbook Android laptop has passed $1 million in Kickstarter funding
=> ↺ Android N Feature Spotlight: Long press Select to Uninstall in Android TV, long press Home for Recents
=> ↺ Android Circuit: New Galaxy Note 7 Details Leak, BlackBerry’s Surrender, How Google Beats Apple
=> ↺ Google Docs add-ons make the jump from desktop to Android
Free Software/Open Source
=> ↺ Student survey data shows Open Source training uptake amongst women and young people remains extreme
- Future Cert, the UK and Ireland representative for the LPI (Linux Professional Institute), is calling for more awareness of Open Source software training amongst the under 21s and especially women, which the industry is so desperately in need of.
- New figures from a recent Future Cert student survey reveals that the number of women and young people taking LPI Certification in Open Source computing remains extremely low.
- Of those questioned, 98% were male, and just 2% were female, taking an LPI exam. This figure is significantly less than an already low figure of around 15% to 17% of women in IT careers in general. It raises the question, what does the industry need to do to make an Open Source career attractive to women?
=> ↺ Quality in open source: testing CRIU
- Checkpoint/Restore In Userspace, or CRIU, is a software tool for Linux that allows freezing a running application (or part of it) and checkpointing it to disk as a collection of files. The files can then be used to restore and run the application from the point where it was frozen. The distinctive feature of the CRIU project is that it is mainly implemented in user space.
- Back in 2012, when Andrew Morton accepted the first checkpoint/restore (C/R) patches to the Linux kernel, the idea to implement saving and restoring of running processes in user space seemed kind of crazy. Yet, four years later, not only is CRIU working, it has also attracted more and more attention. Before CRIU, there had been other attempts to implement checkpoint/restore in Linux (DMTCP, BLCR, OpenVZ, CKPT, and others), but none were merged into the mainline. Meanwhile CRIU survived, which attests to its viability. Some time ago, I implemented support for the Test Anything Protocol format into the CRIU test runner; creating that patch allowed me to better understand the nature of the CRIU testing process. Now I want to share this knowledge with LWN readers.
- The CRIU tests are quite easy to use and available for everyone. Moreover, the CRIU team has a continuous-integration system that consists of Patchwork and Jenkins, which run the required test configurations per-patch and per-commit. Patchwork also allows the team to track the status of patch sets to make the maintainer’s work easier. The developers from the team always keep an eye on regressions. If a commit breaks a tree, the patches in question will not be accepted.
=> ↺ Open-source Wire messenger gets encrypted screen-sharing
- Chat app Wire has been rapidly adding feature as of late as it looks to gain some traction against the myriad of competitors out there. The latest trick in its arsenal is screen sharing.
- Now you can click on the new screen-sharing button to, well, share your screen during a call (if you’re on a desktop, that is). It works during group chats too and, as with all Wire communications, is encrypted end-to-end. Wire believes it’s the first messaging app to include end-to-end encryption.
=> ↺ SPI board election results are available
- Software in the Public Interest (SPI) has completed its 2016 board elections. There were two open seats on the board in addition to four board members whose terms were expiring. The six newly elected members of the board are Luca Filipozzi, Joerg Jaspert, Jimmy Kaplowitz, Andrew Tridgell, Valerie Young, and Martin Zobel-Helas. The full results, including voter statistics, are also available.
Events
=> ↺ SFK 2016 – Call for Speakers
- Software Freedom Kosova is an annual international conference in Kosovo organized to promote free/libre open source software, free culture and open knowledge, now in its 7th edition. It is organized by FLOSSK, a non governmental, not for profit organization, dedicated to promote software freedom and related philosophies.
Pseudo-Open Source (Openwashing)
=> ↺ Intel Finally Releases Its Rack Scale Design to Open Source
=> ↺ this page
=> ↺ Facebook tries a new way to release open-source projects
=> ↺ Bringing ChakraCore to Linux and OS X
=> ↺ Microsoft’s Chakra JavaScript Engine Comes To Linux, macOS
=> ↺ Microsoft boosts cross-platform apps development by bringing ChakraCore to Linux and OS X
=> ↺ Accenture acquires Spanish digital designer Tecnilogica
=> ↺ Accenture acquires Tecnilógica to boost its open source digital technology
=> ↺ Microsoft’s Next Open Source Target Could Be PowerShell: Report
FSF/FSFE/GNU/SFLC
=> ↺ GIMP 2.9.4 and our vision for GIMP future
- So you may have heard the news: we recently released a new development version of GIMP, version 2.9.4 (as well as a bugfix release 2.8.18, but this is not as awesome).
Licensing/Legal
=> ↺ On the boundaries of GPL enforcement
- Last October, the Software Freedom Conservancy (SFC) and Free Software Foundation (FSF) jointly published “The Principles of Community-Oriented GPL Enforcement”. That document described what those organizations believe the goal of enforcement efforts should be and how those efforts should be carried out. Several other organizations endorsed the principles, including the netfilter project earlier this month. It was, perhaps, a bit puzzling that the project would make that endorsement at that time, but a July 19 SFC blog post sheds some light on the matter.
- There have been rumblings for some time about a kernel developer doing enforcement in Germany that might not be particularly “community-oriented”, but public information was scarce. Based on the blog post by Bradley Kuhn and Karen Sandler, though, it would seem that Patrick McHardy, who worked on netfilter, is the kernel developer in question. McHardy has also recently been suspended from the netfilter core team pending his reply to “severe allegations” with regard to “the style of his license enforcement activities”.
Openness/Sharing/Collaboration
=> ↺ Open-source drug discovery project advances drug development
=> ↺ The First-Ever Test of Open-Source Drug-Discovery
=> ↺ Open-Source Drug Discovery a Success
=> ↺ CNS – Open-Source Project Spurs New Drug Discoveries
- Medicines for Malaria Venture, a nonprofit group based in Geneva, Switzerland, distributed 400 diverse compounds with antimalarial activity — called the Malaria Box — to 200 labs in 30 nations in late 2011. The findings from subsequent studies and analyses were published Thursday in the journal PLOS Pathogens. Distributing the Malaria Box to various labs enabled scientists to analyze the compounds and develop findings that have led to more than 30 new drug-development projects for a variety of diseases. As a stipulation to receiving the samples, the various research groups had to deposit the information from their studies in the public domain.
=> ↺ Wire and Launchkit go open source, a water flow monitoring system, and more news
=> ↺ Apache, astsu, Biscuit, Python, Puppet 4, systemd & more!
Open Hardware/Modding
=> ↺ The Onion Omega2: The Latest Router Dev Board
=> ↺ Build a $700 open source bionic prosthesis with new tutorial by Nicolas Huchet of Bionico
- The 3D printing community has already successfully taken over the market for cosmetic prostheses, as fantastic initiatives like E-NABLE have proven. But the world of bionics is a different place and just a handful of makers have gone there with any form of success, such as the very inspiring Open Bionics. But even 3D printed bionic prostheses are definitely within our reach, as French open source fanatic Nicolas Huchet of Bionico has proven. Though by no means a making expert himself, he 3D printed his own open source bionic hand during a three month residency at FabLab Berlin and has now shared all the files – including an extensive tutorial – online. This means you can now 3D print your very own bionic prosthesis at home for just $700.
=> ↺ BCN3D Technologies develops open source 3D printed ‘Moveo’ robotic arm for schools
- Designed from scratch and developed by BCN3D engineers in collaboration with the Generalitat de Catalunya’s Departament d’Ensenyament (Department of Education), the BCN3D Moveo is an Arduino Mega 2560-powered, 3D printed robotic arm which could enable schools and colleges in Spain and elsewhere to teach students the basics of robotics, mechanical design, and industrial programming. When the Departament d’Ensenyament approached BCN3D one year ago regarding the possibility of an educative robotics project, the tech organization jumped at the chance to get on board.
Leftovers
Health/Nutrition
=> ↺ Big Food’s Win Over GMO Labeling Bill Shows Failure of Democracy
- In 2014, Vermont passed the first legislation in the U.S. to require labeling of foods containing genetically engineered ingredients. A year earlier, Connecticut and Maine passed GMO labeling bills though these were dependent on several other states passing similar laws.
=> ↺ Did Their Backs Hurt Your Knives?
- For the first-time ever, the platform of a major political party includes an explicit call to repeal the Hyde Amendment, a federal law that has denied eligible poor and low-income women coverage for abortion care for nearly four decades. This has anti-abortion democrats saying they have been betrayed.
Security
=> ↺ Virus and malware protection not quite a nonissue for Linux
- The Linux operating system is seldom targeted, but it can happen, and whether to play it safe by using anti-virus and anti-malware software is a judgment call, Patrick Marshall writes. He also answers questions about emails that fail to arrive and Windows 10 installation.
=> ↺ LastPass 0Day — Why Using cleartext tokens in the URL is bad practice.
- This is yet another reason why sanitizing OpenAuth or other token urls to the minimal allowed to resolve (the hostname) is good practice.
- So exactly what is the issue at hand?
- Well LastPass as with most password managers that in some way connect to a sync or cloud mechanism, uses a cookie of sorts on all sites you setup with autofill ( no typing needed, great defense against keyloggers), however the issue is that the parser to determine if such a site is accessed / logged in leaves cleartext tokens in the url and takes a malformed url as username:password @ foo.tld i.e. johndoe/mypassword@facebook.com which allows an attacker on a machine that is logged in (without 2fa –more on this later) to spill the beans about all passwords in 2 ways.
=> ↺ Malware Used in DNC Hack Has Roots in Chinese Open-Source Tool
=> ↺ Microsoft-connected
=> ↺ CrowdStrike
=> ↺ Huge Changes From Google That Will Impact Your Security
=> ↺ Google beefs Linux up kernel defenses in Android
=> ↺ Google strengthens Android security by toughening its Linux core
=> ↺ Protecting Android with more Linux kernel defenses
=> ↺ Bruce Schneier Sounds The Alarm: If You’re Worried About Russians Hacking, Maybe Help Fix Voting Machine Security
=> ↺ too much
=> ↺ Microsoft
=> ↺ [Let’s Encrypt] Full Support for IPv6
Defence/Aggression
=> ↺ Finland beefs up arms exports to Middle East
- Over the last 18 months, Finland’s Ministry of Defence has awarded domestic companies 50 permits to sell weapons to countries in the Middle East. Finland is currently supplying arms to Saudi Arabia and the United Arab Emirates, for example, both of which have recently bombed civilian targets in Yemen.
=> ↺ U.S. Awards $1.7 Billion Contract to Buy Radios for Afghan Army
- I always found myself giggling during the Democratic debates when Hillary would ask Bernie how he was going to pay for things like healthcare or college tuition, and then Bernie stammering to find an answer.
=> ↺ Do Civilisations Really Have to Clash?
- We are living in a world when it is normal to think that civilisations are incompatible and have to clash with each other. But this is a perversion of the truth as Dr. Paul Craig Roberts points out.
=> ↺ Hillary Clinton and Her Hawks
- Focusing on domestic issues, Hillary Clinton’s acceptance speech sidestepped the deep concerns anti-war Democrats have about her hawkish foreign policy, which is already taking shape in the shadows, reports Gareth Porter.
=> ↺ The Fallacy of ‘Regime Change’ Strategies
- “Regime change” or destabilizing sanctions are Official Washington’s policy options of choice in dealing with disfavored nations, but these aggressive strategies have proved harmful and counterproductive, says ex-CIA analyst Paul R. Pillar.
=> ↺ Intervention Fail: ISIS Makes Bloody Gains in Post ‘Liberation’ Afghanistan
- Shortly after the Taliban took power in Afghanistan in 1996 (their rise to power itself a result of the 1979 Soviet intervention in Afghanistan), we began to hear endless stories of the horrors of this student movement turned governing power. They ruled by Sharia law, they treated women badly, they even blew up ancient statues!
- The US rhetoric against the Taliban began long before the attacks of 9/11 (which were carried out largely by Saudis who trained in Afghanistan with the knowledge of the Taliban). But it was the 9/11 attacks that opened the door to a direct US intervention in Afghanistan.
Transparency/Investigative Reporting
=> ↺ Snowden Criticizing WikiLeaks Shouldn’t Actually Surprise Anyone
=> ↺ Edward Snowden jabs WikiLeaks for not ‘curating’ info releases
=> ↺ Snowden knocks WikiLeaks for handling of DNC leak
=> ↺ Snowden hits WikiLeaks over indiscriminate file dumps
=> ↺ After DNC leak, Snowden says WikiLeaks shouldn’t dump emails
=> ↺ WikiLeaks, NSA leaker Edward Snowden clash on Twitter
=> ↺ Edward Snowden & WikiLeaks clash on Twitter over how to better leak data
=> ↺ WikiLeaks’ methods questioned by whistleblower Edward Snowden
=> ↺ Edward Snowden Is Not Down With WikiLeaks’ Methods
=> ↺ Edward Snowden and WikiLeaks Embroiled in Twitter Feud
=> ↺ WikiLeaks and Edward Snowden’s spat spills on Twitter
=> ↺ A Twitter spat breaks out between Snowden and WikiLeaks
=> ↺ Snowden and WikiLeaks Clash Over How to Disclose Secrets
=> ↺ WikiLeaks vs Edward Snowden: Twitter argument over DNC data leaks kicks off
=> ↺ Edward Snowden, WikiLeaks Have Social Media Spat: What Are the Implications, Ramifications On Data Privacy And the US Election
=> ↺ Snowden And WikiLeaks Go To War Over The Ethics Of The DNC Email Hack
=> ↺ Edward Snowden and WikiLeaks exchanged Twitter jabs over the DNC hack
=> ↺ Edward Snowden and WikiLeaks Disagree Over How to Share Government Secrets
=> ↺ WikiLeaks and NSA leaker Edward Snowden clash on Twitter
Environment/Energy/Wildlife/Nature
=> ↺ From Kalamazoo to Husky, Parallel Pipeline Disasters
- There are many parallels between last week’s heavy oil spill from a Husky Energy pipeline in Saskatchewan and the Enbridge pipeline rupture in Kalamazoo Michigan almost exactly six years ago.
- Both ruptures occurred while control room staff were restarting the flow in the pipelines.
- In both cases, “anomalies” were indicated by computers systems monitoring the pipelines.
- In both cases, the companies failed to interpret the “anomalies” as leaks.
- In both cases, significant periods of time elapsed before the companies were made aware of the leaks by members of the public seeing the oil floating down river. 17 hours for Enbridge, 14 hours for Husky.
- In both cases, diluents had been added to the pipeline to facilitate pumping.
- In both cases, emergency responses were inadequate to deal with the quantity spilled and the conditions on the rivers the spills flowed into.
=> ↺ David Perry on Disabilities and Police Violence, Harvey Wasserman on Nuclear vs. Renewables
Finance
=> ↺ Hedge-Fund Money: $48.5 Million for Hillary Clinton, $19,000 for Donald Trump
- Hedge funds are playing a far bigger role in 2016 than in past elections—and Hillary Clinton has been the single biggest beneficiary.
=> ↺ Facebook could face extra $5bn tax bill after US investigation
- Facebook could be liable to pay between $3 to $5bn in extra US tax after an extensive investigation by the US Internal Revenue Service (IRS) into the way the tech company transferred assets to Ireland.
- The tax agency has been exploring whether Facebook deliberately deployed complex financial processes designed to minimize the amount of US tax it paid.
=> ↺ Amazon boss Bezos becomes world’s third richest
- Strong earnings from Amazon and a boost to the company’s stock have made its founder, Jeff Bezos, the world’s third richest person, according to Forbes.
- Mr Bezos owns 18% of Amazon’s shares, which rose 2% in trading on Thursday. Forbes estimated his fortune to be $65.3bn (£49.5bn).
=> ↺ Why Make Something When Nothing Sells Just as Well?
- It’s a fundamental law of nature… or at least nature legislation: For every action that the government takes to protect the natural environment, there is a cleverly corrupt reaction. An investigation by Bloomberg Businessweek profiled an extraordinary case of fraud that exploited the Renewable Fuel Standard program, which President George W. Bush signed into law in 2005. That’s what he gets for trying to lessen our dependence on foreign oil… sucker!
=> ↺ Challenges and opportunities of the unbanked and under-banked
- Talking about access to appropriate and affordable finance is one thing but what happens when people reject those banks? What happens if some consumers never feel banks can provide for them?
AstroTurf/Lobbying/Politics
=> ↺ Jill Stein is not Ralph Nader 2.0; she is much, much better. She can win. Here’s why
- Progressives in America aren’t happy. In fact, for the first time in recent memory, progressives are finally good and angry at the political establishment. Leak after leak, lawsuit after lawsuit, the facts just keep rolling in like so many punches, again and again exposing how the DNC methodically shut out and shut down the first candidate many of them had gotten excited about in years. Thousands of man hours and millions of dollars, many of those dollars pinched from the tightest of household budgets, poured into what turned out to be a totally rigged election. Ouch.
=> ↺ Trump: A vote for the Green Party helps me
=> ↺ Democratic National Committee Claims That Wikileaks Has ‘Malware Embedded Throughout The Site’
- We’ve seen various organizations impacted by Wikileaks come up with all sorts of excuses and claims about why people shouldn’t use the site, but “the site is embedded with malware” is a new one. It also seems hellishly unlikely. It’s the kind of thing that someone would discover and it would destroy whatever credibility Wikileaks has left. I guess anything is possible, but this sounds like the DNC freaking out over the leaks and trying to spread bogus rumors in the hopes that it will get people to stop looking at their leaked files.
=> ↺ Julian Assange: We have more material on Clinton
- WikiLeaks Founder Julian Assange speaks with CNN’s Anderson Cooper about his organization releasing hacked emails from the Democratic National Committee.
=> ↺ Cool Catchphrase, Hillary, But Science Isn’t About Belief
- On Thursday night, Hillary Clinton made history when she became the first woman to lead a major presidential ticket. In a speech filled with reminders of her experience and her plans for reform, one remark stood out: “I believe in science!” she said, chuckling. “I believe climate change is real, and that we can save our planet while creating millions of good paying clean energy jobs.”
- Delegates filling the convention hall in Philadelphia roared in approval. Pockets of Twitter, too. Just as quickly, though, reactions turned cynical: How awful it is, in this day and age, that a presidential candidate must say she believes in science? In the retelling, Clinton’s laugh became a nod to the absurdity of the moment.
=> ↺ How a cooked Assange quote ended up media gospel
- Wikileaks, the clearing house for state secrets, seems more about founder Julian Assange’s grudges these days: especially the one for Hillary Clinton. Much fuss was made over a quote—that he had “enough evidence” to guarantee an indictment of her—that was widely attributed to him. It turns out, though, that the quote doesn’t check out: most point to a mangled interview on the UK’s ITV where it isn’t even said. Jesse Singal set out to track down a source that no-one bothered to verify. It’s a surprisingly tantalizing and teasing journey, but the tl;dr seems to be that the quote was originally fabricated by the blog Zero Hedge.
=> ↺ THE DEMOCRATIC PARTY NO LONGER EXISTS
- The Democratic Party that once was concerned with workers’ rights, the elderly, civil rights, and the constitutional protections of America liberty no longer exists. As the just completed Democratic presidential primaries and the Democratic presidential convention have clearly demonstrated, the United States now has two Republican parties in service to the One Percent.
- The organized Democrats–the Democratic National Committee–have shown themselves to be even more venal and corrupt than the Republicans. Leaked emails document that the Democratic National Committee conspired with the Hillary campaign in order to steal the nomination from Bernie Sanders. It is clear that Sanders was the choice of Democratic Party voters for president, but the nomination was stolen from him by vote fraud and dirty tricks.
- The DNC and the media whores have tried to discredit the incriminating emails by alleging that the leaked emails resulted from a plot by Russia’s President Vladimir Putin in behalf of “Putin’s American agent,” Donald Trump. “A vote for Trump is a vote for Putin,” as the presstitute scum put it.
=> ↺ Obama Said Hillary will Continue His Legacy and Indeed She Will!
- Leading up to Monday’s Democratic Party convention, Hillary chose Blue Dog Senator Tim Kaine of Virginia as her VP. This was followed by the Wikileaks release of Democratic National Committee (DNC) e-mail files showing it acting as the Clinton Campaign Committee even to the point of using the same lawyers as her own campaign to oppose Bernie Sanders.
- The response across the Democratic neocon spectrum, from Anne Applebaum at the Washington Post to red-baiting Paul Krugman and the Sunday talk shows it was suggested that behind the Wikileaks to release DNC e-mails was a Russian plot to help elect Trump as their agent. Former US ambassador to Russia Michael McFaul lent his tattered reputation to claim that Putin must have sponsored the hackers who exposed the DNC dirty tricks against Bernie.
- The attack on Trump was of course aimed at Sanders. At first it didn’t take off. Enough delegates threatened to boo DNC head (and payday-loan lobbyist) Debbie Wasserman Schultz off stage if she showed her face at the podium to gavel the convention to order. The down-note would have threatened the “United Together” theme, so she was forced to resign. But Hillary rewarded her loyalty by naming her honorary chairman of her own presidential campaign! If you’re loyal, you get a pay-off. The DNC was doing what it was supposed to do. No reform seems likely.
=> ↺ Sheriff Arpaio Paved the Way for Trump
- Before there was Donald Trump and his promise of a “beautiful wall” across the U.S.-Mexican border there was Sheriff Joe Arpaio from Arizona who pushed cruel treatment of illegal immigrants and other Latinos, reports Dennis J Bernstein.
Censorship/Free Speech
=> ↺ How California’s Identity Fraud Law Has Been Interpreted To Criminalize Defamation, Publicity Rights Violations And More
- Eugene Volokh has a somewhat terrifying look at how very broad interpretations of California’s identity fraud law, California Penal Code § 530.5(a) has been so broadly interpreted by the courts that it, in effect, creates a crime out of things that were normally considered, at best, civil offenses. This includes defamation, publicity rights infringements and disclosure of private facts. He discusses a few cases, but focuses on a key one that we’ve mentioned: the state of California’s recent legal win over Kevin Bollaert, a revenge porn creep. In our writeup, we were mainly concerned with how the ruling seemed to run against Section 230′s protections, but as Volokh makes clear, it’s much, much worse than that.
=> ↺ The West Kowtows to China Through Self-Censorship
- Human rights lawyer Teng Biao was commisioned to write a book reflecting on his 11 years as a rights activist in China for the American Bar Association in 2014. Last year, the ABA informed Teng that they would not be publishing the book over “concern that we run the risk of upsetting the Chinese government.” The ABA subsequently denied that as the reason for the cancellation, leading to protest from the China-focused legal rights community.
=> ↺ Melbourne graffiti artist Lushsux’s Instagram account deleted in ‘politically-motivated censorship’
- MARIBRYNONG City Council has declared that a large mural depicting US presidential candidate Hillary Clinton in a skimpy stars and stripes bathing suit must go.
- The huge mural is on the side of the Mr Mobility store in Footscray.
- The owner is away but a friend looking after his small business, Mitch, said she strongly disagreed with the council’s stance.
- “I can’t see any problem with someone expressing themselves with art. I think it’s a wonderful thing.”
- Mitch said far more offensive images could be found on the streets, yet they were not removed.
- “I’m a woman and I’m not offended by it. It’s just a one piece bathing suit with large breasts but the nipples and private parts are covered.”
=> ↺ Removal of Repeal the Eighth mural shows that censorship cuts both ways
=> ↺ New Tool to Help Notify Users When Their Content is Taken Offline
- When user content is threatened with removal from the Internet, it’s unlikely that anyone is going to put up more of a fight than the user who uploaded it. That’s what makes it so critically important that the user is informed whenever an Internet intermediary is asked to remove their content from its platform, or decides to do so on its own account.
- Unfortunately this doesn’t consistently happen. In the case of content taken down for copyright infringement under the DMCA or its foreign equivalents, the law typically requires the user to be informed. But for content that allegedly infringes other laws (such as defamation, privacy, hate speech, or obscenity laws), or content that isn’t alleged to be illegal but merely against the intermediary’s terms of service, there is often no requirement that the user be informed, and some intermediaries don’t make a practice of doing so.
- Another problem is that even when intermediaries do pass on notices about allegedly illegal content to the user who uploaded it, this notice might be inaccurate or incomplete. This led to the situtation in Canada where ISPs were passing on misleading notices from US-based rightsholders, falsely threatening Canadian users with penalties that are not even applicable under Canadian law.
=> ↺ OPINION: Why Taylor Swift’s Instagram Censorship COULD Be A Problem For Free Speech
- But first, a caveat. The tweet was slightly misleading. It may have implied that Taylor Swift was herself somehow violating the law on free speech, which, I agree, would be odd and not really possible within our current legal system. But I said ‘violate free speech principles’ for a reason. Principles are not law. In this context, they are the idea behind a law, the reason that law exists, while not being legally enforceable themselves.
=> ↺ Te Bitcoin Subreddit Censorship Debate Reignited by Roger Ver?
=> ↺ Coinbase and Reddit CEOs Discuss Removal of Theymos as Moderator of Bitcoin Subreddit
Privacy/Surveillance
=> ↺ The RCMP Is Trying to Sneak Facial and Tattoo Recognition Into Canada
- In November of 2015, the Royal Canadian Mounted Police had a problem.
- At the time, the US Federal Bureau of Investigation had been using its massively controversial database of biometric information—photos of people’s faces, tattoos, iris scans, and more—at “full operational capacity” for about a year. The RCMP, on the other hand, was stuck with a national fingerprint database that didn’t allow officers to scan and search people’s faces or other body parts. Canada’s federal police force was falling behind its southern counterpart.
- The RCMP had “no authority” to support new capabilities for its nationwide Automated Fingerprint Identification System, or AFIS, according to an internal presentation from November 24 of 2015 that Motherboard obtained through an access to information request. Still, the police felt a pressing need to improve “interoperability with international partner systems”—in other words, to make sure their system meshed with what police in other countries were doing—but lacked an opportunity to do so.
- Undeterred, the RCMP went ahead and began working to procure a new AFIS system that could analyze and capture faces, fingerprints, palm prints, tattoos, scars, and irises—all without clear authorization or approval by the country’s federal privacy watchdog, or even a plan to implement it.
- So, yeah, the RCMP is trying to bring biometric identification to Canada without anybody noticing.
=> ↺ How synced can (and should) NSA and CIA be on cyber?
=> ↺ ExpressVPN protects your on-line anonymity and privacy
- This post reviews ExpressVPN, a hosted Virtual Private Network (VPN) service. A hosted VPN service is a paid subscription service. With a VPN, all your Internet communication is encrypted and passed through a secure proxy (the VPN server) before continuing to the intended destination. To the rest of the world, the Internet traffic appears to come from the VPN server, not your home computer.
=> ↺ Smartwatch Shipments Slipped in Q2 Amid Slowing Demand
=> ↺ Enterprise Wearables: 35 Top Picks
=> ↺ Smartphone Market Flattens Out
=> ↺ IoT Security and Privacy: An Afterthought?
- Security and privacy are widely identified as major concerns for the Internet of Things (IoT), but few people discuss them in any detail.
- An exception is Jim Hunter, chief scientist and technology evangelist at Greenwaves Systems, a provider of IoT software and services. Holding several IoT-related patents and a co-chair on the Internet of Things Consortium, he works regularly with the security and privacy concerns that are often acknowledged only in passing.
- While security and privacy are often discussed in the same breath, Hunter views them as at least partly separate. According to Hunter, security concerns center on how software and hardware are designed. Too often, security is an afterthought — or as Hunter puts it, “it’s not baked into the product, but is instead sprinkled on top.”
- By contrast, he says privacy problems exist “because of the ‘I’ in Iot. “When I put information into my web browser, it brings value to someone else — this is the way that the Internet runs and the agreement we have with it. By keeping ‘Internet’ in front of ‘Internet of Things, we’re enabling companies to think things will continue to work in the same way. Companies are taking your information to the cloud and then using it to make their product(s) better or selling it to other people. The mentality that your data doesn’t have value is where the problem exists.”
- Both security and privacy problems could have been foreseen, Hunter continues — and in some larger companies, they were. But smaller companies often overlook them. “The industry itself hasn’t really been educated to the importance of security,” he says, although he adds that “the tide is turning,” partly because of platforms that offer secure infrastructure, such as Parse on Facebook and Fabric on Twitter.
=> ↺ 75 Top IoT Devices
=> ↺ 20 Russian high-profile organizations attacked by spy malware in coordinated op – FSB
- Computer networks of some 20 Russian state, defense, scientific and other high-profile organizations have been infected with malware used for cyberespionage, the Russian Security Service (FSB) reported, describing it as a professionally coordinated operation.
- “The IT assets of government offices, scientific and military organizations, defense companies and other parts of the nation’s crucial infrastructure were infected,” the FSB said in a statement as cited by the Russian media.
- The security agency said that all the cases are linked and appear to be part of a well-coordinated attack requiring considerable expertise. The coding of the malware and vectors of attack are similar to those used in previous cyber-offensive operations against targets in Russia and other nations, the report stated.
=> ↺ NSA Whistleblower Skeptical of US-EU Privacy Shield to ‘Paper Over’ Spying
- NSA whistleblower Mark Klein said that the latest US-EU agreement aimed at protecting European data privacy standards may appear to be a reform, but will unlikely change expansive US surveillance practices.
=> ↺ British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents
- A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows.
- The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group or JTRIG, was first revealed in 2014, when leaked top secret documents showed it tried to infiltrate and manipulate—using “dirty trick” tactics such as honeypots—online communities including those of Anonymous hacktivists, among others.
- The group’s tactics against hacktivists have been previously reported, but its influence campaign in the Middle East has never been reported before. I was able to uncover it because I was myself targeted in the past, and was aware of a key detail, a URL shortening service, that was actually redacted in Snowden documents published in 2014.
=> ↺ LulzSec Member Reveals More Details About GCHQ Covert Operations
- Mustafa Al-Bassam, aka tFlow, co-founder of the LulzSec hacking crew, published today more details about how the GCHQ used the covert Joint Threat Research Intelligence Group (JTRIG) to attack hacktivism crews, but also that they tried to influence elections in Iran and boost and help the Arab Spring uprising in Syria.
=> ↺ WhatsApp Forensic Artifacts: Chats Aren’t Being Deleted
- To test, I installed the app and started a few different threads. I then archived some, cleared, some, and deleted some threads. I made a second backup after running the “Clear All Chats” function in WhatsApp. None of these deletion or archival options made any difference in how deleted records were preserved. In all cases, the deleted SQLite records remained intact in the database.
- Just to be clear, WhatsApp is deleting the record (they don’t appear to be trying to intentionally preserve data), however the record itself is not being purged or erased from the database, leaving a forensic artifact that can be recovered and reconstructed back into its original form.
Civil Rights/Policing
=> ↺ Attorney for Man With Autism Urges DOJ to Investigate North Miami Police Shooting
- An attorney for a man with autism who was placed in a psychiatric unit after witnessing another man get shot by a police officer is urging the Department of Justice to investigate the North Miami Police and state of Florida.
- Matthew Dietz, the attorney for Arnaldo Rios, wrote a letter Monday to Attorney General Loretta Lynch, claiming that Rios was placed in a facility “inappropriate for his needs” after the shooting. The Arc, a national organization that advocates for people with intellectual and developmental disabilities, sent a letter to the DOJ’s Civil Rights Division on Thursday in support of Dietz’s request for an investigation. Arc said “it is vital that Mr. Rios secures an appropriate community placement as soon as possible.”
=> ↺ After Cracking Down On Tens Of Thousands Of Enemies, Erdogan Says He’s Dropping His 2000 Lawsuits Over Insults
- For the last few months we’ve poked fun at Turkish President Recep Tayyip Erdogan, who has ridiculously thin skin. As we noted, he had filed upwards of 100 lawsuits per month against people for “insulting” him — and this included things as ridiculous as posting a meme on social media that compared Erdogan to Gollum.
- Of course, more recently (as you’ve heard) there was a coup attempt in Turkey, which failed, and Erdogan has spent the last few weeks basically using the coup as an excuse to crush all his enemies.
=> ↺ NYPD Dodges Another Legislative Attempt To Inject Accountability And Transparency Into Its Daily Work
- Law enforcement officers are pretty used to being able to stop nearly anyone and demand to know who they are and what they’re doing. Sure, there are plenty of laws that say they can’t actually do that, but the public is generally underinformed about their rights, and this works in cops’ favor. As a recent Appeals Court decision pointed out, citizens are “free to refuse to cooperate with police before a seizure.”
- Obviously, this perfectly legal act of noncompliance just won’t do, and it certainly won’t be cops pointing out to citizens the rights they have available to them. New York City legislators thought they could force this transparency on the NYPD.
=> ↺ Security Researchers Sued For Exposing Internet Filtering Company’s Sale Of Censorship Software To Blacklisted Country
- Rather than meet the situation head on, Netsweeper chose to hang back and lob a lawsuit at Citizen Lab after it published its report. Fortunately for the security researchers, Netsweeper has chosen to drop its lawsuit entirely, possibly because pursuing the questionable defamation claims would have put it up against Ontarios’s version of anti-SLAPP laws: the Protection of Public Participation Act.
- The world of security research is still a dangerous place. When researchers aren’t being arrested for reporting on their findings, they’re being sued for exposing security flaws and highly-questionable behavior. It’s a shame there aren’t more built-in protections for researchers, who tend to receive a lot of legal heat just for doing their job.
=> ↺ Yavuz Baydar: Tough times ahead for Turkey
- The latest journalist arrested in Turkey is Arda Akın, a young reporter with the Hürriyet daily, part of the “mainstream” Doğan Media Group. Arda was in the “first” arrest list, issued on Monday, which mainly consisted of investigative reporters. In May, he was among those who won the European Union Investigative Journalism Award 2016, a prestigious prize delivered every year in six Balkan countries and Turkey. In his award-winning article, Akın told of corruption related to ruling Justice and Development Party figures.
=> ↺ Body-camera video shows fatal police shooting in Ariz.
- Body-camera footage released by the city of Winslow on Wednesday shows the seconds leading up to the fatal shooting of a 27-year-old Navajo woman by a Winslow police officer, with the woman advancing toward the officer with a pair of silver scissors in her left hand.
- The video footage from March 27 shows the encounter between Loreal Tsingine and Officer Austin Shipley. Tsingine’s death on Easter Sunday drew an immediate outcry in the city and strained relations between the city and Native Americans. The Navajo Reservation borders Winslow.
- A shooting investigation was conducted by the Arizona Department of Public Safety, which was reviewed by Maricopa County Attorney Bill Montgomery. He announced Friday that no charges would be filed against Shipley.
- The footage released Wednesday does not have audio initially. It shows Shipley leaving his patrol vehicle to encounter Tsingine, who is a suspect in a convenience-store shoplifting that had occurred minutes before. His hand movements indicate that he is giving her orders to stop and to turn around.
- He attempts to grab her hands when she turns back to face him, and Shipley takes Tsingine to the ground. As she gets up, a pair of silver scissors can be seen in her left hand.
=> ↺ ‘It’s Been Harrowing’: Alleged Hacker Lauri Love Awaits Extradition Decision
- Early in the evening of 25 October 2013, a man dressed as a UPS delivery guy arrived at Lauri Love’s family home in Suffolk holding a box. When Love’s mum answered the door, she was told that only her son could sign for the delivery. She called him downstairs, and when he emerged wearing his dressing gown, he was told that the man was in fact an officer of the National Crime Agency, and that he was being arrested on suspicion of hacking into a long list of systems, including those controlled by the US Federal Reserve, NASA, and the FBI. Love asked if he still got to keep the box.
- Almost three years later, on 25 July 2016, 31-year-old Love and his parents were at Westminster Magistrates’ Court in London for the final arguments in his extradition hearing. Judge Nina Tempia is hearing the case, and will rule on 16 September as to whether the UK will allow Love to be extradited to the US where he would face three separate trials in New York, New Jersey, and Virginia.
- “It’s been harrowing, this whole process,” said Love, speaking to me a couple of days later. “The US didn’t even really make any arguments, they were just casting doubt on the evidence from us.”
=> ↺ YouTubers use FGM ‘cuts’ to help raise awareness
- There are at least 200 million women and girls alive today in 30 countries that have undergone female genital mutilation.
- 44 million of those who have undergone the procedure, typically performed on children under the age of five, are still younger than 14.
- The procedure is rooted in patriarchal notions of purity, modesty and appearance; but health effects include infections, chronic pain, infertility, complications during menstruation and childbirth and potentially fatal vaginal bleeding.
- Only a third of British adults are aware of these long-term effects according to new research by ActionAid UK and ActionAid Kenya.
=> ↺ Mix and Match Cyber-Priorities Likely Elevates Gut Check To National Level
- The PPD integrates response to cyberattacks with the existing PPD on responding to physical incidents, which is necessary (actually, the hierarchy should probably be reversed, as our physical infrastructure is in shambles) but is also scary because there’s a whole lot of executive branch authority that gets asserted in such things.
- And the PPD sets out clear roles for responding to cyberattacks: “threat response” (investigating) is the FBI’s baby; “asset response” (seeing the bigger picture) is DHS’s baby; “intelligence support” (analysis) is ODNI’s baby, with lip service to the importance of keeping shit running, whether within or outside of the federal government.
=> ↺ When Black Lives Surely Didn’t Matter
- Many whites counter the Black Lives Matter movement with the rejoinder “all lives matter,” a way of ignoring the ugly American history of torturing, shooting and lynching blacks, as Gary G. Kohls recalls, citing two notorious cases.
=> ↺ We, The Heart of Our Democracy
- If you just couldn’t watch Hillary – and we get it – you might have missed the electrifying call by Rev. William Barber, head of North Carolina’s NAACP and leader of its Moral Mondays, to embrace “a moral revolution of values” and continue fighting for progressives causes. Barber urged his audience to take action to stop gun violence and police brutality, to support voting rights and Black Lives Matter, to make universal health care and a $15 minimum wage a reality for all. “Some issues are not left versus right or liberal versus conservative – they are right versus wrong,” he said. Pointedly citing Jesus, “a brown-skinned Palestinian Jew” – and only briefly referencing Clinton – Barber proclaimed, “We must shock this nation with the power of love. We must shock this nation with the power of mercy. We must shock this nation and fight for justice for all. We can’t give up on the heart of our democracy. Not now, not ever.” He left the crowd, lit up and on its exhilarated feet, with, “Lead with love…Find the glory.” Amen. And no, it’s not over.
=> ↺ Report: Fox News Allegedly Paid $3.15 Million Settlement to Woman Claiming Roger Ailes Sexually Harassed Her
- Over the course of the last three weeks, a steady stream of women have come forward detailing their accounts of alleged sexual harassment at the hands of former Fox News chief Roger Ailes. Ailes, who has firmly denied all allegations of wrongdoing, stepped down from his top position at the network last week, after longtime host Gretchen Carlson sued him for what she claimed was years of inappropriate behavior and retaliation for not complying with his advances.
- A number of women followed suit, sharing accounts of alleged interactions with Ailes that occurred over the span of the last half-century. Most notably, Fox News star Megyn Kelly reportedly told investigators hired by 21st Century Fox that Ailes had sexually harassed her a decade ago when she was just starting out (Ailes denied this, as well, saying that he helped her career tremendously).
- The most recent alleged account of sexual harassment by Ailes is particularly disturbing. On Friday afternoon, New York published a story about a former Fox News employee that details more than 20 years of what she called “psychological torture,” including allegations that Ailes paid her for sex, that he taped their encounters as a means of keeping her silent, and that he used promotions within Fox News as a way to keep their relationship secret.
- Laurie Luhn, who served as Fox News’s director of booking, told New York that she got in touch with the law firm conducting 21st Century Fox’s investigation, claiming that she had been harassed by Ailes since 1991 and that Fox News executives were not only aware of their relationship, but also helped cover it up.
=> ↺ ‘A Travesty’: Chelsea Manning Faces New Charges After Suicide Attempt
- U.S. whistleblower Chelsea Manning may face additional charges and solitary confinement relating to a suicide attempt earlier this month, according to her attorneys.
- The charges include “resisting the force cell move team,” “conduct which threatens,” and “prohibited property,” the American Civil Liberties Union (ACLU) said Thursday. If convicted, Manning could face an additional nine years on her sentence, indefinite solitary confinement, and placement back into maximum security. She may also lose any chances of parole.
- Manning is currently serving 35 years at Fort Leavenworth, Kansas military prison for helping WikiLeaks expose classified government and U.S. military documents in 2010. She confirmed her suicide attempt on July 8 after several days of being kept out of contact with her defense team.
=> ↺ Trump’s Bigotry Reminds US Media of Anywhere but Home
- Donald Trump is an objectively terrifying candidate. He’s a racist, a xenophobe and a misogynist (in a surprisingly underrated manner). He dabbles in antisemitism and mocks his opponents like a middle school bully.
- However, in their effort to critique Trump in a way that is “relatable” and generates clicks, corporate media all too often turn to lazy orientalist tropes and patriotic schlock to “other” him without having to do the messy work of ideological analysis, or running the risk of offending America’s nationalist sensibilities…
=> ↺ Technical Response to Northpointe
- Northpointe asserts that a software program it sells that predicts the likelihood a person will commit future crimes is equally fair to black and white defendants. We re-examined the data, considered the company’s criticisms, and stand by our conclusions.
=> ↺ ProPublica Responds to Company’s Critique of Machine Bias Story
- Northpointe asserts that a software program it sells that predicts the likelihood a person will commit future crimes is equally fair to black and white defendants. We re-examined the data, considered the company’s criticisms, and stand by our conclusions.
Internet Policy/Net Neutrality
=> ↺ Comcast: The Economics Of Offering Cheaper, Better Streaming TV Service ‘Unproven’
- As cable operators consolidate and AT&T and Verizon continue to hang up on millions of unwanted DSL customers they don’t want to upgrade, cable’s monopoly control over the U.S. broadband market is actually stronger than ever. In most markets, cable broadband’s “competition” still consists of either a cash-strapped telco incapable of offering speeds greater than 6 Mbps, or no competition at all. That’s why we’ve seen Comcast rush to impose usage caps on many of these captive markets; an effort to protect legacy TV revenues from Internet video — a move only made possible by a lack of competition.
- Despite this lack of competition, Comcast has at least flirted with the idea of adapting to streaming competition and offering a cheaper, more flexible streaming TV option of its own. About a year ago the company launched a product creatively-dubbed “Stream,” which for $15 a month offers Comcast broadband customers access to its traditional cable service. But despite the company’s promise that every market would see this service by the end of 2016, the rollout of this product appears to have stalled, in large part because it appears Comcast only wanted to appear innovative.
=> ↺ Comcast’s Still Not Sure There’s Any Money In This Whole “Streaming” Thing
- You might have heard that it’s 2016, and streaming your TV via the internet is all the rage. And yet despite being just as susceptible to cord-cutters as anyone (everyone) else, Comcast is still not thinking the whole streaming-TV thing is a moneymaker.
- In the company’s quarterly investor call this week (transcript), Comcast executives faced many questions about over-the-top (broadband) TV. And they were… less than enthusiastic.
- Neil Smit, the CEO of Comcast Cable (as opposed to the whole Comcast company), told investors that, “We haven’t seen an OTT model that really is very profitable for us.”
=> ↺ Blizzard withdrawing support for IPv6?
- It seems that once again Blizzard have their IPv6 connectivity for World of Warcraft not working properly. I opened a ticket and explained the issue in detail. The connectivity issue is entirely in their network. My guess is, as they seem to be using SLAAC addresses, they have simply failed to update addresses when they changed hardware and MAC. That is only a guess though.
- The impact – I could not log in to play the game for several days. I assumed they had a fault or were busy and to be honest, given that I use IPv6 for almost everything I do (google, Facebook, all A&A web sites and internal systems) and have done for about 14 years, it did not even occur to me to check if turning off IPv6 would fix it for a while. These days I rarely play, but have been off ill for a few days and though I may have a game or two.
=> ↺ Mysterious firm pays £135m for .web domain
- A MYSTERY BUSINESS called Nu Dot Co has paid a rather sizeable $135m for the right to the .web generic top-level domain (gTLD).
- The firm beat off competition from the likes of Google and web registry firms Afilias, Radix and Donuts, so it clearly means business.
- The auction went ahead despite calls from others involved that the mystery surrounding Nu Dot Co meant that ICANN, the organisation selling the gTLD, could not satisfy the condition that it must know who, or what, controls the gTLD after auction.
- However, ICANN hurriedly dismissed the claim and proceeded with the auction.
- Akram Atallah, president of ICANN’s Global Domains Division, explained that the auction process was the fairest way to allocate the domain.
- “New gTLD Program auctions are the community-established, last resort method to help determine which applicant will have the opportunity to operate a particular new gTLD when multiple entities vie for the same or confusingly similar domains,” he said.
- “We look forward to seeing the community’s recommendations for the use of these proceeds.”
=> ↺ First Aereo, Now FilmOn: Another Fight for Innovation and Competition in TV Technology
- For over four years, major TV producers like Comcast, Viacom, Fox, Time Warner, and Disney, along with TV station owners like Comcast, Fox, Disney, and Sinclair, and cable companies like–well, Comcast–have fought in court to shut down new services that deliver local broadcast TV via the Internet. In 2014, the Supreme Court ruled that one of those services, Aereo, performed a function that was so similar to a traditional cable system that, like a cable system, it needed permission from copyright holders for the TV programs it transmitted.
Intellectual Monopolies
=> ↺ Mr Justice Arnold refers questions on Article 3(b) SPC Regulation to CJEU
- What do you do if your patent is about to expire, but despite notice that Member States have agreed to grant your marketing authorization (MA) under the decentralized procedure, a MS has not yet taken the step to actually grant it? You still make your SPC application, of course.
Trademarks
=> ↺ Book Review: Trade Secret Protection
- As Cook notes in the introduction, “Trade secrets have only grudgingly started to form an accepted part of the world intellectual property order since TRIPs.” I’m really pleased to see more work on trade secrets. Certainly this book will appeal to the reader eager to access synopses of trade secret protection in key jurisdictions, and in particular non-English speaking ones where information may be less readily accessible. There isn’t an index, which I would have liked to have seen as it would enable cross-country comparison. However, most readers will be looking for jurisdiction-specific information, and the book’s standard chapter format and organisation by country will satisfy that need.
Copyrights
=> ↺ BitTorrent is fifteen years old. What would a file sharing technology developed today look like?
- BitTorrent was developed in 2001: today’s file-sharing technology predates the launch of Facebook, Twitter, and the iPhone. In those fifteen years, surveillance and repression technologies have advanced massively. If we designed file sharing today to keep up with these developments, sharing technology would be an uncensorable, untrackable, and unidentifiable peer-to-peer mesh network between mobile devices.
- Ten years ago, activists argued that file sharing was unstoppable and would adapt to any threat using mobile transmissions. However, this innovation hasn’t taken place, maybe out of a lack of urgency. Let’s examine how such a technology could work.
=> ↺ Gotta catch ‘em all without infringing copyright: Pokémon and Freedom of Panorama
- Pokémon Go requires players to search for Pokémon in the real world, a revolutionary move in the gaming industry. Pokémon are randomly generated by the game software, using GPS tracking technology. When a player is near to a Pokémon, it will appear on her phone screen in camera mode and allow her to ‘throw’ a Pokéball at it to ‘catch’ it. The screen shows the Pokémon in the surrounding environment, making it a life-like experience. While photographs of the capture are not saved to the game, players have the option of saving the photos to their phone, thereby reproducing any surrounding works of architecture or sculptures.
=> ↺ The Selfie-Taking Monkey Who Has No Idea He Has Lawyers Has Appealed His Copyright Lawsuit
- Welp. Here we go again. For many, many years, we’ve been tracking the insane legal situation of the selfie-taking monkey, whose name we were told only recently is “Naruto.” Early on in this saga, back in 2011, our focus was on how the photographer whose camera was used, David Slater, had no legitimate claim to the copyright in the image, in large part because the copyright goes to whoever took the photo, and the copyright cannot go to a monkey, because copyright law is limited to “persons.” Every so often Slater would pop up somewhere or somehow and yell about this — twice representatives of his even threatened us with completely bogus legal action.
- However, things took a turn for the even more bizarre a year ago when PETA, an organization that sometimes appears to focus more on professional trolling rather than on the “ethical treatment of animals” as its name suggests, claimed to represent the monkey (Naruto!) and sued Slater himself for falsely claiming the copyright. While we agree that Slater doesn’t hold the copyright, neither does the monkey, because no one holds the copyright.
- Amazingly, PETA, claiming to represent the interests of an Indonesian monkey, somehow secured the services of a really big name law firm, Irell & Manella, whose name should always be associated with the fact that it took this insane case. Irell & Manella (again, somehow, this is considered a respected law firm) took the nutty position that there must be a copyright in the image, and thus the monkey deserves to get it. It completely ignores the fact that not everything gets a copyright. It’s as if the lawyers at Irell & Manella don’t even understand how copyright law works.
=> ↺ Sony Hack Results in Lawsuit Over Failure to Prevent Movie Piracy
- Movie distributors obviously don’t like piracy, but a new lawsuit raises the question of whether they have any obligation to curtail it.
- On Wednesday, Sony Pictures was hit with a complaint in Florida federal court by Possibility Pictures, the producer of To Write Love on Her Arms, starring Kat Dennings and Rupert Friend. The film, which had Justin Bieber’s mother Pattie Malette serving as an executive producer to help out with marketing, was based on a true story about the treatment of a teenager suffering from depression and addiction and the launch of a non-profit to help others similarly afflicted.
=> ↺ Irony: Sony Pictures Sued For Failing To Stop Piracy
- For many years now, the MPAA and the various studios that make it up have filed various lawsuits against various internet platforms for not waving a magic wand and making piracy disappear. This also appears to be their big complaint against Google, which has bent over backwards trying to appease the industry and it’s still not enough (of course, that may be because what the industry really wants from Google is money, not stopping piracy). But now the shoe is somewhat on the other foot as Sony Pictures is being sued for failing to stop piracy. Really.
- The case stems from the infamous Sony hack from a year and a half ago, where all of Sony Pictures’ emails were released onto the internet. Possibility Pictures is suing Sony claiming the hack created a breach of contract in its failure to stop piracy of its film, To Write Love On Her Arms (TWLOHA), a 2012 movie starring Kat Dennings, based on the true story of the struggles a woman went through leading to the founding of her charity (which goes by the same name as the movie). While most people focus on the emails from the hack, it should be noted that before those emails were released, the hackers released some pre-release films… including TWLOHA. And that, Possibility claims, is a breach of Sony’s contract.
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages. Permalink Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
Proxy Information
- Original URL
- gemini://gemini.techrights.org/2016/07/30/sysadmin-day
- Status Code
- Success (20)
- Meta
text/gemini;lang=en-GB
- Capsule Response Time
- 383.293857 milliseconds
- Gemini-to-HTML Time
- 38.621312 milliseconds
This content has been proxied by September (ba2dc).