Language Selection

English French German Italian Portuguese Spanish

January 2018

today's leftovers

Filed under
Misc
  • Open Source Security Podcast: Episode 80 - GPS tracking and jamming
  • How to add a repository on your Linux machine
  • Modify SVG using GSVGtk: First Repor

    GSVGtk is a library to provide GTK+ widgets you can use to access SVG files. It is powered by GSVG, in a way it can access each shape and its properties using a GObject API based on W3C SVG 1.1 specification.

    Currently, GSVGtk uses Clutter to encapsulate SVG shapes, render them inside Clutter Actors, through librsvg, and maps events to source SVG in order to eventually modify original definitions, like its position.

    In the following video, you can see GSVGtk’s Container based on Clutter, loading an SVG file, take some shapes from it to show on the scene.

  • logo.png for default avatar for GitLab repos

    I added a logo.png to GNOME Tweaks at GNOME and it automatically showed up in Salsa when I imported the new version.

  • What’s New in Peppermint OS 8 Respin

    Peppermint OS 8 respin is the latest release of Peppermint OS Linux Distribution. This release based on Ubuntu 16.04 LTS (Xenial Xerus), powered by linux kernel 4.10 series, using LXDE desktop environment with new “Pepirus” xfwm4, GTK+ and icon themes. Also, brings 64 bit and 32 bit installation images. The 64 bit release provides complete support for UEFI systems and secure boot.

  • Imagine the world's biggest Kanban / Scrumboard

    Imagine a Kanban board that could aggregate issues from multiple backends, including your CalDAV task list, Bugzilla systems (Fedora, Mozilla, GNOME communities), Github issue lists and the Debian Bug Tracking System, visualize them together and coordinate your upstream fixes and packaging fixes in a single sprint.

    [...]

    If you'd like to see this or any of the other proposed projects go ahead, you don't need to be a Debian Developer to suggest ideas, refer a student or be a co-mentor. Many of our projects have relevance in multiple communities. Feel free to get in touch with us through the debian-outreach mailing list.

The Linux Foundation is Growing

Filed under
Linux
  • Linux Foundation fights fragmentation with network umbrella

    Open source platforms are becoming more and more fundamental to the new telecoms network architecture, raising exciting prospects for a more democratic ecosystem and rapid innovation. But open source also comes with the risk of fragmentation, which has already been seen in industry splits over different approaches to management and orchestration (MANO) in virtualized networks. A large number of open projects has emerged in the areas of virtualization, software-defined networking (SDN), MANO and even telecoms hardware initiatives like Facebook’s OpenCellular.

  • The Linux Foundation Announces 30 New Silver Members

    The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced the addition of 30 Silver members. Linux Foundation members help support development of the greatest shared technology resources in history, while accelerating their own innovation through open source leadership and participation.

Red Hat and Fedora Leftovers

Server: Microservices, Replika, STORK, OpenStack

OSS Leftovers

Filed under
OSS
  • India's RJio Plots Open Source Disruption

    Owned by Indian billionaire Mukesh Ambani, the telco believes that it is high time India developed products and services tailored specifically to the Indian market. "If you observe, a lot of effort has been put into the IT space [in India], but what has not happened is a focused effort [for innovation] in the telecom space," says Matthew Oommen, RJio's president of networks, global strategy and service development, on the sidelines of India's recent Digital Open Summit.

  • Open Source Initiative Turns 20

    The Open Source Initiative (OSI) will celebrate its 20th anniversary on Friday, Feb. 2, and the global non-profit organization dedicated to raising awareness and adoption of open source software is gonna par-tay. By which I mean, the OSI has scheduled activities around the world this year to commemorate the event. (I'm hoping there will be snacks.)

  • Swatantra17

    Last month Thiruvananthapuram witnessed one of the biggest Free and Open Source Software conference called Swatantra17. Swatantra is a flagship triennial ( actually used to be triennial, but from now on organizers decided to conduct in every 2 years.) FOSS conference from ICFOSS. This year there were more than 30 speakers from all around the world. The event held from 20-21 December at Mascot hotel, Thiruvananthapuram. I was one of the community volunteer for the event and was excited from the day it announced Smile .

  • DO or UNDO - there is no VACUUM

    To put this another way, it is in general true that PostgreSQL’s VACUUM implementation has gotten progressively better at reclaiming space occupied by dead tuples more quickly and with less expenditure of effort. And that’s really good, because the faster you reclaim space, the less new space you end up allocating, which keeps tables small and performance high. However, the examples above show that VACUUM isn’t the whole problem. In these examples, even if VACUUM ran at the earliest instant when it could reclaim the space occupied by dead tuples and ran infinitely fast, the table would still become bloated. In the case where the bloat is caused by many short queries run while one long-running transaction remains open, we could, with smarter snapshot management, limit the worst-case bloat to approximately a factor of two -- that is, we’d keep the version of the tuple visible to the old snapshot and the current version, and discard the intermediate versions, a trick PostgreSQL currently can’t manage. However, even a factor of two is a lot, and what if there are multiple distinct open snapshots?  Further, in the case where the bloat is created by a SQL statement that induces scattered updates throughout the table, no improvement to VACUUM can possibly help. By the time that SQL statement finishes, the damage is already done.

  • Scratch group projects – 2018

    Once again, it’s time for this year’s Scratch projects from my grade 10 students. Up next is python, but their final projects are available at https://scratch.lesbg.com. Feel free to play them and rate them. This is a first attempt for students, so do please be gentle on the ratings.

  • Why Create a New Unix Shell?

FSF and GNU Debugger (GDB) 8.1

Filed under
GNU
  • Free Software Foundation was gifted 91 bitcoin

    The Free Software Foundation, has announced that it received its largest donation ever, 91.45 bitcoin from an anonymous entity called Pineapple Fund. The 91.45 bitcoin, at the time of payment, was roughly equal to $1 million. The Free Software Foundation is an organisation that promotes the concept of free software, which is defined by the ‘four essential freedoms’.

  • GDB 8.1 released!

    Release 8.1 of GDB, the GNU Debugger, is now available via anonymous FTP.  GDB is a source-level debugger for Ada, C, C++, Objective-C, Pascal and many other languages.  GDB can target (i.e., debug programs running on) more than a dozen different processor architectures, and GDB itself can run on most popular GNU/Linux, Unix and Microsoft Windows variants.

  • GDB 8.1 Debugger Brings Better Rust Support, Improved Python Scripting

    Version 8.1 of the GNU Debugger (GDB) is now available for developers.

    The GDB 8.1 debugger update brings Python scripting enhancements, improved Rust language support, breakpoints on C++ functions are now set on all scopes by default, a number of new commands have been added, the GDBserver has received a few enhancements, there is better auto-completion support for this debugger, and a variety of other improvements to help developers debug their code in a variety of languages.

  • GDB 8.1 released

    Version 8.1 of the GDB debugger is out. Changes include better support for the Rust language and various other improvements to make debugging easier; see the announcement and the news file for the full list.

Security: Updates, Google, Hacking Team, Microsoft-NSA, Django

Filed under
Security
  • Security updates for Wednesday
  • How Did Google Wipe Out 700,000 Malicious Android Apps From Play Store? Using Artificial Intelligence
  • Hacking Team Is Still Alive Thanks to a Mysterious Investor From Saudi Arabia

    The 2015 breach of spyware vendor Hacking Team seemed like it should have ended the company. Hacking Team was thoroughly owned, with its once-secret list of customers, internal emails, and spyware source code leaked online for anyone to see. But nearly three years later, the company trudges on, in large part thanks to a cash influx in 2016 from a mysterious investor who had been publicly unknown until now.

    The hack hurt the company’s reputation and bottom line: Hacking Team lost customers, was struggling to make new ones, and several key employees left. Three years later—after the appearance of this new investor—the company appears to have stopped the bleeding. The company registered around $1 million in losses in 2015, but bounced back with around $600,000 in profits in 2016.

    Motherboard has learned that this apparent recovery is in part thanks to the new investor, who appears to be from Saudi Arabia—and whose lawyer’s name matches that of a prominent Saudi attorney who regularly works for the Saudi Arabian government and facilitates deals between the government and international companies.

  • NSA exploit EternalBlue is back and powering WannaMine cryptojacking malware

    SAY HELLO to WannaMine, the cryptojacking malware that's using leaked NSA hacking tools to infiltrate computers and syphon processor power to crunch calculations needed to 'mine; cryptocurrencies.

    But first a history lesson. You may remember the EternalBlue, a Windows exploit developed by the NSA that was leaked by hacking group Shadow Brokers.

    Pretty soon after the exploit was used to launch the massive WannaCry ransomware attack that locked down NHS systems and affected some 230,000 computers across 150 countries. EternalBlue was then used to spearhead the arguably more dangerous NotPetya attacks.

  • Johnny Hacker hauls out NSA-crafted Server Message Block exploits, revamps 'em

    EternalBlue, EternalSynergy, EternalRomance and EternalChampion formed part of the arsenal of NSA-developed hacking tools that were leaked by the Shadow Brokers group before they were used (in part) to mount the devastating NotPetya cyber attack.

    [...]

    "After that, the exploit module will drop to disk (or use a PowerShell command), explains zerosum0x0, and then copy directly to the hard drive."

  • 10 tips for making the Django Admin more secure

    Offloading the responsibility for making your app secure onto QA testers or an information security office is tempting, but security is everyone's responsibility. The Django Admin is one of our favorite features of Django, but unless it's locked down correctly, it presents opportunities for exploitation. To save your users from compromised data, here are 10 tips to make the Django Admin more secure.

11 Myths About the RISC-V ISA

Filed under
Hardware
OSS

Despite its rich ecosystem and growing number of real-world implementations, misconceptions about RISC-V are keeping companies around the world from fully realizing its benefits.

Read more

Mozilla: Rust, Privacy and More

Filed under
Moz/FF
  • Where’s Rust headed in 2018? Ask the community.

    2017 was a big year for the Rust systems programming language. Now, members of the open source project are looking to consolidate last year’s progress – making Rust easier to learn and use – and publish the first major update to the stable 2015 Rust release.

    “We’re making Rust a much nicer place to be,” said Aaron Turon, a Rust core team member and engineering manager at Mozilla. “We’re working to create a more productive environment for programmers – especially those new to the language.”

  • The 2018 Rust Event Lineup

    Every year there are multiple Rust events around the world, bringing together the community. Despite being early in the year, we’re excited to be able to highlight several events that are already being organized!

  • This Week in Rust 219

    Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: safety, concurrency, and speed. This is a weekly summary of its progress and community. Want something mentioned? Tweet us at @ThisWeekInRust or send us a pull request. Want to get involved? We love contributions.

  • Retrospective: Looking Glass

    In December, we launched a tv show tie-in with Mr. Robot, Looking Glass, that alarmed some people because we didn’t think hard enough about the implications of shipping an add on that had the potential to be both confusing and upsetting. We’re deeply sorry for this and we understand why it’s important for us to learn and grow from this experience. As mentioned last month, we conducted a post-mortem to better understand how and why this happened and how we can do better.

  • Mozilla Reps Community: Rep of the Month – December 2017
  • Mozilla Security Blog: Preventing data leaks by stripping path information in HTTP Referrers

    To help prevent third party data leakage while browsing privately, Firefox Private Browsing Mode will remove path information from referrers sent to third parties starting in Firefox 59.

More in Tux Machines

Apache Rya matures open source triple store database

The open source Apache Rya database effort is continuing to move forward as it reaches a new level of project maturity and acceptance. Rya (pronounced "ree-uh") is an RDF (resource description framework) triple store database. The project started at the U.S. government's Laboratory for Telecommunication Sciences with an initial research paper published in 2012. The project joined the Apache Software Foundation (ASF) in 2015 as an incubated project, and in September 2019 achieved what is known as Top-Level Project status. The Top-Level status is an indication and validation of the project's maturity, code quality and community. The ASF is home to Hadoop, Spark and other widely used database and data management programs. Read more Also: Yahoo Groups is being prepared for shutdown, with all stored archives to be deleted on Dec 14

The Spectre Mitigation Impact For Intel Ice Lake With Core i7-1065G7

For those wondering if -- or how much -- of a performance impact mitigations still make regarding Spectre for Intel's long-awaited 10nm+ Ice Lake processors, here is the rundown on the mitigation state and the performance impact. One of the areas that Phoronix readers have requested testing on with the recent purchase of the Dell XPS 7390 with Core i7 1065G7 is regarding the mitigation state and performance. Ice Lake with its Sunny Cove microarchitecture -- similar to Cascade Lake -- is no longer affected by Meltdown, MDS, or L1TF / Foreshadow. Read more

Networking SBCs run Linux on quad -A53 and -A72 NXP LS chips

Forlinx’s sandwich-style OK1043A-C and OK1046A SBCs run Linux on NXP’s quad -A53 LS1043A and quad -A72 LS1046A SoCs, respectively, and offer a 10GbE port and up to 6x GbE ports with optional SFP. Forlinx has posted product pages for two similar COM Express modules and carrier boards that run Linux on NXP’s networking focused LS series processors. The FET1043A-C module taps the up to 1.6GHz, quad-core, Cortex-A53 LS1043A while the FET1046A-C uses the up to 1.8GHz, quad-core, Cortex-A72 LS1046A. All the processors are headless — without GPUs. Read more

Security: WireGuard, Birds and Updates

  • WireGuard Restored In Android's Google Play Store After Brief But Controversial Removal

    After Google dropped the open-source WireGuard app from their Play Store since it contained a donation link, the app has now been restored within Google's software store for Android users but without the donation option. The WireGuard app for Android makes it easy to setup the secure VPN tunnel software on mobile devices, similar to its port to iOS and other platforms. The WireGuard apps are free but have included a donation link to the WireGuard website should anyone wish to optionally make a donation to support the development of this very promising network tech.

  • Letting Birds scooters fly free

    At that point I had everything I need to write a simple app to unlock the scooters, and it worked! For about 2 minutes, at which point the network would notice that the scooter was unlocked when it should be locked and sent a lock command to force disable the scooter again. Ah well. So, what else could I do? The next thing I tried was just modifying some STM firmware and flashing it onto a board. It still booted, indicating that there was no sort of verified boot process. Remember what I mentioned about the throttle being hooked through the STM32's analogue to digital converters[3]? A bit of hacking later and I had a board that would appear to work normally, but about a minute after starting the ride would cut the throttle. Alternative options are left as an exercise for the reader. Finally, there was the component I hadn't really looked at yet. The Quectel modem actually contains its own application processor that runs Linux, making it significantly more powerful than any of the chips actually running the scooter application[4]. The STM communicates with the modem over serial, sending it an AT command asking it to make an SSL connection to a remote endpoint. It then uses further AT commands to send data over this SSL connection, allowing it to talk to the internet without having any sort of IP stack. Figuring out just what was going over this connection was made slightly difficult by virtue of all the debug functionality having been ripped out of the STM's firmware, so in the end I took a more brute force approach - I identified the address of the function that sends data to the modem, hooked up OpenOCD to the SWD pins on the STM, ran OpenOCD's gdb stub, attached gdb, set a breakpoint for that function and then dumped the arguments being passed to that function. A couple of minutes later and I had a full transaction between the scooter and the remote. The scooter authenticates against the remote endpoint by sending its serial number and IMEI. You need to send both, but the IMEI didn't seem to need to be associated with the serial number at all. New connections seemed to take precedence over existing connections, so it would be simple to just pretend to be every scooter and hijack all the connections, resulting in scooter unlock commands being sent to you rather than to the scooter or allowing someone to send fake GPS data and make it impossible for users to find scooters.

  • Security updates for Friday

    Security updates have been issued by Debian (poppler, sudo, and wordpress), Oracle (java-1.8.0-openjdk), Red Hat (java-1.8.0-openjdk), Scientific Linux (java-1.8.0-openjdk, java-11-openjdk, and kernel), and SUSE (kernel and postgresql10).