Language Selection

English French German Italian Portuguese Spanish

Brave Browser on Chromebook, Firefox 73 on POWER and Privacy/VPN Leftovers

Filed under
Web
  • Can I install the Brave Browser on my Chromebook?

    If you’re using a Chromebook, chances are high that you’re perfectly comfortable using the Chrome browser as your default portal to the internet. However, as the Chrome OS ecosystem continues to expand, more and more users are moving to the platform and some of them may want other options. Because of the nature of Chrome OS, you’re out of luck if you want to install a secondary browser directly onto the main operating system. Thankfully, there are curious people out there that like to ask me questions that lead me to figure out new and inventive ways to do cool stuff on Chrome OS.

    [...]

    Built to block ads and trackers, Brave boasts that their browser can attain speeds twice that of Chrome. Where Brave differs from many other ad-blocking platforms is that it was designed to create an alternative traditional to advertising platforms by offering publishers and users a way to be part of a privacy-respecting revenue sharing program. When you browse the site of a verified Brave Publisher, they benefit by receiving BAT (Basic Attention Tokens). Users are also rewarded with BAT when they allow a limited number of ads to display on sites they browse. I’ll save you the long, drawn-out argument about the pros and cons of this type of advertising model. If you want to learn more about Brave and the Basic Attention Token at the foundation of its revenue, you can do so here.

  • The Talospace Project: Firefox 73 on POWER

    ...seems to just work. New in this release is better dev tools and additional CSS features. This release includes the fix for certain extensions that regressed in Fx71, and so far seems to be working fine on this Talos II. The debug and optimized mozconfigs I'm using are, as before, unchanged from Firefox 67.

  • Security Still the Top Concern as Privacy Regs Loom

    Enforcement of CCPA doesn’t begin until July, which gives some time for American companies who do business with Californians to come into compliance. But other states are expected to follow in California’s footsteps and craft data privacy regulations that are similar to CCPA (which itself is similar to GDPR).

    HelpSystems is also tracking how those new data privacy requirements translate into new requirements for IBM i tools and technology. “We’ve also seen a lot of request for data encryption at rest, and data encryption for data that’s in flight,” Huntington says.

    Ian Jarman, the former IBM i product offering manager who now heads up IBM Lab Services, is keeping an eye on the evolving compliance landscape, in particular the “dramatic rise” in the number of the regulations.

    “The thing that is beginning to change is consumer privacy,” Jarman says. “The GPDR, the [data protection] regulations in Europe, these are being replicated, or similar types of regulations are coming in Latin America, in California, and I think you will continue to see that rise.”

  • OpenVPN vs WireGuard: The Best VPN Protocol

    Before I begin, I want to give a brief overview of the development history and business model of both the VPN protocols. As most of us know, OpenVPN is among the oldest VPN protocols which was first released in 2001. It’s an open-source VPN protocol and run by the OpenVPN project. Having said that, OpenVPN is not free to use either for personal or commercial users so keep that in mind. Nevertheless, you can use the OpenVPN Community Edition for free, but with very limited features.

More in Tux Machines

today's leftovers

  • Avita Essential: Perfect Laptop for School and College Students at Rs. 17,990

    Starting with the basics, this is a thin and light notebook. The processor inside powering Avita Essential is the Intel Celeron N4000 which is not a powerful processor for windows but perfect for Ubuntu or ChromeOS. There is 4GB of LPDDR4 inside which again is not good enough for Windows but perfect for Ubuntu and ChromeOS. For storage Avita Essential has 128GB SSD. Fast storage means faster boot time but again we would highly recommend using Ubuntu or ChromeOS on this machine.

  •  
  • Buttered-Up Fedora | LINUX Unplugged 377

    Fedora 33 is a bold release, and we’ve put it through the wringer. We tell you what’s great, and what you should know before diving in. Plus our thoughts on the bigger problem exposed by the youtube-dl takedown.

  •   
  • mintCast 346.5 – The Midori Story – mintCast

    In our Innards section, we talk lesser known browsers And finally, the feedback and a couple of suggestions

  • AMDGPU Linux Driver To Finally Enable BACO For Hawaii - Allowing S4/Hibernation - Phoronix

    The Radeon R9 290 "Hawaii" series are about seven years old almost to the day and the AMD Linux open-source driver crew is seemingly celebrating by finally adding the few lines of code needed to enable BACO power management. [...] The patch posted on Tuesday amounts to just a few lines of code for wiring up Hawaii to the AMDGPU driver's BACO support. It's just a few lines of code now but it's only been more recently that AMDGPU began squaring away its BACO support. Thus back in the early days of Hawaii it wasn't as trivial to provide this support albeit for end-users still a pity it took so long for allowing these GPUs to support S4/hibernation.

  • Noah Meyerhans | Debian STS: Short Term Support

    In another of my frequent late-night bouts with insomnia, I started thinking about the intersection of a number of different issues facing Debian today, both from a user point of view and a developer point of view. Debian has a reputation for shipping “stale” software. Versions in the stable branch are often significantly behind the latest development upstream. Debian’s policy here has been that this is fine, our goal is to ship something stable, not something bleeding edge. Unofficially, our response to users is: If you need bleeding edge software, Debian may not be for you. Officially, we have no response to users who want fresher software. Debian also has a problem with a lack of manpower. I believe that part of why we have a hard time attracting contributors is our reputation for stale software. It might be worth it for us to consider changes to our approach to releases.

  • Getting Real About the License Complexity of Linux [Ed: Proprietary software licensing is not complex? Ask BSA.]

    Talk about complex and tedious, but necessary. Identifying all copyright holders, licenses and license obligations within Linux is just that. Added to the already complex maze that is Linux is the fact that the accuracy of licensing information is tied to the specific version of the Linux Kernel you’re using, and older versions will have more issues than newer. Files may contain erroneous license data and subsequently make its way into your software inventory and Bill of Materials.

  • Impact of OSS and OSH – a stakeholder survey

    With this survey, the study coordinators are interested in complementing the literature, database and case study driven approach to assess impact of OSS and OSH with input from the respondents of the stakeholder survey. All together, this body of evidence will be used to derive policy recommendations.

  • How Hall County is handling influx of absentee voting, effects of ransomware attack on elections office

    One of the databases the county uses to verify voter signatures on absentee ballots is not working after some county network outages due to a ransomware attack on Oct. 7. Registration Coordinator Kay Wimpye with the county elections office said employees can still verify voter signatures by manually pulling hard copies of voter registration cards, which is more time-consuming. Most voter signatures can be verified using a state database that has been unaffected by the outages, she said.

  • Vastaamo board fires CEO, says he kept data breach secret for year and a half

    On Monday the board said that an internal probe had determined that a second breach had occurred in March 2019. It appears that at that point Tapio was aware of the breaches and of shortcomings in the psychotherapy provider’s data security systems.

IBM/Red Hat Leftovers

  • Secure your Kubernetes secrets with smart cards and libssh

    In computer security, software implementations of cryptographic algorithms are vulnerable to side-channel attacks. This type of attack seeks to glean information from the computer system rather than from the program that it is running. As examples, Spectre and Meltdown are both side-channel attacks that target the microarchitecture of modern processors. Microarchitecture attacks are only a subset of all side-channel attacks. There are many others. An attacker who is able to access unauthorized regions in memory can discover private or sensitive information, including authentication secrets. A question that naturally follows is, “Where can I safely store my secrets?” One way to protect your Kubernetes or Red Hat OpenShift secrets is to store them in a hardware token. A hardware token physically separates your secret key from the host machine and the applications that it is running. You can use secret keys stored on smart cards or cryptographic tokens to authenticate to server-side applications. This article introduces Public Key Cryptography Standard #11 (PKCS #11), which you can use to uniquely identify objects stored in tokens. I show you how to build and use libssh with support for PKCS #11 and how to use curl to store and retrieve tokens through the secure shell (SSH) protocol.

  • IBM Advance Toolchain for Linux on Power 14.0-1 released!

    A new update release for the 14.0 series of the IBM® Advance Toolchain for Linux on Power is now available.

  • China Mobile Communications Corporation Internet, China National Offshore Oil Corporation and GREE Group Named Winners of the Red Hat APAC Innovation Awards 2020 for China

    Red Hat, Inc., the world's leading provider of open source solutions, today announced the winners of the Red Hat APAC Innovation Awards 2020 for China. China Mobile Communications Corporation Internet, China National Offshore Oil Corporation and GREE Group were honored at the Red Hat Forum China 2020 today for their exceptional and innovative use of Red Hat solutions.

Programming Leftovers

  • PyTorch 1.7.0 Now Available - Exxact

    PyTorch is a widely used, open source deep learning platform used for easily writing neural network layers in Python enabling a seamless workflow from research to production. Based on Torch, PyTorch has become a powerful machine learning framework favored by esteemed researchers around the world. The newest stable release of PyTorch, version 1.7.0, has a number of new highlights including  CUDA 11, New APIs for FFTs, Windows support for Distributed training and more.

  • Stefan Scherfke: Raise … from … in Python
  • PyCoder’s Weekly: Issue #444 (Oct. 27, 2020)
  •   
  • Program in Arm6 assembly language on a Raspberry Pi | Opensource.com

    Assembly language offers special insights into how machines work and how they can be programmed.

  • How JavaScript became a serious programming language

    JavaScript's humble start began in 1995, when it was created in just 10 days by Brendan Eich, then an employee with Netscape Communications Corporation. JavaScript has come a long way since then, from a tool to make websites pretty to a serious programming language. In its early days, JavaScript was considered a visual tool that made websites a little more fun and attractive. Languages like Jakarta Server Pages (JSP; formerly JavaServer Pages) used to do all the heavy lifting on rendered web pages, and JavaScript was used to create basic interactions, visual enhancements, and animations. For a long time, the demarcations between HTML, CSS, and JavaScript were not clear. Frontend development primarily consists of HTML, CSS, and JavaScript, forming a "layer cake" of standard web technologies.

Making Linux More Like Windows

  • Collabora's Work On Extending The Linux Kernel To Better Support Windows Gaming - Phoronix

    Windows gaming on Linux got some love this week at the Linux Foundation's Open-Source Summit Europe virtual event. In particular, a recap of the work that's been done so far on extending the Linux kernel to better support Wine / Steam Play based support for Windows games running on Linux.  Gabriel Krisman Bertazi as an engineer for consulting firm Collabora talked about their work in recent years on improving the Linux kernel for supporting Valve's needs around running Windows games on Linux with Steam Play. Collabora has been one of Valve's partners for this effort along with CodeWeavers and Valve employing various developers on improving the Linux graphics stack, etc. 

  • Collabora expect their Linux Kernel work for Windows game emulation in Kernel 5.11

    Collabora have been doing presentations during the Open Source Summit, with one particular talk from Gabriel Krisman Bertazi on the "State of Linux Gaming" being quite interesting. While there has been a lot of progress with the Windows compatibility layers Wine and Valve's fork Proton (part of Steam Play), there's still plenty of areas currently lacking and needing work. Collabora is one company extending the Linux Kernel to improve Linux gaming with these compatibility layers, thanks to Valve sponsoring the work. One of the big missing pieces of the pie is supporting the likes of anti-cheat and DRM, with anti-cheat especially causing all sorts of problems entirely breaking lots of Windows games in Wine and Proton. The State of Linux Gaming talk was mostly going over what anyone following would already know, as the event isn't aimed at your typical Linux gaming enthusiast. However, it was still an interesting talk to follow. Thanks to The Linux Foundation, I was able to attend and listen to the talk (the online event requires a ticket purchase) but I've been told by my Collabora contact that they will all eventually be up on their own YouTube Channel which could be as soon as early next week for anyone to be able to view. If you want a brief overview, you can find the slides here from the event schedule. One of the key points that Gabriel Krisman Bertazi went over is their work on system call emulation, which is now required because DRM and anti-cheat tech "are issuing system calls directly from the Windows game code and that bypasses Wine because Wine is not a sandbox" and Wine currently cannot capture those system calls needed which ends up causing games to crash.