Thanks for the heads up.
Freemor at 2016-11-04T10:17:43Z
@Alex Jordan I used el-get and the package system for a long time, but there are a few reasons why I prefer to use Guix. For one thing, I'm not sure what the security situation of ELPA is; are there checksums, etc? I don't know. I know what Guix's situation is.
I've also had upgrades with emacs packages where I really wished I hadn't upgraded, and that I could roll back so I could fix up my emacs config for the new version at my leisure. That comes for free with Guix.
Kevin Everets shared this.
I've backed it!
We, the Debian project and the Tor project are enabling Tor onion services for several of our sites. These sites can now be reached without leaving the Tor network, providing a new option for securely connecting to resources provided by Debian and Tor.
The freedom to use open source software may be compromised when access to that software is monitored, logged, limited, prevented, or prohibited. As a community, we acknowledge that users should not feel that their every action is trackable or observable by others. Consequently, we are pleased to announce that we have started making several of the various web services provided by both Debian and Tor available via onion services.
While onion services can be used to conceal the network location of the machine providing the service, this is not the goal here. Instead, we employ onion services because they provide end-to-end integrity and confidentiality, and they authenticate the onion service end point.
For instance, when users connect to the onion service running at http://sejnfjrq6szgca7v.onion/, using a Tor-enabled browser such as the TorBrowser, they can be certain that their connection to the Debian website cannot be read or modified by third parties, and that the website that they are visiting is indeed the Debian website. In a sense, this is similar to what using HTTPS provides. However, crucially, onion services do not rely on third-party certification authorities (CAs). Instead, the onion service name cryptographically authenticates its cryptographic key.
In addition to the Tor and Debian websites, the Debian FTP and the Debian
Security archives are available from .onion addresses, enabling
Debian users to update their systems using only Tor connections. With the
apt-transport-tor package installed, the following entries can replace
the normal debian mirror entries in the apt configuration file (
deb tor+http://vwakviie2ienjx6t.onion/debian jessie main deb tor+http://vwakviie2ienjx6t.onion/debian jessie-updates main deb tor+http://sgvtcaew4bxjd7ln.onion/debian-security jessie/updates main
Likewise, Tor's Debian package repository is available from an onion service :
deb tor+http://sdscoq7snqtznauu.onion/torproject.org jessie main
Lists of several other new onion services offered by Debian and Tor are available from https://onion.debian.org and https://onion.torproject.org respectively. We expect to expand these lists in the near future to cover even more of Debian's and Tor's services.
I'm going to quibble on one point. Securing the back-end is one thing. As to the front-end, we disarm ourselves pretty easily by not registering voters properly or striking down voter ID laws. If we have no way to authenticate who presents themselves to vote at a single precinct, making sure things are fine on the back-end kinda doesn't matter. As a former precinct elections official, these quite insane judicial rulings over the past few days striking down photo ID have been hilarious as they tear down any hope of security on the front-end in terms of ensuring that one qualified and eligible person gets one vote in the correct precinct. As to the inability to gain photo ID due to the lack of required underlying documents being touted as the reason for voiding these laws...how are these people surviving in a society that requires positive photo ID for an awfully large number of transactions beyond just voting these days?
@email@example.com I think you have been misled. AFAIK there are no generic legal requirements to possess or carry a photo ID in the U.S. in any state. (Practically speaking it would make many things difficult if you didn't have one at all, but that's a separate issue.)
In California, I know some cities require you carry ID if you're driving a car or (more notably) riding a bicycle on a public road. If there were a generic "must-carry-ID" state statute, the city statute would probably not exist, because it would be pointless.
Sarah Elkins likes this.
How do physicists know the age of the universe? Independent data samples taken over decades all tell a consistent story when the known laws of physics are applied: the way that distant objects all recede from our vantage point, the properties of the low-energy microwaves that arrive at Earth from all different directions, the relative abundance of light atomic elements in the observable cosmos, and many others all tell the same story: the universe is 13.799 billion years old, and because we're responsible scientists who quantify the limits of our knowledge, we assign an uncertainty to that number based on the way we interpret the data and the physical constraints on our measurements: a measly 0.021 billion years (just a 1.5% uncertainty).
This age is arrived at by assuming a universe of space and time containing radiation (e.g. light), two kinds of matter ("baryonic" - the stuff you and me and Earth and stars are made from - and "dark" - the unseen matter that shapes the large scale structure of the cosmos), and an inherent energy density in the cosmos. If any of those assumptions were wrong, then modern medicine, chemistry, and engineering would have been impossible and would have never happened. The fact that you can have an MRI or PET scan, or that you can create new life-saving drugs to kill the nastiest cancers, or that the GPS satellite system could be engineered at all, is entirely tied to the same laws that underpin our understanding of the age of the universe. There is no modern world without an ancient cosmos.
Alternative scientific explanations for the observations of the cosmos exist, but have failed to explain or predict all observations, making them weak and discreditied ideas. Non-scientific explanations for the cosmos, including purely philosophical or religious explanations, have all also failed to predict all of these observations before they were made and are often unfalsifiable or even completely untestable, making them unscientific, outside the natural world, and thus useless for making independent and reliable judgements about the content of the universe.
Image by the NASA/WMAP Science Team - Original version: NASA (http://map.gsfc.nasa.gov/media/060915/index.html ); modified by Ryan Kaldari.
Learn more about the observations that yield our modern, reliable, and reproducible understanding of the age of the universe from these sources:
John Hume likes this.
Kevin Everets shared this.
Douglas Perkins likes this.
Huh. Crowdfunded Libre Hardware Design'ed laptop/computer. Apparently low power.
Offering refund if RYF certification doesn't happen, which is interesting!
Copyleft has faced serious challenges in the last five years. It's not over: many more threats are on the way. Not by coincidence these attacks on copyleft come when "open source" reaches new heights of success. For example, hordes of software developers are funded full time to churn out new free software, as long as it's not copylefted. Some such code is specifically designed to replace existing, widely used, copylefted programs.
Meanwhile, programs under copyleft licenses (most notably the kernel named Linux) face a decades long, ongoing myriad of license violations. Such violations include nefarious attempts by major companies to shirk their responsibilities under copyleft. The situation is undoubtedly bleak.
Those of us who care about software freedom need a plan. Copyleft once assured an equal playing field, but big companies work daily to tilt the playing field in their favor and against the interests of most developers, hobbyists, users, and enthusiasts.
I like how Bradley says whether something is true doesn’t really matter because if everyone believes it, they’re going to act accordingly.
PS—I also like his suggestion for professional programmers: negotiating copyright during an interview.
PPS—Here’s a union that I asked to help with copyright. I’m a member, and I welcome everyone to join.
2016-06-23T02:46:41Z via AndStatus To: Public
Now come on.. How are they supposed to track who clicks what if ya use your own shortener? I'm sure in their view using an independent shortener is 'malicious' to their metrics which in turn is malicious to their bottom line. And I won't even start on how you're blowing their whole SEO dreams.
Interesting that this news comes on the day I decided not to follow any twitter pointing links. Tired of it not working unless I turn on cookies and JS just to see some pointless 140 char thing. Got better ways to waste my life thank-you.
firstname.lastname@example.org likes this.