Doornroosje : Sleeping Beauty / la Belle au bois dormant / Dornröschen / la bella addormentata nel bosco
Sprookjesprins; de prins op het witte paard : Prince Charming / le Prince Charmant / der Märchenprinz; der Prinz auf dem weißen Pferd / il principe azzurro
Sneeuwwitje en de zeven dwergen : Snow White and the Seven Dwarfs / Blanche-Neige et les sept nains / Schneewittchen und die sieben Zwerge / Biancaneve e i sette nani
Roodkapje : Little Red Riding Hood / le Petit Chaperon rouge / Rotkäppchen / Cappuccetto rosso
de boze wolf : the big bad wolf / le grand méchant loup / der böse Wolf / il grosso lupo cattivo; il grande lupo cattivo
de drie biggetjes : the three little pigs / les trois petits cochons / die drei (kleinen) Schweinchen / i tre porcellini
Klaas Vaak; het Zandmannetje : the Sandman / le marchand de sable / der Sandmann / l'omino del sonno; l'omino dei sogni; l'omino della sabbia; il mago sabbiolino
de goede fee : the fairy godmother / la bonne fée; la fée marraine / die gute Fee; die Märchenfee / la fata madrina
de boze heks : the wicked witch / la méchante sorcière / die böse Hexe / la strega cattiva; la strega malvagia
Klein Duimpje : Tom Thumb / le Petit Poucet / der kleine Däumling / Pollicino
🎄 1) Assepoester, Anton Pieck / 2) Hans en Grietje, Anton Pieck / 3) Pinokkio, Attilio Mussino / 4) De Gelaarsde Kat, Rie Cramer / 5) Raponsje, Marius de Schaar / 6) Doornroosje, Anton Pieck / 7) Sprookjesprins; De prins op het witte paard, Karel Willemen / 8) Sneeuwwitje en de zeven dwergen, Anton Pieck / 9) Roodkapje, Anton Pieck / 10) De boze wolf, Anton Pieck / 11) De drie biggetjes, Guillaume Le Baube / 12) Klaas Vaak; Het Zandmannetje, Pascal Schouten / 13) De goede fee, Rie Cramer / 14) De boze Heks, Hanna Kraan / 15) Klein Duimpje, Rie Cramer 🎄
Doornroosje : Sleeping Beauty / la Belle au bois dormant / Dornröschen / la bella addormentata nel bosco
Sprookjesprins; de prins op het witte paard : Prince Charming / le Prince Charmant / der Märchenprinz; der Prinz auf dem weißen Pferd / il principe azzurro
Sneeuwwitje en de zeven dwergen : Snow White and the Seven Dwarfs / Blanche-Neige et les sept nains / Schneewittchen und die sieben Zwerge / Biancaneve e i sette nani
Roodkapje : Little Red Riding Hood / le Petit Chaperon rouge / Rotkäppchen / Cappuccetto rosso
de boze wolf : the big bad wolf / le grand méchant loup / der böse Wolf / il grosso lupo cattivo; il grande lupo cattivo
de drie biggetjes : the three little pigs / les trois petits cochons / die drei (kleinen) Schweinchen / i tre porcellini
Klaas Vaak; het Zandmannetje : the Sandman / le marchand de sable / der Sandmann / l'omino del sonno; l'omino dei sogni; l'omino della sabbia; il mago sabbiolino
de goede fee : the fairy godmother / la bonne fée; la fée marraine / die gute Fee; die Märchenfee / la fata madrina
de boze heks : the wicked witch / la méchante sorcière / die böse Hexe / la strega cattiva; la strega malvagia
Klein Duimpje : Tom Thumb / le Petit Poucet / der kleine Däumling / Pollicino
🎄 1) Assepoester, Anton Pieck / 2) Hans en Grietje, Anton Pieck / 3) Pinokkio, Attilio Mussino / 4) De Gelaarsde Kat, Rie Cramer / 5) Raponsje, Marius de Schaar / 6) Doornroosje, Anton Pieck / 7) Sprookjesprins; De prins op het witte paard, Karel Willemen / 8) Sneeuwwitje en de zeven dwergen, Anton Pieck / 9) Roodkapje, Anton Pieck / 10) De boze wolf, Anton Pieck / 11) De drie biggetjes, Guillaume Le Baube / 12) Klaas Vaak; Het Zandmannetje, Pascal Schouten / 13) De goede fee, Rie Cramer / 14) De boze Heks, Hanna Kraan / 15) Klein Duimpje, Rie Cramer 🎄
Rare exemple de maison de tradition espagnole à Mons ! la Maison espagnole remonte aux XVIe et XVIIe siècles, mais elle fut fortement restaurée au début du XXe siècle. Alors que le rez-de-chaussée compte deux baies du XVIe siècle, le premier étage et l’étage supérieur s’ouvrent sur plusieurs petites ouvertures de tailles différentes du siècle suivant. Une construction en briques y a été adjointe au XVIIe siècle. Restauré au XIXe siècle, la Maison espagnole fut rétablie par la suite dans son état primitif.
Zeldzaam voorbeeld van een huis in Bergen in traditionele Spaanse stijl ! Het Spaanse Huis dateert uit de 16e en 17e eeuw, maar werd aan het begin van de 20e eeuw gerenoveerd. Alhoewel de gelijkvloers twee ramen uit de 16e eeuw heeft, hebben de eerste verdieping en de bovenste verdieping verschillende openingen uit de volgende eeuw. Een stenen constructie werd in de 17e eeuw toegevoegd. Het Spaanse Huis werd in de 19e eeuw gerenoveerd, maar werd dan in zijn oorspronkelijke staat hersteld.
Rare example of a house in traditional Spanish style in Mons ! The Spanish House dates back to the 16th and 17th centuries, but is was renovated in the beginning of the 20th century. Although the ground floor has got two windows of the 16th century, the first floor and upper floor have got many different openings dating from the next century. A stone construction was added in the 17th century. Renovated in the 19th century, the Spanish House was then restored to its original state.
Einzigartiges Haus nach spanischer Tradition in Mons ! Das spanische Haus wurde im 16. und 17. Jahrhundert gebaut aber wurde am Anfang des 20. Jahrhundert tief restauriert. Das Erdgeschoss besteht aus zwei Glasfenstern aus dem 16. Jahrhundert während die erste und zweite Stöcke auf mehrere kleine Öffnungen verschiedener Größen aus dem 17. Jahrhundert hingehen. Ein Backsteingebäude wurde im 17. Jahrhundert hinzugefügt. Das im 19. Jahrhundert renovierte spanische Haus wurde danach in seinem ursprünglichen Zustand restauriert.
Rare exemple de maison de tradition espagnole à Mons ! la Maison espagnole remonte aux XVIe et XVIIe siècles, mais elle fut fortement restaurée au début du XXe siècle. Alors que le rez-de-chaussée compte deux baies du XVIe siècle, le premier étage et l’étage supérieur s’ouvrent sur plusieurs petites ouvertures de tailles différentes du siècle suivant. Une construction en briques y a été adjointe au XVIIe siècle. Restauré au XIXe siècle, la Maison espagnole fut rétablie par la suite dans son état primitif.
Zeldzaam voorbeeld van een huis in Bergen in traditionele Spaanse stijl ! Het Spaanse Huis dateert uit de 16e en 17e eeuw, maar werd aan het begin van de 20e eeuw gerenoveerd. Alhoewel de gelijkvloers twee ramen uit de 16e eeuw heeft, hebben de eerste verdieping en de bovenste verdieping verschillende openingen uit de volgende eeuw. Een stenen constructie werd in de 17e eeuw toegevoegd. Het Spaanse Huis werd in de 19e eeuw gerenoveerd, maar werd dan in zijn oorspronkelijke staat hersteld.
Rare example of a house in traditional Spanish style in Mons ! The Spanish House dates back to the 16th and 17th centuries, but is was renovated in the beginning of the 20th century. Although the ground floor has got two windows of the 16th century, the first floor and upper floor have got many different openings dating from the next century. A stone construction was added in the 17th century. Renovated in the 19th century, the Spanish House was then restored to its original state.
Einzigartiges Haus nach spanischer Tradition in Mons ! Das spanische Haus wurde im 16. und 17. Jahrhundert gebaut aber wurde am Anfang des 20. Jahrhundert tief restauriert. Das Erdgeschoss besteht aus zwei Glasfenstern aus dem 16. Jahrhundert während die erste und zweite Stöcke auf mehrere kleine Öffnungen verschiedener Größen aus dem 17. Jahrhundert hingehen. Ein Backsteingebäude wurde im 17. Jahrhundert hinzugefügt. Das im 19. Jahrhundert renovierte spanische Haus wurde danach in seinem ursprünglichen Zustand restauriert.
Rare exemple de maison de tradition espagnole à Mons ! la Maison espagnole remonte aux XVIe et XVIIe siècles, mais elle fut fortement restaurée au début du XXe siècle. Alors que le rez-de-chaussée compte deux baies du XVIe siècle, le premier étage et l’étage supérieur s’ouvrent sur plusieurs petites ouvertures de tailles différentes du siècle suivant. Une construction en briques y a été adjointe au XVIIe siècle. Restauré au XIXe siècle, la Maison espagnole fut rétablie par la suite dans son état primitif.
Zeldzaam voorbeeld van een huis in Bergen in traditionele Spaanse stijl ! Het Spaanse Huis dateert uit de 16e en 17e eeuw, maar werd aan het begin van de 20e eeuw gerenoveerd. Alhoewel de gelijkvloers twee ramen uit de 16e eeuw heeft, hebben de eerste verdieping en de bovenste verdieping verschillende openingen uit de volgende eeuw. Een stenen constructie werd in de 17e eeuw toegevoegd. Het Spaanse Huis werd in de 19e eeuw gerenoveerd, maar werd dan in zijn oorspronkelijke staat hersteld.
Rare example of a house in traditional Spanish style in Mons ! The Spanish House dates back to the 16th and 17th centuries, but is was renovated in the beginning of the 20th century. Although the ground floor has got two windows of the 16th century, the first floor and upper floor have got many different openings dating from the next century. A stone construction was added in the 17th century. Renovated in the 19th century, the Spanish House was then restored to its original state.
Einzigartiges Haus nach spanischer Tradition in Mons ! Das spanische Haus wurde im 16. und 17. Jahrhundert gebaut aber wurde am Anfang des 20. Jahrhundert tief restauriert. Das Erdgeschoss besteht aus zwei Glasfenstern aus dem 16. Jahrhundert während die erste und zweite Stöcke auf mehrere kleine Öffnungen verschiedener Größen aus dem 17. Jahrhundert hingehen. Ein Backsteingebäude wurde im 17. Jahrhundert hinzugefügt. Das im 19. Jahrhundert renovierte spanische Haus wurde danach in seinem ursprünglichen Zustand restauriert.
That really scary moment when one finds an entire folder of once-only #images gone and it doesn't appear in the archive either. That is, it is in the #archive, dating back about six and half years, yet it is empty, then and now.
Until one finds all files fully intact in both the live system as well as all archive snapshots dating back to that 6.5 years start of the archive. Just in a slightly different location.
Les cerisiers du Japon sont maintenant en fleurs ! De Japanse sierkersen (of de Japanse kerselaars [Begisch-Nederlands]) staan nu in bloei ! The Japanese cherry trees are in blossom now ! Die japanischen Blütenkirschen blühen im Moment so schön ! I ciliegi giapponesi sono adesso in fiore !
Les cerisiers du Japon sont maintenant en fleurs ! De Japanse sierkersen (of de Japanse kerselaars [Begisch-Nederlands]) staan nu in bloei ! The Japanese cherry trees are in blossom now ! Die japanischen Blütenkirschen blühen im Moment so schön ! I ciliegi giapponesi sono adesso in fiore !
1 traumatizer@nerdpol.chtraumatizer@nerdpol.ch Suchen Stream Meine Aktivitäten @Erwähnungen Meine Aspekte #Tags, denen du folgst Öffentliche Aktivität Lade deine Freunde ein Begrüße neue Benutzer Benötigst du Hilfe? Gibt's ein Problem? Mumble Verbinde Dienste Lesezeichen Spenden Seid nett zueinander! ♥
@nerdpol_ch Projektdiskussionen und Hilfe Was gibt’s Neues? Code 0.7.99.0 Pod-Statistiken Server-Status In den touch-optimierten Modus wechseln Betrieben mit diaspora* traumatizer@nerdpol.ch Beginne eine Unterhaltung... traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor weniger als eine Minute Fefebot Fefebot - vor etwa einer Stunde [l]Hey, wenn jetzt wegen Coronavirus keiner mehr fliegt, wieso sehen wir dann nicht substanziell weniger Flugzeuge? Die Antwort könnte die Bevölkerung verunsichern. Wenn eine Airline die zugewiesenen Slots nicht zu mindestens 80% nutzt, verliert sie sie an die Konkurrenz. Also fliegen die jetzt leer.
Das Coronavirus wird uns also nicht vor der Klimakatastrophe retten.
Airlines are burning thousands of gallons of jet fuel flying empty 'ghost' planes so they can keep... Airlines are flying completely empty planes in order to keep their flight slots during the coronavirus outbreak.
businessinsider.com 118 09:47 - 7. März 2020 Twitter Ads Info und Datenschutz 107 Nutzer sprechen darüber Öffentlich – Gefällt mir · Kommentieren traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor etwa einer Minute Herr Von Sinnen Herr Von Sinnen - vor etwa einer Stunde #NSFW | Beitrag anzeigen | Alle zeigen traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 3 Minuten Paul Ferguson Paul Ferguson - vor etwa 2 Stunden
Öffentlich – Gefällt mir · Kommentieren traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 3 Minuten Xenophrenia Xenophrenia - vor 19 Minuten JOE BIDEN IS NOT MENTALLY CAPABLE OF WINNING AGAINST TRUMP seriously people - I see some in my timeline talking about this man as if he should still be in the race
IF YOU WANT TO BEAT TRUMP WE HAVE TO DEFEAT JOE BIDEN … but the Warren crowd are still having hissy fits over fucking snake emojis
JOE BIDEN WILL LOSE TO DONALD TRUMP - HE CAN’T FUCKING SPEAK - THIS IS NOT A STUTTER
Joe Biden’s Sharp Cognitive Decline (please share, voters need to know)
Joe Biden's Sharp Cognitive Decline (please share, voters need to know) Secular Talk - YouTube Öffentlich – Gefällt mir · Kommentieren **joe
**joe - vor 12 Minuten #Incompetent enter image description here
Mehr zeigen Öffentlich – Gefällt mir · Weitersagen · Kommentieren CitizenZero CitizenZero - vor 7 Minuten It’s looking more and more every day like we’re going to be getting four more years of this psychotic fascist. I’m not sure I want to live in this country any longer…
traumatizer@nerdpol.ch Kommentieren werner wichtig
werner wichtig - vor 18 Minuten rottostein@diasp.eu rottostein@diasp.eu - vor etwa einer Stunde
8 Simple Rocket Stoves - How to Make Simple Camping & Survival Stoves Outdoor Boys - YouTube Öffentlich – Gefällt mir · Weitersagen · Kommentieren werner wichtig
werner wichtig - vor 19 Minuten traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 20 Minuten
Foto zeigt keine Landwirte, die die griechische Grenze verteidigen wollen
Ein Foto soll Bauern in Griechenland zeigen, die mit ihren Treckern an die Grenze fahren, um Flüchtlinge aufzuhalten. Es ist von 2016.
Öffentlich – Gefällt mir nicht mehr · Kommentieren Einer Person gefällt das Xenophrenia
Xenophrenia - vor 19 Minuten JOE BIDEN IS NOT MENTALLY CAPABLE OF WINNING AGAINST TRUMP seriously people - I see some in my timeline talking about this man as if he should still be in the race
IF YOU WANT TO BEAT TRUMP WE HAVE TO DEFEAT JOE BIDEN … but the Warren crowd are still having hissy fits over fucking snake emojis
JOE BIDEN WILL LOSE TO DONALD TRUMP - HE CAN’T FUCKING SPEAK - THIS IS NOT A STUTTER
Joe Biden’s Sharp Cognitive Decline (please share, voters need to know)
Joe Biden's Sharp Cognitive Decline (please share, voters need to know) Secular Talk - YouTube Öffentlich – Gefällt mir · Kommentieren 1 mal weitergesagt traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 20 Minuten
Von Lesbos nach Berlin - Charterflug für Kinder und Mütter | Mission Lifeline MISSION LIFELINE startet heute eine Evakuierungsmission für Kinder und Mütter aus Griechenland.
mission-lifeline.de 42 15:30 - 8. März 2020 Twitter Ads Info und Datenschutz 40 Nutzer sprechen darüber Öffentlich via TweetDeck – Gefällt mir · Weitersagen · Kommentieren traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 2 Minuten Hoffentlich haben wir genug GUELLE, wie die griech. BAUERN, die ihr LAND RETTEN !!! traumatizer@nerdpol.ch Kommentieren Christoph S
Öffentlich – Gefällt mir · Kommentieren Einer Person gefällt das 1 mal weitergesagt Fanch_301
Fanch_301 - vor etwa einer Stunde Fefebot Fefebot - vor etwa einer Stunde [l]Hey, wenn jetzt wegen Coronavirus keiner mehr fliegt, wieso sehen wir dann nicht substanziell weniger Flugzeuge? Die Antwort könnte die Bevölkerung verunsichern. Wenn eine Airline die zugewiesenen Slots nicht zu mindestens 80% nutzt, verliert sie sie an die Konkurrenz. Also fliegen die jetzt leer.
Das Coronavirus wird uns also nicht vor der Klimakatastrophe retten.
Airlines are burning thousands of gallons of jet fuel flying empty 'ghost' planes so they can keep... Airlines are flying completely empty planes in order to keep their flight slots during the coronavirus outbreak.
businessinsider.com 117 09:47 - 7. März 2020 Twitter Ads Info und Datenschutz 105 Nutzer sprechen darüber Öffentlich – Gefällt mir nicht mehr · Kommentieren Einer Person gefällt das 1 mal weitergesagt traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor weniger als eine Minute d a s g l a u b i c h j e t z t n i c h t !!! D A S isst ja wie m i t dem WEIHNACHTSMANN !!!
1 traumatizer@nerdpol.chtraumatizer@nerdpol.ch Suchen Stream Meine Aktivitäten @Erwähnungen Meine Aspekte #Tags, denen du folgst Öffentliche Aktivität Lade deine Freunde ein Begrüße neue Benutzer Benötigst du Hilfe? Gibt's ein Problem? Mumble Verbinde Dienste Lesezeichen Spenden Seid nett zueinander! ♥
@nerdpol_ch Projektdiskussionen und Hilfe Was gibt’s Neues? Code 0.7.99.0 Pod-Statistiken Server-Status In den touch-optimierten Modus wechseln Betrieben mit diaspora* traumatizer@nerdpol.ch Beginne eine Unterhaltung... traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor weniger als eine Minute Fefebot Fefebot - vor etwa einer Stunde [l]Hey, wenn jetzt wegen Coronavirus keiner mehr fliegt, wieso sehen wir dann nicht substanziell weniger Flugzeuge? Die Antwort könnte die Bevölkerung verunsichern. Wenn eine Airline die zugewiesenen Slots nicht zu mindestens 80% nutzt, verliert sie sie an die Konkurrenz. Also fliegen die jetzt leer.
Das Coronavirus wird uns also nicht vor der Klimakatastrophe retten.
Airlines are burning thousands of gallons of jet fuel flying empty 'ghost' planes so they can keep... Airlines are flying completely empty planes in order to keep their flight slots during the coronavirus outbreak.
businessinsider.com 118 09:47 - 7. März 2020 Twitter Ads Info und Datenschutz 107 Nutzer sprechen darüber Öffentlich – Gefällt mir · Kommentieren traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor etwa einer Minute Herr Von Sinnen Herr Von Sinnen - vor etwa einer Stunde #NSFW | Beitrag anzeigen | Alle zeigen traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 3 Minuten Paul Ferguson Paul Ferguson - vor etwa 2 Stunden
Öffentlich – Gefällt mir · Kommentieren traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 3 Minuten Xenophrenia Xenophrenia - vor 19 Minuten JOE BIDEN IS NOT MENTALLY CAPABLE OF WINNING AGAINST TRUMP seriously people - I see some in my timeline talking about this man as if he should still be in the race
IF YOU WANT TO BEAT TRUMP WE HAVE TO DEFEAT JOE BIDEN … but the Warren crowd are still having hissy fits over fucking snake emojis
JOE BIDEN WILL LOSE TO DONALD TRUMP - HE CAN’T FUCKING SPEAK - THIS IS NOT A STUTTER
Joe Biden’s Sharp Cognitive Decline (please share, voters need to know)
Joe Biden's Sharp Cognitive Decline (please share, voters need to know) Secular Talk - YouTube Öffentlich – Gefällt mir · Kommentieren **joe
**joe - vor 12 Minuten #Incompetent enter image description here
Mehr zeigen Öffentlich – Gefällt mir · Weitersagen · Kommentieren CitizenZero CitizenZero - vor 7 Minuten It’s looking more and more every day like we’re going to be getting four more years of this psychotic fascist. I’m not sure I want to live in this country any longer…
traumatizer@nerdpol.ch Kommentieren werner wichtig
werner wichtig - vor 18 Minuten rottostein@diasp.eu rottostein@diasp.eu - vor etwa einer Stunde
8 Simple Rocket Stoves - How to Make Simple Camping & Survival Stoves Outdoor Boys - YouTube Öffentlich – Gefällt mir · Weitersagen · Kommentieren werner wichtig
werner wichtig - vor 19 Minuten traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 20 Minuten
Foto zeigt keine Landwirte, die die griechische Grenze verteidigen wollen
Ein Foto soll Bauern in Griechenland zeigen, die mit ihren Treckern an die Grenze fahren, um Flüchtlinge aufzuhalten. Es ist von 2016.
Öffentlich – Gefällt mir nicht mehr · Kommentieren Einer Person gefällt das Xenophrenia
Xenophrenia - vor 19 Minuten JOE BIDEN IS NOT MENTALLY CAPABLE OF WINNING AGAINST TRUMP seriously people - I see some in my timeline talking about this man as if he should still be in the race
IF YOU WANT TO BEAT TRUMP WE HAVE TO DEFEAT JOE BIDEN … but the Warren crowd are still having hissy fits over fucking snake emojis
JOE BIDEN WILL LOSE TO DONALD TRUMP - HE CAN’T FUCKING SPEAK - THIS IS NOT A STUTTER
Joe Biden’s Sharp Cognitive Decline (please share, voters need to know)
Joe Biden's Sharp Cognitive Decline (please share, voters need to know) Secular Talk - YouTube Öffentlich – Gefällt mir · Kommentieren 1 mal weitergesagt traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 20 Minuten
Von Lesbos nach Berlin - Charterflug für Kinder und Mütter | Mission Lifeline MISSION LIFELINE startet heute eine Evakuierungsmission für Kinder und Mütter aus Griechenland.
mission-lifeline.de 42 15:30 - 8. März 2020 Twitter Ads Info und Datenschutz 40 Nutzer sprechen darüber Öffentlich via TweetDeck – Gefällt mir · Weitersagen · Kommentieren traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor 2 Minuten Hoffentlich haben wir genug GUELLE, wie die griech. BAUERN, die ihr LAND RETTEN !!! traumatizer@nerdpol.ch Kommentieren Christoph S
Öffentlich – Gefällt mir · Kommentieren Einer Person gefällt das 1 mal weitergesagt Fanch_301
Fanch_301 - vor etwa einer Stunde Fefebot Fefebot - vor etwa einer Stunde [l]Hey, wenn jetzt wegen Coronavirus keiner mehr fliegt, wieso sehen wir dann nicht substanziell weniger Flugzeuge? Die Antwort könnte die Bevölkerung verunsichern. Wenn eine Airline die zugewiesenen Slots nicht zu mindestens 80% nutzt, verliert sie sie an die Konkurrenz. Also fliegen die jetzt leer.
Das Coronavirus wird uns also nicht vor der Klimakatastrophe retten.
Airlines are burning thousands of gallons of jet fuel flying empty 'ghost' planes so they can keep... Airlines are flying completely empty planes in order to keep their flight slots during the coronavirus outbreak.
businessinsider.com 117 09:47 - 7. März 2020 Twitter Ads Info und Datenschutz 105 Nutzer sprechen darüber Öffentlich – Gefällt mir nicht mehr · Kommentieren Einer Person gefällt das 1 mal weitergesagt traumatizer@nerdpol.ch traumatizer@nerdpol.ch - vor weniger als eine Minute d a s g l a u b i c h j e t z t n i c h t !!! D A S isst ja wie m i t dem WEIHNACHTSMANN !!!
The #Intel #Management #Engine is present on all Intel #desktop, #mobile ( #laptop ), and #server #systems since mid 2006. It consists of an #ARC #processor core (replaced with other processor cores in later generations of the ME), #code and #data #caches, a #timer, and a secure #internal #bus to which additional #devices are connected, including a #cryptography engine, internal #ROM and #RAM, #memory #controllers, and a direct memory access ( #DMA ) engine to access the host operating system’s memory as well as to reserve a region of protected external memory to supplement the ME’s limited internal RAM. The ME also has #network access with its own #MAC #address through an Intel #Gigabit #Ethernet #Controller. Its #boot program, stored on the internal ROM, loads a #firmware “manifest” from the PC’s SPI #flash #chip. This manifest is signed with a strong #cryptographic #key, which differs between versions of the ME firmware. If the manifest isn’t signed by a specific Intel key, the boot ROM won’t load and execute the firmware and the ME processor core will be halted.
The Active Management Technology ( #AMT ) application, part of the Intel “vPro” brand, is a #Web server and application code that enables #remote #users to #power on, power off, view information about, and otherwise manage the #PC. It can be used remotely even while the PC is powered off ( via #Wake-on-Lan ). Traffic is encrypted using #SSL / #TLS libraries, but recall that all of the major SSL/TLS implementations have had highly publicized vulnerabilities. The AMT application itself has known #vulnerabilities, which have been #exploited to develop #rootkits and #keyloggers and #covertly gain #encrypted #access to the management features of a PC. Remember that the ME has full access to the PC’s RAM. This means that an #attacker exploiting any of these vulnerabilities may gain access to everything on the PC as it runs: all open #files, all running #applications, all #keys pressed, and more.
ME firmware versions 4.0 and later (Intel 4 Series and later chipsets) include an ME application for audio and video DRM called “Protected Audio Video Path” (PAVP). The ME receives from the #host operating system an encrypted #media #stream and encrypted key, decrypts the key, and sends the encrypted media decrypted key to the #GPU, which then #decrypts the media. PAVP is also used by another ME application to draw an #authentication PIN pad directly onto the screen. In this usage, the PAVP application directly controls the graphics that appear on the PC’s screen in a way that the host #OS cannot detect. ME firmware version 7.0 on PCHs with 2nd Generation Intel Core #i3 / #i5 / #i7 (Sandy Bridge) CPUs replaces PAVP with a similar DRM application called “Intel Insider”. Like the AMT application, these DRM applications, which in themselves are defective by design, demonstrate the #omnipotent #capabilities of the ME: this #hardware and its proprietary firmware can access and #control everything that is in RAM and even everything that is shown on the #screen.
The Intel Management Engine with its #proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and #mouse movements, and even #capture or #display #images on the screen. And it has a network interface that is demonstrably #insecure, which can allow an attacker on the network to #inject #rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a #threat to #freedom, #security, and #privacy that can’t be ignored.
Before version 6.0 (that is, on systems from 2008/2009 and earlier), the ME can be disabled by setting a couple of values in the SPI flash memory. The ME firmware can then be #removed entirely from the flash memory space. Libreboot does this on the Intel 4 Series systems that it supports, such as the Libreboot X200 and Libreboot T400. ME firmware versions 6.0 and later, which are found on all systems with an Intel #Core i3/i5/i7 CPU and a PCH, include “ME Ignition” firmware that performs some hardware #initialization and power management. If the ME’s boot ROM does not find in the SPI flash memory an ME firmware manifest with a valid Intel signature, the whole PC will shut down after 30 minutes.
Due to the signature verification, developing free #replacement firmware for the ME is basically impossible. The only entity capable of replacing the ME firmware is Intel. As previously stated, the ME firmware includes proprietary code licensed from third parties, so Intel couldn’t release the source code even if they wanted to. And even if they developed completely new ME firmware without third-party proprietary code and released its source code, the ME’s boot ROM would reject any modified firmware that isn’t signed by Intel. Thus, the ME firmware is both hopelessly proprietary and #tivoized.
For years, #coreboot has been #struggling against Intel. Intel has been shown to be extremely uncooperative in general. Many coreboot #developers, and #companies, have tried to get Intel to #cooperate; namely, releasing source code for the firmware components. Even #Google, which sells millions of #Chromebooks (coreboot preinstalled) have been #unable to #persuade them.
Even when Intel does cooperate, they still don’t provide source code. They might provide limited #information (datasheets) under #strict #corporate #NDA ( #non-disclosure #agreement ), but even that is not guaranteed. Even ODMs and IBVs can’t get source code from Intel, in most cases (they will just integrate the blobs that Intel provides).
In summary, the Intel #Management #Engine and its applications are a #backdoor with #total access to and control over the rest of the PC. The ME is a threat to freedom, security, and privacy, and the Libreboot project strongly recommends avoiding it entirely. Since recent versions of it can’t be removed, this means avoiding all #recent #generations of Intel hardware.
Recent Intel graphics chipsets also require firmware blobs
Intel is only going to get #worse when it comes to user freedom. Libreboot has no support recent Intel platforms, precisely because of the problems described above. The only way to solve this is to get Intel to #change their #policies and to be more #friendly to the free software #community. Reverse engineering won’t solve anything long-term, unfortunately, but we need to keep doing it anyway. Moving forward, Intel hardware is a non-option unless a #radical change happens within Intel.
Basically, all Intel hardware from year 2010 and beyond will never be supported by Libreboot. The Libreboot project is actively #ignoring all modern Intel hardware at this point, and focusing on #alternative platforms.
Why is the latest AMD hardware unsupported in Libreboot?
It is extremely unlikely that any post-2013 #AMD hardware will ever be supported in Libreboot, due to severe security and freedom #issues; so #severe, that the Libreboot project recommends avoiding all modern AMD hardware. If you have an AMD based system affected by the #problems described below, then you should get rid of it as soon as possible.
AMD Platform Security Processor (PSP)
This is basically AMD’s own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the #implementation is wildly different.
The Platform Security Processor (PSP) is built in on all Family 16h + systems (basically anything post-2013), and controls the main #x86 core #startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the #x86 cores will not be #released from #reset, rendering the system #inoperable.
The PSP is an ARM core with TrustZone #technology, built onto the main CPU die. As such, it has the ability to #hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, #login data, #browsing #history, #keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM “features” to work as intended), which means that it has at minimum MMIO-based access to the #network controllers and any other PCI/PCIe peripherals installed on the #system.
In theory any #malicious entity with access to the AMD signing key would be able to install persistent #malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD #firmware in the #past, and there is every #reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to #remotely #monitor and control any PSP enabled machine completely outside of the user’s #knowledge.
A reliable way to avoid Intel and AMD’s universal backdoors is to use computers with such spyware effectively removed or disabled like the ones certified to Respect Your Freedom (RYF).
The #Intel #Management #Engine is present on all Intel #desktop, #mobile ( #laptop ), and #server #systems since mid 2006. It consists of an #ARC #processor core (replaced with other processor cores in later generations of the ME), #code and #data #caches, a #timer, and a secure #internal #bus to which additional #devices are connected, including a #cryptography engine, internal #ROM and #RAM, #memory #controllers, and a direct memory access ( #DMA ) engine to access the host operating system’s memory as well as to reserve a region of protected external memory to supplement the ME’s limited internal RAM. The ME also has #network access with its own #MAC #address through an Intel #Gigabit #Ethernet #Controller. Its #boot program, stored on the internal ROM, loads a #firmware “manifest” from the PC’s SPI #flash #chip. This manifest is signed with a strong #cryptographic #key, which differs between versions of the ME firmware. If the manifest isn’t signed by a specific Intel key, the boot ROM won’t load and execute the firmware and the ME processor core will be halted.
The Active Management Technology ( #AMT ) application, part of the Intel “vPro” brand, is a #Web server and application code that enables #remote #users to #power on, power off, view information about, and otherwise manage the #PC. It can be used remotely even while the PC is powered off ( via #Wake-on-Lan ). Traffic is encrypted using #SSL / #TLS libraries, but recall that all of the major SSL/TLS implementations have had highly publicized vulnerabilities. The AMT application itself has known #vulnerabilities, which have been #exploited to develop #rootkits and #keyloggers and #covertly gain #encrypted #access to the management features of a PC. Remember that the ME has full access to the PC’s RAM. This means that an #attacker exploiting any of these vulnerabilities may gain access to everything on the PC as it runs: all open #files, all running #applications, all #keys pressed, and more.
ME firmware versions 4.0 and later (Intel 4 Series and later chipsets) include an ME application for audio and video DRM called “Protected Audio Video Path” (PAVP). The ME receives from the #host operating system an encrypted #media #stream and encrypted key, decrypts the key, and sends the encrypted media decrypted key to the #GPU, which then #decrypts the media. PAVP is also used by another ME application to draw an #authentication PIN pad directly onto the screen. In this usage, the PAVP application directly controls the graphics that appear on the PC’s screen in a way that the host #OS cannot detect. ME firmware version 7.0 on PCHs with 2nd Generation Intel Core #i3 / #i5 / #i7 (Sandy Bridge) CPUs replaces PAVP with a similar DRM application called “Intel Insider”. Like the AMT application, these DRM applications, which in themselves are defective by design, demonstrate the #omnipotent #capabilities of the ME: this #hardware and its proprietary firmware can access and #control everything that is in RAM and even everything that is shown on the #screen.
The Intel Management Engine with its #proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and #mouse movements, and even #capture or #display #images on the screen. And it has a network interface that is demonstrably #insecure, which can allow an attacker on the network to #inject #rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a #threat to #freedom, #security, and #privacy that can’t be ignored.
Before version 6.0 (that is, on systems from 2008/2009 and earlier), the ME can be disabled by setting a couple of values in the SPI flash memory. The ME firmware can then be #removed entirely from the flash memory space. Libreboot does this on the Intel 4 Series systems that it supports, such as the Libreboot X200 and Libreboot T400. ME firmware versions 6.0 and later, which are found on all systems with an Intel #Core i3/i5/i7 CPU and a PCH, include “ME Ignition” firmware that performs some hardware #initialization and power management. If the ME’s boot ROM does not find in the SPI flash memory an ME firmware manifest with a valid Intel signature, the whole PC will shut down after 30 minutes.
Due to the signature verification, developing free #replacement firmware for the ME is basically impossible. The only entity capable of replacing the ME firmware is Intel. As previously stated, the ME firmware includes proprietary code licensed from third parties, so Intel couldn’t release the source code even if they wanted to. And even if they developed completely new ME firmware without third-party proprietary code and released its source code, the ME’s boot ROM would reject any modified firmware that isn’t signed by Intel. Thus, the ME firmware is both hopelessly proprietary and #tivoized.
For years, #coreboot has been #struggling against Intel. Intel has been shown to be extremely uncooperative in general. Many coreboot #developers, and #companies, have tried to get Intel to #cooperate; namely, releasing source code for the firmware components. Even #Google, which sells millions of #Chromebooks (coreboot preinstalled) have been #unable to #persuade them.
Even when Intel does cooperate, they still don’t provide source code. They might provide limited #information (datasheets) under #strict #corporate #NDA ( #non-disclosure #agreement ), but even that is not guaranteed. Even ODMs and IBVs can’t get source code from Intel, in most cases (they will just integrate the blobs that Intel provides).
In summary, the Intel #Management #Engine and its applications are a #backdoor with #total access to and control over the rest of the PC. The ME is a threat to freedom, security, and privacy, and the Libreboot project strongly recommends avoiding it entirely. Since recent versions of it can’t be removed, this means avoiding all #recent #generations of Intel hardware.
Recent Intel graphics chipsets also require firmware blobs
Intel is only going to get #worse when it comes to user freedom. Libreboot has no support recent Intel platforms, precisely because of the problems described above. The only way to solve this is to get Intel to #change their #policies and to be more #friendly to the free software #community. Reverse engineering won’t solve anything long-term, unfortunately, but we need to keep doing it anyway. Moving forward, Intel hardware is a non-option unless a #radical change happens within Intel.
Basically, all Intel hardware from year 2010 and beyond will never be supported by Libreboot. The Libreboot project is actively #ignoring all modern Intel hardware at this point, and focusing on #alternative platforms.
Why is the latest AMD hardware unsupported in Libreboot?
It is extremely unlikely that any post-2013 #AMD hardware will ever be supported in Libreboot, due to severe security and freedom #issues; so #severe, that the Libreboot project recommends avoiding all modern AMD hardware. If you have an AMD based system affected by the #problems described below, then you should get rid of it as soon as possible.
AMD Platform Security Processor (PSP)
This is basically AMD’s own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the #implementation is wildly different.
The Platform Security Processor (PSP) is built in on all Family 16h + systems (basically anything post-2013), and controls the main #x86 core #startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the #x86 cores will not be #released from #reset, rendering the system #inoperable.
The PSP is an ARM core with TrustZone #technology, built onto the main CPU die. As such, it has the ability to #hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, #login data, #browsing #history, #keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM “features” to work as intended), which means that it has at minimum MMIO-based access to the #network controllers and any other PCI/PCIe peripherals installed on the #system.
In theory any #malicious entity with access to the AMD signing key would be able to install persistent #malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD #firmware in the #past, and there is every #reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to #remotely #monitor and control any PSP enabled machine completely outside of the user’s #knowledge.
A reliable way to avoid Intel and AMD’s universal backdoors is to use computers with such spyware effectively removed or disabled like the ones certified to Respect Your Freedom (RYF).
Content warning: If the past few years have taught us all something it’s that “fake news” has found its home on social media. While “fake” posts are often news stories, they can also be images that people share, sometimes without the knowledge that what they’re sharing is
If the past few years have taught us all something it’s that “fake news” has found its home on social media. While “fake” posts are often news stories, they can also be images that people share, sometimes without the knowledge that what they’re sharing isn’t factual.
For instance: Last week French President Emmanuel Macron posted an image along with a post calling for an emergency order to help save the Amazon rain forest. Yes, there’s a tremendous catastrophe happening in the Amazon, but the photo Macron posted was actually a 16-year-old stock photo of the Amazon taken by a photographer who died in 2003.
#photo #images #art J’adore les images, photos ou autres. Je trouve que bien souvent elles expriment beaucoup plus que des mots. Peut-être suis-je légèrement autiste. lol
Tag Count #photo 347 #photography 344 #studies 282 #foto 227 #gnu 224 #politics 208 #microsoft 203 #science 187 #art 163 #iran 158 #health 142 #pictures 136 #photos 136 #trump 135 #images 133 #photograph 127 #china 126 #freesw 121 #security 120 #humor 114 Disclaimer: This list was generated by querying the most used tags in public posts as seen from social.gibberfish.org. Certain tags associated with high-volume “bot” accounts have been filtered out to favor actual posts by actual humans. The ‘nsfw’ tag has also been omitted because it is used primarily as a content warning, not a content descriptor. If you think a tag in this list is spam, please email podmin@gibberfish.org to get it added to the filter.
Tag Count #photo 347 #photography 344 #studies 282 #foto 227 #gnu 224 #politics 208 #microsoft 203 #science 187 #art 163 #iran 158 #health 142 #pictures 136 #photos 136 #trump 135 #images 133 #photograph 127 #china 126 #freesw 121 #security 120 #humor 114 Disclaimer: This list was generated by querying the most used tags in public posts as seen from social.gibberfish.org. Certain tags associated with high-volume “bot” accounts have been filtered out to favor actual posts by actual humans. The ‘nsfw’ tag has also been omitted because it is used primarily as a content warning, not a content descriptor. If you think a tag in this list is spam, please email podmin@gibberfish.org to get it added to the filter.
Kurdish man Serhat Tugan. He got arrested at age of 16 because of a crime he never committed. Spent 28 years in a Turkish prison. He was released today at age of 44. His brother died in exile, mother is heavily sick. This is the story of occupied Kurdistan in two images.
Kurdish man Serhat Tugan. He got arrested at age of 16 because of a crime he never committed. Spent 28 years in a Turkish prison. He was released today at age of 44. His brother died in exile, mother is heavily sick. This is the story of occupied Kurdistan in two images.
Betekenis : zij die het hardst roepen en dreigen, zijn het minst gevaarlijk.
Ook de Romeinen zeiden : canis timidus vehementius latrat quam mordet (Otto, 70).
Engels; English : Barking dogs never bite. / A barking dog never bites. / Barking dogs seldom bite. / His (her, your …) bark is worse than his (her, your, …) bite.
Betekenis : zij die het hardst roepen en dreigen, zijn het minst gevaarlijk.
Ook de Romeinen zeiden : canis timidus vehementius latrat quam mordet (Otto, 70).
Engels; English : Barking dogs never bite. / A barking dog never bites. / Barking dogs seldom bite. / His (her, your …) bark is worse than his (her, your, …) bite.
According to a 2018 McKinsey report, China boasts 114 of the world’s 147 female, self-made billionaires (America has 14). And almost 50% more women hold professional or technical jobs for every 100 men in the Philippines. Asia is one of the most progressive regions for women, yet stereotypes of what Asian women are like and look like persist. BBH Singapore’s ‘See Different’ collection of images seeks to change that by showing the true diversity and personality of women across the Asian region. Photo by @meaneggs on Instagram.