social.stefan-muenz.de

Search

Items tagged with: information

#Coronavirus: #World #leaders' posts deleted over #fake #news


source: https://www.bbc.com/news/technology-52106321
#Facebook deleted a video from Brazilian #President Jair #Bolsonaro that claimed hydroxychloroquine was totally effective in treating the #virus.
...
It follows #Twitter’s deletion of a homemade treatment tweeted by Venezuelan President Nicolás #Maduro.

It may be good and right to delete #false #information about #COVID-19 - but are global corporations becoming the #MinistryOfTruth?
When do they start deleting #criticism of #capitalism because a life without capitalism is unthinkable for them?
#think #news #politics #truth #internet #media #power #ethics #moral #future

 

#Coronavirus: #World #leaders' posts deleted over #fake #news


source: https://www.bbc.com/news/technology-52106321
#Facebook deleted a video from Brazilian #President Jair #Bolsonaro that claimed hydroxychloroquine was totally effective in treating the #virus.
...
It follows #Twitter’s deletion of a homemade treatment tweeted by Venezuelan President Nicolás #Maduro.

It may be good and right to delete #false #information about #COVID-19 - but are global corporations becoming the #MinistryOfTruth?
When do they start deleting #criticism of #capitalism because a life without capitalism is unthinkable for them?
#think #news #politics #truth #internet #media #power #ethics #moral #future

 
Bild/Foto
Bonjour tout le monde, je suis #nouveauici. Mes centres d'intérêt sont #anthropocène, #biodiversité, #climat, #documentation, #information, #systémique, #énergie-climat et #énergie-jancovici.
obsant signifie Observatoire de l'Anthropocène.
L'observatoire maintien une vaille à jour à l'adresse suivante :
https://obsant.eu/oa_liste.php
 
Bild/Foto
Bonjour tout le monde, je suis #nouveauici. Mes centres d'intérêt sont #anthropocène, #biodiversité, #climat, #documentation, #information, #systémique, #énergie-climat et #énergie-jancovici.
obsant signifie Observatoire de l'Anthropocène.
L'observatoire maintien une vaille à jour à l'adresse suivante :
https://obsant.eu/oa_liste.php
 
Bild/Foto
Bonjour tout le monde, je suis #nouveauici. Mes centres d'intérêt sont #anthropocène, #biodiversité, #climat, #documentation, #information, #systémique, #énergie-climat et #énergie-jancovici.
obsant signifie Observatoire de l'Anthropocène.
L'observatoire maintien une vaille à jour à l'adresse suivante :
https://obsant.eu/oa_liste.php
 
I hope the Fediverse is the same accessible for all residents of Australia. I've got from the news that there will be no news from Australia anymore. which sounds like a total bullshit invented by stupid politicians.
I hope people can share information freely and safely via Fediverse, everywhere in the world.
#Australia #information #internet #Fediverse
 

Thanks to the Internet Archive, the history of American newspapers is more searchable than ever » Nieman Journalism Lab


#history #information #media #science #freedom #culture
Thanks to the Internet Archive, the history of American newspapers is more searchable than ever
 

Thanks to the Internet Archive, the history of American newspapers is more searchable than ever » Nieman Journalism Lab


#history #information #media #science #freedom #culture
Thanks to the Internet Archive, the history of American newspapers is more searchable than ever
 
#Information zum #Corona #Virus, zu #Maske und Co in #NRW in einfacher Sprache.

https://www.mags.nrw/coronavirus-leichtesprache
 
They’ll go after everything #information and #facts. They’ll go after #science. Going to be much worse than in the (I think) 1950 with their “eggheads” stereotypes.
Brace yourselves. If not soon then soon-ish, like in four or 8 years. Yes, I am pessimistic re: the #humanimal, and I expect us to be back at bronze ages in 50 years. I won’t be there then, and I’ll do all I can to prevent that from happening, and part of it is speaking about these my fears.
 

'Giant atoms' enable quantum processing and communication in one

MIT researchers have introduced a quantum computing architecture that can perform low-error quantum computations while also rapidly sharing quantum information between processors. The work represents a key advance toward a complete quantum computing platform.

Previous to this discovery, small-scale quantum processors have successfully performed tasks at a rate exponentially faster than that of classical computers. However, it has been difficult to controllably communicate quantum information between distant parts of a processor. In classical computers, wired interconnects are used to route information back and forth throughout a processor during the course of a computation. In a quantum computer, however, the information itself is quantum mechanical and fragile, requiring fundamentally new strategies to simultaneously process and communicate quantum information on a chip.

"One of the main challenges in scaling quantum computers is to enable quantum bits to interact with each other when they are not co-located," says William Oliver, an associate professor of electrical engineering and computer science, MIT Lincoln Laboratory fellow, and associate director of the Research Laboratory for Electronics. "For example, nearest-neighbor qubits can easily interact, but how do I make 'quantum interconnects' that connect qubits at distant locations?"

The answer lies in going beyond conventional light-matter interactions.
_. . ._
Read more -- https://phys.org/news/2020-07-giant-atoms-enable-quantum.html

#quantumComputing #quantum #computing #qubit #physics #information #research #PhysOrg
 

'Giant atoms' enable quantum processing and communication in one

MIT researchers have introduced a quantum computing architecture that can perform low-error quantum computations while also rapidly sharing quantum information between processors. The work represents a key advance toward a complete quantum computing platform.

Previous to this discovery, small-scale quantum processors have successfully performed tasks at a rate exponentially faster than that of classical computers. However, it has been difficult to controllably communicate quantum information between distant parts of a processor. In classical computers, wired interconnects are used to route information back and forth throughout a processor during the course of a computation. In a quantum computer, however, the information itself is quantum mechanical and fragile, requiring fundamentally new strategies to simultaneously process and communicate quantum information on a chip.

"One of the main challenges in scaling quantum computers is to enable quantum bits to interact with each other when they are not co-located," says William Oliver, an associate professor of electrical engineering and computer science, MIT Lincoln Laboratory fellow, and associate director of the Research Laboratory for Electronics. "For example, nearest-neighbor qubits can easily interact, but how do I make 'quantum interconnects' that connect qubits at distant locations?"

The answer lies in going beyond conventional light-matter interactions.
_. . ._
Read more -- https://phys.org/news/2020-07-giant-atoms-enable-quantum.html

#quantumComputing #quantum #computing #qubit #physics #information #research #PhysOrg
 
Thanks for sharing this in the first place, @Stuart Richman!

I re-shared this on FB also, with the following text:
/me sings: “we are stardust, we are golden, and we got to get ourselves back to the garden …”

“Explanation: The hydrogen in your body […snip…]“
————————————————
In my personal belief system, my first station “back in the garden” will be the compost heap, what I like to call “the #cosmic compost”, where the molecules that made up my body will be taken apart as I decompose—and #The Dance begins anew: where will each one of them go after that? How long until one of those atoms may become part of another human being? Decades? Eons? And what with the #ripples I made in time and space? With the “energy”? And even if I, the person, may be forgotten, will my life have had some—hopefull positive—effect on the proceedings of The Whole? Not that I’m in a hurry to be composted any time soon, but … one never knows, eh? And I’m definitely much closer to the compost already than to my birth.

In the world of Doris Lessing’s #Shikasta I will have to wait for my next assignment in #Zone Six. Sometimes I wonder whether it is “good” or “bad” that the “I” will be taken apart in between assignments in this “model”, but currently I’m happy with the ego being broken down, I’d only wish for the #information to be passed on.

Not totally (or totally NOT?) random thoughts on a hot and sunny Sunday afternoon
 

Gedanken | Bitte nennt Eure Quellen


Ich wurde schon einige Male gefragt warum ich wenn ich hier Nachrichten einstelle immer eindeutig angebe von welcher Quelle die Nachricht kommt. Also z. B. Tagesschau, Telepolis, taz, Lower Class Magazine etc. Und deshalb ist es mir hier ein Anliegen darzustellen warum es mir so wichtig ist das jeder sofort weiß woher eine Information/Nachricht kommt. Es hat um genau zu sein zwei Gründe. Zum einem das man so wenn man weiß aus welcher Quelle eine Nachricht kommt die Nachricht besser einschätzen kann. Den das kennt sicher jeder von Euch, dass man im Laufe der Zeit lernt die verschiedenen Medien und ihre Ausrichtung/Positionierung einzuschätzen. Zum anderen aber auch weil man zwar auf PCs/Laptops wenn man mit dem Mauszeiger über maskierte Links geht sofort sieht welche Quelle es ist, aber bei Smartphones und Tablets eben nicht. Sprich dort muss ich wenn im Beitrag mit maskierten Links gearbeitet und die Quelle nicht erwähnt wird den Link zwangsläufig aufrufen um zu sehen um was für eine Quelle es sich handelt. Und ich bin ehrlich, dass will ich weder für mich noch für andere. Den es gibt durchaus Quellen die ich als nicht zuverlässig/rechts/verschwörungstheoretisch/etc. einschätze und die will ich gar nicht erst aufrufen. Ich persönlich gehe da sogar so weit das ich Leute die öfters Beiträgen mit solchen Quellen einstellen auf die Ignoreliste setze, weil es mich einfach nur nervt. Deshalb meine Bitte, schreibt Eure Quellen dazu.

Tags: #de #gedanken #diaspora #quellen #information #bitte #smartphone #tablet #ravenbird #2020-05-11
 
Unfortunately there was a disk error this morning, which caused friendica.utzer.de to be down, the disk was suddenly read only, which usually points toward some disk error and suggests to do fsck. As soon as the problem was recognized, probably about 2-3 hours of downtime due to early morning and traveling, the analysis, check and repair was done.

Unfortunately the root cause could not be identified, there was also not disk error found when the disk was checked for errors, so it is unclear what was the reason. As the disk was read only, there were no logs and the logs shortly before the problem somehow point towards a kernel panic / system error that looks like as if the system journal did crash.

However, after the fsck and a reboot the system did operate as expected again.

The data of the system should be save, as the system does a remote backup of all data every second day. This interval should be increased, but as the backup takes time and causes a higher system load it was set to bi-daily backups.

I hope this will not happen again.

We also plan to move servers, which was planned unrelated, but it will need time and the more powerful system will cost more money, so it was postponed more than once.

#Friendica #Admin #Info #Information
 

Informationssammlung zum Thema CoVid-19.


Diese Sammlung ist absolut unverbindlich. Wir versuchen die Sammlung so gut es geht auf dem aktuellen Stand zu halten. Diese Sammlung ist durch unsere Arbeit im C3 CERT entstanden.

#covid #corona #information #sammlung
 

Informationssammlung zum Thema CoVid-19.


Diese Sammlung ist absolut unverbindlich. Wir versuchen die Sammlung so gut es geht auf dem aktuellen Stand zu halten. Diese Sammlung ist durch unsere Arbeit im C3 CERT entstanden.

#covid #corona #information #sammlung
 

Informationssammlung zum Thema CoVid-19.


Diese Sammlung ist absolut unverbindlich. Wir versuchen die Sammlung so gut es geht auf dem aktuellen Stand zu halten. Diese Sammlung ist durch unsere Arbeit im C3 CERT entstanden.

#covid #corona #information #sammlung
 
Ein Ex-Mitarbeiter einer US-amerikanischen Bank packt aus - und erklärt, wie Merrill Lynch die Steuerkassen plünderte. Besonders betroffen war Deutschland.

Von Christian Salewski und Oliver Schröm

Zum ersten Mal hat ein früherer Mitarbeiter der US-amerikanischen Investment-Bank Merrill Lynch öffentlich geschildert, wie "Tax Trader" - also Steuerhändler der Bank - über Jahre hinweg die deutsche Steuerkasse mit Cum-Ex- und vergleichbaren Geschäften plünderten. Der Insider, der im Londoner Handelsraum von Merrill Lynch tätig war, berichtet dem ARD-Magazin Panorama, "Zeit Online" sowie der "New York Times" von verbotenen Preisabsprachen, Kreisgeschäften mit milliardenschweren Aktienpaketen und der bisher wenig beachteten Rolle der US-Behörden im Cum-Ex-Skandal.

Der Insider will anonym bleiben, weil er juristische Schritte seines ehemaligen Arbeitgebers sowie Angriffe von ehemaligen Kollegen fürchtet. Im Interview sagt der Ex-Mitarbeiter: "Das Tagesgeschäft fand in London statt, aber es wurde sorgfältig von Amerikanern kontrolliert." Außerdem sei das Kapital amerikanischer Anleger für die Geschäfte genutzt worden, beispielsweise aus US-Pensionsfonds. Auch die riesigen Aktienpakete, die eingesetzt wurden, seien von US-amerikanischen Anlegern gekommen.

Dass die amerikanische Investmentbank Merrill Lynch in großem Umfang steuergetriebene Aktiengeschäfte getätigt hatte, die unter den Begriffen Cum-Ex und Cum-Cum bekannt wurden, geht aus internen Dokumenten der Bank sowie aus Handelstabellen und Anzeigen von Whistleblowern bei Aufsichtsbehörden hervor, über die Panorama, "Zeit Online" und "Die Zeit" bereits 2018 berichtet hatten.

Zeugenaussagen und Ermittlungsakten zeigen, dass Hauptbeschuldigte in den derzeit laufenden Cum-Ex-Prozessen in Bonn und Wiesbaden das steuergetriebene Aktiengeschäft bei Merrill Lynch gelernt haben. Merrill Lynch und die Bank of America haben auf Fragen zu den Vorgängen nicht geantwortet.

1/6

So funktionierten die "Cum-Ex"-Geschäfte



Investor A ist Anteilseigner eines Großkonzerns. Er besitzt Aktien im Wert von 15 Millionen Euro.

Nach Lücken im Steuersystem gesucht


Der ehemalige Mitarbeiter sagt nun, hoch spezialisierte Fachleute bei Merrill Lynch hätten ständig nach Lücken im Steuersystem gesucht, nach "diesem mikroskopisch kleinen Defekt". Daraus hätten sie dann Angriffspläne entwickelt, die wie Kochbücher funktioniert hätten. "Das kann ein 15-seitiges Dokument sein, in dem genau steht: Um 7 Uhr morgens, bevor der Markt öffnet, machen wir das. Dann dies. Dann jenes. Dann solches."

Mit diesen "Kochbüchern" hätten die Steuerhändler sekundengenaue Kreisgeschäfte mit dem Ziel organisiert, Profit aus Steuererstattungen zu generieren. "Es geht dabei nicht darum, weniger Steuern zu zahlen, es geht darum, Steuern zu kassieren, die dir nicht zustehen", so der Ex-Mitarbeiter.

Bei Cum-Ex wurde durch Absprachen unter den Beteiligten eine einmal abgeführte Steuer mehrfach per Rückerstattung kassiert. "Der Cum-Ex-Handel erfordert, dass Sie gleichzeitig verkaufen und kaufen, vier-, fünf-, sechshundert Millionen Euro einer Aktie, Sie müssen also sorgfältig koordinieren, dass die Person, die die Aktien von Ihnen kauft, sie auch durch eine andere Transaktion an Sie zurückverkauft. Das muss gleichzeitig geschehen, um sicherzustellen, dass es kein finanzielles Risiko bei der Transaktion gibt." Solche Absprachen sind verboten und ein klares Indiz für illegale Cum-Ex-Geschäfte.

Geschäfte nach Europa verlagert


2008 waren nach einer Untersuchung des US-Senats unter Senator Carl Levin steuergetriebene Aktiengeschäfte in den USA unterbunden worden. Die Investmentbanken hätten daraufhin ihre Steuergeschäfte nach Europa verlagert, so der Ex-Mitarbeiter von Merrill Lynch: "Sie haben sich sofort aus den USA zurückgezogen und einfach das Geschäft in anderen Märkten verdoppelt, vor allem in Europa."

Deutschland sei nun erst recht zum Ziel der Steuerhändler geworden, auch weil die Behörden trotz verschiedener Bemühungen Cum-Ex-Geschäfte nicht verhindert hätten. "Die Deutschen haben geglaubt, sie hätten es mit redlichen Organisationen mit guten Absichten zu tun." Dabei gingen die Steuerhändler "immer dorthin, wo sie die dicksten Geschäfte machen können".

Anzeige in Deutschland nicht bekannt


2012 hatte der Insider eine anonyme Anzeige bei der US-amerikanischen Börsenaufsichtsbehörde Securities and Exchange Commission (SEC) in Washington gestellt und sie auf die Verbindungen nach Deutschland aufmerksam gemacht. In der Anzeige heißt es, die Bank habe "enorme Einnahmen aus einer betrügerischen Form des Handels mit Steuergutschriften" erzielt, die weit über die üblichen Formen steuerlicher Tricks hinaus gehe.

In Gesprächen zwischen deutschen und US-amerikanischen Steuerbehörden über Cum-Ex-Fälle im Jahr 2012 kam die Anzeige des Insiders jedoch nicht zur Sprache. Sie ist dem Bundesfinanzministerium offenbar bis heute unbekannt. Es sei "keine Zuordnung zu einem konkreten Einzelfall möglich", teilte das Ministerium auf Nachfrage mit. Die US-Börsenaufsichtsbehörde wollte die Anzeige auf Nachfrage nicht kommentieren.

Über dieses Thema berichtet Panorama am 23. Januar 2020 um 21:45 Uhr. #Nachrichten #Inland #Ausland #Wirtschaft #Sport #KulturReportage #Bericht #News #Tagesthemen #Aktuell #Neu #Neuigkeiten #Hintergrund #Information #Politik #Innenpolitik #Aussenpolitik #Video #Audio
 

Aufstand


"(...) Dirk C. Fleck ist Autor eines dystopischen Romans namens „GO! Die Ökodiktatur“. Sollte die Freiheit tatsächlich für unser aller Überleben geopfert werden? Wir können als Menschheit diesem Dilemma noch immer für begrenzte Zeit entgehen, indem wir unsere verbleibende Freiheit für freiwillige und drastische Klimaschutzmaßnahmen nutzen. Dazu bräuchte es allerdings ein wirkliches Umsteuern: die Öko-Revolution."

Link zum Beitrag von Dirk C. Fleck:
https://neue-debatte.com/2019/12/08/die-ignorierte-katastrophe/

Home: www-neue-debatte.com
Spenden: www.paypal.me/neuedebatte
Genossen gesucht! https://neue-debatte.com/genossenschaft/
Fragen? https://neue-debatte.com/kontakt/
Infos: https://neue-debatte.com/ueber-uns/
FAQ: https://neue-debatte.com/faq/

#Ökologie #Umwelt #Umweltschutz #Ökokollaps #Ökodiktatur #Umweltzerstörung #Naturschutz #Klima #Klimaveränderung #Gesellschaft #Europa #EU #Welt #Erde #Ökosystem #Information #Wissen
Die ignorierte Katastrophe
 
Auf der Seite unten kann man sich ein #PDF runterladen mit wichtigem Internet-Grundlagen-Wissen:

Eine kurze Anleitung zur digitalen #Selbstverteidigung


https://www.digitale-gesellschaft.ch/2019/12/05/eine-kurze-anleitung-zur-digitalen-selbstverteidigung-online-portal-und-ratgeber/

#internet #information #wissen #Weisheit #Freiheit #Grundlagen #überwachung #Privatsphäre #web
 
Auf der Seite unten kann man sich ein #PDF runterladen mit wichtigem Internet-Grundlagen-Wissen:

Eine kurze Anleitung zur digitalen #Selbstverteidigung


https://www.digitale-gesellschaft.ch/2019/12/05/eine-kurze-anleitung-zur-digitalen-selbstverteidigung-online-portal-und-ratgeber/

#internet #information #wissen #Weisheit #Freiheit #Grundlagen #überwachung #Privatsphäre #web
 

Hintertür in E-Auto-Gesetz - Bundestag schafft Cum-Ex-Ausnahme von Informationsfreiheit


Quelle: netzpolitik.org

"Das Bundesfinanzministerium muss der Öffentlichkeit eigentlich Auskunft dazu geben, wie es mit Skandalen wie Cum-Ex umgeht. Mit einer Gesetzesänderung durch die Hintertür hat es sich jetzt aber eine Ausnahme schaffen lassen."


#politik #justiz #ifg #öffentlichkeit #information #cumex #wirtschaft #gesetzgebung #transparenz
Bundestag schafft Cum-Ex-Ausnahme von Informationsfreiheit

netzpolitik.org: Hintertür in E-Auto-Gesetz - Bundestag schafft Cum-Ex-Ausnahme von Informationsfreiheit

 
Bild/Foto

Avoid Intel and AMD Universal Backdoors


Only use computers certified to Respect Your Freedom (RYF)

The #Intel #Management #Engine is present on all Intel #desktop, #mobile ( #laptop ), and #server #systems since mid 2006. It consists of an #ARC #processor core (replaced with other processor cores in later generations of the ME), #code and #data #caches, a #timer, and a secure #internal #bus to which additional #devices are connected, including a #cryptography engine, internal #ROM and #RAM, #memory #controllers, and a direct memory access ( #DMA ) engine to access the host operating system’s memory as well as to reserve a region of protected external memory to supplement the ME’s limited internal RAM. The ME also has #network access with its own #MAC #address through an Intel #Gigabit #Ethernet #Controller. Its #boot program, stored on the internal ROM, loads a #firmware “manifest” from the PC’s SPI #flash #chip. This manifest is signed with a strong #cryptographic #key, which differs between versions of the ME firmware. If the manifest isn’t signed by a specific Intel key, the boot ROM won’t load and execute the firmware and the ME processor core will be halted.

The Active Management Technology ( #AMT ) application, part of the Intel “vPro” brand, is a #Web server and application code that enables #remote #users to #power on, power off, view information about, and otherwise manage the #PC. It can be used remotely even while the PC is powered off ( via #Wake-on-Lan ). Traffic is encrypted using #SSL / #TLS libraries, but recall that all of the major SSL/TLS implementations have had highly publicized vulnerabilities. The AMT application itself has known #vulnerabilities, which have been #exploited to develop #rootkits and #keyloggers and #covertly gain #encrypted #access to the management features of a PC. Remember that the ME has full access to the PC’s RAM. This means that an #attacker exploiting any of these vulnerabilities may gain access to everything on the PC as it runs: all open #files, all running #applications, all #keys pressed, and more.

ME firmware versions 4.0 and later (Intel 4 Series and later chipsets) include an ME application for audio and video DRM called “Protected Audio Video Path” (PAVP). The ME receives from the #host operating system an encrypted #media #stream and encrypted key, decrypts the key, and sends the encrypted media decrypted key to the #GPU, which then #decrypts the media. PAVP is also used by another ME application to draw an #authentication PIN pad directly onto the screen. In this usage, the PAVP application directly controls the graphics that appear on the PC’s screen in a way that the host #OS cannot detect. ME firmware version 7.0 on PCHs with 2nd Generation Intel Core #i3 / #i5 / #i7 (Sandy Bridge) CPUs replaces PAVP with a similar DRM application called “Intel Insider”. Like the AMT application, these DRM applications, which in themselves are defective by design, demonstrate the #omnipotent #capabilities of the ME: this #hardware and its proprietary firmware can access and #control everything that is in RAM and even everything that is shown on the #screen.

The Intel Management Engine with its #proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and #mouse movements, and even #capture or #display #images on the screen. And it has a network interface that is demonstrably #insecure, which can allow an attacker on the network to #inject #rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a #threat to #freedom, #security, and #privacy that can’t be ignored.

Before version 6.0 (that is, on systems from 2008/2009 and earlier), the ME can be disabled by setting a couple of values in the SPI flash memory. The ME firmware can then be #removed entirely from the flash memory space. Libreboot does this on the Intel 4 Series systems that it supports, such as the Libreboot X200 and Libreboot T400. ME firmware versions 6.0 and later, which are found on all systems with an Intel #Core i3/i5/i7 CPU and a PCH, include “ME Ignition” firmware that performs some hardware #initialization and power management. If the ME’s boot ROM does not find in the SPI flash memory an ME firmware manifest with a valid Intel signature, the whole PC will shut down after 30 minutes.

Due to the signature verification, developing free #replacement firmware for the ME is basically impossible. The only entity capable of replacing the ME firmware is Intel. As previously stated, the ME firmware includes proprietary code licensed from third parties, so Intel couldn’t release the source code even if they wanted to. And even if they developed completely new ME firmware without third-party proprietary code and released its source code, the ME’s boot ROM would reject any modified firmware that isn’t signed by Intel. Thus, the ME firmware is both hopelessly proprietary and #tivoized.

For years, #coreboot has been #struggling against Intel. Intel has been shown to be extremely uncooperative in general. Many coreboot #developers, and #companies, have tried to get Intel to #cooperate; namely, releasing source code for the firmware components. Even #Google, which sells millions of #Chromebooks (coreboot preinstalled) have been #unable to #persuade them.

Even when Intel does cooperate, they still don’t provide source code. They might provide limited #information (datasheets) under #strict #corporate #NDA ( #non-disclosure #agreement ), but even that is not guaranteed. Even ODMs and IBVs can’t get source code from Intel, in most cases (they will just integrate the blobs that Intel provides).

In summary, the Intel #Management #Engine and its applications are a #backdoor with #total access to and control over the rest of the PC. The ME is a threat to freedom, security, and privacy, and the Libreboot project strongly recommends avoiding it entirely. Since recent versions of it can’t be removed, this means avoiding all #recent #generations of Intel hardware.

Recent Intel graphics chipsets also require firmware blobs


Intel is only going to get #worse when it comes to user freedom. Libreboot has no support recent Intel platforms, precisely because of the problems described above. The only way to solve this is to get Intel to #change their #policies and to be more #friendly to the free software #community. Reverse engineering won’t solve anything long-term, unfortunately, but we need to keep doing it anyway. Moving forward, Intel hardware is a non-option unless a #radical change happens within Intel.

Basically, all Intel hardware from year 2010 and beyond will never be supported by Libreboot. The Libreboot project is actively #ignoring all modern Intel hardware at this point, and focusing on #alternative platforms.

Why is the latest AMD hardware unsupported in Libreboot?


It is extremely unlikely that any post-2013 #AMD hardware will ever be supported in Libreboot, due to severe security and freedom #issues; so #severe, that the Libreboot project recommends avoiding all modern AMD hardware. If you have an AMD based system affected by the #problems described below, then you should get rid of it as soon as possible.

AMD Platform Security Processor (PSP)


This is basically AMD’s own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the #implementation is wildly different.

The Platform Security Processor (PSP) is built in on all Family 16h + systems (basically anything post-2013), and controls the main #x86 core #startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the #x86 cores will not be #released from #reset, rendering the system #inoperable.

The PSP is an ARM core with TrustZone #technology, built onto the main CPU die. As such, it has the ability to #hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, #login data, #browsing #history, #keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM “features” to work as intended), which means that it has at minimum MMIO-based access to the #network controllers and any other PCI/PCIe peripherals installed on the #system.

In theory any #malicious entity with access to the AMD signing key would be able to install persistent #malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD #firmware in the #past, and there is every #reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to #remotely #monitor and control any PSP enabled machine completely outside of the user’s #knowledge.

A reliable way to avoid Intel and AMD’s universal backdoors is to use computers with such spyware effectively removed or disabled like the ones certified to Respect Your Freedom (RYF).

#NSA #spyware #spy #mass #surveillance #FSF #GNU #GNULinux #RYF #technology #laptops #CPU #processor #universal #backdoor #malware #Corei3 #Corei5 #Corei7
 
Bild/Foto

Avoid Intel and AMD Universal Backdoors


Only use computers certified to Respect Your Freedom (RYF)

The #Intel #Management #Engine is present on all Intel #desktop, #mobile ( #laptop ), and #server #systems since mid 2006. It consists of an #ARC #processor core (replaced with other processor cores in later generations of the ME), #code and #data #caches, a #timer, and a secure #internal #bus to which additional #devices are connected, including a #cryptography engine, internal #ROM and #RAM, #memory #controllers, and a direct memory access ( #DMA ) engine to access the host operating system’s memory as well as to reserve a region of protected external memory to supplement the ME’s limited internal RAM. The ME also has #network access with its own #MAC #address through an Intel #Gigabit #Ethernet #Controller. Its #boot program, stored on the internal ROM, loads a #firmware “manifest” from the PC’s SPI #flash #chip. This manifest is signed with a strong #cryptographic #key, which differs between versions of the ME firmware. If the manifest isn’t signed by a specific Intel key, the boot ROM won’t load and execute the firmware and the ME processor core will be halted.

The Active Management Technology ( #AMT ) application, part of the Intel “vPro” brand, is a #Web server and application code that enables #remote #users to #power on, power off, view information about, and otherwise manage the #PC. It can be used remotely even while the PC is powered off ( via #Wake-on-Lan ). Traffic is encrypted using #SSL / #TLS libraries, but recall that all of the major SSL/TLS implementations have had highly publicized vulnerabilities. The AMT application itself has known #vulnerabilities, which have been #exploited to develop #rootkits and #keyloggers and #covertly gain #encrypted #access to the management features of a PC. Remember that the ME has full access to the PC’s RAM. This means that an #attacker exploiting any of these vulnerabilities may gain access to everything on the PC as it runs: all open #files, all running #applications, all #keys pressed, and more.

ME firmware versions 4.0 and later (Intel 4 Series and later chipsets) include an ME application for audio and video DRM called “Protected Audio Video Path” (PAVP). The ME receives from the #host operating system an encrypted #media #stream and encrypted key, decrypts the key, and sends the encrypted media decrypted key to the #GPU, which then #decrypts the media. PAVP is also used by another ME application to draw an #authentication PIN pad directly onto the screen. In this usage, the PAVP application directly controls the graphics that appear on the PC’s screen in a way that the host #OS cannot detect. ME firmware version 7.0 on PCHs with 2nd Generation Intel Core #i3 / #i5 / #i7 (Sandy Bridge) CPUs replaces PAVP with a similar DRM application called “Intel Insider”. Like the AMT application, these DRM applications, which in themselves are defective by design, demonstrate the #omnipotent #capabilities of the ME: this #hardware and its proprietary firmware can access and #control everything that is in RAM and even everything that is shown on the #screen.

The Intel Management Engine with its #proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and #mouse movements, and even #capture or #display #images on the screen. And it has a network interface that is demonstrably #insecure, which can allow an attacker on the network to #inject #rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a #threat to #freedom, #security, and #privacy that can’t be ignored.

Before version 6.0 (that is, on systems from 2008/2009 and earlier), the ME can be disabled by setting a couple of values in the SPI flash memory. The ME firmware can then be #removed entirely from the flash memory space. Libreboot does this on the Intel 4 Series systems that it supports, such as the Libreboot X200 and Libreboot T400. ME firmware versions 6.0 and later, which are found on all systems with an Intel #Core i3/i5/i7 CPU and a PCH, include “ME Ignition” firmware that performs some hardware #initialization and power management. If the ME’s boot ROM does not find in the SPI flash memory an ME firmware manifest with a valid Intel signature, the whole PC will shut down after 30 minutes.

Due to the signature verification, developing free #replacement firmware for the ME is basically impossible. The only entity capable of replacing the ME firmware is Intel. As previously stated, the ME firmware includes proprietary code licensed from third parties, so Intel couldn’t release the source code even if they wanted to. And even if they developed completely new ME firmware without third-party proprietary code and released its source code, the ME’s boot ROM would reject any modified firmware that isn’t signed by Intel. Thus, the ME firmware is both hopelessly proprietary and #tivoized.

For years, #coreboot has been #struggling against Intel. Intel has been shown to be extremely uncooperative in general. Many coreboot #developers, and #companies, have tried to get Intel to #cooperate; namely, releasing source code for the firmware components. Even #Google, which sells millions of #Chromebooks (coreboot preinstalled) have been #unable to #persuade them.

Even when Intel does cooperate, they still don’t provide source code. They might provide limited #information (datasheets) under #strict #corporate #NDA ( #non-disclosure #agreement ), but even that is not guaranteed. Even ODMs and IBVs can’t get source code from Intel, in most cases (they will just integrate the blobs that Intel provides).

In summary, the Intel #Management #Engine and its applications are a #backdoor with #total access to and control over the rest of the PC. The ME is a threat to freedom, security, and privacy, and the Libreboot project strongly recommends avoiding it entirely. Since recent versions of it can’t be removed, this means avoiding all #recent #generations of Intel hardware.

Recent Intel graphics chipsets also require firmware blobs


Intel is only going to get #worse when it comes to user freedom. Libreboot has no support recent Intel platforms, precisely because of the problems described above. The only way to solve this is to get Intel to #change their #policies and to be more #friendly to the free software #community. Reverse engineering won’t solve anything long-term, unfortunately, but we need to keep doing it anyway. Moving forward, Intel hardware is a non-option unless a #radical change happens within Intel.

Basically, all Intel hardware from year 2010 and beyond will never be supported by Libreboot. The Libreboot project is actively #ignoring all modern Intel hardware at this point, and focusing on #alternative platforms.

Why is the latest AMD hardware unsupported in Libreboot?


It is extremely unlikely that any post-2013 #AMD hardware will ever be supported in Libreboot, due to severe security and freedom #issues; so #severe, that the Libreboot project recommends avoiding all modern AMD hardware. If you have an AMD based system affected by the #problems described below, then you should get rid of it as soon as possible.

AMD Platform Security Processor (PSP)


This is basically AMD’s own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the #implementation is wildly different.

The Platform Security Processor (PSP) is built in on all Family 16h + systems (basically anything post-2013), and controls the main #x86 core #startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the #x86 cores will not be #released from #reset, rendering the system #inoperable.

The PSP is an ARM core with TrustZone #technology, built onto the main CPU die. As such, it has the ability to #hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, #login data, #browsing #history, #keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM “features” to work as intended), which means that it has at minimum MMIO-based access to the #network controllers and any other PCI/PCIe peripherals installed on the #system.

In theory any #malicious entity with access to the AMD signing key would be able to install persistent #malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD #firmware in the #past, and there is every #reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to #remotely #monitor and control any PSP enabled machine completely outside of the user’s #knowledge.

A reliable way to avoid Intel and AMD’s universal backdoors is to use computers with such spyware effectively removed or disabled like the ones certified to Respect Your Freedom (RYF).

#NSA #spyware #spy #mass #surveillance #FSF #GNU #GNULinux #RYF #technology #laptops #CPU #processor #universal #backdoor #malware #Corei3 #Corei5 #Corei7
 

Is english a germanic language?


English is a german based creole dialect heavily influenced by latin and french. scnr :)


#information #language #linguist #english
 

Geordie Dialect (spoken around Newcastle upon Tyne, UK)


A poem spoken in Geordie.


#information #slang #dialect
 

Jamaican Patois


A short history of Patwah and lots of funny examples. I am not sure about this but I think I noticed some similarities between Patwah and the Geordie slang spoken around Newcastle Upon Tyne, UK.


#information #language #slang
 
Comment Facebook achète la presse française

TF1, Le Figaro, Le Parisien, Le Monde... Depuis 2016, Facebook verse des millions d’euros à plusieurs grands médias français pour produire des contenus vidéo sur son réseau social. Une pratique qui pose la question de la dépendance des rédactions et ouvre la voie à un système à deux vitesses pénalisant les « petits médias ».

https://www.mediapart.fr/journal/france/011217/comment-facebook-achete-la-presse-francaise?page_article=1

#media #Facebook #mediasociaux #actualité #information
 
Comment Facebook achète la presse française

TF1, Le Figaro, Le Parisien, Le Monde... Depuis 2016, Facebook verse des millions d’euros à plusieurs grands médias français pour produire des contenus vidéo sur son réseau social. Une pratique qui pose la question de la dépendance des rédactions et ouvre la voie à un système à deux vitesses pénalisant les « petits médias ».

https://www.mediapart.fr/journal/france/011217/comment-facebook-achete-la-presse-francaise?page_article=1

#media #Facebook #mediasociaux #actualité #information
 
Na, da bin ich mal sehr gespannt, ob das in der Praxis Besserung bringen wird ...

Parken auf Geh- und Radwegen soll für Autofahrer künftig teurer werden. Auch bei Rettungsgassen sieht die Reform der Straßenverkehrsordnung wichtige Neuerungen vor. Von Marcel Heberlein. #Nachrichten #Inland #Ausland #Wirtschaft #Sport #KulturReportage #Bericht #News #Tagesthemen #Aktuell #Neu #Neuigkeiten #Hintergrund #Information #Politik #Innenpolitik #Aussenpolitik #Video #Audio
 

Fragebogen zu: Impfentscheidung #Hundehalter/-innen

Sehr geehrte #Hundebesitzerin, sehr geehrter #Hundebesitzer,

vielen Dank, dass Sie sich Zeit nehmen an dieser online #Befragung teilzunehmen. Diese am Fachbereich #Tiermedizin der #Justus-Liebig-Universität Gießen entwickelte #Umfrage soll in Erfahrung bringen, wie Sie zu Ihrer #Entscheidung gelangt sind Ihren #Hund #impfen zu lassen oder nicht.

Die Daten werden anonymisiert erhoben und nicht an Dritte weitergeleitet. Die erhobenen Daten werden zugriffssicher gespeichert und ausschließlich für diese Studie verwendet. Weitere Informationen zur Datensicherheit entnehmen Sie bitte den Datenschutzrichtlinien der Justus-Liebig-Universität Gießen (https://www.uni-giessen.de/ueber-uns/datenschutz).

Die Beantwortung der Fragen wird ca. 15 Minuten dauern.

Falls Sie mehrere #Hunde haben, machen Sie bitte Angaben über denjenigen Hund, den Sie am längsten, mindestens jedoch sechs Monate, besitzen.

Bei Rückfragen wenden Sie sich bitte an hundeumfrage@gmx.de.

Möchten Sie über die Ergebnisse der Untersuchung informiert werden, so haben Sie am Ende des Fragebogens die Möglichkeit Ihre E-Mail-Adresse anzugeben.
https://surveys.hrz.uni-giessen.de/limesurvey/index.php/286115?lang=de

#Wissenschaft #Studie #Untersuchung #Information
 

Magdeburgisieren


"(...) Früh wurde erkannt, dass die öffentliche Meinung eine starke Waffe sein kann, um die Breitschaft zum Widerstand gegen den Gegner zu erhöhen oder diesen durch gezielte Falschinformationen zu schwächen. Damit wurden die Beschreibungen des Grauens auch zu einem Instrument der Kriegführung."

Link zum Beitrag in unserem Archiv: https://neue-debatte.com/2016/04/18/wo-ist-die-oeffentliche-meinung/
◙ Neue Debatte | www.neue-debatte.com
Unabhängig | Nicht werbefinanziert | Der Leserschaft verpflichtet
◙ Verbreite die Neue Debatte in der digitalen Welt - weil es notwendig ist!
◙ Uns unterstützen: https://neue-debatte.com/spenden/
◙ PayPal: www.paypal.me/neuedebatte

#NeueDebatte #Geschichte #Presse #Medien #Manipulation #Information #Propaganda #Wissen #Bildung
Wo ist die öffentliche Meinung?
 
Und ich so im Kopf: "Das heißt doch Parkettböden!" 🙈😂 #VerleserAmMorgen

Die Große Koalition will die Arbeitsbedingungen von Paketboten verbessern und zugleich Unternehmen von Bürokratie entlasten: Auf diese zwei Vorhaben einigten sich Koalitionsspitzen im Kanzleramt. #Nachrichten #Inland #Ausland #Wirtschaft #Sport #KulturReportage #Bericht #News #Tagesthemen #Aktuell #Neu #Neuigkeiten #Hintergrund #Information #Politik #Innenpolitik #Aussenpolitik #Video #Audio
 
Superbe travail: une carte des médias indépendants (locaux et globaux) en France:
https://www.lagedefaire-lejournal.fr/carte-de-la-presse-pas-pareille/

Ces médias ont choisis de nous vendre du contenu alors que le modèle 'normal' est de vendre son audience aux publicitaires.Consultons les! Soutenons les!

#médias #journalisme #journaux #webzine #ppea #information #France #photographie #actualités #régions #nouvelles #libre #alternatif #justice #expression
Carte de la « presse pas pareille »
 

A deconstruction of New Order – Blue Monday


Donna Summer influenced New Orders Blue Monday... now you know. :>


#music #information #production
 
#TorrentFreak #P2P #BitTorrent #FileSharing #Copyright #Information #Internet
The Pirate Bay Lives On, A Decade After ‘Guilty’ Verdicts
 
Later posts Earlier posts