Maastricht University gets almost all of its Windows systems encrypted by ransomware – 2-spyware.com

Netherlands Maastricht University becomes a victim of ransomware just before Christmas

On December 24, Maastricht University, also dubbed as UM, released an official report about a ransomware attack that managed to encrypt almost all of its Windows systems. The attack against the University was performed on December 23 and complicated the use of email-related services:[1]

Maastricht University (UM) has been hit by a serious cyber attack. Almost all Windows systems have been affected and it is particularly difficult to use e-mail services.

There are no particular details on what type of ransomware virus attacked the institution and also no data whether the criminals managed to steal any private data before locking it with the encryption key or not. However, UM is trying to find out if there was any information accessed.

Maastricht University is a successful educational institution located in the Netherlands, having 18,000 students, even a greater number of alumni 70,000 and 4,400 employees. Additionally, during the past two years, this institution has also been included in the top 500 universities.[2]

Sadly, when everybody was celebrating Christmas Eve, Maastricht University had to deal with a ransom attack. The authorities have explained that they worked on the attack by putting all the systems down as a protective measure. It might take some time until they will be put up again. However, even it is still unknown when the systems will be available again due to the ongoing investigation process,[3] the doors of the UM buildings will be open from January 2 to all students again.

University's staff has also been working with law enforcement agencies while trying to investigate this attempt deeper. The institution is expecting to find out methods that would allow it to avoid similar attacks in the upcoming future and identify the current damage.[4]

The attack targeting Maastricht University is not the only one that has been reported during these days. The United States Coast Guard operation was also taken down due to a ransomware attack. This time, the malware that was spread via phishing email messages and included a malicious hyperlink that was the hidden ransomware payload was Ryuk ransomware.[5]

Ransomware viruses are one of the most dangerous threats that are lurking out in the cybersphere. Malicious actors manage to deliver these viruses through infected emails and attachments or hyperlinks, cracked software, malvertising, and other deceptive strategies. Afterward, the ransomware launches its encryption module and locks all data that is placed on the infected computer.

Then, this dangerous threat demands a particular ransom price via a ransom note. Even though the money amount for regular users can be only $50 or $200 in Bitcoin, the cybercriminals are very likely to demand a big sum from worldwide organizations, companies, and institutions that can come up to $1 million in BTC or another type of cryptocurrency.

See more here:
Maastricht University gets almost all of its Windows systems encrypted by ransomware - 2-spyware.com

Codes and Ciphers – OUPblog

My book group recently read a 2017 mystery calledThe Lost Book of the Grailby Charlie Lovett. In the novel, an English bibliophile and an American digitizer track down a mysterious book thought to lead to the Holy Grail. The chief clue: a secret message hidden in the rare books collection of the fictional Barchester Cathedral Library. The message is a complex polyalphabetic substitution cipher that can only be solved by finding key words hidden in the books. Coded messages are common plot devices, used not just by Dan Brown but also by Edgar Allan Poe, Sir Arthur Conan Doyle, Jules Verne, Dorothy Sayers, Agatha Christie, and Neal Stephenson, among many others.

Aficionados distinguish among codes and ciphers. They also talk about steganography, which involves hiding messages, sometimes covertly as in a microdot and sometimes in plain sight as when the first letters of the paragraphs of a text spell out a word. Aficionados also refer to anagrams, which are expression made up by rearranging the letter (or numbers) of another expression. My name, for example, anagrams as BATTLED WAISTLINE.

There is also a distinction between codes and ciphers. A code is a technique for rendering one set of meanings using other, usually shorter, symbols. In early Morse Code telegraphy, for example, a word in the code book could be used to stand for a whole sentence or phrase, enabling efficient messaging. Stenographers and journalists use shorthand and the US Secret Service uses code names for its protecteeslike Lancer (for JFK) and Rawhide (for Ronald Reagan). Ciphers refer to messages which are systematically altered by some algorithm, such as replacing one symbol for another. Cryptography refers to both ciphers and codes.

How do ciphers work? The classic example is one called the Caesar shift. This is an encryption in which each character is replaced by one a certain number of places down the alphabet. Julius Caesars encrypted messages were said to use a shift of three characters to the left. Edwin Battistella would become BATFK YXQQFPQBIIX. Simple ciphers like the Caesar shift are (said to be) easy to decrypt.

In literary works, such as mystery and spy fiction, encrypted messages can be used as plot devices, obstacles for the protagonists to overcome. Or they can be used as part of the plot itself, where the technique of decipherment is a major part of the story. In Arthur Conan Doyles short story The Adventure of the Dancing Men, a woman named Elsie Patrick is harassed by coded messages in which each character looks like a dancing person. Realizing the messages are written in a substitution cipher, Sherlock Holmes deciphers them by analyzing the frequency of the symbols. He explains to Watson that E is the most common letter in the English alphabet, and it predominates to so marked an extent that even in a short sentence one would expect to find it most often. Noting that T, A, O, I, N, S, H, R, D, and L are the next most frequent letters, he quickly deciphers the message, which said. Elsie, prepare to meet thy God.

Sometimes the cipher appears quite complex. Edgar Allan Poe used one as a plot device in his story The Gold Bug. The cipher was supposedly devised by Captain William Kidd, the Scottish pirate, giving directions to his buried treasure. Its a simple letter-to-symbol cipher using numbers and punctuation marks, but without spaces between the word divisions. Poes fictional cryptographer solves the cipher by using frequency analysis. You can give it a try yourself. Heres a clue, the letters E T A O I N S H R D L are represented by 8 ; 5 6 * ) 4 ( 0.

53305))6*;4826)4.)4);806*;488

60))85;;]8*;:*883(88)5*;46(;88*96

*?;8)*(;485);5*2:*(;4956*2(5*4)8

8*;4069285);)68)4;1(9;48081;8:8

1;4885;4)485528806*81(9;48;(88;4

(?34;48)4;161;:188;?;

Figuring out the cipher inThe Lost Book of the Grailwas more complex, and the deciphering takes place over many pages of the novel. Frequency analysis leads the protagonists to the letters U, Q and D, which they associate with the Latin wordsunus, quinqueanddecem:1, 5, and 10.The numbers point to books and chapters in the librarys medieval manuscript collection where the key words are found. That discover allows the cipher be decrypted by using the key to partially scramble the alphabet. So the keywordcorpusgoes before the English alphabet minus the letters in the key. The keyed English is aligned with the slightly shorter Latin alphabet (missing J and W, which were absent in classical Latin).

C O R P U S A B D E F G H I J K L M N Q T V W X Y Z

A B C D E F G H I K L M N O P Q R S T U V X Y Z

Ultimately, the key allows the protagonists to decipher strings like JULMCURQF CMQJLCHIQ UGBCULUFD as PERSAECUL ASUPRANOV EMHAERELI orper saecula supra novem hae reli-. Finding successive keys and applying them to further bits of text, they decipher the full Latin message. Its a complex puzzle spread over nearly sixty pages.

Not all secrets are so complex. In theDa Vinci Code, symbologist Robert Langdon is confronted with, among other clues the lines:

13-3-2-21-1-1-8-5

O, Draconian devil!

Oh, lame saint!

Each line is an anagram. O, Draconian Devil yields Leonardo Da Vinci and Oh, lame saint becomes The Mona Lisa. The line of numbers is an anagram of the beginning of the Fibonacci Sequence, in which numbers after 1 are the sum of the two previous numbers: 1-1-2-3-5-8-13-21. It is the combination of a later lockbox.

Hidden messages, from anagrams to codes and ciphers are part of a long literary tradition. Take some time to enjoy them or create one yourself.

Featured image credit: Enlightening Math by John Moeses Bauan. CC0 via Unsplash.

Read more here:
Codes and Ciphers - OUPblog

How AI And Machine Learning Can Make Forecasting Intelligent – Demand Gen Report

The CRM is no longer a data repository and a basic workflow engine that creates static reports. Thanks to AI and ML, predictive and prescriptive insights can be embedded into CRM. This is known as the intelligent experience. The intelligent experience is a natural fit for sales forecasting.

We all know data is incredibly powerful, but often its potential goes untapped in businesses. In order to utilize data in a meaningful way, a company needs to have the right skills and tools to convert data into learnings, and learnings into actions and outcomes. This is exactly what the intelligent experience does. For example, a company using a standard CRM is able to look at their pipeline and opportunity data and see forecasted sales figures. A company with intelligent forecasting sees all of that same data but goes further. Their ML will analyze their past opportunities, successes, misses, win rates and other criteria to create a recommended forecast and provide insights to help their sales team take action. Intelligent forecasting is more than making predictions on revenue or deals closed. It is transparent and explanatory, which informs workflows, helps improve sales strategies and opens the door to increasing win rates.

An overwhelming majority of data projects fail. Why? Typically, it is due to companies thinking they need to gather the perfect data or create custom models in data silos that end up having limited value to the business. The reality is, they dont need to have the perfect data to gather meaningful insights, nor do they require a massive data pool. A business can start small and keep it simple.

Forecasting is complex, so naturally, many companies struggle to maximize its value. Often, companies will use spreadsheets and do calculations to aggregate historical direct and channel sales results with cyclical growth assumptions. Unfortunately, this is a subjective approach that typically is inaccurate, time-consuming and not actionable in real-time. The best way to develop a trusted and actionable forecast is by combining traditional approaches with AI approaches.

To get started with intelligent forecasting, an organization must define the intelligent experience it wants to create for its users and customers. Next, custom ML models and AI systems are built to generate the necessary insights. Two major approaches to gaining insights are propensity-based predictions and aggregate forecasting. Propensity-based models examine individual opportunities and score them. Aggregate forecasting looks at aggregate sales volumes across segments of the business (i.e. channel, geography, product, etc.). To maximize value, it is best to combine both approaches. Once implemented, the insights are then integrated into user workflows within the CRM and presented as recommend actions. Finally, the data models are tuned and redefined. Creating an intelligent experience is a journey because as a business changes, so does its data. In order for the ML to remain successful over time, it needs to also change and adjust.

Companies can combine the impact of data, analytics and AI to make decisions faster, increase productivity and make customers happier. While most companies know the benefits, they think its out of reach for them. However, the intelligent experience is more accessible than ever. Through the power of AI and ML, companies are able to inform their workflows and sales strategies, leading to more wins.

As a Co-Founder and SVP of Customer Engagement, Geoff Birnes is responsible for Atriums customer outcomes. Birnes brings extensive experience in large-scale business transformation programs across sales, marketing, service and middle office. Prior to Atrium, Geoff led strategic accounts for Appirio-Wipro, and has spent 20 years in the consulting space, focused on CRM and business intelligence sales and delivery. Geoff attended Penn State University where he earned a B.S. in Engineering.

Read the original here:
How AI And Machine Learning Can Make Forecasting Intelligent - Demand Gen Report

US announces AI software export restrictions – The Verge

The US will impose new restrictions on the export of certain AI programs overseas, including to rival China.

The ban, which comes into force on Monday, is the first to be applied under a 2018 law known as the Export Control Reform Act or ECRA. This requires the government to examine how it can restrict the export of emerging technologies essential to the national security of the United States including AI. News of the ban was first reported by Reuters.

When ECRA was announced in 2018, some in the tech industry feared it would harm the field of artificial intelligence, which benefits greatly from the exchange of research and commercial programs across borders. Although the US is generally considered to be the world leader in AI, China is a strong second place and gaining fast.

But the new export ban is extremely narrow. It applies only to software that uses neural networks (a key component in machine learning) to discover points of interest in geospatial imagery; things like houses or vehicles. The ruling, posted by the Bureau of Industry and Security, notes that the restriction only applies to software with a graphical user interface a feature that makes programs easier for non-technical users to operate.

Reuters reports that companies will have to apply for licenses to export such software apart from when it is being sold to Canada.

The US has previously imposed other trade restrictions affecting the AI world, including a ban on American firms from doing business with Chinese companies that produce software and hardware that powers AI surveillance.

Using machine learning to process geospatial imagery is an extremely common practice. Satellites that photograph the Earth from space produce huge amounts of data, which machine learning can quickly sort to flag interesting images for human overseers.

Such programs are useful to many customers. Environmentalists can use the technology to monitor the spread of wildfires, for example, while financial analysts can use it to track the movements of cargo ships out of a port, creating a proxy metric for trading volume.

But such software is of growing importance to military intelligence, too. The US, for example, is developing an AI analysis tool named Sentinel, which is supposed to highlight anomalies in satellite imagery. It might flag troop and missile movements, for example, or suggest areas that human analysts should examine in detail.

Regardless of the importance of this software its unlikely an export ban will have much of an effect on China or other rivals development of these tools. Although certain programs may be restricted, its often the case that the underlying research is freely available online, allowing engineers to recreate any software for themselves.

Reuters notes that although the restriction will only affect US exports, American authorities could try and encourage other countries to follow suit, as they have with restrictions on Huaweis 5G technology. Future export bans could also affect more types of AI software.

See original here:
US announces AI software export restrictions - The Verge

Stare into the mind of God with this algorithmic beetle generator – SB Nation

God has an inordinate fondness for beetles, said, or so it is claimed, the British evolutionary biologist J. B. S. Haldane. On quantity alone, he was absolutely correct. There are about 400,000 species of beetle on the planet a cool 395,000 more than mammals can offer and while this sort of number-gaming is fraught with the risk of glibness, the assertion that beetles make up between a quarter and a third of extant animal species is probably not too far off.

Im on less firm ground if I assert that articles about machine learning make up between a quarter and a third of todays internet, but sometimes thats what it feels like. Normally Id be sorry for adding to the mass fervour for what mostly amounts to snake oil, but I think we have a special case today.

Machine learning is very bad at a lot of things, and frequently bad in surprisingly ways. But its very good at some things. Playing with datasets which combine cleanliness and predictability with mind-boggling diversity is, perhaps, The Thing it is best at. Happily, the long-tradition of scientific beetle-drawing has produced sheet upon sheet of beautiful, anatomically correct and aesthetically similar pictures. Piping those into a generative adversarial network gives you ... well, it gives you this.

BEHOLD! THE ALGORITHMIC BEETLE GENERATOR:

Despite this video being 100 percent shapeshifting beetles its also, somehow, extremely relaxing. I hope you enjoy it as much as I did. If so, you can get an extra kick from the mangled semi-beetles that constituted Cunicodes first attempt at this.

PS: Its funny to think that most of these machine-generated beetles probably already exist. An inordinate fondness, indeed.

More:
Stare into the mind of God with this algorithmic beetle generator - SB Nation

UN Letter: Chelsea Manning’s Imprisonment Is Torture – The Intercept

Former U.S. Army intelligence analyst Chelsea Manning addresses reporters before entering the Albert Bryan U.S. federal courthouse in Alexandria, Va., on May 16, 2019.

Photo: Win McNamee/Getty Images

On New Years Eve, as personal reflections on the last decade flooded in, Chelsea Mannings accounttweeted that she had spent 77.76 percent of her time since 2009 in jail. That same day, the United Nations Special Rapporteur on Torture Nils Melzer publiclyreleased a letter from late last year accusing the United States of submitting Manning to treatment that is tantamount to torture.

Such deprivation of liberty does not constitute a circumscribed sanction for a specific offense, but an open-ended progressively severe measure of coercion.

It does not take a U.N. expert to recognize the current conditions of Mannings incarceration as a form of torture. It is the very definition of torture to submit a person to physical and mental suffering in an effort to force an action from them. Since May, Manning has been held in a Virginia jail for refusing to testify before a federal grand jury investigating WikiLeaks. Manning has not been charged with or convicted of a crime. And her imprisonment on the grounds of civil contempt is explicitly coercive: If she agrees to testify, she can walk free. If she continues to remain silent, she can be held for the 18-month duration of the grand jury or, as the U.N. official noted, indefinitely with the subsequent establishment of successive grand juries.

Each day she is caged, Manning is also fined $1,000. If she is released at the end of the current grand jury, she will owe the state nearly $500,000 an unprecedented punishment for grand jury resistance. And Manning has made clear, she would rather starve to death than comply with the repressive grand jury system, a judicial black box historically deployed against social justice movements.

Such deprivation of liberty does not constitute a circumscribed sanction for a specific offense, but an open-ended progressively severe measure of coercion, Melzer, the U.N. special rapporteur, wrote of Mannings treatment. Melzers November letter, which was made public this week, stated that Mannings coercive imprisonment fulfills all the constitutive elements of torture or other cruel, inhuman or degrading treatment or punishment and should be discontinued or abolished without delay. The letter asks that the U.S. government provide factual and legal grounds for Mannings ongoing imprisonment and fines, especially after her categorical and persistent refusal to give testimony demonstrates the lack of their coercive effect.

Mannings supporters and legal team have long stressed that no such legal grounds exist. Manning has proven again and again that her grand jury resistance is unshakeable; the coercive grounds for imprisonment are thus undermined and her jailing is revealed to be purely punitive. Federal Judge Anthony Trenga, who ordered Mannings torturous incarceration, should be compelled to release her as a point of law, regardless of U.N. censure. This is not to say, however, that coercive incarceration is defensible in cases where it works to compel testimony it is not. Mannings resistance has highlighted the brutality of the practice tout court.

Mannings attorney, civil rights lawyer Moira Meltzer-Cohen, said that she hopes the U.N. officials letter calls greater attention to the use of coercive detention generally, as well as the specific cruel treatment of her client. While the United States has failed to live up to its human rights obligations, I remain hopeful that the government will reconsider its policies in light of the U.N.s admonition, Meltzer-Cohen said in a public statement. She also told me that the U.N. special rapporteurs recognition of Mannings refusal to be coerced can serve as further evidence to the judge.

In a statement from jail, Manning said, I am thrilled to see the practice of coercive confinement called out for what it is: incompatible with international human rights standards. The grand jury resister is, however, under no illusions about the U.S. governments willingness to flout its purported human rights obligations in the face of admonitions from the international community. As she put it, even knowing I am very likely to stay in jail for an even longer time, Im never backing down.

I am thrilled to see the practice of coercive confinement called out for what it is: incompatible with international human rights standards.

Indeed, as the U.N. special rapporteur noted, his predecessor wrote a number of appeals to the U.S. government from 2010 onwards regarding the cruel and torturous treatment to which Manning was subjected prior to and during her confinement in military prison. Yet her 35-year sentence was not commuted until 2017 by President Barack Obama. Manning noted in her New Years Eve tweet that she spent 11.05 percent of the last decade in solitary confinement and over half of her years behind bars fighting for gender affirming care. She attempted to take her own life twice during her time at the military prison in Fort Leavenworth, Kansas.

Suffice it to say, U.N. appeals have never secured Mannings liberty or safety. And as, Meltzer-Cohen noted in her statement on the U.N. officials letter, In the two months since the letter was conveyed to the United States, Ms. Manning has remained confined, and the daily fines imposed upon her have continued to accrue.

If the letter fails to sway the government, it should, at the very least, serve as a public reminder to support a political prisoner. Though the last decade of Mannings life has been marked by torture, she has responded with fierce resistance and struggle for liberatory social justice at every turn. In the tweet tabulating her last 10 years, Manning ended by noting that she devoted 0.00% of her time backing down. The U.N. special rapporteurs recognition of her refusal to be coerced is welcome. Our solidarity is more than deserved.

Link:
UN Letter: Chelsea Manning's Imprisonment Is Torture - The Intercept

Crisis of Conscience by Tom Mueller review what drives a whistleblower? – The Guardian

The whistleblower occupies an ambiguous and somewhat ghostly position in the pantheon of behavioural role models. Despised by the authority he or she betrays, the revealer of hidden corporate or governmental truths is seldom embraced as a hero by society at large.

Its true that film-makers are drawn to whistleblowers because their struggle the little guy up against the establishment can make for compelling drama: two fine examples being Michael Manns The Insider (starring Russell Crowe) and Gavin Hoods recent Official Secrets (starring fictionalised versions of several of this newspapers journalists).

But the chances are, most people who have seen those films wont remember the names of the whistleblowers they depict: respectively Jeffrey Wigand and Katharine Gun. Even after theyve gone public, whistleblowers tend to remain shadowy figures, cut off from the industries or positions that brought them to prominence, but with no new role to match the notoriety/celebrity briefly visited upon them.

Another reason for their marginal presence is suggested in Tom Muellers expansive study of the subject, Crisis of Conscience: Whistleblowing in an Age of Fraud. Many people who blow the whistle are able to do so precisely because they are not like most of us, or how were told to be, writes Mueller. Theyre not team players, not go along to get along personalities. They can be prickly and doctrinaire. They can seem obsessive, even unstable.

Reading this book, you get the strong sense that if the characters involved didnt start out that way, then they had every reason to develop in that direction. To go against the crowd and the prevailing ethos requires a certain independence of spirit, but to withstand the opprobrium, threats, financial ruin and sometimes imprisonment likely to come your way demands a psychological resilience that is bestowed on very few people who, as it were, look normal on television.

One obvious exception is Daniel Ellsberg, arguably the most famous America whistleblower of the 20th century (and Muellers focus is resolutely on the US), who also turns up in these pages. Photogenic and with a PhD from Harvard, Ellsberg exposed the US governments lies and deception over the Vietnam war when he handed classified documents to the New York Times. For disclosing the so-called Pentagon Papers he faced a 115-year jail sentence, but was found not guilty after a bizarre trial in which it was revealed that Watergate conspirators had broken into Ellsbergs psychiatrists office to steal Ellsbergs file.

Ellsberg remains the go-to guy for the media whenever a major act of whistleblowing hits the headlines, like Edward Snowdens revelations about the practices of the National Security Agency (NSA) in the US. Predictably, Snowden and Chelsea Manning are both referenced here in a wide-ranging analysis of intelligence whistleblowers.

Mueller points a critical finger at President Obama, who, he notes, had promised to protect whistleblowers when running for office but once in the White House condemned national security whistleblowers more harshly than any other president in history.

Obama drew, or at least attempted to draw, a distinction between whistleblowers and traitors, but if thats a clear line, its one that different people place in different positions, usually depending on their own relationship to power.

Mueller is a little surprised to find that corporate and governmental whistleblowers have more in common than he first assumed. At their core all are concerned with an ethical crisis of some kind and the binding group mentality against which they turn. Perhaps the most troubling stories in the book are those that operate between the two gravitational fields of big business and government.

Take the case of Allen Jones, an investigator at the Office of the Inspector General in Harrisburg, Pennsylvania. One day he discovered that a cheque for $2,000 had been placed in an unregistered bank account of the states chief pharmacist. In the grand scheme of things, it was a tiny figure, but on closer inspection it turned out to be a loose pebble that started an avalanche.

Through diligently following the money, Jones discovered that a subsidiary of Johnson & Johnson had persuaded the states of Pennsylvania and Texas to require all doctors at state facilities to use atypical antipsychotics for a variety of conditions, which cost up to 45 times more than the drugs they replaced, though they produced no better results and had more disturbing side-effects.

For his trouble, Jones was ordered by the office of the Republican governor of Pennsylvania to stop his investigations and, when he didnt, he was moved away and, after going public, drummed out of his job. He sued his employers and those responsible but the defendants were granted immunity, he lost his house and had to settle for such a negligible amount that, after paying his creditors, he was left with just $1,200.

No one likes a snitch, they say in criminal circles. If theres one thing beyond all others that Mueller conveys to the reader, its that those circles are a lot bigger than you might think.

Crisis of Conscience: Whistleblowing in an Age of Fraud by Tom Mueller is published by Atlantic (14.99). To order a copy go to guardianbookshop.com. Free UK p&p over 15

More here:
Crisis of Conscience by Tom Mueller review what drives a whistleblower? - The Guardian

Bruce Perens quits Open Source Initiative amid row over new data-sharing crypto license: ‘We’ve gone the wrong way with licensing’ – The Register

Special report Last year, lawyer Van Lindberg drafted a software license called the Cryptographic Autonomy License (CAL) on behalf of distributed development platform Holo and submitted it to the Open Source Initiative (OSI) for approval as an Open Source Definition-compliant (OSD) license.

The debate over whether or not to approve the license, now in its fourth draft, has proven contentious enough to prompt OSI co-founder Bruce Perens to resign from the organization, for a second time, based on concern that OSI members have already made up their minds.

"Well, it seems to me that the organization is rather enthusiastically headed toward accepting a license that isn't freedom respecting," Perens wrote in a missive to the OSI's license review mailing list on Thursday. "Fine, do it without me, please."

Perens, for what it's worth, drafted the original OSD.

Another open-source-community leader familiar with the debate who spoke with The Register on condition of anonymity claimed Lindberg lobbied OSI directors privately to green-light the license, contrary to an approval process that's supposed to be carried out in public.

"I don't think that's an appropriate characterization," said Lindberg, of law firm Dykema, in a phone interview with The Register. "I think there are number of people who from the beginning made up their minds about the CAL. You'll see a lot of people jumping onto any pretext they can find in order to oppose it."

"With regard to this idea of lobbying, there have been procedural-type communications that I think are entirely reasonable," he added. "But all the substantive debate has been on the license review and license discussion forums."

In an interview with The Register, Pamela Chestek, chair of the OSI's license review committee, said she was not aware of whether Lindberg had approached other OSI board members to lobby for the CAL.

"I do know people seemed to think there was something going on what wasn't going on," she said.

Chestek explained that the OSI board is generally happy to consult with parties in advance of a license review. "I did have a phone conversation in that context to help him understand what the issues are with the license," she said. "I think that communication may have been misunderstood."

Perens, in a phone interview with The Register, explained that the OSI has existed for 21 years and has been approving software licenses during that time. There are more than 100 such licenses, he said, and having that many is harmful to the community because when you combine software with multiple licenses, that creates a legal burden.

"Most people who develop open source don't have access to lawyers," he said. "One of the goals for open source was you could use it without having to hire a lawyer. You could put [open source software] on your computer and run it and if you don't redistribute or modify it, you don't really have to read the license."

Perens contends the CAL breaks that model. "The reason it does is if you are operating software under the CAL and you have users, you have the responsibility to convey the user's data back to them under certain conditions," he explained.

The reason for this, he said, is that Holo expects to oversee a network of CAL-licensed applications, and they don't want those creating clients for the distributed platform to sequester data from users to lock users in.

As Lindberg explained in a post about the CAL back in March, "You must refrain from using the permissions given under this License to interfere with any third partys Lawful Interest in their own User Data."

Holo's software is "a hashchain-based application framework for peer-to-peer applications." It's essentially a platform that allows software developers to create distributed applications secured by cryptographic code. The reason developers might want to do so is that distributed applications spread infrastructure costs among network participants rather than saddling the developer with the cost of a centralized server.

According to Holo co-founder Arthur Brock, distributed peer-to-peer software needs a license that addresses cryptographic key rights, which is why the CAL has been proposed.

"We are trying to say: the only valid way to use our code is if that developers end-users are the sole authors and controllers of their own private crypto keys," he wrote in a post last year.

Lindberg said the CAL is applicable to current web applications but it more meaningful in the context of distributed workloads and distributed computation, which he contends will become more important as people seek alternatives to the centralization of today's cloud-based systems.

"A lot of people are very concerned about this concept of owning your data, owning your compute, having the ability to really control your computing experience and have it not be controlled by your cloud provider," said Lindberg.

Perens said, "It's a good goal but it means you now need to have a lawyer to understand the license and to respond to your users."

Perens said he resigned because the OSI appears to have already decided to accept the license. He said he's headed in a different direction, which he called "coherent open source."

"We've gone the wrong way with licensing," he said, citing the proliferation of software licenses. He believes just three are necessary, AGPLv3, the LGPLv3, and Apache v2.

Chestek said the OSI has been aware for years that it's undesirable to have too many software licenses, pointing to the organization's long-standing anti-proliferation policy. The CAL, she said, has some novel aspects, specifically its data provision requirement.

"If someone uses this license to provide services, they also have an obligation to provide data," she said. "That's an entirely new concept for open source licenses."

"It's interesting because we are having a merger of data and software," Chestek opined. "It's getting harder to tell where the line is. I think it's worthwhile for the OSI to consider this."

In response to the concern voiced by Perens about that software licenses show signs of mission creep by attempting to address aspects of behavior traditionally addressed through public law or other mechanisms, Chestek acknowledged that's a matter of ongoing discussion at the OSI.

"What is it that's appropriate for a software license to do?" she said, pointing to another license facing OSI review, the Vaccine License, which "requires that users vaccinate their children, and themselves, and that user businesses make a similar requirement of their employees, to the greatest extent legally possible."

Asked whether the OSI plans to approve the CAL, Chestek said she doesn't yet have an opinion. "It's still under active discussion," she said.

However, she said that Lindberg has made a great effort to work with the OSI during the review process. "It has taken a long time," she said. It's a very painful process to go through. That's the way the system is supposed to work."

Even so, there are those who would see the process take longer still.

"[T]he policy implications of OSI volunteers interactively drafting a very novel copyleft license with a for-profit entity's lawyer and then approving it quickly really concern me," wrote Software Freedom Conservancy policy fellow Bradley Kuhn, in a post to OSI's license review list.

"Licenses function as legislation of our community. Yes, lobbyists often write our legislation, but that rarely generates good outcomes for the Republic and its people."

Read more from the original source:
Bruce Perens quits Open Source Initiative amid row over new data-sharing crypto license: 'We've gone the wrong way with licensing' - The Register

Open Source Software Market Technology, Regional Outlook, Competitive Strategies And Forecast from 2020 2025 – Instanews247

The Global Open Source Software Market covers important aspects of this market concerning fundamental parameters. The report explains outline of the business range, concentrating on the overall industry, development possibilities, types and application. It brief Open Source Software summary of the market considering the current and future scenarios. It also provides information in terms of development and its capacities.

The Open Source Software industry analysis size, share, growth, trends, and forecasts 20202025. The Open Source Software report help to analysis players to improve their business strategies and helpful data. It shows key players in the worldwide market and trends about methodologies utilizing to separate themselves from other players. The analysis involves a broad outline of the Open Source Software market information on different particular divisions. The Open Source Software research report gives a pestal analysis rely upon the total market, available size, development scene, and analysis.

Detailed TOC along with also Charts and Tables of Open Source Software Market Research Report accessible at: https://www.futuristicreports.com/request-sample/399

Advanced Medical Solutions Group, B. Braun, Cardinal Health, Integra LifeSciences, C. R. Bard, Cohera Medical, Baxter International, CSL Behring, Cryolife, Johnson and Johnson

This Open Source Software report explores feasibility with an objective of educational new entrants in regards to the changes within the market. The description, thorough SWOT analysis & investment analysis is given which Open Source Software predictions are impending opportunities for its players.

Geographically, global Open Source Software market report offers segment research and export and import status, require status, production volume, including regions such as North America, South America, Europe, China, Japan, India, The Middle East & Africa, Others.

Get it in Discounted Price: https://www.futuristicreports.com/check-discount/399

The Open Source Software market gives fundamental data about the significant difficulties that will impact on development. Furthermore gives in general insights concerning the business. The report will help the current market to inspect the different aspects on growing their business.

It provides in-depth study on the current state of the global Open Source Software industry with focused growth. The report provides key statistics. The report provides an in-depth insight of 2020-2025 global Open Source Software covering all important parameters.

Enquire more at: https://www.futuristicreports.com/send-an-enquiry/399

Company Name: Futuristic Reports

Email: [emailprotected]

Visit our website: https://www.futuristicreports.com

Phone: +1 (408) 520 9037

Address: 2066 N. Capitol Ave, Suite 3041

City: San Jose, CA 95132

Country: United States

Continue reading here:
Open Source Software Market Technology, Regional Outlook, Competitive Strategies And Forecast from 2020 2025 - Instanews247

Volvo invests in autonomous car software developer Apex – Robotics and Automation News

Volvo Group Venture Capital has invested in Apex.AI, a developer of software for autonomous cars and mobility.

Volvo says the investment will fund the development of a safety-certified software framework for autonomous systems.

Apex, a Palo Alto, California-based company founded in 2017, is building an automotive-grade version of Robot Operating System, an established open source software framework commonly used in robotics and autonomous systems research.

Apex says it provides a safer and more reliable version of ROS that will be certified according to the functional safety standard ISO 26262, adding that this enables companies to take their autonomous vehicle projects into production.

Anna Westerberg, acting CEO of Volvo Group Venture Capital and SVP Volvo Group Connected Solutions, says: We are excited to invest in a company that enables easier development of safety-certified systems.

Dan Tram, the Silicon Valley-based investment director of Volvo Group Venture Capital, says: Apex.AI has a promising product offering with important commercial deployment potential for autonomous systems.

The role of Volvo Group Venture Capital is to make investments in innovative companies at the forefront of service orientation as well as product differentiation and to support collaboration between startup companies and the Volvo Group.

Volvo Group Venture Capital says that, based on the trends shaping the future of transportation and Volvo Group strategic priorities, its investment areas are:

You might also like

Continued here:
Volvo invests in autonomous car software developer Apex - Robotics and Automation News