Open-sourced Blockchain Technologies Bring Back Cross-border Tours between Chinese Mainland and Macao – PRNewswire

SHENZHEN, China, Oct. 19, 2020 /PRNewswire/ -- From September 23 onwards, Chinese mainland resumed issuing visas for visitors to Macao. Thanks to the mutual recognition system of Macao blockchain health code and Guangdong health code launched in May, mainland Chinese tourists can apply and use Guangdong health code to verify their health status when entering Macao. Up to date, more than 17 million people have cleared customs between Chinese mainland and Macao using the blockchain system. The average time of receiving, transforming, and generating the health code for the first time is only 100 seconds. And it will only take less than 3 seconds to complete the procedure when traveler clears customs again.

In May, Servios de Sade de Macau (SSM) and Macao Science and Technology Development Fund (FDCT) became the first to establish a blockchain-based health code system to fight the epidemic - Macao blockchain health code. It serves as an electronic pass for residents to access public places. It is a coherent part of Macao's epidemic prevention measures and is later extended to add the mutual recognition mechanism with the Chinese mainland's Guangdong health code system. Due to the epidemic, Macao suspended tourist visa application in January 2020. The establishment of Macao blockchain health code and the mutual recognition mechanism with Guangdong health code greatly improves the efficiency and accuracy of information verification across borders. It proves to be an effective solution to bring travel between Chinese mainland and Macao back to normal.

Macao blockchain health code is implemented based on China's open-source blockchain platform FISCO BCOS and WeIdentity for reliable information verification across organizations.

Mutual recognition of health codes across jurisdictions has a major challenge to overcome the information security and privacy protection regulations in both Chinese mainland and Macao. Health authorities in Chinese mainland and Macao need to verify the health information submitted by users crossing the border and yet they are not supposed to exchange data directly with each other to stay in compliance with their corresponding regulations. The way WeIdentity solution works - IDs and personal health data are encrypted to verifiable digital credentials signed by the issuing authorities and recorded on the consortium blockchain network serving the participating organizations. Users transmit data to the receivers directly via a secured communication channel. Receivers will be able to verify the integrity of the data received by comparing with the corresponding digital credentials as recorded on blockchain. Such a blockchain-based solution on one hand offers a robust data verification mechanisms among trusted parties, while at the same time ensures that the generation and the use of the Macao health code fully comply with the Personal Data Protection Act of Macao.

In addition, the mutual recognition mechanism enables the seamless conversion of health codes for the users without the need to fill in personal information repeatedly on different platforms, offering great convenience and ease of use for cross-border travelers.

With FISCO BCOS and WeIdentity, a robust solution is created to overcome the challenge faced by health authorities and border controls around the world and apparently offers an answer on how to enable cross-border travel once again during the time of a pandemic.

SOURCE FISCO BCOS

More:

Open-sourced Blockchain Technologies Bring Back Cross-border Tours between Chinese Mainland and Macao - PRNewswire

3 of the Most Common Python Security Vulnerabilities | EC-Council CodeRed Blog – EC-Council Blog

Python is one of the fastest-growing programming languages in the world. According to Slashdata, there are 8.2 million active python users in the world. It is mostly used by Software Engineers but also by Mathematicians, Data Analysts, and students for various purposes like automation, artificial intelligence, big data analysis, and for investment schemes by the fintech companies. However, regardless of what computer language you use, the language is never secure on its own. It entirely depends on how you use the language. The same applies when it comes to Python, which is why Python Security is highly essential.

But, before we go there, lets talk about what Python is.

Unlike other programming languages, Python is a general-purpose coding language. You can use it for other types of programming and software development, aside from web development. It is highly readable as it uses English keywords when other programming languages use punctuation. It also has fewer syntactical construction than the other language.

Python is an open-source programming language. Even the source codes for python are freely available to download and distribute for commercial use.

With features like faster execution, readability, and code clarity provides a seamless experience.

The source code in python syntax as a whole is interpreted line by line at one go.

Rich in libraries and frameworks, it supports web development, data science, and machine learning, therefore increasing the programmers productivity.

Python is more than 30 years old and has a more matured community of developers and users as compared to any programming language

It has powerful control capabilities as it can invoke directly through C, C++, or Java. Python also processes XML and other markup languages with the same byte code.

Python is a top-notch programming language for aspirants with a technical and non-technical background. They can immediately start coding as it is like learning how to read and write.

Python developers have the highest paid salaries in the IT industry. The average Python Developer salary in the United States is approximately $79,395 per year. Python can be effective in a myriad of areas, a few of which are:

Due to Pythons competence, its used in the areas mentioned above and in web-scraping applications, audio and video applications, cad applications, embedded applications, testing frameworks, and automating tasks.

While Python is extremely helpful and widely used, it is not 100% secure from cyber threats like any scripting language. In fact, one of the most common is Python backdoor attacks. For example, Iran used a MechaFlounder Python backdoor attack against Turkey last year.

Here are some of the most common Python-based risks:

Some of the more popular injection attacks are SQL injection attacks and command injection attacks. These types of attacks can impact not just the language but the environment as a whole.

Its normal for files to load and parse XML files if you are in the habit of using an XML standard library module, especially external XML files. Most of these attacks are DoS and DDoS styled attacks that aim to crash the system instead of infiltrating it.

Testing a file is always good; however, beware of creating temp files using the mltemp() function as a different process may also create a file with this name to attempt to load the wrong data or expose other temporary data.

It has become important to secure your network and data with the increase in data breaches regularly.

Here are some ways you can ensure Python security:

However, if you are looking for a more detailed approach to Python security, take a look at EC-Councils Microdegree program.

The EC-Councils Python Security Microdegree program teaches you Python programming, such as data structures, string operations, OOPS concepts, file interaction, and database management. It also covers advanced programming like parallel processing, decorators, and generating cross-platform programs. This course will also teach you about cybersecurity applications like socket programming, packet capturing, parsing, and integrating other languages for Python cryptography, metadata analysis, and password cracking.

The benefit of this Microdegree program is that world-class industry experts will teach you in a self-paced, video-based training that comes with an option to perform hands-on live exercises via our Cyber Range, iLabs with 55+ hands-on virtual labs and assessment to help you establish as a secure programmer

Learn more about EC-Councils CodeRed Microdegree programs

FAQs

1. Where is Python mostly used?

Python is popular and widely used in various industry sectors like insurance, finance and fintech companies, healthcare, entertainment, startups, and many more. Python is extensively being used in Data Science and Machine Learning domain. It is highly being considered one of the most demanded career paths.

2. What can you do with Python code?

Due to the simplicity of the language, it can be used in any scenario. As Python is a scripting language for web applications, it can be used in automating tasks boring things, thus making them more efficient. One can learn to create games according to their preference. You can also learn to build stunning things like fingerprint identification scanner, predicting stocks, and spam detection. You can also learn to build futuristic robots.

Read this article:

3 of the Most Common Python Security Vulnerabilities | EC-Council CodeRed Blog - EC-Council Blog

The Apache Software Foundation Celebrates 20 Years of OpenOffice – GlobeNewswire

Wakefield, MA, Oct. 14, 2020 (GLOBE NEWSWIRE) -- The Apache Software Foundation (ASF), the all-volunteer developers, stewards, and incubators of more than 350 Open Source projects and initiatives, announced today the twenty-year anniversary of OpenOffice, the last eight of which as an Apache Top-Level Project.

"It's inspiring to see so many dedicated people from around the world volunteer their time to mentor, contribute code, test issues, moderate mailing lists, help on forums, translations, marketing and more to keep making this great product better and available for millions of users," said Carl Marcum, Vice President of Apache OpenOffice. "OpenOffice is more than just software. It's a great community that I'm glad to be a part of."

With more than 300 million downloads, Apache OpenOffice is used by countless individuals, organizations, and institutions around the world who are seeking a reliable, robust, and freely-available Open Source office document productivity suite. Apache OpenOffice features the following applications for Windows, macOS and Linux:

Apache OpenOffice supports more than 120 languages, 41 of which are officially maintained and released by the Project. Apache OpenOffice is the productivity suite of choice for governments seeking to meet mandates for using ISO/IEC standard Open Document Format (ODF) files.

Originally created as "StarOffice" in 1985 by StarDivision, who was acquired by Sun Microsystems in 1999. The project was open-sourced under the name "OpenOffice.org", and continued development after Oracle Corporation acquired Sun Microsystems in 2010. OpenOffice entered the Apache Incubator in 2011 and graduated as an Apache Top-level Project in October 2012.

"At Apache OpenOffice, we are very excited about 20 years of OpenOffice," said Marcus Lange, ASF Member and Apache OpenOffice Committer since the project first arrived at the ASF. "Countless users, developers and friends have made it possible that we can today celebrate this incredible anniversary. Their commitment makes me believe that we will see many more years of this great Open Source productivity suite."

"The need and, in fact, the demand, for a permissively licensed Open Source office suite, available to the masses and not just the privileged few fortunate enough to have the latest hardware and software, has never been greater within the last two decades," said Jim Jagielski, ASF co-Founder and Apache OpenOffice incubating mentor. "Apache OpenOffice exists to provide essential functionality, with as few licensing restrictions as possible, to the world at large. It is truly a noble mission, and I am honored to be a small part of it."

"As a long-term user, I joined the project in 2016 to give something back," said Matthias Seidel, Committer and member of the Apache OpenOffice Project Management Committee. "After a steep learning curve, I am proud to be part of the community that provides this great software for the public good and benefits millions worldwide."

Apache OpenOffice is available as a free download to all users at 100% no cost, charge, or fees of any kind. OpenOffice source code is readily available for anyone who wishes to enhance the applications. The Project welcomes contributions back to the project, its code, and its community. Those interested in participating with Apache OpenOffice can find out more at https://openoffice.apache.org/get-involved.html .

Availability and OversightAs with all Apache projects, OpenOffice software is released under the Apache License v2.0 and is overseen by a self-selected team of active contributors to the project. A Project Management Committee (PMC) guides the Project's day-to-day operations, including community development and product releases. For project data, documentation, and more information on Apache OpenOffice, visit https://openoffice.apache.org/ and https://twitter.com/ApacheOO .

12 releases have been made under the auspices of the ASF. The project strongly recommends that users download OpenOffice only from the official site https://www.openoffice.org/download/ to ensure that they receive the original software in the correct and most recent version.

About The Apache Software Foundation (ASF)Established in 1999, The Apache Software Foundation (ASF) is the worlds largest Open Source foundation, stewarding 227M+ lines of code and providing more than $20B+ worth of software to the public at 100% no cost. The ASFs all-volunteer community grew from 21 original founders overseeing the Apache HTTP Server to 813 individual Members and 206 Project Management Committees who successfully lead 350+ Apache projects and initiatives in collaboration with 7,900+ Committers through the ASF's meritocratic process known as "The Apache Way". Apache software is integral to nearly every end user computing device, from laptops to tablets to mobile devices across enterprises and mission-critical applications. Apache projects power most of the Internet, manage exabytes of data, execute teraflops of operations, and store billions of objects in virtually every industry. The commercially-friendly and permissive Apache License v2 is an Open Source industry standard, helping launch billion dollar corporations and benefiting countless users worldwide. The ASF is a US 501(c)(3) not-for-profit charitable organization funded by individual donations and corporate sponsors including Aetna, Alibaba Cloud Computing, Amazon Web Services, Anonymous, Baidu, Bloomberg, Budget Direct, Capital One, Cerner, Cloudera, Comcast, Facebook, Google, Handshake, Huawei, IBM, Inspur, Pineapple Fund, Red Hat, Target, Tencent, Union Investment, Verizon Media, and Workday. For more information, visit http://apache.org/ and https://twitter.com/TheASF

The Apache Software Foundation. "Apache", "OpenOffice", "OpenOffice.org", "Apache OpenOffice", and "ApacheCon" are registered trademarks or trademarks of the Apache Software Foundation in the United States and/or other countries. All other brands and trademarks are the property of their respective owners.

# # #

Go here to see the original:

The Apache Software Foundation Celebrates 20 Years of OpenOffice - GlobeNewswire

Just the Tip of the Iceberg: DOJs Antitrust Suit Against Google Is a Full-Frontal Attack on Big Tech – Law & Crime

The U.S. Department of Justice (DOJ) and 11 state attorneys general filed a long-anticipated antitrust lawsuit in federal court on Tuesday alleging that Google maintains a monopoly in violation of federal law.

Two decades ago, Google became the darling of Silicon Valley as a scrappy startup with an innovative way to search the emerging internet, the complaint filed in the U.S. District Court for the District of Columbia begins. That Google is long gone.

The Google of today is a monopoly gatekeeper for the internet, and one of the wealthiest companies on the planet, with a market value of $1 trillion and annual revenue exceeding $160 billion, the complaint continues. For many years, Google has used anticompetitive tactics to maintain and extend its monopolies in the markets for general search services, search advertising, and general search text advertisingthe cornerstones of its empire.

Filed under the auspices of the Sherman Antitrust Act, Mondays filing is the result of a year-long investigation and will likely take several years to litigateif the incoming administration even decides to maintain the case.

The Barack Obama administration was serially criticized for failure to hold large technology companies accountable for perceived violations of the countrys anti-monopoly laws even though European regulators have exacted several concessions and repeatedly fined companies such as Google over the last decade. This reticence may be explained by the Democratic Partys strong associations with Googlea trend that Obama in particular exacerbated during his time in office.

The lawsuit alleges that Googles vast suite of anticompetitive behavior has separately and collectively harmed competition by stamping out any meaningful competition in the realm of general internet search services, by excluding would-be rivals from effective and already-available distribution channels that would allow them to effectively compete and by impeding other potential distribution paths in general.

Additionally, the lawsuit claims that Googles tactics create a nearly impenetrable wall of barriers to entry for potential competitors on both desktop and mobile devices and that such tactics actually stunt innovation overallwhile insulating Google from having to actually do much in the way innovation or product improvement.

The heart of the DOJs case against the technology giant focuses on Googles exclusionary agreements and distribution agreements that have served the tech behemoth well by making multiple Google products the default access point for internet searches and other services across millions of desktop and mobile devices.

Between its exclusionary contracts and owned-and-operated properties, Google effectively owns or controls search distribution channels accounting for roughly 80 percent of the general search queries in the United States, the complaint notes. Largely as a result of Googles exclusionary agreements and anticompetitive conduct, Google in recent years has accounted for nearly 90 percent of all general-search-engine queries in the United States, and almost 95 percent of queries on mobile devices.

The lawsuit mentions several such agreementsspotlighting Googles partnerships with Apple and Android device manufacturers.

Google has contracted with Apple for many years to preset Googles search engine as the default for Apples Safari browser and, more recently, other search access points on Apples mobile devices, the complaint notes. When a consumer takes a new iPhone or iPad out of its box, all the significant access points default to Google as their general search provider. Indeed, Google has preset default status for an overwhelming share of the search access points on mobile devices sold in the United States.

Per the DOJ, Apples business relationship with Google is essentially an anticompetitive version of the quid pro quo [emphasis in original]:

Apple has not developed and does not offer its own general search engine. Under the current agreement between Apple and Google, which has a multi-year term, Apple must make Googles search engine the default for Safari, and use Google for Siri and Spotlight in response to general search queries. In exchange for this privileged access to Apples massive consumer base, Google pays Apple billions of dollars in advertising revenue each year, with public estimates ranging around $812 billion. The revenues Google shares with Apple make up approximately 1520 percent of Apples worldwide net income.

Although it is possible to change the search default on Safari from Google to a competing general search engine, few people do, making Google the de facto exclusive general search engine. That is why Google pays Apple billions on a yearly basis for default status. Indeed, Googles documents recognize that Safari default is a significant revenue channel and that losing the deal would fundamentally harm Googles bottom line. Thus, Google views the prospect of losing default status on Apple devices as a Code Red scenario. In short, Google pays Apple billions to be the default search provider, in part, because Google knows the agreement increases the companys valuable scale; this simultaneously denies that scale to rivals.

A similar situation has developed with Google and the companies that create Android-based mobile devices.

The lawsuit notes that Google uses preinstallation agreements which force manufacturers to pair devices running the Android operating system with Googles own cash-generating products to ensure that its entire suite of search-related products is given premium placement.

Other contracts, such as those focused on revenue sharing, force manufacturers into doing the samebut also expressly foreclose against manufacturers featuring apps developed by Googles competitors. Still other contracts inhibit startups from actually doing much with Androids technically open source code because they threaten would-be developers with losing access to Googles entire network if the company deems them guilty of so-called fragmentation.

All of this, the DOJ and the states claim, are the makings of a monopolistic monster.

Absent Googles exclusionary agreements and other conduct, dynamic competition for general search services would lead to higher quality search, increased consumer choice, and a more beneficial user experience, the filing alleges.

But theres likely an awful lot more in the offing.

[T]he complaint centers on Googles contracts with device manufacturers running Android and the way those contracts preference Google to lock in its dominance in Internet search and mobile search, antitrust law expert and University of Michigan Law Professor Daniel A. Crane told Law&Crime in an email.

Its a bit of a surprise that the complaint is so focused on anticompetitive vertical agreements as opposed to other things that many critics accuse Google ofsuch as the design of its search verticals and the way it sells advertising, Crane continued. But those additional claims may well come out in further complaints to be filed shortly. So consider this just the tip of the iceberg.

Read the full complaint below:

US v Google Complaint by Law&Crime on Scribd

[image via ALASTAIR PIKE/AFP/Getty Images]

Have a tip we should know? [emailprotected]

See the original post here:

Just the Tip of the Iceberg: DOJs Antitrust Suit Against Google Is a Full-Frontal Attack on Big Tech - Law & Crime

Steal This Secret: CIA Does Exactly What it Accuses Julian Assange of Doing – Progressive.org

Over the past few decades, several directors of the U.S. Central Intelligence Agency (CIA) have openly admitted to doing exactly what U.S. officials are now accusing WikiLeaks founder Julian Assange of doing: stealing the secrets of other nations.

Lets be blunt about what we do, Tenet said. We steal secrets for a living. . . . I do not know how else to tell people what we do.

As Assange faces extradition to the United States over his role in publishing classified information, U.S. officials are charging him with conspiring to steal classified information, an action that the CIA conducts on a routine basis.

Hell yeah, we steal secrets, Mike Pompeo acknowledged in 2017, when he was the director of the CIA. Thats what we do. Its in our charter.

WikiLeaks denies its own engagement in this practice, saying it does not steal, but reveals. The organization identifies itself as a media organization that specializes in publishing secret information about war and espionage. In recent years, WikiLeaks has partnered with several leading news organizations, including The New York Times, to expose lies, misconduct, and criminal activities by governments around the world.

U.S. officials, on the other hand, repeatedly brag that they steal secrets. They argue that their efforts are noble and legitimate.

We make no apologies for doing so, Pompeo said in 2017. Its hard stuff and we go at it hard.

Some of the confusion over WikiLeaks is attributable to a 2013 documentary film titled We Steal Secrets: The Story of WikiLeaks. The films title, We Steal Secrets, does not come from WikiLeaks but is actually a quote from General Michael V. Hayden, a former CIA director who boasted in the film about the U.S. governments involvement in espionage.

We steal other nations secrets, Hayden said.

Critics of WikiLeaks have also sown doubts about the organization by accusing it of interfering in the 2016 presidential election. In the months before the election, WikiLeaks repeatedly published damaging information about Hillary Clinton and the Democratic Party that was allegedly stolen by hackers.

The U.S. government has indicted a dozen Russian officers for conspiring to hack into the computers of the Democratic National Committee and Clintons presidential campaign, but it has not charged WikiLeaks with stealing those documents. The U.S. governments attempt to prosecute Assange stems from unrelated events that took place several years earlier, such as his effort to help protect Chelsea Manning, another one of his sources.

If Assange is extradited to face charges for practicing journalism and exposing government misconduct, Noam Chomsky and Alice Walker warned in an op-ed last month in the Independent, the consequences for press freedom and the publics right to know will be catastrophic.

Attempts to portray WikiLeaks as an organization that steals secrets are all the more confounding given the long history of CIA directors openly acknowledging that they oversee a vast and sweeping infrastructure to steal the secrets of other nations.

In 1998, Director of Central Intelligence George Tenet told the editorial board of Studies in Intelligence that one of the core functions of the CIA is stealing secrets. Lets be blunt about what we do, Tenet said. We steal secrets for a living. . . . I do not know how else to tell people what we do.

Despite such admissions, the official CIA line is that, as CIA Director John Brennan told National Public Radio in 2016, Everything we do is consistent with U.S. law.

Some of the strongest pushback to this claim came from the intelligence community, as a number of former intelligence agents castigated Brennan for misrepresenting their work.

Every aspect of what the CIA does overseas is illegal, John Maguire, a retired CIA officer, told NBC News. We dont solicit secretswe steal them. What does he call breaking into an embassy?

Brennans remarks caused such an uproar in the intelligence community that one of his successors, Mike Pompeo, made it a point to rebut his comments. In several defiant talks and speeches in 2017, Pompeo insisted that the purpose of the CIA is to conduct espionage, which he defined as the art and science of running assets and stealing secrets.

The CIA, to be successful, must be aggressive, vicious, unforgiving, relentlessyou pick the word, Pompeo said.

While CIA officials boast about their mission of stealing secrets, U.S. officials continue tarnishing WikiLeaks. Pompeo has described WikiLeaks as a non-state hostile intelligence service.

Undoubtedly, the CIA has a strong motive for discrediting WikiLeaks. In early 2017, WikiLeaks published a trove of documents that allege to show how the CIA hacks into computers and smartphones. The documents indicate that the CIA employs a vast array of tools to steal secrets from its targets.

Given the hundreds of thousands of additional documents that WikiLeaks has published over the past several years, the organization has clearly been in the work of publishing information, not stealing it. While U.S. officials attempt to discredit Assange by portraying him as a criminal hacker, the Central Intelligence Agency remains at the forefront of stealing secrets, just as multiple former directors have acknowledged.

We lied, we cheated, we stole, Pompeo acknowledged in a talk last year, in reference to his earlier work at the CIA. We had entire training courses.

Read the original post:

Steal This Secret: CIA Does Exactly What it Accuses Julian Assange of Doing - Progressive.org

Julian Assange and the fight against digital capitalism – Green Left

Julian Assange, the founder of WikiLeaks, is facing potential extradition to the United States for exposing the US empires war crimes.

See also

Assange faces charges under the US Espionage Act and the Computer Fraud and Abuse Act. The warrant lists 17 counts of violating the Espionage Act on which he could be jailed for up to 175 years, and one count of conspiracy with Chelsea Manning to carry out her Cablegate leak. Now known as the Public Library of US Diplomacy, it is a collection of 3,326,538 US diplomatic cables from 274 consulates and embassies dating between 1966 and 2010. The cables greatly infuriated the plutocracy and its supporters.

Following the release of the first batch of US diplomatic cables, WikiLeaks and Assange were denounced as terrorists by politicians and pro-establishment commentators.

Republican Sarah Palin called Assange an anti-American operative with blood on his hands, urging his immediate incarceration by any means necessary. Fox News commentators called WikiLeaks a terrorist organisation, asking the US government to move against it.

In a 2010 interview with CBC, Canadian academic Tom Flanagan said: I think Assange should be assassinated actually, I think Obama should put out a contract and use a drone or something I wouldnt be unhappy if Assange disappeared.

In addition to the Cablegate leak, WikiLeaks released a trove of classified documents detailing atrocities by US and allied forces in Afghanistan and Iraq between July and October 2010.

Known as the Afghan War Diary (90,000 reports) and Iraq War Logs (400,000 reports), they are the largest leaks in US military history. They revealed the inconceivable brutality of imperialist wars waged by the US and its subservient partners, including the use of psychological warfare, rendition, torture and mass civilian deaths through targeted killings and air strikes.

In Afghanistan, the imperialist forces tried to conceal such murders by simply paying off the families of the victims to keep them quiet.

In Iraq, the number of civilian deaths was estimated at more than 100,000, many of them unreported or reclassified as enemy casualties to cover up the scale of the killings.

The most glaring example of this is the WikiLeaks-released video Collateral Murder - a classified recording of US Army Apache helicopters firing on unarmed civilians in Baghdad on July 12, 2007. More than 12 civilians were killed, including two Reuters reporters, and two children were injured. The victims of that senseless violence were all listed as enemies killed in action.

Assanges use of the internet to punch holes in the architecture of imperialism exposes one of the fundamental contradictions of digital capitalism: the antagonism between digital capital and the digital commons.

Whereas the capitalist class tries to consolidate the logic of capital accumulation through networked digital productive forces, alternative projects work simultaneously to re-appropriate the internet for the advancement of social goals.

While digital capitalism deepens exploitation, it also creates new foundations for autonomous realms that transcend the logic of capitalism. It creates the foundations for new relations of production that evolve within capitalism.

Assange tried to disrupt the normal workings of digital capitalism by eliminating one of the primary principles of contemporary times: zero privacy for the powerless and extreme secrecy for the powerful.

By severely rupturing the wall of secrecy built by powerful elites, Assange furthered a project comprising the digital commons, platform cooperatives, and a public-service internet that would coalesce into a powerful collective force for humanity.

This politico-economic project proved to be a big threat to the existing capitalist economy, which prioritises surveillance, capital accumulation and militarism.

For that reason, we need to look at the present-day accumulation regime, to understand why Assange is being so ruthlessly punished.

In todays age of digital capitalism, corporations and states are collecting, storing and processing huge centralised databases of information about the worlds netizens. This enables them to gather traits about people (such as their religion, political affiliations and behavioural tendencies) that individuals do not disclose.

The data is then used to micro-manage and manipulate individuals and organisations in the interest of profit and capitalist power consolidation.

Data has increasingly become a central component for companies to remain competitive, and has become essential for economic processes - from controlling workers, outsourcing production processes, record-keeping, marketing and sales, to combat and repression.

Internet-based companies often make their revenue by serving up personalised advertisements; political consultants analyse data to decide who is predisposed to specific types of messaging and influence; predictive policing systems use data to create heat lists and hot spots that identify people and locations with a high probability of disruptive activity. Police units make use of social media as an important investigative tool to monitor potential suspects.

The huge digital industry where companies called data brokers aggregate thousands of data points about each individual person, capture our personal information and classify us according to various metrics is inevitably intrusive and uses surveillance tactics.

In order to derive profit from data, data miners make use of automated sorting mechanisms like Artificial Intelligence (AI), which analyses big datasets to predict outcomes.

When applied to humans, AI derives its predictive accuracy only from the vastness of data, since it does not have the ability to think. Considering that voluminous amounts of data are needed, mass surveillance is the only method through which such data accumulation of gargantuan proportions can be done.

The use of mass surveillance is exemplified by the US National Security Agency (NSA), an organisational leviathan with a budget of US$10.8 billion a year and more than 35,000 workers. It undertakes mass surveillance for the White House, Pentagon, Federal Bureau of Investigation (FBI) and Central Intelligence Agency (CIA), the Departments of State, Energy, Homeland Security, Commerce, and the US Trade Representative.

The NSAs intelligence programs include Social Network Analysis Collaboration Knowledge Services, which attempt to form sub-institutional components for surveillance operations: Dishfire collects and stores text messages; Tracfin records credit card transactions; Orlandocard installs spyware on personal devices.

One project called Mainway - was collecting data in August 2011 from nearly 2 billion phone records a day. The 2013 NSA budget requested funds to increase its data collection capacities to record 20 billion events per day, and for a system that could integrate different data streams within an hour to create bulk data, then to share that data for more effective analysis.

As digital capitalism has progressed, profit-maximising capitalist firms have ratcheted up the speed of data accumulation, leading to datafication. Datafication is the continuous collection of data abstracted from the digital traces left behind as we interact with our digital environments, resulting in the proliferation of advanced tools for the integration, analysis, and visualisation of data patterns for purposes of commercialisation.

This process also implies that many parts of social existence take the form of digital traces. Friendships become likes on social media platforms, movements through different places generate extensive digital footprints in GPS-enabled devices and our searches for information show our predilections and personal preferences.

Digital capitalism is not only restricted to the profit imperatives of individual corporations, however. It is also thoroughly intertwined with militarism and repression.

In his book Surveillance Valley: The Secret Military History of the Internet, journalist Yasha Levine explains: From Amazon to eBay to Facebook most of the Internet companies we use every day have also grown into powerful corporations that track and profile their users while pursuing partnerships and business relationships with major US military and intelligence agencies.

Some parts of these companies are so thoroughly intertwined with Americas security services, that it is hard to tell where they end and the US government begins.

Google, he writes, has supplied mapping technology used by the US Army in Iraq, hosted data for the CIA, indexed the NSAs vast intelligence databases, built military robots, co-launched a spy satellite with the Pentagon, and leased its cloud computing platform to help police departments predict crime.

In October 2013, Amazon finalised a US$600 million deal for Amazon Web Services (AWS) to build a private computing cloud for the 17 US intelligence agencies known collectively as the Intelligence Community (IC). Through the contract, known as the Commercial Cloud Service or C2S cloud, the company started storing internet and telecommunications data accumulated by the IC.

Speedily and steadily, the use of data for repressive purposes has diversified to incorporate different spheres in its area of operation.

In February 2019, the United Nations World Food Programme (WFP) signed a $45 million partnership with Palantir Technologies, the US software firm known for its association with the CIA and Cambridge Analytica and its work on predictive policing, biometrics and immigration enforcement.

This was not new. Since 2010, major tech companies like Accenture, Amazon, Facebook, Google, IBM and Microsoft have developed partnerships with the UN and other humanitarian or inter-governmental agencies to: 1) extract data about refugees; 2) conduct discriminatory bio-metric experimentations; and 3) de-politicise humanitarian crises, through a techno-colonial mindset.

The attempts by the US to extradite Assange are manifestations of the global elites anxiety to somehow contain the project of constructing a digital commons and building a radical digital economy.

Digital capitalism has manufactured a framework where global surveillance and data-driven imperialist militarism have combined to suffocate popular resistance to a dysfunctional neoliberal system.

Instead of this oppressive transnational structure of unending misery, Assange imagined a future where digital technologies would be used for collective projects of humanisation and anti-imperialist resistance. He tried to erect democratic communicative commons aimed at opposing the colonisation of societies by a commercial logic that solely wants to profit from surveillance and militarism.

Now, he is being brutally punished by the US the hub of the grotesque system we live under. We need to vehemently defend Assange from capitalist-imperialist forces, which are only concerned with the perpetuation of endless suffering for the mass of humanity.

[Yanis Iqbal is a student and freelance writer based in Aligarh, India and can be contacted at yanisiqbal@gmail.com.]

More here:

Julian Assange and the fight against digital capitalism - Green Left

Why QAnon will outlive Trump – The Week

When asked recently by NBC's Savannah Guthrie to state his feelings about a popular conspiracy theory, President Trump gave an equivocal answer. "I know nothing about QAnon," he said. "I do know they are very much against pedophilia. They fight it very hard."

Trump's response was widely criticized, not least because it gave a very one-sided impression of the theory in question and its proponents, whose delusions it seemed to encourage. I am not entirely sure what else he could have said. If reports like this one are any indication, QAnon is far more important to millions of the president's supporters than, say, his party's attitude toward marginal tax rates. Trump needs QAnon.

A more interesting question is whether QAnon needs Trump. This proposition is, I think, harder to defend, for the very simple reason that the theory is only incidentally related to his bizarre political career. There is every reason to think that it or something like it will outlast him regardless of whether he wins re-election in November.

Both in outline and at the level of individual details (e.g., the involvement of the Clintons) QAnon resembles most of the conspiracy theories that have flourished in right-wing circles in my lifetime. Its most direct ancestor is said to be Pizzagate, which posited the existence of a cult that met under the auspices of the Democratic National Committee and a Washington-area pizza chain for the worship of Satan and the abuse of children, who were kept in basement dungeons, raped, and eaten by John Podesta and others. But Pizzagate was what the political scientist Michael Barkun has described as an "event" conspiracy theory, an attempt to make sense of a discrete situation in this case, the admittedly bizarre reference to "Spirit Cooking" in an email exchange between Podesta and his brother Tony released by WikiLeaks in late 2016.

Whatever else it might be, QAnon is not an attempt to make sense of an event. It is not even a conspiracy theory of the best-known variety, those organized around the notion that a sinister group is attempting to gain control of a country or the world. Fantasies of this kind, which have been commonplace since the publication of the supposed Protocols of the Elders of Zion at the turn of the last century, reached the height of their influence in this country during the 1990s. There are good reasons to think that, in addition to a large number of 20-something Reddit and 8chan users, QAnon is supported by more or less the same people who were talking about the so-called "New World Order" 25 years ago.

What has changed? Has the creature from Jekyll Island retreated to its lair? Have the Trilateral Commission and the Council on Foreign Relations disbanded? Has globalization been reversed? Perhaps the genius of QAnon is that it is what Barkun calls a "superconspiracy" that synthesizes virtually every lunatic proposition beloved of the American far right: It proposes an alliance between pedophiles in Hollywood, Wall Street vampires, DNC occultists, left-wing street militias and the Jewish billionaires who finance them, crypto-Marxist professors, the Chinese military, Big Tech, and goodness knows who else in order to explain what exactly?

This, which ought to be the crucial question about QAnon, seems to me strangely enough the least important one, both for proponents and for those of us trying to make sense of it. QAnon is lived rather than consumed. It cannot be falsified because it provides the basic conceptual technology by means of which its adherents experience reality. In this sense, QAnon is the answer not to David Icke but to the combination of dumbed-down academic postmodernism, MBA-speak, and therapeutic moralism that make up the worldview of our professional managerial class. It is not a theory or a set of beliefs but an entire social ontology.

This is why I think that QAnon is unlikely to disappear. It offers a complete picture of the world and a built-in response to the slow but inexorable financialization and digitalization of the economy, the collapse of the American industrial base, the decline in morality (however understood), the eclipse of religious, national, and other forms of tangible authority above all, the total decentralization of power, which is not concentrated in the hands of a cabal or in the office of the presidency but dispersed among billions of individual participants in the globalized economic order.

This is the grounds upon which it is most deserving of criticism. Rather than provide the conceptual language for making sense of a world in which Jeff Bezos has roughly as much power to alter the underlying structures of globalized capitalism as an employee at one of Amazon's warehouses, QAnon offers a consoling narrative: the light-bringing Prometheus who will deliver the race of men from bondage, the world-spirit mounted on horseback who will master the world, the promised messiah who will lead the Fremen to victory.

This story is pernicious, not because it invests Trump with qualities he does not possess but because of its mistaken premise that a hero can save us from whatever we imagine are the evils of the age. It is not only false but self-exculpatory, every bit as much as the competing elite narrative of meritocratic know-how and woke ritualism triumphing over the dark forces of reaction. Both worldviews absolve their adherents of complicity and incuriosity.

I, for one, would rather be clear-eyed and despairing.

Follow this link:

Why QAnon will outlive Trump - The Week

SAD (Badal) appoints wife of Sikhs butcher as General Secretary of the women wing – Sikh24 News & Updates

CHANDIGARH, PunjabEven as the Shiromani Akali Dal (Badal) has snapped ties with the controversial Hindu right-wing political group BJP, it has not stopped indulging in anti-Panthik activities and working against the sentiments of the Sikhs.

Today, the Akali Dal appointed Farzana Alam, wife of Sikhs butcher Izhar Alam, as general secretary of its women wing Istari Akali Dal which is led by former Shiromani Gurdwara Parbandhak Committee (SGPC) president Bibi Jagir Kaur.

Jagir Kaur has expanded the organizational structure of the wing and Farzana is among the office-bearers announced today, as per an official communiqu of the SAD (Badal) controlled by Badal family. Once again, the move is inviting criticism of the Sikh masses.

During the 1980s and early 1990s, the former Senior Superintendent of Punjab Police played a major role in oppressing the armed Sikh struggle, in which he is known to have used inhumane methods. He is the architect of the infamous Alam Sena also known as Black Cats responsible for fake encounters, in which thousands of Sikh youths were killed under the pretext of fighting terrorism.

Wikileaks had also highlighted Alams involvement in the violation of human rights in the form of extra-judicial killings in Punjab.

Izhar Alam (center) and Parkash Badal (extremely right) hugging each other in a function. (File Photo)

Former DGP, KP Gill,hadpublicly praised the Alam Sena by stating that the Punjab police could not have functioned without them. There are several human rights cases pending against Alam, and other Punjab Police officers involved in various human rights atrocities that occurred in the 1980s and 1990s.

It is pertinent to mention that during Punjab assembly elections in 2012, Parkash Badal fielded Izhar Alam as SAD candidate from Malerkotla seat. At that time, Sikhs had opposed thisdecision harshly. After facing a backlash, Akalis transferred the party ticket to Alams wife Farzana Alam, changing her name toNissara Khatoon. This was nothing, but a clever attempt made to fill the eyes of Sikhs with dust.

Izhar Alam can be seen sitting next to Harnam Singh Dhumma, President of Sant Samaj.

Even the Sant Samaj led by Damdami Taksal (Mehta) chief Harnam Singh Dhumma campaigned for Mrs. Alam in 2012 assembly elections and a photo of Dhumma with Mr. Alam went viral over social media.

Despite resentment among the Sikhs against the Alam family, the SAD (B) president Sukhbir Badal appointed Mr. Alam as vice-president of the party which claims itself to be the sole representative party of the Sikhs.

The fresh move reveals that the SAD (Badal) leaders are still in association with the forces which played role against the Sikhs.

It is worth mentioning here that the SAD (B) also appointed Sumedh Saini, another such butcher of the Sikhs, as DGP of Punjab. Saini was recently nominated in a case of extra-judicial killing. Besides, he is also an accused in Behbal Kalan firing that killed two Sikhs demonstrating for justice in Bargari sacrilege case.

Original post:

SAD (Badal) appoints wife of Sikhs butcher as General Secretary of the women wing - Sikh24 News & Updates

C# designer Torgersen: Why the programming language is still so popular and where it’s going next – TechRepublic

C# has been instrumental in setting technical benchmarks for the developer landscape since its creation in 2000. Lead designer Mads Torgersen shares the secrets of its success with TechRepublic.

Mads Torgersen, lead designer for C# at Microsoft.

Image: Microsoft

Two decades after its creation, C# continues to be one of the most popular and widely used programming languages in the world. Favored by millions for its versatility and easy-to-read syntax, the programming language has quickly become a go-to for web and mobile apps, game development, business applications and more.

While it shares a close heritage with Java originally being designed as a rival to the programming language developed at Sun Microsystems (now Oracle) in 1996 C# has evolved largely along its own path since its beginnings in 2001, not least thanks to extensive support from Microsoft.

SEE: The best programming languages to learn in 2020 (TechRepubic)

Much of C#'s popularity lies its tendency to embrace new features quickly. Mads Torgersen, Microsoft program manager and lead designer for C#, says it is this forward-thinking design that has allowed the programming language to accrue such a large userbase over the course of its 20-year history.

"Leaning strongly into innovation has always been one of the things that distinguishes C#," Torgersen tells TechRepublic.

"I think it strikes a fairly pragmatic balance where the things we do focus on scenarios that real programmers find themselves in. We're very keen on the innovation being driven by usefulness, not so much beauty. At the same time, we try really hard to keep the language coherent, and having a unified field to it."

Torgersen has been the lead orchestrator of C#'s design for the past 15 years. Torgersen, who spent four years as an associate professor at Denmark's Aarhus University before leaving academia for industry in 2005, now leads a team at Microsoft whose roles are to coordinate the future direction of C#.

Unlike Torgersen, most of those on the C# design team are involved in building and implementing the programming language, and tend to be working in adjacent fields at Microsoft. Meanwhile, it's Torgersen's job to actually run the C# language design process, and maintain the language's specification.

"We get together quite frequently, roughly twice a week for two hours, to make the decisions and drive the creative work around how we should do things in the next version of C#," he explains.

"I'm sort of the orchestrator of that, and one of the people that does a lot of the groundwork around bringing in ideas and working out details for that project."

While it's always had its center of gravity at Microsoft, C# is an open-source programming language and as such follows an open-source design process. While this is primarily driven by Microsoft, ideas regularly come down the pipeline from the C# community.

"We do have a GitHub site dedicated to the design of C# and another one that's dedicated to the implementation," says Torgersen.

"On the design site, we have a lot of interaction with folks who are not day to day involved [with C#] but who often are C# users, and they contribute ideas for discussion. Some of the features that come into C# come through that channel."

With ideas coming in from some many angles, then, how does Torgersen and his team filter out what's important?

"That's a challenge, because a lot comes in," he admits. "It's a big programming language in terms of usage there are millions of C# developers and so there is quite a lot of input."

SEE:Top 5 programming languages for systems admins to learn (free PDF)(TechRepublic)

This is where good old-fashioned democracy comes in handy. To aid the process, Torgersen and his fellow C# designers have adopted a championing mechanism, whereby each member of the team will assess the ideas that come in via GitHub and advocate for any they feel worth bringing to the table.

Decisions are not only based on the amount of interest each idea receives, but whether it fits the language's planned evolutionary path and the uptake of similar ideas in other languages, Torgersen explains.

"It's a very debate-oriented approach," he says.

"Having a design team like that is really the key to managing this kind of process and making the right decisions. You need to have lots of perspectives in the room at all the time, but also a process for them not just talking in all directions.

"We circle around a lot to make sure we've covered all the bases, but we also have a way to reach agreement and say, 'OK this is what we're doing'. It's a balance of having a lot of input and doing a lot of things, but having a strong stewardship of how it all comes together, so that what comes out feels like it's been designed holistically."

While C# may not hold the number one spot in terms of popularity (this honor goes to C or JavaScript, depending on which index you look at), it is credited for introducing significant technical changes to the developer landscape with the shift to asynchronous programming in the mid-2000s, which was largely spearheaded by core design changes made by Torgersen and his team at Microsoft.

Having programming language support for asynchronous programming suddenly went from being a fringe desire to being a key aspect for many developers, setting a new standard for the industry and causing several other major programming languages including JavaScript to subsequently pick up the model.

"That was a big turning point, because it helped us with addressing one of these big changes in the developer landscape, which was the turn to cloud and mobile," says Torgersen.

"All of a sudden, there was much more need for programs to communicate across different devices, whether it was up to a server in the cloud, or whether it was between mobile devices and servers, and so on. We solved that very successfully and the industry picked up since then on our approach to it. That's something I'm very proud of."

Of course, a lot has happened in the 15 years since Torgersen took over the helm of C# from creator, Anders Hejlsberg. More recently, the rise of no-code, low-code platforms particularly amid the COVID-19 pandemic has started to level the playing field by allowing people with little to no coding ability to build functional apps.

SEE:Linux commands for user management(TechRepublic Premium)

Given the current global shortage of developers, these platforms are straightforward enough to allow even non-programmers to develop fully functional business workflow applications that can be integrated into businesses' wider IT infrastructure.

"I know a lot of programmers kind of view that with a bit of scorn, and we also realize that it can only take you so far, but at the same time I really appreciate that it gets more people into being creative with computers," says Torgersen.

"It makes it less of a sort of esoteric or secretive or cabal-like thing, the whole coding thing becomes less mysterious, and more accessible."

Torgersen is also optimistic that low-code, no-code platforms and traditional programming can coexist peacefully, though he acknowledges that there's a challenge "as to what happens on the boundary".

"That has always been the challenge of low-code approaches, even before we called them that, which is that the low-code, no-code setup just inherently introduces at least, with the technologies we have today some limitations on what you can do," he says.

"That has always been an uneasy kind of terrain in the past, to the point where I think it has contributed to the failure of some no-code approaches that didn't have a growth story for when things needed to get a little smarter. That's a challenge that we need to keep trying to address."

Like all modern programming languages, C# continues to evolve. With C# 9.0 on course to arrive in November, the next update will focus on supporting "terse and immutable" (i.e. unchangeable) representation of data shapes.

"C# 9.0 is trying to take some next steps for C# in making it easier to deal with data that comes over the wire, and to express the right semantics for data, if you will, that comes out of what we call an object-oriented paradigm originally," says Torgersen.

C# 9.0 takes the next step in that direction with a feature called Records, says Torgersen. These are a reference type that allow a whole object to be immutable and instead make it act like a value.

"We've found ourselves, for a long time now, borrowing ideas from functional programming to supplement the object-oriented programming in a way that really helps with, for instance, cloud-oriented programming, and helps with data manipulation," Torgersen explains.

"Records is a key feature of C# 9.0 that will help with that."

Beyond C# 9.0 is where things get more theoretical, though. Torgersen insists that there's no concrete 'endgame' for the programming language or at least, not until it finally reaches some as-yet unknown expiration date.

"Which will happen one day!" he adds. "I think some interesting things, that it's time to look at again, have to do with software composition making it easier to combine different pieces of software after the fact.

"There's a degree of adaptation that most programming languages are good at, but aren't good enough, and I want to lead a charge to have more powerful features for adaptation so that you can bring existing software components better into play with each other."

Can we expect this in C# 10? "That's sort of a long-term project that we're also working on, even as we're doing more short-term useful features," says Torgersen.

"This would be universal. This would help anyone who does software development, but in particular when you're bringing several frameworks together and trying to make them cooperate."

From the hottest programming languages to the jobs with the highest salaries, get the developer news and tips you need to know. Weekly

Read more from the original source:
C# designer Torgersen: Why the programming language is still so popular and where it's going next - TechRepublic

Septentrio announces open-source software and hardware for autonomous applications with GNSS – UASweekly.com

Septentrio, a leader in high-precision GNSS* positioning solutions, announces today two importantopen sourceresources for itsGPS/GNSS modulereceivers. The first,ROSaic,isa ROS (Robot Operating System) driverforthemosaic-X5 module as well as other Septentrio GNSS receivers.The second project,mosaicHAT, is an open source hardware reference design combining mosaic-X5 with a Raspberry Pi single-board computer. Both projects facilitateintegrationofcentimeter-levelreliable positioning intorobotic and other machine automation applications.

ROSaicdriveroperates onROS,a widely used programming environment within the industry as well as academics,commonly usedforintegrating robot technologyanddeveloping advanced robotics and autonomous systems. ROS allows data from numerous sensors to be combined allowing highlevelsofautonomy.

ThemosaicHATproject facilitates accurate and reliable GNSS positioning for robotics and automation on a hardware level. Numerous engineers today use Raspberry Pi for prototyping and initial integrations. ThemosaicHATboard is an easy way for integrators to get started with Septentrios mosaic-X5 GNSS module. By pluggingmosaicHATinto a compatible Raspberry Pi, users have access to high-accuracy positioning with a high update rate, ideal for machine navigation and control. The small 5665 mm board exposes basic interfaces such as USB, serial, and general-purposecommunication pins. The reference design, footprint and documentation are available for easy board printing or further customization.

We are excitedaboutboth theROSaic driver and themosaicHATbeing part of theGitHub community and we highly appreciate the initial authors work as well as the future contributors. Both projects are available as open source, thus empowering the community to easily fit autonomous or robotic systems with highly accurate and reliable GNSS positioning technology, notes Gustavo Lopez, Market Access Manager at Septentrio.

The ROSaic driver is available on theROS wiki pageand on theSeptentrio GitHub repositorywhile themosaicHATcan be found on the followingGitHub repository. Formore information on Septentrios industry-leading GNSS receivers, please visitwww.septentrio.com.

ROS [and/or the nine dots ROS logo and/or any other ROS trademark used] is a trademark of Open Robotics.Raspberry Pi is a trademark of the Raspberry Pi organization.

*Global Navigation Satellite Systemincludingthe American GPS, European Galileo, Russian GLONASS, Chinese BeiDou, Japans QZSS and IndiasNavIC. These satellite constellations broadcast positioning information to receivers which use it to calculate their absolute position.

About Septentrio:

Septentriodesigns and manufacturesmulti-frequencymulti-constellationGPS/GNSS positioning technology for demanding applications. Reliable centimeter-level positioning enables machineautomationimprovingefficiency andsafety. Septentrio provides positioning solutions forindustrial applicationssuch as robotics, construction, survey and mapping,maritime, logistics and unmanned aerial vehicles (UAVs).

Septentrio has its headquarters in Leuven, Belgium and has a world-wide presence with offices in Los Angeles, Shanghai, Seouland Yokohama as well as numerous partners around the world.

To learn more about Septentrio and itsproducts, visitseptentrio.com.

Read the original:
Septentrio announces open-source software and hardware for autonomous applications with GNSS - UASweekly.com