Dimitri John Ledkov: 2017 is the new 1984
1984: Library Edition | Novel by George Orwell, cover picture by Google Search result |
I am petrified.
I am confused.
I am sad.
I am furious.
I am angry.
28 days later I shall return from NYC.
I hope.
1984: Library Edition | Novel by George Orwell, cover picture by Google Search result |
[Many Americans are] hurt, and they re scared, and they feel like a lot of the United States just slammed the door in their faces. The status quo is not working for people. Technocratic government by political elites is not working for people. Business as usual is not working for people. Minor tweaks to increasingly arcane systems is not working for people. People are feeling lost in bureaucracy, disaffected by elections that do not present a clear alternate vision, and depressed by a slow slide into increasingly dismal circumstances. Government is not doing what we want it to do for us. And people are getting left behind. The left in the United States (of which I m part) has for many years been very concerned about the way blacks and other racial minorities are systematically pushed to the margins of our economy, and how women are pushed out of leadership roles. Those problems are real. But the loss of jobs in the industrial heartland, the inability of a white, rural, working-class man to support his family the way his father supported him, the collapse of once-vibrant communities into poverty and despair: those problems are real too. The status quo is not working for anyone except for a few lucky, highly-educated people on the coasts. People, honestly, like me, and like many of the other (primarily white and male) people who work in tech. We are one of the few beneficiaries of a system that is failing the vast majority of people in this country.Russ is, of course, right. The Democrats have been either complicit in policies damaging to many, or ineffective in preventing them. They have often appeared unconcerned with the plight of people outside cities (even if that wasn t really the case). And it goes deeper. When s the last time you visited Kansas? I live in Kansas. The nearest paved road is about a 3-mile drive from my home. The nearest town, population 600, is a 6-mile drive. My governor whom I did not vote for cut taxes on the wealthy so much that our excellent local schools have been struggling for years. But my community is amazing, full of loving and caring people, the sort of people who you know you ll be living with for 40 years, and so you make sure you get along well with. I have visited tourist sites in Berlin, enjoyed an opera and a Broadway show in New York, taken a train across the country to Portland, explored San Francisco. I ve enjoyed all of them. Many rural people do get out and experience the world. I have been in so many conversations where I try to explain where I live to people that simply cannot fathom it. I have explained how the 18 acres I own is a very small amount where I am. How, yes, I do actually have electricity and Internet. How a bad traffic day is one where I have to wait for three cars to go past before turning onto the paved road. How I occasionally find a bull in my front yard, how I can walk a quarter mile and be at the creek on the edge of my property, how I can get to an airport faster than most New Yorkers and my kids can walk out the front door and play in a spot more peaceful than Central Park, and how all this is way cheaper than a studio apartment in a bad part of San Francisco. It is rare indeed to see visitors actually traveling to Kansas as a destination. People have no concept of the fact that my mechanic would drop everything and help me get my broken-down car to the shop for no charge, that any number of neighbors or uncles would bring a tractor and come plow the snow off my 1/4-mile driveway out of sheer kindness, that people around here really care for each other in a way you don t see in a city. There are people that I know see politics way differently than me, but I know them to be good people. They would also do anything for a person in need, no matter who they are. I may find the people that they vote for to be repugnant, but I cannot say I ve looked this person in the eyes and they are nothing but deplorable. And so, people in rural areas feel misunderstood. And they are right. Some perspectives on Trump As I ve said, I do find Trump to be deplorable, but not everyone that voted for him is. How, then, do people wind up voting for him? The New Yorker had an excellent story about a man named Mark Frisbie, owner of a welding and fab shop. The recession had been hard on his business. His wife s day-care center also closed. Health care was hard to find, and the long, slow decline had spanned politicians of every stripe. Mark and his wife supposedly did everything they were supposed to: they worked hard, were honest, were entrepreneurial, and yet he had lost his business, his family house, his health coverage, everything. He doesn t want a handout. He wants to be able to earn a living. Asked who he d vote for, he said, Is none of the above an option? The Washington Post had another insightful article, about a professor from Madison, WI interviewing people in rural areas. She said people would often say: All the decisions are made in Madison and Milwaukee and nobody s listening to us. Nobody s paying attention, nobody s coming out here and asking us what we think. Decisions are made in the cities, and we have to abide by them. She pushed back, hard, on the idea that Trump supporters are ignorant, and added that liberals that push that line of thinking are only making the problem worse. I would agree; seeing all the talk about universities dis-inviting speakers that don t hew to certain political views doesn t help either. A related article talks about the lack of empathy for Trump voters. And then we have a more recent CNN article: Where Tump support and Obamacare use soar together, explaining in great detail how it can be logical for someone to be on Obamacare but not like it. We can all argue that the Republicans may have as much to do with that as anything, but the problem exists. And finally, a US News article makes this point:
His supporters realize he s a joke. They do not care. They know he s authoritarian, nationalist, almost un-American, and they love him anyway, because he disrupts a broken political process and beats establishment candidates who ve long ignored their interests. When you re earning $32,000 a year and haven t had a decent vacation in over a decade, it doesn t matter who Trump appoints to the U.N., or if he poisons America s standing in the world, you just want to win again, whoever the victim, whatever the price. According to the Republican Party, the biggest threat to rural America was Islamic terrorism. According to the Democratic Party it was gun violence. In reality it was prescription drug abuse and neither party noticed until it was too late.Are we leaving people out? All this reminded me of reading about Donald Knuth, the famous computer scientist and something of the father of modern computing, writing about his feelings of trepidation about sharing with his university colleagues that he was working on a project related to the Bible. I am concerned about the complaints about the PC culture , because I think it is good that people aren t making racist or anti-semitic jokes in public anymore. But, as some of these articles point out, in many circles, making fun of Christians and conservatives is still one of the accepted targets. Does that really help anything? (And as a Christian that is liberal, have all of you that aren t Christians so quickly forgotten how churches like the Episcopals blazed the way for marriage equality many years ago already?) But they don t get a free pass I have found a few things, however, absolutely scary. One was an article from December showing that Trump voters actually changed their views on Russia after Trump became the nominee. Another one from just today was a study on how people reacted when showed inauguration crowd photos. NPR ran a story today as well, on how Trump is treating journalists like China does. Chilling stuff indeed. Conclusion So where does this leave us? Heading into uncertain times, for sure, but perhaps just maybe with a greater understanding of our neighbors. Perhaps we will all be able to see past the rhetoric and polarization, and understand that there is something, well, normal about each other. Doing that is going to be the only way we can really take our country back.
Incredible India from http://incredibleindiacampaign.com
Eligibility International Travellers whose sole objective of visiting India is recreation , sight-seeing , casual visit to meet friends or relatives, short duration medical treatment or casual business visit.https://indianvisaonline.gov.in/visa/tvoa.html That this facility is being given to 130 odd countries is better still
Albania, Andorra, Anguilla, Antigua & Barbuda, Argentina, Armenia, Aruba, Australia, Austria, Bahamas, Barbados, Belgium, Belize, Bolivia, Bosnia & Herzegovina, Botswana, Brazil, Brunei, Bulgaria, Cambodia, Canada, Cape Verde, Cayman Island, Chile, China, China- SAR Hong-Kong, China- SAR Macau, Colombia, Comoros, Cook Islands, Costa Rica, Cote d lvoire, Croatia, Cuba, Czech Republic, Denmark, Djibouti, Dominica, Dominican Republic, East Timor, Ecuador, El Salvador, Eritrea, Estonia, Fiji, Finland, France, Gabon, Gambia, Georgia, Germany, Ghana, Greece, Grenada, Guatemala, Guinea, Guyana, Haiti, Honduras, Hungary, Iceland, Indonesia, Ireland, Israel, Jamaica, Japan, Jordan, Kenya, Kiribati, Laos, Latvia, Lesotho, Liberia, Liechtenstein, Lithuania, Luxembourg, Madagascar, Malawi, Malaysia, Malta, Marshall Islands, Mauritius, Mexico, Micronesia, Moldova, Monaco, Mongolia, Montenegro, Montserrat, Mozambique, Myanmar, Namibia, Nauru, Netherlands, New Zealand, Nicaragua, Niue Island, Norway, Oman, Palau, Palestine, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Poland, Portugal, Republic of Korea, Republic of Macedonia, Romania, Russia, Saint Christopher and Nevis, Saint Lucia, Saint Vincent & the Grenadines, Samoa, San Marino, Senegal, Serbia, Seychelles, Singapore, Slovakia, Slovenia, Solomon Islands, South Africa, Spain, Sri Lanka, Suriname, Swaziland, Sweden, Switzerland, Taiwan, Tajikistan, Tanzania, Thailand, Tonga, Trinidad & Tobago, Turks & Caicos Island, Tuvalu, UAE, Ukraine, United Kingdom, Uruguay, USA, Vanuatu, Vatican City-Holy See, Venezuela, Vietnam, Zambia and Zimbabwe.This should make it somewhat easier for any Indian organizer as well as any participants from any of the member countries shared. There is possibility that this list would even get longer, provided we are able to scale our airports and all and any necessary infrastructure that would be needed for International Visitors to have a good experience. What has been particularly interesting is to know which ports of call are being used by International Visitors as well as overall growth rate
The Percentage share of Foreign Tourist Arrivals (FTAs) in India during November, 2016 among the top 15 source countries was highest from USA (15.53%) followed by UK (11.21%), Bangladesh (10.72%), Canada (4.66%), Russian Fed (4.53%), Australia (4.04%), Malaysia (3.65%), Germany (3.53%), China (3.14%), France (2.88%), Sri Lanka (2.49%), Japan (2.49%), Singapore (2.16%), Nepal (1.46%) and Thailand (1.37%).And port of call
The Percentage share of Foreign Tourist Arrivals (FTAs) in India during November 2016 among the top 15 ports was highest at Delhi Airport (32.71%) followed by Mumbai Airport (18.51%), Chennai Airport (6.83%), Bengaluru Airport (5.89%), Haridaspur Land check post (5.87%), Goa Airport (5.63%), Kolkata Airport (3.90%), Cochin Airport (3.29%), Hyderabad Airport (3.14%), Ahmadabad Airport (2.76%), Trivandrum Airport (1.54%), Trichy Airport (1.53%), Gede Rail (1.16%), Amritsar Airport (1.15%), and Ghojadanga land check post (0.82%) .The Ghojadanga land check post seems to be between West Bengal, India and Bangladesh. Gede Railway Station is also in West Bengal as well. So all and any overlanders could take any of those ways.Even Hardispur Land Check post comes in the Bengal-Bangladesh border only. In the airports, Delhi Airport seems to be attracting lot more business than the Mumbai Airport. Part of the reason I *think* is the direct link of Delhi Airport to NDLS via the Delhi Airport Express Line . The same when it will happen in Mumbai should be a game-changer for city too. Now if you are wondering why I have been suddenly talking about visas and airports in India, it came because Hong Kong is going to Withdraw Visa Free Entry Facility For Indians. Although, as rightly pointed out in the article doesn t make sense from economic POV and seems to be somewhat politically motivated. Not that I or anybody else can do anything about that. Seeing that, I thought it was a good opportunity to see how good/Bad our Government is and it seems to be on the right path. Although the hawks (Intelligence and Counter-Terrorist Agencies) will probably become a bit more paranoid , their work becomes tougher.
The demo that probably drew the most attention was from my friend Georg who demoed some LulzBot Mini 3D Printers. They really seem to love Debian which is great!At #Debconf? Join the #HetznerSA #Supermariobros challenge and stand a chance to win a case of #Leagueofbeers pic.twitter.com/DpkOj6wmZb HetznerSA Careers (@HetznerCareers) July 2, 2016
LulzBot Mini #3Dprinters were on the scene at @DebConf Open Festival in South Africa. We re powered by @debian! pic.twitter.com/AOBS64ZtiJ LulzBot (@lulzbot3D) July 13, 2016DebConf (6 August to 12 August) If I try to write up all my thoughts and feeling about DC16, I ll never get this post finished. Instead, here as some tweets from DebConf that other have written:
@o0karen0o delivering today s #DebConf16 keynote pic.twitter.com/hG1wD5MBhH Michael Banck (@mbanck) July 3, 2016
Great to see Sicelo Mhlongo speaking about issues using @debian in Swaziland #debconf16 pic.twitter.com/U6z7HA8zd5 Neil McGovern (@nmcgovern) July 7, 2016
What happened at #DebConf16 yesterday? Sandstorm Principles talking about the freedom to choose #software #sandbox pic.twitter.com/ltYaw3dAmP Obsidian Systems (@obsidianza) July 5, 2016
All @DebConf end with similar feelings: we re an incredible crowd working together for a incredibly important cause. https://t.co/DYuUWT5eKt Didier Raboud (@OdyX_) July 9, 2016
My congratulations to the #DebConf video team. As usual, they are doing an amazing work at #DebConf16Day Trip We had 3 day trips:
Marcelo Santana (@mgsantana) July 8, 2016
Whilst anyone can inspect the source code of free software for malicious flaws, most GNU/Linux distributions provide binary (or "compiled") packages to end users. The motivation behind the Reproducible Builds effort is to allow verification that no flaws have been introduced either maliciously and accidentally during this compilation process by promising identical binary packages are always generated from a given source.
Presented a talk entitled "Reproducible Builds" talk at Software Freedom Kosova, in Prishtina, Republic of Kosovo.
I filed my 2,500th bug in the Debian BTS: #840972: golang-google-appengine: accesses the internet during build.
In order to build packages reproducibly, one not only needs identical sources but also some external and sharable definition of the environment used for a particular build, stipulating such things such as the version numbers of the required build-dependencies. It is not currently clear how to handle these .buildinfo files after the archive software has processed them and how to make them available to the world so I started development on a proof-of-concept server to see what issues arise in practice. It is available at buildinfo.debian.net.
Chaired an IRC meeting and ran a poll to determine a regular time .
Submitted two design proposals to our wiki page.
Improvements to our tests.reproducible-builds.org testing framework:
$ ykpersonalize -m86 Firmware version 3.4.3 Touch level 1792 Unconfigured The USB mode will be set to: 0x86 Commit? (y/n) [n]: y $ |
SUBSYSTEMS=="usb", ATTRS idVendor =="1050", ATTRS idProduct =="0116", TAG+="uaccess" |
$ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -oserial-api-visible ... Commit? (y/n) [n]: y $ |
$ mkdir $HOME/.yubico $ ykpamcfg -2 -v ... Stored initial challenge and expected response in '/home/norbert/.yubico/challenge-123456'. $ |
$ mkdir gpgtmp $ chmod go-rwx gpgtmp $ gpg2 --homedir gpgtmp --list-keys gpg: keybox 'gpgtmp/pubring.kbx' created gpg: gpgtmp/trustdb.gpg: trustdb created |
$ gpg-connect-agent --homedir gpgtmp --hex "scd apdu 00 f1 00 00" /bye" gpg-connect-agent: no running gpg-agent - starting '/usr/bin/gpg-agent' gpg-connect-agent: waiting for the agent to come up ... (5s) gpg-connect-agent: connection to agent established D[0000] 01 00 10 90 00 ..... OK |
$ gpg2 --homedir gpgtmp --card-edit Reader ...........: 1050:0116:X:0 Application ID ...: D2760001240102000006036457190000 Version ..........: 2.0 Manufacturer .....: Yubico Serial number ....: 03645719 Name of cardholder: [not set] Language prefs ...: [not set] Sex ..............: unspecified URL of public key : [not set] Login data .......: [not set] Signature PIN ....: forced Key attributes ...: rsa2048 rsa2048 rsa2048 Max. PIN lengths .: 127 127 127 PIN retry counter : 3 3 3 Signature counter : 0 Signature key ....: [none] Encryption key....: [none] Authentication key: [none] General key info..: [none] gpg/card> admin Admin commands are allowed gpg/card> passwd gpg: OpenPGP card no. D2760001240102000006036457190000 detected 1 - change PIN 2 - unblock PIN 3 - change Admin PIN 4 - set the Reset Code Q - quit Your selection? 3 PIN changed. 1 - change PIN 2 - unblock PIN 3 - change Admin PIN 4 - set the Reset Code Q - quit Your selection? 1 PIN changed. 1 - change PIN 2 - unblock PIN 3 - change Admin PIN 4 - set the Reset Code Q - quit Your selection? q gpg/card> quit |
gpg/card> name Cardholder's surname: Preining Cardholder's given name: Norbert gpg/card> sex Sex ((M)ale, (F)emale or space): M gpg/card> lang Language preferences: de gpg/card> login Login data (account name): norbert gpg/card> url URL to retrieve public key: https://www.preining.info/preining-norbert.asc gpg/card> list Reader ...........: 1050:0116:X:0 Application ID ...: D2760001240102000006036457190000 Version ..........: 2.0 Manufacturer .....: Yubico Serial number ....: 03645719 Name of cardholder: Norbert Preining Language prefs ...: de Sex ..............: male URL of public key : https://www.preining.info/preining-norbert.asc Login data .......: norbert Signature PIN ....: forced Key attributes ...: rsa2048 rsa2048 rsa2048 Max. PIN lengths .: 127 127 127 PIN retry counter : 3 3 3 Signature counter : 0 Signature key ....: [none] Encryption key....: [none] Authentication key: [none] General key info..: [none] gpg/card> quit |
$ gpg2 --edit-key $MASTERKEY gpg (GnuPG) 2.1.11; Copyright (C) 2016 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Secret key is available. sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> key 2 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb* rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> keytocard Please select where to store the key: (1) Signature key (3) Authentication key Your selection? 1 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb* rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> key 2 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> key 3 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb* rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> keytocard Please select where to store the key: (2) Encryption key Your selection? 2 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb* rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> key 3 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> key 4 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb* rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> keytocard Please select where to store the key: (3) Authentication key Your selection? 3 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb* rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> key 4 sec rsa4096/0x6CACA448860CDC13 created: 2010-09-14 expires: 2017-02-06 usage: SC trust: ultimate validity: ultimate ssb rsa4096/0xD1D2BD14810F62B3 created: 2010-09-14 expires: 2017-02-06 usage: E ssb rsa2048/0xEC00B8DAD32266AA created: 2016-02-07 expires: 2017-02-06 usage: S ssb rsa2048/0xBF361ED434425B4C created: 2016-02-07 expires: 2017-02-06 usage: E ssb rsa2048/0x9C7CA4E294F04D49 created: 2016-02-07 expires: 2017-02-06 usage: A [ultimate] (1). Norbert Preining <norbert@preining.info> [ultimate] (2) Norbert Preining <preining@logic.at> [ultimate] (3) Norbert Preining <preining@debian.org> [ultimate] (4) Norbert Preining <preining@jaist.ac.jp> [ultimate] (5) [jpeg image of size 4185] gpg> save |
ARMA_64BIT_WORD
(provided C++11 is turned on too) allowing for much bigger Armadillo objects. And the second plugs a small leak in the sparse matrix converter I had added a while back. Nice work, all told!
Armadillo is a powerful and expressive C++ template library for linear algebra aiming towards a good balance between speed and ease of use with a syntax deliberately close to a Matlab.
Changes in this release are as follows:
Changes in RcppArmadillo version 0.6.700.6.0 (2016-05-05)Courtesy of CRANberries, there is also a diffstat report for this release. As always, more detailed information is on the RcppArmadillo page. Questions, comments etc should go to the rcpp-devel mailing list off the R-Forge page.
- Upgraded to Armadillo 6.700.6 (Catabolic Amalgamator Deluxe)
- fix for handling empty matrices by
kron()
- fix for clang warning in advanced matrix constructors
- fix for false deprecated warning in
trunc_log()
andtrunc_exp()
- fix for gcc-6.1 warning about misleading indentation
- corrected documentation for the
solve()
function- Added support for
int64_t
(ARMA_64BIT_WORD
) when required during compilation time. (PR #90 by George G. Vega Yon, fixing #88)- Fixed bug in
SpMat
exporter (PR #91 by George G. Vega Yon, fixing #89 and #72)
This post by Dirk Eddelbuettel originated on his Thinking inside the box blog. Please report excessive re-aggregation in third-party for-profit settings.
debian/changelog
.--clamp-mtime
option to Tar on Savannah's bug tracker.
Lunar rebased our experimental dpkg on top of the current master branch. Changes in the test infrastructure are required before uploading a new version to our experimental repository.
Reiner Herrmann rebased our custom texlive-bin against the latest uploaded version.
printf
instead of echo
which is shell-independent.printf
instead of echo
which is shell-independent.GRKERNSEC_RANDSTRUCT
which will prevent reproducible builds with the current packaging.
Build-Depends-Arch
and Build-Conflicts-Arch
. (Mattia Rizzolo, h01ger)
New package sets have been added for Subgraph OS, which is based on Debian Stretch: packages and build dependencies. (h01ger)
Two new armhf
build nodes have been added (thanks Vagrant Cascadian) and integrated in our Jenkins setup with 8 new armhf
builder jobs. (h01ger)
POT-Creation-Date
field in GNU Gettext .mo
files. (Reiner Herrmann) Several improvements to the packages metadata have also been made. (h01ger, Ben Finney)
SOURCE_DATE_EPOCH
in rpm, Florian Festi opened a discussion on the rpm-ecosystem mailing list about reproducible builds.
On March 4th, Lunar gave an overview of the general reproducible builds effort at the Internet Freedom Festival in Valencia.
#ooni
IRC channel. Tor also works fine, and could be a great way
to avoid the global surveillance system described later in this
article.
Nevertheless, it still remains to be seen how the internet is censored
in the "real" Cuban internet, outside of the tourist designated
areas - hopefully future visitors or locals can expand on this using
the tools mentioned above, using the regular internet.
Usual care should be taken when using any workaround tools, mentioned
in this post or not, as different regimes over the world have accused,
detained, tortured and killed sometimes for the mere fact of using or
distributing circumvention tools. For example, a Russian developer
was arrested and detained in 2001 by United States' FBI for
exposing vulnerabilities in the Adobe e-books copy protection
mechanisms. Similarly, people distributing Tor and other tools have
been arrested during the period prior to the revolution in Tunisia.
--- 10.0.0.1 ping statistics ---
163 packets transmitted, 31 received, 80% packet loss, time 162391ms
rtt min/avg/max/mdev = 133.700/2669.535/64188.027/11257.336 ms, pipe 65
Still, it allowed me to login to my home server through SSH using
Mosh to workaround the reliability issues.
Every once in a while, mosh would get stuck and keep on trying to send
packets to probe the server, which would clog the connection even
more. So I regularly had to restart the whole stack using these
commands:
killall iodine # stop DNS tunnel
nmcli n off # turn off wifi to change MAC address
macchanger -A wlan0 # change MAC address
nmcli n on # turn wifi back on
sleep 3 # wait for wifi to settle
iodine-client-start # restart DNS tunnel
The Koumbit Wiki has good instructions on
how to setup a DNS tunnel. I am wondering if such a public service
could be of use for Cubans, although I am not sure how it could be
deployed only for Cubans, and what kind of traffic it could
support... The fact is that iodine does require a server to
operate, and that server must be run on the outside of the censored
perimeter, something that Cubans may not be able to afford in the
first place.
Another possible way to save money with the captive portal would be to
write something that automates connecting and disconnecting from the
portal. You would feed that program a list of credentials and it would
connect to the portal only on demand, and disconnect as soon as no
traffic goes through. There are details on the implementation of the
captive portal below that may help future endeavours in that field.
Wifi_Memories_Jibacoa
which, for anyone that cares to research, will
give them a location of about 20 square meters where I was located
when connected (there is only one access point in the whole hotel).
Finally, the central portal also knows my MAC address,
a unique identifier for the computer I am using which also reveals
which brand of computer I am using (Mac, Lenovo, etc). While this
address can be changed, very few people know that, let alone how.
This led me to question whether I would be allowed back in Cuba (or
even allowed out!) after publishing this blog post, as it is obvious
that I can be easily identified based on the time this article was
published, my name and other details. Hopefully the Cuban government
will either not notice or not care, but this can be a tricky
situation, obviously. I have heard that Cuban prisons are not the best
hangout place in Cuba, to say the least...
[1034]anarcat@angela:cuba$ speedtest
Retrieving speedtest.net configuration...
Retrieving speedtest.net server list...
Testing from Empresa de Telecomunicaciones de Cuba (152.206.92.146)...
Selecting best server based on latency...
Hosted by LIME (George Town) [391.78 km]: 317.546 ms
Testing download speed........................................
Download: 1.01 Mbits/s
Testing upload speed..................................................
Upload: 1.00 Mbits/s
Latency to the rest of the world is of couse slow:
--- koumbit.org ping statistics ---
122 packets transmitted, 120 received, 1,64% packet loss, time 18731,6ms
rtt min/avg/max/sdev = 127,457/156,097/725,211/94,688 ms
--- google.com ping statistics ---
122 packets transmitted, 121 received, 0,82% packet loss, time 19371,4ms
rtt min/avg/max/sdev = 132,517/160,095/724,971/93,273 ms
--- redcta.org.ar ping statistics ---
122 packets transmitted, 120 received, 1,64% packet loss, time 40748,6ms
rtt min/avg/max/sdev = 303,035/339,572/965,092/97,503 ms
--- ccc.de ping statistics ---
122 packets transmitted, 72 received, 40,98% packet loss, time 19560,2ms
rtt min/avg/max/sdev = 244,266/271,670/594,104/61,933 ms
Interestingly, Koumbit is actually the closest host in the above
test. It could be that Canadian hosts are less affected by bandwidth
problems compared to US hosts because of the embargo.
traceroute to koumbit.net (199.58.80.33), 30 hops max, 60 byte packets
1 10.156.41.1 (10.156.41.1) 9.724 ms 9.472 ms 9.405 ms
2 192.168.134.137 (192.168.134.137) 16.089 ms 15.612 ms 15.509 ms
3 172.31.252.113 (172.31.252.113) 15.350 ms 15.805 ms 15.358 ms
4 pos6-0-0-agu-cr-1.mpls.enet.cu (172.31.253.197) 15.286 ms 14.832 ms 14.405 ms
5 172.31.252.29 (172.31.252.29) 13.734 ms 13.685 ms 14.485 ms
6 200.0.16.130 (200.0.16.130) 14.428 ms 11.393 ms 10.977 ms
7 200.0.16.74 (200.0.16.74) 10.738 ms 10.019 ms 10.326 ms
8 ix-11-3-1-0.tcore1.TNK-Toronto.as6453.net (64.86.33.45) 108.577 ms 108.449 ms
Let's take this apart line by line:
1 10.156.41.1 (10.156.41.1) 9.724 ms 9.472 ms 9.405 ms
This is my local gateway, probably the hotel's wifi router.
2 192.168.134.137 (192.168.134.137) 16.089 ms 15.612 ms 15.509 ms
This is likely not very far from the local gateway, probably still in
Cuba. It in one bit away from the captive portal IP address (see
below) so it is very likely related to the captive portal implementation.
3 172.31.252.113 (172.31.252.113) 15.350 ms 15.805 ms 15.358 ms
4 pos6-0-0-agu-cr-1.mpls.enet.cu (172.31.253.197) 15.286 ms 14.832 ms 14.405 ms
5 172.31.252.29 (172.31.252.29) 13.734 ms 13.685 ms 14.485 ms
All those are withing RFC 1918 space. Interestingly, the Cuban
DNS servers resolve one of those private IPs as within Cuban
space, on line #4. That line is interesting because it reveals the
potential use of MPLS.
6 200.0.16.130 (200.0.16.130) 14.428 ms 11.393 ms 10.977 ms
7 200.0.16.74 (200.0.16.74) 10.738 ms 10.019 ms 10.326 ms
Those two lines are the only ones that actually reveal that the route
belongs in Cuba at all. Both IPs are in a tiny (/24
, or 256 IP
addresses) network allocated to ETECSA, the state telco
in Cuba:
inetnum: 200.0.16/24
status: allocated
aut-num: N/A
owner: EMPRESA DE TELECOMUNICACIONES DE CUBA S.A. (IXP CUBA)
ownerid: CU-CUBA-LACNIC
responsible: Rafael L pez Guerra
address: Ave. Independencia y 19 Mayo, s/n,
address: 10600 - La Habana - CH
country: CU
phone: +53 7 574242 []
owner-c: JOQ
tech-c: JOQ
abuse-c: JEM52
inetrev: 200.0.16/24
nserver: NS1.NAP.ETECSA.NET
nsstat: 20160123 AA
nslastaa: 20160123
nserver: NS2.NAP.ETECSA.NET
nsstat: 20160123 AA
nslastaa: 20160123
created: 20030512
changed: 20140610
Then the last hop:
8 ix-11-3-1-0.tcore1.TNK-Toronto.as6453.net (64.86.33.45) 108.577 ms 108.449 ms 108.257 ms
...interestingly, lands directly in Toronto, in this case going later
to Koumbit but that is the first hop that varies according to the
destination, hops 1-7 being a common trunk to all external
communications. It's also interesting that this shoves a good 90
milliseconds extra in latency, showing that a significant distance and
number of equipment crossed. Yet a single hop is crossed, not showing
the intermediate step of the Venezuelan link or any other links for
that matter. Something obscure is going on there...
Also interesting to note is the traceroute to the redirection host,
which is only one hop away:
traceroute to 192.168.134.138 (192.168.134.138), 30 hops max, 60 byte packets
1 192.168.134.138 (192.168.134.138) 6.027 ms 5.698 ms 5.596 ms
Even though it is not the gateway:
$ ip route
default via 10.156.41.1 dev wlan0 proto static metric 1024
10.156.41.0/24 dev wlan0 proto kernel scope link src 10.156.41.4
169.254.0.0/16 dev wlan0 scope link metric 1000
This means a very close coordination between the different access
points and the captive portal system. Finally, note that there seems
to be only three peers to the Cuban internet:
Teleglobe, formerly Canadian, now owned by the Indian
[[!wiki Tata group]], and Telef nica, the Spanish Telco
that colonized most of Latin America's internet, all the way down to
Argentina. This is confirmed by my traceroutes, which show traffic to
Koumbit going through Tata and Google's going through Telef nica.
190.6.81.230
in the hotel.
Accessing http://1.1.1.1/ gives you a status page which allows you
to disconnect from the portal. It actually redirects you to
https://192.168.134.138/logout.user. That is also a
self-signed, but different certificate. That
certificate actually reveals the implication of Gemtek which is a
"world-leading provider of Wireless Broadband solutions, offering a
wide range of solutions from residential to business". It is somewhat
unclear if the implication of Gemtek here is deliberate or a
misconfiguration on the part of Cuban officials, especially since the
certificate is self-signed and was issued in 2002. It could be,
however, a trace of the supposed involvement of China in the
development of Cuba's networking systems, although Gemtek is based in
Taiwan, and not in the China mainland.
That IP, in turn, redirects you to the same portal but in a page that
shows you the statistics:
https://www.portal-wifi-temas.nauta.cu/?mac=0024D1717D18&script=logout.user&remain_time=00%3A55%3A52&session_time=00%3A04%3A08&username=151003576287&clientip=10.156.41.21&nasid=Wifi_Memories_Jibacoa&r=ac%2Fpopup
Notice how you see the MAC address of the machine in the URL
(randomized, this is not my MAC address), along
with the remaining time, session time, client IP and the Wifi access
point ESSID. There may be some potential in defrauding the session
time there, I haven't tested it directly.
Hitting Actualizar
redirects you back to the IP address, which
redirects you to the right URL on the portal. The "real" logout is at:
http://192.168.134.138/logout.user?cmd=logout
The login is performed against
https://www.portal-wifi-temas.nauta.cu/index.php?r=ac/login with a
referer of:
https://www.portal-wifi-temas.nauta.cu/?&nasid=Wifi_Memories_Jibacoa&nasip=192.168.134.138&clientip=10.156.41.21&mac=EC:55:F9:C5:F2:55&ourl=http%3a%2f%2fgoogle.ca%2f&sslport=443&lang=en-US%2cen%3bq%3d0.8&lanip=10.156.41.1
Again, notice the information revealed to the central portal.
www.portal-wifi-temas.nauta.cu
, 190.6.81.230
)192.168.134.138
)10.156.41.1
)2.4.21
and 2.4.31
. Now, to
find out which version of Linux it is running is way more challenging,
and it is possible it is just some custom Linux distribution. Indeed,
the webserver shows up as G4200.GSI.2.22.0155
and the SSH server is
running OpenSSH 3.0.2p1
, which is basically prehistoric (2002!)
which corroborates the idea that this is some Gemtek embedded device.
The fact that those devices are running 14 years old software should
be a concern to the people responsible for those networks. There is,
for example, a remote root vulnerability that affects that
specific version of OpenSSH, among
many other vulnerabilities.
15100
, the
following digits being 3576
or 4595
, presumably depending on the
"batch" that was sent to different hotels, which seems to be batches
of 1000 cards. You can also correlate the UID with the date at which
the card was issued. For example, 15100357XXX
cards are all valid
until 19/03/2017, and 151004595XXX
cards are all valid until
23/03/2017. Here's the list of UIDs I have seen:
151004595313
151004595974
151003576287
151003576105
151003576097
The passwords, on the other hand, do seem fairly random (although my
sample size is small). Interestingly, those passwords are also 12
digits long, which is about as strong as a seven-letter password
(mixed uppercase and lowercase). If there are no rate-limiting
provisions on that captive portal, it could be possible to guess
those passwords, since you have free rein on accessing those
routers. Depending on the performance of the routers, you could be
lucky and find a working password for free...
preferences.js
files.
To be able to lift the restriction that packages must be built in the same path, translation support for the __FILE__
C pre-processor macro would also be required. Joerg Sonnenberger submitted a patch back in 2010 that would still be useful today.
Chris Lamb started work on providing a deterministic mode for debootstrap.
Packages fixed
The following packages have become reproducible due to changes in their
build dependencies:
bouncycastle,
cairo-dock-plug-ins,
darktable,
gshare,
libgpod,
pafy,
ruby-redis-namespace,
ruby-rouge,
sparkleshare.
The following packages became reproducible after getting fixed:
SOURCE_DATE_EPOCH
in the documentation generator.Makefile
.tmpfs
. (h01ger)
200 GiB have been added to jenkins.debian.net (thanks to ProfitBricks!) to make room for new jobs. The current count is at 962 and growing!
diffoscope development
Aside from some minor bugs that have been fixed, a one-line change made huge memory (and time) savings as the output of transformation tool is now streamed line by line instead of loaded entirely in memory at once.
disorderfs development
Andrew Ayer released disorderfs version 0.4.2-1 on December 22th. It fixes a memory corruption error when processing command line arguments that could cause command line options to be ignored.
Documentation update
Many small improvements for the documentation on reproducible-builds.org sent by Georg Koppen were merged.
Package reviews
666 (!) reviews have been removed, 189 added and 162 updated in the previous week.
151 new fail to build from source reports have been made by Chris West, Chris Lamb, Mattia Rizzolo, and Niko Tyni.
New issues identified: unsorted_filelist_in_xul_ext_preferences, nondeterminstic_output_generated_by_moarvm.
Misc.
Steven Chamberlain drew our attention to one analysis of the Juniper ScreenOS Authentication Backdoor: Whilst this may have been added in source code, it was well-disguised in the disassembly and just 7 instructions long. I thought this was a good example of the current state-of-the-art, and why we'd like our binaries and eventually, installer and VM images reproducible IMHO.
Joanna Rutkowska has mentioned possible ways for Qubes to become reproducible on their development mailing-list.
.buildinfo
with different environment information can attest to the
same exact binary artifact..buildinfo
files can coexist for the same .deb
as long as the listed
checksums match the source and binary package in the archive..buildinfo
can be signed in-line to certify where a build comes from.metview
script.SOURCE_DATE_EPOCH
in grub image generator (#787795).
reproducible.debian.net
An issue with some armhf
build nodes was tracked down to a bad interaction between uname26 personality and new glibc (Vagrant Cascadian).
A Debian package was created for koji, the RPM building and tracking system used by Fedora amongst others. It is currently waiting for review in the NEW queue. (Ximin Luo, Marek Marczykowski-G recki)
diffoscope development
diffoscope now has a dedicated mailing list to better accommodate its growing user and developer base.
Going through diffoscope's guts together enabled several new contributors. Baptiste Daroussin, Ed Maste, Clemens Lang, Mike McQuaid, Joachim Breitner all contributed their first patches to improve portability or add new features. Regular contributors Chris Lamb, Reiner Herrmann, and Levente Polyak also submitted improvements.
The airplane may be the closest thing we have to a time machine. Brian J. Terwilliger
Next.