Linux Action News 173

Why we don't think Red Hat's expanded developer program is enough, our reaction to Ubuntu sticking with an older Gnome release, and a tiny delightful surprise.

Sponsored By:

Support Linux Action News


Ask Noah Show
Ask Noah Show
Noah J. Chelliah
Episode 221: Blackbird Secure Desktop
The Blackbird Secure Desktop is a POEWR9 system, a fully open source modern POWER9 workstation without any proprietary code. Plasma mobile has a new update out, we talk bluetooth headsets, VoIP phone systems, and a one handed keyboard! -- During The Show -- 01:00 nVidia shield and blocking google DNS - Zack Try setting up DNS on your router Run PFSense/OpnSense in a VM, use that to block DNS requests to Google, pass on legit requests to a PiHole 05:15 VOIP Recommendations for Home Phone? - Dennis Use a Trunk Provider Voxtelesys Hosted Option ( Self host a 3CX PBX ( FreePBX ( Asterisk ( #### 12:45 Caller - George Best Slide show App? Make Video in KdenLIVE ( LibreOffice Impress ( HedgeDoc Slideshow mode Antenna for TV? Apmlified Digital Antenna ( User Feedback - Ben Solution for nerve damage in one hand Use a one handed keyboard Twiddler Keyboard ( 18:15 Bluetooth headphones? - Graeme Best Bluetooth headphones for both calls and music Check out Steelseries ( Sony WH1000xm4 ( 21:15 Pick of the Week Loving Memory GitHub ( Built on GitHub Pages Doesn't require any web expertise 24:00 Tech of the Week Cactus Chat ( Embed Anywhere Privacy Respecting Highly Compatible Decentralized 30:00 Blackbird OS News Article about Blackbird ( Power9 is fully open source unlike Intel/ARM Basic Blackbird Bundle $1,733 ( Blackbird has a BMC running OpenBMC GameCube, Wii, Xbox 360 all use PowerPC-based processors Power1 was released in 1990 Fedora and OpenSuse both support Power9 49:00 Plasma Mobile Plasma Mobile Blog Post ( Pinephone + Jumpdrive is awesome Plasma Mobile is almost Daily Driver New Features Welcome/Setup Screen Modified Home Screen Groundwork for future features Plasma Dialer improvements DTMF & USSD Requests work now -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard ( Phone Systems for Ask Noah provided by Voxtelesys ( Join us in our dedicated chatroom on Matrix ( -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard ( Need more help than a radio show can offer? Altispeed provides commercial IT services and they’re excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies ( Contact Noah live [at] -- Twitter -- Noah - Kernellinux ( Ask Noah Show ( Altispeed Technologies (
56 min
Chris Fisher
351: It's Different This Time
All we have here is a branding problem. Video: 351: Live Video - UnfilterTube ( 351: Overtime - UnfilterTube ( Links: 2020 United States federal government data breach - Wikipedia ( 'Disinformation And Extremism in the Media' — House Committee Hearing | CBN News - YouTube ( The Great Climate Bill of 2021 Is Being Shaped Now - The Atlantic ( American Airlines Confirms Encounter With Unidentified Cylindrical Object Over New Mexico ( Developers of Oxford-AstraZeneca Vaccine Tied to UK Eugenics Movement - ( Ex-aide details sexual harassment allegations against Cuomo ( Lindsey Boylan, Ex-Aide, Says Cuomo Sexually Harassed Her - The New York Times ( 2-22-21 Trump Voters USA TODAY Marginals ( ( Biden’s slow start - POLITICO ( Biden told Letterman he got arrested at 21 for breaching chamber at US Capitol, sitting in lawmaker's seat ( German scientist says 99.9% chance coronavirus leaked from Wuhan lab | Taiwan News | 2021/02/23 ( The Blob circles the wagons around failing Afghanistan strategy – Responsible Statecraft ( Letters from House members to cable providers [pdf] | Hacker News ( The Sound and the Fury of Andrew Cuomo | The New Yorker ( Democrats question TV carriers' decisions to host Fox, OAN and Newsmax, citing 'misinformation' - POLITICO ( China Hijacked an NSA Hacking Tool in 2014—and Used It for Years | WIRED ( Weed now legal in New Jersey - Breaking911 ( Psaki dodges question on whether Biden still considers Cuomo 'the gold standard' for COVID-19 leadership - Breaking911 ( Yellen sounds warning about 'extremely inefficient' bitcoin ( Yellen Signals Interest in Backing Digital-Dollar Research ( Trump loses Supreme Court appeal to shield tax records from NY prosecutor ( People Who Wear Spectacles Are About Three Times Less Likely to Catch Covid-19, Finds Study ( Whistleblowers: Software Bug Keeping Some Inmates In Prisons Beyond Release Dates | KJZZ ( 75% Of US Troops Refused Taking COVID-19 Vaccine Says Pentagon Report | GreatGameIndia ( Germany urges 'caution' as COVID infections climb again ( Lockdown roadmap: Boris Johnson reveals shops, pubs & hairdressers will open & holiday plan will be unveiled on APRIL 12 ( Americans may still need masks to fight COVID in 2022, Fauci... ( White supremacy a global threat, says UN chief | The Independent ( Reuters, BBC, and Bellingcat participated in covert UK Foreign Office-funded programs to "weaken Russia," leaked docs reveal | The Grayzone ( Sunday shows - COVID-19 dominates as grim milestone approaches | TheHill ( Senate Leadership Coalition Announces Intention To Release Comprehensive Legislation To End Marijuana Prohibition - NORML ( ‘Stakes are high’ as QAnon conspiracy phenomenon emerges in France ( Russia reports first human cases of H5N8 bird flu - BNO News ( We’ll Have Herd Immunity by April - WSJ (
1 hr 10 min
Sudo Show
Sudo Show
Destination Linux Network
19: Sunburst and Securing Your Supply Chain
Today, Brandon and Eric take a look Solarburst, the Solar Winds vulnerability that led to one of the biggest breaches in years. You'll get their take on the impact as well as stop by the Productivity Corner to discuss 30-60-90. All that and more on this episode of the Sudo Show! Destination Linux Network ( Sudo Show Website ( Sponsor: Digital Ocean ( Sponsor: Bitwarden ( Sudo Show Swag ( UPDATED! Contact Us: DLN Discourse ( Email Us! ( Matrix: Digital Ocean: Jump Start Your Startup with DigitalOcean App Platform ( SolarWinds ( OpenNMS ( Fireeye ( Sunburst: Arstechnica: Feds Wrn that Solarwinds Hackers Likely Used Other Ways to Breach Networks ( Arstechnica: Microsoft is Reportly Added to the Growing List of Victims ( ZDNet: The More We Learn the Worse It Looks ( CNN: US Officials Scramble to Deal with Suspected Russian Hack of Government Agencies ( Open Source Hacks: Mint: Beware of Hacked ISOs ( Fossbyes: Fake Kodi Repos Hijack GitHub ( The Register: Leaky S3 Buckets ( Protecting Your Supply Chain: Docker Certification Program ( ReproducibleBuilds.Org ( Tidelift ( Linux Foundation: Preventing Supply Chain Attacks Like Solarwinds ( Open Source Security Foundation ( Palo Alto: What is a Zero Trust Architecture ( GitHub: Third Party Code Scanning ( GitLab: Dependency Scanning ( Productivity Corner: 30-60-90 Amazon: The First 90 Days, Michael D. Watkins ( Disclaimer, this is an Affiliate link. A percentage of your purchase will go to support the Sudo Show!
31 min
Allan Jude
391: i386 tear shedding
Follow-up about FreeBSD jail advantages, Install Prometheus, Node Exporter and Grafana, Calibrate your touch-screen on OpenBSD, OPNsense 21.1 Marvelous Meerkat Released, NomadBSD 1.4-RC1, Lets all shed a Tear for 386, find mostly doesn't need xargs today on modern Unixes, OpenBSD KDE Status Report, and more. NOTES This episode of BSDNow is brought to you by Tarsnap ( Headlines Follow-up about FreeBSD jail advantages ( I’ll admit I ran a lot of justifications together into a single paragraph because I wanted to get to configuring the jails themselves. They’re also, by and large, not specific to FreeBSD’s flavour of containerisation, though I still think it’s easily the most elegant implementation. Sometimes the simplest solution really is the best one. History of FreeBSD part 4: TCP/IP ( How TCP/IP evolved and BSDs special contribution to the history of the Internet *** FreeBSD: Install Prometheus, Node Exporter and Grafana ( FreeBSD comes out of the box with three great tools for monitoring. If you need more info about how these tools work, please read the official documentation. I’ll explain the installation only and creating a simple dashboard. News Roundup Calibrate your touch-screen on OpenBSD ( I didn’t expected it but my refurbished T460s came with a touch-screen. It is recognized by default on OpenBSD and not well calibrated as-is. But that’s really simple to solve. Lets all shed a Tear for 386 ( FreeBSD is designating i386 as a Tier 2 architecture starting with FreeBSD 13.0. The Project will continue to provide release images, binary updates, and pre-built packages for the 13.x branch. However, i386-specific issues (including SAs) may not be addressed in 13.x. The i386 platform will remain Tier 1 on FreeBSD 11.x and 12.x. OPNsense 21.1 Marvelous Meerkat Released ( For more than 6 years, OPNsense is driving innovation through modularising and hardening the open source firewall, with simple and reliable firmware upgrades, multi-language support, HardenedBSD security, fast adoption of upstream software updates as well as clear and stable 2-Clause BSD licensing. NomadBSD 1.4-RC1 ( We are pleased to present the first release candidate of NomadBSD 1.4. find mostly doesn't need xargs today on modern Unixes ( I've been using Unix for long enough that 'find | xargs' is a reflex. When I started and for a long time afterward, xargs was your only choice for efficiently executing a command over a bunch of find results. OpenBSD KDE Status Report (;sid=20210124113220) OpenBSD has managed to drop KDE3 and KDE4 in the 6.8 -> 6.9 release cycle. That makes me very happy because it was a big piece of work and long discussions. This of course brings questions: Kde Plasma 5 package missing. After half a year of work, I managed to successfully update the Qt5 stack to the last LTS version 5.15.2. On the whole, the most work was updating QtWebengine. What a monster! With my CPU power at home, I can build it 1-2 times a day which makes testing a little bit annoying and time intensive. Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Karl - Firefox webcam audio solution ( Michal - openzfs ( Dave - bufferbloat ( Send questions, comments, show ideas/topics, or stories you want mentioned on the show to ( ***
39 min
Security Unlocked
Security Unlocked
Judging a Bug by Its Title
Most people know the age-old adage, “Don’t judge a book by its cover.” I can still see my grandmother wagging her finger at me when I was younger as she said it. But what if it's not the book cover we’re judging, but the title? And what if it’s not a book we’re analyzing, but instead a security bug? The times have changed, and age-old adages don’t always translate well in the digital landscape. In this case, we’re using machine learning (ML) to identify and “judge” security bugs based solely on their titles.  And, believe it or not, it works! (Sorry, Grandma!)  Mayana Pereira, Data Scientist at Microsoft, joins hosts Nic Fillingham and Natalia Godyla to dig into the endeavors that are saving security experts’ time. Mayana explains how data science and security teams have come together to explore ways that ML can help software developers identify and classify security bugs more efficiently. A task that, without machine learning, has traditionally provided false positives or led developers to overlook misclassified critical security vulnerabilities.    In This Episode, You Will Learn: • How data science and ML can improve security protocols and identify and classify bugs for software developers  • How to determine the appropriate amount of data needed to create an accurate ML training model  • The techniques used to classify bugs based simply on their title    Some Questions We Ask: • What questions need to be asked in order to obtain the right data to train a security model?  • How does Microsoft utilize the outputs of these data-driven security models?   • What is AI for Good and how is it using AI to foster positive change in protecting children, data and privacy online?    Resources:    Microsoft Digital Defense Report    Article: “Identifying Security Bug Reports Based Solely on Report Titles and Noisy Data”    Mayana’s LinkedIn    Nic’s LinkedIn          Natalia’s LinkedIn          Microsoft Security Blog:  Transcript (Full transcript can be found at Nic Fillingham: Hello, and welcome to Security Unlocked, a new podcast from Microsoft where we unlock insights from the latest in news and research from across Microsoft Security engineering and operations teams. I'm Nic Fillingham- Natalia Godyla: And I'm Natalia Godyla. In each episode we'll discuss the latest stories from Microsoft Security, deep dive into the newest threat, intel, research and data science- Nic Fillingham: And profile some of the fascinating people working on artificial intelligence in Microsoft Security. Natalia Godyla: And now let's unlock the pod. Natalia Godyla: Hello, Nic. How's it going? Nic Fillingham: Hello, Natalia. Welcome back. Well, I guess welcome back to Boston to you. But welcome to Episode 16. I'm confused because I saw you in person last week for the first time. Well, technically it was the first time for you, 'cause you didn't remember our first time. It was the second time for me. But it was- Natalia Godyla: I feel like I just need to justify myself a little bit there. It was a 10 second exchange, so I feel like it's fair that I, I was new to Microsoft. There was a lot coming at me, so, uh- Nic Fillingham: Uh, I'm not very memorable, too, so that's the other, that's the other part, which is fine. But yeah. You were, you were here in Seattle. We both did COVID tests because we filmed... Can I say? You, you tell us. What did we do? It's a secret. It is announced? What's the deal? Natalia Godyla: All right. Well, it, it's sort of a secret, but everyone who's listening to our podcast gets to be in the know. So in, in March you and I will be launching a new series, and it's a, a video series in which we talk to industry experts. But really we're, we're hanging with the industry experts. So they get to tell us a ton of really cool things about [Sec Ups 00:01:42] and AppSec while we all play games together. So lots of puzzling. Really, we're just, we're just getting paid to do puzzles with people cooler than us. Nic Fillingham: Speaking of hanging out with cool people, on the podcast today we have Mayana Pereira whose name you may have heard from a few episodes ago Scott Christiansen was on talking about the work that he does. And he had partnered Mayana to build and launch a, uh, machine learning model that looked at the titles of bugs across Microsoft's various code repositories, and using machine learning determined whether those bugs were actually security related or not, and if they were, what the correct severity rating should be. Nic Fillingham: So this episode we thought we'd experiment with the format. And instead of having two guests, instead of having a, a deep dive upfront and then a, a profile on someone in the back off, we thought we would just have one guest. We'd give them a little bit extra time, uh, about 30 minutes and allow them to sort of really unpack the particular problem or, or challenge that they're working on. So, yeah. We, we hope you like this experiment. Natalia Godyla: And as always, we are open to feedback on the new format, so tweet us, uh, @msftsecurity or send us an email Let us know what you wanna hear more of, whether you like hearing just one guest. We are super open. And with that, on with the pod? Nic Fillingham: On with the pod. Nic Fillingham: Welcome to the Security Unlocked podcast. Mayana Pereira, thanks for joining us. Mayana Pereira: Thank you for having me. I'm so happy to be here today, and I'm very excited to share some of the things that I have done in the intersection of [ML 00:03:27] and security. Nic Fillingham: Wonderful. Well, listeners of the podcast will have heard your name back in Episode 13 when we talked to Scott Christiansen, and he talked about, um, a fascinating project about looking for or, uh, utilizing machine learning to classify bugs based simply on, on their title, and we'll get to that in a minute. But could you please introduce you- yourself to our audience. Tell us about your title, but sort of what does that look like in terms of day-to-day and, and, and the work that you do for Microsoft? Mayana Pereira: I'm a data scientist at Microsoft. I've been, I have been working at Microsoft for two years and a half now. And I've always worked inside Microsoft with machine learning applied to security, trust, safety, and I also do some work in the data privacy world. And this area of ML applications to the security world has always been my passion, so before Microsoft I was also working with ML applied to cyber security more in the malware world, but still security. And since I joined Microsoft, I've been working on data science projects that kinda look like this project that we're gonna, um, talk today about. So those are machine learning applications to interesting problems where we can either increase the trust and the security Microsoft products, or the safety for the customer. You know, you would develop m- machine learning models with that in mind. Mayana Pereira: And my day-to-day work includes trying to understand which are those interesting programs across the company, talk to my amazing colleagues such as Scott. And I have a, I have been so blessed with an amazing great team around me. And thinking about these problems, gathering data, and then getting, you know, heads down and training models, and testing new machine learning techniques that have never been used for a specific applications, and trying to unde…
39 min
Clear search
Close search
Google apps
Main menu