Artikel - 21.6.2005 - 3.7.2005

Open-Source Blabbermouth

Eric Raymond claims the GPL could harm the success of Open Source:

Eric S. Raymond told Federico Biancuzzi of the Italian Linux magazine Linux&C during the international forum for free software in Brazil that the General Public License could hinder the progress of Open Source.

What lies behind this is of course only his boundless stupidity and craving for attention and the constant inferiority complex towards Richard Stallman - because unlike Eric, Richard has a concept and a consistent idea. Regardless of how one stands on what Richard Stallman says - one must acknowledge that he has a line and pursues it clearly.

Eric Raymond, on the other hand, falls for cheers that he is a millionaire and other stupid remarks - and thereby threatens other open source people like Bruce Perens. And otherwise talks a lot of nonsense.

Abolishing the GPL would be a very stupid idea, because in many areas it is precisely the GPL that protects open source projects - just look at the current GPL violations. If the corresponding sources were under the BSD license, no one would care and the topic would be done - companies would simply help themselves cheaply and that would be it.

But Eric Raymond has never understood the difference between free software and free beer ...

Shit hits Fan

The recently published Sharp Internet Explorer Exploit should make it clear to Microsoft that their stance on the recent IE hole was a bit overly naive. They should have released a patch instead of just an advisory. Ideally, a patch that completely removes Internet Explorer.

T-Mobile is stupid

Honestly. It was only during the first stage with a bunch sprint that I really realized how stupid they are. Sure, Zabel didn't often win stages - but he was constantly at the front when it came to the bunch sprint. And that's how the sponsor was constantly shown at the front. At every sprint finish. Great for advertising. And now? Nothing.

As I said, they are rarely stupid.

Further Dismantling of the Right to Education

The time about the withdrawal of the federal states from free teaching materials - because the tuition fees are not sufficient to protect the citizens' sons and daughters from the dirty worker children. It could be that one of them is so good that they receive one of the few scholarships - so we make sure in advance that they don't even get the chance to come that far.

Education is our highest good - and it is increasingly restricted. The prices for specialist literature have risen sharply and will be problematic for many parents. I know from my own family environment (and also from my own experience of my school days) how restricted pupils become when their parents cannot always bring in the money as the school expects - this is further exacerbated by the purchase of school books. Some parents will certainly consider whether to send their children to grammar school or rather let them skip the three additional years of schooling - with an even greater workload of necessary textbooks than in the previous stages.

The direction taken here is fundamentally wrong. This cannot simply be explained by a false understanding of savings; in some cases, intent must be assumed, as the parts that were once introduced to ensure equal opportunities for workers and their families are now being dismantled so massively.

Another Piece from the Madhouse

The Lufthansa profits from the deportation of foreigners (since the state pays full fees for an airport slot), but may not be subject to protest as part of an online action. Because that is reprehensible, even if it only concerned the transmission of the annual general meeting and not the actual booking business. Despite registration of the action and prior legal advice, the activist is now convicted. And what is the great damage involved? 43,000 euros for Lufthansa for alleged countermeasures ...

Sorry, but somewhere I have a problem with that. Of course, denial-of-service attacks are a problem and are a pretty massive demonstration - on the other hand, highway blockades, rail blockades or large protest marches on main roads are nothing else. That is, after all, an essential part of a demonstration that a form is chosen that is noticed due to the side effects. Standing somewhere with a candle in your hand, smiling politely, is not a demonstration, but a church convention.

The action against Lufthansa, however, had been prepared and carried out exactly like a demo - but the court ignores the right to demonstrate. It's the internet, who cares. Funny, just a few days ago, interior ministers still wanted to prevent the internet from becoming a lawless space. But they probably meant something else by that ...

GEMA in Delusions of Grandeur

Anyway, you can't explain something like this any other way: GEMA demands providers to block websites. I thought that at least a judicial determination would be necessary for something like this - yes, I know, Büssow did it without a court order, but at least he has the excuse of being part of the executive. GEMA is just a fee administration, nothing more. It's quite bold of them to make blocking demands ...

Kai's Horror Tools Flashback

Somehow almost like a zombie from the grave: ArtRage is a painting program with what Kai Krause once understood by intuitive interface - so contrary to any form of interface style guides, horribly colorful, squeaky, and somehow like the Teletubbies. Just the Ohhhhhhh sound is missing ...

Hmm. I like the program. Don't ask me why. I just do.

Take that, Otto!

Owl Content

Storing IP addresses by T-Online illegal:

As early as the hearing at the end of May, Voss had the impression that T-Online's lawyer had failed to convince the judge that storing IP addresses, in particular for billing purposes, was necessary. This assessment was confirmed in the decision made by the court.

For today's charades game

Rabenhorst doesn't like the confidence vote fake either. And he links to Werner Schulz's speech as a Word file. I was so bold and made a PDF file out of it.

It's really a tragedy what's going on there and how these Prolethikers are patting themselves on the back as if they've achieved something. The cowards have been given a four-year mandate to overthrow the government - and the only thing they're throwing are the pieces - and that's it.

Sorry, but that was really no masterpiece. One would almost wish that Köhler showed backbone and common sense just once and threw the whole nonsense in the trash. Or that the complaints against the mummers before the Constitutional Court are successful.

Especially absurd is the alleged reason: they want to let the voters decide and expect chances in new elections - sorry, what? What kind of reality loss is that? The state parliaments are not composed differently just because the SPD shirks its responsibility. If the SPD were re-elected, it would have the same state parliaments and thus the same Federal Council in front of it as now.

The Special Democrats can blabber around as they want, what they are doing here is nothing more than shirking their responsibility. They don't want to be re-elected. And the mandate given to them by the voters in the last federal election doesn't interest them either.

The Inn of Lost Freedom

David Souter, one of the judges who supported the absurd eminent domain decision of the Supreme Court, might now have to swallow his own medicine:

In the small town of Weare in New Hampshire, an investment firm wants to build a hotel at the address 34 Cilley Hill Road. However, there is still a house at this very address. Coincidentally, it belongs to federal judge David Souter. Yes, he is one of the judges who signed the ruling. The "Lost Liberty Hotel" would unfortunately not make sense anywhere else, as it is supposed to contain a museum about civil rights. And finally, the entire citizenry would benefit from the tax revenues and so on.

The ruling was about the fact that eminent domain is also legal when the motivation for the construction is not the greater good of society but pure profit - whoever has money then gets the right to the land, even if it is already inhabited. Let's hope that the building committee of the city has backbone and treats the judge according to his own ruling.

Danish Government Proposes Significant Changes to the Software Patent Directive

The Danish Government advocates for significant changes to the software patent directive:

The goals expressed by Denmark in [the additional remarks to the EU Council proposal], namely to exclude patents on pure software and business methods as well as to ensure interoperability, are now specified by the Dane in the letter.

However, this does not really seem reliable to me - Denmark has aligned itself with the Council line and has only left an additional remark. Whether they will actually stand by their demands or whether this is all just a show for their own parliament remains to be seen. But at least they are making a show of it - unlike our Minister of Justice, who openly opposes the Bundestag resolution.

Locusts at the Tap

Already a bit older, but an interesting report on the dismantling of a thriving company through turbo-capitalism and greed for money.

Interesting about this is not only how the company itself was massively damaged through pure financial exploitation, so that in the end there is actually no good situation left - the effects on the environment, such as the lower business tax revenues of the city, are also interesting. A movement that we can observe in many places at the moment - companies are sold for short-term profit and then go down the drain because the new owners have no interest in the company or the employees, but only in the return on their investment. At the same time, the respective region goes down the drain as well - because the investors also have no interest in the established structures. Locusts simply have no real home.

At the same time, a good example of the fact that this stupid talk about promoting investment in the economy is exactly that - stupid talk. Our problems will not become smaller because of this, the social system will not be saved. The opposite will be the case - because the investors who are getting involved are increasingly hedge funds or private equity funds or other financial investors who just want to make a quick euro - and they are rubbing their hands at the plans of the government and the opposition (if they are to form the next government).

Locusts simply have no interest in vocational training, employee training, minimum wages and domestic production. They also have no interest in our society or our social system.

Microsoft never learns

Error in Internet Explorer with uncertain consequences:

According to Bernhard Müller from SEC Consult, Microsoft can also reproduce the crashes but does not see any risk that foreign code could be executed. Therefore, Microsoft intends to make the handling of COM objects more robust in the future, but will not release a security update.

This is about a crash of the hard kind - in direct machine code. Anyone with even a rudimentary understanding of such things knows that this is a potential gateway for malware - appropriately set data for the crash and you might have a direct path into the system. But Microsoft sees no danger ...

Pass-Chips and their possible misuse

Owl Content

A bit older, but still interesting: Biometrics/BSI Lecture Program at CeBIT 2005. Particularly interesting are the statements about the authorization of the passport chip readers:

The ICAO standard suggests an optional passive authentication mechanism against unauthorized reading (Basic Access Control). Kügler estimated its effectiveness as only minor. However, Basic Access Control would be suitable for the facial image, as this involves only weakly sensitive data.

This is the part currently being discussed regarding the passport - the authentication of the reader by the passport via the data of the machine-readable zone. This method is not protected against copying the key - once it is determined, it can be used to identify a passport. Even from a greater distance.

The contactless chip in the passport according to ISO 14443 will (naturally) be machine-readable and digitally signed as well as contain the biometric data. As the reading distance, Kügler mentioned a few centimeters, but pointed out that with current technology, reading from several meters away is possible. To ensure copy protection, the RFID chip should actively authenticate itself using an individual key pair, which is also signed.

Important here: the copy protection is handled by an active two-way authentication. A passport could therefore only be read with a stored key if it is actively involved. The keys then transmitted are so to speak bound to the respective communication - because both the passport and the reader would have their own key pair. This makes attacks via sniffing of the authentication significantly more complicated, as two key pairs must be cracked to do something with the data. Unfortunately, however, only the basic procedure is currently planned, i.e., only the keys per reader. And it gets worse:

Kügler rated the fingerprint as a highly sensitive feature. Therefore, access protection must be ensured by an active authentication mechanism (Extended Access Control). This was not defined in the ICAO standard and is therefore only usable for national purposes or on a bilateral basis.

Otto Orwell dreams of storing fingerprints - the procedure for how these must be secured is not yet defined and standardized. Such storage would therefore not be usable across the board. It is also important to ensure that only authorized devices are allowed to read. To this end, all readers would receive a key pair, which must be signed by a central authority. Anyone who has ever dealt with a certification authority knows that there must inevitably be a revocation list - a way to withdraw certificates. This is especially important for passport readers if, for example, they are stolen (don't laugh, devices also disappear at border facilities - hey, entire X-ray gates have been stolen from airports). Unfortunately, the experts see it differently:

In the subsequent short discussion, the question was asked whether a mechanism is provided to revoke the keys of the readers. Kügler indicated that this is not the case so far. However, it is currently under discussion to limit the validity of the keys temporally, but this has not yet been decided.

Hello? So there is no way to revoke a device's key. And there is - currently - no expiration of a key. If someone gains access to a reader, they have the key of the device and its technology at their disposal to read every passport in the vicinity. Without the possibility of getting rid of a device used improperly. This is like a computer system where there is no way to change the password and no way to delete a user - even in case of proven misconduct.

And once again, the extended check (and this key technology plus certificate in the reader is probably only intended for this) is only a proposal (which may not even be implemented due to the lack of interest of the Americans in the whole thing):

Kügler then described the BSI's proposal regarding Extended Access Control. According to this, an asymmetric key pair with a corresponding, verifiable certificate is generated for each reader (authorization only per reader). Therefore, the chip must be able to provide computing power for Extended Access Control. [...] Within the EU, access protection by Extended Access Control is currently only to be seen as a proposal, said Kügler. Another (unnamed) BSI colleague agreed with him and added that the Americans do not demand a fingerprint as a biometric feature on the chip at all, but rather the digital facial image would suffice for them. Only within America is a digital recording of the fingerprint planned. For this reason, the technical implementation of Extended Access Control is not urgent.

Only in this proposal is it provided that the devices receive unique key pairs and certificates based on them. Why is all this so critical now? Well, the discussion constantly focuses only on the data and the reading of the data - but these are not even that critical. Because even the stored fingerprints are not the complete fingerprints for reconstruction, but only the relevant characteristics for re-identification (although the discussion is still ongoing as to whether these stored characteristics are really unique - especially in the global context we are talking about - or whether more data does not need to be stored than in a purely national approach).

But what is always possible when we talk about such passports: the authentication and identification of a person. A two-way authentication can alone as authentication already say who is near me. If, for example, I have stored a key of a passport for the simplified procedure, I can then determine at any time without contact whether this passport is nearby - of course only within the framework of the security of the cryptographic algorithms, but that would already be a fairly secure confirmation, because it would be a pretty failure of the whole procedure if two passports with the same key allow an authentication and this has hopefully been excluded by the developers.

I can therefore obtain the keys of persons - for the simplified procedure, the machine-readable line of the passport is sufficient for this - for example, simply through simple mechanical means such as burglary, pickpocketing, social engineering, etc. - and store them. I can then feed a reader with this that, for example, in a defined area simply checks several passport data that interest me when passing through a gate - for example, a revolving door with a predefined speed is very practical for this. Only the passport with the corresponding data in the machine-readable zone will release its data for this, or provide confirmation of the authentication.

I could therefore, for example, determine when a person enters and leaves a building - without the knowledge of that person and fully automatically. With an authentication time of 5 seconds, you can already check several keys while someone walks through the revolving door.

Of course, this is still not the identification of the person - but only of the passport. But especially when the person being monitored does not know about the monitoring, the passport is worn by the person. There is no reason not to have the passport with you. And abroad, it is often a bad idea not to have your passport with you - so it is compulsorily near the person in these cases.

Well, but according to Otto Orwell, all this is just scaremongering and anyway not true and completely wrong. Unfortunately, it is based on statements by employees of the BSI - who are basically his people.

When Web Designer is a Bad Word

For example, with companies that rant against ALT attributes on IMG tags and then incorrectly refer to them as ALT tags. Well, incompetence is their concept:

Just exactly what text can a person read or see in a 1 x 1 pixel gif? Zippo. Thus, the text or line reader, JAWS, cynthia, etc, should be smart enough to see that the image size of Height="1" and Width="1" and automatically know it's a spacer and then make a if-then condition to NOT PRONOUNCE alt tag in the spacer.gif.

I have edited quite a few table layouts myself - among other things because they were simply there - and I can't remember when the spacers were actually output in 1x1 pixels. Of course, the image itself was only 1x1 pixels in size, but the width and height attributes on the IMG tags were naturally according to the size that was to be spanned. In addition, there were a lot of other layout elements in the source that were candidates for ALT="" - for good reason, layout graphics should be correctly bypassed by screen readers. But according to their idea, the screen reader should first load the graphic element, which is completely useless for it, and look at how big it is. Just because the trolls are too lazy to write ALT="" on IMG tags.

Oh, and they also demand more intelligence from screen readers:

HERE IS SIMPLE SOLUTION so EVERYONE WILL NOT HAVE TO RE-WRITE THEIR PAGES just for you.

READ THE BIG TEXT FIRST, either font tags with say 3 to 7, or CSS styles with the biggest fonts sizes. Next, read the 2nd largest fonts second, and so on. This is JUST LIKE WHAT HUMAN WOULD DO ANYWAY.....So, look for Font tags with a setting 7 or 6 or 5 or 4 and down and in that order and then start reading it. Same with CSS, PIXELS sizes of say 24px should be read FIRST, NOT LAST!! How hard can this be? This what the browsers do anyway, so why can't you do it?

Exactly. The screen readers should just figure out what they need from the tag soup (including analyzing font tags and such junk), instead of the designer thinking about what he produces and providing a somewhat logical structure for text-only browsers. Hey, what are the h-tags and their friends for since HTML 1? Oh well, it's probably all just imagination ...

But you can find even more gems there, such as the discussion about CSS vs. Table Layouts, where CSS is of course made to look really bad. Because they just don't understand what CSS is all about and why you separate HTML and CSS and what's the good idea about it. Because they probably haven't had a single good idea in their entire sad designer life and therefore wouldn't even recognize a good idea if it hit them on the head with a big stick.

Oh yes, a word of warning to more current designers at the end: don't look at their source code, because it will give you hair loss, curled toenails, and rotten teeth.

Banalpatent again

Amazon receives patent on "related products" - yes, exactly, customers who bought this product also showed interest in the following additional products now has a US patent. And of course, something like this would never be enforceable as a patent in Europe (and pigs can fly). It's great to see how innovative software patents are and how important they are for strengthening the software industry - because with such a patent, one could make a fortune in the warning letter paradise of Germany and kick out annoying competition. By the way, they already have the patent on one-click ordering. Yes, web shops could become a legal minefield if the EU Council's software patent directive prevails. And patent lawyers will become fat and rich ...

Still Strange Finder Stories

My Finder still shows all applications twice or even three times in the context menu for a file in the Open With submenu. And I can't figure out for the life of me how to fix this. Hasn't anyone else had this problem? There must be a way to clean it up, after all, the menu is dynamically created by OS X from the installed applications - but there must be some kind of type registry somewhere where applications register themselves so that OS X knows they can read this file type. And that's the place you should be able to clean up. But how in the world do you do that? Where does OS X remember which programs can open which file types?

Schily considers data protection to be scaremongering

Owl Content

Privacy advocates' concerns are fear-mongering - at least according to Otto Orwell:

Concerns about biometric passports, RFID technology, and tele-surveillance, expressed for example by privacy advocates, are fear-mongering that one should not fall for, said Federal Interior Minister Otto Schily at the symposium "Computers in everyday life - opportunities for Germany" in Berlin. The mentioned technologies are not used to monitor or suppress citizens, but to increase their security.

Funny. I rather believe that Otto Orwell's talk is simply fear-mongering - what security is increased by massive and widespread spying on citizens? Certainly not the citizens' security - but they are being fed pseudo-risks and alleged solutions for them, just like the Bush administration, to reduce their civil rights in Germany. Without regard for facts, without regard for proportionality.

The ignorance he attributes to the critics is probably on his side. Because he may still be considered competent as a lawyer (I can't judge his competence there), he has no clue about cryptography and its risks - as they come into play, for example, in the context of passports valid for 10 years.

Who wants to make statements about the security of cryptographic methods today if they have to make this statement for a point in time 10 years from now? Yes, I know, Otto Orwell does - as I said, he simply has no idea what he is talking about. SHA1 was once described as a secure alternative to MD5 signatures - and has essentially failed. MD5 signatures are now completely unusable - as scientists have proven when they produced two real texts with meaningful content and identical MD5 signatures. I've had enough of pathetic politicians with brains too small, who want to impose their alleged doctrines on citizens with absurd claims. And I've long had enough of their idiotic argumentation loops with which they want to sell total surveillance as a security feature to citizens.

Who wants to laugh again ...

Study Shows Windows Beats Linux on Security - this time, Microsoft bought the desired results from the company Wipro. Just as absurd as previous attempts in the same direction. Contains such gems as:

“We already know how to secure a Windows-based solution and keep it running smoothly,” says Stephen Shaffer, the airline’s director of software systems. “With Linux, we had to rely on consultants to tell us if our system was secure. With Windows, we can depend on Microsoft to inform us of and provide any necessary updates.”

Sorry, but seriously: if my IT manager tells me he relies on Microsoft for the security of his systems, that would be a reason for me to fire the guy as quickly as possible.

WordPress 1.5.1.3

WordPress 1.5.1.3 includes an important security fix. So at least take the xmlrpc.php from the release.

Americans and Logic

Apparently, a majority of Americans are dissatisfied with Bush - Kids, just as info: 59 million of you voted for him.

iTunes Podcasting not with old iPods?

It seems that PodCasting is only supported with iPods starting from the Clickwheel-iPods. Those with the old mechanical wheel don't get a firmware update, and neither do the Touchwheel-iPods. Which I honestly find quite pathetic. The Touchwheel-iPods aren't that old after all, they don't need to be phased out already.

confused face

Not that it bothers me much - I don't read most of the blogs by podcasters, I wouldn't know why I would want to listen to them - but somehow it bothers me when gadgets are retired as too old too quickly. Especially when they are high-priced items like an iPod.

Pfahl confesses

Pfahls-Prozess: The "Phantom" in Court - and indeed as the tenor. And a weak glimmer of hope on the horizon shows - that perhaps one of the most vile political smear stories will be unraveled.

Strucki apparently has damage from the stroke after all

After all, this would explain his latest idea - which I found on the Schockwellenreiter - to want to use unemployed people as training material for the Bundeswehr.

On the other hand: with this, he could then practice armed house combat and storming of civilian fortifications again. Really nicely with hand flamethrower cartridges, battering rams, fragmentation grenades ...

Hey, according to the argumentation of various politicians (if I hear this dehumanizing "fördern und fordern" already), the unemployed are anyway the last dirt, so it doesn't matter if the Bundeswehr freaks - whose gentle manners are proverbial - then nicely heat up the opponent.

Well, it is probably true: you can't be stupid enough to become a federal minister.

Entrepreneurs against software patents

Software patents: Entrepreneurs accuse Union of "electoral fraud":

Entrepreneurial initiatives from several federal states warn in an open letter (PDF) the CDU and CSU members of the European Parliament against "committing systematic electoral fraud" and "causing entrepreneurial misjudgments (...)." The Union should finally admit that it is closer to Microsoft than to the German middle class.

One trigger was SAP:

The Walldorf-based SAP AG recently placed full-page ads in EU magazines urging the proposed directive. SAP demands "patent protection (...) for innovations in IT, as created by SAP (...)." However, these innovations lie exclusively in the software sector. SAP software is used for accounting, order processing, and financial reporting. The SAP ad mentions the term "business processes" (between companies and within) three times.

Of course, the Justice Ministry sees this massive incompetence quite differently and still claims that pure software patents are not possible - even though reality has long since said otherwise. And so we (open-source programmers as well as medium-sized software companies) are being sacrificed on the altar of the software industry - which then politely thanks with greater job cuts and relocation of software production to countries outside the EU.

What a mess

Soothing Priorities

FTPWelt.com: First criminal proceedings initiated against users:

Parallel to the investigations against the users, the prosecution of the four alleged masterminds from southern Thuringia and Munich is being prepared, Germerodt announced.

Exactly. Before nailing down the masterminds, one first goes after the much more lucrative end users. Reassuring that in Germany too the focus is always on the petty criminals (if such a term is even permissible for FTPWelt users) and not so much on the masterminds ...

Cultureless State Parliament?

Culture Committee in the State Parliament abolished?:

If this were the case, cultural policy in NRW would only be in the hands of the state government, criticizes the German Cultural Council. Because: The committees in the state parliament have the task of parliamentary accompanying and controlling the work of the government. Thus, cultural policy is actually democratically legitimized in the cultural committee, its abolition would cause considerable damage to this legitimacy, according to the Cultural Council.

Well, with such culturally barren barbarians in the state government, it is by no means surprising that culture no longer gets an appropriate place ...

New Scientist SPACE - Breaking News - Hubble spies lord of the stellar rings

Hubble spies lord of the stellar rings - Saurons Auge guckt aus dem Weltraum auf uns. Und nur aus einer Entfernung von 25 Lichtjahren - das ist praktisch um die Ecke von hier. >The ring is composed of dust particles in orbit around Fomalhaut, a bright star located just 25 light years away in the constellation Pisces Austalis – or the Southern Fish. A recent image captured with the Hubble Space Telescope - which makes the system look uncannily like the Great Eye of Sauron from the blockbusting Lord of the Rings trilogy - confirms that Fomalhaut’s ring is curiously offset with respect to the star. Interessanter als das eigentliche Aussehen (wobei das wieder mal ein Beweis für die Notwendigkeit des Weiterbetriebs des Hubble Teleskops für mich ist) ist natürlich der vermutete Grund für das Aussehen: der Stern könnte ein Solarsystem ähnlich dem unseren haben. Also mehrere Planten in unterschiedlichen Entfernungen - möglicherweise sogar relativ kleine Planeten.

Strange Court Decisions Are International

Supreme Court rules against P2P, Apple to benefit?:

The U.S. Supreme Court ruled in favor of studios and record labels, saying that peer-to-peer software companies should be liable for the copyright infringement of people using their products

Presumably, hammers, cars, and curtain cords will also be banned in the USA next. Oh no, that's not possible - murder isn't such a serious crime as copyright infringements ...

I would be interested to know how the court wants to maintain such a decision in the context of a network like freenet - where there is no central instance or company. But facts seem to be completely irrelevant in the entire copyright discussion around the film and music industry anyway.

PEP 342 -- Coroutines via Enhanced Generators

PEP 342 describes simple coroutines for Python. Coroutines are essentially mini-threads with manual control - you can freeze code in the middle and restart it with a new defined value. Thus, coroutines provide the first step towards primitive continuations - the only thing missing would be the ability to copy a coroutine.

Philip J. Eby writes about the implementation of this PEP - which, by the way, is based on Python's generators and iterators.

Come on, folks, finally ensure that generators are copyable and it's done.

Satellite photo of Münster

Google Maps are really quite funny - even if the images are sometimes unfortunately a bit thin in resolution. Here is the satellite image of Münster. The long blue blob is the Aasee - an artificial reservoir of the Münsteraner Aa created by Hermann Landois. The strange green ring in the city is the Promenade - a remnant of the old city fortifications and one of the main traffic routes for cyclists in Münster. The green outgrowth on the ring to the left, above the Aasee, is the Schlosspark. The blue strip from top to bottom in the right area of the image is the Dortmund-Ems Canal - the widening in the upper area is the lock system and the branch to the left into the city is the Stadthafen.

And as usual, I realize that a) I take too few photos of Münster and its surroundings and b) Wikipedia contains impressively many things.

Off he goes, data protection

Owl Content

Because the interior ministers want to store connection data for one year. And the demands are very far-reaching:

The interior ministers' conference, meeting under the motto "Mit Sicherheit was los" (With certainty something is going on), expressed its support at its meeting on Friday in Stuttgart for a minimum twelve-month retention of telephone and internet data by telecommunications providers. The security experts, who consider this measure, which deeply encroaches on fundamental rights, particularly necessary in cyberspace.

The fact that this data desert violates data protection regulations and has so far always been rejected by the Bundestag is completely irrelevant to the interior ministers. And Schily already has concrete plans on how to circumvent this hurdle:

The SPD politician referred in Stuttgart to the plans for the blanket surveillance of users, which the national government representatives in Brussels are currently pushing forward via the EU Council, disregarding the EU Parliament. This involves obliging providers to retain all connection and location data for months and years, which arise during the provision of services such as telephoning, emailing, SMS sending, surfing, chatting or file sharing.

A very simple solution - let's use the undemocratic EU decisions, where a government can decide without the Bundestag. The federal government has already set an example with software patents. And then one can subsequently refer to the fact that one is merely implementing EU law. It may have nothing to do with democracy, but who cares. Democracy doesn't interest Otto Orwell and his colleagues anymore anyway.

Also nice to see how the interior ministers deal with the - justified - criticism:

Concerns from civil rights activists that the retention of data would mean that all electronic communication of people is monitored and that users are placed under a disproportionate general suspicion were dismissed by Rech. In his opinion, the term "glass citizen" is "overused".

If necessary, the data protection officers will simply be gagged, as Otto Orwell has already tried to do. The fact that the economy is massively against it because it will cause disproportionately high costs is also irrelevant to them. Absurd decisions in the name of alleged security and alleged malice of the internet have even stood up in court - as can be seen from the absurd blocking orders of the Düsseldorf government presidency. Fortunately, one is still allowed to report on it, as a court has recently ruled. For now. Otto will surely come up with something ...

The network must "not degenerate into a lawless space," explained Rech, referring to the often expressed fear of security politicians about allegedly unregulated online areas.

Sorry, but if the interior ministers' efforts succeed, the internet is a lawless space. Free from the right to informational self-determination. Free from data protection. Free from proportionality of means.

For me, one thing follows quite clearly: the focus on the user-friendliness of projects like gnupg, tor and mixmaster must be significantly increased on the client side, so that we have a chance at all to protect ourselves from this data collection mania of the interior ministers. Unless one wants to find one's own movement profile on the internet publicly available for download at some point or explain to the nice gentleman from the domestic intelligence service why one was on the left-wing radical website ...

John Cleese speaking

To The Citizens Of The United States Of America:

In light of your failure to elect a competent President of the USA and thus to govern yourselves, we hereby give notice of the revocation of your independence, effective today. Her Sovereign Majesty Queen Elizabeth II will resume monarchical duties over all states, commonwealths and other territories. Except Utah, which she does not fancy.

Read. Really.

Devil's Grin

LiveSearch with WordPress works

I just took a look at LiveSearch and played around with it a bit. It can be integrated into WordPress with some hacking. If you now enter a term in the search form on the right, a list of search results will appear after a short delay - specifically the titles of the posts. This uses the normal WordPress search, so these are the same results you would get if you simply pressed Enter - just faster thanks to Ajax and as a direct inline list. Fun stuff. Should work with current IEs, Mozilla derivatives, and current Safaris.

However, strangely enough, the cursor keys for moving through the search results don't work for me, even though the code seems identical to the BitFlux page. Somehow it doesn't find the first line or something - very strange. But that part doesn't really interest me, so it doesn't bother me if it doesn't work.

Hmm. Safari works flawlessly, but my Firefox under OS X doesn't seem to work. Very strange. To be precise, it works with Firefox only after I delete a character with Backspace or press Space once. After that, it runs smoothly. Can someone explain this to me? Strangely enough, the cursor key navigation in the search results works with Firefox - if you have a list of results...

Update: strangely enough, the cursor key navigation now works in Safari. Something here is very strange ...

Microsoft and RSS

Well, Microsoft is jumping on the RSS bandwagon and what do they do? Of course, they create an extension that will likely cause problems with many parsers: Simple List Extensions Specification.

Where the problems might lie? Well, Phil Ringnalda has described it quite well. And when I look at the above format description from Microsoft, I'm not really clear why they need this extension at all ...

Safari and the Rabenhorst

Does anyone know why Safari on Tiger is saying goodbye to Rabenhorst? And if someone knows, can they tell Kai so he can fix it and I don't have to rewrite an article every time because I wanted to check something with him again?

The strange thing: when I turn off JavaScript with PithHelmet on his site, nothing happens. But his site has no JavaScript - only the Jabber status (which, by the way, is displayed extremely large without JavaScript activation) is embedded via an OBJECT tag instead of an img tag. Could it be the OBJECT tag for PNGs that sends Safari to the Orkus?

Ah, yes, after a bit of digging, it seems to be the case. Go to this page and you will have the same problem - Safari crashes. Apparently, the OBJECT tag is used to display PNGs on older IEs as well - the same PNG is referenced via an OBJECT tag and an included IMG tag. Unfortunately, this leads to crashes with Safari 2.0.

Why disabling JavaScript (not disabling plugins, which one would rather suspect with the OBJECT tag!) leads to Safari not crashing and the PNG being displayed incorrectly (too large), I honestly don't quite understand ...

Oh, and the bug with object tags seems to have existed for a long time - the oldest reports I found in Google are from 2003. It would be nice if Apple would actually fix the bug. Or someone else, since the source is now available.

By the way, OmniWeb - although it also relies on the WebCore framework - does not have this problem. It would have been too easy ...

Update: the culprit has been found. It was the WebDevAdditions for Safari - I simply installed the current b11 and everything works normally again.

Merkel muzzle

Merkel imposes gag order on Union regarding VAT increase:

CDU leader Angela Merkel has reportedly imposed a gag order on her party and faction regarding the topic of VAT increases.

Of course not because the Union does not want to implement a VAT increase - but because voters should not be given the idea that they are firmly planning a VAT increase and then possibly vote for other parties.

The frightening thing about so much stupidity in the strategy? It will probably work with the German voter ...

Environmentalists criticize the Whaling Commission

Those who believed that the meeting of the Whaling Commission was a success for animal rights activists will be proven wrong:

Japan announced that it will double the quota for scientific whaling to more than a thousand whales. In the future, not only minke whales but also endangered fin and humpback whales will be hunted. Homes describes this as a "catastrophe for species conservation."

Under the guise of alleged science, the madness will continue - regardless of whether there will eventually be no more humpback or fin whales left. The threats to small whales will also not decrease in the future - because changes in fishing will not be discussed. Regardless of whether thousands of small whales die in the process.

And of course, all of this is again only for commercial purposes. Even Norway - which certainly has its own whaling history - kills whales mainly to sell them to Japan, where there is more money to be made ...

WebObjects 5.3 and Linux?

Apple releases WebObjects 5.3 Update:

Deploys to virtually any J2EE server or the WebObjects J2SE application server

Who hosted the first WebObjects application under Linux on an OpenSource J2EE server?

CardSystems Exposes 40 Million Identities

Bruce Schneier with some thoughts and possible demands regarding the recent security debacle at a large American credit card authorizer. Apparently, the data should not have been on their system at all - due to the high demands that credit card companies (at least in the documents) place on authorizers, Card Systems should actually be out with Mastercard and Visacard.

Microsoft's Omnipotence Fantasies

Microsoft will enforce Sender ID:

Now Microsoft apparently wants to enforce the system on its own, because soon all emails to Hotmail users that do not come with Sender ID will be visibly marked for Hotmail users and thus labeled as potential spam.

Great. Very big strategy. The working group was dissolved because no agreement could be reached because the patent situation with Sender ID was not resolved by Microsoft - and now Microsoft simply wants to enforce it again.

But I think that in this case Microsoft is cutting into its own flesh: there have long been significantly better webmail services that also play significantly better in the network community. Hotmail has long since lost the importance it once had before being sold to Microsoft. Therefore, my prognosis is that not many people will be particularly impressed by this step. The victims are the Hotmail users and possibly their correspondents, who are stuck with an even inferior mail service anyway ...

Search engines are not liable for stored thumbnails

No damages for image display in search engine thumbnails - which even received a sensible reasoning from the court, as the thumbnails are only temporarily stored for processing search queries. Although the reasoning is so logical that one almost expects the whole thing to be overturned on appeal and the Hamburg variant (search engines may only use images with consent - which would de facto make image search engines impossible, at least on the scale that would be useful) to prevail ...

The diaries of Franz Kafka, 1910-1923

I am neither the first nor the most original person to write about Franz Kafka blogged. But no matter how late I jump on the bandwagon, this is a blog that you really should read. And even a Megawattworm couldn't find anything to criticize about its intelligence.

About Moleskines ...

... writes Astrid Paprotta - lovely.

I admit that I also use Moleskines - the Red-Black ones are also quite nice, but they are too thick for me. Although the Moleskine could also be one or two centimeters smaller. They can also be used well with a ballpoint pen ...

Hypocritical Phonies

State Secretary sees potential for improvements in software patent directive - while her boss lobbies for the Council's proposal in the European Parliament. Of course, they are so well informed by software patent opponents - as we could see how the government implemented the Bundestag's request ...

Webspammer with new tricks?

It seems like web spammers are learning a few new tricks. In any case, I stumbled upon links to myself that come from a WordPress blog consisting only of wild HTML snippets that seem to have been created due to searches for "house" - and then in the blogroll of the blog are various typical junk sites. So it could be that spammers are now building pseudo-sites with links and content that are supposed to flood the search indexes of systems like Technorati or the ping services.

Oh, and the Texas-Holdem guys have also learned a few new tricks - the URLs now have more changing server names and file names so that normal keyword filters no longer work quite as well and I am more often presented with spam for moderation - for a long time the stuff went directly into the trash because the guys were really too stupid ...

Annoying bunch.

confused face

NeoOffice/J 1.1 Final is out

NeoOffice/J is indeed a software monster - but so are all other office packages (at least those with a correspondingly large range of functions). And unlike the others, NeoOffice/J is not only free beer but also free speech. So go and download, so that Microsoft gets another kick in the ass.

Nostalgia-Surfing

Softlanding Linux System was the first Linux distribution I used. I had it copied onto 5 1/4" floppies from an acquaintance through the university. Slackware - which emerged from it - I naturally only smiled at and ignored as a high-tech user, as it still used the outdated a.out executable format. I switched quite early to Debian (still a 0.9 version) - but I have been consistently loyal to it only since version 1.2.

On my desktop computers, all kinds of systems - and unfortunately far too many PC systems among them, as I didn't have my Mac from the beginning. So I struggled with OS/2, various Windows versions, and again and again DOS with all kinds of multitasking add-ons (Desqview was cool).

Exotics also got a chance: with the Mac, I also tried BeOS for quite a while - but the software offering was too boring for me. And on the PC, the weirdest thing was a stripped-down Windows 3.1 of mine that served as a bootloader for ObjectWorks (which merged into Visual Works) and then managed my system in Smalltalk - but it wasn't a solution either due to the system break.

Linux on the desktop? I'd rather not. At the company for a while, at home also from time to time (also on a Mac), but somehow it never really clicked. Too spoiled by the Mac, I think. Although it's strange - because especially for Linux there are the most programming language implementations, and programming in exotic languages has remained my favorite game genre to this day ...

Servers? Since Debian, only Linux. 9 years now. Although in times of Apache+stuff, it has almost become irrelevant what runs underneath. It's also strange how we have achieved the holy grail of programming - fully portable software that doesn't care about operating systems. Completely without Java, by the way. The new desktop is the web browser anyway.

In my professional career, there are also things like MVS system programming in Assembler and longer years of Cobol slavery. But I'll spare us the links ...

Apple sued over iTunes interface

Patent madness this time against Apple:

These areas include iTunes' menu selection process, the ability of the software to transfer music tracks to a portable music player, and search capabilities such as sorting music tracks by genre, artist and album.

Translated: the guy claims to have patents on how to select menus in iTunes, copying music files to a portable player, and sorting music tracks by genre, artist, and album. Great. Very high level of creativity.

Of course, patent supporters will now have plenty of reasons why this would not be possible in Europe. And they will refer such nonsense as the one above to the realm of fantasy until the cases are actually tried in European courts.

It's amusing when a company that likes to wield the lawsuit club against copied interfaces finds itself on the receiving end of such a lawsuit club. But the matter itself is concerning - what is being done with patents today has nothing to do with the original intention - protecting the inventor from exploitation by powerful companies.

The Horror of Sony DRM

Who wants to know what Sony's digital rights management really means for a Windows user: Michael Amor Righi describes the joys he had with a CD and the DRM software, especially the removal of the latter ...

Found at zenzizenzizenzic