Semantic Gnosis Web
3.9K views | +1 today
Follow
Semantic Gnosis Web
Ariadne's invisible wire in the web maze
Curated by Jan Bergmans
Your new post is loading...
Your new post is loading...
Scooped by Jan Bergmans
Scoop.it!

Innovation under Austerity - Transcript - Software Freedom Law Center

Innovation under Austerity - Transcript - Software Freedom Law Center | Semantic Gnosis Web | Scoop.it
The Software Freedom Law Center provides legal representation and other law related services to protect and advance Free and Open Source Software.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

So Hey You Should Stop Using Texts for Two-Factor Authentication

So Hey You Should Stop Using Texts for Two-Factor Authentication | Semantic Gnosis Web | Scoop.it
A string of recent SMS hacks means security-conscious users should switch to a more secure login system.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

How the ‘insecurity of things’ creates the next wave of security opportunities

How the ‘insecurity of things’ creates the next wave of security opportunities | Semantic Gnosis Web | Scoop.it
Data from an HP IoT study shows that 80 percent of IoT devices failed to require passwords of sufficient complexity and length. As much as 70 percent of the devices did not encrypt communications. And 60 percent of these devices raised security concerns with their user interfaces. In an OpenDNS IoT study, 23 percent of respondents said they have no mitigating controls to prevent unauthorized device access in their company’s networks.

In an IoT security study conducted by Yokohama National University, researchers created an IoT honey pot, or an IoTPOT, to attract the bears. They found that Telnet-based attacks on IoT devices have rocketed since 2014. Telnet is a communication protocol that has no encryption or authentication. All data is transmitted in plain text. Yet a large number of industrial and scientific devices have only Telnet as a communication option.

Secure Shell protocol, or SSH, is a better option, but it increases bandwidth overload. And worse, some IoT devices cannot be configured to SSH, unless the interface appliance can be re-configured. With 70 percent of devices communicating in plain text, breaking in becomes easy.

New malware is being developed to target IoT.
Katsunari Yoshioka, who conducted the IoTPOT study, says, “Using an over-30-year-old insecure remote access service like Telnet for global access is technically simple and easy to fix. But the mass infections shows how many manufacturers do not really care, or do not know how to secure their products.”

Once hackers gain access to devices, the next step is infection of the device; the last step is monetization. Five distinct DDoS malware families targeting Telnet-enabled IoT devices have been invented. Your DVR has already being hacked and used as a botnet — you just don’t know it!

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

North American Cities Are Slow To Adopt Open Source Software - Contributed Content on Top Tech News

North American Cities Are Slow To Adopt Open Source Software - Contributed Content on Top Tech News | Semantic Gnosis Web | Scoop.it
Cities that want to make the move to open source should take the following steps:

1. Look for upcoming end-of-life or expiry of existing proprietary licenses as an opportunity to migrate away from them to something less expensive.

2. Look at the subscription model of some critical open source software as a way to move necessary purchases to an operating expense budget as opposed to a capital expenditure budget and eliminate large budget outlays for new or renewed proprietary software.

3. Prepare a reasonable transition plan that will accommodate any training and adjustment of staff to new applications.

4. Ensure when budgeting that the total cost of ownership is considered over the lifespan of the project and not just the upfront initial costs.

5. Use software that will allow IT to run both Windows and open source software side by side during the transition period.

6. Find the political willpower to get it done. This will require action by elected officials, but it may need leadership from IT to show them what can be done.

The move to open source is inevitable as open source communities of developers continue to work on thousands of applications and as more software development companies invest in an open source model to allow for greater flexibility and lower end user prices than existing proprietary competitors. Europe has more than a decade head start on North American cities. The quality of available open source software has improved so much in that decade that the transition can be far easier for cities starting now, than it was for Munich when they got the ball rolling in Europe.

Kevin Gallagher is CEO of Inuvika Inc., a Toronto based open source company that delivers application virtualization software. www.inuvika.com

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Khan Academy

Khan Academy | Semantic Gnosis Web | Scoop.it
Learn for free about math, art, computer programming, economics, physics, chemistry, biology, medicine, finance, history, and more. Khan Academy is a nonprofit with the mission of providing a free, world-class education for anyone, anywhere.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

​Tor Is Teaming Up With Researchers To Protect Users From FBI Hacking

​Tor Is Teaming Up With Researchers To Protect Users From FBI Hacking | Semantic Gnosis Web | Scoop.it
security, anonymity, Tor Browser, hacking, privacy, Selfrando, FBI, law enforcement, power, encryption, machines

more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Public consultation on the role of publishers in the copyright value chain and on the 'panorama exception' –

Public consultation on the role of publishers in the copyright value chain and on the 'panorama exception' – | Semantic Gnosis Web | Scoop.it
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

It isn't just the DMCA that is broken beyond repair: Copyright Office refuses FSF comments | Defective by Design

It isn't just the DMCA that is broken beyond repair: Copyright Office refuses FSF comments | Defective by Design | Semantic Gnosis Web | Scoop.it
As we wrote back in February, submitting comments to the Copyright Office requires the use of proprietary JavaScript. No one should be required to use proprietary software simply to communicate with their government. But the Copyright Office would not offer any other means of submitting comments digitally. So we delivered the signed comment in person. But the Copyright Office has refused to accept the comment as delivered.

This is an unjust outcome for what we all hoped would be an opportunity to help the Copyright Office fix the broken anti-circumvention system. But while the Copyright Office refuses to listen, there are others who will. You've done so much already to help our voice be heard, can you help us finish the job? Here's what you can do to help:

If you microblog, please share the following message (or your own) with the hashtag #endDRM. We strongly suggest that if you use Twitter, you do it in a way that avoids using proprietary software:

The DMCA's anti-circumvention rules are broken beyond repair, the time to end Digital Restrictions Management is now. #endDRM https://u.fsf.org/1rq

Share this post with your friends and colleagues to help spread the word.
Support our fight to end DRM by making a donation

Donald Robertson's blog
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

HTML5 APIs Fingerprint Users - How to Prevent - Blog | add0n.com

HTML5 APIs Fingerprint Users - How to Prevent - Blog | add0n.com | Semantic Gnosis Web | Scoop.it
HTML5 APIs Fingerprint Users - How to Prevent The word fingerprinting comes from the forensic analysis of a human hand. These fingerprints are considered markers of human identity as they’re not easy to alter and are durable over the lifetime of an individual. These characteristics make them suitable markers for human identity. In similar fashion, our computers and multimedia devices can be identified and tracked by websites we access on these devices.

A Glimpse of Technology
Jan Bergmans's insight:
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Hardly Anyone Trusts The Media Anymore — Medium

Hardly Anyone Trusts The Media Anymore — Medium | Semantic Gnosis Web | Scoop.it
Only 6 percent of people say they have a great deal of confidence in the press, about the same level of trust Americans have in Congress, according to a new survey released on Sunday.

The study mirrors past reports that found the public’s trust in mass media has reached historic lows, according to data gathered by the Media Insight Project, a partnership between The Associated Press-NORC Center for Public Affairs Research and the American Press Institute. The report found faith in the press was just slightly higher than the 4 percent of people who said they trusted Congress.

Alongside the dire findings, the report found respondents valued accuracy above all else, with 85 percent of people saying it was extremely important to avoid errors in coverage. Timeliness and clarity followed closely, with 76 percent and 72 percent respectively saying those attributes were imperative among media sources.

“Over the last two decades, research shows the public has grown increasingly skeptical of the news industry,” the report reads. “The study reaffirms that consumers do value broad concepts of trust like fairness, balance, accuracy, and completeness. At least two-thirds of Americans cite each of these four general principles as very important to them.”

Ironically, despite news organizations’ ongoing battle to master social media platforms, that trust doesn’t extend to the likes of Facebook and Twitter. The report found just 12 percent of people trust media delivered via Mark Zuckerberg’s evolving juggernaut, even though 87 percent of people get news from Facebook.

LinkedIn, in fact, garnered the most faith over competitors like Instagram and Reddit, with 23 percent or people finding links from the site trustworthy.

The Associated Press notes the news media has been embattled by a series of high profile missteps, particularly Rolling Stone’s retracted report about a rape at a fraternity at the University of Virginia.

The media has also faced a barrage of criticism during the ongoing presidential campaign season, particularly from Republican leaders including Donald Trump and Ted Cruz. Trump has launched repeated attacks against Fox News’ Megyn Kelly (culminating in a reported “clearing of the air” last week), while Cruz has lambasted the press for being too hostile.

You can take a look at the full results here.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Basisinkomen 2018- Een basisinkomen voor iedere volwassene. Teken de petitie.

Een basisinkomen voor iedere volwassene. Teken de petitie.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Onderzoek naar LSD biedt mogelijkheid voor therapie

Onderzoek naar LSD biedt mogelijkheid voor therapie | Semantic Gnosis Web | Scoop.it
Britse onderzoekers hebben eindelijk onderzoek gedaan naar de effecten van LSD op de werking van de hersenen. Het onderzoek heef
Jan Bergmans's insight:
LSD
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

The Next Office Is Outside

The Next Office Is Outside | Semantic Gnosis Web | Scoop.it
Who says going to work has to mean sitting at a cubicle all day? Coming this summer Popices will be setting up outdoor offices all across Amsterdam.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

US Customs wants to collect social media account names at the border

US Customs wants to collect social media account names at the border | Semantic Gnosis Web | Scoop.it
Your Twitter handle may soon be part of the US visa process. Yesterday, US Customs and Border Protection entered a new proposal into the federal register, suggesting a new field in which persons entering the country can declare their various social media accounts and screen names. The information wouldn’t be mandatory, but the proposed field would still provide customs officials with an unprecedented window into the online life of travelers. The process already includes fingerprinting, an in-person interview, and numerous database checks.

The proposal focuses on arrival / departure forms commonly collected from non-citizens at the US border, as well as the electronic form used for anyone entering the country under a visa waiver. Under the proposed changes, those forms would include a new optional data field prompting visitors to "please enter information associated with your online presence," followed by open fields for specific platforms and screen names.

It’s unclear from the proposal how thoroughly officials will examine the social profiles, although it’s clear they will be used for investigative purposes. "Collecting social media data will enhance the existing investigative process and provide DHS greater clarity and visibility to possible nefarious activity and connections," the announcement reads.

The public has 60 days to comment on the new proposal before it will be formally considered. Comments can be mailed to Customs and Border Protection at its Washington office.

Immigration and intelligence agencies have been under increasing pressure to scrutinize social media profiles after the San Bernardino shooting in December of last year. One of the attackers had posted a public announcement on Facebook during the shooting, and had previously sent private Facebook messages to friends discussing violent attacks. Crucially, the private messages were sent before receiving her visa. That news provoked some criticism, although investigators would have needed significantly more than a screen name to see the messages. State Department officials claimed to be reviewing the visa application processes in the wake of the attacks.

VIATHE HILL JOSEPH LORENZO HALL (TWITTER)
SOURCEFEDERAL REGISTER
RELATED ITEMS SOCIAL MEDIA HOMELAND SECURITY
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

The Muse raises $16 million for its next-gen career site

The Muse raises $16 million for its next-gen career site | Semantic Gnosis Web | Scoop.it
The Muse, a New York-based career site that offers job opportunities, skill-building courses, coaching, and video profiles meant to show what it’s like to work at different companies, has raised $16 million in Series B funding led by Icon Ventures. Earlier backers Aspect Ventures, DBL Partners and QED Investors also joined the round, which brings funding for the 4.5-year-old startup to $28.7 million.

Co-founder and CEO Kathryn Minshew says the platform’s users are largely women — 65 percent of them, in fact — with 50 percent of users below age 30, another quarter of them in their 30s, and the rest age 40 and over. That’s apparently been good for business. “When women find The Muse,” says Minshew, “they’ll come back and tell us, ‘We told 15 people,'” about the platform.

What’s also good for business is LinkedIn’s announced sale last week to Microsoft for a stunning $26.2 billion, says Minshew. We talked yesterday about why the acquisition bodes well for The Muse, as well as what the company is building right now that could double its size.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Transgender man bevalt van dochter

Transgender man bevalt van dochter | Semantic Gnosis Web | Scoop.it
In IJsland is een 19-jarige transgender man bevallen van een meisje. Kort nadat hij besloot om door het leven te gaan als man, ontdekte hij da
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Future Of Hacking

Future Of Hacking | Semantic Gnosis Web | Scoop.it
The Internet we know today is only one possible interpretation of the original vision of an open, peer-to-peer network. Think of it as a first-generation Internet, built on a fragile global network of vulnerable codes subject to abuse and even collapse. This Internet is failing from too close an encounter with a triple shock: a…
Jan Bergmans's insight:
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

The European Commission Wants You To Log Into Social Media Accounts With Govt-Issued ID Cards

The European Commission Wants You To Log Into Social Media Accounts With Govt-Issued ID Cards | Semantic Gnosis Web | Scoop.it
The European Commission Wants You To Log Into Social Media Accounts With Govt-Issued ID Cards
Jan Bergmans's insight:
The Vice President for the Digital Single Market on the European Commission, former Communist Andrus Ansip, is behind the next European Union (EU) raid on personal freedoms, promoting the idea of using national ID cards to log in to online services. Leaked documents from within the European Commission revealed a call for the roll out of a more extensive use of national ID cards across the EU. The documents have since been uploaded to the Commission’s own website. Mr. Ansip is from Estonia, a small Baltic country and former Communist state which has the most highly-developed national ID card system in the world. The Estonian state website boasts: “Much more than simply a legal picture ID, the mandatory national card serves as the digital access card for all of Estonia’s secure e-services.” The paper outlines that: “In particular, online platforms need to accept credentials issued or recognised by national public authorities, such as electronic ID cards, citizens cards, bank cards or mobile IDs… for every consumer to have a multitude of username and password combinations is not only inconvenient but becomes a security risk.” This draft document entitled ‘Online Platforms and the Digital Single Market’ is dated 25 May this year, and urges the log in policy on the basis that fake user reviews are misleading European consumers. The document states: “Online ratings and reviews of goods and services are helpful and empowering to consumers, but they need to be trustworthy and free from any bias or manipulation. A prominent example is fake reviews, where loss of trust can undermine the business model of the platform itself, but also lead to a wider loss of trust, as expressed in many responses to the public consultation Breitbart London has previously reported on how the European Union plans to roll out a continent-wide ID card, with a view to using the data to impose Europe-wide taxes, and an EU-wide minimum wage, further bypassing elected national parliaments and handing more power to the unelected bureaucrats in Brussels. The European Commission website further reveals that “on 1 July 2016, the new rules on trust services under the eIDAS Regulation will come into effect in the 28 EU Member States repealing the 15-year-old eSignature Directive and modernising the legal framework for trust services. This will be a turning point in the eIDAS journey and another big milestone towards a Digital Single Market.” It does not appear to be mandatory, but uptake of national E-ID cards is encouraged by the Commission as the direction of travel for access to e-services. It does, however, define and regulate the legal basis for digital IDs for Europeans. “This intrusive and seemingly authoritarian EU interference in social media and the internet is not new,” said Diane James, a Member of the European Parliament and the UK Independence Party’s spokesman for Home Affairs. “In 2013, the European Parliament spent almost £2 million on press monitoring and trawling Eurosceptic debates on the internet for “trolls” during euro-elections amid fears that hostility to the EU was growing.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

How to Tell a Compelling Story with Data - 6 Rules & 6 Tools

How to Tell a Compelling Story with Data - 6 Rules & 6 Tools | Semantic Gnosis Web | Scoop.it
The way a message is communicated is almost as important as the message itself. Our world is moving towards a more data-oriented approach to decision making i…
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

British spies have been hacking themselves and their own families so they can send birthday cards

British spies have been hacking themselves and their own families so they can send birthday cards | Semantic Gnosis Web | Scoop.it
23 show all

The files show the huge amount of information that is being gathered by British spying groups. Ministers have previously argued that only people who are suspected of criminal or terrorist behaviour will be tracked – but they show that spies have been collecting bulk personal datasets on a range of innocent people for years, and arguing that they are used to find legitimate suspects.

The papers show how that same information has been used by spies to find out personal information, like looking up people’s addresses to send birthday cards.

“We’ve seen a few instances recently of individual users crossing the line with their database use, looking up addresses in order to send birthday cards, checking passport details to organise personal travel, checking details of family members for personal reasons. Another area of concern is the use of the database as a ‘convenient’ way to check the personal details of colleagues when filling out service forms on their behalf.
Read more
Britain’s spy agency GCHQ worked to expose Harry Potter leaks

The papers also show how the organisation had to explicitly tell spies not to search for themselves within the database – a practice that can often lead to accidental intrusion into other people’s lives.
Jan Bergmans's insight:
Share your insight
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

How Technology Helps Creditors Control Debtors

How Technology Helps Creditors Control Debtors | Semantic Gnosis Web | Scoop.it
From software that records your every keystroke, to GPS tracking, to ignition kill switches—lenders have more power over their customers than ever.
Jan Bergmans's insight:
Detective Mode was an extreme invasion of privacy, a mustache-twirling moment of villainy in the history of commercial surveillance. But the excesses of Detective Mode are just particularly unsavory examples of an increasingly prevalent trend in credit transactions—remote control of devices by lenders, that infringes on the privacy and security of the debtors. While few lenders will go as far as to take naked pictures of their debtors, wherever there is an expensive device that can be easily absconded with, it makes sense for lenders to add both a kill switch and GPS. A New York Times story in 2014 looked at the increasing prevalence of starter interrupt devices—kill switches—in cars financed by subprime loans, reporting that the mechanisms had “reduced late payments to roughly 7 percent from nearly 29 percent.” Lenders aren’t installing these devices because they’re interested in tracking their debtors’ every move; starter interrupt mechanisms are just an economical way to protect their investments. But even when lenders aren’t stooping to the kinds of skin-crawling extremes that warrant a FTC lawsuit, there’s something about these controls that feels dangerous and invasive. In the same 2014 report, the Times described how a woman in Austin, Texas, had fled her abusive husband, only to be tracked down by the subprime lender that had financed her car. By driving to the shelter, she had violated the loan agreement, which restricted her from driving outside of a four county radius. She was tracked down via GPS and her car was repossessed. A rootkit is malicious software that enables unauthorized access to a computer, while masking its own existence from the authorized user. We owe this proliferation of lender kill switches to the convergence of two trends. One is the uptick in subprime lending, a phenomenon that received a great deal of attention during the 2008 home mortgage crisis, but less so when it came to movable property like cars and computers. And while subprime lending in the housing market has fallen off since the 2008 crisis, it has rebounded in other types of loans—auto loans, credit cards, personal loans. Alongside this rise in subprime consumer lending, there has been a steady increase in the use of access controls in devices. What began with digital rights management for intellectual property has expanded into ever-stranger forms, like access controls for Keurig pods and self-cleaning cat litterboxes. Mechanisms that prevent Keurig machines from using off-label coffee pods are annoying but relatively harmless. But the history of digital rights management (DRM) has always had a dark side. In 2005, security researchers found that the DRM protection on Sony BMG music CDs would install a rootkit if the CD were inserted into a user’s computer. A rootkit is malicious software that enables unauthorized access to a computer, while masking its own existence from the authorized user. It’s a tool for hackers, thieves, and nation-state adversaries. In the quest for perfect protection of Sony’s intellectual property, the company threw the privacy and security of their customers under the bus. The Sony BMG rootkit incident was the first scandal of its kind, but it wouldn’t be the last. In 2014, several outlets reported that Adobe’s ebook reader was tracking readers’ habits and transmitting back unencrypted logs of those activities. It seemed as though wherever DRM went, privacy invasion followed. The average user owns very little of the digital world they inhabit. DRM is intended to protect revenues from copyright infringement. But it doesn’t do just that, it transforms the relationship between consumers and software developers. Ebooks, video games, software, and other digital goods are increasingly distributed under licenses, rather than sold as outright property. (And although some files, like music, aren’t sold as licenses, they can’t be resold on a secondary market like regular property either.) The law, working in tandem with DRM, shrank the very concept of ownership, allowing companies to force end-users into renter relationships. The average user owns very little of the digital world they inhabit. Today, companies like
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Take on Endless Electronic Projects with the Tiniest Linux Computer Yet!

VoCore: Mini Linux Computer, Take on Endless Electronic Projects with the Tiniest Linux Computer Yet!
Jan Bergmans's insight:
DESCRIPTION Mini computer boards are getting more popular by the day—but none have been quite as tiny or quite as affordable as VoCore. With this mini Linux machine, you can make a tiny router, invent a new device, build a motherboard, or even repurpose old speakers into smart wireless versions. Its small size gives you options: use it as a standalone device running OpenWrt or use it as an embedded component of a larger system. With some knowledge of electronics and the included Dock that extends the Ethernet and USB ports, the electronic world is your oyster. Works on open-source hardware Provides up to 20 GPIO lines Runs OpenWRT Linux Includes an on-board Wi-Fi adapter so you don’t need an external one Easily connects to peripheral devices Small size enables it to act as an embedded system Extends Ethernet & USB interfaces w/ the Dock Operates as a fully functional 2.4GHz Wi-Firouter Acts as a general purpose low-power COM for IoT applications Includes full hardware design & full-source code Integrates a 802.11n MAC, baseband, radio, FEM & 5-port 10/100Mbps Ethernet switch
more...
Jan Bergmans's curator insight, April 18, 5:33 AM
DESCRIPTION Mini computer boards are getting more popular by the day—but none have been quite as tiny or quite as affordable as VoCore. With this mini Linux machine, you can make a tiny router, invent a new device, build a motherboard, or even repurpose old speakers into smart wireless versions. Its small size gives you options: use it as a standalone device running OpenWrt or use it as an embedded component of a larger system. With some knowledge of electronics and the included Dock that extends the Ethernet and USB ports, the electronic world is your oyster. Works on open-source hardware Provides up to 20 GPIO lines Runs OpenWRT Linux Includes an on-board Wi-Fi adapter so you don’t need an external one Easily connects to peripheral devices Small size enables it to act as an embedded system Extends Ethernet & USB interfaces w/ the Dock Operates as a fully functional 2.4GHz Wi-Firouter Acts as a general purpose low-power COM for IoT applications Includes full hardware design & full-source code Integrates a 802.11n MAC, baseband, radio, FEM & 5-port 10/100Mbps Ethernet switch
Scooped by Jan Bergmans
Scoop.it!

GAGGED: Brussels tells Dutch MPs they CAN'T debate referendum result as it may fuel Brexit

GAGGED: Brussels tells Dutch MPs they CAN'T debate referendum result as it may fuel Brexit | Semantic Gnosis Web | Scoop.it
The European elite have gagged elected politicians in the Netherlands, ordering them to suppress the Dutch people's democratic voice until after our own referendum is done and dusted on June 23.

In an astonishing statement delivered to the Dutch parliament this week Prime Minister Mark Rutte admitted he had been ordered by other EU leaders not to mention the referendum for the next two months.
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

LSD's impact on the brain revealed in groundbreaking images

LSD's impact on the brain revealed in groundbreaking images | Semantic Gnosis Web | Scoop.it
First modern scans of people high on psychedelic drug has given researchers unprecedented insight into neural basis for its effects
Jan Bergmans's insight:
LSD
more...
No comment yet.
Scooped by Jan Bergmans
Scoop.it!

Interpreting, enforcing and changing the GNU GPL, as applied to combining Linux and ZFS — Free Software Foundation — working together for free software

The FSF is a charity with a worldwide mission to advance software freedom.
more...
No comment yet.