Tag Archives: cox

Cox Business Subscriber Doesn’t Want Identity Revealed in Piracy Lawsuit

Post Syndicated from Ernesto original https://torrentfreak.com/cox-business-subscriber-doesnt-want-identity-revealed-in-piracy-lawsuit/

Last year a group of prominent record labels, all members of the RIAA, filed a lawsuit against ISP Cox Communications. 

The labels argue that Cox categorically failed to terminate repeat copyright infringers and that it substantially profited from this ongoing ‘piracy’ activity. All at the expense of the record labels and other rightsholders.

As part of the discovery phase, both parties requested relevant information from each other. The labels, for example, were interested in finding out the names and addresses of Cox business subscribers that received copyright infringement warnings. 

In addition to regular households, Cox also offers Internet connections to business clients and many of these – 2,793 to be precise – were flagged as pirates.

After some back and forth Cox and the record labels agreed on a stipulated court order, requiring the ISP to disclose this information. While the court signed off on this, not all affected subscribers are happy with this decision. One of them objected in court this week. 

The company in question appeared as “John Doe” and explained that it’s a  non-profit corporation that provides hospital and medical care facilities outside of Virginia. 

As is quite common today, the non-profit operates a secured network that’s only accessible to its employees. In addition, it offers public WiFi access to patients and visitors. The latter was provided by Cox in the relevant time period.

“Like other medical care providers, John Doe provides an unsecured, public
wireless network that can be accessed by patients and other visitors who agree to abide by John Doe’s terms of use for the Public WiFi network. Cox is the internet service provider for this Public WiFi network,” the company notes

It was this unsecured network that triggered the referenced copyright infringement notifications. This, despite the fact that all users had to agree to the terms of service, which specifically prohibited illegal downloading.

From the ToS

The health care provider doesn’t refute that visitors or patients may have used the network to share copyright-infringing content. However, it notes that there’s not much it can do to identify these infringers. Not then and not now.

The health care provider doesn’t track MAC addresses of people who connected to the network, and even if it did, that would only identify a device, not a person. 

Given this background, the “John Doe” company doesn’t see any reason why its details should be shared with the record labels. That won’t help to identify any copyright infringers. However, it does breach the health care provider’s privacy rights. 

“Thus, disclosure of John Doe’s subscriber information will not lead to the discovery of the individual(s) who are alleged by Plaintiffs to have engaged in copyright infringement through the misuse of John Doe’s network in violation of the access agreement,” the company informs the court.

“All disclosure will accomplish is a breach of John Doe’s privacy rights under the Cable Communications Privacy Act, 47 USC § 551, and the imposition of time and expense burdens on John Doe, all without furthering any claim or defense in this case.”

It is now up to the court to decide whether the details of the company can be handed over by Cox. Meanwhile, it remains unclear why the record labels are interested in this information at all, and how this will help their case.

A copy of John Doe’s objection to the disclosure is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Cox Will Share Names of ‘Pirating’ Business Subscribers With Record Labels

Post Syndicated from Ernesto original https://torrentfreak.com/cox-has-to-share-names-of-pirating-business-subscribers-with-record-labels-190508/

Last summer, Cox ended its piracy liability lawsuit with music company BMG, agreeing to a “substantial settlement.”

That didn’t mean an end to the ISP’s legal trouble though. Cox remains caught up in another lawsuit filed by a group of major music labels, all members of the RIAA.

The labels argue that Cox categorically failed to terminate repeat copyright infringers and that it substantially profited from this ongoing ‘piracy’ activity. All at the expense of the record labels and other rightsholders.

Most of these alleged copyright-infringers are situated in regular households. However, Cox also offers Internet connections to business clients and many of these – 2,793 to be precise – were also flagged as pirates.

This essentially means that the ISP received copyright infringement notices for activity that took place on the IP-addresses that were assigned to these companies. This is a group of customers the RIAA labels are particularly interested in. 

During discovery, the labels have asked Cox to identify these business subscribers. The ISP initially only shared some billing and payment data, but that was not enough for the music companies, which want names and addresses as well. 

This is a rather broad request that we haven’t seen before, one that puts the Internet provider in a tough spot. Not least because handing over personal data of customers without a court order goes against its privacy policy.

This week Cox and the labels submitted a proposed stipulated order in which the ISP agrees to hand over the information. There doesn’t appear to have been any opposition from the ISP, but both parties request a signed court order to address the privacy policy restrictions. 

The order, swiftly signed by U.S. District Court Judge Liam O’Grady, requires the ISP to identify the 2,793 business subscribers for which it received copyright infringement notices between February 1, 2013 and November 26, 2014.

“It is hereby stipulated and agreed by and between Plaintiffs and Cox that Cox shall make reasonable efforts to notify the Business Subscribers, within five days of entry of this Stipulated Order, of Cox’s intent to disclose their name and contact information to Plaintiffs pursuant to this Order,” it reads.

From the order

The order also requires Cox to alert the affected business subscribers, who will then have the option to protest the decision. If that doesn’t happen, the personal information will be handed over to the labels.

The names and addresses of the business subscribers won’t be made public, as they fall under an earlier signed protective order. This states that any personal information of subscribers is classified as “highly confidential” data which means that it’s for attorneys’ eyes only.

While the paperwork is in order, one burning question remains. Why are the RIAA labels interested in knowing which businesses were flagged for copyright infringement?

There are no signs that any of these companies will be pursued individually.  What is clear, however, is that the music companies see the information as substantial evidence that will help to argue their case. Time will tell what the exact purpose is.

A copy of the stipulated order to product identifying information concerning certain Cox business subscribers is available here (pdf).

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

[$] Willy’s memory-management to-do list

Post Syndicated from corbet original https://lwn.net/Articles/753078/rss

Matthew “Willy” Wilcox has been doing a fair amount of work in the
memory-management area recently. He showed up at the 2018 Linux Storage,
Filesystem, and Memory-Management Summit with a list of discussion topics
related to that work; it was enough to fill a plenary session with some
spillover into the memory-management track the next day. Some of his
topics were fairly straightforward; others look to be somewhat more
involved.

Reddit Repeat Infringer Policy Shuts Down Megalinks Piracy Sub

Post Syndicated from Andy original https://torrentfreak.com/reddit-repeat-infringer-policy-shuts-down-megalinks-piracy-sub-180430/

Without doubt, Reddit is one of the most popular sites on the entire Internet. At the time of writing it’s the fourth most visited site in the US with 330 million users per month generating 14 billion screenviews.

The core of the site’s success is its communities. Known as ‘sub-Reddits’ or just ‘subs’, there are currently 138,000 of them dedicated to every single subject you can think of and tens of thousands you’d never considered.

Even though they’re technically forbidden, a small but significant number are dedicated to piracy, offering links to copyright-infringing content hosted elsewhere. One of the most popular is /r/megalinks, which is dedicated to listing infringing content (mainly movies and TV shows) uploaded to file-hosting site Mega.

Considering its activities, Megalinks has managed to stay online longer than most people imagined but following an intervention from Reddit, the content indexing sub has stopped accepting new submissions, which will effectively shut it down.

In an announcement Sunday, the sub’s moderators explained that following a direct warning from Reddit’s administrators, the decision had been taken to move on.

“As most of you know by now, we’ve had to deal with a lot of DMCA takedowns over the last 6 months. Everyone knew this day would come, eventually, and its finally here,” they wrote.

“We received a formal warning from Reddit’s administration 2 days ago, and have decided to restrict new submissions for the safety of the subreddit.”

The message from Reddit’s operators makes it absolutely clear that Reddit isn’t the platform to host what amounts to a piracy links forum.

“This is an official warning from Reddit that we are receiving too many copyright infringement notices about material posted to your community. We will be required to ban this community if you can’t adequately address the problem,” the warning reads.

Noting that Redditors aren’t allowed to post content that infringes copyrights, the administrators say they are required by law to handle DMCA notices and that in cases where infringement happens on multiple occasions, that needs to be handled in a more aggressive manner.

“The law also requires us to issue bans in cases of repeat infringement. Sometimes a repeat infringement problem is limited to just one user and we ban just that person. Other times the problem pervades a whole community and we ban the community,” the admins continue.

“This is our formal warning about repeat infringement in this community. Over the past three months we’ve had to remove material from the community in response to copyright notices 60 times. That’s an unusually high number taking into account the community’s size.

The warning suggests ways to keep infringing content down but in a sub dedicated to piracy, they’re all completely irrelevant. It also suggests removing old posts to ensure that Reddit doesn’t keep getting notices, but that would mean deleting pretty much everything. Backups exist but a simple file is a poor substitute for a community.

So, with Reddit warning that without change the sub will be banned, the moderators of /r/megalinks have decided to move on to a new home. Reportedly hosted ‘offshore’, their new forum already has more than 9,800 members and is likely to grow quickly as the word spreads.

A month ago, the /r/megaporn sub-Reddit suffered a similar fate following a warning from Reddit’s admins. It successfully launched a new external forum which is why the Megalinks crew decided on the same model.

“[A]fter seeing how /r/megaporn approached the same situation, we had started working on an offshore forum a week ago in anticipation of the ban. This allows us to work however we want, without having to deal with Reddit’s policies and administration,” the team explain.

Ever since the BMG v Cox case went bad ways for the ISP in 2015, repeat infringer policies have become a very hot topic in the US. That Reddit is now drawing a line in the sand over a relatively small number of complaints (at least compared to other similar platforms) is clear notice that Reddit and blatant piracy won’t be allowed to walk hand in hand.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

How Many Piracy Warnings Would Get You to Stop?

Post Syndicated from Andy original https://torrentfreak.com/how-many-piracy-warnings-would-get-you-to-stop-180422/

For the past several years, copyright holders in the US and Europe have been trying to reach out to file-sharers in an effort to change their habits.

Whether via high-profile publicity lawsuits or a simple email, it’s hoped that by letting people know they aren’t anonymous, they’ll stop pirating and buy more content instead.

Traditionally, most ISPs haven’t been that keen on passing infringement notices on. However, the BMG v Cox lawsuit seems to have made a big difference, with a growing number of ISPs now visibly warning their users that they operate a repeat infringer policy.

But perhaps the big question is how seriously users take these warnings because – let’s face it – that’s the entire point of their existence.

There can be little doubt that a few recipients will be scurrying away at the slightest hint of trouble, intimidated by the mere suggestion that they’re being watched.

Indeed, a father in the UK – who received a warning last year as part of the Get it Right From a Genuine Site campaign – confidently and forcefully assured TF that there would be no more illegal file-sharing taking place on his ten-year-old son’s computer again – ever.

In France, where the HADOPI anti-piracy scheme received much publicity, people receiving an initial notice are most unlikely to receive additional ones in future. A December 2017 report indicated that of nine million first warning notices sent to alleged pirates since 2012, ‘just’ 800,000 received a follow-up warning on top.

The suggestion is that people either stop their piracy after getting a notice or two, or choose to “go dark” instead, using streaming sites for example or perhaps torrenting behind a decent VPN.

But for some people, the message simply doesn’t sink in early on.

A post on Reddit this week by a TWC Spectrum customer revealed that despite a wealth of readily available information (including masses in the specialist subreddit where the post was made), even several warnings fail to have an effect.

“Was just hit with my 5th copyright violation. They halted my internet and all,” the self-confessed pirate wrote.

There are at least three important things to note from this opening sentence.

Firstly, the first four warnings did nothing to change the user’s piracy habits. Secondly, Spectrum presumably had enough at five warnings and kicked in a repeat-infringer suspension, presumably to avoid the same fate as Cox in the BMG case. Third, the account suspension seems to have changed the game.

Notably, rather than some huge blockbuster movie, that fifth warning came due to something rather less prominent.

“Thought I could sneak in a random episode of Rosanne. The new one that aired LOL. That fast. Under 24 hours I got shut off. Which makes me feel like [ISPs] do monitor your traffic and its not just the people sending them notices,” the post read.

Again, some interesting points here.

Any content can be monitored by rightsholders but if it’s popular in the US then a warning delivered via an ISP seems to be more likely than elsewhere. However, the misconception that the monitoring is done by ISPs persists, despite that not being the case.

ISPs do not monitor users’ file-sharing activity, anti-piracy companies do. They can grab an IP address the second someone enters a torrent swarm, or even connects to a tracker. It happens in an instant, at a time of their choosing. Quickly jumping in and out of a torrent is no guarantee and the fallacy of not getting caught due to a failure to seed is just that – a fallacy.

But perhaps the most important thing is that after five warnings and a disconnection, the Reddit user decided to take action. Sadly for the people behind Rosanne, it’s not exactly the reaction they’d have hoped for.

“I do not want to push it but I am curious to what happens 6th time, and if I would even be safe behind a VPN,” he wrote.

“Just want to learn how to use a VPN and Sonarr and have a guilt free stress free torrent watching.”

Of course, there was no shortage of advice.

“If you have gotten 5 notices, you really should of learnt [sic] how to use a VPN before now,” one poster noted, perhaps inevitably.

But curiously, or perhaps obviously given the number of previous warnings, the fifth warning didn’t come as a surprise to the user.

“I knew they were going to hit me for it. I just didn’t think a 195mb file would do it. They were getting me for Disney movies in the past,” he added.

So how do you grab the attention of a persistent infringer like this? Five warnings and a suspension apparently. But clearly, not even that is a guarantee of success. Perhaps this is why most ‘strike’ schemes tend to give up on people who can’t be rehabilitated.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

[$] The XArray data structure

Post Syndicated from corbet original https://lwn.net/Articles/745073/rss

Sometimes, a data structure proves to be inadequate for its intended task.
Other times, though, the problem may be somewhere else — in the API used to
access it, for example. Matthew Wilcox’s presentation during the 2018
linux.conf.au Kernel miniconf made the case that, for the kernel’s
venerable radix tree data structure, the
latter situation holds. His response is a new approach to an old data
structure that he is calling the “XArray”.

An honorary degree for Alan Cox

Post Syndicated from corbet original http://lwn.net/Articles/694974/rss

Congratulations are due to Alan Cox, who was awarded
an honorary degree
by Swansea University for his work with Linux.
Alan started working on Version 0. There were bugs and problems he
could correct. He put Linux on a machine in the Swansea University computer
network, which revealed many problems in networking which he sorted out;
later he rewrote the networking software. Alan brought to Linux software
engineering discipline: Linux software releases that were tested, corrected
and above all stable. On graduating, Alan worked at Swansea University, set
up the UK Linux server and distributed thousands of systems.

Sometimes techy details matter

Post Syndicated from Robert Graham original http://blog.erratasec.com/2016/03/sometimes-techy-details-matter.html

How terrorists use encryption is going to become central to the Cryptowars 2.0 debate. Both sides are going to cite the case of Reda Hame described in this NYTimes article. On one hand, it shows that terrorists do indeed use encryption. On the other hand, the terrorists used TrueCrypt, which can’t be stopped, no matter how many “backdoor” laws the police-state tries to pass.The problem with the NYTimes article is that the technical details are garbled. (Update: at the bottom, I correct them). Normally, that’s not a problem, because we experts can fill in the details using basic assumptions. But the technique ISIS used is bizarre, using TrueCrypt containers uploaded to a file-sharing site. This is a horrible way to pass messages — assumptions we make trying to fill in the blanks are likely flawed.Moreover, there is good reason to distrust the NYTimes article. Small details conflict with a similar article in the French newspaper Le Monde from January 6. Both articles are based on the same confession by Reda Hame from last August.For example, in discussing a training accident with a grenade, the NYTimes article says “Mr. Hame did not throw it far enough and was cut by shrapnel”. The Le Monde version says he tossed a stun grenade into a hut, then entered the hut, after which the grenade exploded. Stun grenades don’t have “shrapnel”. As the Le Monde article provides a direct quote, in the original French, it is more trustworthy:”J’ai jeté la grenade dans la maisonnette, j’ai entendu une petite explosion, je suis rentré dans la maison, j’ai tiré dans trois cibles, puis la grenade a explosé”Update: You would not throw a fragmentation grenade at a silhouette drawn on a wall, as the New York Times article describes. Throw it hard enough, and it just bounces back toward you. That’s not how it works. How it does work is how Le Monde describes, wait for the a stun grenade to go off before entering the room. The interrogation of Reda Hame lasted over 17 hours over multiple days, so you can imagine that at some point, he might have retold the story in a different way that might be closer to how the NYTimes describe it, thus accounting for the discrepancy. But this is doubtful, since this is not things work.This is just one example, there are several other discrepancies with Le Monde. If the reporter gets these types of details wrong, how can we trust her on getting details of TrueCrypt correct?For example, the reporter describes “a piece of paper showing his login credentials for TrueCrypt”, though a picture of TrueCrypt in the article shows the use of “keyfiles”. However, there’s no such thing as “login credentials for TrueCrypt”. It’s not a website or a computer, you don’t “login” to it. There’s no username. Instead, you have the passphrase to encrypt or decrypt the file. This is a perfectly fine detail to mess up in normal circumstances, because the average reader neither knows nor cares about the difference. But, since we techies are confused, and the reporter isn’t trustworthy about getting small details correct, the difference suddenly looms large. Maybe the reporter is confused about the difference between “login credentials” for TrueCrypt and login credentials for the file upload site.She then goes on to describe “he was to upload the encrypted message folder onto a Turkish commercial data storage site”. Again, the terminology “encrypted message folder” in confusing. We assume it means the encrypted volume file, or the encrypted container file.Also, what the heck is a “commercial data storage site”?? She goes on to tweet:65/ They were using a program like TrueCrypt and then uploading the encrypted folder onto a website like https://t.co/Fnx7sNrTWy— Rukmini Callimachi (@rcallimachi) March 29, 2016What does this mean “like dosya.co”? Is it that site, or another one?Also, that site is a “file sharing” site, not a “data storage” site. File sharing services are designed to share files, usually copyrighted materials like movies, music, porn, games, and ebooks. Data storage services like DropBox are designed for data storage. It’s an important detail, especially when you consider how intelligence services might be monitoring them for metadata.I’ve written up a brief post on how intelligence services can track down terrorists using this technique, from either already collected metadata, or monitoring with their “XKeyScore” system. But I have little faith I’ve understood the details correctly from the NYTimes article, so there’s a good chance my post is just nonsense.This isn’t an issue of being unnecessarily pedantic. I fully support the idea that reporters can use inelegant or “wrong” terminology in order to get the point across. The problem here is that I don’t think the reporter is getting the point across. I’m confused. Moreover, we know that the reporter has gotten other details wrong, when comparing similar passages with the Le Monde article, which directly quotes the subject.Update: And now I’ve read one of the original French documents where the subject describes what was on that slip of paper recovered from his apartment, and confirmed my suspicion that the NYTimes article got details wrong.The document I saw says the slip of paper had login details for the file sharing site, not a TrueCrypt password. Thus, when the NYTimes article says “TrueCrypt login credentials”, we should correct it to “file sharing site login credentials”, not “TrueCrypt passphrase”.The original French uses the word “boîte”, which matches the TrueCrypt term “container”. The original French didn’t use the words “fichier” (file), “dossier” (folder), or “répertoire” (directory). This makes so much more sense, and gives us more confidence we know what they were doing.The original French uses the term “site de partage”, meaning a “sharing site”, which makes more sense than a “storage” site.MOST importantly, according the subject, the login details didn’t even work. It appears he never actually used this method — he was just taught how to use it. He no longer remembers the site’s name, other than it might have the word “share” in its name. We see this a lot: ISIS talks a lot about encryption, but the evidence of them actually using it is scant.Update to this update: Runa Sandvik insists there are more than one pieces of paper in the story. Therefore, I could be talking about one piece of paper with “website login”, while the NYTimes article could be talking about another with “TrueCrypt password”:@ErrataRob @thegrugq @csoghoian @josephfcox @moltke Re our conversation this morning; there are multiple pieces of paper in this story.— Runa A. Sandvik (@runasand) April 1, 2016But the original article references only a single piece of paper, “in his bag a piece of paper showing his login credentials for TrueCrypt”. It’s very strange that they are now claiming there existed separate pieces of paper that contained the website login credentials not mentioned in the original story.She insists the reason for the bad technical terms was to make it more understandable to non-technical readers:@ErrataRob That phrase may have been used to make it more understandable to all the non-technical readers.— Runa A. Sandvik (@runasand) April 1, 2016This, of course, is bogus. Nobody thinks that non-technical readers will understand “TrueCrypt login credentials” easier than “TrueCrypt password”. Non-technical users understand “password” much better than “credentials”.Update: Somebody (@thegrugq) pointed out yet another discrepancy with a CNN story, describing the process of uploading to a file sharing site:NYTimes: “basically a dead inbox”CNN: “it operated like a dead letter drop”The original phrase in French was “une boîte aux lettres morte” (a box of dead letters). The correct translation is “dead drop” (or “dead letter drop”), not “dead inbox”. The word “boîte” can also refer to a person’s inbox, so it’s a reasonable error to make if you don’t understand this is a specific spycraft term and are attempting to just translate the words according to French vernacular.

Sometimes techy details matter

Post Syndicated from Robert Graham original http://blog.erratasec.com/2016/03/sometimes-techy-details-matter.html

How terrorists use encryption is going to become central to the Cryptowars 2.0 debate. Both sides are going to cite the case of Reda Hame described in this NYTimes article. On one hand, it shows that terrorists do indeed use encryption. On the other hand, the terrorists used TrueCrypt, which can’t be stopped, no matter how many “backdoor” laws the police-state tries to pass.The problem with the NYTimes article is that the technical details are garbled. (Update: at the bottom, I correct them). Normally, that’s not a problem, because we experts can fill in the details using basic assumptions. But the technique ISIS used is bizarre, using TrueCrypt containers uploaded to a file-sharing site. This is a horrible way to pass messages — assumptions we make trying to fill in the blanks are likely flawed.Moreover, there is good reason to distrust the NYTimes article. Small details conflict with a similar article in the French newspaper Le Monde from January 6. Both articles are based on the same confession by Reda Hame from last August.For example, in discussing a training accident with a grenade, the NYTimes article says “Mr. Hame did not throw it far enough and was cut by shrapnel”. The Le Monde version says he tossed a stun grenade into a hut, then entered the hut, after which the grenade exploded. Stun grenades don’t have “shrapnel”. As the Le Monde article provides a direct quote, in the original French, it is more trustworthy:”J’ai jeté la grenade dans la maisonnette, j’ai entendu une petite explosion, je suis rentré dans la maison, j’ai tiré dans trois cibles, puis la grenade a explosé”Update: You would not throw a fragmentation grenade at a silhouette drawn on a wall, as the New York Times article describes. Throw it hard enough, and it just bounces back toward you. That’s not how it works. How it does work is how Le Monde describes, wait for the a stun grenade to go off before entering the room. The interrogation of Reda Hame lasted over 17 hours over multiple days, so you can imagine that at some point, he might have retold the story in a different way that might be closer to how the NYTimes describe it, thus accounting for the discrepancy. But this is doubtful, since this is not things work.This is just one example, there are several other discrepancies with Le Monde. If the reporter gets these types of details wrong, how can we trust her on getting details of TrueCrypt correct?For example, the reporter describes “a piece of paper showing his login credentials for TrueCrypt”, though a picture of TrueCrypt in the article shows the use of “keyfiles”. However, there’s no such thing as “login credentials for TrueCrypt”. It’s not a website or a computer, you don’t “login” to it. There’s no username. Instead, you have the passphrase to encrypt or decrypt the file. This is a perfectly fine detail to mess up in normal circumstances, because the average reader neither knows nor cares about the difference. But, since we techies are confused, and the reporter isn’t trustworthy about getting small details correct, the difference suddenly looms large. Maybe the reporter is confused about the difference between “login credentials” for TrueCrypt and login credentials for the file upload site.She then goes on to describe “he was to upload the encrypted message folder onto a Turkish commercial data storage site”. Again, the terminology “encrypted message folder” in confusing. We assume it means the encrypted volume file, or the encrypted container file.Also, what the heck is a “commercial data storage site”?? She goes on to tweet:65/ They were using a program like TrueCrypt and then uploading the encrypted folder onto a website like https://t.co/Fnx7sNrTWy— Rukmini Callimachi (@rcallimachi) March 29, 2016What does this mean “like dosya.co”? Is it that site, or another one?Also, that site is a “file sharing” site, not a “data storage” site. File sharing services are designed to share files, usually copyrighted materials like movies, music, porn, games, and ebooks. Data storage services like DropBox are designed for data storage. It’s an important detail, especially when you consider how intelligence services might be monitoring them for metadata.I’ve written up a brief post on how intelligence services can track down terrorists using this technique, from either already collected metadata, or monitoring with their “XKeyScore” system. But I have little faith I’ve understood the details correctly from the NYTimes article, so there’s a good chance my post is just nonsense.This isn’t an issue of being unnecessarily pedantic. I fully support the idea that reporters can use inelegant or “wrong” terminology in order to get the point across. The problem here is that I don’t think the reporter is getting the point across. I’m confused. Moreover, we know that the reporter has gotten other details wrong, when comparing similar passages with the Le Monde article, which directly quotes the subject.Update: And now I’ve read one of the original French documents where the subject describes what was on that slip of paper recovered from his apartment, and confirmed my suspicion that the NYTimes article got details wrong.The document I saw says the slip of paper had login details for the file sharing site, not a TrueCrypt password. Thus, when the NYTimes article says “TrueCrypt login credentials”, we should correct it to “file sharing site login credentials”, not “TrueCrypt passphrase”.The original French uses the word “boîte”, which matches the TrueCrypt term “container”. The original French didn’t use the words “fichier” (file), “dossier” (folder), or “répertoire” (directory). This makes so much more sense, and gives us more confidence we know what they were doing.The original French uses the term “site de partage”, meaning a “sharing site”, which makes more sense than a “storage” site.MOST importantly, according the subject, the login details didn’t even work. It appears he never actually used this method — he was just taught how to use it. He no longer remembers the site’s name, other than it might have the word “share” in its name. We see this a lot: ISIS talks a lot about encryption, but the evidence of them actually using it is scant.Update to this update: Runa Sandvik insists there are more than one pieces of paper in the story. Therefore, I could be talking about one piece of paper with “website login”, while the NYTimes article could be talking about another with “TrueCrypt password”:@ErrataRob @thegrugq @csoghoian @josephfcox @moltke Re our conversation this morning; there are multiple pieces of paper in this story.— Runa A. Sandvik (@runasand) April 1, 2016But the original article references only a single piece of paper, “in his bag a piece of paper showing his login credentials for TrueCrypt”. It’s very strange that they are now claiming there existed separate pieces of paper that contained the website login credentials not mentioned in the original story.She insists the reason for the bad technical terms was to make it more understandable to non-technical readers:@ErrataRob That phrase may have been used to make it more understandable to all the non-technical readers.— Runa A. Sandvik (@runasand) April 1, 2016This, of course, is bogus. Nobody thinks that non-technical readers will understand “TrueCrypt login credentials” easier than “TrueCrypt password”. Non-technical users understand “password” much better than “credentials”.Update: Somebody (@thegrugq) pointed out yet another discrepancy with a CNN story, describing the process of uploading to a file sharing site:NYTimes: “basically a dead inbox”CNN: “it operated like a dead letter drop”The original phrase in French was “une boîte aux lettres morte” (a box of dead letters). The correct translation is “dead drop” (or “dead letter drop”), not “dead inbox”. The word “boîte” can also refer to a person’s inbox, so it’s a reasonable error to make if you don’t understand this is a specific spycraft term and are attempting to just translate the words according to French vernacular.

Node.JS module to access Cisco IOS XR XML interface

Post Syndicated from Delian Delchev original http://deliantech.blogspot.com/2015/03/nodejs-module-to-access-cisco-ios-xr.html

Hello to all,This is the early version of my module for Node.JS that allows configuring routers and retrieving information over Cisco IOS XR’s XML interface.The module is in its early phases – it still does not read IOS XR schema files and therefore decode the data (in JSON) in a little ugly way (too much arrays). I am planning to fix it, so there may be changes in the responses.Please see bellow the first version of the documentation I’ve set in the github:Module for Cisco XML API interface IOS XRThis is a small module that implements interface to Cisco IOS XR XML Interface.This module open an maintain TCP session to the router, sends requests and receive responses.InstallationTo install the module do something like that:npm install node-ciscoxmlUsageIt is very easy to use this module. See the methods bellow:Load the moduleTo load and use the module, you have to use a code similar to this:var cxml = require(‘node-ciscoxml’);var c = cxml( { …connect options.. });Module init and connect optionshost (default 127.0.0.1) – the hostname of the router where we’ll connectport (default 38751) – the port of the router where XML API is listeningusername (default guest) – the username used for authentication, if username is requested by the remote sidepassword (default guest) – the password used for authentication, if password is requested by the remote sideconnectErrCnt (default 3) – how many times it will retry to connect in case of an errorautoConnect (default true) – should it try to auto connect to the remote side if a request is dispatched and there is no open session alreadyautoDisconnect (default 60000) – how much milliseconds we will wait for another request before the tcp session to the remote side is closed. If the value is 0, it will wait forever (or until the remote side disconnects). Bear in mind autoConnect set to false does not assume autoDisconnect set to 0/false as well.userPromptRegex (default (Username|Login)) – the rule used to identify that the remote side requests for a usernamepassPromptRegex (default Password) – the rule used to identify that the remote side requests for a passwordxmlPromptRegex (default XML>) – the rule used to identify successful login/connectionnoDelay (default true) – disables the Nagle algorithm (true)keepAlive (default 30000) – enabled or disables (value of 0) TCP keepalive for the socketssl (default false) – if it is set to true or an object, then SSL session will be opened. Node.js TLS module is used for that so if the ssl points to an object, the tls options are taken from it. Be careful – enabling SSL does not change the default port from 38751 to 38752. You have to set it explicitly!Example:var cxml = require(‘node-ciscoxml’);var c = cxml( { host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});connect methodThis method forces explicitly a connection. It could accept any options of the above.Example:var cxml = require(‘node-ciscoxml’);var c = cxml();c.connect( { host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});The connect method is not necessary to be used. If autoConnect is enabled (default) the module will automatically open and close tcp connections when needed.Connect supports callback. Example:var cxml = require(‘node-ciscoxml’);cxml().connect( { host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’}, function(err) { if (!err) console.log(‘Successful connection’);});The callback may be the only parameter as well. Example:var cxml = require(‘node-ciscoxml’);cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’}).connect(function(err) { if (!err) console.log(‘Successful connection’);});Example with SSL:var cxml = require(‘node-ciscoxml’);var fs = require(‘fs’);cxml({ host: ‘10.10.1.1’, port: 38752, username: ‘xmlapi’, password: ‘xmlpass’, ssl: { // These are necessary only if using the client certificate authentication key: fs.readFileSync(‘client-key.pem’), cert: fs.readFileSync(‘client-cert.pem’), // This is necessary only if the server uses the self-signed certificate ca: [ fs.readFileSync(‘server-cert.pem’) ] }}).connect(function(err) { if (!err) console.log(‘Successful connection’);});disconnect methodThis method explicitly disconnects a connection.sendRaw method.sendRaw(data,callback)Parameters:data – a string containing valid Cisco XML request to be sentcallback – function that will be called when a valid Cisco XML response is receivedExample:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRaw(‘<Request><GetDataSpaceInfo/></Request>’,function(err,data) { console.log(‘Received’,err,data);});sendRawObj method.sendRawObj(data,callback)Parameters:data – a javascript object that will be converted to a Cisco XML requestcallback – function that will be called with valid Cisco XML response converted to javascript objectExample:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRawObj({ GetDataSpaceInfo: ” },function(err,data) { console.log(‘Received’,err,data);});rootGetDataSpaceInfo method.rootGetDataSpaceInfo(callback)Equivalent to .sendRawObj for GetDataSpaceInfo commandgetNextSends getNext request with a specific id, so we can retrieve the rest of the previous operation if it has been truncated.id – the ID callback – the callback with the data (in js object format)Keep in mind next response may be truncated as well, so you have to check for IteratorID all the time.Example:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRawObj({ Get: { Configuration: {} } },function(err,data) { console.log(‘Received’,err,data); if ((!err) && data && data.Response.$.IteratorID) { return c.getNext(data.Response.$.IteratorID,function(err,nextData) { // .. code to merge data with nextData }); } // .. code});sendRequest methodThis method is equivalent to sendRawObj but it can automatically detect the need and resupply GetNext requests so the response is absolutley full. Therefore this method should be the preferred method for sending requests that expect very large replies.Example:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRequest({ GetDataSpaceInfo: ” },function(err,data) { console.log(‘Received’,err,data);});requestPath methodThis is a method equivalent to sendRequest but instead of an object, the request may be formatted in a simple path string. This metod is not very useful for complex requests. But its value is in the ability to simplify very much the simple requests. The response is in JavaScript objectExample:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.requestPath(‘Get.Configuration.Hostname’,function(err,data) { console.log(‘Received’,err,data);});reqPathPath methodThis is the same method as requestPath, but the response is not an object, but a path array. The method supports optional filter, which has to be a RegExp object and all paths and values will be tested against it Only those returning true will be included in the response array.Example:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.reqPathPath(‘Get.Configuration.Hostname’,/Hostname/,function(err,data) { console.log(‘Received’,data[0]); // The output should be something like // [ ‘Response(“MajorVersion”=”1″,”MinorVersion”=”0”).Get.Configuration.Hostname(“MajorVersion”=”1″,”MinorVersion”=”0”)’, ‘asr9k-router’ ] });This method could be very useful for getting simple responses and configurations.getConfig methodThis method requests the whole configuration of the remote device and return it as objectExample:c.getConfig(function(err,config) { console.log(err,config);});cliConfig methodThis method is quite simple, it executes a command(s) in CLI Configuration mode and return the response in JS Object. You have to know that any configuration change in IOS XR is not effective unless it is committed!Example:c.cliConfig(‘username testuserngroup operatorn’,function(err,data) { console.log(err,data); c.commit();});cliExec methodExecutes a command(s) in CLI Exec mode and return the response in JS Object.c.cliExec(‘show interfaces’,function(err,data) { console.log(err,data?data.Response.CLI[0].Exec[0]);});commit methodCommit the current configuration.Example:c.commit(function(err,data) { console.log(err,data);});lock methodLocks the configuration mode.Example:c.lock(function(err,data) { console.log(err,data);});unlock methodUnlocks the configuration mode.Example:c.unlock(function(err,data) { console.log(err,data);});Configure Cisco IOS XR for XML agentTo configure IOS XR for remote XML configuration you have to:Ensure you have *mgbl*** package installed and activated! Without it you will have no xml agentcommands!Enable the XML agent with a similar configuration:xml agent vrf default ipv4 access-list SECUREACCESS ! ipv6 enable session timeout 10 iteration on size 100000!You can enable tty and/or ssl agents as well!(Keep in mind – full filtering of the XML access has to be done by the control-plane management-plane command! The XML interface does not use VTYs!)You have to ensure you have correctly configured aaa as the xml agent uses default method for both authentication and authorization and that cannot be changed (last verified with IOS XR 5.3).You have to have both aaa authentication and authorization. If authorization is not set (aaa authorization default local or none), you may not be able to log in. And you shall ensure that both the authentication and authorization share the same source (tacacs+ or local).The default agent port is 38751 for the default agent and 38752 for SSL.DebuggingThe module uses “debug” module to log its outputs. You can enable the debugging by having in your code something like:require(‘debug’).enable(‘ciscoxml’);Or setting DEBUG environment to ciscoxml before starting the Node.JS

Node.JS module to access Cisco IOS XR XML interface

Post Syndicated from Delian Delchev original http://deliantech.blogspot.com/2015/03/nodejs-module-to-access-cisco-ios-xr.html

Hello to all,This is the early version of my module for Node.JS that allows configuring routers and retrieving information over Cisco IOS XR’s XML interface.The module is in its early phases – it still does not read IOS XR schema files and therefore decode the data (in JSON) in a little ugly way (too much arrays). I am planning to fix it, so there may be changes in the responses.Please see bellow the first version of the documentation I’ve set in the github:Module for Cisco XML API interface IOS XRThis is a small module that implements interface to Cisco IOS XR XML Interface.This module open an maintain TCP session to the router, sends requests and receive responses.InstallationTo install the module do something like that:npm install node-ciscoxmlUsageIt is very easy to use this module. See the methods bellow:Load the moduleTo load and use the module, you have to use a code similar to this:var cxml = require(‘node-ciscoxml’);var c = cxml( { …connect options.. });Module init and connect optionshost (default 127.0.0.1) – the hostname of the router where we’ll connectport (default 38751) – the port of the router where XML API is listeningusername (default guest) – the username used for authentication, if username is requested by the remote sidepassword (default guest) – the password used for authentication, if password is requested by the remote sideconnectErrCnt (default 3) – how many times it will retry to connect in case of an errorautoConnect (default true) – should it try to auto connect to the remote side if a request is dispatched and there is no open session alreadyautoDisconnect (default 60000) – how much milliseconds we will wait for another request before the tcp session to the remote side is closed. If the value is 0, it will wait forever (or until the remote side disconnects). Bear in mind autoConnect set to false does not assume autoDisconnect set to 0/false as well.userPromptRegex (default (Username|Login)) – the rule used to identify that the remote side requests for a usernamepassPromptRegex (default Password) – the rule used to identify that the remote side requests for a passwordxmlPromptRegex (default XML>) – the rule used to identify successful login/connectionnoDelay (default true) – disables the Nagle algorithm (true)keepAlive (default 30000) – enabled or disables (value of 0) TCP keepalive for the socketssl (default false) – if it is set to true or an object, then SSL session will be opened. Node.js TLS module is used for that so if the ssl points to an object, the tls options are taken from it. Be careful – enabling SSL does not change the default port from 38751 to 38752. You have to set it explicitly!Example:var cxml = require(‘node-ciscoxml’);var c = cxml( { host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});connect methodThis method forces explicitly a connection. It could accept any options of the above.Example:var cxml = require(‘node-ciscoxml’);var c = cxml();c.connect( { host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});The connect method is not necessary to be used. If autoConnect is enabled (default) the module will automatically open and close tcp connections when needed.Connect supports callback. Example:var cxml = require(‘node-ciscoxml’);cxml().connect( { host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’}, function(err) { if (!err) console.log(‘Successful connection’);});The callback may be the only parameter as well. Example:var cxml = require(‘node-ciscoxml’);cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’}).connect(function(err) { if (!err) console.log(‘Successful connection’);});Example with SSL:var cxml = require(‘node-ciscoxml’);var fs = require(‘fs’);cxml({ host: ‘10.10.1.1’, port: 38752, username: ‘xmlapi’, password: ‘xmlpass’, ssl: { // These are necessary only if using the client certificate authentication key: fs.readFileSync(‘client-key.pem’), cert: fs.readFileSync(‘client-cert.pem’), // This is necessary only if the server uses the self-signed certificate ca: [ fs.readFileSync(‘server-cert.pem’) ] }}).connect(function(err) { if (!err) console.log(‘Successful connection’);});disconnect methodThis method explicitly disconnects a connection.sendRaw method.sendRaw(data,callback)Parameters:data – a string containing valid Cisco XML request to be sentcallback – function that will be called when a valid Cisco XML response is receivedExample:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRaw(‘<Request><GetDataSpaceInfo/></Request>’,function(err,data) { console.log(‘Received’,err,data);});sendRawObj method.sendRawObj(data,callback)Parameters:data – a javascript object that will be converted to a Cisco XML requestcallback – function that will be called with valid Cisco XML response converted to javascript objectExample:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRawObj({ GetDataSpaceInfo: ” },function(err,data) { console.log(‘Received’,err,data);});rootGetDataSpaceInfo method.rootGetDataSpaceInfo(callback)Equivalent to .sendRawObj for GetDataSpaceInfo commandgetNextSends getNext request with a specific id, so we can retrieve the rest of the previous operation if it has been truncated.id – the ID callback – the callback with the data (in js object format)Keep in mind next response may be truncated as well, so you have to check for IteratorID all the time.Example:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRawObj({ Get: { Configuration: {} } },function(err,data) { console.log(‘Received’,err,data); if ((!err) && data && data.Response.$.IteratorID) { return c.getNext(data.Response.$.IteratorID,function(err,nextData) { // .. code to merge data with nextData }); } // .. code});sendRequest methodThis method is equivalent to sendRawObj but it can automatically detect the need and resupply GetNext requests so the response is absolutley full. Therefore this method should be the preferred method for sending requests that expect very large replies.Example:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.sendRequest({ GetDataSpaceInfo: ” },function(err,data) { console.log(‘Received’,err,data);});requestPath methodThis is a method equivalent to sendRequest but instead of an object, the request may be formatted in a simple path string. This metod is not very useful for complex requests. But its value is in the ability to simplify very much the simple requests. The response is in JavaScript objectExample:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.requestPath(‘Get.Configuration.Hostname’,function(err,data) { console.log(‘Received’,err,data);});reqPathPath methodThis is the same method as requestPath, but the response is not an object, but a path array. The method supports optional filter, which has to be a RegExp object and all paths and values will be tested against it Only those returning true will be included in the response array.Example:var cxml = require(‘node-ciscoxml’);var c = cxml({ host: ‘10.10.1.1’, port: 5000, username: ‘xmlapi’, password: ‘xmlpass’});c.reqPathPath(‘Get.Configuration.Hostname’,/Hostname/,function(err,data) { console.log(‘Received’,data[0]); // The output should be something like // [ ‘Response(“MajorVersion”=”1″,”MinorVersion”=”0”).Get.Configuration.Hostname(“MajorVersion”=”1″,”MinorVersion”=”0”)’, ‘asr9k-router’ ] });This method could be very useful for getting simple responses and configurations.getConfig methodThis method requests the whole configuration of the remote device and return it as objectExample:c.getConfig(function(err,config) { console.log(err,config);});cliConfig methodThis method is quite simple, it executes a command(s) in CLI Configuration mode and return the response in JS Object. You have to know that any configuration change in IOS XR is not effective unless it is committed!Example:c.cliConfig(‘username testuserngroup operatorn’,function(err,data) { console.log(err,data); c.commit();});cliExec methodExecutes a command(s) in CLI Exec mode and return the response in JS Object.c.cliExec(‘show interfaces’,function(err,data) { console.log(err,data?data.Response.CLI[0].Exec[0]);});commit methodCommit the current configuration.Example:c.commit(function(err,data) { console.log(err,data);});lock methodLocks the configuration mode.Example:c.lock(function(err,data) { console.log(err,data);});unlock methodUnlocks the configuration mode.Example:c.unlock(function(err,data) { console.log(err,data);});Configure Cisco IOS XR for XML agentTo configure IOS XR for remote XML configuration you have to:Ensure you have *mgbl*** package installed and activated! Without it you will have no xml agentcommands!Enable the XML agent with a similar configuration:xml agent vrf default ipv4 access-list SECUREACCESS ! ipv6 enable session timeout 10 iteration on size 100000!You can enable tty and/or ssl agents as well!(Keep in mind – full filtering of the XML access has to be done by the control-plane management-plane command! The XML interface does not use VTYs!)You have to ensure you have correctly configured aaa as the xml agent uses default method for both authentication and authorization and that cannot be changed (last verified with IOS XR 5.3).You have to have both aaa authentication and authorization. If authorization is not set (aaa authorization default local or none), you may not be able to log in. And you shall ensure that both the authentication and authorization share the same source (tacacs+ or local).The default agent port is 38751 for the default agent and 38752 for SSL.DebuggingThe module uses “debug” module to log its outputs. You can enable the debugging by having in your code something like:require(‘debug’).enable(‘ciscoxml’);Or setting DEBUG environment to ciscoxml before starting the Node.JS

Kernel Hackers Panel

Post Syndicated from Lennart Poettering original http://0pointer.net/blog/projects/linuxcon-kernel-panel.html

At LinuxCon Europe/ELCE I had the chance to moderate the kernel hackers
panel with Linus Torvalds, Alan Cox, Paul McKenney and Thomas Gleixner on
stage
. I like to believe it went quite well, but check it out for yourself, as
a video recording is now available online:

For me personally I think the most notable topic covered was Control Groups,
and the clarification that they are something that is needed even though their
implementation right now is in many ways less than perfect. But in the end there is no
reasonable way around it, and much like SMP, technology that complicates things
substantially but is ultimately unavoidable.

Other videos from ELCE are online now, too.

Kernel Hackers Panel

Post Syndicated from Lennart Poettering original http://0pointer.net/blog/projects/linuxcon-kernel-panel.html

At LinuxCon Europe/ELCE I had the chance to moderate the kernel hackers
panel with Linus Torvalds, Alan Cox, Paul McKenney and Thomas Gleixner on
stage
. I like to believe it went quite well, but check it out for yourself, as
a video recording is now available online:

For me personally I think the most notable topic covered was Control Groups,
and the clarification that they are something that is needed even though their
implementation right now is in many ways less than perfect. But in the end there is no
reasonable way around it, and much like SMP, technology that complicates things
substantially but is ultimately unavoidable.

Other videos from ELCE are online now, too.

Kernel Hackers Panel

Post Syndicated from Lennart Poettering original http://0pointer.net/blog/projects/linuxcon-kernel-panel.html

At LinuxCon Europe/ELCE I had the chance to moderate the kernel hackers
panel with Linus Torvalds, Alan Cox, Paul McKenney and Thomas Gleixner on
stage
. I like to believe it went quite well, but check it out for yourself, as
a video recording is now available online:

For me personally I think the most notable topic covered was Control Groups,
and the clarification that they are something that is needed even though their
implementation right now is in many ways less than perfect. But in the end there is no
reasonable way around it, and much like SMP, technology that complicates things
substantially but is ultimately unavoidable.

Other videos from ELCE are online now, too.

Prague

Post Syndicated from Lennart Poettering original http://0pointer.net/blog/projects/linuxcon-europe.html

If you make it to Prague the coming week for the LinuxCon/ELCE/GStreamer/Kernel Summit/… superconference, make sure not to miss:

The Linux Audio BoF with numerous Linux audio hackers, 5pm, on Sunday (23rd, i.e. today).

Latest
developments in PulseAudio
by Arun Raghavan. 4pm, on Tuesday, GStreamer
Summit

Linux
Kernel Developer Panel
, a shared session of LinuxCon and ELCE. Panelists
are Linus Torvalds, Alan Cox, Thomas Gleixner and Paul McKenney. Moderated by
yours truly. 9:30am, on Wednesday

systemd
Administration in the Enterprise
by Kay Sievers and yours truly. 4:15pm, on
Wednesday, LinuxCon

Integrating
systemd: Booting Userspace in Less Than 1 Second
by Koen Kooi. 11:15am, on
Friday, ELCE

All of that at the Clarion Hotel. See you in Prague!

Prague

Post Syndicated from Lennart Poettering original http://0pointer.net/blog/projects/linuxcon-europe.html

If you make it to Prague the coming week for the LinuxCon/ELCE/GStreamer/Kernel Summit/… superconference, make sure not to miss:

All of that at the Clarion Hotel. See you in Prague!

Prague

Post Syndicated from Lennart Poettering original http://0pointer.net/blog/projects/linuxcon-europe.html

If you make it to Prague the coming week for the LinuxCon/ELCE/GStreamer/Kernel Summit/… superconference, make sure not to miss:

All of that at the Clarion Hotel. See you in Prague!