How to Strengthen Firefox Privacy and Security for Digital Surveillance

Mozilla Firefox is one of the best browsers available that combines strong privacy protection features, good security, active development, and regular updates. A solid alternative to Google Chrome, Microsoft Edge, and Vivaldi.

In this guide, you will learn how to strengthen Firefox privacy and security for digital surveillance.

 

 

The post How to Strengthen Firefox Privacy and Security for Digital Surveillance appeared first on Linux Today.



Source: Linux Today – How to Strengthen Firefox Privacy and Security for Digital Surveillance

Netflix says 'Stranger Things 4' racked up over 1 billion hours viewed

Stranger Things 4 has become the most popular English-language series on Netflix with the premiere of its last two episodes. The streaming giant has revealed that the show has racked up 1.15 billion hours of viewing time within the first 28 days of each part’s release. As The Hollywood Reporter notes, the first seven episodes had a viewing time of 930.32 million hours within 28 days of the show’s debut. Meanwhile, episodes 8 and 9 reached 221 million hours viewed in the week of June 27th to July 3rd. 

That makes the series second only to Squid Game, which crossed 1.65 billion hours viewed within its first 28 days of release and which currently holds the title for the most-viewed show in Netflix history. It even has the potential to overtake the Korean hit, seeing as it has only been a few days since the last two episodes came out. 

Netflix, however, has yet to reveal whether Stranger Things 4’s popularity has had a significant impact on its subscriber numbers. In 2021, the company said it posted its best subscriber growth of the year during the third quarter, thanks in part to Squid Game. But in April this year, Netflix admitted that it lost about 200,000 subscribers in the first quarter of 2022 due to several issues, such as stiffer competition and account sharing. The company said back then that it’s taking steps to turn things around, but we’ll have to wait for its next earnings report to find out whether Eleven and the rest of the Hawkins crew were of any help. 



Source: Engadget – Netflix says ‘Stranger Things 4’ racked up over 1 billion hours viewed

Monitorix – A Linux System and Network Monitoring Tool

Monitorix is an open-source, free, and powerful lightweight tool designed to monitor system and network resources in Linux. It regularly collects system and network data and displays the information in graphs using its own web interface (which listens on the port 8080/TCP).

The post Monitorix – A Linux System and Network Monitoring Tool appeared first on Linux Today.



Source: Linux Today – Monitorix – A Linux System and Network Monitoring Tool

The History of Rocky Linux Distribution

Rocky Linux is a community-supported, and production-grade operating system designed to offer rock-solid stability and regular security updates for production workloads. It has increasingly gained traction since its inception and now sits with the big boys such as SUSE Linux Enterprise and Red Hat Enterprise Linux.

The post The History of Rocky Linux Distribution appeared first on Linux Today.



Source: Linux Today – The History of Rocky Linux Distribution

Cloned Mice Created From Freeze Dried Skin Cells In World First

An anonymous reader quotes a report from The Guardian: Researchers have created cloned mice from freeze dried skin cells in a world first that aims to help conservationists revive populations of endangered species. The breakthrough paves the way for countries to store skin cells from animals as an insurance policy, as the cells can be used to create clones that boost the species’ genetic diversity if they become threatened with extinction in the future. While scientists have used frozen cells to produce clones for conservation projects, the cells are kept in liquid nitrogen which is expensive and risky: if there are power outages or the liquid nitrogen is not regularly topped up, the cells melt and become unusable. Freeze dried sperm can also be used to create clones, but cannot be obtained from all animals.

In the latest work, researchers froze dried skin cells from mouse tails and stored them for up to nine months before trying to create clones from them. The freeze-drying processes killed the cells, but the scientists found they could still create early stage cloned embryos by inserting the dead cells into mouse eggs that had their own nuclei removed. These early stage mouse embryos, known as blastocysts, were used to create stocks of stem cells that were put through another round of cloning. The stem cells were inserted into mouse eggs emptied of their own nuclei, leading to embryos that surrogate mice carried to term. The first cloned mouse, named Dorami after a melon bread-loving robot in the Doraemon Manga series, was followed by 74 more. To check whether the clones had healthy fertility, nine females and three males were bred with normal mice. All the females went on to have litters.

Despite the achievement, the process is inefficient — freeze drying damaged DNA in the skin cells — and the success rate for creating healthy female and male mouse pups was only 0.2 to 5.4%. In some of the cells, the Y chromosome was lost, leading to female mice being born from cells obtained from male animals. “If the same treatment could be performed in endangered species where only males survived, it would be possible to produce females and naturally preserve the species, the authors write in Nature Communications.

Read more of this story at Slashdot.



Source: Slashdot – Cloned Mice Created From Freeze Dried Skin Cells In World First

More Dogs In the Neighborhood Often Means Less Crime

In a study conducted in Columbus, researchers found that neighborhoods with more dogs had lower rates of homicide, robbery and, to a lesser extent, aggravated assaults compared to areas with fewer dogs, at least when residents also had high levels of trust in each other. Phys.Org reports: The results suggest that people walking their dogs puts more “eyes on the street,” which can discourage crime, said Nicolo Pinchak, lead author of the study and a doctoral student in sociology at The Ohio State University. “People walking their dogs are essentially patrolling their neighborhoods,” Pinchak said. “They see when things are not right, and when there are suspect outsiders in the area. It can be a crime deterrent.”

For the study, researchers looked at crime statistics from 2014 to 2016 for 595 census block groups — the equivalent of neighborhoods — in the Columbus area. They obtained survey data from a marketing firm that asked Columbus residents in 2013 if they had a dog in their household. Finally, they used data from the Adolescent Health and Development in Context study (which Browning runs) to measure trust in individual neighborhoods. As part of that study, residents were asked to rate how much they agreed that “people on the streets can be trusted” in their neighborhoods. Research has shown that trust among neighbors is an important part of deterring crime, because it suggests residents will help each other when facing a threat and have a sense of “collective efficacy” that they can have a positive impact on their area, Pinchak said.

Results of this study showed, as expected, that neighborhoods with high levels of trust had lower levels of homicide, robbery and aggravated assaults when compared to neighborhoods with low levels of trust. But among high-trust neighborhoods, those with high concentrations of dogs showed an additional drop in crime compared to those with low concentrations of dogs. Among the high-trust neighborhoods, neighborhoods high in dog concentration had about two-thirds the robbery rates of those low in dog concentration and about half the homicide rates, the study found. It really has to do with the dog walking, Pinchak said. […] Results showed that the trust and dog-walking combination helped reduce street crimes: those crimes like homicides and robberies that tend to occur in public locations, including streets and sidewalks. The study found that more dogs in a neighborhood was also related to fewer property crimes, like burglaries, irrespective of how much residents trust each other, Pinchak said. […] The protective effect of dogs and trust was found even when a wide range of other factors related to crime was taken into account, including the proportion of young males in the neighborhood, residential instability and socioeconomic status. The study was published in the journal Social Forces.

Read more of this story at Slashdot.



Source: Slashdot – More Dogs In the Neighborhood Often Means Less Crime

Xbox 360 games Will No Longer Be Part of Xbox Games With Gold In October

Microsoft is planning to remove Xbox 360 games from its monthly Games with Gold offer in October. The Verge reports: The software maker has started emailing Xbox Live Gold subscribers to warn them of the change, noting that the company has “reached the limit of our ability to bring Xbox 360 games to the catalogue.” Games with Gold is a monthly benefit for subscribers of Xbox Live Gold and Xbox Game Pass Ultimate. Microsoft hand picks free games each month, and all Xbox 360 titles are playable on the latest Xbox Series X / S consoles and Xbox One.

Microsoft’s Xbox backward compatibility program briefly returned with 76 new games last year, but the company made it clear it had “reached the limit of our ability to bring new games to the catalog from the past due to licensing, legal and technical constraints.” That would explain why it has now reached the limit on new Xbox 360 titles for Games with Gold. If you’ve already downloaded or redeemed Xbox 360 games through Games with Gold, this change won’t impact those titles. This just means starting October 1st, Microsoft won’t be adding any additional Xbox 360 titles to the Games with Gold offering.

Read more of this story at Slashdot.



Source: Slashdot – Xbox 360 games Will No Longer Be Part of Xbox Games With Gold In October

Gtk 5 Might Drop X.11 Support, Says GNOME Dev

One of the GNOME developers has suggested that the next major release of Gtk could drop support for the X window system. The Register reports: Emmanuele Bassi opened a discussion last week on the GNOME project’s Gitlab instance that asked whether the developers could drop X.11 support in the next release of Gtk. At this point, it is only a suggestion, but if it gets traction, this could significantly accelerate the move to the Wayland display server and the end of X.11.

Don’t panic: Gtk 5 is not imminent. Gtk is a well-established toolkit, originally designed for the GIMP bitmap editing program back in 1998. Gtk 4 arrived relatively recently, shortly before the release of GNOME 40 in 2021. GNOME 40 has new user-interface guidelines, and as a part of this, Gtk 4 builds GNOME’s Adwaita theme into the toolkit by means of the new libadwaita library, which is breaking the appearance of some existing apps.

Also, to be fair, as we recently covered, the X window system is very old now and isn’t seeing major changes, although new releases of parts of it do still happen. This discussion is almost certain to get wildly contentious, and the thread on Gitlab has been closed to further comments for now. If this idea gains traction, one likely outcome might well be a fork of Gtk, just as happened when GNOME 3 came out. […] A lot of the features of the current version, X.11, are no longer used or relevant to most users. Even so, X.12 is barely even in the planning stages yet.

Read more of this story at Slashdot.



Source: Slashdot – Gtk 5 Might Drop X.11 Support, Says GNOME Dev

Are You as Confused About Taika Waititi's Star Wars Movie as We Are?

Flashback to May 4, 2020. That was the day the official Star Wars website announced that recent Oscar winner Taika Waititi was going to make a Star Wars movie, one he’d direct and co-write along with Oscar nominee Krysty Wilson-Cairns. A few months after that, Lucasfilm president Kathleen Kennedy reconfirmed Waititi’s…

Read more…



Source: Gizmodo – Are You as Confused About Taika Waititi’s Star Wars Movie as We Are?

The cryptopocalypse is nigh! NIST rolls out new encryption standards to prepare

Conceptual computer artwork of electronic circuitry with blue and red light passing through it, representing how data may be controlled and stored in a quantum computer.

Enlarge / Conceptual computer artwork of electronic circuitry with blue and red light passing through it, representing how data may be controlled and stored in a quantum computer. (credit: Getty Images)

In the not-too-distant future—as little as a decade, perhaps, nobody knows exactly how long—the cryptography protecting your bank transactions, chat messages, and medical records from prying eyes is going to break spectacularly with the advent of quantum computing. On Tuesday, a US government agency named four replacement encryption schemes to head off this cryptopocalypse.

Some of the most widely used public-key encryption systems—including those using the RSA, Diffie-Hellman, and elliptic curve Diffie-Hellman algorithms—rely on mathematics to protect sensitive data. These mathematical problems include (1) factoring a key’s large composite number (usually denoted as N) to derive its two factors (usually denoted as P and Q) and (2) computing the discrete logarithm that keys are based on.

The security of these cryptosystems depends entirely on classical computers’ difficulty in solving these problems. While it’s easy to generate keys that can encrypt and decrypt data at will, it’s impossible from a practical standpoint for an adversary to calculate the numbers that make them work.

Read 12 remaining paragraphs | Comments



Source: Ars Technica – The cryptopocalypse is nigh! NIST rolls out new encryption standards to prepare

Broadest US Pirate Site Injunction Rewritten/Tamed By Cloudflare

An anonymous reader quotes a report from TorrentFreak: After causing outrage among online services including Cloudflare, the most aggressive pirate site injunction ever handed down in the US has undergone significant weight loss surgery. Now before the court is a heavily modified injunction that is most notable for everything that’s been removed. It appears that Cloudflare drew a very clear line in the sand and refused to step over it. […] The injunctions granted extreme powers, from residential ISP blocking to almost any other action the plaintiffs deemed fit to keep the sites offline. Almost immediately that led to friction with third-party service providers and the situation only worsened when a concerned Cloudflare found itself threatened with contempt of court for non-compliance. The CDN company fought back with support from Google and EFF and that led the parties back to the negotiating table. Filings in the case last week suggested an acceptance by the plaintiffs that the injunction cannot be enforced in its present form. The parties promised to work on a new injunction to address both sides’ concerns and as a result, a new proposal now awaits the court’s approval. […]

With the contempt of court issue behind them, Cloudflare and the plaintiffs appear to have settled their differences. An entire section in the injunction dedicated to Cloudflare suggests that the CDN company is indeed prepared to help the video companies but they’ll have to conform to certain standards. Before even contacting Cloudflare they’ll first need to make “reasonable, good faith efforts to identify and obtain relief for the identified domains from hosting providers and domain name registries and registrars.”

If the plaintiffs still need Cloudflare’s assistance, Cloudflare will comply with requests against domain names listed in this injunction and future injunctions by preventing access to the following: “Pass-through security services, content delivery network (CDN) services, video streaming services, and authoritative DNS services, DNS, CDN, streaming services, and any related services.” An additional note states that the plaintiffs acknowledge that Cloudflare’s compliance “will not necessarily prevent the Defendants from providing users with access to Defendants’ infringing services.” Given the agreement on the terms, the amended injunction will likely be signed off by the court in the coming days. Service providers everywhere will breathe a sigh of relief while rightsholders will have a template for similar cases moving forward. The proposed amended injunction documents can be found here (1, 2, 3, 4, 5 pdf).

Read more of this story at Slashdot.



Source: Slashdot – Broadest US Pirate Site Injunction Rewritten/Tamed By Cloudflare

KDE Slimbook Gen4 Is Available Now with an AMD Ryzen 7 5700U CPU

The biggest change in KDE Slimbook Gen4 is the new AMD Ryzen 7 5700U processor. Learn more about the new release here.

As usual, the Linux laptop is available in two variants, KDE Slimbook 14″ featuring a 14-inch Full HD IPS LED display with 1920×1080 resolution at 60Hz refresh rate and 100% sRGB, and KDE Slimbook 15.6” featuring a bigger 15.6-inch Full HD IPS LED display with 1920×1080 resolution at 60Hz refresh rate and 100% sRGB.

The post KDE Slimbook Gen4 Is Available Now with an AMD Ryzen 7 5700U CPU appeared first on Linux Today.



Source: Linux Today – KDE Slimbook Gen4 Is Available Now with an AMD Ryzen 7 5700U CPU