Blogger Widgets
Tampilkan postingan dengan label CYBER. Tampilkan semua postingan
Tampilkan postingan dengan label CYBER. Tampilkan semua postingan

Kamis, 02 Januari 2014

The Syrian Electronic Army Rings In The New Year By Hacking Skype’s Social Media Accounts

The Syrian Electronic Army is at it again. The group just hacked Skype’s blog and twitter accounts, spreading an anti-NSA, anti-Microsoft message in the process. “Don’t use Microsoft emails (hotmail,outlook), They are monitoring your accounts and selling the data to the governments”, says one posting. “Hacked by Syrian Electronic Army.. Stop Spying!”,says another.
Skype, the service itself, does not appear to be affected.
The group also gained control of Skype’s Facebook although that message has since been deleted. However, the postings were up for nearly 40 minutes.

As of publication, the activist group still seemingly has control of Skype’s blog and Twitter.

'Jailbreaking' Apple devices creates business for hackers


A man uses an iPhone in front of the Apple store in Hong Kong.

Each year, Apple releases a new version of the software running its iconic mobile devices, the iPhone and iPad. And each year, a small but dogged community of hackers sets out to break it - or, in the words of the hackers, "jailbreak" it.
The liberation imagery long seemed apt. Apple puts strict limits on how its devices can be used, requiring, for example, that all apps be bought through the company's lucrative iTunes store. By comparison, the hackers styled themselves as plucky hobbyists seeking freedom from what they derided as Apple's "walled garden" and into a promised land of virtually limitless new software.
That image has taken a beating in recent days as prominent hackers have battled allegations that they've been working not for ideals but for money. The supposed payoffs would have come from Chinese investors eager to cash in on the spread of Apple products in that country.
Although there's no evidence money changed hands, the controversy has highlighted how Apple's restrictions on its mobile devices have fuelled the creation of alternative marketplaces, where the thrill of trying to outsmart one of the world's richest companies mixes with at least the possibility of fat profits for those who succeed.

"Anything that can open up a whole new line of sales on [Apple devices] is certainly worth a lot to somebody," said Brian Krebs, who covers internet security issues on his blog, KrebsOnSecurity. "If you jailbreak it, it means there are millions of more apps to sell."
Apps for mobile devices earned nearly $US27 billion in 2013 and are projected to earn more than $US76 billion in 2017, with Google's Android operating system and Apple's iOS platform the dominant players, according to Gartner, a research firm. Apple reported $US9.3 billion in revenue last year from its iTunes store, which sells apps along with music, movies and electronic books.
Among the key growth markets is China, where lower-priced Android devices have a large lead and Apple is working to make inroads. It announced a deal in December to offer the iPhone through China Mobile, the world's largest cellular carrier.
Apple's tightly controlled ecosystem has long been part of its appeal. Company founder Steve Jobs, who died in October 2011, obsessed over every detail of the user experience, with the goal of having hardware, software and online services working together seamlessly.
The tradeoff came in control for consumers. While Google's Android devices are made by many different manufacturers and can load apps from any store a user chooses, Apple makes it own products and rigorously oversees the apps available on iTunes, typically taking a 30 per cent cut from every sale and barring developers who do not comply with the company's many rules.
"Apple products are like beautiful crystal prisons," said Peter Eckersley, director of technology projects at the Electronic Frontier Foundation, a civil liberties group. "Deviation from that is not allowed."
Jailbreaking can allow users of Apple mobile devices substantial new powers - for example, to fake their locations to defeat location tracking and service blackouts. It can allow free "tethering" so users can direct data streams from their iPhones to other devices without paying for a separate connection. And it can allow the use of alternative browsers that have privacy settings not available on Apple's Safari.
Advocates for the disabled, meanwhile, have sponsored a campaign to raise money in support of jailbreaking Apple's latest mobile device operating system, iOS 7, because iTunes does not offer some apps they find helpful.
Jailbreaking devices removes key security features. One of the few successful iPhone attacks - a prank virus that changed the background screen to an image of British pop star Rick Astley - spread on jailbroken devices.
"Apple's goal has always been to ensure that our customers have a great experience with their iPhone, and we know that jailbreaking can severely degrade the experience," Apple spokeswoman Trudy Muller said in a statement. "As we've said before, the vast majority of customers do not jailbreak their iPhones as this can violate the warranty and can cause the iPhone to become unstable and not work reliably."
Jailbreaks and other types of hacks once were widely available for free, but the security vulnerabilities they rely on have become valuable commodities, in part because of the demand from government intelligence services, such as the National Security Agency.
The recent controversy flared when, a few days before Christmas, a hacker group called the "evad3rs" released the first publicly available jailbreaking tools for iOS 7. The tools also loaded a Chinese app store, called Taig, for devices that were set to use the Chinese language.

Read more: http://www.smh.com.au/technology/technology-news/jailbreaking-apple-devices-creates-business-for-hackers-20140101-305p9.html#ixzz2pCo7sb9U

Jumat, 07 September 2012

Faced with a Five-Page Limit, Lawyer Files Cartoon Amicus Brief with Proper Font Size


image

Updated: A lawyer who opposes the Justice Department’s proposed antitrust settlement with three publishers of e-books has filed an amicus brief (PDF) in the form of a comic strip.

Bob Kohn tells Bloomberg and the New York Times Media Decoder blog that he opted for the unusual format after U.S. District Judge Denise Cote of Manhattan limited his brief to five pages. “I thought of the idea of using pictures which, as we know, paint a thousand words,” Kohn told Media Decoder.

He calls the cartoon a “graphic novelette” and says it complies with court rules requiring 12-point or larger type and one-inch margins, Bloomberg says. The illustrator attends school with Kohn's daughter, Katie, who is pursuing a Ph.D. in film studies at Harvard.

The U.S. Justice Department filed suit in April against Apple and five publishers claiming a conspiracy to address Amazon.com’s low e-book pricing of $9.99 that was often below its cost. The DOJ saw a price-fixing conspiracy, while supporters said Amazon's low prices were killing off competition and allowing it to gain market share.

Kohn’s brief begins with a traditional table of authorities. The comic strip follows, with the first panel showing Cote ordering a five-page limit. Kohn then tries to compose his brief at home, sitting in bed wearing a robe and working on his laptop. His daughter enters the bedroom and asks Kohn what he is working on. “Trying to explain why supply & demand does not operate normally on pricing of e-books,” Kohn says. At the bottom of the picture is a rectangle with a two-word reference to one of the cases in the table of authorities.

“Oh, because of illegal downloading,” Katie says. “Right,” Kohn replies. He goes with a short explanation of his argument. The comic then shifts to the next day, where Kohn is discussing the case with his daughter on a park bench. Kohn tells Katie his argument is backed by the U.S. Justice Department’s own Supreme Court authority, to which his daughter replies, “I’m not a lawyer, but that sounds like a major screw-up.” Later she concludes, “Wow! The DOJ really blew this one.”

After Katie picks up the argument, Kohn tells her she should have been a lawyer. “Nope, not for me,” she says. “I’m a novelist, and it’s impossible to tell a complex story in only five pages.”

Bloomberg identifies Kohn as an expert in music licensing law and chairman of RoyaltyShare Inc. Publishers Weekly suggests Kohn's comic strip is intended to reach beyond the courtroom. "His rendering is brilliant—not only is it a not so subtle jab at the court for limiting such a complicated case to five page briefs, as a comic strip, the brief will be widely digestible for the general public who may not have the gumption to plow through a typical legal brief," the publication says.

Even if Kohn had some success in the court of public opinion, he wasn’t able to persuade Cote. In an opinion dated Wednesday, a day after Kohn submitted his brief, Cote approved the Justice Department’s settlement.

In an email to the ABA Journal, Kohn expressed disappointment. “It appears that the District Court completely deferred to the DOJ, whose analysis of the case was faulty and insufficient,” he said.
Updated on Sept. 6 to report on Cote's ruling.

Subsequent coverage:
ABAJournal.com: "Judge Approves E-Book Price-Fixing Settlement, Quotes Emily Dickinson Poem"

(sumber: http://www.abajournal.com/news/article/faced_with_a_five-page_limit_lawyer_files_cartoon_amicus_brief_with_proper_/)

Nokia faked the still photos too

Screen shot 2012-09-06 at 01.16.10.png

As if faking the video wasn’t bad enough.
This is a still from Nokia’s new product promo video. It’s showing off their apparent Optical Image Stabilization (OIS) on their new device, the Lumia 920.
Being a Finnish company, Nokia shot these scenes in Helsinki of course. I’ve lived in Helsinki, and where these photos were taken, there’s no lighting like this. Pretty much all street-lighting in Helsinki originates high from the center of roads. It’s ambiently diffused, not spot, as this video would have you believe. When you live through 20 hours of daily darkness in the winter, you start to notice these sorts of things.
I decided to do a bit more research based on the data we have at hand. Going by these still images it’s hard to tell what device really took the photos. We don’t have the EXIF data because these are part of a video, and there’s no cheeky reflections we can zoom in and enhance. However, there is one thing, that once seen can’t be unseen. Diffractions. Diffractions are the sparkle affect generated around the bright lights in the background.
109055542.jpeg
Diffraction occurs when light hits an opaque edge in the light path, such as the aperture blades in the lens. Diffraction causes the light to be spread out in a plane that is perpendicular to the edge from where the diffraction occurs. So you get two points of sparkle from one edge.
What Causes the Sparkles in Night Photos
d1.png
It’s impossible for a camera with a fixed aperture of f/2 to generate so many spikes from a light source. These kind of diffractions are typical of a DLSR camera with a smaller aperture like f/22. So, it makes perfect sense that if Nokia were to fake the video, they would also fake the stills; which they almost certainly have.
UPDATE 1: And if there are any doubts left in your mind.
ApolloPureView-image2.jpeg
Above is a photo (ApolloPureView-image2.jpeg) grabbed straight from the Nokia Lumia 920 launch site, also taken in Helsinki under very similar light conditions. Check the sparkle of the lamp to the right of the girl. That’s pretty much exactly how an f/2 diffraction should look like.
UPDATE 2: and finally.. A Hacker News user by the alias exDM69 astutely shared a photograph of the photoshoot in Helsinki city center. The photo was taken by a friend of his. I knew an image of the photoshoot would surface sooner or later, how could it not.
You can just about see the DSLR lens on the very left center of the photo.
578446_10151087026494473_802634455_n.jpeg Photo: Copyright johaee@gmail.com
Case closed.

(sumber: http://sefsar.com/nokia-faked-the-still-photos-too)

Which VPNs Are The Best?

When we ran our recent Hive Five on VPN service providers, we heard from VPN providers begging to be included, angry CEOs who claimed their company was maliciously left out, and others accusing some of the contenders of illegal or unethical behavior. We took at look at the poll and the claims, and while there's no definitive proof the poll was gamed, we decided to come up with our own top five, based on our own research rather than reader feedback, that are great whether you're the privacy advocate, the student, or the downloader.
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

Private Internet Access

Supports: Windows, OS X, Linux, iOS, Android
Protocols: SSL, PPTP, IPSec, and L2TP. You can also configure Private Internet Access to work on your DD-WRT or Tomato router (via SSL/OpenVPN) for constant security.
Home Country: United States, and has exit servers in the US, Canada, the UK, Switzerland, Romania, and the Netherlands.
Logging Policies: The service keeps no logs of your activity whatsoever (in fact, the only things they do keep are your email address and payment information,) uses shared IPs, and has committed to keeping your data private. Price: Pricing starts at $7/mo to $40/yr, and you can read more about their plans and pricing here.
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

proXPN

Supports: Windows, OS X, iOS
Protocols: SSL, PPTP.
Home Country: United States, with exit servers in the US, The Netherlands, Singapore, and the UK.
Logging Policies: proXPN keeps minimal logs of your activity. proXPN collects your email address, payment information (if you're a premium user,) bandwidth usage, connection duration, and login/logout times. They've committed to only keeping those logs for 14 days or less, and promise to never share their logs with anyone, period.
Price: proXPN has a free plan, which limits your transfer speeds to 300kpbs and restricts you to one exit location (Miami) in the United States. Premium accounts unlock support for PPTP (if you want to connect a mobile device or a router,) remove the transfer cap, and allows you to choose from any of the company's other exit locations. Premium plans start at $10/mo, and you can read more about their pricing and plans here.
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

TorVPN

Supports: Windows, OS X, Linux, iOS, Android
Protocols: SSL (they often refer to it as OpenVPN), PPTP, and full SSH tunneling.
Home Country: Hungary, with exit servers in Hungary.
Logging Policies: The service doesn't log your connection aside from bandwidth usage to compare against your quota, and your payment details. They also are committed to your privacy, and specifically say they won't surrender their data without a Hungarian court order.
Price: Free TorVPN users are limited to 1GB/mo downloaded before they're cut off, and Premium accounts start at 5 EUR/mo ($7mo) for 5GB/mo and go up to 30 EUR/mo ($38/mo) for 100GB. Keep in mind they have a no-refunds policy, and that even though you ride the Tor network, they're a separate entity from the Tor Project. You can read more about their pricing and plans here.
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

TorGuard

Supports: Windows, OS X, Linux, and iOS and Android via built-in VPN
Protocols: SSL (OpenVPN), PPTP, and L2TP, (with 256 bit security)
Home Country: Panama, with exit servers in The Netherlands, Romania, Ukraine and Panama.
Logging Policies: TorGuard wholeheartedly supports privacy, so you can feel a bit more secure that your connection is secure and anonymous. They purge their logs daily, and only keep payment information and registration info. They don't even keep login/logout times.
Price: Depending on whether you're the privacy advocate, the downloader, or a combination of the two, TorGuard offers plans specifically for anonymity (starting at $6/mo), for torrenting (starting at $5/mo), or for overall VPN services ($10/mo). You can read more about TorGuard's pricing and plans here.
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

WiTopia

Supports: Windows, OS X, Linux, iOS, Android, webOS, Chromebooks.
Protocols: SSL, PPTP, IPSec, and L2TP (with 256 bit security)
Home Country: United States, with exit servers in 10 US cities, and countries in Latin and South America, Asia, Australia, Europe, Africa, and the Middle East—way too many to list here.
Logging Policies: WiTopia does not log information that can be attributable to individual users, purges logs weekly, and only saves registration information and payment details when you sign up.
Price: $50/yr to $70/yr depending on the level of encryption and protocols you need. They also sell a VPN router you can take with you when you travel. You can read more about WiTopia's pricing and plans here.

Alternatively, Roll Your Own VPN

We've shown you how to roll your own VPN using Hamachi, and even how to set up Privoxy to secure your web browsing once you have your personal VPN set up. Hamachi isn't the only option: you can also download and configure OpenVPN (a free SSL VPN) on your own home server,, or if you have a router that supports it, enable OpenVPN on your home router so you can connect back to it when you're abroad. Combined with Privoxy, you get the privacy and anonymity benefits of a VPN without spending a dime.
Both of these options put control in your hands, and while they're not quite as anonymous as subscription methods or offer international exit locations, they do give you the the most important benefits of a VPN: security, privacy, and anonymity while you're away from home.

Samara Lynn is Lead Analyst, Networking and Small Business at PCMag.com. You can follow her on Twitter at @samaralynn. She graciously volunteered her expertise for this post, and we thank her.
Title image remixed using konmesa (Shutterstock) and Toria (Shutterstock).

Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

You may know what a VPN, or Virtual Private Network, is; you probably don't use one. You really should be using a VPN, and even if you don't think so now, at some point in the future you may consider it as important as your internet connection.

When we took at look at your five favorite VPN service providers, we noticed a few things. First, being the "best" is big business for VPN providers, and they'll fight dirty to be one of them. Second, there are so many VPN providers that it's difficult to choose a really good one. VPNs are not all created equally, and in this post, we're going to look at what a VPN is, why you want one, and how to pick the best one for you. Let's get started.
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

What Is a VPN?

Put simply, a Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together through over a public network—namely, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they're not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they're using an untrusted public network. Photo by Pavel Ignatov (Shutterstock).

When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.

The most important thing you need to know about a VPN: It secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes.

Whether the VPNs you're familiar with are the ones offered by your school or business to help you work or stay connected when you're traveling or the ones you pay to get you watch your favorite shows in another country as they air, they're all doing the same thing. For much more detail on what VPNs are, how they work, and how they're used, check out this How Stuff Works article.
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)

Why You Need a VPN, or How You Can Benefit from Using One

A VPN alone is just a way to bolster your security and access resources on a network you're not physically connected to. What you choose to do with a VPN is a different story. Usually, VPN users fall into a few separate categories:
  • The student/worker. This person has responsibilities to attend to, and uses a VPN provided by their school or company to access resources on their network when they're at home or traveling. In most cases, this person already has a free VPN service provided to them, so they're not exactly shopping around. Also, if they're worried about security, they can always fire up their VPN when using airport or cafe WI-Fi to ensure no one's snooping on their connection. Photo by Ed Yourdon.
  • The downloader. Whether they're downloading legally or illegally, this person doesn't want on some company's witch-hunt list just because they have a torrenting app installed on their computer. VPNs are the only way to stay safe when using something like BitTorrent—everything else is just a false sense of security. Better safe than trying to defend yourself in court or paying a massive fine for something you may or may not have even done, right?
  • The privacy minded and security advocate. Whether they're a in a strictly monitored environment or a completely free and open one, this person uses VPN services to keep their communications secure and encrypted and away from prying eyes whether they're at home or abroad. To them, unsecured connections mean someone's reading what you say.
  • Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs) The globetrotter. This person wants to watch the Olympics live as they happen, without dealing with their crummy local networks. They want to check out their favorite TV shows as they air instead of waiting for translations or re-broadcasts (or watch the versions aired in other countries,) listen to location-restricted streaming internet radio, or want to use a new web service or application that looks great but for some reason is limited to a specific country or region.
  • Some combination of the above. Odds are, even if you're not one of these people more often than not, you're some mix of them depending on what you're doing. In all of these cases, a VPN service can be helpful, whether it's just a matter of protecting yourself when you're out and about, whether you handle sensitive data for your job and don't want to get fired, or you're just covering your own ass from the MPAA.
Even if none of the above really sound right to you, you can still benefit from using a VPN. You should definitely use one when you travel or work on an untrusted network (read: a network you don't own, manage, or trust who manages.) That means opening your laptop at the coffee shop and logging in to Facebook or using your phone's Wi-Fi to check your email at the airport can all potentially put you at risk.

We've shown you how to build your own VPN for remote gaming and browsing that also protects your security, shown you how to make a VPN even more secure, and shown you dozens of services that operate free and paid VPNs you can sign up for and use. We've even put the question to you several times to tell us which VPN service providers you think are the best. So how do you pick a solid VPN service?

What Makes for a Good VPN?

The best VPNs offer a solid balance of features, server location, connectivity protocols, and price. Some are great for occasional use, others are geared towards getting around the location restrictions companies put on their apps and services, and others are targeted at people who do heavy downloading and want a little privacy while they do it. Here's what you should look for.
  • Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs) Anti-Malware/Anti-Spyware Features: Using a VPN doesn't mean you're invulnerable. You should still make sure you're using HTTPS whenever possible, and you should still be careful about what you download. Some VPN service providers—especially mobile ones—bundle their clients with anti-malware scanners to make sure you're not downloading viruses or trojans. When you're shopping, see if the providers you're interested in offer anti-malware protection while you're connected. For example, previously mentioned Hotspot Shield offers malware protection to its premium users. It may not be a dealbreaker for you, but it's always good to have someone watching your back.
  • Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs) Protocol: When you're researching a VPN, you'll see terms like SSL/TLS (sometimes referred to as OpenVPN support,) PPTP, IPSec, L2TP, and other VPN types. We asked Samara Lynn, Lead Analyst for Networking and Small Business at PCMag, whether or not a user shopping for a VPN should shop for one over another. "SSL is what is commonly used these days. All of these protocols will provide a secure connection," she explained, and pointed out that most solutions are invisible to the end-user anyway. Strictly, each protocol has its benefits and drawbacks, and if you're concerned about this (specifically, PPTP vulnerabilities,) you're probably already aware of them. Most users don't need to be concerned about this—corporate users on the other hand, are probably all using IPSec or SSL clients anyway.
  • Corporate and Exit Locations: Depending on what you're using a VPN for, your service's location—and the exit locations you can choose—are important to consider. If you want to get around a location restriction and watch live TV in the UK, for example, you want to make sure your VPN service provider has servers in the UK. If you're concerned about privacy or state-sponsored snooping, you may want to pick a service operated outside of your home country. Similarly, if the service is based on the US, they're subject to US laws, and may be forced to turn over usage data to the authorities upon request. Many people make more of this than they should (we've seen overseas services turn over their data to friendly governments without any hesitation repeatedly), but it's important to make sure a VPN has servers in multiple locations—or at least the location you're interested in—when shopping.
  • Logging: When you connect to a VPN, you're trusting the VPN service provider with your data. Your communications may be secure from eavesdropping, but other systems on the same VPN—especially the operator—can log your data if they choose. If this bothers you (e.g., you're the privacy/security advocate or the downloader), make absolutely sure you know your provider's logging policies before signing up. This applies to location as well—if your company doesn't keep logs, it may not matter as much where it's located. (There's a popular rumor that US-based VPN providers are required to log, in case the government wants them. This isn't true, but the government can always request whatever data they have if they do log.) For a good list of VPN providers that don't log your activities when connected (and many that do), check out this TorrentFreak article.
  • Mobile Apps: If you're going to spend money on a VPN service provider (or even if you use a free one, frankly), you should be able to get a consistent experience across all of your devices. Most prominent providers offer desktop and mobile solutions for individual users, and while corporate and school networks may be a bit behind the curve here, they're catching up too. Make sure you don't have to use two different VPNs with two different policies and agreements just because you want to secure your phone along with your laptop.
  • Price: Finally, go into your user agreement with both eyes open. You should read the privacy policy for the service you're interested in, and be very aware of the differences between free and paid services. For example:
    • Free VPN Providers are more likely to log your activities and serve contextual ads while you're connected. They're also more likely to use your usage habits to tailor future ads to you, have fewer exit locations, and weak commitments to privacy. They may offer great features, but if logging and privacy are important to you, you may want to avoid them. However, if you just need quick, painless security while traveling on a budget, they're a great option.
    • Subscription VPN Providers usually take your privacy a bit more seriously, since you're paying for the service. It's unusual for them to show ads, although whether they do logging or store data about your usage varies from company to company. They usually offer free trials so you can give the service a shot first, but remember: just because you're paying for a service doesn't mean you shouldn't do your homework.
A mix of features and price make a good VPN, but plenty of bad VPNs masquerade as good ones. Look for articles written by trustworthy sources that discuss the merits of each service based on its features, versus simple rundowns and user testimonials, which are almost always polluted by a combination of fanatical users and corporate bootstrapping in attempt to get their names out to potential customers.

(sumber: http://lifehacker.com/5940565/why-you-should-start-using-a-vpn-and-how-to-choose-the-best-one-for-your-needs)

The Linux Graphics Stack

This is an introductory overview post for the Linux Graphics Stack, and how it currently all fits together. I initially wrote it for myself after having conversations with people like Owen Taylor, Ray Strode and Adam Jackson about this stack. I had to go back to them every month or so and learn the stuff from the ground up all over again, as I had forgotten every single piece. I asked them for a good high-level overview document so I could stop bothering them. They didn’t know of any. I started this one. It has been reviewed by Adam Jackson and David Airlie, both of whom work on this exact stack.

Also, I want to point out that a large amount of this stack applies only to the free software drivers. That means that a lot of what you read here may not apply for the AMD Catalyst and NVidia proprietary drivers. They may have their own implementations of OpenGL, or an internal fork of mesa. I’m describing the stack that comes with the free radeon, nouveau and Intel drivers.

If you have any questions, or if at any point things were unclear, or if I’m horribly, horribly wrong about something, or if I just botched a sentence so that it’s incomprehensible, please ask me or let me know in the comments section below.

To start us off, I’m going to paste the entire big stack right here, to let you get a broad overview of where every piece fits in the stack. If you do not understand this right away, don’t be scared. Feel free to refer to this throughout the post. Here’s a handy link.

So, to be precise, there are two different paths, depending on the type of rendering you’re doing.
3D rendering with OpenGL
  1. Your program starts up, using “OpenGL” to draw.
  2. A library, “mesa”, implements the OpenGL API. It uses card-specific drivers to translate the API into a hardware-specific form. If the driver uses Gallium internally, there’s a shared component that turns the OpenGL API into a common intermediate representation, TGSI. The API is passed through Gallium, and all the device-specific driver does is translate from TGSI into hardware commands,
  3. libdrm uses special secret card-specific ioctls to talk to the Linux kernel
  4. The Linux kernel, having special permissions, can allocate memory on and for the card.
  5. Back out at the mesa level, mesa uses DRI2 to talk to Xorg to make sure that buffer flips and window positions, etc. are synchronized.
2D rendering with cairo
  • Your program starts up, using cairo to draw.
  • You draw some circles using a gradient. cairo decomposes the circles into trapezoids, and sends these trapezoids and gradients to the X server using the XRender extension. In the case where the X server doesn’t support the XRender extension, cairo draws locally using libpixman, and uses some other method to send the rendered pixmap to the X server.
  • The X server acknowledges the XRender request. Xorg can use multiple specialized drivers to the drawing.
    1. In a software fallback case, or in the case the graphics driver isn’t up to the task, Xorg will use pixman to do the actual drawing, similar to how cairo does it in its case.
    2. In a hardware-accelerated case, the Xorg driver will speak libdrm to the kernel, and send textures and commands to the card in the same way.
As to how Xorg gets things on the screen, Xorg itself will set up a framebuffer to draw into using KMS and card-specific drivers.

X Window System, X11, Xlib, Xorg

X11 isn’t just related to graphics; it has an event delivery system, the concept of properties attached to windows, and more. Lots of other non-graphical things are built on top of it (clipboard, drag and drop). Only listed in here for completeness, and as an introduction. I’ll try and post about the entire X Window System, X11 and all its strange design decisions later.
X11
The wire protocol used by the X Window System
Xlib
The reference implementation of the client side of the system, and a host of tons of other utilities to manage windows on the X Window System. Used by toolkits with support for X, like GTK+ and Qt. Vanishingly rare to see in applications today.
XCB
Sometimes quoted as an alternative to Xlib. It implements a large amount of the X11 protocol. Its API is at a much lower level than Xlib, such that Xlib is actually built on XCB nowadays. Only mentioning it because it’s another acronym.
Xorg
The reference implementation of the server side of the system.
As I’ll try to be very careful to label something correctly. If I say “the X server”, I’m talking about a generic X server: it may be Xorg, it may be Apple’s X server implementation, it may be Kdrive. We don’t know. If I say “X11″, or the “X Window System”, I’m talking about the design of the protocol or system overall. If I say “Xorg”, that means that it’s an implementation detail of Xorg, which is the most used X server, and may not apply to any other X servers at all. If I ever say “X” by itself, it’s a bug.
X11, the protocol, was designed to be extensible, which means that support for new features can be added without creating a new protocol and breaking existing old clients. As an example, xeyes and oclock get their fancy shapes because of the Shape Extension, which provide support for non-rectangular windows. If you’re curious how this magic functionality can just appear out of nowhere, the answer is that it doesn’t: support for the extension has to be added to both the server and client before it can be used. There is functionality in the core protocol itself so that clients can ask the server what extensions it has support for, so it knows what functionality it can or cannot use.

X11 was also designed to be “network transparent”. Most importantly it means that we cannot rely on the X server and any X client being on the same machine, so any talking between the two must go over the network. In actuality, a modern desktop environment does not work out of the box in this scenario, as a lot of inter-process communication goes through systems other than X11, like DBus. Over the network, it’s quite chatty, and results in a lot of traffic. When the server and client are on the same machine, instead of going over the network, they’ll go over a UNIX socket, and the kernel doesn’t have to copy data around.
We’ll get back to the X Window System and its numerous extensions in a little bit.

cairo

cairo is a drawing library used either by applications like Firefox directly, or through libraries like GTK+, to draw vector shapes. GTK+3′s drawing model is built entirely on cairo. If you’ve ever used an HTML5 <canvas>, cairo implements pratically the same API. Although <canvas> was originally developed by Apple, the vector drawing model is well-known, as it’s the PostScript vector drawing model, which has found support in other vector graphics technologies and standards such as PDF, Flash, SVG, Direct2D, Quartz 2D, OpenVG, and lots more than I can possibly give an exhaustive list for.

cairo has support to draw to X11 surfaces through the Xlib backend.

cairo has been used in toolkits like GTK+. Functionality was added in GTK+ 2 to optionally use cairo in GTK+ 2.8. The drawing model in GTK+3 requires cairo.

XRender Extension

X11 has a special extension, XRender, which adds support for anti-aliased drawing primitives (X11′s existing graphics were aliased), gradients, matrix transforms and more. The original intention was that drivers could have specialized accelerated code paths for doing specific drawing. Unfortunately, it seems to be the case that software rasterization is just as fast, for unintuitive reasons. Oh well. XRender deals in aligned trapezoids – rectangles with an optional slant to the left and right edges. Carl Worth and Keith Packard came up with a “fast” software rasterization method for trapezoids. Trapezoids are also super easy to decompose into two triangles, to align ourselves with fast hardware rendering. Cairo includes a wonderful show-traps utility that might give you a bit of insight into the tesselation into trapezoids it does.

Here’s a simple red circle we drew. This is decomposed into two sets of trapezoids – one for the stroke, and one for the fill. Since the diagrams that show-traps gives you by default aren’t very enlightening, I hacked up the utility to give each trapezoid a unique color. Here’s the set of trapezoids for the black stroke.

Psychedelic.

pixman

Both the X server and cairo need to do pixel level manipulation at some point. cairo and Xorg had separate implementations of things like basic rasterization algorithms, pixel-level access for certain kinds of buffers (ARGB32, RGB24, RGB565), gradients, matrices, and a lot more. Now, both the X server and cairo share a low-level library called pixman, which handles these things for it. pixman is not supposed to be a public API, nor is it a drawing API. It’s not really any API at all; it’s just a solution to some code duplication between various parts.

OpenGL, mesa, gallium

Now comes the fun part: modern hardware acceleration. I assume everybody already knows what OpenGL is. It’s not a library, there will never be one set of sources to a libGL.so. Each vendor is supposed to provide its own libGL.so. nVidia provides its own implementation of OpenGL and ships its own libGL.so, based on its implementations for Windows and OS X.

If you are running open-source drivers, your libGL.so implementation probably comes from mesa. mesa is many things, but one of the major things it provides that it is most famous for is its OpenGL implementation. It is an open-source implementation of the OpenGL API. mesa itself has multiple backends for which it provides support. It has three CPU-based implementations: swrast (outdated and old, do not use it), softpipe (slow), llvmpipe (potentially fast). mesa also has hardware-specific drivers. Intel supports mesa and has built a number of drivers for their chipsets which are shipped inside mesa. The radeon and nouveau drivers are also supported in mesa, but are built on a different architecture: gallium.

gallium isn’t really anything magical. It’s a set of components to make implementing drivers a lot easier. The idea is that there are state trackers that implement some form of API (OpenGL, GLSL, Direct3D), transform that state to an intermediate representation (known as Tungsten Graphics Shader Infrastructure, or TGSI), and then the backends take that intermediate representation and convert it to the operations that would be consumed by the hardware itself.

Sadly, the Intel drivers don’t use Gallium. My coworkers tell me it’s because the Intel driver developers do not like having a layer between Mesa and their driver.

A quick aside: more acronyms

Since there’s a lot of confusing acronyms to cover, and I don’t want to give them each an H3 and write a paragraph for each, I’m just going to list them here. Most of them don’t really matter in today’s world, they’re just an easy reference so you don’t get confused.
GLES
OpenGL has several profiles for different form factors. GLES is one of them, standing for “GL Embedded System” or “GL Embedded Subset”, depending on who you ask. It’s the latest approach to target the embedded market. The iPhone supports GLES 2.0.
GLX
OpenGL has no concept of platform and window systems on its own. Thus, bindings are needed to translate between the differences of OpenGL and something like X11. For instance, putting an OpenGL scene inside an X11 window. GLX is this glue.
WGL
See above, but replace “X11″ with “Windows”, that is, that one Microsoft Operating System.
EGL
EGL and GLES are often confused. EGL is a new platform-agnostic API, developed by Khronos Group (the same group that develops and standardizes OpenGL) that provides facilities to get an OpenGL scene up and running on a platform. Like OpenGL, this is vendor-implemented; it’s an alternative to bindings like WGL/GLX and not just a library on top of them, like GLUT.
fglrx
fglrx is former name for AMD’s proprietary Xorg OpenGL driver, now known as “Catalyst”. It stands for “FireGL and Radeon for X”. Since it is a proprietary driver, it has its own implemnetation of libGL.so. I do not know if it is based on mesa. I’m only mentioning it because it’s sometimes confused with generic technology like AIGLX or GLX, due to the appearance of the letters “GL” and “X”.
DIX, DDX
The X graphics parts of Xorg is made up of two major parts, DIX, the “Driver Independent X” subsystem, and DDX, the “Driver Dependent X” subsystem. When we talk about an Xorg driver, the more technically accurate term is a DDX driver.

Xorg Drivers, DRM, DRI

A little while back I mentioned that Xorg has the ability to do accelerated rendering, based on specific pieces of hardware. I’ll also say that this is not implemented by translating from X11 drawing commands into OpenGL calls. If the drivers are implemented in mesa land, how can this work without making Xorg dependent on mesa?

The answer was to create a new piece of infrastructure to be shared between mesa and Xorg. mesa implements the OpenGL parts, Xorg implements the X11 drawing parts, and they both convert to a set of card-specific commands. These commands are then uploaded to the kernel, using something called the “Direct Rendering Manager”, or DRM. libdrm uses a set of generic, private ioctls with the kernel to allocate things on the card, and stuffs the commands and textures and things it needs in there. This ioctl interface comes in two forms: Intel’s GEM, and Tungsten Graphics’s TTM. There is no good distinction between them; they both do the same thing, they’re just different competing implementation. Historically, GEM was designed and proudly announced to be a simpler alternative to TTM, but over time, it has quietly grown to about the same complexity as TTM. Welp.

This means that when you run something like glxgears, it loads mesa. mesa itself loads libdrm, and that talks to the kernel driver directly using GEM/TTM. Yes, glxgears talks to the kernel driver directly to show you some spinning gears, and sternly remind you of the benchmarking contents of said utility.

If you poke in ls /usr/lib64/libdrm_*, you’ll note that there are hardware-specific drivers. For cases when GEM/TTM aren’t enough, the mesa and X server drivers will have a set of private ioctls to talk to the kernel, which are encapsulated in here. libdrm itself doesn’t actually load these.

The X server needs to know what’s happening here, though, so it can do things like synchronization. This synchronization between your glxgears, the kernel, and the X server is called DRI, or more accurately, DRI2. “DRI” stands for “Direct Rendering Infrastructure”, but it’s sort of a strange acronym. “DRI” refers to both the project that glued mesa and Xorg together (introducing DRM and a bunch of the things I talk about in this article), as well as the DRI protocol and library. DRI 1 wasn’t really that good, so we threw it out and replaced it with DRI 2.

KMS

As a sort of aside, let’s say you’re working on a new X server, or maybe you want to show graphics on a VT without using an X server. How do you do it? You have to configure the actual hardware to be able to put up graphics. Inside of libdrm and the kernel, there’s a special subsystem that does exactly that, called KMS, which stands for “Kernel Mode Setting”. Again, through a set of ioctls, it’s possible to set up a graphics mode, map a framebuffer, and so on, to display directly on a TTY. Before, there were (and still are) hardware-specific ioctls, so a shared library called libkms was created to give a shared API. Eventually, there was a new API at the kernel level, literally called the “dumb ioctls”. With the new dumb ioctls in place, it is recommended to use those and not libkms.

While it’s very low-level, it’s entirely possible to do. Plymouth, the boot splash screen integrated into modern distributions, is a good example of a very simple application that does this to set up graphics without relying on an X server.

The “Expose” model, Redirection, TFP, Compositing, AIGLX

I’ve used the term “compositing window manager” without really describing what it means to composite, or what a window manager does. You see, back in the 80s when the X Window System was designed on UNIX systems, a lot of random other companies like HP, Digital Equipment Corp., Sun Microsystems, SGI, were also developing products based on the X Window System. X11 intentionally didn’t mandate any basic policy on how windows were to be controlled, and delegated that responsibility to a separate process called the “window manager”.

As an example, the popular environment at the time, CDE, had a system called “focus follows mouse”, which focused windows when the user moved their mouse over the window itself. This is different from the more popular model that Windows and Mac OS X use by default, “click to focus”.

As window managers started to become more and more complex, documents started to appear describing interoperability between the many different environments. It, too, wouldn’t really mandate any policy either like “Click to Focus” either.

Additionally, back in the 80s, many systems did not have much memory. They could not store the entire pixel contents of all window contents. Windows and X11 solve this issue in the same way: each X11 window should be lossy. Namely, a program will be notified that a window has been “exposed”.

Imagine a set of windows like this. Now let’s say the user drags GIMP away:

The area in the dark gray has been exposed. An ExposeEvent will get sent to the program that owns the window, and it will have to redraw contents. This is why hung programs in versions of Windows or Linux would go blank after you dragged a window over them. Consider the fact that in Windows, the desktop itself is just another program without any special privileges, and can hang like all the others, and you have one hell of a bug report.

So, now that machines have as much memory as they do, we have the opportunity to make X11 windows lossless, by a mechanism called redirection. When we redirect a window, the X server will create backing pixmaps for each window, instead of drawing directly to the backbuffer. This means that the window will be hidden entirely. Something else has to take the opportunity to display the pixels in the memory buffer.

The composite extension allows a compositing window manager, or “compositor”, to set up something called the Composite Overlay Window, or COW. The compositor owns the COW, and can paint to it. When you run Compiz or GNOME Shell, these programs are using OpenGL to display the redirected windows on the screen. The X server can give them the window contents by a GL extension, “Texture from Pixmap“, or TFP. It lets an OpenGL program use an X11 Pixmap as if it were an OpenGL Texture.

Compositing window managers don’t have to use TFP or OpenGL, per se, it’s just the easiest way to do so. They could, if they wanted to, draw the window pixmaps onto the COW normally. I’ve been told that kwin4 uses Qt directly to composite windows.

Compositing window managers grab the pixmap from the X server using TFP, and then render it on to the OpenGL scene at just the right place, giving the illusion that the thing that you think you’re clicking on is the actual X11 window. It may sound silly to describe this as an illusion, but play around with GNOME Shell and adjust the size or position of the window actors (Enter global.get_window_actors().forEach(function(w) { w.scale_x = w.scale_y = 0.5; }) in the looking glass), and you’ll quickly see the illusion break down in front of you, as you realize that when you click, you’re poking straight through the video player, and to the actual window underneath (Change 0.5 to 1.0 in the above snippet to revert the behavior).

With this information, let’s explain one more acronym: AIGLX. AIGLX stands for “Accelerated Indirect GLX”. As X11 is a networked protocol, this means that OpenGL should have to work over the network. When OpenGL is being used over the network, this is called an “indirect context”, versus a “direct context” where things are on the same machine. The network protocol used in an “indirect context’ is fairly incomplete and unstable.

To understand the design decision behind AIGLX, you have to understand the problem that it was trying to solve: making compositing window managers like Compiz fast. While nvidia’s proprietary driver had kernel-level memory manangement through a custom interface, the open-source stack at this point hadn’t achieved that yet. Pulling a window texture from the X server into the graphics hardware would have meant that it would have to be copied every time the window was updated. Slow. As such, AIGLX was a temporary hack to implement OpenGL in software, preventing the copy into hardware acceleration. As the scene that compositors like Compiz used wasn’t very complex, it worked well enough.

Despite all the fanfare and Phoronix articles, AIGLX hasn’t been used realistically for a while, as we now have the entire DRI stack which can be used to implement TFP without a copy.

As you can imagine, copying (or more accurately, sampling) the window texture contents so that it can be painted as an OpenGL texture requires copying data. As such, most window managers have a feature to turn redirection off for a window that’s full-screen. It may sound a bit silly to describe this as unredirection, as that’s the initial state a window is in. But while it may be the initial state for a window, with our modern Linux desktops, it’s hardly the usual state. The logic here is that if a window would be covering the COW anyway and compositing features aren’t necessary, it can safely be unredirected. This feature is designed to give high performance to programs like games, which need to run with high performance at 60 frames per second.

Wayland

As you can see, we’ve split out quite a large bit of the original infrastructure from X’s initial monolithic behavior. This isn’t the only place where we’ve tore down the monolithic parts of X: a lot of the input device handling has moved into the kernel with evdev, and things like device hotplug support has been moved back into udev.

A large reason that the X Window System stuck around for now was just because it was a lot of effort to replace it. With Xorg stripped down from what it initially was, and with a large amount of functionality required for a modern desktop environment provided solely by extensions, well, how can I say this, X is overdue.

Enter Wayland. Wayland reuses a lot of existing infrastructure that we’ve built up. One of the most controversial things about it is that it lacks any sort of network transparency or drawing protocol. X’s network transparency falls flat in modern times. A large amount of Linux features are hosted in places like DBus, not X, and it’s a shame to see things like Drag and Drop and Clipboard support being by and large hacks with the X Window System solely for network support.

Wayland can use almost the entire stack as detailed above to get a framebuffer on your monitor up and running. Wayland still has a protocol, but it’s based around UNIX sockets and local resources. The biggest drastic change is that there is no /usr/bin/wayland binary running like there is a /usr/bin/Xorg. Instead, Wayland follows the modern desktop’s advice and moves all of this into the window manager process instead. These window managers, more accurately called “compositors” in Wayland terms, are actually in charge of pulling events from the kernel with a system like evdev, setting up a frame buffer using KMS and DRM, and displaying windows on the screen with whatever drawing stack they want, including OpenGL. While this may sound like a lot of code, since these subsystems have moved elsewhere, code to do all of these things would probably be on the order of 2000-3000 SLOC. Consider that the portion of mutter just to implement a sane window focus and stacking policy and synchronize it with the X server is around 4000-5000 SLOC, and maybe you’ll understand my fascination a bit more.

While Wayland does have a library that implementations of both clients and compositors probably should use, it’s simply a reference implementation of the specified Wayland protocol. Somebody could write a Wayland compositor entirely in Python or Ruby and implement the protocol in pure Python, without the help of a libwayland.

Wayland clients talk to the compositor and request a buffer. The compositor will hand them back a buffer that they can draw into, using OpenGL, cairo, or whatever. The compositor is at the discretion to do whatever it wants with that buffer – display it normally because it’s awesome, set it on fire because the application is being annoying, or spin it on a cube because we need more YouTube videos of Linux cube spinning.

The compositor is also in control of input and event handling. If you tried out the thing with setting the scale of the windows in GNOME Shell above, you may have been confused at first, and then figured out that your mouse corresponded to the untransformed window. This is because we weren’t *actually* affecting the X11 window itself, just changing how it gets displayed. The X server keeps track of where windows are, and it’s up to the compositing window manager to display them where the X server thinks it is, otherwise, confusion happens.

Since a Wayland compositor is in charge of reading from evdev and giving windows events, it probably has a much better idea of where a window is, and can do the transformations internally, meaning that not only can we spin windows on a cube temporarily, we will be able to interact with windows on a cube.

Summary

I still hear a lot today that Xorg is very monolithic in its implementation. While this is very true, it’s less true than it was a long while ago. This isn’t due to the incompetence on the part of Xorg developers, a large amount of this is due to baggage that we just have to support, like the hardware-accelerated XRender protocol, or going back even further, non-anti-aliased drawing commands like XPolyFill. While it’s very apparent that X is going to go away in favor of Wayland some time soon, I want to make it clear that a lot of this is happening with the acknowledgement and help of the Xorg and desktop developers. They’re not stubborn, and they’re not incompetent. Hell, for dealing with and implementing a 30-year-old protocol plus history, they’re doing an excellent job, especially with the new architecture.
I also want to give a big shout-out to everybody who worked on the stuff I mentioned in this article, and also want to give my personal thanks to Owen Taylor, Ray Strode and Adam Jackson for being extremely patient and answering all my dumb questions, and to Dave Airlie and Adam Jackson for helping me technically review this article.
While I went into some level of detail in each of these pieces, there’s a lot more here where you could study in a lot more detail if it interests you. To pick just a few examples, you could study the the geometry algorithms and theories that cairo exploits to convert arbitrary shapes to trapezoids. Or maybe the fast software rendering algorithm for trapezoids by Carl Worth and Keith Packard and investigate why it’s fast. Consider looking at the design of DRI2, and how it differs from DRI1. Or maybe you’re interested in the hardware itself, and looking at graphics card architecture, and looking at the data sheets to see how you would program one. And if you want to help out in any of these areas, I assume all the projects listed above would be more than happy to have contributions.
I’m planning on writing more of these in the future. A large amount of the stacks used in the Linux and GNOME community today don’t have a good overview document detailing them from a very high level.

Version History

  • Published
  • Converted CSS-based diagrams to images to make it easier for Planet GNOME readers
  • Fixed Looking Glass example line
  • Fixed TFP link
  • Modified the tone of the policy of window managers section to better convey the point
  • Corrected information about GTK+ and cairo integration (GTK+ 2.8, not “near the end of the cycle”)
  • Fixed acronym expansion for “fglrx”
(sumber: http://blog.mecheye.net/2012/06/the-linux-graphics-stack/)

Good riddance, PayPal

Over the years, I’ve heard countless tales of PayPal screwing over my friends who choose to sell products, services, or tickets through their system (UPDATE: how timely — now it looks like Andy has got his account frozen, too). I’ve read numerous horror stories about what happens when PayPal’s staff blindly follow their draconian rules without applying common sense; I’ve seen whole conferences cancelled thanks to PayPal’s unforgivable treatment of event organisers; I’ve watched from the sidelines as my friend Johno battled to keep Codex magazine afloat after PayPal applied ruthless account freezes. And concurrently, I’ve suffered my own problems: from the very first day 8 Faces #1 was launched, I was hit with PayPal’s idiocy time and time again. By and large, I got off lucky with only temporary holds on my money, until yesterday, when a 100% freeze was applied to my account.

Fortunately for me but unfortunately for PayPal, I’d already been planning my exit strategy and today, after over two years of being treated like dirt by a company whose entire revenue stream depends upon business from people like me, I’m happy to be taking that business elsewhere.

So why such vehemence for PayPal? Am I just another seller bemoaning my punishment for pre-selling a product when PayPal clearly states that pre-sales are something they discourage? Well, no. When people ask me what exactly I have against PayPal, I say the same thing every single time:
PayPal have all the power of a bank and yet none of the responsibility.
And really it all comes down to that. If PayPal want to hold your money, they can, and they will. A freeze on your account means you absolutely cannot get at your own money, and even if you eventually do, it will only be after a hefty delay and in staggered percentages. Can a bank do this to you? No, they can’t. So why should PayPal?

A brief history of fuckwittery

Let’s back-track a little. I want to briefly describe my history with PayPal, from launching 8 Faces through to the present day. Other legitimate sellers out there will recognise most — if not all — of these activities:
  • When the first issue launched and sold out in two hours, it caused a large spike for a previously-quiet account and it set off all the alarm bells at PayPal. This was completely understandable, of course, so I didn’t hold it against them when they placed a temporary freeze on my account. However, after getting stuck in an endless automated phone call loop (good luck ever speaking to a human at PayPal unless they call you), I became less sympathetic. Luckily for me, I knew someone who worked at their head offices at the time and he was able to escalate the case for me. The freeze was lifted and all was well with the world, but only because I had that man on the inside. Who knows if it would have ever been resolved otherwise?
  • After this initial contact, PayPal’s EU Office of Executive Escalations encouraged me to email a dedicated address just before I put every issue on sale to warn them of a spike. I was grateful for the dedicated contact, but is making money really such a suspicious activity?
  • The next couple of years went by with several smaller — but still infuriating — issues sparked by PayPal’s paranoia. I was frequently asked to provide information I couldn’t ever hope to conjure up, like postal delivery receipts for — wait for it — PDF copies of the magazine. Yes, you read that right. Various transactions were reversed (often without the actual customer’s knowledge) and in the process, PayPal took back not just the cost of the item, but also an ‘administration fee’ that cost more than the magazine itself. As an extra display of their woeful ineptitude, I’ve had an alert for an ‘open case requiring [my] action’ for the last year or so… even though there is quite. Clearly. Nothing. There.
  • So, lots of general annoyance, but nothing as bad as what so many of my friends were going through. Until yesterday.

The dreaded freeze

In all honesty, I knew a freeze had to be coming. I received a phone call from PayPal last week, during which I answered several questions about the nature of my business, such as the price, frequency, circulation, and delivery of each issue. The lady on the phone was polite, but clearly interested in the space of time between orders being placed and magazines being shipped: it was obvious she was dubious about whether or not my customers’ orders were technically pre-sales, which is what scares PayPal so much, and is the reason for their paranoia surrounding conference tickets. I knew this, which was why I’d intentionally been closing the gap between orders and shipment: issue 5 was being printed while we opened the shop and is being shipped this week. I also explained to her that technically it wasn’t a pre-sale, since every single customer receives an automatically-generated link to the PDF edition with their order receipt. She made lots of positive ‘mmmm’ sounds and said ‘that’s good’ a lot, but when she said that they’d be in touch again in a few days once they’d concluded their inspection of my account, I wasn’t holding out too much hope.

After a day or two, I decided to transfer the balance of the account to my bank, which at the time was a pretty substantial, five-figure sum. I half-expected the request to be denied, but to my pleasant surprise the money cleared in my bank account a couple of days later.

And thank god I made that withdrawal when I did, because yesterday came the second phone call, informing me that a reserve would indeed be placed on my account. At the time I didn’t mind, because I do appreciate that PayPal have to protect themselves from fraudulent sellers, and I was told that I’d have staggered access to percentages of my funds after 7, 10, and 30 days. It sucked, of course, but it wasn’t completely unreasonable.

What was completely unreasonable was the email the followed our phone call: an email that stated that the reserve on my account was for 100% of the funds, and that the staggered releases would only start once the balance reached… £15,000.

Yep, fifteen thousand pounds.

Where had this figure come from? On the phone call, I had been asked what the approximate revenue was per issue and had said around £15,000, but as I’d just made a large withdrawal fairly close to that and the initial spike of sales was over, there was no way the account balance would get anywhere near £15,000 until the next issue’s release in November. Worse still, it effectively meant that all of my sales between now and then — PDF editions of the current issue and our four back issues — were being subjected to the freeze, even though those orders offered immediate digital deliveries and were absolutely not pre-sales. I explained this in a reply, but PayPal’s response was simply that the reserve would remain. Again: no common sense applied; no consideration whatsoever for the type of product being sold; just a generic, blanket response.

Enter: the merchant account

Fortunately, as I said at the beginning, I’d been planning my exit strategy for a while. When Keir and I started Viewport Industries at the end of last year, we were determined not to use PayPal, given the many issues I outlined above. Instead, we chose to do things the truly professional way and get our own merchant account from HSBC, our business’ bank. Combined with Shopify for the e-commerce front-end and Cardstream for processing the payments and gluing the whole thing together, we’ve had a pretty robust system ready to go for quite some time, and we quietly rolled it out a few weeks ago for anyone who wanted to get some Insites: The Tour coasters. (We wrote about our ‘holy trinity’ payment set-up in length for issue #228 of .Net magazine, and they’ve since republished the article online.)

I’d been toying with the idea of using VI’s e-commerce set-up to sell 8 Faces, but had never made any serious moves to switch over. Until, of course, PayPal put a freeze on my account and gave me the best reason in the world. Thanks, guys.

So, if you buy anything from 8faces.com from today going forward, your payment will be processed by Viewport Industries Ltd. and will be displayed as such on your bank or card statement. We still accept all major credit and debit cards, so it should make absolutely no difference to customers whatsoever, unless of course you like to pay by PayPal because you treat account like a slush fund: sorry, you’re going to have to put your card details in. The switch also means we can now take payments from countries who don’t have access to PayPal, so if anything, this is actually far better for customers, and it’s certainly better for me and my business from an accounting point of view.

Most importantly, it means that I can finally leave PayPal behind. Sadly, I expect I’ll have to battle to withdraw the £600 or so that’s still sitting in my account, but hey, PayPal have been sued before for withholding sellers’ money and I’ll take them to court if I have to. Is it worth it for £600? No, but it might be to make a point.

My decision to quit PayPal means they’ll lose fees on annual sales of about £40,000, if you combine the magazine, the prints, and a few other things I had — until today — put through their utterly abysmal service. I’m sure that’s a drop in the ocean for them, but if you’re a seller with a decent turnover, I would urge you to take your business elsewhere, too, whether that’s to an alternative provider, or to your own merchant account environment (don’t be daunted by the scary paperwork — it really isn’t that hard to set up).

Perhaps a mass-exodus of sellers would be enough to make this clueless company wake up.

From my experience and that of others who’ve suffered the same, it’s clear that PayPal are interested in buyers, not sellers. Why else would they provide customers with refunds at the drop of a hat, but withhold money amounting to thousands — literally thousands and thousands and thousands — from buyers without any valid reason, when not even your bank is legally allowed do that? (I’ve expanded on this point in this comment.)

PayPal, you are the scourge of the internet. Fuck you.

(sumber: http://elliotjaystocks.com/blog/good-riddance-paypal/)

Made in the UK!

There’s a little bit of news about what’s new with the Rev2 board design we posted about yesterday that we saved for today.

Rev 2 board
Look carefully (click to enlarge). Alongside the obvious differences like the mounting holes, there are a few words along the short side on the right you might want to read. Many thanks to makeamillion.de (Homwer on our forums), who got his hands on this when the news was still embargoed but kept quiet about it - and took this very fine photo for us.

If you’ve been following us for a while, you’ll remember the time last year when we had to make the decision to manufacture the Raspberry Pi in China. The Raspberry Pi is a British enterprise, and as well as improving things in the computing industry’s future here by educating kids, we wanted to improve things in the present too, by actually doing our manufacture here in the UK.

Last year, when nobody had heard of the Raspberry Pi, we had been unable to find a British manufacturer whose prices per unit (especially at a point where we were thinking of sales in the tens of thousands, not the hundreds of thousands you’re seeing now) would work for us, and who believed that the project would be enough of a success for them to risk line space for us. There was just no way to make the Raspberry Pi in the UK and keep the price at $25 for the Model A (which will be released before the end of the year at the promised price) and $35 for the Model B.

Happily, things change.

Back at the beginning of April, Eben and I paid a visit to Sony’s UK manufacturing plant in Pencoed, South Wales. Several meetings, a factory tour, a lot of phone calls, some PowerPoint and sandwiches, and an up-close-and-personal with a wave soldering machine later, we were able to introduce our manufacturing and distributing partners to Sony’s Welsh facility, where, as well as making Sony products, Sony’s team undertakes contract electronic manufacture (CEM). It’s an incredibly impressive affair; the quietest, pleasantest plant I’ve ever been in, all comfortable lighting, ergonomic workspaces, cool air and relaxed staff. Sony’s quality control system is legendary, their ability to manufacture fast and cleanly is superb, and they’ve already invested in adding PoP (Package on Package – the fiddly stuff where the Broadcom chip at the heart of the Raspberry Pi is stacked beneath the RAM chip) hardware manufacture ability and expansion capability just for us. They’re also able to take on the huge task (currently undertaken by RS and Farnell) of ensuring the parts used are sourced ethically and to the highest ecological standards – every component has to pass standard compliance via Sony’s Green Management programme.

The upshot of all this? Element14/Premier Farnell have made the decision to move the bulk of their Raspberry Pi manufacture to South Wales. Moving manufacture like this is an enormous undertaking; from the start of the process, it’s taken us (especially Pete), Farnell and Sony nearly six months to get all our respective ducks in a row. The initial contract will see the Pencoed plant producing 30,000 Raspberry Pis a month, and creating around 30 new jobs.

How do you know if you’ve got a UK-made board? Easy. Look next to the power jack; you’ll see the words “Made in the UK”. We couldn’t be prouder.

(sumber: http://www.raspberrypi.org/archives/1925)

Amazon Officially Announces The New Kindle Paperwhite: “Paperwhite” Display, Frontlighting, 8 Week Battery, And 212 PPI

l14rW


There’s plenty to talk about here at Amazon’s Los Angeles press conference. The Kindle Fire 2 is obviously a hot topic of discussion, but lest you forget the product that started it all: The Kindle. As expected, new models of the E-Ink ereader have been officially announced, and one (the Kindle Paperwhite) follows in the steps of Barnes & Noble’s Nook with Glow.

The new Kindle Paperwhite features frontlighting for the very first time, allowing readers to enjoy their Twilight fan fiction in the dark, perhaps sleeping next to their partner without disturbing them. It will also come with a “Paperwhite” display, which offers more contrast and brightness.

The location of the USB port and power switch haven’t changed much from previous generations of the device, but the design language has. There is no longer a home button at the bottom, and the casing has gone from light to dark grey — nearly black.

The display has 62 percent more pixels, and it’s super sharp with excellent contrast. It’s 9.1mm thin, with a very thin bezel, and you can adjust the level (25 in total) of the display with your finger. A new feature called “Time to Read” offers a glimpse at how long it’ll take you to get to the next chapter. Biographies are available for characters in books from the Amazon store, as well as author info, bios and lists of works. The Paperwhite also boasts 8-week battery life, even with the light on.

The basic Kindle Paperwhite is $119, can be ordered today on Amazon.com and ships Oct. 1. The $179 model includes 3G for free free, and it’s available in over 100 countries worldwide.

(sumber: http://techcrunch.com/2012/09/06/amazon-officially-announces-the-new-kindle-paperwhite-paperwhite-display-frontlighting-and-212-ppi/)

Treading dangerously, companies rush into BYOD without considering mobile security

Usually when the discussion of BYOD (bring your own device) is brought up in the workplace, potential security issues are one of the first things to be discussed. After all, if key business data, which can be something as simple as an executive's calendar or a confidential contact list, is on a smartphone that gets lost or stolen, there could be significant consequences if it falls into the hands of a competitor.

In some industries, there are expensive consequences. In healthcare, for example, lapses in security that expose patient data can net hefty fines. Earlier this year, for example, Blue Cross Blue Shield of Tennessee  finalized a settlement with the Department of Health and Human Services for $1.5 million for a recent breach (on top of a $17 million price tag for the investigation and remediation actions).

That makes it all the more shocking to read this press release from OnForce, a company that matches businesses and individuals with technology professionals and consulting firms. Accord to a recent report, IT professionals working in the BYOD field have noticed a steady uptick in requests related to person devices and BYOD setups. That's not surprising considering how commonplace BYOD is becoming.

The surprising and disturbing bit is that these technicians are not seeing a comparable increase in the number of businesses that are interested in configuring mobile security and/or setting up a mobile management strategy or solution. The result, according to OnForce, seems to be companies embracing the freedom of BYOD deployments without securing the devices, apps, or data involved. If OnForce's survey results are accurate, there could be hundreds or even thousands of companies out there at extreme risk of data or privacy breaches.

That said, the report should be taken with a grain or two of salt. OnForce essentially delivers on-demand technology outsourcing. That means that its clients may have no internal IT department or may have minimal technology resources. If that's the case, then its reasonable to assume that they may simply not know to ask about security options or mobile management.

OnForce does quote Gene Morris, general manager at BrightStar Enterprise Solutions - one of the companies that works with OnForce clients - as saying that his company attempts to educate clients about security risks while configuring personally-owned devices.
"I help businesses connect and configure personal mobile devices, and at the same time consult with them about the security risks. As BYOD continues to infiltrate the business environment, we do anticipate a significant uptick in mobile security implementations in the next 8-12 months."

Even with that caveat, it's sobering to think about the potential damage that could be done to any company as a result of a mobile data breach. To know that some businesses are taking a cavalier attitude to those dangers is a rather unsettling thing to consider.

(sumber: http://www.citeworld.com/security/20586/treading-dangerously-companies-rush-byod-without-considering-mobile-security?source=ctwincpt_cite_byod)

UK to decide on NASA hacker extradition by Oct. 16

The U.K.'s Home Office will decide by Oct. 16 whether to block the extradition to the U.S. of Gary McKinnon, who has admitted to hacking into U.S. government computers, McKinnon's attorney said on Thursday.

McKinnon, 46, of north London, was indicted in 2002 at the U.S. District Court in Virginia for hacking into 97 military and NASA computers between February 2001 and March 2002.

McKinnon's extradition, though approved by the British government in 2006, has been delayed by years of court reviews and legal maneuvering. His case stirred controversy over the fairness of the extradition treaty between the U.S. and U.K., although a legal review completed last October found it was not slanted against British defendants.

In 2010, Home Secretary Theresa May adjourned a judicial review of McKinnon's case that had been due to take place in the High Court. Since then, the U.K. government has been conducting an inquiry into McKinnon's medical record. He suffers from Asperger's syndrome, a neurological disorder related to autism characterized by deficiencies in social interaction, as well as depression.

If his extradition is approved the case will proceed to the U.K. High Court, which has scheduled hearings for Nov. 28 and 29, according to Karen Todner, McKinnon's lawyer.

McKinnon has admitted to hacking the computers but asked that his prosecution be conducted in the U.K. The Crown Prosecution Service has declined to prosecute, contending the U.S. wants jurisdiction and that most of the evidence is held by the U.S.

McKinnon, who went by the name "Solo," contends he was merely searching for proof that UFOs exist and that he didn't harm the systems he is accused of hacking. He used a program called "RemotelyAnywhere," a remote access tool, to access computers, many of which were protected by only default passwords.

The U.S. military alleges that McKinnon deleted critical files from its computers, causing up to US$800,000 in damages, and hampered its efforts after the Sept. 11, 2001, terrorist attacks.

(sumber: http://www.computerworld.com/s/article/9231015/UK_to_decide_on_NASA_hacker_extradition_by_Oct._16)