Skip to main content


Modificare il genere topologico di Piergiorgio O.

Perché il “teorema” di Odifreddi non regge. Con un’introduzione alla pratica matematica come attività intellettuale, corroborata da esempi…


The Weird Geonames Tour (the Bizzarrone edition)

I was chatting with friends about the weirdness of some village names in Lombardy and came up with a proposal for an *international* tour of some of them.

Malnate, Cantello, Ligurno, Stabio, Ligornetto, Genestrerio, Bizzarrone, Uggiate Trevano, Beregazzo con Figliaro, Castelnuovo Bozzente, Tradate, Torba, Gornate, Lozza, Gurone, Malnate.

An estimate made with OSRM would place it at some 50 km.

I'm not sure I'll ever do anything about it, but it looked like it was worth posting.

(Bizzarrone is the name of a border passing between Italy and Switzerland, and the settings of a series of sketches on the swiss TV, Frontaliers)


anarcat/blog/Managing good bug reports

Bug reporting is an art form that is too often neglected in software projects. Bug reports allow contributors to participate without deep technical knowledge and at the same time provide a crucial space for developers to be made aware of issues with their software that they could not have foreseen or found themselves, for lack of resources, variety...
Somebody needed to say that the famous “How To Ask Questions The Smart Way” is just not adequate to its task.


Tails - Why we need donations

Today we are starting a donation campaign to fund our work in 2017. Unlike most other tools on the Internet, Tails comes for free as in freedom. We are not selling your data, sending you targeted advertising, nor will ever sell our project to a big company. We give out Tails for free simply because everybody deserves to be protected from surveillance and censorship. But also because being free software is a necessary requirement for our tools to be safe, and protect you as intended. If our source code was closed, there would be no way of actually verifying that our software is trustworthy.


DVD-based Clean Room for PGP and PKI |

Back in April, I started discussing the PGP Clean Room idea (debian-devel discussion and gnupg-users discussion), created a wiki page and started development of a script to build the clean room ISO using live-build on Debian.

Keeping the master keys completely offline and putting subkeys onto smart cards and other devices dramatically lowers the risk of mistakes and security breaches. Using a read-only DVD to operate the clean-room makes it convenient and harder to tamper with.
#gnupg #crypto


Re: Is missing SysV-init support a bug?

systemd muddled this considerably because it's not only an init system
project, it's an operating system plumbing project whose contributors
are very excited to fix what they view as a wide variety of historical
warts and suboptimal solutions to a ton of various low-level plumbing
and integration issues. This is simultaneously exciting and scary.
(And I'm going to go out on a limb here and say that if you find it
only exciting, or if you find it only scary, you are not thinking
enough about it, are missing significant components of this effort, and
should really think about it some more until you can recognize both
halves of that reaction and why they both make sense.)


Gajim plugins packaged for Debian

Wolfgang Borgert started to package some of the available Gajim plugins for Debian. At the time of writing, the OMEMO, HTTP Upload and URL Image Preview plugins are available in testing and unstable. More plugins will follow.
/me is happy about this even if she doesn't use gajim because if the software is packaged, but to use you have to download plugins from 3rd parties, there *is* a problem.
Tobias 2 settimane fa
Maybe with the package for OMEMO it would work even for me. Tried to set it up, but it did not work at all.


Stretch Artwork Survey

This survery is to determine the default artwork for Debian Stretch. You can find the proposed artwork at: ...


Pubblicati i video dell'End Summer Camp

I video dell'End Summer Camp sono stati pubblicati:


@Gruppo Linux Como consiglio caldamente la visione di ESC1605 PANDA A New Development Attitude (sul divano, ma miraccomando niente pop corn a meno che non abbiate qualcuno accanto a salvarvi se vi va di traverso)


mjg59 | Microsoft aren't forcing Lenovo to block free operating systems

There's a story going round that Lenovo have signed an agreement with Microsoft that prevents installing free operating systems. This is sensationalist, untrue and distracts from a genuine problem.
@Gruppo Linux Como yet another reason why we may have problems installing linux on computers.


Horrible Facebook Algorithm Accident Results In Exposure To New Ideas

MENLO PARK, CA—Assuring users that the company’s entire team of engineers was working hard to make sure a glitch like this never happens again, Facebook executives confirmed during a press conference Tuesday that a horrible accident last night involving the website’s algorithm had resulted in thousands of users being exposed to new concepts.
Fabio 1 mese fa da Friendly


Candy from Strangers

A few days ago I gave a talk at ESC about some reasons why I think that using software and especially libraries from the packages of a community managed distribution is important and much better than alternatives such as pypi, nmp etc. This article is a translation of what I planned to say before forgetting bits of it and luckily adding it back as an answer to a question :)

When I was young, my parents taught me not to accept candy from strangers, unless they were present and approved of it, because there was a small risk of very bad things happening. It was of course a simplistic rule, but it had to be easy enough to follow for somebody who wasn't proficient (yet) in the subtleties of social interactions.

One of the reasons why it worked well was that following it wasn't a big burden: at home candy was plenty and actual offers were rare: I only remember missing one piece of candy because of it, and while it may have been a great one, the ones I could have at home were also good.

Contrary to candy, offers of gratis software from random strangers are quite common: from suspicious looking websites to legit and professional looking ones, to platforms that are explicitly designed to allow developers to publish their own software with little or no checks.

Just like candy, there is also a source of trusted software in the Linux distributions, especially those lead by a community: I mention mostly Debian because it's the one I know best, but the same principles apply to Fedora and, to some measure, to most of the other distributions. Like good parents, distributions can be wrong, and they do leave room for older children (and proficient users) to make their own choices, but still provide a safe default.

Among the unsafe sources there are many different cases and while they do share some of the risks, they have different targets with different issues; for brevity the scope of this article is limited to the ones that mostly concern software developers: language specific package managers and software distribution platforms like PyPi, npm and rubygems etc.

These platforms are extremely convenient both for the writers of libraries, who are enabled to publish their work with minor hassles, and for the people who use such libraries, because they provide an easy way to install and use an huge amount of code. They are of course also an excellent place for distributions to find new libraries to package and distribute, and this I agree is a good thing.

What I however believe is that getting code from such sources and using it without carefully checking it is even more risky than accepting candy from a random stranger on the street in an unfamiliar neighbourhood.

The risk aren't trivial: while you probably won't be taken as an hostage for ransom, your data could be, or your devices and the ones who run your programs could be used in some criminal act causing at least some monetary damage both to yourself and to society at large.

If you're writing code that should be maintained in time there are also other risks even when no malice is involved, because each package on these platform has a different policy with regards to updates, their backwards compatibility and what can be expected in case an old version is found to have security issues.

The very fact that everybody can publish anything on such platforms is both their biggest strength and their main source of vulnerability: while most of the people who publish their libraries do so with good intentions, attacks have been described and publicly tested, such as the fun typo-squatting one (" target="_blank">archived URL) that published harmless malicious code under common typos for famous libraries.

Contrast this with Debian, where everybody can contribute, but before they are allowed full unsupervised access to the archive they have to establish a relationship with the rest of the community, which includes meeting other developers in real life, at the very least to get their gpg keys signed.

This doesn't prevent malicious people from introducing software, but raises significantly the effort required to do so, and once caught people can usually be much more effectively prevented from repeating it than a simple ban on an online-only account can do.

It is true that not every Debian maintainer actually does a full code review of everything that they allow in the archive, and in some cases it would be unreasonable to expect it, but in most cases they are at least reasonably familiar with the code to do at least bug triage, and most importantly they are in an excellent position to establish a relationship of mutual trust with the upstream authors.

Additionally, package maintainers don't work in isolation: a growing number of packages are being maintained by a team of people, and most importantly there are aspects that involve potentially the whole community, from the fact that new packages that enter the distribution are publicity announced on a mailing list to the various distribution-wide QA efforts.

Going back to the language specific distribution platforms, sometimes even the people who manage the platform themselves can't be fully trusted to do the right thing: I believe everybody in the field remembers the npm fiasco where a lawyer letter requesting the removal of a package started a series of events that resulted in potentially breaking a huge amount of automated build systems.

Here some of the problems were caused by some technical policies that caused the whole ecosystem to be especially vulnerable, but one big issue was the fact that the managers of the npm platform are a private entity with no oversight from the user community.

Here not all distributions are equal, but contrast this with Debian, where the distribution is managed by a community that is based on a social contract and is governed via democratic procedures established in its constitution.

Additionally, the long history of the distribution model means that many issues have already been met, the errors have already been done, and there are established technical procedures to deal with them in a better way.

So, shouldn't we use language specific distribution platforms at all? No! As developers we aren't children, we are adults who have the skills to distinguish between safe and unsafe libraries just as well as the average distribution maintainer can do. What I believe we should do is stop treating them as a safe source that can be used blindly and reserve that status to actual trustful sources like Debian, falling back to the language specific platforms only when strictly needed, and in that case:

actually check carefully what we are using, both by reading the code and by analysing the development and community practices of the authors;
if possible, share that work by becoming ourselves maintainers of that library in our favourite distribution, to prevent duplication of effort and to give back to the community whose work we get advantage from.


Regenerating my laptop from scratch

* Old laptop.
* New, empty hard disk.
* One Debian basic installation (no gui, just ssh server and basics)
* (one dist-upgrade to stretch, because of course)
* One ansible command (and some waiting)
* One mr command (and even more waiting)

The result: a new shiny installation with almost¹ everything I need on a laptop, including the programs I usually use, my configuration files, my data and my projects.

No proper backup involved, no wasted storage on backupping OS files.

I will properly document what I've done (including how ansible is used to get the starting mr configuration, solving my bootstrapping issues), but right now I'm just celebrating the result.

¹ I still haven't completed the list of packages², and in some cases apt installing at need works probably best.

² but the essential ones are there, including vim, screen, wesnoth and widelands :D


mjg59 | Priorities in security

"Can a state-level actor break this" may be something we can legitimately write off. "Can a security expert continue reading their ex-partner's email" shouldn't be.


With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy: A Deep Dive

Microsoft had an ambitious goal with the launch of Windows 10: a billion devices running the software by the end of 2018. In its quest to reach that goal, the company aggressively pushed Windows 10 on its users and went so far as to offer free upgrades for a whole year. However, the company’s strategy for user adoption has trampled on essential aspects of modern computing: user choice and privacy. We think that’s wrong.


OpenStreetMap | mvexel's diary | Introducing OpenStreetView

After almost a year of thinking, development and testing, the OSM team at Telenav is ready to present OpenStreetView to all OSM mappers! OpenStreetview (OSV) is the free and open street level imagery platform designed 100% with OSM and mappers in mind.


Software Freedom Doesn't Kill People, Your Security Through Obscurity Kills People - Bradley M. Kuhn ( Brad ) ( bkuhn )

At least one person has already been killed in a crash while using a proprietary software auto-control system. Volkswagen decided to take a different route; they decided to kill us all slowly (rather than quickly) by using proprietary software to lie about their emissions and illegally polluting our air.


FSFE 15th Anniversary - FSFE

The FSFE is celebrating its 15th anniversary this year and we would like you to be part of it.