rpg.pbem.online

Search

Items tagged with: GNU

Purism’s Librem 5 phone starts shipping—a fully open GNU/Linux phone | Ars Technica

Purism, the maker of a line of built-for-Linux laptops, is now shipping a built-for-Linux smartphone. The company announced this week that the Librem 5 smartphone is now shipping to early backers of the crowdsourced, $699 smartphone project.
#technology #smartphone #Gnu #Linux #Librem
 

The big deception of #Ubuntu against #Debian


I have been using #GNU and #Linux since at least tenyears, my very first distro was Ubuntu Gutsy Gibbon, I still remember the sound of the drums at my very first installation, it was amazing and it was when I fell in love with the #floss. I was even more amazed by Hardy Heron, simply perfect in every shape. I used to have a #Gnome, #Compiz and a wonderful desktop that looked like a paper comics, super cool and super exciting, fortunately ten years later I still continue to be excited for any improvements.

However, back to these days, I learned about the meaning of #BDFL, and my flirt with Ubuntu started to crumble, actually the idea of community with on top a dictator, even if benevolent, didn't sound very exiting for me, never. This is the reason why I left Ubuntu to jump in Debian.

Debian is a true community of volunteers, it is the backbone of everything is #deb based, without Debian we would not have Ubuntu, #Mint, #Elementary, etc... Even if today Ubuntu might be build totally in upstream with Snap it will never have the same manpower and talents that Debian has. In ten years the main investment of Canonical/Ubuntu has been in marketing and PR. While #RedHat invests a lot of resources in engineers stuff Ubuntu invests the majority of its effort in marketing, and it really works

In lesser than four years Ubuntu become the OS leader in the #web #sever #market, a place historically belonged to Debian:
http://forums.debian.net/viewtopic.php?f=20&t=139372#p687205

Today Ubuntu is almost a leader in the Linux realm but is it really worth of this title?
Ubuntu stated to make a lot of improvements on itself however it reduces dramatically the amount of packages under its control and leaves the majority of them on the hands of the communities, that makes Ubuntu quite unsafe every time you grab a package outside the main repo.

I was saying Ubuntu patches and improves itself to be better than Debian, actually the latter is a collection of packages: it fixes bugs, it does the minimal and everything is almost 99% upstream. Because the premises Ubuntu must be better. Actually Ubuntu has a better installer however Debian support many more architectures, that means changing the installer to make it more friendly might be a worthless task if you are going to break something that actually works, Ubuntu has a better theme, Debian uses the one of free contributors it does not contract professionals. But is Ubuntu very much better than Debian? Is everything that Ubuntu does worthy?

If you are Debian user you do not need to read anything about it, but if you don't then apparently not!
**
A recent article by [b]Phoronix
mainly, based on giga ethernet test, shows how Debian constantly performs better than Ubuntu (which usually ships always a newer kernel than Debian). Someone can argue that this test is not indicative because it is strictly related to the hardware in use but if you read regularly the phoronix's article **always[/b] Debian performs better than Ubuntu.

Hence if every tweaks of Ubuntu to be better than Debian is actually ineffective, I can deducted that everything is basically vaporware just a marketing trick.

Today Canonical makes a lot of money with Ubuntu, you are free to use Ubuntu but is not better than Debian, it is not lead by true community, it is sponsored by a BDFL with a clear scope since the beginning. He did a lot of mistakes (Ubuntu Phone, Unity, etc...) but eventually he got what he was looking for. But the days when Ubuntu meant I can not install Debian are finished long time ago, today Ubuntu surpassed Debian in every field but not for technical reasons.

I will never be tired to repeat it: support only true community distributions of volunteers!


#floss #opensource
 

Wanna break free from #Google?


Here are some recommendations:
What did I missed? What is you favourite alternative? and why?
#freesoftware #foss #floss #open-source #opensource #linux #gnu-linux #fdroid #technoethical #mobile #software #privacy #surveillance #freedom
 

Wanna break free from #Google?


Here are some recommendations:
What did I missed? What is you favourite alternative? and why?
#freesoftware #foss #floss #open-source #opensource #linux #gnu-linux #fdroid #technoethical #mobile #software #privacy #surveillance #freedom
 
Image/Photo

Evita ser víctima de las puertas traseras universales de Intel y AMD


Solo usa computadoras certificadas por la Fundación del Software Libre

La "Maquina Gestora de Intel" (Intel Management Engine) es una #computadora #autónoma e #integrada en todos los procesadores #Intel de computadoras de #escritorio, #portátiles y #servidores desde el año 2006. Consiste en un #procesador ARC (remplazado por otro tipo en versiones más recientes), #almacenamiento temporal, un temporizador y un #interfaz de comunicación cifrado que está conectado a otros #componentes adicionales tales como una unidad #criptográfica, unidades de almacenamiento #ROM y #RAM internas y la función de acceso directo a la memoria ( #DMA ) del #sistema #operativo anfitrión, así como también posee la habilidad de #reservar un #sector de la #memoria RAM externa para expandir la memoria limitada de la #máquina #gestora. Por si fuera poco, esta #puerta #trasera también cuenta con acceso independiente a la red ( #Internet ) con su propia #dirección #MAC diferente a la del #dispositivo de #red.

El #funcionamiento de la máquina gestora sucede de la siguiente manera: el #programa de #arranque que reside en un #componente #interno de solo lectura carga un "manifiesto" desde el chip #SPI y dicho #manifiesto contiene una #firma #electrónica #criptográfica que varia entre #versiones de la máquina gestora. Si este manifiesto no contiene una firma electrónica válida de Intel (por ejemplo, por haber sido modificado), el dispositivo de arranque no funcionará ni ejecutará los #programas de arranque y esto a su vez causaría que el procesador de la computadora deje de funcionar.

La aplicación #AMT (Active Management Technology), parte de la serie Intel "vPro", es un servidor web que permite que las #agencias de #espionaje y #atacantes #remotos puedan #encender o #apagar el equipo y #acceder a toda la #información de la computadora: en pocas palabras, esto permite que los #espías remotos tomen el #control #total del equipo. Esto lo pueden hacer aún cuando la computadora esté #apagada por medio de la #funcionalidad de encendido por red local ( #Wake-on-LAN ). Aunque el flujo de datos envíado a las agencias de espionaje esté cifrado con #SSL / #TLS (¡vaya consuelo!), es bien sabido que estos #protocolos han tenido #vulnerabilidades muy bien #documentadas que ya han sido aprovechadas para desarrollar #rootkits, #keyloggers y así lograr el control #secreto de todas las #funciones de la computadora. El tener #acceso a todos los #datos de la memoria significa que las agencias de espionaje tienen acceso a todos los #archivos abiertos, a todas las #aplicaciones, a un #registro de todas las #teclas oprimidas, etc.

Las versiones 4.0 y posteriores de la máquina gestora de Intel incluyen una aplicación de #grilletes #digitales ( #DRM ) llamada “Protected Audio Video Path” (PAVP). La operación de estos grilletes digitales se lleva a cabo cuando la máquina gestora recibe la #señal de #audio y #video cifrada del sistema operativo #anfitrión, decifra su #clave y la envía al dispositivo de video ( #GPU ) el cual descifra la señal y la reproduce. De esta manera la aplicación #PAVP controla directamente que #gráficos aparecen en la #pantalla de una manera que el sistema operativo del #usuario no puede ni #controlar ni #detectar.

En las versiones 7.0 de la máquina gestora en procesadores de #segunda #generación de Intel #Core #i3 / #i5 / #i7, la aplicación PAVP ha sido remplazada con una aplicación similar de grilletes digitales llamada "Intel Insider". Estas aplicaciones de grilletes digitales, que además son Defectuosas por Diseño, demuestran las #habilidades #omnipotentes de la máquina gestora debido a que estos componentes y sus programas #privativos pueden acceder y controlar todo lo que se encuentra en la memoria del equipo y #espiar todo lo que aparece en pantalla. Al igual que en sus versiones anteriores, la máquina gestora puede #encender o #apagar el equipo, #leer todos los #archivos #abiertos, #examinar todas las #aplicaciones en ejecución, #registrar todas las teclas oprimidas y los #movimientos del #ratón e incluso #capturar y #controlar todo lo mostrado en pantalla. De la misma manera, su #interfaz de #red insegura permite que atacantes informáticos inyecten rootkits que pueden infectar el sistema por #completo y permitir que espías remotos puedan #vigilar todas las #actividades llevadas a cabo en la computadora. Esto representa una #grave #amenaza a tu #libertad, #seguridad y #privacidad que no puede ser #ignorada.

En versiones #anteriores a la 6.0, en sistemas del 2008 y 2009 o anteriores, la máquina gestora podía ser #desactivada escribiendo un par de #valores en la memoria SPI. Esto permitía que la máquina gestora pudiera ser #eliminada #completamente de la memoria fija. El proyecto #Libreboot ha logrado esto en los #modelos #compatibles de la serie 4 de Intel. Sin embargo, las #versiones 6.0 y #posteriores de la máquina gestora, presentes en todos los #sistemas con #procesadores Intel Core i3/i5/i7 incluyen un programa llamado "ME Ignition" que lleva a cabo #tareas de arranque y de #gestión de #energía. Dicho programa #verifica la #existencia y #validez de la firma electrónica de Intel y en caso de que esta firma no está #presente o no sea #válida, la computadora se apaga en 30 minutos.

Debido a la verificación de la firma electrónica, la #posibilidad de #desarrollar un remplazo del programa de la máquina gestora es básicamente #imposible. La única #entidad #capaz de #remplazar dicho programa es Intel. La máquina gestora incluye código privativo sujeto a #licencias de #terceras #partes, por lo que Intel no podría #revelar el código #legalmente aunque así lo quisiera. Aunque otras #personas desarrollen programas para remplazar para la máquina gestora, estos no funcionarían si no son #firmados #digitalmente por Intel. Por lo tanto, la máquina gestora de Intel es #irremediablemente #privativa y tivoizada.

Por años el #proyecto #Coreboot ha estado #presionando a Intel, pero este se ha #negado #rotundamente a #cooperar. Muchos #desarrolladores de Coreboot y otras #compañías han tratado de #presionar a Intel para que coopere; es decir, que publique el #código #fuente de la máquina gestora. Incluso #Google, compañía que vende #millones de #computadoras #Chromebooks (con Coreboot pre-instalado), no ha podido lograr #persuadir a Intel.

Incluso cuando Intel ha llegado a cooperar, este no publica el código fuente y solo da #información #limitada ( #especificaciones #técnicas ) bajo #estrictos #acuerdos de #confidencialidad. Ni siquiera las #empresas #fabricantes de computadoras reciben el código fuente de Intel y se ven #obligadas a incluir las #porciones #binarias ( #blobs ) tal como se las da Intel.

En #resumen, la máquina gestora de Intel y sus programas son #puertas #traseras #universales con acceso y control total de la computadora y representan una #terrible #amenaza para la libertad, seguridad y privacidad de sus usuarios. Por lo tanto, el proyecto Libreboot #recomienda firmemente que se #evite su #uso #completamente. Debido a que en todas las versiones recientes de procesadores Intel esta puerta trasera no puede ser eliminada, esto #implica #evitar #usar todas las generaciones recientes de procesadores de Intel.

¿Y qué hay con AMD?


#AMD tiene su #propia #versión de la máquina gestora llamada AMD Platform Security Processor ( #PSP ) que presenta las mismas amenazas de seguridad que la de Intel. El PSP es un procesador #ARM #autónomo e #integrado en el procesador #principal y como tal tiene la #habilidad de #ocultar su propio código de #ejecución, obtener los #datos de la memoria RAM como #claves de #cifrado, datos #personales #confidenciales, #historial de #navegación, teclas oprimidas, etc. En teoría, cualquier #entidad #hostil que cuente con la clave de firma digital de AMD puede #instalar #software #maligno que solo podría ser eliminado por medio de #herramientas #especializadas y una versión #íntegra del programa PSP. Además, al igual que con Intel, se han descubierto diversas vulnerabilidades que ya han sido #demostradas en el #pasado y lo más #probable es que haya más en el código privativo del PSP. Dichas vulnerabilidades permiten que agencias de espionaje y #criminales #informáticos logren #monitorear y controlar cualquier computadora que tenga el PSP de AMD sin que el usuario tenga #conocimiento de ello.

Es muy poco probable que los procesadores AMD posteriores al año 2013 puedan alguna vez ser #compatibles con Libreboot y por esa razón también se recomienda evitar usar #todos los procesadores AMD recientes.

¿Entonces qué puedo usar?


Por ahora la manera más #sencilla y #confiable de evitar las puertas traseras universales de Intel y AMD es usar únicamente computadoras que han obtenido la certificación RYF de la Fundación del Software Libre. Aunque estas computadoras certificadas aún contienen modelos anteriores de procesadores Intel o AMD, las puertas traseras en ellos han sido eliminadas o desactivadas y por lo tanto proveen mayor seguridad y privacidad siempre y cuando se utilicen única y exclusivamente con sistemas operativos completamente libres.
#NSA #CIA #inteligencia #Snowden #Wikileaks #laptops #ordenador #criptografía #hardware #CPU #tecnología #libre #GNU #GNUlinux #FSF #SoftwareLibre #soberanía #ñ #español #Mexico #México #España #Colombia #Argentina #Perú #Peru #Venezuela #Chile #Ecuador #Guatemala #Cuba #Bolivia #Guatemala #RepúblicaDominicana #Honduras #ElSalvador #Paraguay #Nicaragua #CostaRica #PuertoRico #Panamá #Panama #Uruguay
#computadora #autónoma #integrada #Intel #escritorio #portátiles #servidores #procesador #almacenamiento #interfaz #componentes #criptográfica #ROM #RAM #DMA #sistema #operativo #reservar #sector #memoria #máquina #gestora #puerta #trasera #Internet #dirección #MAC #dispositivo #red #funcionamiento #programa #arranque #componente #interno #SPI #manifiesto #firma #electrónica #versiones #programas #AMT #agencias #espionaje #atacantes #remotos #encender #apagar #acceder #información #espías #control #total #apagada #funcionalidad #Wake-on-LAN #SSL #TLS #protocolos #vulnerabilidades #documentadas #rootkits #keyloggers #secreto #funciones #acceso #datos #archivos #aplicaciones #registro #teclas #grilletes #digitales #DRM #señal #audio #video #anfitrión #clave #GPU #PAVP #gráficos #pantalla #usuario #controlar #detectar #segunda #generación #Core #i3 #i5 #i7 #habilidades #omnipotentes #privativos #espiar #leer #abiertos #examinar #registrar #movimientos #ratón #capturar #completo #vigilar #actividades #grave #amenaza #libertad #seguridad #privacidad #ignorada #anteriores #desactivada #valores #eliminada #completamente #Libreboot #modelos #compatibles #posteriores #sistemas #procesadores #tareas #gestión #energía #verifica #existencia #validez #presente #válida #posibilidad #desarrollar #imposible #entidad #capaz #remplazar #licencias #terceras #partes #revelar #legalmente #personas #firmados #digitalmente #irremediablemente #privativa #proyecto #Coreboot #presionando #negado #rotundamente #cooperar #desarrolladores #compañías #presionar #código #fuente #Google #millones #computadoras #Chromebooks #persuadir #limitada #especificaciones #técnicas #estrictos #acuerdos #confidencialidad #empresas #fabricantes #obligadas #porciones #binarias #blobs #resumen #puertas #traseras #universales #terrible #recomienda #evite #uso #implica #evitar #usar #AMD #propia #versión #PSP #ARM #autónomo #integrado #principal #habilidad #ocultar #ejecución #claves #cifrado #personales #confidenciales #historial #navegación #hostil #instalar #software #maligno #herramientas #especializadas #íntegra #demostradas #pasado #probable #criminales #informáticos #monitorear #conocimiento #todos #sencilla #confiable #NSA #CIA #inteligencia #Snowden #Wikileaks #laptops #ordenador #criptografía #hardware #CPU #tecnología #libre #GNU #GNUlinux #FSF #SoftwareLibre #soberanía #ñ #español #Mexico #España #Colombia #Argentina #Perú #Venezuela #Chile #Ecuador #Guatemala #Cuba #Bolivia #RepúblicaDominicana #Honduras #ElSalvador #Paraguay #Nicaragua #CostaRica #PuertoRico #Panamá #Uruguay
 
Image/Photo

Evita ser víctima de las puertas traseras universales de Intel y AMD


Solo usa computadoras certificadas por la Fundación del Software Libre

La "Maquina Gestora de Intel" (Intel Management Engine) es una #computadora #autónoma e #integrada en todos los procesadores #Intel de computadoras de #escritorio, #portátiles y #servidores desde el año 2006. Consiste en un #procesador ARC (remplazado por otro tipo en versiones más recientes), #almacenamiento temporal, un temporizador y un #interfaz de comunicación cifrado que está conectado a otros #componentes adicionales tales como una unidad #criptográfica, unidades de almacenamiento #ROM y #RAM internas y la función de acceso directo a la memoria ( #DMA ) del #sistema #operativo anfitrión, así como también posee la habilidad de #reservar un #sector de la #memoria RAM externa para expandir la memoria limitada de la #máquina #gestora. Por si fuera poco, esta #puerta #trasera también cuenta con acceso independiente a la red ( #Internet ) con su propia #dirección #MAC diferente a la del #dispositivo de #red.

El #funcionamiento de la máquina gestora sucede de la siguiente manera: el #programa de #arranque que reside en un #componente #interno de solo lectura carga un "manifiesto" desde el chip #SPI y dicho #manifiesto contiene una #firma #electrónica #criptográfica que varia entre #versiones de la máquina gestora. Si este manifiesto no contiene una firma electrónica válida de Intel (por ejemplo, por haber sido modificado), el dispositivo de arranque no funcionará ni ejecutará los #programas de arranque y esto a su vez causaría que el procesador de la computadora deje de funcionar.

La aplicación #AMT (Active Management Technology), parte de la serie Intel "vPro", es un servidor web que permite que las #agencias de #espionaje y #atacantes #remotos puedan #encender o #apagar el equipo y #acceder a toda la #información de la computadora: en pocas palabras, esto permite que los #espías remotos tomen el #control #total del equipo. Esto lo pueden hacer aún cuando la computadora esté #apagada por medio de la #funcionalidad de encendido por red local ( #Wake-on-LAN ). Aunque el flujo de datos envíado a las agencias de espionaje esté cifrado con #SSL / #TLS (¡vaya consuelo!), es bien sabido que estos #protocolos han tenido #vulnerabilidades muy bien #documentadas que ya han sido aprovechadas para desarrollar #rootkits, #keyloggers y así lograr el control #secreto de todas las #funciones de la computadora. El tener #acceso a todos los #datos de la memoria significa que las agencias de espionaje tienen acceso a todos los #archivos abiertos, a todas las #aplicaciones, a un #registro de todas las #teclas oprimidas, etc.

Las versiones 4.0 y posteriores de la máquina gestora de Intel incluyen una aplicación de #grilletes #digitales ( #DRM ) llamada “Protected Audio Video Path” (PAVP). La operación de estos grilletes digitales se lleva a cabo cuando la máquina gestora recibe la #señal de #audio y #video cifrada del sistema operativo #anfitrión, decifra su #clave y la envía al dispositivo de video ( #GPU ) el cual descifra la señal y la reproduce. De esta manera la aplicación #PAVP controla directamente que #gráficos aparecen en la #pantalla de una manera que el sistema operativo del #usuario no puede ni #controlar ni #detectar.

En las versiones 7.0 de la máquina gestora en procesadores de #segunda #generación de Intel #Core #i3 / #i5 / #i7, la aplicación PAVP ha sido remplazada con una aplicación similar de grilletes digitales llamada "Intel Insider". Estas aplicaciones de grilletes digitales, que además son Defectuosas por Diseño, demuestran las #habilidades #omnipotentes de la máquina gestora debido a que estos componentes y sus programas #privativos pueden acceder y controlar todo lo que se encuentra en la memoria del equipo y #espiar todo lo que aparece en pantalla. Al igual que en sus versiones anteriores, la máquina gestora puede #encender o #apagar el equipo, #leer todos los #archivos #abiertos, #examinar todas las #aplicaciones en ejecución, #registrar todas las teclas oprimidas y los #movimientos del #ratón e incluso #capturar y #controlar todo lo mostrado en pantalla. De la misma manera, su #interfaz de #red insegura permite que atacantes informáticos inyecten rootkits que pueden infectar el sistema por #completo y permitir que espías remotos puedan #vigilar todas las #actividades llevadas a cabo en la computadora. Esto representa una #grave #amenaza a tu #libertad, #seguridad y #privacidad que no puede ser #ignorada.

En versiones #anteriores a la 6.0, en sistemas del 2008 y 2009 o anteriores, la máquina gestora podía ser #desactivada escribiendo un par de #valores en la memoria SPI. Esto permitía que la máquina gestora pudiera ser #eliminada #completamente de la memoria fija. El proyecto #Libreboot ha logrado esto en los #modelos #compatibles de la serie 4 de Intel. Sin embargo, las #versiones 6.0 y #posteriores de la máquina gestora, presentes en todos los #sistemas con #procesadores Intel Core i3/i5/i7 incluyen un programa llamado "ME Ignition" que lleva a cabo #tareas de arranque y de #gestión de #energía. Dicho programa #verifica la #existencia y #validez de la firma electrónica de Intel y en caso de que esta firma no está #presente o no sea #válida, la computadora se apaga en 30 minutos.

Debido a la verificación de la firma electrónica, la #posibilidad de #desarrollar un remplazo del programa de la máquina gestora es básicamente #imposible. La única #entidad #capaz de #remplazar dicho programa es Intel. La máquina gestora incluye código privativo sujeto a #licencias de #terceras #partes, por lo que Intel no podría #revelar el código #legalmente aunque así lo quisiera. Aunque otras #personas desarrollen programas para remplazar para la máquina gestora, estos no funcionarían si no son #firmados #digitalmente por Intel. Por lo tanto, la máquina gestora de Intel es #irremediablemente #privativa y tivoizada.

Por años el #proyecto #Coreboot ha estado #presionando a Intel, pero este se ha #negado #rotundamente a #cooperar. Muchos #desarrolladores de Coreboot y otras #compañías han tratado de #presionar a Intel para que coopere; es decir, que publique el #código #fuente de la máquina gestora. Incluso #Google, compañía que vende #millones de #computadoras #Chromebooks (con Coreboot pre-instalado), no ha podido lograr #persuadir a Intel.

Incluso cuando Intel ha llegado a cooperar, este no publica el código fuente y solo da #información #limitada ( #especificaciones #técnicas ) bajo #estrictos #acuerdos de #confidencialidad. Ni siquiera las #empresas #fabricantes de computadoras reciben el código fuente de Intel y se ven #obligadas a incluir las #porciones #binarias ( #blobs ) tal como se las da Intel.

En #resumen, la máquina gestora de Intel y sus programas son #puertas #traseras #universales con acceso y control total de la computadora y representan una #terrible #amenaza para la libertad, seguridad y privacidad de sus usuarios. Por lo tanto, el proyecto Libreboot #recomienda firmemente que se #evite su #uso #completamente. Debido a que en todas las versiones recientes de procesadores Intel esta puerta trasera no puede ser eliminada, esto #implica #evitar #usar todas las generaciones recientes de procesadores de Intel.

¿Y qué hay con AMD?


#AMD tiene su #propia #versión de la máquina gestora llamada AMD Platform Security Processor ( #PSP ) que presenta las mismas amenazas de seguridad que la de Intel. El PSP es un procesador #ARM #autónomo e #integrado en el procesador #principal y como tal tiene la #habilidad de #ocultar su propio código de #ejecución, obtener los #datos de la memoria RAM como #claves de #cifrado, datos #personales #confidenciales, #historial de #navegación, teclas oprimidas, etc. En teoría, cualquier #entidad #hostil que cuente con la clave de firma digital de AMD puede #instalar #software #maligno que solo podría ser eliminado por medio de #herramientas #especializadas y una versión #íntegra del programa PSP. Además, al igual que con Intel, se han descubierto diversas vulnerabilidades que ya han sido #demostradas en el #pasado y lo más #probable es que haya más en el código privativo del PSP. Dichas vulnerabilidades permiten que agencias de espionaje y #criminales #informáticos logren #monitorear y controlar cualquier computadora que tenga el PSP de AMD sin que el usuario tenga #conocimiento de ello.

Es muy poco probable que los procesadores AMD posteriores al año 2013 puedan alguna vez ser #compatibles con Libreboot y por esa razón también se recomienda evitar usar #todos los procesadores AMD recientes.

¿Entonces qué puedo usar?


Por ahora la manera más #sencilla y #confiable de evitar las puertas traseras universales de Intel y AMD es usar únicamente computadoras que han obtenido la certificación RYF de la Fundación del Software Libre. Aunque estas computadoras certificadas aún contienen modelos anteriores de procesadores Intel o AMD, las puertas traseras en ellos han sido eliminadas o desactivadas y por lo tanto proveen mayor seguridad y privacidad siempre y cuando se utilicen única y exclusivamente con sistemas operativos completamente libres.
#NSA #CIA #inteligencia #Snowden #Wikileaks #laptops #ordenador #criptografía #hardware #CPU #tecnología #libre #GNU #GNUlinux #FSF #SoftwareLibre #soberanía #ñ #español #Mexico #México #España #Colombia #Argentina #Perú #Peru #Venezuela #Chile #Ecuador #Guatemala #Cuba #Bolivia #Guatemala #RepúblicaDominicana #Honduras #ElSalvador #Paraguay #Nicaragua #CostaRica #PuertoRico #Panamá #Panama #Uruguay
#computadora #autónoma #integrada #Intel #escritorio #portátiles #servidores #procesador #almacenamiento #interfaz #componentes #criptográfica #ROM #RAM #DMA #sistema #operativo #reservar #sector #memoria #máquina #gestora #puerta #trasera #Internet #dirección #MAC #dispositivo #red #funcionamiento #programa #arranque #componente #interno #SPI #manifiesto #firma #electrónica #versiones #programas #AMT #agencias #espionaje #atacantes #remotos #encender #apagar #acceder #información #espías #control #total #apagada #funcionalidad #Wake-on-LAN #SSL #TLS #protocolos #vulnerabilidades #documentadas #rootkits #keyloggers #secreto #funciones #acceso #datos #archivos #aplicaciones #registro #teclas #grilletes #digitales #DRM #señal #audio #video #anfitrión #clave #GPU #PAVP #gráficos #pantalla #usuario #controlar #detectar #segunda #generación #Core #i3 #i5 #i7 #habilidades #omnipotentes #privativos #espiar #leer #abiertos #examinar #registrar #movimientos #ratón #capturar #completo #vigilar #actividades #grave #amenaza #libertad #seguridad #privacidad #ignorada #anteriores #desactivada #valores #eliminada #completamente #Libreboot #modelos #compatibles #posteriores #sistemas #procesadores #tareas #gestión #energía #verifica #existencia #validez #presente #válida #posibilidad #desarrollar #imposible #entidad #capaz #remplazar #licencias #terceras #partes #revelar #legalmente #personas #firmados #digitalmente #irremediablemente #privativa #proyecto #Coreboot #presionando #negado #rotundamente #cooperar #desarrolladores #compañías #presionar #código #fuente #Google #millones #computadoras #Chromebooks #persuadir #limitada #especificaciones #técnicas #estrictos #acuerdos #confidencialidad #empresas #fabricantes #obligadas #porciones #binarias #blobs #resumen #puertas #traseras #universales #terrible #recomienda #evite #uso #implica #evitar #usar #AMD #propia #versión #PSP #ARM #autónomo #integrado #principal #habilidad #ocultar #ejecución #claves #cifrado #personales #confidenciales #historial #navegación #hostil #instalar #software #maligno #herramientas #especializadas #íntegra #demostradas #pasado #probable #criminales #informáticos #monitorear #conocimiento #todos #sencilla #confiable #NSA #CIA #inteligencia #Snowden #Wikileaks #laptops #ordenador #criptografía #hardware #CPU #tecnología #libre #GNU #GNUlinux #FSF #SoftwareLibre #soberanía #ñ #español #Mexico #España #Colombia #Argentina #Perú #Venezuela #Chile #Ecuador #Guatemala #Cuba #Bolivia #RepúblicaDominicana #Honduras #ElSalvador #Paraguay #Nicaragua #CostaRica #PuertoRico #Panamá #Uruguay
 
How to Mirror & Control Your Android Phone from the Ubuntu Desktop

https://www.omgubuntu.co.uk/2019/07/scrcpy-mirror-android-to-ubuntu-linux

View your phone's screen and interact with it using a keyboard & mouse

#android #Linux #GNU #technology #Ubuntu #OpenSource
How to Mirror & Control Your Android Phone from the Ubuntu Desktop
 
How to Mirror & Control Your Android Phone from the Ubuntu Desktop

https://www.omgubuntu.co.uk/2019/07/scrcpy-mirror-android-to-ubuntu-linux

View your phone's screen and interact with it using a keyboard & mouse

#android #Linux #GNU #technology #Ubuntu #OpenSource
How to Mirror & Control Your Android Phone from the Ubuntu Desktop
 

How to remove video/movie screen tearing for Intel HD GPU / Linux


sudo mkdir /etc/X11/xorg.conf.d
sudo touch /etc/X11/xorg.conf.d/20-intel.conf
sudo nano /etc/X11/xorg.conf.d/20-intel.conf

add content:

Section "Device"
Identifier "Intel Graphics"
Driver "intel"
Option "AccelMethod" "SNA"
Option "TearFree" "true"
EndSection

(ctrl+w / write / save)
reboot
#Gnu #Linux #Software #Hardware #Intel #GPU #Driver
 

How to remove video/movie screen tearing for Intel HD GPU / Linux


sudo mkdir /etc/X11/xorg.conf.d
sudo touch /etc/X11/xorg.conf.d/20-intel.conf
sudo nano /etc/X11/xorg.conf.d/20-intel.conf

add content:

Section "Device"
Identifier "Intel Graphics"
Driver "intel"
Option "AccelMethod" "SNA"
Option "TearFree" "true"
EndSection

(ctrl+w / write / save)
reboot
#Gnu #Linux #Software #Hardware #Intel #GPU #Driver
 
Salut le monde, je suis #nouveauici.

J'aime la #liberté #voiture #moto
les #balades, la bonne #cuisine, les #piques-nique aussi
et bien sur ... les #apéro(s) ;)

Je tourne sous #GNU / #Linux

A bientôt

Je s'appelle Groot ;)
 
Salut le monde, je suis #nouveauici.

J'aime la #liberté #voiture #moto
les #balades, la bonne #cuisine, les #piques-nique aussi
et bien sur ... les #apéro(s) ;)

Je tourne sous #GNU / #Linux

A bientôt

Je s'appelle Groot ;)
 
#DebianEdu 10 released as a complete #GNU #Linux solution for schools
https://www.fosslinux.com/16922/debian-edu-10-released-as-a-complete-linux-solution-for-schools.htm more: http://www.tuxmachines.org/node/125642
Debian Edu 10 released as a complete Linux solution for schools
 
#DebianEdu 10 released as a complete #GNU #Linux solution for schools
https://www.fosslinux.com/16922/debian-edu-10-released-as-a-complete-linux-solution-for-schools.htm more: http://www.tuxmachines.org/node/125642
Debian Edu 10 released as a complete Linux solution for schools
 

Debian GNU/Hurd 2019 Released


HN Discussion: https://news.ycombinator.com/item?id=20374239
Posted by jrepinc (karma: 3149)
Post stats: Points: 152 - Comments: 41 - 2019-07-07T09:08:08Z

\#HackerNews #2019 #debian #gnu #hurd #released
HackerNewsBot debug: Calculated post rank: 115 - Loop: 87 - Rank min: 100 - Author rank: 71
 

Decoded: GNU coreutils (2018)


HN Discussion: https://news.ycombinator.com/item?id=20334259
Posted by mariuz (karma: 8794)
Post stats: Points: 150 - Comments: 11 - 2019-07-02T12:15:14Z

\#HackerNews #2018 #coreutils #decoded #gnu
HackerNewsBot debug: Calculated post rank: 103 - Loop: 213 - Rank min: 100 - Author rank: 71
 
How to install flash LibreBoot / CoreBoot on Lenovo X60S Tutorial from 2018

NOTE: LibreBoot (status of 2018) can NOT boot Windows X-D (who cares). So i guess you want to use LibreBoot with Linux and Linux only. even when CoreBoot is a 10 year old project... replacing your BIOS with LINUX can be a[...]

\#linux #gnu #gnulinux #opensource #administration #sysops #free #fsf #libreboot #coreboot #thinkpad #freehardware #hardware #bios #computrace #surveillance
Quelle: https://dwaves.org/2018/06/18/how-to-install-flash-libreboot-coreboot-on-lenovo-x60s-tutorial-from-2018/
How to install flash LibreBoot / CoreBoot on Lenovo X60S Tutorial from 2018
 
Good news for #gnu #linux just keeps coming! https://betanews.com/2019/05/18/korea-linux/ more in http://www.tuxmachines.org/node/123991
South Korea will ditch Microsoft Windows for Linux
 
2019 status of jailbreak apple devices tools overview - trying to unlock ipad 3 and ipad 4

Image/Photo

to be straight: have not managed yet to unlock a pin locked ipad 3 and ipad 4 and/or recover the data.

it is easy to just overwrite the ipad with the latest firmware via itunes.

but i want to backup and extract all possible files before that.

if you want to jailbreak your Apple device, basically there are a lot of tools and you need to find the one that suits your hardware and firmware model.

not an easy task.

have an older ipad 3 to wich the PIN was lost (no it is not stolen, it’s from a relative who forgot it and also can not remember his itunes password (alzheimer is very comon these days)). (Model: A1430 iPad 3, Early 2012, +Wi-Fi + Cellular, 30-pin connecto) but latest redsn0w (redsn0w_win_0.9.15b2.zip) says „iPad 3 is not supported“ (probably it has a newer iOS installed than 5.1.1)

this site helps you find and download newer and older firmwares for your device: (GOOD JOB! 🙂

https://ipsw.me/device-finder

https://ipsw.me/iPad3,3

http://www.getios.com/ here you also can get a lot of firmware versions for your iDevice.

also interesting: https://nerdpol.ch/tags/jailbreak

theory:

  • pull an (encrypted) backup from the device
    • not possible via itunes with PIN locked ipad
    • most approaches use some exploit to load their own ramdisk and get access to the device
  • via brute force, find the decryption PIN
  • extract the data
  • reset the device
…. not so easy.

„Imagine a computer which is protected with an OS level password – we can still access the hard disk data by booting a live CD, or by removing the hard disk and connecting it to another machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data into it. To perform iPhone forensics, we use the Live CD approach. As the iPhone has only one serial port, we are going to load custom OS over the USB to access the hard disk of the device. The problem here is: the iPhone only loads firmware designed by Apple.

In order to create and load the forensic toolkit, first we need to understand iPhone functions at the operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications.

When an iPhone boots up, it walks through a chain of trust, which is a series of RSA signature checks among the software components in a specific order as shown below:




The BootRom is Read-only memory (ROM) and it is the first stage of booting an iOS device. BootRom contains all the root certificates to signature check the next stage.

iPhone operates in 3 modes – Normal Mode, Recovery Mode, DFU mode

In Normal mode, BootRom start off some initialization stuff and loads the low level boot loader (LLB) by verifying its signature. LLB signature checks and loads the stage 2 boot loader (iBoot). iBoot signature checks the kernel and device tree, while the kernel signature checks all the user applications.

In DFU mode, iPhone follows the boot sequence with a series of signature checks as shown below. BootRom signature checks the second level boot loaders (iBSS, iBEC). Boot loader signature checks the kernel, and the kernel signature checks the Ramdisk.




During iOS update, the Ramdisk gets loaded into RAM and it loads all the other OS components.

In Forensics, we will create a custom Ramdisk with our complete forensic tool kit and load it into the iPhone’s volatile memory.

Signature checks implemented at various stages in the boot sequence do not allow us to load our custom Ramdisk. To load our custom Ramdisk, we have to bypass all these signature checks. In the chain of trust boot sequence, if we compromise one link, we can fully control all the links that follow. The hacker community has found several vulnerabilities in BootRom. By using these, we can flash our own boot loader and patch all other signature checks in all the subsequent stages. Apart from signature checks, every stage is also encrypted. These encryption keys can be grabbed from JailBreaking tools.“

src: https://resources.infosecinstitute.com/iphone-forensics/

another lengthy writeup: https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/

unlocking iDevices: how ex-empoyees make business


„Cellebrite, through means currently unknown, provides these services at $5,000 per device,“

https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/

Mysterious $15,000 ‚GrayKey‘ Promises To Unlock iPhone X For The Feds


https://youtu.be/gpzl11uPmyY

https://www.magnetforensics.com/
  • AXIOM has the most advanced parsing and carving techniques which finds more evidence than any other tool, including 25% more pictures.
  • Get more detailed information about what someone was doing at any given time and where, with artifacts like KnowledgeC, iOS Wallet, geolocation data, Screen Time, and more.
  • Analyze the full file system (including iTunes backup-style images) and decrypted Keychain from iOS devices and find evidence that other tools miss.
  • Memory images could contain valuable evidence like messages, call logs, and email. AXIOM natively supports the analysis of memory from GrayKey images without the need to install third-party conversions or plugins.
  • iOS images contain a lot of native files and raw data. Use AXIOM to cut through the noise of data and save time during your investigations by quickly surfacing only relevant evidence rather than unactionable data.
  • Discover new artifacts with Dynamic App Finder to automatically scan your file system and memory images for relevant chat, browser, geolocation, and identifier data.
  • AXIOM is a complete digital investigation platform that gives you the power to analyze evidence from GrayKey images alongside data from other computer, cloud, social media, and mobile evidentiary sources.
src: https://www.magnetforensics.com/graykey/




„can take up to three days or longer to (crack) for six-digit passcodes“ … and recover the data of the iDevice.




src: https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/#566b2c9c2950

Jailbreak iPhone XS, iPhone XR on iOS 12 – iOS 12.1.2 Using Chimera Jailbreak [How to]


Image/Photo

Posted by Rajesh Pandey on Apr 30, 2019

The Electra team surprised everyone today by releasing Chimera, a new iOS 12 – iOS 12.1.2 jailbreak for A7-A12 devices including the iPhone XS and iPhone XR. Chimera has been built from the ground up and comes with Sileo as its default package manager.

the hardware hack: How to unlock iCloud locked Apple iPad 2, 3, 4, iPad Air and Air 2, iPad mini 1, 2, 3, 4, iPad 12.9 and 9.7 – WARNING!

This method works ONLY on iPads with 3G/4G/LTE and removes cellular from your iPad.

it will become wifi-only! (no 3G/4G/LTE no more!)


„This method will help you bypass iCloud on locked iPads.

This manual will help you with iCloud bypass on your iPad Cellular.
  • After bypass iCloud you will have iPad Wi-Fi Only.
  • Sim-slot (GSM, Mobile, SimCard) will not work.
  • GPS and Bluetooth will work.
At this moment it works with Apple iPad 2, iPad 3, iPad 4, iPad Air, iPad mini, iPad mini 2, iPad Air 2, iPad mini 3, iPad mini 4, iPad Pro 12.9, iPad Pro 9.7 which is locked by service iCloud. Include locked through “Lost and erased” mode.
  • On the iPad 2 3G Model A1396 (GSM) remove the resistor r1205. On the Model iPad 2 3G A1397 (CDMA) move resistor r1205 to position r1204.
  • iPad 2 3G will enter DFU mode.
  • Connect the iPad 2 3G to your PC or Mac.
  • After that you need to restore the iPad 2 3G through iTunes with firmware of Wi-Fi ONLY model and activate using the official method.
  • Turn off the automatic firmware update: Settings \ iTunes Store, App Store \ Automatic download \ Updates.
You can support this project through donations. „PayPal block my account with all money because I’m from Ukraine. “

After this you will can install any apps on your iCloud free iPad, make jailbreak, assign your own Apple ID account and do any other things.

Apple devices (for example iPads) have some part on logic board which called Board_id. Board_id is responsible for how device identifies itself. For iPad there are several possible configurations: Apple TV, Apple iPhone, Apple iPad Cellular, Apple iPad WiFi only.

When Apple’s iCloud servers bloсked iPads they do this in 2 ways:
  • iPad WiFi only will be blocked by it serial number.
  • iPad Cellular will be blocked by it serial number and IMEI.
To bypass iCloud on iPads Cellular you need disable it modem chip and change Board_id.

If you just only disable modem you will get error and not working device. Sometimes this happens when modem or cable modem is broken even on iPads which isn’t blocked in iCloud. My method can revive such devices.

When you disabled modem chip and changed Board_id device will stop work properly. Something inside will say: “Hey man, something wrong! My hardware is like for WiFi only model, but you use firmware for Cellular model. I go in DFU-mode and you should go in iTunes and restore me”.

When you connect your iPad to BigBrother OS will install driver for it.

At finish you will have iCloud unlocked iPad WiFi only. Now It can be registered on your own Apple ID through new clean serial number. Voila!

If you have some problem with recovering check USB cable and restore iPad manualy from file with firmware. You can download firmware from ipsw.me. Remember that now you have iPad WiFi only hardware and you should download WiFi only firmware. For example, if you have iCloud locked iPad Air Cellular A1475 you should download firmware for iPad Air WiFi only A1474.

And Yes. At any moment you can covert your iCloud freу iPad WiFi only with hardware method back to iPad Cellular. But iCloud blocking will back too.

Be careful and good luck!“

Here you can read manual to bypass iCloud on model of your iPad:If you are looking for a way to unlock the iCloud on iPad Wi-Fi Only, iPhone or iPod, then read this article: How to bypass iCloud on iPad WiFi, iPad Cellular, iPhone and iPod

src: https://pasha4ur.org.ua/

https://pasha4ur.org.ua/articles/difdevices/131-how-unlock-apple-ipad-2-3g-icloud-locked

unlock: A1430 (GSM) and A1403 (CDMA)








… respect! this border_id change thing needs further investiagion.

src: https://pasha4ur.org.ua/images/phocagallery/stories/portfolio/apple/ipad2unlock/ipad3-icloud-unlock-by-pasha4ur.png

how to open the thing:




warning!


all sort of weird things happening:

Hi can someone help me with ipad mini A1454 I have removed the resistor R1204 as stated in the instructions I need to now make a jumper on R1205 because itunes detects my ipad as a apple tv so a jumper going from R1205 but unsure where the other end of the jumper goes please help me I would be really grateful

„use good pencil (graphite) to make short (jumper) in R1205“

src: http://forum.gsmhosting.com/vbb/f631/bypass-icloud-ipad-2-3-4-air-mini-mini-retina-3g-hardware-method-1872271/index8.html

redsn0w is ooooold:


in this video DiplInf Sebastian Scheiber shows how to jailbreak an locked (!) iPad and recover the data.

Method used:problem: this probably only works with on older versions of the iPad / iPhone supported by Redsn0w and iOS 5.1 is rather old, most devices will have a newer version of iOS installed by now.

how to get into DFU (recovery) mode:

  • hold power button pressed for 3 seconds
  • now keep power button pressed while also holding home button pressed
  • after a few seconds screen goes dark, now RELEASE POWER BUTTON but still keep home button pressed
… screen should stay dark and PC you connect do should detect an iPad in DFU mode.

Stuck in DFU mode – How to Exit DFU Mode:


Press Home and Power/ Sleep buttons at the same time for 10s > Release the Home and Power/ Sleep buttons together.

iOS 9.2 – 9.3.3 64-bit devices only


iphone 5s iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se ipod touch 6g ipad mini 2 ipad mini 3 ipad mini 4 ipad air ipad air 2 ipad pro

will need your apple id and password.

https://en.pangu.io/

Evasi0n (Evasi0n7) Jailbreak Tool:

for iOS 6.x – iOS 7.0.x


… this can not be used to unlock an iPad. Your iPad/iPhone will have to be unlocked (PIN) before jailbreaking.

http://www.ijailbreak.com/evasi0n/

evasi0n is an unconventional utility able to perform jailbreak operations on devices running iOS 6 and 7.

A consequence of the procedure is the removal of several limitations imposed by Apple, allowing users to install software that is not approved by the company and switch phone carriers seamlessly.

evasi0n became a success just days after its first release.

Supposedly, a few million copies have been downloaded in a very short period, which is not necessarily an indication of its efficiency, but sure says a lot. Statistics aside, the general opinion (as stated by most users on the Internet) is that evasi0n is a trustworthy jailbreak application, one that has to offer everything and asks for nothing in return.

evasi0n is special because it can perform an untethered jailbreak operation, which translates into the fact that the iOS device will be able to reboot without requiring a connection with an external device.

The principle it relies on involves a number of complicated steps, most of which are related to exploiting several vulnerabilities that were overlooked by Apple. However, the process is completed silently, without user intervention.

This is the main reason why evasi0n is considered one of the most easy-to-use and accessible applications of its type. It’s not pretentious as far as OS requirements are concerned, nor does it require advanced configurations.

In order for the jailbreak operation to be successful, you need to equip your system with iTunes and connect your iPhone, iPad or iPod to the computer via a USB cable.

It is also recommended that you backup the device in case something goes wrong.

Once you’ve completed these steps, you can proceed with the jailbreak operation, which, if free of errors, shouldn’t take more than five minutes. However, if the process fails, simply reboot the device and relaunch evasi0n.

On an ending note, this is a well-built jailbreak software, easy to use and user-friendly. Nevertheless, a backup operation is vital in case anything goes wrong.

windows versions:

https://www.softpedia.com/get/Mobile-Phone-Tools/IPhone/evasi0n.shtml

https://www.softpedia.com/downloadTag/jailbreak

linux version:

https://www.mediafire.com/file/21zlxh81cqtqqgb/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar+%281%29.lzma

phoenixpwn.com


jailbreak works only on 32-bit devices, which includes :
  • iPhone 4S, 5C and 5
  • iPad 2, 3, 4
  • iPad Mini 1
  • iPod Touch 5
https://phoenixpwn.com/ -> you will need an apple id associated with the device?

https://youtu.be/6I8V-BRx2hk

https://twitter.com/saurik/status/1119211957188345856

for older devices and firmwares (iOS 5.1.X)


„RedSn0w actually evolved from the Jailbreaking tool Quickpwn, which was an early Jailbreaking tool used to Jailbreak the 2nd generation of iOS. Nowadays RedSn0w can be used to Jailbreak a lot of versions of iPhone, iPod Touch and iPad.“ … but not all, iPad 4 seems not supported.

RedSn0w iPhone Support:


iPhone 6s Plus: Not Supported
iPhone 6s: Not Supported
iPhone 6 Plus: Not Supported
iPhone 6: Not Supported
iPhone 5s: Not Supported
iPhone 5c: Not Supported
iPhone 5: Not Supported
iPhone 4S: iOS 5 (iOS 5.1.1, iOS 5.0.1, iOS 5.0)
iPhone 4: iOS 6 (iOS 6.0,6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (iOS 3.1.3)
iPhone 3GS: iOS 6 (iOS 6.0, 6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
iPhone 3G: iOS 4 (4.3.4, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)

RedSn0w iPad Support:


iPad Pro: Not Supported
iPad Air 2: Not Supported
iPad Air: Not Supported
iPad Mini 4: Not Supported
iPad Mini 3: Not Supported iPad Mini 2: Not Supported
iPad Mini: Not Supported
iPad 4: Not Supported <- argh!
iPad 3: iOS 5 (iOS 5.1.1) <- RedSn0w told me „Ipad 3 is not supported“, probably it has a newer iOS installed than 5.1.1)
iPad 2: iOS 5 (iOS 5.1.1, 5.0.1)
iPad 1: iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (iOS 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.1) + iOS 3 (iOS 3.2.2)

src: http://www.ijailbreak.com/redsn0w/

PwnageTool 4.3 Info

http://public.stuff.hu/pwnagetool/PwnageTool_4.3.dmg

Method 2: Get Out of DFU Mode on iPhone/iPad/iPod touch with PhoneRescue


Click here to download PhoneRescue free version!

Step 1: Launch PhoneRescue on your computer > Connect your iOS device to your computer with a USB cable > Wait for PhoneRescue to recognize your iOS device.

Step 2: Click on „Exit Ramdisk Mode“ at the bottom of the Homepage.

other jailbreaking tools:

links:


https://www.antid0te.com/

https://www.sektioneins.de/

http://www.ijailbreak.com/jailbreak-software/

https://www.theiphonewiki.com/wiki/I0n1c

tweets:


https://twitter.com/angelXwind

\#linux #gnu #gnulinux #opensource #administration #sysops #apple #ipad #phone #jailbreak
Quelle: https://dwaves.org/2019/05/12/2019-status-of-jailbreak-apple-devices-tools-overview-trying-to-unlock-ipad-3-and-ipad-4/
2019 status of jailbreak apple devices tools overview – trying to unlock ipad 3 and ipad 4
 
2019 status of jailbreak apple devices tools overview - trying to unlock ipad 3 and ipad 4

Image/Photo

to be straight: have not managed yet to unlock a pin locked ipad 3 and ipad 4 and/or recover the data.

it is easy to just overwrite the ipad with the latest firmware via itunes.

but i want to backup and extract all possible files before that.

if you want to jailbreak your Apple device, basically there are a lot of tools and you need to find the one that suits your hardware and firmware model.

not an easy task.

have an older ipad 3 to wich the PIN was lost (no it is not stolen, it’s from a relative who forgot it and also can not remember his itunes password (alzheimer is very comon these days)). (Model: A1430 iPad 3, Early 2012, +Wi-Fi + Cellular, 30-pin connecto) but latest redsn0w (redsn0w_win_0.9.15b2.zip) says „iPad 3 is not supported“ (probably it has a newer iOS installed than 5.1.1)

this site helps you find and download newer and older firmwares for your device: (GOOD JOB! 🙂

https://ipsw.me/device-finder

https://ipsw.me/iPad3,3

http://www.getios.com/ here you also can get a lot of firmware versions for your iDevice.

also interesting: https://nerdpol.ch/tags/jailbreak

theory:

  • pull an (encrypted) backup from the device
    • not possible via itunes with PIN locked ipad
    • most approaches use some exploit to load their own ramdisk and get access to the device
  • via brute force, find the decryption PIN
  • extract the data
  • reset the device
…. not so easy.

„Imagine a computer which is protected with an OS level password – we can still access the hard disk data by booting a live CD, or by removing the hard disk and connecting it to another machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data into it. To perform iPhone forensics, we use the Live CD approach. As the iPhone has only one serial port, we are going to load custom OS over the USB to access the hard disk of the device. The problem here is: the iPhone only loads firmware designed by Apple.

In order to create and load the forensic toolkit, first we need to understand iPhone functions at the operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications.

When an iPhone boots up, it walks through a chain of trust, which is a series of RSA signature checks among the software components in a specific order as shown below:




The BootRom is Read-only memory (ROM) and it is the first stage of booting an iOS device. BootRom contains all the root certificates to signature check the next stage.

iPhone operates in 3 modes – Normal Mode, Recovery Mode, DFU mode

In Normal mode, BootRom start off some initialization stuff and loads the low level boot loader (LLB) by verifying its signature. LLB signature checks and loads the stage 2 boot loader (iBoot). iBoot signature checks the kernel and device tree, while the kernel signature checks all the user applications.

In DFU mode, iPhone follows the boot sequence with a series of signature checks as shown below. BootRom signature checks the second level boot loaders (iBSS, iBEC). Boot loader signature checks the kernel, and the kernel signature checks the Ramdisk.




During iOS update, the Ramdisk gets loaded into RAM and it loads all the other OS components.

In Forensics, we will create a custom Ramdisk with our complete forensic tool kit and load it into the iPhone’s volatile memory.

Signature checks implemented at various stages in the boot sequence do not allow us to load our custom Ramdisk. To load our custom Ramdisk, we have to bypass all these signature checks. In the chain of trust boot sequence, if we compromise one link, we can fully control all the links that follow. The hacker community has found several vulnerabilities in BootRom. By using these, we can flash our own boot loader and patch all other signature checks in all the subsequent stages. Apart from signature checks, every stage is also encrypted. These encryption keys can be grabbed from JailBreaking tools.“

src: https://resources.infosecinstitute.com/iphone-forensics/

another lengthy writeup: https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/

unlocking iDevices: how ex-empoyees make business


„Cellebrite, through means currently unknown, provides these services at $5,000 per device,“

https://blog.malwarebytes.com/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns/

Mysterious $15,000 ‚GrayKey‘ Promises To Unlock iPhone X For The Feds


https://youtu.be/gpzl11uPmyY

https://www.magnetforensics.com/
  • AXIOM has the most advanced parsing and carving techniques which finds more evidence than any other tool, including 25% more pictures.
  • Get more detailed information about what someone was doing at any given time and where, with artifacts like KnowledgeC, iOS Wallet, geolocation data, Screen Time, and more.
  • Analyze the full file system (including iTunes backup-style images) and decrypted Keychain from iOS devices and find evidence that other tools miss.
  • Memory images could contain valuable evidence like messages, call logs, and email. AXIOM natively supports the analysis of memory from GrayKey images without the need to install third-party conversions or plugins.
  • iOS images contain a lot of native files and raw data. Use AXIOM to cut through the noise of data and save time during your investigations by quickly surfacing only relevant evidence rather than unactionable data.
  • Discover new artifacts with Dynamic App Finder to automatically scan your file system and memory images for relevant chat, browser, geolocation, and identifier data.
  • AXIOM is a complete digital investigation platform that gives you the power to analyze evidence from GrayKey images alongside data from other computer, cloud, social media, and mobile evidentiary sources.
src: https://www.magnetforensics.com/graykey/




„can take up to three days or longer to (crack) for six-digit passcodes“ … and recover the data of the iDevice.




src: https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/#566b2c9c2950

Jailbreak iPhone XS, iPhone XR on iOS 12 – iOS 12.1.2 Using Chimera Jailbreak [How to]


Image/Photo

Posted by Rajesh Pandey on Apr 30, 2019

The Electra team surprised everyone today by releasing Chimera, a new iOS 12 – iOS 12.1.2 jailbreak for A7-A12 devices including the iPhone XS and iPhone XR. Chimera has been built from the ground up and comes with Sileo as its default package manager.

the hardware hack: How to unlock iCloud locked Apple iPad 2, 3, 4, iPad Air and Air 2, iPad mini 1, 2, 3, 4, iPad 12.9 and 9.7 – WARNING!

This method works ONLY on iPads with 3G/4G/LTE and removes cellular from your iPad.

it will become wifi-only! (no 3G/4G/LTE no more!)


„This method will help you bypass iCloud on locked iPads.

This manual will help you with iCloud bypass on your iPad Cellular.
  • After bypass iCloud you will have iPad Wi-Fi Only.
  • Sim-slot (GSM, Mobile, SimCard) will not work.
  • GPS and Bluetooth will work.
At this moment it works with Apple iPad 2, iPad 3, iPad 4, iPad Air, iPad mini, iPad mini 2, iPad Air 2, iPad mini 3, iPad mini 4, iPad Pro 12.9, iPad Pro 9.7 which is locked by service iCloud. Include locked through “Lost and erased” mode.
  • On the iPad 2 3G Model A1396 (GSM) remove the resistor r1205. On the Model iPad 2 3G A1397 (CDMA) move resistor r1205 to position r1204.
  • iPad 2 3G will enter DFU mode.
  • Connect the iPad 2 3G to your PC or Mac.
  • After that you need to restore the iPad 2 3G through iTunes with firmware of Wi-Fi ONLY model and activate using the official method.
  • Turn off the automatic firmware update: Settings \ iTunes Store, App Store \ Automatic download \ Updates.
You can support this project through donations. „PayPal block my account with all money because I’m from Ukraine. “

After this you will can install any apps on your iCloud free iPad, make jailbreak, assign your own Apple ID account and do any other things.

Apple devices (for example iPads) have some part on logic board which called Board_id. Board_id is responsible for how device identifies itself. For iPad there are several possible configurations: Apple TV, Apple iPhone, Apple iPad Cellular, Apple iPad WiFi only.

When Apple’s iCloud servers bloсked iPads they do this in 2 ways:
  • iPad WiFi only will be blocked by it serial number.
  • iPad Cellular will be blocked by it serial number and IMEI.
To bypass iCloud on iPads Cellular you need disable it modem chip and change Board_id.

If you just only disable modem you will get error and not working device. Sometimes this happens when modem or cable modem is broken even on iPads which isn’t blocked in iCloud. My method can revive such devices.

When you disabled modem chip and changed Board_id device will stop work properly. Something inside will say: “Hey man, something wrong! My hardware is like for WiFi only model, but you use firmware for Cellular model. I go in DFU-mode and you should go in iTunes and restore me”.

When you connect your iPad to BigBrother OS will install driver for it.

At finish you will have iCloud unlocked iPad WiFi only. Now It can be registered on your own Apple ID through new clean serial number. Voila!

If you have some problem with recovering check USB cable and restore iPad manualy from file with firmware. You can download firmware from ipsw.me. Remember that now you have iPad WiFi only hardware and you should download WiFi only firmware. For example, if you have iCloud locked iPad Air Cellular A1475 you should download firmware for iPad Air WiFi only A1474.

And Yes. At any moment you can covert your iCloud freу iPad WiFi only with hardware method back to iPad Cellular. But iCloud blocking will back too.

Be careful and good luck!“

Here you can read manual to bypass iCloud on model of your iPad:If you are looking for a way to unlock the iCloud on iPad Wi-Fi Only, iPhone or iPod, then read this article: How to bypass iCloud on iPad WiFi, iPad Cellular, iPhone and iPod

src: https://pasha4ur.org.ua/

https://pasha4ur.org.ua/articles/difdevices/131-how-unlock-apple-ipad-2-3g-icloud-locked

unlock: A1430 (GSM) and A1403 (CDMA)








… respect! this border_id change thing needs further investiagion.

src: https://pasha4ur.org.ua/images/phocagallery/stories/portfolio/apple/ipad2unlock/ipad3-icloud-unlock-by-pasha4ur.png

how to open the thing:




warning!


all sort of weird things happening:

Hi can someone help me with ipad mini A1454 I have removed the resistor R1204 as stated in the instructions I need to now make a jumper on R1205 because itunes detects my ipad as a apple tv so a jumper going from R1205 but unsure where the other end of the jumper goes please help me I would be really grateful

„use good pencil (graphite) to make short (jumper) in R1205“

src: http://forum.gsmhosting.com/vbb/f631/bypass-icloud-ipad-2-3-4-air-mini-mini-retina-3g-hardware-method-1872271/index8.html

redsn0w is ooooold:


in this video DiplInf Sebastian Scheiber shows how to jailbreak an locked (!) iPad and recover the data.

Method used:problem: this probably only works with on older versions of the iPad / iPhone supported by Redsn0w and iOS 5.1 is rather old, most devices will have a newer version of iOS installed by now.

how to get into DFU (recovery) mode:

  • hold power button pressed for 3 seconds
  • now keep power button pressed while also holding home button pressed
  • after a few seconds screen goes dark, now RELEASE POWER BUTTON but still keep home button pressed
… screen should stay dark and PC you connect do should detect an iPad in DFU mode.

Stuck in DFU mode – How to Exit DFU Mode:


Press Home and Power/ Sleep buttons at the same time for 10s > Release the Home and Power/ Sleep buttons together.

iOS 9.2 – 9.3.3 64-bit devices only


iphone 5s iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se ipod touch 6g ipad mini 2 ipad mini 3 ipad mini 4 ipad air ipad air 2 ipad pro

will need your apple id and password.

https://en.pangu.io/

Evasi0n (Evasi0n7) Jailbreak Tool:

for iOS 6.x – iOS 7.0.x


… this can not be used to unlock an iPad. Your iPad/iPhone will have to be unlocked (PIN) before jailbreaking.

http://www.ijailbreak.com/evasi0n/

evasi0n is an unconventional utility able to perform jailbreak operations on devices running iOS 6 and 7.

A consequence of the procedure is the removal of several limitations imposed by Apple, allowing users to install software that is not approved by the company and switch phone carriers seamlessly.

evasi0n became a success just days after its first release.

Supposedly, a few million copies have been downloaded in a very short period, which is not necessarily an indication of its efficiency, but sure says a lot. Statistics aside, the general opinion (as stated by most users on the Internet) is that evasi0n is a trustworthy jailbreak application, one that has to offer everything and asks for nothing in return.

evasi0n is special because it can perform an untethered jailbreak operation, which translates into the fact that the iOS device will be able to reboot without requiring a connection with an external device.

The principle it relies on involves a number of complicated steps, most of which are related to exploiting several vulnerabilities that were overlooked by Apple. However, the process is completed silently, without user intervention.

This is the main reason why evasi0n is considered one of the most easy-to-use and accessible applications of its type. It’s not pretentious as far as OS requirements are concerned, nor does it require advanced configurations.

In order for the jailbreak operation to be successful, you need to equip your system with iTunes and connect your iPhone, iPad or iPod to the computer via a USB cable.

It is also recommended that you backup the device in case something goes wrong.

Once you’ve completed these steps, you can proceed with the jailbreak operation, which, if free of errors, shouldn’t take more than five minutes. However, if the process fails, simply reboot the device and relaunch evasi0n.

On an ending note, this is a well-built jailbreak software, easy to use and user-friendly. Nevertheless, a backup operation is vital in case anything goes wrong.

windows versions:

https://www.softpedia.com/get/Mobile-Phone-Tools/IPhone/evasi0n.shtml

https://www.softpedia.com/downloadTag/jailbreak

linux version:

https://www.mediafire.com/file/21zlxh81cqtqqgb/evasi0n-linux-1.0-3c53ba10e2448d311b0f4157f2d7eb568f106c4f-release.tar+%281%29.lzma

phoenixpwn.com


jailbreak works only on 32-bit devices, which includes :
  • iPhone 4S, 5C and 5
  • iPad 2, 3, 4
  • iPad Mini 1
  • iPod Touch 5
https://phoenixpwn.com/ -> you will need an apple id associated with the device?

https://youtu.be/6I8V-BRx2hk

https://twitter.com/saurik/status/1119211957188345856

for older devices and firmwares (iOS 5.1.X)


„RedSn0w actually evolved from the Jailbreaking tool Quickpwn, which was an early Jailbreaking tool used to Jailbreak the 2nd generation of iOS. Nowadays RedSn0w can be used to Jailbreak a lot of versions of iPhone, iPod Touch and iPad.“ … but not all, iPad 4 seems not supported.

RedSn0w iPhone Support:


iPhone 6s Plus: Not Supported
iPhone 6s: Not Supported
iPhone 6 Plus: Not Supported
iPhone 6: Not Supported
iPhone 5s: Not Supported
iPhone 5c: Not Supported
iPhone 5: Not Supported
iPhone 4S: iOS 5 (iOS 5.1.1, iOS 5.0.1, iOS 5.0)
iPhone 4: iOS 6 (iOS 6.0,6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (iOS 3.1.3)
iPhone 3GS: iOS 6 (iOS 6.0, 6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
iPhone 3G: iOS 4 (4.3.4, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)

RedSn0w iPad Support:


iPad Pro: Not Supported
iPad Air 2: Not Supported
iPad Air: Not Supported
iPad Mini 4: Not Supported
iPad Mini 3: Not Supported iPad Mini 2: Not Supported
iPad Mini: Not Supported
iPad 4: Not Supported <- argh!
iPad 3: iOS 5 (iOS 5.1.1) <- RedSn0w told me „Ipad 3 is not supported“, probably it has a newer iOS installed than 5.1.1)
iPad 2: iOS 5 (iOS 5.1.1, 5.0.1)
iPad 1: iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (iOS 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.1) + iOS 3 (iOS 3.2.2)

src: http://www.ijailbreak.com/redsn0w/

PwnageTool 4.3 Info

http://public.stuff.hu/pwnagetool/PwnageTool_4.3.dmg

Method 2: Get Out of DFU Mode on iPhone/iPad/iPod touch with PhoneRescue


Click here to download PhoneRescue free version!

Step 1: Launch PhoneRescue on your computer > Connect your iOS device to your computer with a USB cable > Wait for PhoneRescue to recognize your iOS device.

Step 2: Click on „Exit Ramdisk Mode“ at the bottom of the Homepage.

other jailbreaking tools:

links:


https://www.antid0te.com/

https://www.sektioneins.de/

http://www.ijailbreak.com/jailbreak-software/

https://www.theiphonewiki.com/wiki/I0n1c

tweets:


https://twitter.com/angelXwind

\#linux #gnu #gnulinux #opensource #administration #sysops #apple #ipad #phone #jailbreak
Quelle: https://dwaves.org/2019/05/12/2019-status-of-jailbreak-apple-devices-tools-overview-trying-to-unlock-ipad-3-and-ipad-4/
2019 status of jailbreak apple devices tools overview – trying to unlock ipad 3 and ipad 4
 

Free/Libre Technologies, Arts and the Commons Conference


Happening end of #May in #Nicosia, #Cyprus. Stallman will be there too (first time in CY) on the 30th. Yours truly will give a short talk on the 31st.

Scroll down for the schedule.

https://unconference.futureworldscenter.org/

#events #gnu #linux #freedom #freesoftware #freeculture #stallman
 

Free/Libre Technologies, Arts and the Commons Conference


Happening end of #May in #Nicosia, #Cyprus. Stallman will be there too (first time in CY) on the 30th. Yours truly will give a short talk on the 31st.

Scroll down for the schedule.

https://unconference.futureworldscenter.org/

#events #gnu #linux #freedom #freesoftware #freeculture #stallman
 
Image/Photo
Finally I got to upgrade the Gnu/Linux distro on my computer. Because there was some problems with my I initially reverted to the old version back when the new one was released. But I really do not fancy using a desktop that do not have access to security updates. So after I saw that the problems seemed to be solved with my daughters Wacom I tried again yesterday.

As usual I had to pick a fight with some of the things that didn't work as perfect as I wanted them to. #Kwallet again, but at least this time I got an idea about what was wrong and have fixed it. I also have a working #Wacom tablet and I am on the track of the last missing bits. A good feeling and I have not been using too much time... plus every time I get a bit wiser.

So why use Linux when you are a graphic artist? When I talk to other people working with with computer graphic they are almost frightened by the thought of a person who do not pay his Adobe-tax. I have been using Gnu/Linux since #1999, but it took me some years to move all my activities to the platform. From my work with print making and painting I knew that it was not the machines that made art, so I moved as soon as I could. And when the finance-crisis destroyed the art-market I moved from handmade art to digital without much worry.

One of the people I have been inspired by is the French comic artist and illustrator, David #Revoy. Here he explains his way from the expensive commercial software to open source software:



I use the #Mageia Linux distribution - I know that it would be easier to just go for Mint or Ubuntu, but I am crazily loyal. I always used the #KDE windows manager, and in that I am also crazily loyal, so now I am struggling with #Plasma. Since I installed #Mandrake Linux for the first time 20 years ago on my wife's newly bought laptop, I have been reading through 1000 flame wars concerning different aspects of this free community, but personally I really just feel cheered up by all the creativity leading to so many different WMs, package managers, text editors, IMs and video-players.

#DavidRevoy #Krita #Inkscape #Blender #gnu #linux #opensource #foss
 
Image/Photo

Designing Posters With Free Software

A few months back I was asked to design some poster for a local Free Software Foundation Event. ... Although many artists successfully use Free Software to create artworks, I repeatedly encounter many comments in discussion forums claiming that free software is not made for creative work. This post is also my effort in spreading awareness that one can do professional work with the help of F/LOSS tools.
#freedom #free-software #foss #floss #fsf #gnu #libre #art #design #poster #krita #scribus #inkscape
 
Image/Photo

Designing Posters With Free Software

A few months back I was asked to design some poster for a local Free Software Foundation Event. ... Although many artists successfully use Free Software to create artworks, I repeatedly encounter many comments in discussion forums claiming that free software is not made for creative work. This post is also my effort in spreading awareness that one can do professional work with the help of F/LOSS tools.
#freedom #free-software #foss #floss #fsf #gnu #libre #art #design #poster #krita #scribus #inkscape
 
#gnu #linux #software #os #informatica #computers

I + You + We = Linux ❤️🐧

YouTube: I You We = Linux.mp4 (Алексей Черников)

 

GNU Nano 4.0


2019 March 24 - GNU nano 4.0 "Thy Rope of Sands" An overlong line is no longer automatically hard-wrapped. Smooth scrolling (one line at a time) has become the default. A newline character is no…

HN Discussion: https://news.ycombinator.com/item?id=19476526
Posted by snird (karma: 327)
Post stats: Points: 124 - Comments: 76 - 2019-03-24T14:30:15Z

\#HackerNews #gnu #nano
Article content:

2019 March 24 - GNU nano 4.0 "Thy Rope of Sands"
\* An overlong line is no longer automatically hard-wrapped. 
 \* Smooth scrolling (one line at a time) has become the default. 
 \* A newline character is no longer automatically added at end of buffer. 
 \* The line below the title bar is by default part of the editing space. 
 \* Option --breaklonglines (-b) turns automatic hard-wrapping back on. 
 \* Option --jumpyscrolling (-j) gives the chunky, half-screen scrolling. 
 \* Option --finalnewline (-f) brings back the automatic newline at EOF. 
 \* Option --emptyline (-e) leaves the line below the title bar unused. 
 \* <Alt+Up> and <Alt+Down> now do a linewise scroll instead of a findnext. 
 \* Any number of justifications can be undone (like all other operations). 
 \* When marked text is justified, it becomes a single, separate paragraph. 
 \* Option --guidestripe=<number> draws a vertical bar at the given column. 
 \* Option --fill=<number> no longer turns on automatic hard-wrapping. 
 \* When a line continues offscreen, it now ends with a highlighted ">". 
 \* The halfs of a split two-column character are shown as "[" and "]". 
 \* A line now scrolls horizontally one column earlier. 
 \* The bindable functions ʼcutwordleftʼ and ʼcutwordrightʼ were renamed 
   to ʼchopwordleftʼ and ʼchopwordrightʼ as they donʼt use the cutbuffer. 
 \* The paragraph-jumping functions were moved from Search to Go-to-Line. 
 \* Option --rebinddelete is able to compensate for more misbindings. 
 \* Options --morespace and --smooth are obsolete and thus ignored. 
 \* The --disable-wrapping-as-root configure option was removed.

2018 November 11 GNU nano 3.2 "Het kromme hout" changes the default binding
for the linter to M-B so that the spell checker (^T) can
always be used, and changes (when linting) the text in the
title bar and the color of the status bar to make linting
mode more obvious. It also adds a bindable ʼzapʼ function
for deleting a line or marked region without changing the
cutbuffer, adds --zap to bind the and
keys to the zap function when something is marked, and
hard-binds <Alt+Del> to ʼzapʼ. Furthermore, it shows the
cursor also in the help viewer (when --showcursor is used),
renames the bindable functions ʼprevhistoryʼ to ʼolderʼ and
ʼnexthistoryʼ to ʼnewerʼ (update your nanorcs when needed),
reads the nanorc files also in restricted mode to allow
customization by the user (if this should not be allowed,
use --ignorercfiles in addition to --restricted), allows
in view mode to open also other files (if this should not
be allowed, use --restricted in addition to --view), makes
resizes respect a relative --fill again, no longer binds
F13...F15 by default, properly re-highlights a misspelled
word after invoking help in the internal spell checker,
and does not skip Unicode characters in string binds. 2018 September 18 GNU nano 3.1 "Je faisais des bonds comme ça!" fixes a
misbinding of ^H on some terminals and some systems,
does not leave stray stuff after the prompt upon exit
when having suspended nano while using --constantshow,
and does not allow to toggle to Replace in view mode. 2018 September 9 GNU nano 3.0 "Water Flowing Underground" speeds up the
reading of a file by seventy percent, roughly doubles the
speed of handling ASCII text, changes the way words at line
boundaries are deleted, makes <Ctrl+Delete> wipe the next
word and <Ctrl+Shift+Delete> the preceding word, binds M-Q
to ʼfindpreviousʼ by default (the Tabs-to-Spaces toggle is
placed on M-O, and the More-Space toggle is fully removed),
makes an external spell check undoable, shows the correct
number of lines on the status bar when opening multiple
files, removes the ʼformatterʼ command, removes the
ʼsearchagainʼ bindable function (M-W is now bound to
ʼfindnextʼ by default), moves the No-Convert toggle to the
Insert menu, removes the Backup and New-Buffer toggles from
the main menu (they remain in the Write-Out and Insert
menus, respectively), is more precise in what it accepts as
a rebindable key name, ignores any presses of before
a valid command keystroke, recognizes some more escape
sequences for modified editing-pad keys, does not hide
rcfile error messages on a Linux console, renames the
bindable functions ʼcopytextʼ to ʼcopyʼ and ʼuncutʼ to
ʼpasteʼ, and avoids a possible hang during a Full-Justify. 2018 June 2 GNU nano 2.9.8 "Espresso" brings the ability to filter the
buffer (or the marked region) through an external command
(^R^X and prefix the command with the pipe symbol, "|"), is
better at detecting and maintaining paragraphs, is able to
justify //-style comments, fixes a crash when the binding
of a key to a string lacks a closing quote, gives feedback
about the number of lines written also when prepending or
appending, and fixes a couple of bugs with the linter. 2018 May 15 GNU nano 2.9.7 "Hvide Sande" adds the option ʼ--afterendsʼ
for making Ctrl+Right (the nextword function) stop at word
ends instead of beginnings, accepts multibyte letters for
the Yes/No/All answers, does emergency saves of changed
buffers in the unlikely event that nano crashes, adds the
until-now missing bindable function ʼlinenumbersʼ, and
renames the toggles ʼconstupdateʼ to ʼconstantshowʼ and
ʼcuttoendʼ to ʼcutfromcursorʼ, for consistency with the
corresponding options -- adjust your nanorc files soon. 2018 April 27 GNU nano 2.9.6 "Gomance" fixes a crash in word completion,
makes --enable-altrcname work again, improves the fluidity
of scrolling when using the touchpad, tweaks the syntaxes
for shell scripts and PO files, makes a replacing session
go always forward by default, no longer inserts a newline
after an external spell check of a selected region, always
accepts the English Y and N (and A) at a yes-no prompt in
any locale, and solves a few hypothetical bugs. 2018 March 29 GNU nano 2.9.5 "Kiša pada" changes the way the Scroll-Up
and Scroll-Down commands work (M-- and M-+): instead of
keeping the cursor in the same screen position they now
keep the cursor in the same text position (if possible).
This version further adds a new color name, "normal",
which gives the default foreground or background color,
which is useful when you want to undo some overzealous
painting by earlier syntax regexes. Bug fixes include:
a segfault when trying to insert a file in restricted
mode, the reading in of a new file being "undoable", a
slight miswrapping of help texts when --linenumbers was
used, and the shell syntax coloring the word "tar" in
file names. 2018 March 8 GNU nano 2.9.4 "Isabel" allows binding a key to a string
(any piece of text and/or commands), permits customizing
the color of error messages with ʼset errorcolorʼ, colors
those error messages by default in bright white on red,
makes at the bottom of the screen scroll just one
row when --smooth is used, does not fail when redoing a
file insertion, and cancels a Shift-selection when any
cursor key is pressed without Shift even when the cursor
cannot move. Further, it treats tabs fully the same as
spaces when doing automatic hard-wrapping, allows syntax
names to be unquoted, and removes two deprecated options
and six deprecated bindable function names. 2018 January 29 GNU nano 2.9.3 "Córdoba" fixes a segfault with trimblanks
that could occur when a typed space caused the word after
it to be pushed to the next line. It further makes macros
work also when your keyboard still emits escape sequences,
adds the options -M and --trimblanks for the command line,
recognizes key combos with Shift on a few more terminals,
no longer shows dots in certain prompt texts when visible
whitespace is turned on, fixes two corner cases when doing
replacements in a marked region, allows to open a named
pipe again when using --noread, and accurately detects
a needed color change when a line contains a start match
but not a corresponding end match any more. Plus some
other small fry. 2018 January 2 GNU nano 2.9.2 "Pussy Riot" correctly displays the Modified
state when undoing/redoing (also when the file was saved
somewhere midway), improves the undoing of an automatic
linefeed at EOF, fixes a build issue on the BSDs, shows
the cursor again when compiled with --withslang, renames
the option ʼjustifytrimʼ to ʼtrimblanksʼ because it will
now snip trailing whitespace also while you are typing
(and hard-wrapping is enabled), continues pushing words
to the next line much longer (when hard-wrapping), makes
and <Shift+Tab> indent and unindent a marked region,
allows unindenting when not all lines are indented, lets a
region marked with Shift persist when indenting/unindenting
or commenting/uncommenting it, and in those cases excludes
the last line of the region when it is not visibly marked
(which makes for a more intuitive behavior). 2017 November 27 GNU nano 2.9.1 "Damyatta" fixes a bug where, when the mark
is on, ^S would overwrite the file with just the marked
region. This release further clears the "Modified" flag
when all edits are undone, adds or updates some magic
strings, and does not forget when the cursor was last
at line 1, column 1. 2017 November 18 GNU nano 2.9.0 "Eta" introduces the ability to record and
replay keystrokes (M-: to start and stop recording, M-;
to play the macro back), makes ^Q and ^S do something
useful by default (^Q starts a backward search, and ^S
saves the current file), changes ^W to start always a
forward search, shows the number of open buffers (when
more than one) in the title bar, no longer asks to press
Enter when there are errors in an rc file, retires the
options ʼ--quietʼ and ʼset quietʼ and ʼset backwardsʼ,
makes indenting and unindenting undoable, will look in
$XDG_CONFIG_HOME for a nanorc file and in $XDG_DATA_HOME
for the history files, adds a history stack for executed
commands (^R^X), does not overwrite the position-history
file of another nano, and fixes a score of tiny bugs. 2017 August 27 GNU nano 2.8.7 "Fragrance" fixes a lockup when tabs are
wider than the screen, makes indenting + unindenting
more predictable by retaining relative indentations,
allows pasting (^U) at a prompt, allows triple quotes
in Python to not be followed by a character, does not
scroll three pages on a roll of the mouse wheel, binds
Alt+Up and Alt+Down to findprevious and findnext, and
fixes some hard-to-describe issues with softwrapping
and boundary-crossing tabs. Enjoy. 2017 July 21 GNU nano 2.8.6 "Kekulé" offers a new feature: the ability
to do softwrapping between words -- at whitespace --
instead of always at the edge of the screen. This can
be activated with -a or --atblanks or ʼset atblanksʼ
together with the softwrap option. This release further
fixes a handful of rare display glitches, fixes a build
failure on AIX, harmonizes the quoting rules in the rc
files, and renames the option ʼcutʼ to ʼcutfromcursorʼ
(please update your nanorc files before 2020). 2017 June 25 GNU nano 2.8.5 "Farouche" avoids a crash when waking from
a suspension that was induced from the outside, allows
negative line and column numbers on the command line,
avoids some flickering when resizing the screen while
in the file browser, opens files in the order they were
mentioned on the command line, and does not pretend to
have woken from suspension when receiving a SIGCONT. 2017 May 21 GNU nano 2.8.4 "Our Version of Events" includes the nanorc
man page again. 2017 May 18 GNU nano 2.8.3 "Hirsch" fixes a misplacement of the spotlight
during interactive replacing, avoids build failures on AIX
and Solaris, fixes a crash on Solaris, speeds up backwards
searching, improves PHP syntax highlighting, and no longer
asks "save anyway?" when the user ^Q discards the buffer. 2017 May 4 GNU nano 2.8.2 "Krats" adds another new feature: it makes
the ^G help texts searchable with ^W. Apart from that,
it fixes a crash when resizing the window in the middle
of verbatim input, avoids an unlikely crash when used
without UTF-8 support in some locales, avoids redrawing
the screen twice when switching between buffers while
line numbers are active, and works around a coloring
bug on musl. Plus tweaks to the documentation; plus
translation updates for fifteen languages. 2017 April 12 GNU nano 2.8.1 "Ellert" fixes build failures on MacOS and
on musl, fixes scrolling problems in softwrap mode when
double-width characters on row boundaries are involved,
shows double-width characters as ">" and "<" when split
across two rows, moves the cursor more predictably (at
the cost of sometimes putting it on the second "half"
of a character), avoids creating lines that consist of
only blanks when using autoindent, makes ^Home and ^End
go to the start and end of the file (on terminals that
support those keystrokes), places the cursor better when
linting, lets the linter ask only once whether to open
an included file, and adds bindings for ^Up and ^Down
in the file browser. Donʼt sit on your hands. 2017 March 31 GNU nano 2.8.0 "Axat" makes it easier to move around in
softwrapped lines: the Up and Down keys now step from
visual row to visual row instead of jumping between
logical lines, and the Home and End keys now move to
the start and end of a row, and only when already
there, then to the start and end of the logical line.
Furthermore, the screen can now scroll per row instead
of always per logical line. On an entirely different
front: nano now makes use of gnulib, to make it build
on more platforms. In short: there were many internal
changes, not many user-visible ones (apart form the
new softwrap navigation). The conversion to gnulib
was done by Mike Frysinger, the softwrap overhaul by
David Ramsey. 2017 February 23 GNU nano 2.7.5 "Nijntje" can properly search and replace
the \B and \b regex anchors, correctly repaints things
when multiline regexes with identical start and end are
involved, fixes a crash with zero-length regex matches,
does replacements at the edges of a marked region right,
no longer hides double-width characters at the head of
softwrapped rows, displays at most three warnings at
startup, and documents the ability to read a file from
standard input. Come tickle my ears. 2017 January 10 GNU nano 2.7.4 "Red dress" undoes deletions in an orderly
manner again (bug was introduced in previous version),
sets the preferred x position for vertical movements
more consistently, avoids some scrolling problems in
softwrap mode, installs the Info manual also when your
system lacks ʼmakeinfoʼ, and corrects the behavior of
the beginning-of-word anchor (\<) in regex searches. 2016 December 28 GNU nano 2.7.3 "Ontbijtkoek" wipes away a handful of bugs:
your editor is now able to handle filenames that contain
newlines, avoids a brief flash of color when switching
between buffers that are governed by different syntaxes,
makes the Shift+Ctrl+Arrow keys select text again on a
Linux console, is more resistant against malformations
in the positionlog file, and does not crash when ^C is
typed on systems where it produces the code KEY_CANCEL.
Oh, and it no longer mistakenly warns about editing an
unlocked file just after saving a new one. Thatʼs it.
Tastes great with thick butter. 2016 December 12 GNU nano 2.7.2 "Shemesh! Shemesh!" brings another feature:
the ability to complete with one keystroke (^] by default)
a fragment of a word to a full word existing elsewhere in
the current buffer. Besides, this release fixes two bugs
related to using line numbers in softwrap mode, allows to
use the PageUp and PageDown keys together with Shift on
VTE-based terminals, stops the help lines from flickering
during interactive replacing, makes a ʼset fillʼ override
an earlier ʼset nowrapʼ, properly restores the selected
region after an external spell check, and improves a few
other tidbits. If you should find any more bugs, please
run ʼman nano | grep bugsʼ and report them there. 2016 October 29 GNU nano 2.7.1 "Leuven" adds an often-asked-for feature: the
ability to display line numbers beside the text. This can
be activated with -l or --linenumbers on the command line,
or with ʼset linenumbersʼ in your nanorc, or toggled with
M-#. The coloring of these numbers can be chosen via the
option ʼset numbercolorʼ. This release furthermore fixes
some bugs with scrolling in softwrap mode, is more strict
in the parsing of key rebindings, and marks a new buffer
as modified when the output of a command (^R ^X) has been
read into it. Come and check it out! 2016 September 1 GNU nano 2.7.0 "Suni" adds a new feature: allowing text to be
selected by holding Shift together with the cursor keys.
Besides that, nano now works also when run in very tiny
terminals (down to one line, one column), and improves
the handling of the prompt in cramped spaces. Not much,
but itʼs time to get it out there. With this release we return to GNU. For just a little while
we dreamt we were tigers. But we are back in the herd,
back to a healthy diet of fresh green free grass. 2016 August 10 nano 2.6.3 "Marika" makes the Ctrl+Arrow keys work also on
a Linux virtual console, takes as verbatim only the very
first keystroke after M-V, removes any lock files that it
holds when dying, doesnʼt abort when a word contains digits
(when using the default speller), fixes a small sorting bug
in the file browser, makes searching case-insensitively in
a UTF-8 locale a little faster, and doesnʼt enter invalid
bytes when holding down both Alt keys. Santé! 2016 July 28 nano 2.6.2 "Le vent nous portera" adds two new features: the
keystrokes Ctrl+Up and Ctrl+Down for jumping between blocks
of text, and the option ʼwordcharsʼ for specifying which
characters (beside alphanumeric ones) should be considered
word-forming. Further, it provides feedback during Unicode
input (M-V followed by a six-digit hexadecimal number which
must start with 0 or 10), avoids a crash when resizing the
window during Verbatim input, doesnʼt drop a keystroke after
having been suspended, and replaces the beginning-of-line
anchor (^) just once per line. There are also several tiny
improvements in screen rendering and key handling.
Come get your hair tousled! 2016 June 27 nano 2.6.1 "Stampede" is chiefly a translation update, but also
adds one little feature (the ability to use negative numbers
with Go To Line: -1 meaning the first line from the bottom),
includes syntax highlighting for Rust, and fixes three tiny
bugs (but in such far corners of the editor that they arenʼt
even worth mentioning). 2016 June 17 nano 2.6.0 "Rubicon" fixes more than fifty little bugs -- and
some of them not so little. It improves moving about in
the file browser, corrects failings of the internal spell
checker, adds a new feature (comment/uncomment lines, with
default binding M-3), makes some error messages clearer,
shows more of a file when positionlog is used and the cursor
is near the end, displays all error messages at startup if
there are multiple ones, does not misinterpret keystrokes
when typing very fast, is less eager to trim the filename
on narrow terminals, speeds up case-insensitive searches,
and allows to abort re-searches. Among bunches of other
things. It is worth the trouble to upgrade. And, with this release, we take leave of the herd...
Bye! And thanks for all the grass!


HackerNewsBot debug: Calculated post rank: 108 - Loop: 144 - Rank min: 100 - Author rank: 59
 
Later posts Earlier posts