Feed aggregator

FSF Announces the LibrePhone Project

Slashdot.org - Wed, 10/15/2025 - 05:00
The Free Software Foundation (FSF) has launched the LibrePhone Project, an initiative to create a fully free and open-source mobile operating system that eliminates proprietary firmware and binary blobs. From the FSF: "Librephone is a new initiative by the FSF with the goal of bringing full freedom to the mobile computing environment. The vast majority of software users around the world use a mobile phone as their primary computing device. After forty years of advocacy for computing freedom, the FSF will now work to bring the right to study, change, share, and modify the programs users depend on in their daily lives to mobile phones. ... Practically, Librephone aims to close the last gaps between existing distributions of the Android operating system and software freedom. The FSF has hired experienced developer Rob Savoye (DejaGNU, Gnash, OpenStreetMap, and more) to lead the technical project. He is currently investigating the state of device firmware and binary blobs in other mobile phone freedom projects, prioritizing the free software work done by the not entirely free software mobile phone operating system LineageOS." The project site can be found here.

Read more of this story at Slashdot.

Box86/box64 - Hackaday

Linux News - Wed, 10/15/2025 - 03:01
Box86/box64  Hackaday
Categories: Linux

Factorio Running On Mobile - Hackaday

Linux News - Wed, 10/15/2025 - 03:00
Categories: Linux

Common Yeast Can Survive Martian Conditions

Slashdot.org - Wed, 10/15/2025 - 02:00
A new study shows that common baker's yeast (Saccharomyces cerevisiae) can survive Mars-like conditions, including meteorite shock waves and toxic perchlorate salts found in Martian soil. Phys.org reports: Published in PNAS Nexus, Purusharth I. Rajyaguru and colleagues subjected Saccharomyces cerevisiae, which is a widely used model yeast, to shock waves and perchlorates. The authors chose the yeast in part because it has already been studied in space. When stressed, yeast, humans, and many other organisms form ribonucleoprotein (RNP) condensates, structures made of RNA and proteins that protect RNA and affect the fates of mRNAs. When the stressor passes, the RNP condensates, which include subtypes known as stress granules and P-bodies, disassemble. The authors simulated Martian shock waves at the High-Intensity Shock Tube for Astrochemistry (HISTA) housed in the Physical Research Laboratory in Ahmedabad, India. Yeast exposed to 5.6 Mach intensity shock waves survived with slowed growth, as did yeast subjected to 100 mM sodium salt of perchlorate (NaClO4) -- a concentration similar to that in Martian soils. Yeast cells also survived exposure to the combined stress of shock waves and perchlorate stress. In both cases, the yeast assembled RNP condensates. Shock waves induced the assembly of stress granules and P-bodies; perchlorate caused yeast to make P-bodies but not stress granules. Mutants incapable of assembling RNP condensates were poor at surviving the Martian stress condition. Transcriptome analysis identified specific RNA transcripts perturbed by Mars-like conditions.

Read more of this story at Slashdot.

'Save Our Signs' Preservation Project Launches Archive of 10,000 National Park Signs

Slashdot.org - Tue, 10/14/2025 - 22:30
An anonymous reader quotes a report from 404 Media: On Monday, a publicly-sourced archive of more than 10,000 national park signs and monument placards went public as part of a massive volunteer project to save historical and educational placards from around the country that risk removal by the Trump administration. Visitors to national parks and other public monuments at more than 300 sites across the U.S. took photos of signs and submitted them to the archive to be saved in case they're ever removed in the wake of the Trump administration's rewriting of park history. The full archive is available here, with submissions from July to the end of September. The signs people have captured include historical photos from Alcatraz, stories from the African American Civil War Memorial, photos and accounts from the Brown v. Board of Education National History Park, and hundreds more sites. "I'm so excited to share this collaborative photo collection with the public. As librarians, our goal is to preserve the knowledge and stories told in these signs. We want to put the signs back in the people's hands," Jenny McBurney, Government Publications Librarian at the University of Minnesota and one of the co-founders of the Save Our Signs project, said in a press release. "We are so grateful for all the people who have contributed their time and energy to this project. The outpouring of support has been so heartening. We hope the launch of this archive is a way for people to see all their work come together."

Read more of this story at Slashdot.

AVATARSLOT88 – Pola Slot Demo Hari Ini Tes Strategi Gacor Sebelum Main Asli

dancingpenguinsoflight.com - Tue, 10/14/2025 - 22:16

Banyak pemain slot online di AVATARSLOT88 yang penasaran: apakah pola slot demo bisa membantu menang di versi asli? Jawabannya — ya, bisa banget! Tapi tentu dengan pemahaman yang tepat tentang cara membaca pola slot demo hari ini, mengenali jam gacor demo, dan menyesuaikan strategi spin. Artikel ini akan membahas secara mendalam bagaimana kamu bisa memanfaatkan mode demo untuk menemukan “pola gacor” tanpa kehilangan saldo sepeser pun.

Mengapa Harus Coba Pola Slot Demo Sebelum Main Asli?

Bermain di mode demo bukan hanya untuk bersenang-senang, tapi juga menjadi langkah cerdas untuk menguji strategi kemenangan.
Banyak pemain profesional menggunakan pola slot demo untuk mengamati ritme spin, volatilitas game, dan seberapa sering simbol scatter muncul.

Selain itu, slot demo membantu kamu memahami fitur bonus seperti free spin, buy feature, hingga multiplier, tanpa tekanan kehilangan uang sungguhan.

Contoh nyata: Seorang pemain di komunitas slot Thailand mengaku mencoba 5 pola spin berbeda di versi demo Sweet Bonanza. Setelah menemukan pola stabil (turun scatter tiap 20 spin), ia terapkan di versi asli — dan hasilnya, profit 400% dalam 2 jam.

Pola Terbaru Slot Demo Hari Ini

Berdasarkan pengamatan banyak pemain dan data komunitas, ada beberapa pola spin demo yang terbukti sering memunculkan scatter dan kombinasi besar.

1. Pola Spin Naik-Turun (Progressive Pattern)

Strategi ini memanfaatkan variasi jumlah spin otomatis dengan pola 10-30-50.

  • Langkah 1: Jalankan 10 spin otomatis.
  • Langkah 2: Tambah ke 30 spin, lalu 50 spin jika tanda scatter mulai sering muncul.
  • Langkah 3: Hentikan sesaat, lalu ulangi lagi dari awal.

Pola ini cocok untuk slot volatilitas sedang seperti Gates of Olympus atau Sugar Rush.

2. Pola Manual 10x Turbo – 5x Normal

Kombinasi ini memberi efek “reset ritme RNG”. Banyak yang melaporkan pola slot demo ini efektif meningkatkan peluang free spin dalam 50 kali percobaan.

Berdasarkan tes komunitas pemain Pragmatic Play, Sweet Bonanza Xmas menunjukkan scatter lebih cepat muncul setelah 3 siklus pola ini.

Jam Gacor Berdasarkan Data Pemain

Jam bermain ternyata juga berpengaruh terhadap performa slot demo. Meskipun hasil tidak selalu sama, data komunitas menunjukkan beberapa jam gacor demo yang patut dicoba:

Waktu Persentase Scatter Muncul Catatan 00.00 – 02.00 79% Waktu paling aktif server global 10.00 – 13.00 68% Cocok untuk uji pola di siang hari 20.00 – 23.00 72% Jam santai, sering muncul big win Kenapa Jam Gacor Bisa Berbeda?

Server slot memiliki frekuensi RTP (Return to Player) dinamis. Jadi, walau jam gacor demo bisa menjadi acuan, hasilnya tetap tergantung pada RNG (Random Number Generator).

Namun, banyak pemain yang berhasil mencocokkan pola spin mereka dengan waktu server aktif — hasilnya jauh lebih konsisten.

Tips Uji Pola Slot Demo Agar Lebih Akurat 1. Catat Setiap Pola yang Kamu Coba

Gunakan spreadsheet sederhana untuk mencatat:

  • Nama game
  • Jumlah spin sebelum scatter muncul
  • Pola spin (manual, turbo, auto)
  • Jam bermain

Data ini berguna untuk melihat tren. Misalnya, jika scatter sering muncul antara spin ke-20 hingga 40, kamu bisa menggunakannya sebagai indikator timing gacor.

2. Gunakan Fitur Buy Feature Secara Terukur

Jika slot demo memiliki fitur Buy Feature, gunakan untuk mengetahui seberapa sering free spin menghasilkan multiplier besar. Ini berguna untuk menilai potensi slot sebelum bermain dengan uang asli.

3. Fokus pada 1–2 Game per Sesi

Jangan berpindah terlalu cepat. Uji minimal 100–200 spin per game agar hasil pola slot demo yang kamu dapat benar-benar valid.

Baca Juga : imbajp Slot Demo Gacor: Main Gratis Tapi Sensasi Maxwin!

Apakah Pola Demo Bisa Dipakai di Slot Real?

Pertanyaan ini sering muncul di komunitas slot online. Jawabannya: bisa, tapi tidak 100% identik.

Penjelasan:

Slot demo dan slot real biasanya menggunakan mesin RNG (Random Number Generator) yang sama. Namun, setting RTP dan volatilitasnya bisa sedikit berbeda, tergantung operator dan penyedia game.

Jadi, pola yang kamu temukan di demo tetap relevan — tapi anggap sebagai simulasi prediksi, bukan jaminan mutlak.

Strategi Lanjutan: Gunakan Pola Demo untuk Membangun Insting Bermain

Selain data dan angka, insting juga penting. Dengan sering mencoba pola slot demo hari ini, kamu melatih kepekaan terhadap:

  • Irama simbol jatuh
  • Timing terbaik untuk ganti mode spin
  • Tanda-tanda scatter akan muncul (misalnya suara atau animasi tertentu)

Pemain berpengalaman menyebut ini sebagai “feeling slot gacor” — kemampuan membaca momentum game.

Contoh Pola Gacor Berdasarkan Data Terbaru Nama Slot Pola Gacor Terbukti Jam Gacor Gates of Olympus 10x turbo – 20x auto – 5x manual 01.00 – 03.00 Starlight Princess 15x turbo – 10x manual 11.00 – 13.00 Sweet Bonanza 30x auto – stop – 10x manual 20.00 – 22.00

Data ini diambil dari hasil uji 500 spin oleh komunitas slot Asia pada bulan ini.

Kesimpulan: Uji Pola Slot Demo Hari Ini Sebelum Main Asli

Bermain di mode demo bukan sekadar hiburan — tapi strategi cerdas untuk membaca ritme kemenangan.
Dengan memahami pola slot demo, mencoba berbagai pola spin demo, dan memperhatikan jam gacor demo, kamu bisa menyusun rencana bermain yang lebih efisien sebelum turun ke mode uang asli.

Ingat, kemenangan besar sering datang dari persiapan matang, bukan sekadar keberuntungan. Jadi jangan takut bereksperimen dan temukan “pola sakti” versimu sendiri hari ini!

Categories: LAMP, Linux, SysAdmin

DOJ Seizes $15 Billion In Bitcoin From Massive 'Pig Butchering' Scam Based In Cambodia

Slashdot.org - Tue, 10/14/2025 - 21:02
The U.S. Department of Justice seized about $15 billion in bitcoin from wallets tied to Chen Zhi, founder of Cambodia's Prince Holding Group, who is accused of running one of the world's biggest "pig butchering" scams. Prosecutors say Zhi's network trafficked people into forced-labor scam compounds that defrauded victims worldwide through fake crypto investment schemes. CNBC reports: The seizure is the largest forfeiture action by the DOJ in history. An indictment charging the alleged pig butcher, Chen Zhi, was unsealed Tuesday in federal court in Brooklyn, New York. Zhi, who is also known as "Vincent," remains at large, according to the U.S. Attorney's Office for the Eastern District of New York. He was identified in court filings as the founder and chairman of Prince Holding Group, a multinational business conglomerate based in Cambodia, which prosecutors said grew "in secret .... into one of Asia's largest transnational criminal organizations. [...] The scams duped people contacted via social media and messaging applications online into transferring cryptocurrency into accounts controlled by the scheme with false promises that the crypto would be invested and produce profits, according to the office. "In reality, the funds were stolen from the victims and laundered for the benefit of the perpetrators," the release said. "The scam perpetrators often built relationships with their victims over time, earning their trust before stealing their funds." Prosecutors said that hundreds of people were trafficked and forced to work in the scam compounds, "often under the threat of violence." Zhi and a network of top executives in the Prince Group are accused of using political influence in multiple countries to protect their criminal enterprise and paid bribes to public officials to avoid actions by law enforcement authorities targeting the scheme, according to prosecutors.

Read more of this story at Slashdot.

Secure Boot Bypass Risk Threatens Nearly 200,000 Linux Framework Laptops

Linux.Slashdot.org - Tue, 10/14/2025 - 20:25
Roughly 200,000 Linux-based Framework laptops shipped with a signed UEFI shell command (mm) that can be abused to bypass Secure Boot protections -- allowing attackers to load persistent bootkits like BlackLotus or HybridPetya. Framework has begun patching affected models, though some fixes and DBX updates are still pending. BleepingComputer reports: According to firmware security company Eclypsium, the problem stems from including a 'memory modify' (mm) command in legitimately signed UEFI shells that Framework shipped with its systems. The command provides direct read/write access to system memory and is intended for low-level diagnostics and firmware debugging. However, it can also be leveraged to break the Secure Boot trust chain by targeting the gSecurity2 variable, a critical component in the process of verifying the signatures of UEFI modules. The mm command can be abused to overwrite gSecurity2 with NULL, effectively disabling signature verification. "This command writes zeros to the memory location containing the security handler pointer, effectively disabling signature verification for all subsequent module loads." The researchers also note that the attack can be automated via startup scripts to persist across reboots.

Read more of this story at Slashdot.

Categories: Linux

Secure Boot Bypass Risk Threatens Nearly 200,000 Linux Framework Laptops

Slashdot.org - Tue, 10/14/2025 - 20:25
Roughly 200,000 Linux-based Framework laptops shipped with a signed UEFI shell command (mm) that can be abused to bypass Secure Boot protections -- allowing attackers to load persistent bootkits like BlackLotus or HybridPetya. Framework has begun patching affected models, though some fixes and DBX updates are still pending. BleepingComputer reports: According to firmware security company Eclypsium, the problem stems from including a 'memory modify' (mm) command in legitimately signed UEFI shells that Framework shipped with its systems. The command provides direct read/write access to system memory and is intended for low-level diagnostics and firmware debugging. However, it can also be leveraged to break the Secure Boot trust chain by targeting the gSecurity2 variable, a critical component in the process of verifying the signatures of UEFI modules. The mm command can be abused to overwrite gSecurity2 with NULL, effectively disabling signature verification. "This command writes zeros to the memory location containing the security handler pointer, effectively disabling signature verification for all subsequent module loads." The researchers also note that the attack can be automated via startup scripts to persist across reboots.

Read more of this story at Slashdot.

NordVPN Embraces Open Source By Releasing Its Linux GUI On GitHub

Linux.Slashdot.org - Tue, 10/14/2025 - 19:45
BrianFagioli shares a report from NERDS.xyz: NordVPN has open sourced its Linux GUI on GitHub, giving the community full access to the code behind its graphical client. The move follows a 70 percent surge in daily active Linux users since the GUI's debut earlier this year, showing clear demand for a user friendly VPN experience on the platform. Alongside the previously open sourced command line tool, the GUI codebase is now available for anyone to audit, modify, and contribute to. While NordVPN's core backend infrastructure remains proprietary, the company says the open source release reflects its commitment to transparency and collaboration with the Linux community. The GUI can also now be installed with a single command using Snap, simplifying setup and ensuring automatic updates across distributions.

Read more of this story at Slashdot.

Categories: Linux
Comment