10 interesting stories served every morning and every evening.




1 1,024 shares, 44 trendiness, 10008 words and 83 minutes reading time

github/dmca

youtube-dl - down­load videos from youtube.com or other video plat­forms

To in­stall it right away for all UNIX users (Linux, ma­cOS, etc.), type:

sudo curl -L https://​yt-dl.org/​down­loads/​lat­est/​youtube-dl -o /usr/local/bin/youtube-dl

sudo chmod a+rx /usr/local/bin/youtube-dl

If you do not have curl, you can al­ter­na­tively use a re­cent wget:

sudo wget https://​yt-dl.org/​down­loads/​lat­est/​youtube-dl -O /usr/local/bin/youtube-dl

sudo chmod a+rx /usr/local/bin/youtube-dl

Windows users can down­load an .exe file and place it in any lo­ca­tion on their PATH ex­cept for %SYSTEMROOT%\System32 (e.g. do not put in C:\Windows\System32).

You can also use pip:

sudo -H pip in­stall –upgrade youtube-dl

This com­mand will up­date youtube-dl if you have al­ready in­stalled it. See the pypi page for more in­for­ma­tion.

brew in­stall youtube-dl

sudo port in­stall youtube-dl

Alternatively, re­fer to the de­vel­oper in­struc­tions for how to check out and work with the git repos­i­tory. For fur­ther op­tions, in­clud­ing PGP sig­na­tures, see the youtube-dl Download Page.

youtube-dl is a com­mand-line pro­gram to down­load videos from YouTube.com and a few more sites. It re­quires the Python in­ter­preter, ver­sion 2.6, 2.7, or 3.2+, and it is not plat­form spe­cific. It should work on your Unix box, on Windows or on ma­cOS. It is re­leased to the pub­lic do­main, which means you can mod­ify it, re­dis­trib­ute it or use it how­ever you like.

youtube-dl [OPTIONS] URL [URL…]

-h, –help Print this help text and exit

–version Print pro­gram ver­sion and exit

-U, –update Update this pro­gram to lat­est ver­sion. Make

sure that you have suf­fi­cient per­mis­sions

(run with sudo if needed)

-i, –ignore-errors Continue on down­load er­rors, for ex­am­ple to

skip un­avail­able videos in a playlist

–abort-on-error Abort down­load­ing of fur­ther videos (in the

playlist or the com­mand line) if an er­ror

oc­curs

–dump-user-agent Display the cur­rent browser iden­ti­fi­ca­tion

–list-extractors List all sup­ported ex­trac­tors

–extractor-descriptions Output de­scrip­tions of all sup­ported

ex­trac­tors

–force-generic-extractor Force ex­trac­tion to use the generic

ex­trac­tor

–default-search PREFIX Use this pre­fix for un­qual­i­fied URLs. For

ex­am­ple gvsearch2:” down­loads two videos

from google videos for youtube-dl large

ap­ple”. Use the value auto” to let

youtube-dl guess (“auto_warning” to emit a

warn­ing when guess­ing). error” just throws

an er­ror. The de­fault value fixup_error”

re­pairs bro­ken URLs, but emits an er­ror if

this is not pos­si­ble in­stead of search­ing.

–ignore-config Do not read con­fig­u­ra­tion files. When given

in the global con­fig­u­ra­tion file

/etc/youtube-dl.conf: Do not read the user

con­fig­u­ra­tion in ~/.config/youtube-

dl/​con­fig (%APPDATA%/youtube-dl/config.txt

on Windows)

–config-location PATH Location of the con­fig­u­ra­tion file; ei­ther

the path to the con­fig or its con­tain­ing

di­rec­tory.

–flat-playlist Do not ex­tract the videos of a playlist,

only list them.

–mark-watched Mark videos watched (YouTube only)

–no-mark-watched Do not mark videos watched (YouTube only)

–no-color Do not emit color codes in out­put

–proxy URL Use the spec­i­fied HTTP/HTTPS/SOCKS proxy.

To en­able SOCKS proxy, spec­ify a proper

scheme. For ex­am­ple

socks5://​127.0.0.1:1080/. Pass in an empty

string (–proxy ”) for di­rect con­nec­tion

–socket-timeout SECONDS Time to wait be­fore giv­ing up, in sec­onds

–source-address IP Client-side IP ad­dress to bind to

-4, –force-ipv4 Make all con­nec­tions via IPv4

-6, –force-ipv6 Make all con­nec­tions via IPv6

–geo-verification-proxy URL Use this proxy to ver­ify the IP ad­dress for

some geo-re­stricted sites. The de­fault

proxy spec­i­fied by –proxy (or none, if the

op­tion is not pre­sent) is used for the

ac­tual down­load­ing.

–geo-bypass Bypass ge­o­graphic re­stric­tion via fak­ing

X-Forwarded-For HTTP header

–no-geo-bypass Do not by­pass ge­o­graphic re­stric­tion via

fak­ing X-Forwarded-For HTTP header

–geo-bypass-country CODE Force by­pass ge­o­graphic re­stric­tion with

ex­plic­itly pro­vided two-let­ter ISO 3166-2

coun­try code

–geo-bypass-ip-block IP_BLOCK Force by­pass ge­o­graphic re­stric­tion with

ex­plic­itly pro­vided IP block in CIDR

no­ta­tion

–playlist-start NUMBER Playlist video to start at (default is 1)

–playlist-end NUMBER Playlist video to end at (default is last)

–playlist-items ITEM_SPEC Playlist video items to down­load. Specify

in­dices of the videos in the playlist

sep­a­rated by com­mas like: –playlist-items

1,2,5,8″ if you want to down­load videos

in­dexed 1, 2, 5, 8 in the playlist. You can

spec­ify range: –playlist-items

1-3,7,10-13″, it will down­load the videos

at in­dex 1, 2, 3, 7, 10, 11, 12 and 13.

–match-title REGEX Download only match­ing ti­tles (regex or

case­less sub-string)

–reject-title REGEX Skip down­load for match­ing ti­tles (regex or

case­less sub-string)

–max-downloads NUMBER Abort af­ter down­load­ing NUMBER files

–min-filesize SIZE Do not down­load any videos smaller than

SIZE (e.g. 50k or 44.6m)

–max-filesize SIZE Do not down­load any videos larger than SIZE

(e.g. 50k or 44.6m)

–date DATE Download only videos up­loaded in this date

–datebefore DATE Download only videos up­loaded on or be­fore

...

Read the original on github.com »

2 427 shares, 35 trendiness, 822 words and 8 minutes reading time

Zoom Deleted Events Discussing Zoom “Censorship”

Zoom shut down a se­ries of events meant to dis­cuss what or­ga­niz­ers called censorship” by the com­pany.

The events were planned for Oct. 23, and were or­ga­nized in re­sponse to a pre­vi­ous can­cel­la­tion by Zoom of a San Francisco State University talk by Leila Khalid, a mem­ber of Popular Front for the Liberation of Palestine, a des­ig­nated ter­ror or­ga­ni­za­tion in the US. Khalid is best known for high­jack­ing two planes, one in 1969 and one in 1970.

Zoom told the Verge at the time that the Sept. 23 talk was in vi­o­la­tion of the com­pa­ny’s terms of ser­vice. The Verge also re­ported that the ac­tion was in re­sponse to pres­sure by Jewish and Israel lobby groups, such as The Lawfare pro­ject.

Following the Sept. 23 can­cel­la­tion, a group of aca­d­e­mics or­ga­nized a se­ries of events across the coun­try, as well as in Canada and the UK, which were meant to high­light the is­sue.

Campuses across North America are join­ing in the cam­paign to re­sist cor­po­rate and uni­ver­sity si­lenc­ing of Palestinian nar­ra­tives and Palestinian voices,” said the day of ac­tion event de­scrip­tion, which was meant to be held on Oct. 23.

The fol­low-up events did not in­clude Khalid pre­sent­ing. The event held in part by New York University, which was can­celed the day of, in­cluded a com­pi­la­tion of her pre­vi­ous state­ments, ac­cord­ing to a blog post on the in­ci­dent.

Khaled is un­der­go­ing med­ical treat­ment and was un­able to pro­vide a voice mes­sage for the oc­ca­sion,” the post stated.

Zoom is com­mit­ted to sup­port­ing the open ex­change of ideas and con­ver­sa­tions and does not have any pol­icy pre­vent­ing users from crit­i­ciz­ing Zoom,” a spokesper­son for the com­pany said. Zoom does not mon­i­tor events and will only take ac­tion if we re­ceive re­ports about pos­si­ble vi­o­la­tions of our Terms of Service, Acceptable Use Policy, and Community Standards. Similar to the event held by San Francisco State University, we de­ter­mined that this event was in vi­o­la­tion of one or more of these poli­cies and let the host know that they were not per­mit­ted to use Zoom for this par­tic­u­lar event.”

However, Zoom did not re­spond to ques­tions about which spe­cific pol­icy was vi­o­lated or whether other events have been shut down by the com­pany.

Adam Saeed, a stu­dent at University of Leeds, said he used his per­sonal Zoom ac­count to or­ga­nize the event. He told BuzzFeed News that the com­pany deleted his event and dis­abled his ac­count with­out ex­pla­na­tion. He con­tacted the com­pa­ny’s cus­tomer sup­port line, but said he has not yet heard back.

It can­not be a uni­lat­eral de­ci­sion say­ing, You vi­o­lated our terms of use,’ they have to prove that,” he said. We have to have the right to con­test this and pre­sent our case.”

Andrew Ross, a pro­fes­sor of so­cial and cul­tural analy­sis at NYU who or­ga­nized the event in con­junc­tion with the American Association of University Professors, called the sit­u­a­tion absurdist.”

Everyone work­ing in higher ed­u­ca­tion right now de­pends on Zoom and we can­not be in a po­si­tion of al­low­ing a cor­po­rate, third-party ven­dor to make these kinds of de­ci­sions,” Ross said. It’s sim­ply un­sus­tain­able.”

Ross added that he asked the tech worker who was help­ing or­ga­nize the event to check whether the link was ac­tive the night be­fore it was set to go live be­cause the event for the University of Hawaii had al­ready been af­fected. It was fine at that point, but by early af­ter­noon Friday, it had dis­ap­peared and there was no op­tion to re­store it.

Universities tend to get into these lu­cra­tive con­tracts with Zoom, and more or less handed over this very frag­ile power to de­cide what is ac­cept­able aca­d­e­mic speech and what is not,” said Ross. For those of us who work in the field of sup­port­ing and pro­tect­ing Palestinian rights, it’s no sur­prise to us that Palestinian speech is the first to be cracked down on.”

The NYU event even­tu­ally went on with Google Meet, but the ef­fort was in­ter­cepted by politically-motivated trolls,” Ross said, and the or­ga­niz­ers had to hold it pri­vately and then pub­lish the record­ing.

Cynthia Franklin, a pro­fes­sor at the University of Hawaii, also saw an event she or­ga­nized deleted by Zoom, but was un­able to find an al­ter­na­tive plat­form.

I know that I have free speech rights that are be­ing vi­o­lated,” she said, and a pri­vate en­tity is dic­tat­ing to my pub­lic uni­ver­sity what I can and can­not say.”

Katherine Franke, a pro­fes­sor at Columbia University who was a pan­elist at the NYU talk, has ex­pe­ri­enced events fo­cused on Palestive be­ing can­celed in the past and was re­cently de­ported from Israel. She sees Zoom’s re­ac­tion as an ex­ten­sion of old prob­lems.

I think it pre­sents a real chal­lenge for uni­ver­si­ties to think about how to pro­tect aca­d­e­mic free­dom in this con­text where we’re so de­pen­dent upon these in­ter­net-based ways of gath­er­ing and talk­ing about com­fort­able and un­com­fort­able ideas,” she said.

...

Read the original on www.buzzfeednews.com »

3 421 shares, 2 trendiness, 364 words and 4 minutes reading time

Don't Delete Facebook Or You'll Lose All Oculus Games For Good

If you have an Oculus VR head­set and were think­ing about delet­ing your Facebook ac­count in or­der to go off the so­cial me­dia grid, you may want to re­con­sider. If you com­pletely delete the Facebook ac­count linked to your Oculus de­vice, you will also lose ac­cess to all VR games you pur­chased. You won’t be able to get them back if you make a new ac­count, ei­ther.

You’re re­quired to link a Facebook ac­count when us­ing the Oculus Quest 2 head­set, and if your Facebook ac­count is­n’t in good stand­ing, you will not be able to use the Quest 2 at all. Because of this con­nec­tion, you must keep that ac­count to have ac­cess to the pur­chases you’ve made. You don’t nec­es­sar­ily have to link a Facebook ac­count yet on the older Oculus de­vices, in­clud­ing the first Quest, but as UploadVR pointed out, sup­port for sep­a­rate Oculus ac­counts ends in 2023 and then all users will need Facebook.

If you de­ac­ti­vate your Facebook ac­count in­stead of per­ma­nently delet­ing it, you also won’t be able to ac­cess any of your Oculus in­for­ma­tion. However, this can be re­versed by re­ac­ti­vat­ing it, while the dele­tion method does not have an undo.” If you make a new ac­count, you’ll have to pur­chase all that con­tent again.

Despite these re­stric­tions, Facebook has made its Quest plat­form quite en­tic­ing re­cently. The lat­est it­er­a­tion is less ex­pen­sive, lighter, and in­cludes a higher-res­o­lu­tion screen than its pre­de­ces­sor, along with a more-com­fort­able strap de­sign. With no more ver­sions of Oculus Rift be­ing made, the com­pany is all-in on the stand­alone head­set, which can also play PC-powered VR games via the Oculus Link ca­ble. That in­cludes high-end VR games like Half-Life: Alyx, es­sen­tially mean­ing you’ll only need one VR head­set un­less you’re in­ter­ested in play­ing PlayStation VR ex­clu­sives.

It’s also part­ner­ing with other game com­pa­nies to bring new block­buster games to the plat­form, in­clud­ing Medal of Honor: Above and Beyond from Respawn Entertainment and new Assassin’s Creed and Splinter Cell games from Ubisoft. There has not oth­er­wise been a Splinter Cell game of any sort since 2013.

...

Read the original on www.gamespot.com »

4 420 shares, 35 trendiness, 94 words and 1 minutes reading time

How Washington state crews destroyed first murder hornets nest in U.S.

Heavily pro­tected crews on Saturday dis­man­tled the first Asian gi­ant hor­net nest found in the U. S., the Washington State Department of Agriculture (WSDA) con­firmed in a state­ment de­clar­ing: Got em.”

The big pic­ture: The in­va­sive species com­monly re­ferred to as the murder hor­net,” typ­i­cally does­n’t harm hu­mans un­less pro­voked, though it has been known to kill peo­ple in Japan. The in­sect poses a ma­jor threat to lo­cal hon­ey­bee pop­u­la­tions. But the WSDA said in a state­ment that the nest re­moval appears to have been suc­cess­ful.”

Go deeper: The mur­der hor­nets are here

...

Read the original on www.axios.com »

5 377 shares, 22 trendiness, 75 words and 1 minutes reading time

It's Time To Admit It: The X.Org Server Is Abandonware

Michael Larabel is the prin­ci­pal au­thor of Phoronix.com and founded the site in 2004 with a fo­cus on en­rich­ing the Linux hard­ware ex­pe­ri­ence. Michael has writ­ten more than 20,000 ar­ti­cles cov­er­ing the state of Linux hard­ware sup­port, Linux per­for­mance, graph­ics dri­vers, and other top­ics. Michael is also the lead de­vel­oper of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org au­to­mated bench­mark­ing soft­ware. He can be fol­lowed via Twitter or con­tacted via MichaelLarabel.com.

...

Read the original on www.phoronix.com »

6 338 shares, 22 trendiness, 535 words and 6 minutes reading time

Hackers hijack and publish mental health data of hundreds of people

The Finns were stunned this Friday at the out­come of a scan­dal caused by the ex­tor­tion of a group of hack­ers to a pri­vate com­pany that pro­vides ser­vices as a psy­chother­apy cen­ter for the pub­lic health sys­tem.

In a coun­try that claims to be at the fore­front of dig­i­ti­za­tion and data se­cu­rity, the crim­i­nals man­aged to ac­cess the data­base of thou­sands of cus­tomers of the com­pany Vastaamo af­ter de­tect­ing vul­ner­a­bil­i­ties in their sys­tem.

According to its web­site, Vastaamo of­fers psy­cho­log­i­cal and psy­chi­atric treat­ment to pa­tients who suf­fer from dis­or­ders such as de­pres­sion and anx­i­ety. Many of the clients come from pub­lic ser­vices paid by the Finnish Social Security (Kela).

Extortionists de­manded around 450,000 eu­ros (in bit­coins) in ex­change for not pub­lish­ing the clin­i­cal and men­tal health data of thou­sands of peo­ple.

The crim­i­nals started to pub­lish the data of 100 peo­ple every day in the en­crypted web Tor two days ago. They claimed they would not stop un­til they re­ceived the money. As the com­pany was re­sist­ing to at­tend the de­mands of the hack­ers, per­sonal data of over 200 people - in­clud­ing mi­nors - have been re­leased on­line.

The in­for­ma­tion pub­lished could not be more sen­si­tive: it in­cluded the pa­tien­t’s name, per­sonal iden­ti­fi­ca­tion num­ber, tele­phone num­ber, email ad­dress and res­i­dence ad­dress, to­gether with the con­tent of the ther­apy ses­sions.

An un­known hos­tile party has been in con­tact with Vastaamo and claims to have ob­tained con­fi­den­tial in­for­ma­tion from the com­pa­ny’s cus­tomers. The Central Criminal Police launched a crim­i­nal in­ves­ti­ga­tion into the mat­ter. Im­me­di­ate no­ti­fi­ca­tions were also made to the Finnish Cyber ​​Security Center, Valvira and the Data Protection Commissioner. In ad­di­tion, Vastamo took im­me­di­ate steps to clar­ify the mat­ter in co­op­er­a­tion with ex­ter­nal and in­de­pen­dent se­cu­rity ex­perts,” the com­pany said in a press re­lease.

The data of an­other 100 peo­ple were pub­lished on Thursday night. But on Friday morn­ing the page where the data was be­ing re­leased had been deleted, which trig­gered ru­mors about a pos­si­ble pay­ment to the ex­tor­tion­ists.

At the time of writ­ing this ar­ti­cle, the com­pany had nei­ther con­firmed nor de­nied the pay­ment. Tuo­mas Kahri, Chairman of the Board of Vastaamo, told to the news­pa­per Ilta Sanomat that he would not com­ment on the ran­som pay­ment al­le­ga­tions.

The iden­tity or na­tion­al­ity of the ex­tor­tion­ists is un­known, and they ap­peared to not be wor­ried about their pos­si­ble ar­rest by the au­thor­i­ties.

Ilta Sanomat ex­changed sev­eral mes­sages with them on Thursday, and ac­cord­ing to the tabloid the crim­i­nals said they did not know that there was data of mi­nors among the pub­lished in­for­ma­tion. However, they en­sured that this would not stop their ac­tions.

According to the same news­pa­per, the black­mailer had also of­fered in­di­vid­ual pa­tients the pos­si­bil­ity of delet­ing their own data by pay­ing about 540 eu­ros in bit­coins.

The National Bureau of Investigation (KRP) is in­ves­ti­gat­ing the at­tack as a case of gross breach and dis­sem­i­na­tion of pri­vate in­for­ma­tion. Police are ask­ing peo­ple who have no­ticed their pri­vate in­for­ma­tion be­ing dis­sem­i­nated to file an elec­tronic crime re­port.

The com­pany has been crit­i­cized for fail­ing to no­tify cus­tomers ear­lier that their data was ex­posed in this ex­tor­tion case. Some have com­plained they were con­tacted only af­ter the case be­came known to the gen­eral pub­lic.

...

Read the original on www.foreigner.fi »

7 336 shares, 21 trendiness, 174 words and 2 minutes reading time

GitLab blocked Iranians’ access.

On 3rd Oct. 2020 GitLab blocked Iranians’ ac­cess (based on IP) with­out any prior no­tice! and five days later (8th Oct.) my friend’s ac­count blocked and still he does­n’t have any ac­cess to his pro­jects! even af­ter cre­at­ing a ticket and asks for a tem­po­rary ac­cess to only ex­port his pro­jects! GitLab re­fused to un­block him! (screenshot in ap­pen­dix). My friend is not the only one who blocked by GitLab, with a sim­ple search on the web you can find a grow­ing list of blocked ac­counts.

So I de­cided to move from GtiLab and EVERY Free Software based/​hosted/​man­aged on/​in USA.

When it comes to USA poli­cies, Free Software is a Joke :)

GitLab is not the only ac­tor in this dis­crim­i­na­tion against Persian/Iranian peo­ple, we also blocked by GitHub, Docker, NPM, Google Developer, Android, AWS, Go, Kubernetes and etc.

But I be­lieve in Freedom and Free Software. I be­lieve Free Software is a SOCIAL MOVEMENT and I hope …

GitLab joined le­gal­ized dis­crim­i­na­tion. Why does no one talk about this?

...

Read the original on ahmadhaghighi.com »

8 291 shares, 44 trendiness, 0 words and 0 minutes reading time

403 Forbidden

...

Read the original on misc-stuff.terraaeon.com »

9 266 shares, 24 trendiness, 0 words and 0 minutes reading time

We’ve de­tected that JavaScript is dis­abled in your browser. Would you like to pro­ceed to legacy Twitter?

...

Read the original on twitter.com »

10 266 shares, 23 trendiness, 415 words and 4 minutes reading time

Apple, Google and a Deal That Controls the Internet

A for­mer Google ex­ec­u­tive, who asked not to be iden­ti­fied be­cause he was not per­mit­ted to talk about the deal, said the prospect of los­ing Apple’s traf­fic was terrifying” to the com­pany.

The Justice Department, which is ask­ing for a court in­junc­tion pre­vent­ing Google from en­ter­ing into deals like the one it made with Apple, ar­gues that the arrange­ment has un­fairly helped make Google, which han­dles 92 per­cent of the world’s in­ter­net searches, the cen­ter of con­sumers’ on­line lives.

Online busi­nesses like Yelp and Expedia, as well as com­pa­nies rang­ing from noo­dle shops to news or­ga­ni­za­tions, of­ten com­plain that Google’s search dom­i­na­tion en­ables it to charge ad­ver­tis­ing fees when peo­ple sim­ply look up their names, as well as to steer con­sumers to­ward its own prod­ucts, like Google Maps. Microsoft, which had its own an­titrust bat­tle two decades ago, has told British reg­u­la­tors that if it were the de­fault op­tion on iPhones and iPads, it would make more ad­ver­tis­ing money for every search on its ri­val search en­gine, Bing.

What’s more, com­peti­tors like DuckDuckGo, a small search en­gine that sells it­self as a pri­vacy-fo­cused al­ter­na­tive to Google, could never match Google’s tab with Apple.

Apple now re­ceives an es­ti­mated $8 bil­lion to $12 bil­lion in an­nual pay­ments — up from $1 bil­lion a year in 2014 — in ex­change for build­ing Google’s search en­gine into its prod­ucts. It is prob­a­bly the sin­gle biggest pay­ment that Google makes to any­one and ac­counts for 14 to 21 per­cent of Apple’s an­nual prof­its. That’s not money Apple would be ea­ger to walk away from.

In fact, Mr. Cook and Mr. Pichai met again in 2018 to dis­cuss how they could in­crease rev­enue from search. After the meet­ing, a se­nior Apple em­ployee wrote to a Google coun­ter­part that our vi­sion is that we work as if we are one com­pany,” ac­cord­ing to the Justice Department’s com­plaint.

A forced breakup could mean the loss of easy money to Apple. But it would be a more sig­nif­i­cant threat to Google, which would have no ob­vi­ous way to re­place the lost traf­fic. It could also push Apple to ac­quire or build its own search en­gine. Within Google, peo­ple be­lieve that Apple is one of the few com­pa­nies in the world that could of­fer a for­mi­da­ble al­ter­na­tive, ac­cord­ing to one for­mer ex­ec­u­tive. Google has also wor­ried that with­out the agree­ment, Apple could make it more dif­fi­cult for iPhone users to get to the Google search en­gine.

...

Read the original on www.nytimes.com »

To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".

10HN is also available as an iOS App

If you visit 10HN only rarely, check out the the best articles from the past week.

If you like 10HN please leave feedback and share

Visit pancik.com for more.