<?xml version="1.0" encoding="utf-8"?>

<feed xmlns="http://www.w3.org/2005/Atom">
<title>Published articles</title>
<generator uri="http://tt-rss.org/">Tiny Tiny RSS/20.09-05744bb47</generator>
<updated>2025-09-10T16:04:41+00:00</updated>
<id>https://news.unknownlamer.org/public.php?op=rss&amp;id=-2&amp;key=grcq5m543601c14b206</id>
<link href="https://news.unknownlamer.org/public.php?op=rss&amp;id=-2&amp;key=grcq5m543601c14b206" rel="self"/>

<link href="https://news.unknownlamer.org" rel="alternate"/>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-17:/982960</id>
	<link href="https://go.theregister.com/feed/www.theregister.com/2026/02/17/mysql_foundation_oracle_letter/" rel="alternate" type="text/html"/>
	<title type="html">Dear Oracle, we need to talk about the future of MySQL</title>
	<summary type="html"><![CDATA[<p>Faithful pen open letter proposing independent foundation with or without Big Red's participation A ...</p>]]></summary>
	<content type="html"><![CDATA[<h4>Faithful pen open letter proposing independent foundation with or without Big Red's participation</h4> <p>A group of influential users and developers of MySQL have invited Oracle to join their plans to create an independent foundation to guide the future development of the popular open source database, which Big Red owns.&hellip;</p> <p><!--#include virtual='/data_centre/_whitepaper_textlinks_top.html' --></p>]]></content>
	<updated>2026-02-17T16:49:22+00:00</updated>
	<author><name>Lindsay Clark</name></author>
	<source>
		<id>http://www.theregister.co.uk/</id>
		<link rel="self" href="http://www.theregister.co.uk/"/>
		<updated>2026-02-17T16:49:22+00:00</updated>
		<title>The Register</title></source>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-17:/982978</id>
	<link href="https://ballot-access.org/2026/02/17/jon-fleischman-california-politics-analyst-shows-how-democratic-interest-groups-manipulate-the-california-top-two-system/" rel="alternate" type="text/html"/>
	<title type="html">Jon Fleischman, California Politics Analyst, Shows How Democratic Interest Groups Manipulate the California Top-Two System</title>
	<summary type="html"><![CDATA[<p>Jon Fleischman has this article in the Orange County Register about how Democratic interest groups m...</p>]]></summary>
	<content type="html"><![CDATA[<p>Jon Fleischman has <a href="https://archive.is/XGwKr" rel="noopener noreferrer" target="_blank">this article</a> in the Orange County Register about how Democratic interest groups manipulate the California top-two system.  He says in the gubernatorial race, public employee unions, which have a great deal of spending power, will boost one of the two leading Republicans and depress support for the other leading Republican.  Their goal is to get one Democrat and one Republican on the general election ballot.  They are confident the Democrat would win.  They do not like the idea of two Democrats being the only names on the November ballot.</p>]]></content>
	<updated>2026-02-17T17:30:27+00:00</updated>
	<author><name>Richard Winger</name></author>
	<source>
		<id>http://ballot-access.org</id>
		<link rel="self" href="http://ballot-access.org"/>
		<updated>2026-02-17T17:30:27+00:00</updated>
		<title>Ballot Access News</title></source>

	<category term="uncategorized"/>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-17:/982997</id>
	<link href="https://www.phoronix.com/news/AMDGPU-HDMI-2.1-FRL" rel="alternate" type="text/html"/>
	<title type="html">Experimental Out-Of-Tree Code Aims To Provide HDMI 2.1 FRL For AMD Linux Driver</title>
	<summary type="html"><![CDATA[<p>One of the limitations of the AMDGPU Linux kernel graphics driver has been the lack of its support f...</p>]]></summary>
	<content type="html"><![CDATA[<p>One of the limitations of the AMDGPU Linux kernel graphics driver has been the lack of its support for HDMI 2.1 and later. AMD has wanted to support HDMI 2.1+ functionality under Linux but it's been legally blocked by the HDMI Forum. But anxious independent users have been working on open-source patches for wiring up HDMI 2.1 into the AMDGPU driver outside of the realm of AMD and the HDMI Forum's blessings...</p>]]></content>
	<updated>2026-02-17T18:33:01+00:00</updated>
	<author><name>Michael Larabel</name></author>
	<source>
		<id>http://www.phoronix.com/</id>
		<link rel="self" href="http://www.phoronix.com/"/>
		<updated>2026-02-17T18:33:01+00:00</updated>
		<title>Phoronix</title></source>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-16:/982791</id>
	<link href="https://www.jwz.org/blog/2026/02/all-your-base-slight-remaster/" rel="alternate" type="text/html"/>
	<title type="html">All Your Base, slight remaster</title>
	<summary type="html"><![CDATA[<p>25 years ago today, Bad_CRC posted the primordial meme video "All Your Base Are Belong To Us" on New...</p>]]></summary>
	<content type="html"><![CDATA[<p>25 years ago today, Bad_CRC posted the primordial meme video <i>"All Your Base Are Belong To Us"</i> on Newgrounds. </p><p>In honor of this important anniversary, I downloaded the <a href="https://archive.org/details/flash_allyourbase" rel="noopener noreferrer" target="_blank">original Flash SWF file from Internet Archive</a>, played it using <a href="https://ruffle.rs/" rel="noopener noreferrer" target="_blank">Ruffle</a> in a full-screen window, and replaced the audio with <a href="https://archive.org/details/invasion_of_the_gabber_rob" rel="noopener noreferrer" target="_blank">the original MP3</a> of <i>"Invasion of the Gabber Robots"</i> by The Laziest Men on Mars. So this is probably the highest fidelity encoding possible, without going back to the original forum GIFs. </p><p>Make your time. </p><p></p><div><div><div></div></div> <p><a href="https://www.jwz.org/blog/2021/02/all-your-base-is-20/" rel="noopener noreferrer" target="_blank">Previously</a>, <a href="https://www.jwz.org/blog/2013/02/all-your-vectors/" rel="noopener noreferrer" target="_blank">previously</a>.</p></div>]]></content>
	<updated>2026-02-16T21:28:40+00:00</updated>
	<author><name>jwz</name></author>
	<source>
		<id>https://www.jwz.org/blog/</id>
		<link rel="self" href="https://www.jwz.org/blog/"/>
		<updated>2026-02-16T21:28:40+00:00</updated>
		<title>jwz</title></source>

	<category term="computers"/>

	<category term="firstperson"/>

	<category term="mpegs"/>

	<category term="retrocomputing"/>

	<category term="toys"/>

	<category term="www"/>


	<link rel="enclosure" 
		type="image/jpeg" 
		length="1"
		href="https://i.ytimg.com/vi/orY1RztncqE/hqdefault.jpg"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-11:/981464</id>
	<link href="https://arstechnica.com/health/2026/02/fda-refuses-to-review-modernas-mrna-flu-vaccine/" rel="alternate" type="text/html"/>
	<title type="html">FDA refuses to review Moderna's mRNA flu vaccine</title>
	<summary type="html"><![CDATA[<p>The Food and Drug Administration has refused to review Moderna's applic...</p>]]></summary>
	<content type="html"><![CDATA[<p>The Food and Drug Administration has refused to review Moderna's application for an mRNA flu vaccine, the company revealed Tuesday.</p>
<p>While the move came as a surprise to the high-profile vaccine maker, it is just the latest hostility toward vaccines&mdash;and mRNA vaccines in particular&mdash;from an agency overseen by the fervent anti-vaccine activist Robert F. Kennedy Jr. In his first year in office, Kennedy has already <a href="https://arstechnica.com/health/2026/01/under-anti-vaccine-rfk-jr-cdc-slashes-childhood-vaccine-schedule/" rel="noopener noreferrer" target="_blank">dramatically slashed childhood vaccine recommendations</a> and <a href="https://arstechnica.com/health/2025/08/rfk-jr-defends-500m-cut-for-mrna-vaccines-with-pseudoscience-gobbledygook/" rel="noopener noreferrer" target="_blank">canceled $500 million</a> in research funding for mRNA vaccines against potential pandemic threats.</p>
<p>In <a href="https://feeds.issuerdirect.com/news-release.html?newsid=7346090610333866&amp;symbol=MRNA" rel="noopener noreferrer" target="_blank">a news release late Tuesday</a>, Moderna said it was blindsided by the FDA's refusal, which the FDA cited as being due to the design of the company's Phase 3 trial for its mRNA flu vaccine, dubbed mRNA-1010. Specifically, the FDA's rejection was over the comparator vaccine Moderna used.</p><p><a href="https://arstechnica.com/health/2026/02/fda-refuses-to-review-modernas-mrna-flu-vaccine/" rel="noopener noreferrer" target="_blank">Read full article</a></p>
<p><a href="https://arstechnica.com/health/2026/02/fda-refuses-to-review-modernas-mrna-flu-vaccine/#comments" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2026-02-11T01:21:12+00:00</updated>
	<author><name>
                    Beth Mole
                </name></author>
	<source>
		<id>https://arstechnica.com</id>
		<link rel="self" href="https://arstechnica.com"/>
		<updated>2026-02-11T01:21:12+00:00</updated>
		<title>Ars Technica</title></source>

	<category term="anti-vaccine"/>

	<category term="fda"/>

	<category term="flu"/>

	<category term="health"/>

	<category term="moderna"/>

	<category term="vaccine"/>


	<link rel="enclosure" 
		type="image/jpeg" 
		length="1"
		href="https://cdn.arstechnica.net/wp-content/uploads/2020/12/GettyImages-1290558683.jpg"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-11:/981476</id>
	<link href="https://www.techdirt.com/2026/02/10/so-youve-hit-an-age-gate-what-now/" rel="alternate" type="text/html"/>
	<title type="html">So, You’ve Hit An Age Gate. What Now?</title>
	<summary type="html"><![CDATA[<p>EFF&nbsp;is against&nbsp;age gating and age verification&nbsp;mandates, and we hope we&rsquo;ll win in get...</p>]]></summary>
	<content type="html"><![CDATA[<p>EFF&nbsp;<a href="https://www.eff.org/deeplinks/2025/08/blocking-access-harmful-content-will-not-protect-children-online-no-matter-how" rel="noopener noreferrer" target="_blank">is against</a>&nbsp;<a href="https://www.eff.org/deeplinks/2025/10/age-verification-estimation-assurance-oh-my-guide-terminology" rel="noopener noreferrer" target="_blank">age gating and age verification</a>&nbsp;mandates, and we hope we&rsquo;ll win in getting existing ones overturned and new ones prevented. But mandates are&nbsp;<a href="https://www.404media.co/missouri-age-verification-law-porn-id-check-vpns/" rel="noopener noreferrer" target="_blank">already in effect</a>, and every day many people are asked to verify their age across the web, despite&nbsp;<a href="https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws" rel="noopener noreferrer" target="_blank">prominent</a>&nbsp;<a href="https://www.bbc.com/news/articles/c8jmzd972leo" rel="noopener noreferrer" target="_blank">cases</a>&nbsp;of sensitive data getting leaked in the process.</p>
<p>At some point, you may have been faced with the decision yourself: should I continue to use this service if I have to verify my age? And if so, how can I do that with the least risk to my personal information? This is our guide to navigating those decisions, with information on what questions to ask about the age verification options you&rsquo;re presented with, and answers to those questions for some of the top most popular social media sites. Even though there&rsquo;s no way to implement mandated age gates in a way that fully protects speech and privacy rights, our goal here is to help you minimize the infringement of your rights as you manage this awful situation.</p>
<h3>Follow the Data</h3>
<p>Since we know that leaks happen despite the best efforts of software engineers, we generally recommend submitting the absolute least amount of data possible. Unfortunately, that&rsquo;s not going to be possible for everyone. Even facial age estimation solutions where pictures of your face never leave your device, offering some protection against data leakage, are not a good option for all users: facial age estimation works less well for&nbsp;<a href="https://www.theguardian.com/news/2025/sep/19/how-accurate-are-age-checks-for-australias-under-16s-social-media-ban-what-trial-data-reveals" rel="noopener noreferrer" target="_blank">people</a>&nbsp;of&nbsp;<a href="https://www.yoti.com/wp-content/uploads/2025/08/Yoti-Age-Estimation-White-Paper-July-2025-PUBLIC-v1.pdf" rel="noopener noreferrer" target="_blank">color</a>,&nbsp;<a href="https://dl.acm.org/doi/pdf/10.1145/3359246" rel="noopener noreferrer" target="_blank">trans and nonbinary people</a>, and&nbsp;<a href="https://www.wired.com/story/when-face-recognition-doesnt-know-your-face-is-a-face/" rel="noopener noreferrer" target="_blank">people with disabilities</a>. There are some systems that use fancy cryptography so that a digital ID saved to your device won&rsquo;t tell the website anything more than if you meet the age requirement, but access to that digital ID isn&rsquo;t available to everyone or for all platforms. You may also not want to register for a digital ID and save it to your phone, if you don&rsquo;t want to&nbsp;<a href="https://www.eff.org/deeplinks/2020/08/digital-identification-must-be-designed-privacy-and-equity-10" rel="noopener noreferrer" target="_blank">take the chance</a>&nbsp;of all the information on it being exposed upon request of an over-zealous verifier, or you simply don&rsquo;t want to be a part of a digital ID system</p>
<p>If you&rsquo;re given the option of selecting a verification method and are deciding which to use, we recommend considering the following questions for each process allowed by each vendor:</p>
<ul>
<li><strong>Data:</strong>&nbsp;What info does each method require?</li>
<li><strong>Access:&nbsp;</strong>Who can see the data during the course of the verification process?</li>
<li><strong>Retention:</strong>&nbsp;Who will hold onto that data after the verification process, and for how long?</li>
<li><strong>Audits:&nbsp;</strong>How sure are we that the stated claims will happen in practice? For example, are there external audits confirming that data is not accidentally leaked to another site along the way? Ideally these will be in-depth, security-focused audits by specialized auditors like&nbsp;<a href="https://www.nccgroup.com/technical-assurance/" rel="noopener noreferrer" target="_blank">NCC Group</a>&nbsp;or&nbsp;<a href="https://www.trailofbits.com/services/software-assurance/" rel="noopener noreferrer" target="_blank">Trail of Bits</a>, instead of audits that merely certify adherence to standards.&nbsp;</li>
<li><strong>Visibility:</strong>&nbsp;Who will be aware that you&rsquo;re attempting to verify your age, and will they know which platform you&rsquo;re trying to verify for?</li>
</ul>
<p>We attempt to provide answers to these questions below. To begin, there are two major factors to consider when answering these questions: the tools each platform uses, and the overall system those tools are part of.</p>
<p>In general, most platforms offer&nbsp;<a href="https://www.eff.org/deeplinks/2025/10/age-verification-estimation-assurance-oh-my-guide-terminology" rel="noopener noreferrer" target="_blank"><strong>age estimation</strong></a><strong>&nbsp;options like&nbsp;</strong><a href="https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful" rel="noopener noreferrer" target="_blank"><strong>face scans</strong></a>&nbsp;as a first line of age assurance. These vary in intrusiveness, but their main problem is inaccuracy, particularly for marginalized users. Third-party age verification vendors&nbsp;<a href="https://docs.privateid.com/age" rel="noopener noreferrer" target="_blank">Private ID</a>&nbsp;and&nbsp;<a href="https://www.k-id.com/facial-age-estimation" rel="noopener noreferrer" target="_blank">k-ID</a>&nbsp;offer on-device facial age estimation, but another common vendor,&nbsp;<a href="https://www.yoti.com/blog/facial-age-estimation-faq-frequently-asked-questions/" rel="noopener noreferrer" target="_blank">Yoti</a>, sends the image to their servers during age checks by some of the biggest platforms. This risks leaking the images themselves, and also the fact that you&rsquo;re using that particular website, to the third party.&nbsp;</p>
<p>Then, there&rsquo;s the&nbsp;<strong>document-based verification services</strong>, which require you to submit a hard identifier like a government-issued ID. This method thus requires you to prove both your age and your identity. A platform can do this in-house through a designated dataflow, or by sending that data to a third party. We&rsquo;ve already seen examples of how this can fail. For example, Discord routed users&rsquo; ID data through its general customer service workflow so that a third-party vendor could perform manual review of verification appeals. No one involved ever deleted users&rsquo; data, so when the system was breached, Discord had to apologize for the catastrophic disclosure of&nbsp;<a href="https://www.404media.co/the-discord-hack-is-every-users-worst-nightmare/" rel="noopener noreferrer" target="_blank">nearly 70,000 photos</a>&nbsp;of users&rsquo; ID documents. Overly long retention periods expose documents to risk of breaches and historical data requests. Some document verifiers have retention periods that are needlessly long. This is the case with&nbsp;<a href="https://incode.com/privacy-policy/#data-security" rel="noopener noreferrer" target="_blank">Incode</a>, which provides ID verification for Tiktok. Incode holds onto images forever by default, though TikTok should&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/minimum-age-appeals-on-tiktok" rel="noopener noreferrer" target="_blank">automatically</a>&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/underage-appeals-on-tiktok" rel="noopener noreferrer" target="_blank">start</a>&nbsp;the deletion process on your behalf.</p>
<p>Some platforms offer alternatives, like proving that you own a&nbsp;<a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cuse-a-credit-card-for-age-verification" rel="noopener noreferrer" target="_blank">credit card</a>, or asking for your&nbsp;<a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cuse-a-credit-card-for-age-verification%2Cuse-an-email-address-for-age-verification" rel="noopener noreferrer" target="_blank">email</a>&nbsp;to check if it appears in databases associated with adulthood (like home mortgage databases). These tend to involve less risk when it comes to the sensitivity of the data itself, especially since credit cards can be replaced, but in general still undermine anonymity and pseudonymity and pose a risk of tracking your online activity. We&rsquo;d prefer to see more assurances across the board about how information is handled.</p>
<p>Each site offers users a menu of age assurance options to choose from. We&rsquo;ve chosen to present these options in the rough order that we expect most people to prefer. Jump directly to a platform to learn more about its age checks:</p>
<ul>
<li><a href="https://www.eff.org/deeplinks/2026/01/so-youve-hit-age-gate-what-now#Meta" rel="noopener noreferrer" target="_blank">Meta &ndash; Facebook, Instagram, WhatsApp, Messenger, Threads</a></li>
<li><a href="https://www.eff.org/deeplinks/2026/01/so-youve-hit-age-gate-what-now#Google" rel="noopener noreferrer" target="_blank">Google &ndash; Gmail, YouTube</a></li>
<li><a href="https://www.eff.org/deeplinks/2026/01/so-youve-hit-age-gate-what-now#TikTok" rel="noopener noreferrer" target="_blank">TikTok</a></li>
<li><a href="https://www.eff.org/deeplinks/2026/01/so-youve-hit-age-gate-what-now#Everywhere-Else" rel="noopener noreferrer" target="_blank">Everywhere Else</a></li>
</ul>
<h2><a></a>Meta &ndash; Facebook, Instagram, WhatsApp, Messenger, Threads</h2>
<h3>Inferred Age</h3>
<p><strong>If Meta can guess your age, you may never even see an age verification screen.</strong>&nbsp;Meta, which runs Facebook, Threads, Instagram, Messenger, and WhatsApp, first tries to use information you&rsquo;ve posted to guess your age, like&nbsp;<a href="https://about.fb.com/news/2021/07/age-verification/" rel="noopener noreferrer" target="_blank">looking</a>&nbsp;at &ldquo;Happy birthday!&rdquo; messages. It&rsquo;s a creepy reminder that they already have quite a lot of information about you.</p>
<p>If Meta cannot guess your age, or if Meta infers you&rsquo;re too young, it will next ask you to&nbsp;<a href="https://faq.whatsapp.com/3679110085670782" rel="noopener noreferrer" target="_blank">verify your age</a>&nbsp;using either facial age estimation, or by uploading your photo ID.&nbsp;</p>
<h3>Face Scan</h3>
<p><strong>If you choose to use facial age estimation, you&rsquo;ll be&nbsp;</strong><a href="https://faq.whatsapp.com/3679110085670782" rel="noopener noreferrer" target="_blank"><strong>sent</strong></a>&nbsp;<a href="https://www.facebook.com/help/1386337538619854" rel="noopener noreferrer" target="_blank"><strong>to</strong></a>&nbsp;<a href="https://help.instagram.com/292521846402382/?helpref=search&amp;query=verification&amp;search_session_id=eb136014aeff03e55d346abf03249d73&amp;sr=14" rel="noopener noreferrer" target="_blank"><strong>Yoti</strong></a><strong>, a third-party verification service.</strong>&nbsp;Your photo will be uploaded to their servers during this process. Yoti&nbsp;<a href="https://www.yoti.com/blog/effective-facial-age-estimation-a-privacy-preserving-approach-to-age-assurance/" rel="noopener noreferrer" target="_blank">claims</a>&nbsp;that &ldquo;as soon as an age has been estimated, the facial image is immediately and permanently deleted.&rdquo; Though it&rsquo;s not as good as not having that data in the first place, Yoti&rsquo;s&nbsp;<a href="https://www.yoti.com/security/" rel="noopener noreferrer" target="_blank">security measures include</a>&nbsp;a bug bounty program and annual penetration testing. Researchers from Mint Secure found that Yoti&rsquo;s app and website are&nbsp;<a href="https://mint-secure.de/dataprotection-it-security-risks-with-ageverificationapp-yoti/" rel="noopener noreferrer" target="_blank">filled with trackers</a>, so the fact that you&rsquo;re verifying your age could be not only shared to Yoti, but leaked to third-party data brokers as well.&nbsp;</p>
<p>You may not want to use this option if you&rsquo;re worried about third parties potentially being able to know you&rsquo;re trying to verify your age with Meta. You also might not want to use this if you&rsquo;re worried about a current picture of your face accidentally leaking&mdash;for example, if elements in the background of your selfie might reveal your current location. On the other hand, if you consider a selfie to be less sensitive than a photograph of your ID, this option might be better. If you do choose (or are forced to) use the face check system, be sure to snap your selfie without anything you&rsquo;d be concerned with identifying your location or embarrassing you in the background in case the image leaks.</p>
<h3>Upload ID</h3>
<p><strong>If Yoti&rsquo;s age estimation decides your face looks too young, or if you opt out of facial age estimation, your next recourse is to&nbsp;</strong><a href="https://www.facebook.com/help/671565971895323/" rel="noopener noreferrer" target="_blank"><strong>send Meta a photo of your ID</strong></a><strong>.</strong>&nbsp;Meta&nbsp;<a href="https://help.instagram.com/966909308115586/" rel="noopener noreferrer" target="_blank">sends</a>&nbsp;that photo to Yoti to verify the ID. Meta says it will&nbsp;<a href="https://www.meta.com/help/quest/1266914157405903/" rel="noopener noreferrer" target="_blank">hold onto that ID image</a>&nbsp;for 30 days, then delete it. Meanwhile, Yoti claims it will delete the image&nbsp;<a href="https://developers.yoti.com/age-verification/identity-verification" rel="noopener noreferrer" target="_blank">immediately after verification</a>. Of course, bugs and process oversights exist, such as accidentally replicating information in logs or support queues, but at least they have stated processes. Your ID contains sensitive information such as your full legal name and home address. Using this option not only runs the (hopefully small, but never nonexistent) risk of that data getting leaked through errors or hacking, but it also lets Meta see the information needed to tie your profile to your identity&mdash;which you may not want. If you don&rsquo;t want Meta to know your name and where you live, or rely on both Meta and Yoti to keep to their deletion promises, this option may not be right for you.</p>
<h2><a></a>Google &ndash; Gmail, YouTube&nbsp;</h2>
<h3>Inferred Age</h3>
<p><strong>If Google can guess your age, you may never even see an age verification screen.</strong>&nbsp;Your Google account is typically connected to your YouTube account, so if (like mine) your YouTube account is old enough to vote, you may not need to verify your Google account at all. Google first uses&nbsp;<a href="https://blog.youtube/news-and-events/extending-our-built-in-protections-to-more-teens-on-youtube/" rel="noopener noreferrer" target="_blank">information it already knows</a>&nbsp;to try to guess your age, like how long you&rsquo;ve had the account and your YouTube viewing habits. It&rsquo;s yet another creepy reminder of how much information these corporations have on you, but at least in this case they aren&rsquo;t likely to ask for even more identifying data.</p>
<p><strong>If Google cannot guess your age, or decides you&rsquo;re too young, Google will next ask you to verify your age.</strong>&nbsp;You&rsquo;ll be given a variety of options for how to do so, with availability that will depend on your location and your age.</p>
<p>Google&rsquo;s methods to assure your age include ID verification, facial age estimation, verification by proxy, and digital ID. To prove you&rsquo;re over 18, you may be able to use facial age estimation, give Google your credit card information, or tell a third-party provider your email address.</p>
<h3>Face Scan</h3>
<p><strong>If you choose to&nbsp;</strong><a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cuse-a-selfie-for-age-verification" rel="noopener noreferrer" target="_blank"><strong>use facial age estimation</strong></a><strong>, you&rsquo;ll be sent to a website run by Private ID, a third-party verification service.</strong>&nbsp;The website will load&nbsp;<a href="https://docs.privateid.com/age" rel="noopener noreferrer" target="_blank">Private ID&rsquo;s verifier</a>&nbsp;within the page&mdash;this means that your selfie will be checked without any images leaving your device. If the system decides you&rsquo;re over 18, it will let Google know that, and only that. Of course, no technology is perfect&mdash;should Private ID be mandated to target you specifically, there&rsquo;s nothing to stop it from sending down code that does in fact upload your image, and you probably won&rsquo;t notice. But unless your threat model includes being specifically targeted by a state actor or Private ID, that&rsquo;s unlikely to be something you need to worry about. For most people, no one else will see your image during this process. Private ID will, however, be told that your device is trying to verify your age with Google and Google will still find out if Private ID thinks that you&rsquo;re under 18.</p>
<p>If Private ID&rsquo;s age estimation decides your face looks too young, you may next be able to decide if you&rsquo;d rather let Google&nbsp;<a href="https://support.google.com/accounts/answer/10071085" rel="noopener noreferrer" target="_blank">verify your age</a>&nbsp;by giving it your credit card information, photo ID, or digital ID, or by letting Google send your email address to a third-party verifier.</p>
<h3>Email Usage</h3>
<p><strong>If you choose to&nbsp;</strong><a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cuse-an-email-address-for-age-verification" rel="noopener noreferrer" target="_blank"><strong>provide your email address</strong></a><strong>, Google sends it on to a company called VerifyMy.</strong>&nbsp;VerifyMy will use your email address to see if you&rsquo;ve done things like get a mortgage or paid for utilities using that email address. If you use Gmail as your email provider, this may be a privacy-protective option with respect to Google, as Google will then already know the email address associated with the account. But it does tell VerifyMy and its third-party partners that the person behind this email address is looking to verify their age, which you may not want them to know. VerifyMy uses &ldquo;<a href="https://verifymy.io/wp-content/uploads/2025/02/Verifymy-White-Paper-Innovative-age-assurance-Email-address-as-the-new-benchmark-for-frictionless-age-estimation.pdf" rel="noopener noreferrer" target="_blank">proprietary algorithms and external data sources</a>&rdquo; that involve sending your email address to &ldquo;<a href="https://verifymy.io/age-verification-and-estimation/google-age-assurance-privacy-policy/#elementor-toc__heading-anchor-5" rel="noopener noreferrer" target="_blank">trusted third parties, such as data aggregators</a>.&rdquo; It claims to &ldquo;ensure that such third parties are contractually bound to meet these requirements,&rdquo; but you&rsquo;ll have to trust it on that one&mdash;we haven&rsquo;t seen any mention of who those parties are, so you&rsquo;ll have no way to check up on their practices and security. On the bright side, VerifyMy and its partners do claim to delete your information as soon as the check is completed.</p>
<h3>Credit Card Verification</h3>
<p><strong>If you choose to let Google&nbsp;</strong><a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cuse-a-credit-card-for-age-verification" rel="noopener noreferrer" target="_blank"><strong>use your credit card information</strong></a><strong>, you&rsquo;ll be asked to set up a Google Payments account.&nbsp;</strong>Note that debit cards won&rsquo;t be accepted, since it&rsquo;s much easier for many debit cards to be issued to people under 18.&nbsp;Google will then charge a small amount to the card, and refund it once it goes through. If you choose this method, you&rsquo;ll have to tell Google your credit card info, but the fact that it&rsquo;s done through Google Payments (their regular card-processing system) means that at least your credit card information won&rsquo;t be sitting around in some unsecured system. Even if your credit card information happens to accidentally be leaked, this is a relatively low-risk option, since credit cards come with solid fraud protection. If your credit card info gets leaked, you should easily be able to dispute fraudulent charges and replace the card.</p>
<h3>Digital ID</h3>
<p><strong>If the option is available to you, you may be able to use your digital ID to verify your age with Google.</strong>&nbsp;In&nbsp;<a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cuse-a-digital-id-for-age-verification" rel="noopener noreferrer" target="_blank">some regions</a>, you&rsquo;ll be given the option to use your digital ID. In some cases, it&rsquo;s possible to only reveal your age information when you use a digital ID. If you&rsquo;re given that choice, it can be a good privacy-preserving option. Depending on the implementation, there&rsquo;s a chance that the verification step will &ldquo;<a href="https://www.aclu.org/press-releases/digital-identity-leaders-and-privacy-experts-sound-the-alarm-on-invasive-id-systems" rel="noopener noreferrer" target="_blank">phone home</a>&rdquo; to the ID provider (usually a government) to let them know the service asked for your age. It&rsquo;s a complicated and varied topic that you can learn more about by visiting&nbsp;<a href="https://www.eff.org/issues/digital-identity" rel="noopener noreferrer" target="_blank">EFF&rsquo;s page on digital identity</a>.</p>
<h3>Upload ID</h3>
<p><strong>Should none of these options work for you, your final recourse is to send Google a photo of your ID.</strong>&nbsp;Here, you&rsquo;ll be asked to take a photo of an acceptable ID and send it to Google. Though&nbsp;<a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cfind-valid-types-of-id-for-age-verification" rel="noopener noreferrer" target="_blank">the help page only states</a>&nbsp;that your ID &ldquo;will be stored securely,&rdquo; the verification process page says ID &ldquo;will be deleted after your date of birth is successfully verified.&rdquo; Acceptable IDs&nbsp;<a href="https://support.google.com/accounts/answer/10071085#zippy=%2Cfind-valid-types-of-id-for-age-verification%2Cget-country-specific-guidance" rel="noopener noreferrer" target="_blank">vary by country</a>, but are generally government-issued photo IDs. We like that it&rsquo;s deleted immediately, though we have questions about what Google means when it says your ID will be used to &ldquo;improve [its] verification services for Google products and protect against fraud and abuse.&rdquo; No system is perfect, and we can only hope that Google schedules outside audits regularly.</p>
<h2><a></a>TikTok</h2>
<h3>Inferred Age</h3>
<p><strong>If TikTok can guess your age, you may never even see an age verification notification.</strong>&nbsp;TikTok first tries to use information you&rsquo;ve posted to estimate your age, looking through your videos and photos to analyze your face and listen to your voice. By uploading any videos,&nbsp;<a href="https://support.tiktok.com/en/account-and-privacy/personalized-ads-and-data/how-we-process-face-and-voice-information" rel="noopener noreferrer" target="_blank">TikTok believes you&rsquo;ve given it consent</a>&nbsp;to try to guess how old you look and sound.</p>
<p><strong>If TikTok decides you&rsquo;re too young, appeal to revoke their age decision before the deadline passes.</strong>&nbsp;If TikTok cannot guess your age, or decides you&rsquo;re too young, it will automatically revoke your access based on age&mdash;including either restricting features or deleting your account. To get your access and account back, you&rsquo;ll have a&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/minimum-age-appeals-on-tiktok#2" rel="noopener noreferrer" target="_blank">limited</a>&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/underage-appeals-on-tiktok#1" rel="noopener noreferrer" target="_blank">amount of time</a>&nbsp;to verify your age. As soon as you see the notification that your account is restricted, you&rsquo;ll want to act fast because in some places you&rsquo;ll have as little as 23 days before the deadline passes.</p>
<p>When you get that notification, you&rsquo;re given&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/minimum-age-appeals-on-tiktok#3" rel="noopener noreferrer" target="_blank">various</a>&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/underage-appeals-on-tiktok#2" rel="noopener noreferrer" target="_blank">options</a>&nbsp;to verify your age based on your location.</p>
<h3>Face Scan</h3>
<p><strong>If you&rsquo;re given the option to use facial age estimation, you&rsquo;ll be&nbsp;</strong><a href="https://support.tiktok.com/en/account-and-privacy/personalized-ads-and-data/how-we-process-face-and-voice-information" rel="noopener noreferrer" target="_blank"><strong>sent to Yoti</strong></a><strong>, a third-party verification service.</strong>&nbsp;Your photo will be uploaded to their servers during this process. Yoti&nbsp;<a href="https://www.yoti.com/blog/effective-facial-age-estimation-a-privacy-preserving-approach-to-age-assurance/" rel="noopener noreferrer" target="_blank">claims</a>&nbsp;that &ldquo;as soon as an age has been estimated, the facial image is immediately and permanently deleted.&rdquo; Though it&rsquo;s not as good as not having that data in the first place, Yoti&rsquo;s&nbsp;<a href="https://www.yoti.com/security/" rel="noopener noreferrer" target="_blank">security measures include</a>&nbsp;a bug bounty program and annual penetration testing. However, researchers from Mint Secure found that Yoti&rsquo;s app and website are&nbsp;<a href="https://mint-secure.de/dataprotection-it-security-risks-with-ageverificationapp-yoti/" rel="noopener noreferrer" target="_blank">filled with trackers</a>, so the fact that you&rsquo;re verifying your age&nbsp;<em>could</em>&nbsp;be leaked not only to Yoti, but to third-party data brokers as well.</p>
<p>You may not want to use this option if you&rsquo;re worried about third parties potentially being able to know you&rsquo;re trying to verify your age with TikTok. You also might not want to use this if you&rsquo;re worried about a current picture of your face accidentally leaking&mdash;for example, if elements in the background of your selfie might reveal your current location. On the other hand, if you consider a selfie to be less sensitive than a photograph of your ID or your credit card information, this option might be better. If you do choose (or are forced to) use the face check system, be sure to snap your selfie without anything you&rsquo;d be concerned with identifying your location or embarrassing you in the background in case the image leaks.</p>
<h3>Credit Card Verification</h3>
<p><strong>If you have a credit card in your name, TikTok will&nbsp;</strong><a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/minimum-age-appeals-on-tiktok#3" rel="noopener noreferrer" target="_blank"><strong>accept</strong></a>&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/underage-appeals-on-tiktok#2" rel="noopener noreferrer" target="_blank"><strong>that</strong></a><strong>&nbsp;as proof that you&rsquo;re over 18.</strong>&nbsp;Note that debit cards won&rsquo;t be accepted, since it&rsquo;s much easier for many debit cards to be issued to people under 18. TikTok will charge a small amount to the credit card, and refund it once it goes through. It&rsquo;s unclear if this goes through their regular payment process, or if your credit card information will be sent through and stored in a separate, less secure system. Luckily, these days credit cards come with solid fraud protection, so if your credit card gets leaked, you should easily be able to dispute fraudulent charges and replace the card. That said, we&rsquo;d rather TikTok provide assurances that the information will be processed securely.</p>
<h3>Credit Card Verification of a Parent or Guardian</h3>
<p><strong>Sometimes, if you&rsquo;re between 13 and 17, you&rsquo;ll be&nbsp;</strong><a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/underage-appeals-on-tiktok#2" rel="noopener noreferrer" target="_blank"><strong>given</strong></a>&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/minimum-age-appeals-on-tiktok#3" rel="noopener noreferrer" target="_blank"><strong>the option</strong></a><strong>&nbsp;to let your parent or guardian confirm your age.</strong>&nbsp;You&rsquo;ll tell TikTok their email address, and TikTok will send your parent or guardian an email asking them (a) to confirm your date of birth, and (b) to verify their own age by proving that they own a valid credit card. This option doesn&rsquo;t always seem to be offered, and in the&nbsp;<a href="https://www.reddit.com/r/TikTok/comments/1fapmrg/i_got_banned_for_being_underage_which_im_not_im/" rel="noopener noreferrer" target="_blank">one case</a>&nbsp;we could find, it&rsquo;s possible that TikTok never followed up with the parent. So it&rsquo;s unclear how or if TikTok verifies that the adult whose email you provide is your parent or guardian. If you want to use credit card verification but you&rsquo;re not old enough to have a credit card, and you&rsquo;re ok with letting an adult know you use TikTok, this option may be reasonable to try.</p>
<h3>Photo with a Random Adult?</h3>
<p><strong>Bizarrely, if you&rsquo;re between 13 and 17, TikTok&nbsp;</strong><a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/minimum-age-appeals-on-tiktok#3" rel="noopener noreferrer" target="_blank"><strong>claims</strong></a>&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/underage-appeals-on-tiktok#2" rel="noopener noreferrer" target="_blank"><strong>to offer</strong></a><strong>&nbsp;the option to take a photo with literally any random adult to confirm your age.</strong>&nbsp;Its help page says that any trusted adult over 25 can be chosen, as long as they&rsquo;re holding a piece of paper with the code on it that TikTok provides. It also mentions that a third-party provider is used here, but doesn&rsquo;t say which one. We haven&rsquo;t found any evidence of this verification method being offered. Please do let us know if you&rsquo;ve used this method to verify your age on TikTok!</p>
<h3>Photo ID and Face Comparison</h3>
<p><strong>If you aren&rsquo;t offered or have failed the other options, you&rsquo;ll have to verify your age by submitting a copy of your ID and matching photo of your face.</strong>&nbsp;You&rsquo;ll be sent to Incode, a third-party verification service. In a disappointing failure to meet the industry standard, Incode itself&nbsp;<a href="https://incode.com/privacy-policy/#data-security" rel="noopener noreferrer" target="_blank">doesn&rsquo;t automatically delete</a>&nbsp;the data you give it once the process is complete, but TikTok does&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/minimum-age-appeals-on-tiktok" rel="noopener noreferrer" target="_blank">claim</a>&nbsp;<a href="https://support.tiktok.com/en/safety-hc/account-and-user-safety/underage-appeals-on-tiktok" rel="noopener noreferrer" target="_blank">to</a>&nbsp;&ldquo;start the process to delete the information you submitted,&rdquo; which should include&nbsp;<a href="https://developer.incode.com/reference/cleansingleonboardingsession" rel="noopener noreferrer" target="_blank">telling Incode</a>&nbsp;to delete your data once the process is done. If you want to be sure, you can ask Incode to&nbsp;<a href="https://developer.incode.com/docs/incode-verify-identity-deletion-process#/" rel="noopener noreferrer" target="_blank">delete that data yourself</a>. Incode tells TikTok that you met the age threshold without providing your exact date of birth, but then TikTok wants to know the exact date anyway, so it&rsquo;ll ask for your date of birth even after your age has been verified.</p>
<p>TikTok itself might not see your actual ID depending on its implementation choices, but Incode will.&nbsp;Your ID contains sensitive information such as your full legal name and home address. Using this option not only runs the (hopefully small, but never nonexistent) risk of that data getting accidentally leaked through errors or hacking. If you don&rsquo;t want TikTok or Incode to know your name, what you look like, and where you live&mdash;or if you don&rsquo;t want to rely on both TikTok and Incode to keep to their deletion promises&mdash;then this option may not be right for you.</p>
<h2><a></a>Everywhere Else</h2>
<p>We&rsquo;ve covered the major providers here, but age verification is unfortunately being required of many other services that you might use as well. While the providers and processes may vary, the same general principles will apply. If you&rsquo;re trying to choose what information to provide to continue to use a service, consider the &ldquo;follow the data&rdquo; questions mentioned above, and try to find out how the company will store and process the data you give it. The less sensitive information, the fewer people have access to it, and the more quickly it will be deleted, the better. You may even come to recognize popular names in the age verification industry:&nbsp;<a href="https://www.404media.co/spotify-uk-age-check-verification-yoti/" rel="noopener noreferrer" target="_blank">Spotify</a>&nbsp;and&nbsp;<a href="https://www.fintechfutures.com/biometrics-id-verification/uk-digital-identity-firm-yoti-secures-20m-in-debt-funding" rel="noopener noreferrer" target="_blank">OnlyFans</a>&nbsp;use Yoti (just like Meta and Tiktok),&nbsp;<a href="https://help.quora.com/hc/en-us/articles/40879605713172-Age-Assurance-FAQs" rel="noopener noreferrer" target="_blank">Quora</a>&nbsp;and&nbsp;<a href="https://www.biometricupdate.com/202510/discord-partners-manual-age-verification-data-breach-includes-selfies" rel="noopener noreferrer" target="_blank">Discord</a>&nbsp;use&nbsp;<a href="https://www.k-id.com/facial-age-estimation" rel="noopener noreferrer" target="_blank">k-ID</a>, and so on.&nbsp;</p>
<p>Unfortunately, it should be clear by now that&nbsp;<strong>none of the age verification options are perfect in terms of protecting information, providing access to everyone, and safely handling sensitive data</strong>. That&rsquo;s just one of the reasons that EFF is against age-gating mandates, and is working to stop and overturn them across the United States and around the world.</p>
<p><em>Republished from the <a href="https://www.eff.org/deeplinks/2026/01/so-youve-hit-age-gate-what-now" rel="noopener noreferrer" target="_blank">EFF&rsquo;s Deeplinks blog</a>.</em></p>]]></content>
	<updated>2026-02-11T04:07:00+00:00</updated>
	<author><name>Erica Portnoy</name></author>
	<source>
		<id>https://www.techdirt.com/</id>
		<link rel="self" href="https://www.techdirt.com/"/>
		<updated>2026-02-11T04:07:00+00:00</updated>
		<title>Techdirt.</title></source>

	<category term="age gating"/>

	<category term="age verification"/>

	<category term="credit cards"/>

	<category term="face scans"/>

	<category term="facebook"/>

	<category term="google"/>

	<category term="id"/>

	<category term="instagram"/>

	<category term="meta"/>

	<category term="privacy"/>

	<category term="tiktok"/>

	<category term="whatsapp"/>

	<category term="youtube"/>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-09:/981065</id>
	<link href="https://theintercept.com/2026/02/09/ice-minneapolis-legal-observers-abduction/" rel="alternate" type="text/html"/>
	<title type="html">“Uptick in Abductions”: ICE Ramps Up Targeting of Minneapolis Legal Observers</title>
	<summary type="html"><![CDATA[<p>MINNEAPOLIS &shy;&mdash; On Friday, legal observers on an encrypted group call in Minneapolis received a desp...</p>]]></summary>
	<content type="html"><![CDATA[<p>MINNEAPOLIS &shy;&mdash; <span>On Friday, legal </span>observers on an encrypted group call in Minneapolis received a desperate plea. A fellow observer was following federal agents who&rsquo;d just loaded her friend into an unmarked vehicle. Now, she herself was boxed in.</p>



<p>&ldquo;Please help,&rdquo; the woman said, again and again, her voice rising to a scream.</p>



<p>Then, her pleas stopped.</p>



<p>By the time support arrived, the observer was gone. All that remained was an empty SUV, engine running, abandoned in the middle of the city&rsquo;s snow-lined streets.</p>



<p>Referred to locally as abductions, it was at least the fourth such disappearance of the day &mdash; the third in a span of less than 30 minutes.</p>



<p>The observers call themselves commuters. They are locals who have organized to resist &ldquo;Operation Metro Surge,&rdquo; a massive U.S. Immigration and Customs Enforcement and Border Patrol campaign targeting Minnesota&rsquo;s undocumented population, by monitoring federal operations in the Twin Cities. The Department of Homeland Security, which oversees both agencies, has called the incursion the largest immigration enforcement operation in history.</p>



<figure><blockquote><p>&ldquo;She was so scared. The terror in her voice was really, really horrible.&rdquo;</p></blockquote></figure>



<p>Three days before the commuters were taken, the new head of Metro Surge, Trump administration border czar Tom Homan, <a href="https://www.c-span.org/program/news-conference/border-czar-tom-homan-holds-news-conference-on-ice-operations-in-minneapolis/672876" rel="noopener noreferrer" target="_blank">announced</a> a &ldquo;drawdown&rdquo; of 700 federal officers and agents. The president had tapped Homan to head the mission a week earlier, appointing the <a href="https://theintercept.com/2026/01/28/greg-bovino-tom-homan-ice-deportation-trump-minneapolis/" rel="noopener noreferrer" target="_blank">former ICE acting director</a> to take over from Border Patrol commander Gregory Bovino, whose heavy-handed tactics culminated in three shootings in three weeks, including the killings of U.S. citizens Renee Good and Alex Pretti.</p>



<p>Homan has vowed to take a more &ldquo;targeted&rdquo; line of attack in Minnesota. His announced drawdown has fueled speculation that the civil rights abuses and unlawful arrests documented in viral videos and court filings during Bovino&rsquo;s tenure may be coming to an end. On the ground, the feeling is quite different.</p>



<p>In a message circulated among commuters Friday, the community group Defrost MN, which uses crowdsourced data to track federal immigration operations, warned residents of an &ldquo;uptick in abductions&rdquo; &mdash; which refer to arrests of both immigrant community members and legal observers &mdash; following Homan&rsquo;s takeover and an increase in the number of government personnel and vehicles involved in those operations.</p>







<p>&ldquo;National attention on Minnesota has waned with the departure of Bovino and rhetoric by Homan that things are de-escalating,&rdquo; the group noted, but recent data and reports from commuters in the field did not support those conclusions. Despite <a href="https://www.reuters.com/world/ice-officers-minnesota-directed-not-interact-with-agitators-new-orders-2026-01-29/" rel="noopener noreferrer" target="_blank">orders</a> to the contrary, the group continued, &ldquo;Agents continue to draw their weapons and deploy chemical agents against observers.&rdquo;</p>



<p>Meanwhile, the deportation pipeline out of Minnesota continues to flow, with 66 shackled passengers loaded onto a plane the night of Homan&rsquo;s address &mdash; the highest total in nearly two weeks &mdash; according to <a href="https://bsky.app/profile/ottergoose.net/post/3me3mtgfot22n" rel="noopener noreferrer" target="_blank">evidence</a> collected at the Minneapolis&ndash;St. Paul International Airport.</p>



<p>Friday&rsquo;s midafternoon disappearance of multiple commuters in quick succession provided visceral evidence that, despite the change in leadership, the struggle between President Donald Trump&rsquo;s federal agents and residents continues.</p>



<p>Commuter Kaegan Recher was among those who hurried to the scene of the observer who disappeared while on call.</p>



<p>&ldquo;She was so scared,&rdquo; Recher told The Intercept. &ldquo;The terror in her voice was really, really horrible.&rdquo;</p>



<h2><strong>Response to a Siege</strong></h2>



<p>In Minneapolis and St. Paul, as well as the surrounding suburbs, <a href="https://www.newyorker.com/news/dispatch/the-battle-for-minneapolis?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=dhtwitter&amp;utm_content=null" rel="noopener noreferrer" target="_blank">tens of thousands</a> of immigrant families are relying on churches and mutual aid for food and financial support. People have not left their homes for weeks. Local schools have reverted to Covid-era online measures to support immigrant students too terrified to come to class. Those students who still attend in person are transported by U.S.-born neighbors and family friends. Campuses at all grade levels are patrolled by volunteers in fluorescent vests, an effort aimed at deterring federal agents&rsquo; practice of targeting parent pick-up and drop-off sites.</p>


<aside>
    <a href="https://theintercept.com/collections/chilling-dissent/" rel="noopener noreferrer" target="_blank">
              <span>
          <img loading="lazy" decoding="async" src="https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?fit=300%2C150" alt="" srcset="https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1536 1536w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=300 300w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=768 768w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1024 1024w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=540 540w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1000 1000w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1536 1536w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=300 300w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=768 768w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1024 1024w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=540 540w,https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1000 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" referrerpolicy="no-referrer">        </span>
            <div>
                  <p>
            Read our complete coverage          </p>
        
        <h2>Chilling Dissent</h2>
      </div>
    </a>
  </aside>


<p>Conservative <a href="https://www.kaaltv.com/news/minnesota-senate-committee-hears-testimony-over-impact-of-ice-operations/" rel="noopener noreferrer" target="_blank">estimates</a> from local healthcare providers suggest emergency room and clinic visits in the Minneapolis area are down by 25 percent. City leaders report local businesses are losing upwards of $20 million a week. Immigrant-owned businesses have been <a href="https://www.startribune.com/ice-economic-impact-minneapolis-small-business-immigrant-owned-revenue-loss-financial/601576602" rel="noopener noreferrer" target="_blank">devasted</a>, with revenue losses hovering between 80 to 100 percent and many closing their doors for good.</p>



<p>These are the conditions commuters respond to. Their focus is two-fold: to document and alert. Some participate on foot, others by bicycle, many by car. They patrol neighborhoods, reporting suspicious vehicles, the license plates of which are run through a crowdsourced database of known or suspected Department of Homeland Security vehicles. When confirmations are made, commuters follow, honking their horns while observers on foot blow whistles at the passing vehicles. The Intercept has observed several such interactions in recent weeks.</p>



<p>Typically, federal agents try to lose the tail. If they are traveling in a caravan, one vehicle may drive slowly ahead of a commuter, allowing others to speed away. If commuters outnumber the agents, the maneuver can be difficult. Unable to shake their noisy entourage, agents will often head for the highway and, if the pursuit continues, retreat to federal headquarters.</p>



<p>Most commuters are careful to keep a distance between their vehicles and those of the agents. Sometimes, the authorities will pull over and stop. The commuters will stop behind them. Both vehicles will sit idling, waiting for the other to move, then carry on.</p>



  <div>
    <a href="https://theintercept.com/2026/01/14/ice-minneapolis-protests-renee-good/" rel="noopener noreferrer" target="_blank">
              <img decoding="async" src="https://theintercept.com/wp-content/uploads/2026/01/GettyImages-2255536122_f10bba-e1768414723813.jpg?w=440&amp;h=440&amp;crop=1" alt="" loading="lazy" referrerpolicy="no-referrer">            <span>
      <h2>
        Related      </h2>
      <h3>Federal Agents Keep Invoking Killing of Renee Good to Threaten Protesters in Minnesota</h3>
    </span>
    </a>
  </div>



<p>Occasionally, agents, heavily armed and frequently masked, will exit their vehicles and <a href="https://theintercept.com/2026/01/14/ice-minneapolis-protests-renee-good/" rel="noopener noreferrer" target="_blank">warn commuters to cease their pursuit</a>. Some commuters do; others don&rsquo;t. Sometimes, commuters come upon agents at a home, a business, or an apartment complex. Given the heated state of affairs &mdash; two Americans dead, immigrants living in terror, children unable to attend school, and sweeping social and economic impacts &mdash; the encounters are often raw with emotion. Nearly everything is recorded, by agents and commuters alike.</p>



<p>As these interactions have become a familiar, legal experts have noted that following and filming law enforcement is protected under the Constitution. With the federal government asserting sweeping and highly contested immigration authorities, they say those efforts are more important than ever.</p>



<p>The Trump administration has taken a different view. Officials argue Minnesota is infested with &ldquo;agitators&rdquo; impeding law enforcement. Mounting evidence suggests they are mobilizing resources to put their resistance down.</p>



<h2><strong>Homan&rsquo;s </strong>Takeover</h2>



<p>Much of the recent media attention surrounding Metro Surge has focused on Homan&rsquo;s reduction in forces, a move the border czar has linked to Minnesota expanding ICE&rsquo;s access to jails, thus reducing the number of federal personnel needed to meet the administration&rsquo;s immigration arrest quotas. </p>



<p>With some 2,000 officers and agents still on the ground, the current federal contingent is still 13 times larger than the agencies&rsquo; normal footprint, outnumbering the Minneapolis Police Department three to one.</p>



  <div>
    <a href="https://theintercept.com/2026/01/28/greg-bovino-tom-homan-ice-deportation-trump-minneapolis/" rel="noopener noreferrer" target="_blank">
              <img decoding="async" src="https://theintercept.com/wp-content/uploads/2026/01/GettyImages-2232526924_e19af9-e1769626119908.jpg?w=440&amp;h=440&amp;crop=1" alt="" loading="lazy" referrerpolicy="no-referrer">            <span>
      <h2>
        Related      </h2>
      <h3>While Minnesotans Rejoice Over Greg Bovino&rsquo;s Ouster, His Replacement Is a Deportation Hard-Liner</h3>
    </span>
    </a>
  </div>



<p>While reducing the number of federal agents dominated headlines, it isn&rsquo;t the only talking point Homan has driven home since taking over.</p>



<p>Homan spent much of a press conference last week describing how ICE&rsquo;s full withdrawal hinges on the public acquiescing to the agency&rsquo;s mission, which, he stressed, is to achieve the president&rsquo;s promise of &ldquo;mass deportations.&rdquo; The immediate goal in Minnesota is a complete federal drawdown, Homan explained, &ldquo;but that is largely contingent on the end of the illegal and threatening activities against ICE and its federal partners that we&rsquo;re seeing in the community.&rdquo;&nbsp;&nbsp;</p>



<p>In the past month, Homan told reporters, 158 people have been arrested for interfering with federal law enforcement, a crime for which penalties range from one to 20 years in prison. Of those cases, he claimed, 85 have been accepted for prosecution. The rest are still pending.</p>



<p>In most cases, people arrested for interfering with ICE are taken to the Bishop Henry Whipple Federal Building, a seven-story edifice that is part of Fort Snelling, the historic site of a <a href="https://www.mnhs.org/fortsnelling/learn/us-dakota-war" rel="noopener noreferrer" target="_blank">government-run concentration camp</a> during the U.S.&ndash;Dakota War of 1862.</p>



<p>Typically, commuters and other legal observers are held for around eight hours before being released. During that time, U.S. officials collect a range of identifying information. With <a href="https://www.cnn.com/2026/01/27/us/alex-pretti-protesters-minneapolis-invs" rel="noopener noreferrer" target="_blank">ample evidence</a> that the Department of Homeland Security is <a href="https://www.kenklippenstein.com/p/ices-secret-watchlists-of-americans" rel="noopener noreferrer" target="_blank">amassing a growing catalogue</a> of the president&rsquo;s critics, and with <a href="https://x.com/allenanalysis/status/2011958018708214095" rel="noopener noreferrer" target="_blank">Homan himself</a> advertising his desire to include people who follow ICE&rsquo;s activities in a government &ldquo;database,&rdquo; community concern is running high over what, exactly, the Trump administration is doing with its information on U.S. citizens.</p>







<p>In his address last week, Homan described an evolving effort by federal officials, including creation of a &ldquo;multi-agency surge task force&rdquo; and a new &ldquo;unified joint operations center&rdquo; that will allow the agency to &ldquo;leverage joint intelligence capabilities to effectively target threats.&rdquo; He emphasized that there would be no reduction in security elements &mdash; often militarized tactical teams &mdash; assigned to guard deportation operations against &ldquo;hostile incidents, until we see a change in what&rsquo;s happening with the lawlessness in impeding and interfering and assaulting of ICE and Border Patrol officers.&rdquo;</p>



<p>Homan reminded the press that he&rsquo;s long warned that the &ldquo;hateful extreme rhetoric&rdquo; of the president&rsquo;s opponents would lead to bloodshed. Now, he said, &ldquo;there has been.&rdquo; Without acknowledging whose blood had been spilled, or by whom, Homan implored local leaders to urge calmness and &ldquo;end the resistance.&rdquo;</p>



<h2><strong>&ldquo;One Warning&rdquo;</strong></h2>



<p>Recher, the commuter who responded to Friday&rsquo;s observer disappearances, has been in the streets monitoring ICE&rsquo;s operations since early January. His busiest week was after Homan took over. He&rsquo;s since noticed that agents have been less prone to immediately jump out of their cars with guns drawn &mdash; a welcome change &mdash; but that a similarly unsettling directive appears to have gone out regarding ICE&rsquo;s engagement with the public.</p>



<p>A video he shot Friday appeared to confirm as much, with a deportation officer telling Recher that he and his colleagues have been ordered to give commuters a single warning before taking them into custody.</p>



<p>&ldquo;You just got one warning, that&rsquo;s it,&rdquo; the officer said. &ldquo;What we&rsquo;re told, that&rsquo;s all you need.&rdquo;</p>



<figure><blockquote><p>&ldquo;I hear more and more about abductions of observers.&rdquo;</p></blockquote></figure>



<p>Recher heeded the officer&rsquo;s warning. He received the panicked and disturbing call for help from the vanished commuter soon after.</p>



<p>&ldquo;I hear less and less about successful abductions, which I&rsquo;m glad,&rdquo; he said. &ldquo;But I hear more and more about abductions of observers.&rdquo;</p>



<p>For Recher, like so many others following ICE&rsquo;s operations in Minnesota, the point of commuting is the thousands of immigrant families living in hiding across the Twin Cities. It is an effort to push back against the pervasive fear at the heart of the Trump administration&rsquo;s occupation.</p>



<p>&ldquo;How do you justify terrorizing an entire community?&rdquo; he asked. &ldquo;It is the most un-American thing I&rsquo;ve ever experienced in my entire life.&rdquo;</p>
<p>The post <a href="https://theintercept.com/2026/02/09/ice-minneapolis-legal-observers-abduction/" rel="noopener noreferrer" target="_blank">&ldquo;Uptick in Abductions&rdquo;: ICE Ramps Up Targeting of Minneapolis Legal Observers</a> appeared first on <a href="https://theintercept.com" rel="noopener noreferrer" target="_blank">The Intercept</a>.</p>]]></content>
	<updated>2026-02-09T18:18:24+00:00</updated>
	<author><name>Ryan Devereaux</name></author>
	<source>
		<id>https://theintercept.com</id>
		<link rel="self" href="https://theintercept.com"/>
		<updated>2026-02-09T18:18:24+00:00</updated>
		<title>The Intercept</title></source>

	<category term="justice"/>


	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2026/02/GettyImages-2258253474-e1770340999927.jpg?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2026/01/GettyImages-2232526924_e19af9-e1769626119908.jpg?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2026/01/GettyImages-2255536122_f10bba-e1768414723813.jpg?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?fit=300%2C150"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2026/02/GettyImages-2257983026-e1770413314257.jpg?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2026/02/crop_f46d0a_18f39b8384f547629b507bdb4f1c4125mv2-e1770221436938.webp?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2026/02/GettyImages-2259084416_4f1cda-e1770416664292.jpg?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2026/02/GettyImages-2259513959-e1770656605702.jpg?fit=5490%2C2750"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-02-09:/981075</id>
	<link href="https://www.techdirt.com/2026/02/09/section-230-turns-30-both-parties-want-it-gone-for-contradictory-reasons/" rel="alternate" type="text/html"/>
	<title type="html">Section 230 Turns 30; Both Parties Want It Gone—For Contradictory Reasons</title>
	<summary type="html"><![CDATA[<p>Here&rsquo;s what&rsquo;s strange about Section 230 of the Communications Decency Act, the law that ...</p>]]></summary>
	<content type="html"><![CDATA[<p>Here&rsquo;s what&rsquo;s strange about Section 230 of the Communications Decency Act, the law that made the open internet possible: Both sides of the traditional political spectrum hate it. But for <em>opposite reasons</em>. That, alone, should highlight that something is wrong in their analysis.</p>
<p>Republicans hate it because they say it lets websites censor conservative speech. Democrats hate it because they say it lets websites host dangerous disinformation.</p>
<p>Read those two sentences again.</p>
<p>One side is furious that platforms <em>can</em> moderate. The other side is furious that platforms <em>don&rsquo;t have to</em> moderate. Both sides are attacking the same 26-word provision of a 30-year-old law&mdash;and if you understand why their complaints are contradictory, you understand what Section 230 <em>actually</em> does.</p>
<p>This weekend marked the 30th anniversary of the Telecommunications Act of 1996, which contained the mostly unconstitutional Communications Decency Act, which inexplicably contained Section 230. (If you want the full history, I hosted <a href="https://podcasts.apple.com/us/podcast/otherwise-objectionable/id1798723661" rel="noopener noreferrer" target="_blank">a podcast series about it</a> last year.) And after three decades, there&rsquo;s now a concerted, bipartisan effort to kill it&mdash;by people who either don&rsquo;t understand what the law does, or understand perfectly well and see its destruction as a path to controlling the flow of information online.</p>
<p>Years back I wrote a piece debunking <a href="https://www.techdirt.com/2020/06/23/hello-youve-been-referred-here-because-youre-wrong-about-section-230-communications-decency-act/" rel="noopener noreferrer" target="_blank">many of the myths about 230</a>. The myths have only multiplied since.</p>
<p>Both critiques, stripped of their partisan framing, are about the same thing: <strong>who gets to control what speech appears where</strong>. And Section 230&rsquo;s answer to both sides is the same: pound sand.</p>
<p>That&rsquo;s what the law actually does. It doesn&rsquo;t mandate or prohibit &ldquo;censorship.&rdquo; It doesn&rsquo;t require neutrality (that&rsquo;s a myth that won&rsquo;t die). It simply says: if you have a problem with content online, take it up with the person who created it, not the service hosting it. Platforms can moderate however they see fit&mdash;aggressively, lightly, inconsistently, politically&mdash;and they won&rsquo;t face ruinous liability for those choices. They also won&rsquo;t face liability for what they <em>don&rsquo;t</em> remove.</p>
<p>This is what makes an open internet possible. Without that protection, no service would risk hosting user content at all. Or if they did, every moderation decision would require a lawyer&rsquo;s sign-off, optimizing for liability reduction rather than healthy communities. The people who actually understand how to build good online spaces&mdash;trust and safety professionals, community managers&mdash;would be overruled by legal departments playing defense.</p>
<p>Almost all criticism of Section 230 is not actually about Section 230. It&rsquo;s about one of two things: (1) not liking something in society that manifests online, and incorrectly believing that changing the law will somehow fix it, or (2) wanting control over what content platforms host.</p>
<p>So what happens if critics get their way? There&rsquo;s a lobbying campaign right now claiming that reforming or repealing 230 will lead to &ldquo;greater responsibility from tech companies.&rdquo;</p>
<p>This is exactly backwards.</p>
<p>Without 230&rsquo;s protections, smaller platforms&mdash;the ones that might actually compete with the giants&mdash;get destroyed first. They can&rsquo;t afford the vexatious lawsuits. They can&rsquo;t afford buildings full of lawyers. The big players survive, and their market position gets locked in even harder.</p>
<p>And those surviving giants won&rsquo;t become more responsible. They&rsquo;ll become less. Any competent legal team will tell them: the less you know, the less liability you have. Don&rsquo;t proactively look for harmful content. Don&rsquo;t research how your platform causes harm&mdash;those findings would be exhibit A in every lawsuit. Just stick your head in the sand and let the lawyers handle the subpoenas.</p>
<p>This is how liability regimes work, and America&rsquo;s exceptionally litigious legal culture makes these incentives even stronger. The critics either don&rsquo;t understand this or don&rsquo;t care, because their actual goal was never &ldquo;responsibility.&rdquo; It was control. That they&rsquo;ve duped some tech critics into thinking it&rsquo;s about &ldquo;responsibility&rdquo; or &ldquo;safety&rdquo; doesn&rsquo;t change that. Because it won&rsquo;t improve responsibility or safety. But it will give politicians tremendous power over online speech.</p>
<p>Thirty years ago, a 26-word provision buried in a mostly unconstitutional law kicked off the open internet. It let anyone build a platform, host a community, create something new&mdash;without needing permission from lawyers or regulators first. That era is now under direct attack by people who misrepresent what Section 230 does and misrepresent what killing it would mean.</p>
<p>The open web turned 30 this weekend. The bipartisan campaign to kill it was never about responsibility or safety, it was always about control. Whether the open web sees age 31 comes down to 26 words that tell both sides to pound sand.</p>]]></content>
	<updated>2026-02-09T18:49:06+00:00</updated>
	<author><name>Mike Masnick</name></author>
	<source>
		<id>https://www.techdirt.com/</id>
		<link rel="self" href="https://www.techdirt.com/"/>
		<updated>2026-02-09T18:49:06+00:00</updated>
		<title>Techdirt.</title></source>

	<category term="control"/>

	<category term="free speech"/>

	<category term="intermediary liability"/>

	<category term="open internet"/>

	<category term="section 230"/>

	<category term="t:1"/>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-01-06:/972603</id>
	<link href="https://postgr.es/p/7p7" rel="alternate" type="text/html"/>
	<title type="html">Josef Machytka: Dissecting PostgreSQL Data Corruption</title>
	<summary type="html"><![CDATA[<p>PostgreSQL 18 made one very important change &ndash; data block checksums are now enabled by defaul...</p>]]></summary>
	<content type="html"><![CDATA[<div>
<p><strong>PostgreSQL 18</strong> made one very important change &ndash; data block checksums are now enabled by default for new clusters at cluster initialization time. I already wrote about it in <a href="https://www.credativ.de/en/blog/postgresql-en/postgresql-18-enables-datachecksums-by-default/" rel="noopener noreferrer" target="_blank">my previous article</a>. I also mentioned that there are still many existing <a href="https://www.credativ.de/en/portfolio/support/postgresql-competence-center/" rel="noopener noreferrer" target="_blank">PostgreSQL</a> installations without data checksums enabled, because this was the default in previous versions. In those installations, data corruption can sometimes cause mysterious errors and prevent normal operational functioning. In this post, I want to dissect common PostgreSQL data corruption modes, to show how to diagnose them, and sketch how to recover from them.</p>
<p>Corruption in PostgreSQL relations without data checksums surfaces as low-level errors like &ldquo;invalid page in block xxx&rdquo;, transaction ID errors, TOAST chunk inconsistencies, or even backend crashes. Unfortunately, some backup strategies can mask the corruption. If the cluster does not use checksums, then tools like <em>pg_basebackup</em>, which copy data files as they are, cannot perform any validation of data, so corrupted pages can quietly end up in a base backup. If checksums are enabled, <em>pg_basebackup</em> verifies them by default unless <em>&ndash;no-verify-checksums</em> is used. In practice, these low-level errors often become visible only when we directly access the corrupted data. Some data is rarely touched, which means corruption often surfaces only during an attempt to run <em>pg_dump</em> &mdash; because pg_dump must read all data.</p>
<p>Typical errors include:</p>
</div>
<blockquote>
<div>
<pre>-- invalid page in a table:
pg_dump: error: query failed: ERROR: invalid page in block 0 of relation base/16384/66427
pg_dump: error: query was: SELECT last_value, is_called FROM public.test_table_bytea_id_seq

-- damaged system columns in a tuple:
pg_dump: error: Dumping the contents of table "test_table_bytea" failed: PQgetResult() failed.
pg_dump: error: Error message from server: ERROR: could not access status of transaction 3353862211
DETAIL: Could not open file "pg_xact/0C7E": No such file or directory.
pg_dump: error: The command was: COPY public.test_table_bytea (id, id2, id3, description, data) TO stdout;

-- damaged sequence:
pg_dump: error: query to get data of sequence "test_table_bytea_id2_seq" returned 0 rows (expected 1)

-- memory segmentation fault during pg_dump:
pg_dump: error: Dumping the contents of table "test_table_bytea" failed: PQgetCopyData() failed.
pg_dump: error: Error message from server: server closed the connection unexpectedly
This probably means the server terminated abnormally
before or while processing the request.
pg_dump: error: The command was: COPY public.test_table_bytea (id, id2, id3, description, data) TO stdout;</pre>
</div>
</blockquote>
<div>
<p>Note: in such cases, unfortunately <em>pg_dump</em> exits on the first error and does not continue. But we can use a simple script which, in a loop, reads table names from the database and dumps each table separately into a separate file, with redirection of error messages into a table-specific log file. This way we both back up tables which are still intact and find all corrupted objects.</p>
<h4>Understanding errors</h4>
<p>The fastest way to make sense of those symptoms is to map them back to which part of an 8 KB heap page is damaged. To be able to test it, I created a &ldquo;corruption simulator&rdquo; Python script which can surgically damage specific parts of a data block. Using it we can test common corruption modes. We will see how to diagnose each with <em>pageinspect</em>, look if <em>amcheck</em> can help in these cases, and show how to surgically unblock queries with <em>pg_surgery</em> when a single tuple makes an entire table unreadable.</p>
</div>
<div>
<h4>PostgreSQL heap table format</h4>
<div>
<div>
<div>PostgreSQL stores heap table data in fixed-size blocks (typically 8 KB). Each block is laid out as:</div>
<ul>
<li>Header: metadata for block management and integrity</li>
<li>Item ID (tuple pointer) array: entries pointing to tuples (offset + length + flags)</li>
<li>Free space</li>
<li>Tuples: actual row data, each with its own tuple header (system columns)</li>
<li>Special space: reserved for index-specific or other relation-specific data &ndash; heap tables do not use it</li>
</ul>
<div>
<p><a href="https://www.credativ.de/wp-content/uploads/2025/12/pg_data_block.png" rel="noopener noreferrer" target="_blank"><img alt="" src="https://www.credativ.de/wp-content/uploads/2025/12/pg_data_block-1024x281.png" referrerpolicy="no-referrer" loading="lazy"></a></p>
</div>
</div>
</div>
<div>
<h4>Corrupted page header: the whole block becomes inaccessible</h4>
<p>The page header contains the layout pointers for the page. The most important fields, which we can also see via <em>pageinspect</em> are:</p>
<ul>
<li><em>pd_flags</em>: header flag bits</li>
<li><em>pd_lower</em>: offset to the start of free space</li>
<li><em>pd_upper</em>: offset to the end of free space</li>
<li><em>pd_special</em>: offset to the start of special space</li>
<li>plus <em>lsn, checksum, pagesize, version, prune_xid</em></li>
</ul>
<div>
<div>
<div>The block header occupies the first 24 bytes of each data block. Corruption in the header makes the entire block inaccessible, typically with an error like:</div>
<blockquote>
<div>
<div>
<pre>ERROR: invalid page in block 285 of relation base/16384/29724</pre>
</div>
</div>
</blockquote>
<div>
<div>
<p>This is the only class of corruption error that can be skipped by enabling <em>zero_damaged_pages = on</em> when the cluster does not use data block checksums. With <em>zero_damaged_pages = on</em>, blocks with corrupted headers are &ldquo;zeroed&rdquo; in memory and skipped, which literally means the whole content of the block is replaced with zeros. AUTOVACUUM removes zeroed pages, but cannot zero out unscanned pages.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<h5>Where the error comes from in PostgreSQL source code</h5>
<div>
<div>Of course the question is, how PostgreSQL diagnoses this problem without data block checksums. To answer it, we can check code in branches <em>REL_17_STABLE</em> / <em>REL_18_STABLE</em>. The error message: &ldquo;invalid page in block xx of relation xxx&rdquo; originates from the <em>src/backend/catalog/storage.c</em> file, in the <em>RelationCopyStorage</em> function. There, PostgreSQL calls <em>PageIsVerifiedExtended</em> (or <em>PageIsVerified</em> in 18) to validate the page before copying it. If the function returns <em>false</em>, the error is raised. Here is the part of the code which performs this test:</div>
</div>
</div>
<blockquote>
<div>
<div>
<pre>/*
* The following checks don't prove the header is correct, only that
* it looks sane enough to allow into the buffer pool. Later usage of
* the block can still reveal problems, which is why we offer the
* checksum option.
*/

if ((p-&gt;pd_flags &amp; ~PD_VALID_FLAG_BITS) == 0 &amp;&amp;
    p-&gt;pd_lower &lt;= p-&gt;pd_upper &amp;&amp;
    p-&gt;pd_upper &lt;= p-&gt;pd_special &amp;&amp;
    p-&gt;pd_special &lt;= BLCKSZ &amp;&amp;
    p-&gt;pd_special == MAXALIGN(p-&gt;pd_special))
    header_sane = true;

if (header_sane &amp;&amp; !checksum_failure)
    return true;</pre>
</div>
</div>
</blockquote>
<div>The comment gives us very important information &ndash; the check cannot prove that the header is correct, only that it &ldquo;looks sane enough&rdquo;. This immediately shows how important checksums are for data corruption diagnostics. Without checksums, PostgreSQL must check if values in the page header have expected &ldquo;sane&rdquo; ranges. Here is what a healthy page header looks like:</div>
<div></div>
<blockquote>
<pre>SELECT * FROM page_header(get_raw_page('pg_toast.pg_toast_32840', 100));

     lsn    | checksum | flags | lower | upper | special | pagesize | version | prune_xid
------------+----------+-------+-------+-------+---------+----------+---------+-----------
 0/2B2FCD68 |        0 |     4 |    40 |    64 |    8192 |     8192 |       4 |         0</pre>
</blockquote>
<div>Here we can see the values which are tested in PostgreSQL code, to check if the header &ldquo;looks sane enough&rdquo;. Flag bits have valid values 0x0001, 0x0002, 0x0004 and their combinations, i.e. a maximum of 0x0007. Any higher value is taken as an indication of corruption.</div>
<div>
<p>If the header is tested as corrupted, we cannot diagnose anything using SQL. With <em>zero_damaged_pages = off</em>&nbsp;any attempt to read this page ends with an error similar to the example shown above. If we set <em>zero_damaged_pages = on</em>&nbsp;then on the first attempt to read this page everything is replaced with all zeroes, including the header:</p>
<div>
<blockquote>
<div>
<div>
<pre>SELECT * from page_header(get_raw_page('pg_toast.pg_toast_28740', 578));
WARNING: invalid page in block 578 of relation base/16384/28751; zeroing out page

 lsn | checksum | flags | lower | upper | special | pagesize | version | prune_xid
-----+----------+-------+-------+-------+---------+----------+---------+-----------
 0/0 |        0 |     0 |     0 |     0 |       0 |        0 |       0 |         0</pre>
</div>
</div>
</blockquote>
</div>
</div>
<div>
<div>
<h4>Corrupted Item IDs array: offsets and lengths become nonsense</h4>
<div>
<div>
<div>
<div>The Item IDs array contains 4-byte pointers to tuples &ndash; offset + length + flags. If this array is corrupted, tuples cannot be safely located/read, because offset and length now contain random values. Frequently bigger than the data page size &ndash; bigger than 8192. Typical errors caused by this problem are:</div>
<div>
<div>
<ul>
<li>ERROR: invalid memory alloc request size 18446744073709551594</li>
<li>DEBUG: server process (PID 76) was terminated by signal 11: Segmentation fault</li>
</ul>
</div>
</div>
<div>
<div></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div>Here is what a healthy data page looks like:</div>
<div>
<blockquote>
<pre>SELECT lp, lp_off, lp_flags, lp_len, t_xmin, t_xmax, t_field3, t_ctid, t_infomask2, t_infomask, t_hoff, t_bits, t_oid, substr(t_data::text,1,50) as t_data
FROM heap_page_items(get_raw_page('public.test_table', 7));

 lp | lp_off | lp_flags | lp_len | t_xmin | t_xmax | t_field3 | t_ctid | t_infomask2 | t_infomask | t_hoff | t_bits | t_oid | t_data
----+--------+----------+--------+--------+--------+----------+--------+-------------+------------+--------+--------+-------+----------------------------------------------------
  1 |   7936 |        1 |    252 |  29475 |      0 |        0 |  (7,1) |           5 |       2310 |     24 |        |       | \x01010000010100000101000018030000486f742073656520
  2 |   7696 |        1 |    236 |  29476 |      0 |        0 |  (7,2) |           5 |       2310 |     24 |        |       | \x020100000201000002010000d802000043756c747572616c
  3 |   7504 |        1 |    189 |  29477 |      0 |        0 |  (7,3) |           5 |       2310 |     24 |        |       | \x0301000003010000030100001c020000446f6f7220726563
  4 |   7368 |        1 |    132 |  29478 |      0 |        0 |  (7,4) |           5 |       2310 |     24 |        |       | \x0401000004010000040100009d4d6f76656d656e74207374
</pre>
</blockquote>
</div>
<p>Here we can nicely see the Item IDs array &ndash; offsets and lengths. The first tuple is stored at the very end of the data block, therefore it has the biggest offset. Each subsequent tuple is stored closer and closer to the beginning of the page, so offsets are getting smaller. We can also see lengths of tuples, they are all different, because they contain a variable-length text value. We can also see tuples and their system columns, but we will look at them later.</p>
<p>Now, when we damage the Item IDs array and diagnose how it looks like &ndash; output is shortened because all other columns are empty as well. Due to the damaged Item IDs array, we cannot properly read tuples. Here we can immediately see the problem &ndash; offsets and lengths contain random values, the majority of them exceeding 8192, i.e. pointing well beyond data page boundaries:</p>
<blockquote>
<div>
<pre> lp | lp_off | lp_flags | lp_len | t_xmin | t_xmax 
----+--------+----------+--------+--------+--------
  1 |  19543 |        1 |  16226 |        | 
  2 |   5585 |        2 |   3798 |        | 
  3 |  25664 |        3 |  15332 |        | 
  4 |  10285 |        2 |  17420 |        |</pre>
</div>
</blockquote>
<div>Because PostgreSQL is, most of the time, remarkably stable and corruption is rare, the code which interprets the content of the data page does not perform any additional checks of key values beyond what we have already seen in the test of the page header. Therefore, these damaged offsets and lengths are used as they are, in many cases exceeding the 8kB variable containing the data page, which causes the errors mentioned above.</div>
<div></div>
<div>Note about the <em>amcheck</em> extension &ndash; although this extension can be useful in other cases, when we try to use it in this situation, we get strangely formulated messages which do not clearly indicate the problem:</div>
<blockquote>
<div>
<div>
<pre>SELECT * FROM verify_heapam('test_table', FALSE, FALSE, 'none', 7, 7);

 blkno | offnum | attnum | msg
-------+--------+--------+---------------------------------------------------------------------------
     7 |      1 |        | line pointer to page offset 19543 is not maximally aligned
     7 |      2 |        | line pointer redirection to item at offset 5585 exceeds maximum offset 4
     7 |      4 |        | line pointer redirection to item at offset 10285 exceeds maximum offset 4</pre>
</div>
</div>
</blockquote>
<div>
<div>
<h4>Corrupted tuples: system columns can break scans</h4>
<div>
<div>Tuple corruption leads to random values in columns, but the most critical part is the tuple header (system columns). Columns <em>xmin</em>, <em>xmax</em> and <em>hint bits</em> are especially critical. Random content in these columns causes errors like these examples:</div>
<div>
<div>
<ul>
<li>58P01 &ndash; could not access status of transaction 3047172894</li>
<li>XX000 &ndash; MultiXactId 1074710815 has not been created yet &mdash; apparent wraparound</li>
<li>WARNING: Concurrent insert in progress within table &ldquo;test_table&rdquo;</li>
</ul>
</div>
</div>
</div>
</div>
</div>
<div>These errors can raise concerns about the overall status of the PostgreSQL cluster. But there is nothing wrong with the actual transactions; these error messages are entirely caused by damaged system columns in tuples because PostgreSQL tries to interpret values as they are. We can see it clearly when we examine tuples using <em>pageinspect</em>:</div>
<blockquote>
<pre> lp | lp_off | lp_flags | lp_len |   t_xmin   |   t_xmax   |  t_field3  |       t_ctid       | t_infomask2 | t_infomask | t_hoff | t_bits | t_oid
----+--------+----------+--------+------------+------------+------------+--------------------+-------------+------------+--------+--------+-------
  1 |   6160 |        1 |   2032 | 1491852297 |  287039843 |  491133876 | (3637106980,61186) |       50867 |      46441 |    124 |        |
  2 |   4128 |        1 |   2032 | 3846288155 | 3344221045 | 2002219688 | (2496224126,65391) |       34913 |      32266 |     82 |        |
  3 |   2096 |        1 |   2032 | 1209990178 | 1861759146 | 2010821376 | (426538995,32644)  |       23049 |       2764 |    215 |        |</pre>
</blockquote>
<div>As we can see, all system columns in tuples contain completely ridiculous values. No wonder PostgreSQL fails with strange errors when it tries to interpret them as they are. If the table contains toasted values and the TOAST table is damaged, we can see additional errors caused again by damaged tuples:</div>
<div>
<ul>
<li>XX000 &ndash; unexpected chunk number -556107646 (expected 20) for toast value 29611 in pg_toast_29580</li>
<li>XX000 &ndash; found toasted toast chunk for toast value 29707 in pg_toast_29580</li>
</ul>
</div>
<div>
<h4>Dealing with corrupted tuples using pg_surgery</h4>
<div>
<div>
<div>
<p>Even a single corrupted tuple can prevent selects from the entire table. Corruption in <em>xmin</em>, <em>xmax</em> and <em>hint bits</em> will cause a query to fail because the MVCC mechanism will be unable to determine visibility of these damaged tuples. Without data block checksums, we cannot easily zero out such damaged pages, since their header already passed the &ldquo;sanity&rdquo; test. We would have to do salvaging row-by-row using a PL/pgSQL script. But if a table is huge and the count of damaged tuples is small, this will be highly impractical.</p>
<p>In such a case, we should think about using the <em>pg_surgery</em> extension to freeze or remove corrupted tuples. But first, the correct identification of damaged tuples is critical, and second, the extension exists since PostgreSQL 14, it is not available in older versions. Its functions require <em>ctid</em>, but we must construct a proper value based on page number and ordinal number of the tuple in the page, we cannot use a damaged <em>ctid</em> from tuple header as shown above.</p>
</div>
</div>
</div>
<div>
<h5>Freeze vs kill</h5>
<div>
<p>Frozen tuples are visible to all transactions and stop blocking reads. But they still contain corrupted data: queries will return garbage. Therefore, just freezing corrupted tuples will most likely not help us, and we must kill damaged tuples. But freezing them first might be helpful for making sure we are targeting the proper tuples. Freezing simply means that function <em>heap_force_freeze</em> (with the proper <em>ctid</em>) will replace <em>t_xmin</em> with value <em>2</em> (frozen tuple), <em>t_xmax</em> with <em>0</em> and will repair <em>t_ctid</em>.</p>
<p>But all other values will stay as they are, i.e. still damaged. Using the <em>pageinspect</em> extension as shown above will confirm we work with a proper tuple. After this check, we can kill damaged tuples using the <em>heap_force_kill</em> function with the same parameters. This function will rewrite the pointer in the Item ID array for this specific tuple and mark it as dead.</p>
<p>Warning &mdash; functions in <em>pg_surgery</em> are considered unsafe by definition, so use them with caution. You can call them from SQL like any other function, but they are not MVCC-transactional operations. Their actions are irreversible &ndash; ROLLBACK cannot &ldquo;undo&rdquo; a freeze or kill, because these functions directly modify a heap page in shared buffers and WAL-log the change. Therefore, we should first test them on a copy of that specific table (if possible) or on some test table. Killing the tuple can also cause inconsistency in indexes, because the tuple does not exist anymore, but it could be referenced in some index. They write changes into the WAL log; therefore, the change will be replicated to standbys.</p>
</div>
</div>
</div>
<h4>Summary</h4>
<div>Without a proper backup, damaged data cannot be repaired. It can only be removed. But even this can be quite painful if the cluster does not use data page checksums. We can only either kill corrupted tuples or salvage readable data row-by-row. Real-life examples have repeatedly shown&nbsp; that the majority of companies can live with some data loss &ndash; but they need to resume normal operations as soon as possible. Therefore, in very specific situations &ndash; like having only a few corrupted tuples in a table with the size of dozens or hundreds of gigabytes &ndash; &ldquo;surgery on tuples&rdquo; could be the only way to resume normal operations without time consuming salvage of records. This again shows the importance of checksums.</div>
<div></div>]]></content>
	<updated>2026-01-06T09:03:36+00:00</updated>
	<author><name></name></author>
	<source>
		<id>http://planet.postgresql.org</id>
		<link rel="self" href="http://planet.postgresql.org"/>
		<updated>2026-01-06T09:03:36+00:00</updated>
		<title>Planet PostgreSQL</title></source>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2026-01-06:/972663</id>
	<link href="https://go.theregister.com/feed/www.theregister.com/2026/01/06/memory_firm_profits_up_as/" rel="alternate" type="text/html"/>
	<title type="html">Mem-ageddon: AI chip frenzy to wallop DRAM prices with 70% hike</title>
	<summary type="html"><![CDATA[<p>Samsung and SK hynix readying another gouge as server silicon squeeze leaves PCs and phones out in t...</p>]]></summary>
	<content type="html"><![CDATA[<h4>Samsung and SK hynix readying another gouge as server silicon squeeze leaves PCs and phones out in the cold</h4> <p>Memory prices are set to spike again as chipmakers prioritize AI server production over consumer devices, with analysts warning of a high double-digit jump in Q1 2026 alone as demand outpaces supply.&hellip;</p>]]></content>
	<updated>2026-01-06T14:40:12+00:00</updated>
	<author><name>Dan Robinson</name></author>
	<source>
		<id>http://www.theregister.co.uk/</id>
		<link rel="self" href="http://www.theregister.co.uk/"/>
		<updated>2026-01-06T14:40:12+00:00</updated>
		<title>The Register</title></source>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-12-29:/971238</id>
	<link href="https://www.jwz.org/blog/2025/12/today-in-google-broke-email-2/" rel="alternate" type="text/html"/>
	<title type="html">Today in &quot;Google broke email&quot;</title>
	<summary type="html"><![CDATA[<p>I have just learned that, beginning in 3 days, my employees will no longer be able to receive their...</p>]]></summary>
	<content type="html"><![CDATA[<img src="https://cdn.jwz.org/images/2017/multipart.png" srcset="https://cdn.jwz.org/images/2017/multipart.png 615w,https://cdn.jwz.org/images/scaled/360/2017/multipart.png 360w,https://cdn.jwz.org/images/2017/multipart.png 615w,https://cdn.jwz.org/images/scaled/360/2017/multipart.png 360w" sizes="(max-width: 660px) 30vw, 22em" loading="lazy" referrerpolicy="no-referrer"> I have just learned that, beginning in 3 days, my employees will no longer be able to receive their work email. <p>Apparently Google is <a href="https://www.forbes.com/sites/daveywinder/2025/10/03/gmail-says-it-wont-deliver-insecure-email-from-january-2026/" rel="noopener noreferrer" target="_blank">dropping support</a> for Gmail accounts being able to fetch mail from outside accounts. At all. And they <a href="https://support.google.com/mail/answer/16604719" rel="noopener noreferrer" target="_blank">announced</a> this change less than 60 days ago. (The announcement was in the basement, stairs, leopard, etc.) </p><p>What I want to accomplish is simple: </p><p></p><ol> <li> When email arrives for <b>employee@dnalounge.com</b>, have it delivered to the inbox of <b>dna_employee@gmail.com</b>. </li><li> When that employee is logged into that gmail account, have them able to send email with <b>employee@dnalounge.com</b> in the From: header. </li></ol> <p>This cannot be accomplished by simply having <b>mail.dnalounge.com</b> forward messages for <b>employee@dnalounge.com</b> to <b>dna_employee@gmail.com</b> because SPF destroyed email forwarding. Specifically: </p><p></p><ol> <li> <b>customer@example.com</b> sends mail to <b>employee@dnalounge.com</b>. </li><li> The SPF record of <b>example.com</b> includes <tt>"-all"</tt> (strict) as is now common. </li><li> <b>mail.dnalounge.com</b> forwards that messages to <b>dna_employee@gmail.com</b>. </li><li> Gmail says, <i>"example.com does not permit dnalounge.com to send email on their behalf"</i> and rejects it with "550 SPF hard fail". </li></ol> <p>My current email flow is this: </p><p></p><ol> <li> Inbound mail: <ol type="A"> <li> Email for <b>employee@dnalounge.com</b> arrives at my server. </li><li> Message is stored in my server's Dovecot/Maildir. </li><li> <b>dna_employee@gmail.com</b> has <i>"Import emails from my other account (POP3)"</i> selected, and Gmail has a saved plaintext copy of their <b>mail.dnalounge.com</b> email password to accomplish this. </li><li> Gmail polls and downloads their email over POP3 every 30-90 minutes, sometimes longer. <b><i>&larr;&nbsp;This is the thing that is going away.</i></b> </li><li> Gmail runs their aggressive spam filtering on that, and puts some subset of it into their Gmail inbox. <p></p></li></ol> </li><li> Outbound mail: <ol type="A" start="6"> <li> <b>dna_employee@gmail.com</b> has its outgoing From address configured as <b>employee@dnalounge.com</b> (via <i>"Add another email address"</i>). </li><li> When they use Gmail to send mail from their <b>employee@dnalounge.com</b> address, Gmail delivers it to <b>mail.dnalounge.com</b>, authenticating with the saved plaintext copy of the employee's <b>mail.dnalounge.com</b> password. </li><li> <b>mail.dnalounge.com</b> delivers it to <b>customer@example.com</b>, so the SPF record matches <b>mail.dnalounge.com</b> as the origin (and I don't have to have my SPF record say <i>"any spammer on gmail.com is allowed to send mail pretending to be any dnalounge.com address."</i>). </li></ol> </li></ol> <p>The <a href="https://www.forbes.com/sites/daveywinder/2025/10/03/gmail-says-it-wont-deliver-insecure-email-from-january-2026/" rel="noopener noreferrer" target="_blank">linked article</a> says "Gmail will continue to support IMAP" which sounds like: "Gmail can still poll your server to download email, you just have to switch from POP to IMAP". That would be fine if it were true, but it is not. Gmail does not and has never supported importing email via IMAP into the Gmail MDA/MTA. It only supports adding an IMAP server as a second account in the MUA, which is not the same thing at all. </p><p>Now that Google is removing the ability to have Gmail poll my server to download messages, what are my options? </p><p>Here are some things that people will suggest that are unacceptable: </p><p></p><ol> <li> Have the dnalounge.com MX record point to some Google thing and let them take over 100% of my company's email. Fuck no. Also it wouldn't integrate with our internal systems, store, transactional emails, bounce processing, etc. <p></p></li><li> Have my employees' official business email addresses end in @gmail.com. Obviously no. (Maybe @aol.com though.) <p></p></li><li> Use "Sender Rewriting Scheme" to have dnalounge.com rewrite <b>customer@example.com</b> to <b><u>customer%example.com</u>@dnalounge.com</b> before forwarding it to <b>dna_employee@gmail.com</b>, which is insane, but also will cause any forwarded spam to be tallied against dnalounge.com and Google will just stop delivering them. At some point, <a href="https://support.google.com/mail/answer/175365?hl=en" rel="noopener noreferrer" target="_blank">Google's "best practices for forwarding" document</a> specifically dis-recommended SRS. <p></p></li><li> Find some other third-party email provider that still offers the POP3-download service that Gmail used to, and tell my staff, "Great news everybody! You have to switch from Gmail to Hotmail now." </li></ol> <p>So the only options that I think I have left are: </p><p></p><ol start="5"> <li> Self-host IMAP. <ol type="A"> <li> Every employee gets their own IMAP account, hosted on my own server. </li><li> They can add that account to the Gmail mobile app or whatever, as a second IMAP account that is not Gmail. Which is apparently still supported. For now. </li><li> My server is now responsible for storing all of their messages, including all of their spam. It is a vast amount of data. I will have to implement quotas. </li><li> My employees will be wasting a bunch of time trying to find and delete emails with the same giant attachment in each of the 30 messages in the same thread, and if they don't, mail to them will bounce. </li><li> "I can't find that old email any more" is a conversation that we will be having all the time. </li><li> My employees will be receiving <i>way</i> more spam, since Gmail's spam filtering is (presumably?) still more effective than what I can accomplish with some stock set of spamassassin rules. </li></ol> <p></p></li><li> Walk North until I reach the nearest fjord, board an ice floe, lie down, and wait for my bones to turn to dust. The ocean will sequester my carbon. I hope this email does not find you. </li></ol> <p>Do I have other options? </p><p>In summary, everything is terrible. </p><p><a href="https://www.jwz.org/blog/2022/08/today-in-google-broke-email/" rel="noopener noreferrer" target="_blank">Previously</a>, <a href="https://www.jwz.org/blog/2025/12/today-in-email-hegemony-2/" rel="noopener noreferrer" target="_blank">previously</a>, <a href="https://www.jwz.org/blog/2025/03/dmarc-and-spf/" rel="noopener noreferrer" target="_blank">previously</a>, <a href="https://www.jwz.org/blog/2025/01/new-gmail-war-crime-spotted-in-the-wild/" rel="noopener noreferrer" target="_blank">previously</a>, <a href="https://www.jwz.org/blog/2024/09/ses-or-staring-down-the-dragon/" rel="noopener noreferrer" target="_blank">previously</a>, <a href="https://www.jwz.org/blog/2024/02/spamnesty/" rel="noopener noreferrer" target="_blank">previously</a>, <a href="https://www.jwz.org/blog/2022/09/the-oligopoly-has-won/" rel="noopener noreferrer" target="_blank">previously</a>.</p>]]></content>
	<updated>2025-12-29T20:40:36+00:00</updated>
	<author><name>jwz</name></author>
	<source>
		<id>https://www.jwz.org/blog/</id>
		<link rel="self" href="https://www.jwz.org/blog/"/>
		<updated>2025-12-29T20:40:36+00:00</updated>
		<title>jwz</title></source>

	<category term="computers"/>

	<category term="corporations"/>

	<category term="dnalounge"/>

	<category term="doomed"/>

	<category term="firstperson"/>

	<category term="lazyweb"/>

	<category term="mail"/>

	<category term="spam"/>


	<link rel="enclosure" 
		type="image/png" 
		length="27614"
		href="https://cdn.jwz.org/images/2017/multipart.png"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-12-26:/970834</id>
	<link href="https://www.smbc-comics.com/comic/content-2" rel="alternate" type="text/html"/>
	<title type="html">Saturday Morning Breakfast Cereal - Content</title>
	<summary type="html"><![CDATA[<p>Click here to go see the bonus panel!Hovertext:Someone out there is going to take a timed break from...</p>]]></summary>
	<content type="html"><![CDATA[<a href="https://www.smbc-comics.com/comic/content-2" rel="noopener noreferrer" target="_blank"><img src="https://www.smbc-comics.com/comics/1766630571-20251226%20-%20Edit.png" referrerpolicy="no-referrer" loading="lazy"><br><br>Click here to go see the bonus panel!</a><p>Hovertext:<br>Someone out there is going to take a timed break from running a content farm, read this, and get a faraway look for a second.</p><br>Today's News:<br>]]></content>
	<updated>2025-12-26T16:20:00+00:00</updated>
	<author><name>Zach Weinersmith</name></author>
	<source>
		<id>http://www.smbc-comics.com/</id>
		<link rel="self" href="http://www.smbc-comics.com/"/>
		<updated>2025-12-26T16:20:00+00:00</updated>
		<title>Saturday Morning Breakfast Cereal (updated daily)</title></source>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-12-21:/969925</id>
	<link href="https://hackaday.com/2025/12/21/why-chopped-carbon-fiber-in-fdm-prints-is-a-contaminant/" rel="alternate" type="text/html"/>
	<title type="html">Why Chopped Carbon Fiber in FDM Prints is a Contaminant</title>
	<summary type="html"><![CDATA[<p>A lot of claims have been made about the purported benefits of adding chopped carbon fiber to FDM fi...</p>]]></summary>
	<content type="html"><![CDATA[<div><img src="https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg?w=800" alt="" decoding="async" loading="lazy" srcset="https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg 1359w,https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg?resize=250,140 250w,https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg?resize=400,224 400w,https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg?resize=800,447 800w,https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg 1359w,https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg?resize=250,140 250w,https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg?resize=400,224 400w,https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg?resize=800,447 800w" sizes="auto, (max-width: 800px) 100vw, 800px" referrerpolicy="no-referrer"></div><p>A lot of claims have been made about the purported benefits of adding chopped carbon fiber to FDM filaments, but how many of these claims are actually true? In the case of PLA at least, the [I built a thing] channel on YouTube <a href="https://www.youtube.com/watch?v=w7JperqVfXI" target="_blank" rel="noopener noreferrer">makes a convincing case</a> that for PLA filament, the presence of chopped CF can be considered a contaminant that weakens the part.</p>
<p>Using the facilities of the University of Basel for its advanced imaging gear, the PLA-CF parts were subjected to both scanning electron microscope (SEM) and Micro CT imaging. The SEM images were performed on the fracture surfaces of parts that were snapped to see what this revealed about the internal structure. From this, it becomes apparent that the chopped fibers distribute themselves both inside and between the layers, with no significant adherence between the PLA polymer and the CF. There is also evidence for voids created by the presence of the CF.</p>
<p>To confirm this, an intact PLA-CF print was scanned using a Micro CT scanner over 13 hours. This confirmed the SEM findings, in that the voids were clearly visible, as was the lack of integration of the CF into the polymer. This latter point shouldn&rsquo;t be surprising, as the thermal coefficient of PLA is much higher than that of the roughly zero-to-negative of CF. This translates into a cooling PLA part shrinking around the CF, thus creating the voids.</p>
<p><span></span></p>
<p>What this means is that for PLA-CF, the presence of CF is by all measures an undesirable contaminant that effectively compromises it as much as having significant moisture in the filament before printing. Although for other thermoplastics used with FDM printing, chopped CF may make more sense, with PLA-CF, you&rsquo;re effectively throwing away money for worse results.</p>
<p>As also noted in the video, in medical settings, these CF-reinforced FDM filaments aren&rsquo;t permitted due to the chopped CF fragments. This topic has featured more widely in both the scientific literature and YouTube videos in recent years, with some significant indications that fragments of these chopped fibers can have asbestos-like implications when inhaled.</p>
<p>Meanwhile, are you&rsquo;re looking for the thrill of a weird filament? Maybe try <a href="https://hackaday.com/2025/11/20/rare-filament-makes-weird-benchies/" rel="noopener noreferrer" target="_blank">one of these</a>.</p>
<p></p>]]></content>
	<updated>2025-12-21T18:00:16+00:00</updated>
	<author><name>Maya Posch</name></author>
	<source>
		<id>http://hackaday.com</id>
		<link rel="self" href="http://hackaday.com"/>
		<updated>2025-12-21T18:00:16+00:00</updated>
		<title>Hackaday</title></source>

	<category term="3d printer hacks"/>

	<category term="carbon fiber"/>

	<category term="carbon fiber 3d printing"/>

	<category term="polylactic acid"/>

	<category term="science"/>


	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://hackaday.com/wp-content/uploads/2025/12/pla-cf_sem_detail_I_built_a_thing_youtube.jpg"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-12-05:/966046</id>
	<link href="https://www.jwz.org/blog/2025/12/los-campesinos-on-streaming/" rel="alternate" type="text/html"/>
	<title type="html">Los Campesinos on streaming:</title>
	<summary type="html"><![CDATA[<p>"It being Streaming Stat Season, I thought now would be a good time to offer a detailed breakdown of...</p>]]></summary>
	<content type="html"><![CDATA[<div><a href="https://loscampesinos.com/heres-how-much-money-los-camp-make-from-streaming/" rel="noopener noreferrer" target="_blank"><img src="https://cdn.jwz.org/images/scaled/768/2025/spotify-visuals-v2-800x800.jpg" srcset="https://cdn.jwz.org/images/2025/spotify-visuals-v2-800x800.jpg 800w,https://cdn.jwz.org/images/scaled/768/2025/spotify-visuals-v2-800x800.jpg 768w,https://cdn.jwz.org/images/scaled/640/2025/spotify-visuals-v2-800x800.jpg 640w,https://cdn.jwz.org/images/scaled/360/2025/spotify-visuals-v2-800x800.jpg 360w,https://cdn.jwz.org/images/2025/spotify-visuals-v2-800x800.jpg 800w,https://cdn.jwz.org/images/scaled/768/2025/spotify-visuals-v2-800x800.jpg 768w,https://cdn.jwz.org/images/scaled/640/2025/spotify-visuals-v2-800x800.jpg 640w,https://cdn.jwz.org/images/scaled/360/2025/spotify-visuals-v2-800x800.jpg 360w" sizes="(max-width: 660px) 35vw, 26em" loading="lazy" referrerpolicy="no-referrer"></a></div><a href="https://loscampesinos.com/heres-how-much-money-los-camp-make-from-streaming/" rel="noopener noreferrer" target="_blank">"It being Streaming Stat Season, I thought now would be a good time to offer a detailed breakdown of how much money we make from our music being streamed."</a> <p></p><blockquote> <p>There are many reasons, unrelated to artist reimbursement, why Spotify is the dirt worst of the streaming platforms. I trust by now you are aware of these. </p><p>I want to make it very clear that I am not criticising anyone for using streaming platforms. Everyone streams, living is hell and we all love music. [...] </p><p>As you can see, the vast majority of people who streamed All Hell did so using Spotify. Unfortunately, of the major streaming platforms, Spotify pays significantly less per stream than anywhere else. </p><p>If everyone who streamed All Hell on Spotify had done so using Tidal instead, we would have received an extra &pound;31,847.38, which would double the amount we made from streaming of the album in this time period. Or if everyone used Apple Music it would have been &pound;12,331 more.</p></blockquote> <p></p><div align="CENTER"><a href="https://spotifyunwrapped.net/" rel="noopener noreferrer" target="_blank">Spotify Unwrapped:</a> </div> <p></p><div><div><div><a href="https://spotifyunwrapped.net/" rel="noopener noreferrer" target="_blank"><video loop autoplay playsinline muted><source src="https://cdn.jwz.org/images/scaled/mp4/2025/spotify-unwrapped-slide-1.mp4" type="video/mp4"></source></video></a></div><div><a href="https://spotifyunwrapped.net/" rel="noopener noreferrer" target="_blank"><video loop autoplay playsinline muted><source src="https://cdn.jwz.org/images/scaled/mp4/2025/spotify-unwrapped-slide-2.mp4" type="video/mp4"></source></video></a></div><div><a href="https://spotifyunwrapped.net/" rel="noopener noreferrer" target="_blank"><video loop autoplay playsinline muted><source src="https://cdn.jwz.org/images/scaled/mp4/2025/spotify-unwrapped-v1.mp4" type="video/mp4"></source></video></a></div><div><a href="https://spotifyunwrapped.net/" rel="noopener noreferrer" target="_blank"><video loop autoplay playsinline muted><source src="https://cdn.jwz.org/images/scaled/mp4/2025/spotify-unwrapped-slide-9.mp4" type="video/mp4"></source></video></a></div><div><a href="https://spotifyunwrapped.net/" rel="noopener noreferrer" target="_blank"><video loop autoplay playsinline muted><source src="https://cdn.jwz.org/images/scaled/mp4/2025/spotify-unwrapped-slide-13.mp4" type="video/mp4"></source></video></a></div></div></div> <p>Relatedly, <a href="https://daily.bandcamp.com/features/bandcamp-fridays" rel="noopener noreferrer" target="_blank">today is Bandcamp Friday</a> when 100% of your money goes to the artists. </p><p><i>"But what do you use, jwz?"</i> none of you are asking. I'm glad you asked! I do not use any streaming platforms. I purchase music as <i>files</i> that then live on my <i>computers</i> and <a href="https://www.jwz.org/blog/2022/09/ipod/" rel="noopener noreferrer" target="_blank"><i>computer-like devices</i></a> that are <a href="https://www.jwz.org/blog/2020/03/backups-3/" rel="noopener noreferrer" target="_blank"><i>backed up</i></a> on <i>hard drives</i> that I <a href="https://www.jwz.org/blog/2019/03/today-in-clown-computing-myspace/" rel="noopener noreferrer" target="_blank"><i>own</i></a>. I listen to them with <i>headphones</i> that have <a href="https://www.jwz.org/blog/2016/09/apple-plug/" rel="noopener noreferrer" target="_blank"><i>analog cables</i></a>. </p><p>When at all possible, I purchase music from <a href="https://www.bandcamp.com/" rel="noopener noreferrer" target="_blank">Bandcamp</a>, because of all the options available, that is the one where the artists make the most money. </p><p>When an album is not available on Bandcamp (as often happens with bands signed to major labels who <i>contractually prohibit</i> the bands from making their music available on Bandcamp) I have been using <a href="https://www.qobuz.com/" rel="noopener noreferrer" target="_blank">Qobuz</a>, which seems to be the least-bad second option at this time. The files are high quality and DRM-free. </p><p><a href="https://www.jwz.org/blog/2020/08/billionaire-says-musicians-are-broke-because-they-dont-work-hard-enough/" rel="noopener noreferrer" target="_blank">Previously</a>, <a href="https://www.jwz.org/blog/2025/11/the-algorithm-failed-music/" rel="noopener noreferrer" target="_blank">previously</a>, <a href="https://www.dnalounge.com/backstage/log/2024/12/03.html" rel="noopener noreferrer" target="_blank">previously</a>, <a href="https://www.jwz.org/blog/2014/02/hope-taping-is-killing-the-music-industry/" rel="noopener noreferrer" target="_blank">previously</a>.</p>]]></content>
	<updated>2025-12-05T20:53:24+00:00</updated>
	<author><name>jwz</name></author>
	<source>
		<id>https://www.jwz.org/blog/</id>
		<link rel="self" href="https://www.jwz.org/blog/"/>
		<updated>2025-12-05T20:53:24+00:00</updated>
		<title>jwz</title></source>

	<category term="conspiracies"/>

	<category term="copyright"/>

	<category term="corporations"/>

	<category term="doomed"/>

	<category term="firstperson"/>

	<category term="music"/>

	<category term="webcasting"/>


	<link rel="enclosure" 
		type="image/gif" 
		length="1992385"
		href="https://cdn.jwz.org/images/2025/spotify-unwrapped-v1.gif"/>

	<link rel="enclosure" 
		type="image/gif" 
		length="552141"
		href="https://cdn.jwz.org/images/2025/spotify-unwrapped-slide-2.gif"/>

	<link rel="enclosure" 
		type="image/gif" 
		length="256547"
		href="https://cdn.jwz.org/images/2025/spotify-unwrapped-slide-1.gif"/>

	<link rel="enclosure" 
		type="image/jpeg" 
		length="92762"
		href="https://cdn.jwz.org/images/2025/spotify-visuals-v2-800x800.jpg"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-11-21:/962804</id>
	<link href="https://go.theregister.com/feed/www.theregister.com/2025/11/21/google_workspace_smart_features/" rel="alternate" type="text/html"/>
	<title type="html">Google's AI is eating your email by default. Here's how to shut its mouth</title>
	<summary type="html"><![CDATA[<p>Want out of those new 'smart features'? We&rsquo;ve got you covered Google's "don't be evil" ethos is so 2...</p>]]></summary>
	<content type="html"><![CDATA[<h4>Want out of those new 'smart features'? We&rsquo;ve got you covered</h4> <p>Google's "don't be evil" ethos is so 2015. These days, the Chocolate Factory is all about integrating users with bots, whether they like it or not. Now, it's rolling out Workspace "smart features" that process personal content with AI, and many users are finding the settings enabled by default.&hellip;</p>]]></content>
	<updated>2025-11-21T22:30:18+00:00</updated>
	<author><name>Brandon Vigliarolo</name></author>
	<source>
		<id>http://www.theregister.co.uk/</id>
		<link rel="self" href="http://www.theregister.co.uk/"/>
		<updated>2025-11-21T22:30:18+00:00</updated>
		<title>The Register</title></source>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-10-03:/950760</id>
	<link href="https://incenseinthewind.blogspot.com/2025/10/malaan-gaudhoop-gullu-devgandh-chandan.html" rel="alternate" type="text/html"/>
	<title type="html">Malaan Gaudhoop Gullu Devgandh Chandan</title>
	<summary type="html"><![CDATA[<p>&nbsp;I love&nbsp;Malaan Gaudhoop. I believe they are the most exciting incense house in India today...</p>]]></summary>
	<content type="html"><![CDATA[<div>&nbsp;<div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEojF0DGhiioqcRhsgXHg4W8QWQj2zg2skZ-8TTiel5d1NNG5F9bq9Da9U86bse6yKCjgtn4aAa0YOT06ltNHu6sQBT8uOoRJTIVBUvZGVqOaipWN-K037vb0b1KYeXozBHSHYaorOq695-th9kzGFYrFFbPRywSi1xkJLd0Yu9kgzat67wthIOx2NFJI/s3940/IMG_20251001_150824026~2.jpg" rel="noopener noreferrer" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEojF0DGhiioqcRhsgXHg4W8QWQj2zg2skZ-8TTiel5d1NNG5F9bq9Da9U86bse6yKCjgtn4aAa0YOT06ltNHu6sQBT8uOoRJTIVBUvZGVqOaipWN-K037vb0b1KYeXozBHSHYaorOq695-th9kzGFYrFFbPRywSi1xkJLd0Yu9kgzat67wthIOx2NFJI/w640-h480/IMG_20251001_150824026~2.jpg" referrerpolicy="no-referrer" loading="lazy"></a></div><br></div><div><br></div><div>I love&nbsp;<a href="https://www.instagram.com/malaangaudhoop/" target="_blank" rel="noopener noreferrer">Malaan Gaudhoop</a>. I believe they are the most exciting incense house in India today. When Alok Pandey got in touch last year to explain that he had set up a new incense business based on utilising the cow dung from the rare and endangered <a href="https://web.archive.org/web/20140702212255/http%3A//www.downtoearth.org.in/content/pair-too-rare" target="_blank" rel="noopener noreferrer">Gaolao</a> cow, which they conserve on the family farm, I wasn't interested, as I didn't have positive experiences of cow dung incense. <a href="https://shgeshop.com/product/gau-dhoop-stick/" target="_blank" rel="noopener noreferrer">Gau dhoop</a> is the name given to cow dung incense - and it is burned for spiritual reasons rather than aesthetic. However, Alok went on to explain that the cow dung was converted to bio char, so there was no odour from the dung, and that he had spent several years studying perfume and incense as the aim was to create beautiful scents. The combination of conserving a rare cow breed, using bio char as the combustible so lessening the impact on climate change, and a determined and well researched focus on perfumery caught my interest so I agreed to accept the samples. I'm so glad I did. I absolutely adored&nbsp;<a href="https://incenseinthewind.blogspot.com/2024/12/malaan-gaudhoop-magnolia-champaca.html" rel="noopener noreferrer" target="_blank">Swarna Champa</a>, and wrote one of my longest, most enthusiastic reviews, and gave it my top score of 50. Other incense blogs have also been enthusiastic, and the three Malaan Gaudhoop incenses are now on sale in several Western outlets: <a href="https://www.indiaroma.de/c/produkte/raeucherstaebchen/malaan-gaudhoop" target="_blank" rel="noopener noreferrer">Indiaroma</a>;&nbsp;&nbsp;<a href="https://www.vykurovadla-rymer.cz/vonne-tycinky_k78/indie_k24/malaan-gaudhoop_k123/" target="_blank" rel="noopener noreferrer">Rymer</a>;&nbsp;<a href="https://www.exoticincense.com/malaan-gaudhoop-c-97.html" target="_blank" rel="noopener noreferrer">Exotic Incense</a>;&nbsp;<a href="https://www.etsy.com/in-en/listing/4301805171/malaan-gaudhoop-incense-handmade-dhoop?ref=shop_home_active_18&amp;pro=1&amp;sts=1&amp;logging_key=d98dc9addeed3aad72ddf90d080cddc71c10eb27%3A4301805171" target="_blank" rel="noopener noreferrer">Everest Traders</a>;&nbsp;<a href="https://saintecellier.com/collections/malaan-gaudhoop-co" target="_blank" rel="noopener noreferrer">Sainte Cellier</a>;&nbsp;<a href="https://lotuszenincense.co.uk/collections/malaan-gaudhoop-co" target="_blank" rel="noopener noreferrer">LotusZen</a>; <a href="https://indibazari.com/m/" target="_blank" rel="noopener noreferrer">IndiBazari</a>, and <a href="https://www.ebay.co.uk/str/theincenseatelier" target="_blank" rel="noopener noreferrer">The Incense Atelier</a>. And are sometimes available in India from <a href="https://scentingsecrets.com/collections/malaan-gaudhoop" target="_blank" rel="noopener noreferrer">Scenting Secrets</a>,&nbsp;or <a href="https://aavyaa.com/search?q=malaan+gaudhoop&amp;options%5Bprefix%5D=last" target="_blank" rel="noopener noreferrer">Aavyaa</a>.&nbsp;<br> <br>This is a beautiful incense with an intense resinous sandalwood fragrance. It startles and excites with its richness and depth. Yes, there's the standard warm woody sandalwood essence - that musky woody delight found in most sandalwood incense, and usually delivered by one of several sandalwood synthetics. But then this&nbsp;Gullu Devgandh Chandan goes beyond that. It has the naughty, fascinating, earthy elements that really excite and delight me. Those elements that are frankly not commercial, and would somewhat terrify the casual incense buyer. This is an incense for Titans who stride the Earth and understand and cherish its deep hidden treasures. There is going to be genuine sandalwood essential oil in this to complement and enhance the <a href="https://pellwall.com/products/sandalore" target="_blank" rel="noopener noreferrer">Sandalore</a>, <a href="https://chemical.kao.com/en/products/B0001607_en/?region=gl" target="_blank" rel="noopener noreferrer">Sandaxol</a>, or&nbsp;<a href="http://lmrnaturals.iff.com/en/site-services/online-compendium-new/bacdanol" target="_blank" rel="noopener noreferrer">Bacdanol</a>. This incense vibrates with intensity and charm and elegance and sheer blissful beauty.&nbsp; &nbsp;<br><br>Pretty much everything about this incense and this incense house fascinates and delights me. The name of this incense is&nbsp;Gullu Devgandh Chandan. I knew Chandan is sandalwood, and I got that Devgandh is "fragrance of the gods". But I couldn't work out Gullu, so I asked Alok, and he told me that it's the name of his favourite calf. That's simply awesome. How quirky, and personal, and delightful is that?&nbsp;&nbsp;<br><br>&nbsp;&nbsp;<table align="center" cellpadding="0" cellspacing="0"><tbody><tr><td><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXbi6iNxCN8YenyrvKmxo9SC7-dg1j5ppMGQ3Un27aJtsCpWH2eFhlJA5CJV_5g_jb_ZAWS8aaXKPq7W9gqf6lGe3wIFRK-bX0c6zVCRSTDHZQr7dVvR5rzy2gud5X-6f7CqYK1LoNbUZpN5AjTVRak_FHe1A8RFwI3lUzEcQeOUhRM6ekmlkyRjReBBA/s3781/gullu%202.jpg" rel="noopener noreferrer" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXbi6iNxCN8YenyrvKmxo9SC7-dg1j5ppMGQ3Un27aJtsCpWH2eFhlJA5CJV_5g_jb_ZAWS8aaXKPq7W9gqf6lGe3wIFRK-bX0c6zVCRSTDHZQr7dVvR5rzy2gud5X-6f7CqYK1LoNbUZpN5AjTVRak_FHe1A8RFwI3lUzEcQeOUhRM6ekmlkyRjReBBA/w399-h345/gullu%202.jpg" referrerpolicy="no-referrer" loading="lazy"></a></td></tr><tr><td>Gullu, the beautiful young&nbsp;<a href="https://web.archive.org/web/20140702212255/http%3A//www.downtoearth.org.in/content/pair-too-rare" target="_blank" rel="noopener noreferrer">Gaolao</a>&nbsp;bull after<br>whom the&nbsp;incense is named -&nbsp;it's his image on the packet</td></tr></tbody></table></div><div><br></div><div>OK. This incense is in the form of a <a href="https://incenseinthewind.blogspot.com/2019/05/dhoop.html" target="_blank" rel="noopener noreferrer">dhoop</a>. Dhoops are an older, more traditional method of making incense. There is no bamboo core. It's combustible matter (wood or charcoal, or - as here - biochar) with binders, fixatives, fragrant material, and some moisture - water and perhaps some honey. Though people mostly think of bamboo stick incense when thinking of Indian incense, there is still a solid market in India for dhoop. I have gotten the impression over the years that people in India still use dhoop for when they wish to be more respectful or traditional or spiritual or thoughtful. A dhoop would be more likely to be used for spiritually cleansing the house, or for respecting the gods and the spirits and the ancestors; and is more likely to contain auspicious material like cow dung or ghee.&nbsp; I like that there is that respectful connection with the ancient customs of India, and yet the scent profile utilises modern knowledge and skills around the making and blending of fragrances, new and old, to create a stunningly beautiful fragrance accord that brings my mind, body, and spirit alive.&nbsp;<br><br>That's not to say I didn't have a difficult journey with this incense. Dhoop tends to be a smokier and headier form of incense. And this is a very generous dhoop with a good dollop of scent. And I tend to get a reaction from incenses rich in terpenes. My eyes and nose may sting. And that happened here first time I burned this. I didn't have enough ventilation in the room, and I burned an entire dhoop in one go. It was intense! Exciting and beautiful, but also right on the edge. I have moderated my use of the incense since. Plenty of ventilation, and I don't burn an entire dhoop in the same room in one go. So the excitement and pleasure has remained, and I have managed to handle my terpene reaction.&nbsp;<br><br>The sandalwood fragrance is accompanied by citric and fruit notes, a soft floral, and some resin, a touch of vanilla sweetness, and wildly some farmyard, all of which adds to the interest. But its the sandalwood, and in particular its earthy richness combined with the sheer beauty of the fragrance that has seduced me. I knew from the first moment that I was going to score this incense high, but I wasn't sure how high, and the difficult start was not encouraging. But I am absolutely in love with this. It's an incense that vibrates with life, and I can feel that vibration inside me as the smokes drifts around the room. I'm all about incense as a commercial product, which can at times through olfactory skills and incense knowledge, be elevated into something sublime. But I've never been about incense as a work of art. I've always found such comments to somewhat conflate the nature of art with the nature of craft, and to be simply using a definition of art as a crude intensifier for one's own personal pleasure in the moment. And it is possible that may be what I am doing now. But this for me at this moment is like a work of art. Not because it's skilfully made, but because it says something about India culture, it says something about the man, Alok Pandey, who crafted this and named it after his favourite calf; it sings&nbsp; about tradition and culture, and brings it into the modern world, and it has an intellectual, spiritual, and emotional impact on me. This is not just a well made object or piece of commerce, this has significance beyond what it is. As such, it <b><i>is</i></b> a work of art, and I can only give it top marks.&nbsp; &nbsp;</div><div><br></div><div><br></div><div>Date: Sept 2025&nbsp; &nbsp;Score: 50</div><div>***</div><div><br></div><div><table align="center" cellpadding="0" cellspacing="0"><tbody><tr><td><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDakHwvjZXxJgX7ih435GvXbYMpv4Pw4JVHxYYdJy04AR0q5EztGlnXgGCM6Vrgx5BhL8Ju7Zkb84mddXloYx_jWZxNNPW9zVjtaymcxbBrQB-h0Jkc9xkBv0974ZJz2UlQgK-CjlHcQAHajOE0kA0miH13OCU4l4xXku4bDTP4dLy34IswfkXz4gQxG0/s446/sandalwood%20complete.jpg" rel="noopener noreferrer" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDakHwvjZXxJgX7ih435GvXbYMpv4Pw4JVHxYYdJy04AR0q5EztGlnXgGCM6Vrgx5BhL8Ju7Zkb84mddXloYx_jWZxNNPW9zVjtaymcxbBrQB-h0Jkc9xkBv0974ZJz2UlQgK-CjlHcQAHajOE0kA0miH13OCU4l4xXku4bDTP4dLy34IswfkXz4gQxG0/w200-h142/sandalwood%20complete.jpg" referrerpolicy="no-referrer" loading="lazy"></a></td></tr><tr><td><a href="https://incenseinthewind.blogspot.com/2013/05/sandalwood.html" target="_blank" rel="noopener noreferrer">Sandalwood</a><br></td></tr></tbody></table></div><div><br></div><div><table align="center" cellpadding="0" cellspacing="0"><tbody><tr><td><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcZSL7h2n4uFCctXwSGH5I8LG6oHqo5qRpKc5d5txVw2Du0WPlRJk-1_y10FzQuwhIs_0B54YWNogO9hCPqGkrIeiMBC4a6c718uwh1_eZTSY3cDCcSF3QSzoIrsKEima3iXkCcku4G0fw-oexjbMDX6iOUTThgBNPLmoOX_5td_wsgExcKkrUgYZA4O0/s200/ORS%20logo.jpeg" rel="noopener noreferrer" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcZSL7h2n4uFCctXwSGH5I8LG6oHqo5qRpKc5d5txVw2Du0WPlRJk-1_y10FzQuwhIs_0B54YWNogO9hCPqGkrIeiMBC4a6c718uwh1_eZTSY3cDCcSF3QSzoIrsKEima3iXkCcku4G0fw-oexjbMDX6iOUTThgBNPLmoOX_5td_wsgExcKkrUgYZA4O0/s1600/ORS%20logo.jpeg" referrerpolicy="no-referrer" loading="lazy"></a></td></tr><tr><td><a href="https://olfactoryrescueservice.wordpress.com/?s=Gullu+Devgandh+Chandan" target="_blank" rel="noopener noreferrer">Reviewed in USA</a><br></td></tr></tbody></table><br></div><div><table align="center" cellpadding="0" cellspacing="0"><tbody><tr><td><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoCL3HvkYk6o6PYCg_Uhc-U9LjynGqliiAg6wOLC4AD0eZbltxGSKxXq88s59XMNZwHiFNmLr7QVEokzGYnR5ehwcjpxdhnNxsx8O-PbP2yNNStCxMQHlELYqbMAVO5arSJP9UaN48hPTdKV7Ed3fIVSqb7UFMwILjLPbLPBELGo27oDoUqY469-qKvb8/s2160/Ratnagandh.jpg" rel="noopener noreferrer" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoCL3HvkYk6o6PYCg_Uhc-U9LjynGqliiAg6wOLC4AD0eZbltxGSKxXq88s59XMNZwHiFNmLr7QVEokzGYnR5ehwcjpxdhnNxsx8O-PbP2yNNStCxMQHlELYqbMAVO5arSJP9UaN48hPTdKV7Ed3fIVSqb7UFMwILjLPbLPBELGo27oDoUqY469-qKvb8/w200-h172/Ratnagandh.jpg" referrerpolicy="no-referrer" loading="lazy"></a></td></tr><tr><td><a href="https://ratnagandh.wordpress.com/2025/03/07/malaan-gullu-devgandh-chandan-gaudhoop/" target="_blank" rel="noopener noreferrer">Reviewed in Dubai</a><br></td></tr></tbody></table></div><div><br></div><div><table align="center" cellpadding="0" cellspacing="0"><tbody><tr><td><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIxSTVfkU9uN4EH_WV0cqCSC8DZ2Oj4SysJrst78xNmOSL5s6fqyAolIPCljf9RbMdZEH8L2w3J3OK0o2c1Dp-_JhN9vV4p4f-DQKg5mEOTycf9JI7iVqbe5mDbpUrJ_mu9EAl2lafh6tkHb2s-6zEj3oikSoCyw103rSWgUhZCVYeNmrQqx6lndus3Pw/s800/Reddit_Logo.png" rel="noopener noreferrer" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIxSTVfkU9uN4EH_WV0cqCSC8DZ2Oj4SysJrst78xNmOSL5s6fqyAolIPCljf9RbMdZEH8L2w3J3OK0o2c1Dp-_JhN9vV4p4f-DQKg5mEOTycf9JI7iVqbe5mDbpUrJ_mu9EAl2lafh6tkHb2s-6zEj3oikSoCyw103rSWgUhZCVYeNmrQqx6lndus3Pw/w200-h200/Reddit_Logo.png" referrerpolicy="no-referrer" loading="lazy"></a></td></tr><tr><td><a href="https://www.reddit.com/r/Incense/comments/1n55dua/looking_for_good_nonperfumy_indian_incense/?sort=old" target="_blank" rel="noopener noreferrer">Discussed on Reddit</a><br></td></tr></tbody></table></div><div><br></div>]]></content>
	<updated>2025-10-04T17:36:51+00:00</updated>
	<author><name>Steve Pereira</name></author>
	<source>
		<id>http://incenseinthewind.blogspot.com/</id>
		<link rel="self" href="http://incenseinthewind.blogspot.com/"/>
		<updated>2025-10-04T17:36:51+00:00</updated>
		<title>Incense In The Wind</title></source>


	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEojF0DGhiioqcRhsgXHg4W8QWQj2zg2skZ-8TTiel5d1NNG5F9bq9Da9U86bse6yKCjgtn4aAa0YOT06ltNHu6sQBT8uOoRJTIVBUvZGVqOaipWN-K037vb0b1KYeXozBHSHYaorOq695-th9kzGFYrFFbPRywSi1xkJLd0Yu9kgzat67wthIOx2NFJI/s72-w640-h480-c/IMG_20251001_150824026~2.jpg"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-23:/947726</id>
	<link href="https://ballot-access.org/2025/09/22/new-bills-in-congress-to-ban-mid-decade-redistricting-of-u-s-house-seats-and-to-require-each-state-to-have-a-non-partisan-redistricting-commission/" rel="alternate" type="text/html"/>
	<title type="html">New Bills in Congress to Ban Mid-Decade Redistricting of U.S. House Seats and to Require Each State to Have a Non-Partisan Redistricting Commission</title>
	<summary type="html"><![CDATA[<p>New bills in Congress have been introduced to reform redistricting for U.S. House.  They are S2885, ...</p>]]></summary>
	<content type="html"><![CDATA[<p>New bills in Congress have been introduced to reform redistricting for U.S. House.  They are S2885, and HR 5449.  The Senate bill has three co-sponsors, and the House bill has 52 co-sponsors.  All the co-sponsors are Democrats, except that independent U.S. Senator Angus King is a co-sponsor.</p>
<p><a href="https://www.padilla.senate.gov/wp-content/uploads/BOM25607.pdf" rel="noopener noreferrer" target="_blank">Here is the text of the bill</a>.  The House bill was introduced September 18 by Zoe Lofgren of California, and the Senate bill was introduced September 19 by Alex Padilla, also of California.</p>]]></content>
	<updated>2025-09-22T19:54:20+00:00</updated>
	<author><name>Richard Winger</name></author>
	<source>
		<id>http://ballot-access.org</id>
		<link rel="self" href="http://ballot-access.org"/>
		<updated>2025-09-22T19:54:20+00:00</updated>
		<title>Ballot Access News</title></source>

	<category term="uncategorized"/>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-22:/947692</id>
	<link href="https://indyweek.com/news/wake/wake-county-commissioners-weighing-two-sites-for-athens-drive-community-library-replacement/" rel="alternate" type="text/html"/>
	<title type="html">Wake County Commissioners Weighing Two Sites for Athens Drive Community Library Replacement</title>
	<summary type="html"><![CDATA[<p>When many southwest Raleigh residents went to the polls in 2024 to cast a &ldquo;yes&rdquo; vote for Wake Count...</p>]]></summary>
	<content type="html"><![CDATA[<figure><img src="https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-1024x683.jpg" alt="" decoding="async" srcset="https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-1024x683.jpg 1024w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-300x200.jpg 300w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-768x512.jpg 768w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-1536x1024.jpg 1536w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-2048x1365.jpg 2048w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-1200x800.jpg 1200w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-2000x1333.jpg 2000w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-780x520.jpg 780w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-400x267.jpg 400w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-706x471.jpg 706w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-1024x683.jpg 1024w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-300x200.jpg 300w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-768x512.jpg 768w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-1536x1024.jpg 1536w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-2048x1365.jpg 2048w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-1200x800.jpg 1200w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-2000x1333.jpg 2000w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-780x520.jpg 780w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-400x267.jpg 400w,https://indyweek.com/wp-content/uploads/2025/09/Athens-Drive-sign-706x471.jpg 706w" sizes="(max-width: 34.9rem) calc(100vw - 2rem), (max-width: 53rem) calc(8 * (100vw / 12)), (min-width: 53rem) calc(6 * (100vw / 12)), 100vw" referrerpolicy="no-referrer" loading="lazy"></figure>
<p>When many southwest Raleigh residents went to the polls in 2024 to cast a &ldquo;yes&rdquo; vote for Wake County&rsquo;s $142 million public libraries bond, they expected that a successful bond referendum would ensure that <a href="https://indyweek.com/culture/west-raleigh-residents-want-to-keep-athens-drive-community-library-local/" rel="noopener noreferrer" target="_blank">their community library</a> would remain in their community.&nbsp;</p>



<p>County staff, they say, had made the community that promise in 2022 after the library, housed inside Athens Drive Magnet High School since it opened in 1978, was thrice threatened with closure and saw its operating hours starkly reduced due to safety concerns and the pandemic.&nbsp;</p>



<p>&ldquo;We supported the bond based on this promise and if we are betrayed, we should never forget it,&rdquo; Yevonne Brannon, a neighborhood activist and former county commissioner, wrote in an email to neighbors ahead of a community meeting at the Thomas G. Crowder Woodland Center on Saturday morning, which the<em> INDY</em> attended.&nbsp;</p>



<p>The Wake County Public School System (WCPSS) will begin renovations to the high school in 2026, closing the library.&nbsp;The countywide bond allocates a total $67.1 million to build a replacement for the Athens Drive Community Library as well as community libraries in Rolesville, Apex, Wendell, and southeast Raleigh. Of that $67.1 million, the county has determined that $16.3 million is available for Athens Drive Community Library replacement.</p>



<p>Now, members of Wake County&rsquo;s Board of Commissioners, making steady progress in implementing the bond, are weighing two sites for the library&rsquo;s replacement.</p>



<p>One site, currently home to retired restaurateur Arthur Gordon&rsquo;s Well Fed Community Garden, is less than a quarter mile away on Athens Drive, just a four-minute walk from the library&rsquo;s current location. (The <em>INDY</em> reported earlier this year on <a href="https://indyweek.com/news/wake/irregardless-founders-want-to-turn-their-southwest-raleigh-community-garden-into-affordable-housing/" rel="noopener noreferrer" target="_blank">a rezoning application</a> Gordon and his wife, Anya, had filed with the City of Raleigh to build affordable housing on the two-parcel property, but the Gordons withdrew their application in July.)</p>



<p>The other site is three miles, or a 10-minute drive, away and located in another town&mdash;Cary&mdash;at the intersection of Tryon Road and Yates Mill Pond Road.&nbsp;</p>



<p>WCPSS currently owns the Cary site, which, at more than 12 acres, is much larger and would provide ample space for parking. </p>



<figure><img decoding="async" src="https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-1024x879.jpg" alt="" srcset="https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-1024x879.jpg 1024w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-300x258.jpg 300w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-768x660.jpg 768w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-400x344.jpg 400w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-706x606.jpg 706w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr.jpg 1048w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-1024x879.jpg 1024w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-300x258.jpg 300w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-768x660.jpg 768w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-400x344.jpg 400w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr-706x606.jpg 706w,https://indyweek.com/wp-content/uploads/2025/02/2025-02-19-athens-drive-library-schematic-route-wcpss-athensdr.jpg 1048w" sizes="(max-width: 1024px) 100vw, 1024px" referrerpolicy="no-referrer" loading="lazy"><figcaption>A screenshot of the Cary site proposed for the replacement of the Athens Drive Community Library <span><span>Credit:</span> Courtesy of Wake County</span></figcaption></figure>



<p>The county would have to buy the Well Fed Community Garden site from the Gordons. The site is 2.6 acres and would require a two-story facility. The property is valued at around $840,000 for the combined two parcels.&nbsp;</p>



<p>District 2 Wake County commissioner Safiyah Jackson attended Saturday&rsquo;s community meeting. While her district covers Fuquay-Varina, Holly Springs, and Garner, Jackson told the 70-some residents in attendance that she was happy to have a conversation with them about the library as she is one of seven commissioners who will have to make a final decision on a site.&nbsp;</p>



<p>County leaders, Jackson told the crowd, have to consider certain criteria in evaluating where to locate the library&rsquo;s replacement, including what seems to be the county&rsquo;s principal guiding metric: how many people in the county live within a 10-minute drive of a new library.&nbsp;</p>



<p>But, Jackson emphasized, no decisions will be made based on that single factor, and the county will also consider growth patterns&mdash;66 people move to Wake County each day&mdash;and the cost of land in &ldquo;the equation of where we move the library, next door or five minutes away.&rdquo;</p>



<p>&ldquo;Your community connections, your walkability, your history, the reach, people that are already in this community &hellip; those are considerations as well as the larger amounts of Wake County who are able to drive to a library,&rdquo; Jackson said.&nbsp;</p>



<p>Residents at the meeting said, overall, the better choice&mdash;to keep the library close&mdash;is clear. Their community is one of the densest and fastest-growing areas of the city, home to thousands of young families and well-served with walkable roads and sidewalks, bike lanes, and public transit.&nbsp;&nbsp;&nbsp;</p>



<p>&ldquo;We have good potential for infill, and for land-saving, two-story construction of a library building without suburban sprawl,&rdquo; said Joe Hartman, who lives near the library and recently turned 80.&nbsp;</p>



<p>Other residents called the 10-minute drive metric &ldquo;arbitrary&rdquo; and pointed out that the Cary site, while it technically has more residents within a 10-minute drive, isn&rsquo;t located along any public transit routes.&nbsp;</p>



<p>Resident Jamie Hammermann, who has been taking her daughter to Athens Drive Community Library since she was eight months old, has conducted extensive research on the demographics and amenities around the two sites, including economic diversity and public transit access. Hammermann&rsquo;s research shows that a few hundred households, or a fraction of a percentage of the overall county population, live within a 10-minute drive of the Cary site, a &ldquo;nominal&rdquo; increase over the number of households served by keeping the Athens Drive library in its current part of town.&nbsp;</p>



<p>&ldquo;Who would actually benefit are some pretty wealthy neighborhoods,&rdquo; Hammermann said.</p>



<figure><img decoding="async" src="https://indyweek.com/wp-content/uploads/2025/09/ADCL-1024x683.jpg" alt="" srcset="https://indyweek.com/wp-content/uploads/2025/09/ADCL-1024x683.jpg 1024w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-300x200.jpg 300w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-768x512.jpg 768w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-1536x1024.jpg 1536w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-2048x1365.jpg 2048w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-1200x800.jpg 1200w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-2000x1333.jpg 2000w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-780x520.jpg 780w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-400x267.jpg 400w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-706x471.jpg 706w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-1024x683.jpg 1024w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-300x200.jpg 300w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-768x512.jpg 768w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-1536x1024.jpg 1536w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-2048x1365.jpg 2048w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-1200x800.jpg 1200w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-2000x1333.jpg 2000w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-780x520.jpg 780w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-400x267.jpg 400w,https://indyweek.com/wp-content/uploads/2025/09/ADCL-706x471.jpg 706w" sizes="(max-width: 1024px) 100vw, 1024px" referrerpolicy="no-referrer" loading="lazy"><figcaption>Athens Drive Community Library patrons and advocates photographed inside the library in February.  <span><span>Credit:</span> Photo by Angelica Edwards</span></figcaption></figure>



<p>Jane Harrison, the Raleigh City Council representative for Raleigh&rsquo;s District D, which includes Athens Drive High School, supports keeping the library in southwest Raleigh. </p>



<p>She noted how much new affordable housing has been built and is currently planned for the area, including new projects on Kent Road, Lorimer and Garland, Trailwood Drive, and <a href="https://www.casanc.org/properties/method-rd/" rel="noopener noreferrer" target="_blank">Hope Village</a> on Method Road, which will provide new homes for students aging out of foster care. These are all in addition to existing affordable housing, including the Raleigh Housing Authority&rsquo;s Kentwood development on Kent Road just south of Western Boulevard.&nbsp;</p>



<p>&ldquo;It&rsquo;s not just one or two developments,&rdquo; Harrison said. &ldquo;We are in several qualified census tracts right around here, so they&rsquo;re qualified for Low-Income Housing Tax Credit projects .&hellip; This is all within this neighborhood. We&rsquo;re going to continue to see that added density, and I just want to make sure we have the infrastructure and amenities to serve our population.&rdquo;</p>



<p>It&rsquo;s not clear when the county commissioners will make a decision about the library site. Jackson said although the meeting marked her first conversation with the community, it won&rsquo;t be the last. She promised to review the community&rsquo;s feedback and get answers to questions that arose for her during the meeting,&nbsp;</p>



<p>&ldquo;I will be transparent, however I vote, about how that decision is made,&rdquo; Jackson said. &ldquo;We&rsquo;re not going to be voting in two weeks, so there is time.&rdquo;</p>



<p>But for the residents, it&rsquo;s a matter of trust.</p>



<p>&ldquo;Let&rsquo;s not play any games, nobody&rsquo;s going to fool this community or any voter that the replacement meant, &lsquo;Now we can have an opportunity to close the Athens Drive Community Library and set up a regional library in Cary,&rsquo;&rdquo; said Brannon, the former county commissioner, at the end of the meeting. &ldquo;We voted for the bond. I&rsquo;ve sat in the seat, I know the pressure, but I can tell you one thing you can&rsquo;t do to the public. You could not lose their trust.&rdquo;</p>



<p><em><em>Send an email to Raleigh editor Jane Porter:&nbsp;</em><a href="https://news.unknownlamer.org/jporter%40indyweek.com" rel="noopener noreferrer" target="_blank"><em>jporter@indyweek.com</em></a><em>. Comment on this story at&nbsp;</em><a href="https://news.unknownlamer.org/backtalk%40indyweek.com" rel="noopener noreferrer" target="_blank"><em>backtalk@indyweek.com</em></a><em>.</em></em></p>]]></content>
	<updated>2025-09-22T21:00:00+00:00</updated>
	<author><name>Jane Porter</name></author>
	<source>
		<id>https://indyweek.com/api/rss/content.rss</id>
		<link rel="self" href="https://indyweek.com/api/rss/content.rss"/>
		<updated>2025-09-22T21:00:00+00:00</updated>
		<title>INDY Week</title></source>

	<category term="news"/>

	<category term="wake county"/>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-19:/947252</id>
	<link href="https://arstechnica.com/health/2025/09/bonkers-cdc-vaccine-meeting-ends-with-vote-to-keep-covid-shot-access/" rel="alternate" type="text/html"/>
	<title type="html">Bonkers CDC vaccine meeting ends with vote to keep COVID shot access</title>
	<summary type="html"><![CDATA[<p>A two-day federal vaccine advisory meeting crammed with chaos, confusio...</p>]]></summary>
	<content type="html"><![CDATA[<p>A two-day federal vaccine advisory meeting crammed with chaos, confusion, inept debate, bizarre comments, and a hot mic catching someone saying "you're an idiot," ended with an unexpected twist: The advisors unanimously voted&mdash;possibly unintentionally&mdash;to maintain broad access to COVID-19 vaccines.</p>
<p>In the 12&ndash;0 vote, the committee of advisors selected by anti-vaccine activist Robert F. Kennedy Jr. adopted a recommendation for adults 65 and older and people aged 6 months to 64 years to get a COVID-19 vaccine based on shared clinical decision-making. After this story was published, the Centers for Disease Control and Prevention adopted the recommendation, which will broadly maintain requirements that federal and private health insurance plans cover COVID-19 vaccines at no cost. While the shared clinical decision-making is a new requirement, the CDC noted in adopting the recommendation that such decision making can be done in consultation with providers, "including physicians, nurses, and pharmacists". Most people receive COVID-19 vaccines from their local pharmacists.</p>
<p>Earlier this year, the FDA limited the approvals of this year's shots, which have previously been available to anyone 6 months of age or older. The FDA's new restriction limits them to adults aged 65 and up and for people between the ages of 6 months and 64 years who have an underlying medical condition that puts them at high risk of severe COVID-19.</p><p><a href="https://arstechnica.com/health/2025/09/bonkers-cdc-vaccine-meeting-ends-with-vote-to-keep-covid-shot-access/" rel="noopener noreferrer" target="_blank">Read full article</a></p>
<p><a href="https://arstechnica.com/health/2025/09/bonkers-cdc-vaccine-meeting-ends-with-vote-to-keep-covid-shot-access/#comments" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2025-09-19T21:44:26+00:00</updated>
	<author><name>
                    Beth Mole
                </name></author>
	<source>
		<id>https://arstechnica.com</id>
		<link rel="self" href="https://arstechnica.com"/>
		<updated>2025-09-19T21:44:26+00:00</updated>
		<title>Ars Technica</title></source>

	<category term="acip"/>

	<category term="covid-19"/>

	<category term="health"/>

	<category term="vaccines"/>


	<link rel="enclosure" 
		type="image/jpeg" 
		length="1"
		href="https://cdn.arstechnica.net/wp-content/uploads/2025/09/GettyImages-2235757891-1152x648.jpg"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-20:/947278</id>
	<link href="https://www.wsws.org/en/articles/2025/09/20/dpce-s20.html" rel="alternate" type="text/html"/>
	<title type="html">Invoking “war,” Trump threatens to send troops to more American cities</title>
	<summary type="html"><![CDATA[<p>From the Oval Office, the fascist president declared nothing would stop him from deploying combat tr...</p>]]></summary>
	<content type="html"><![CDATA[<p>From the Oval Office, the fascist president declared nothing would stop him from deploying combat troops to major American cities, saying, &ldquo;It's like war.&rdquo;</p>]]></content>
	<updated>2025-09-20T03:49:49+00:00</updated>
	<author><name></name></author>
	<source>
		<id>http://www.wsws.org/en/</id>
		<link rel="self" href="http://www.wsws.org/en/"/>
		<updated>2025-09-20T03:49:49+00:00</updated>
		<title>World Socialist Web Site (en)</title></source>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-15:/945853</id>
	<link href="https://theonion.com/the-onions-exclusive-interview-with-gavin-newsom/" rel="alternate" type="text/html"/>
	<title type="html">The Onion’s Exclusive Interview With Gavin Newsom</title>
	<summary type="html"><![CDATA[<p>Gov. Gavin Newsom has gained increasing national attention for targeting President Donald Trump in ...</p>]]></summary>
	<content type="html"><![CDATA[<p>Gov. Gavin Newsom has gained increasing national attention for targeting President Donald Trump in the media, reportedly boosting his national standing as the unofficial Democratic frontrunner for 2028, according to polls. <em>The Onion</em> sat down with the California governor to discuss his political strategy.</p>



<p><strong><em>The Onion</em>: What are your core beliefs?</strong></p>



<p>Newsom: Are those a prerequisite for being president?</p>



<p><strong><em>The Onion</em>: Where did you grow up?</strong></p>



<p>Newsom: I need to check some polling data before I answer that question.</p>



<p><strong><em>The Onion</em>: &#8203;A&#8203;re you running for president in 2028?</strong></p>



<p>Newsom: &#8203;Right now, I&rsquo;m purely focused on alienating the people of California.</p>



<p><strong><em>The Onion</em>: How do you respond to accusations that you&rsquo;re beholden to large donors?</strong></p>



<p>Newsom: I assure you, there is no one I won&rsquo;t betray in my pursuit of power.</p>



<p><strong><em>The Onion</em>: What is your solution to the homelessness crisis in California?</strong></p>



<p>Newsom: A thick tarp, some duct tape, and a shovel.</p>



<p><strong><em>The Onion</em>: How are you working to fix California&rsquo;s $12 billion budget deficit?</strong></p>



<p>Newsom: By making fun of the president.</p>



<p><strong><em>The Onion</em>: What&rsquo;s next for you?</strong></p>



<p>Newsom: More teeth.</p>
<p>The post <a href="https://theonion.com/the-onions-exclusive-interview-with-gavin-newsom/" rel="noopener noreferrer" target="_blank">The Onion&rsquo;s Exclusive Interview With Gavin Newsom</a> appeared first on <a href="https://theonion.com" rel="noopener noreferrer" target="_blank">The Onion</a>.</p>]]></content>
	<updated>2025-09-15T19:10:17+00:00</updated>
	<author><name>The Onion Staff</name></author>
	<source>
		<id>https://www.theonion.com</id>
		<link rel="self" href="https://www.theonion.com"/>
		<updated>2025-09-15T19:10:17+00:00</updated>
		<title>The Onion</title></source>

	<category term="explainer"/>

	<category term="politics"/>

	<category term="vol 61: issue 38"/>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-13:/945477</id>
	<link href="https://arstechnica.com/space/2025/09/60-years-after-gemini-newly-processed-images-reveal-incredible-details/" rel="alternate" type="text/html"/>
	<title type="html">60 years after Gemini, newly processed images reveal incredible details</title>
	<summary type="html"><![CDATA[<p>Six decades have now passed since some of the most iconic Project Gemin...</p>]]></summary>
	<content type="html"><![CDATA[<p>Six decades have now passed since some of the most iconic Project Gemini spaceflights. The 60th anniversary of Gemini 4, when Ed White conducted the first US spacewalk, came in June. The next mission, Gemini 5, ended just two weeks ago, in 1965. These missions are now forgotten by most Americans, as most of the people alive during that time are now deceased.</p>
<p>However, during these early years of spaceflight, NASA engineers and astronauts cut their teeth on a variety of spaceflight firsts, flying a series of harrowing missions during which it seems a miracle that no one died.</p>
<p>Because the Gemini missions, as well as NASA's first human spaceflight program Mercury, yielded such amazing stories, I was thrilled to realize that a new book has recently been published&mdash;<em><a href="https://www.apolloremastered.com/gemini-and-mercury-remastered" rel="noopener noreferrer" target="_blank">Gemini &amp; Mercury Remastered</a></em>&mdash;that brings them back to life in vivid color.</p><p><a href="https://arstechnica.com/space/2025/09/60-years-after-gemini-newly-processed-images-reveal-incredible-details/" rel="noopener noreferrer" target="_blank">Read full article</a></p>
<p><a href="https://arstechnica.com/space/2025/09/60-years-after-gemini-newly-processed-images-reveal-incredible-details/#comments" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2025-09-13T11:15:47+00:00</updated>
	<author><name>
                    Eric Berger
                </name></author>
	<source>
		<id>https://arstechnica.com</id>
		<link rel="self" href="https://arstechnica.com"/>
		<updated>2025-09-13T11:15:47+00:00</updated>
		<title>Ars Technica</title></source>

	<category term="andy saunders"/>

	<category term="apollo"/>

	<category term="gemini"/>

	<category term="images"/>

	<category term="mercury"/>

	<category term="space"/>


	<link rel="enclosure" 
		type="image/jpeg" 
		length="1"
		href="https://cdn.arstechnica.net/wp-content/uploads/2025/09/01-Aldrin-Selfie-Before-After_NASA_ASU_Andy-Saunders-1152x648.jpg"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-12:/945392</id>
	<link href="https://www.techdirt.com/2025/09/12/the-judiciary-is-breaking-down-federal-judges-now-openly-revolt-against-scotus-shadow-docket-during-live-court-hearing/" rel="alternate" type="text/html"/>
	<title type="html">The Judiciary Is Breaking Down: Federal Judges Now Openly Revolt Against SCOTUS Shadow Docket During Live Court Hearing</title>
	<summary type="html"><![CDATA[<p>We&rsquo;ve been tracking the growing judicial revolt against the Supreme Court&rsquo;s shadow docke...</p>]]></summary>
	<content type="html"><![CDATA[<p>We&rsquo;ve been tracking the growing judicial revolt against the Supreme Court&rsquo;s shadow docket nonsense, from <a href="https://www.techdirt.com/2025/09/04/some-federal-judges-appear-done-with-scotuss-shadow-docket-bullshit/" rel="noopener noreferrer" target="_blank">individual district judges getting snarky in footnotes</a> to <a href="https://www.techdirt.com/2025/09/11/federal-judges-are-done-playing-nice-nbc-reports-full-scale-revolt-against-scotus-shadow-docket-bullshit/" rel="noopener noreferrer" target="_blank">anonymous judges speaking to reporters</a>. But what happened Thursday at the Fourth Circuit Court of Appeals crosses into entirely new territory: a full en banc panel of federal judges <a href="https://www.politico.com/news/2025/09/11/supreme-court-emergency-rulings-judges-00558058" rel="noopener noreferrer" target="_blank">openly criticizing the Supreme Court&rsquo;s approach</a> during a live oral argument session.</p>
<p>This isn&rsquo;t normal. Federal judges don&rsquo;t usually air their grievances about the Supreme Court in open court. The fact that an entire appeals court panel&mdash;including respected conservative judges&mdash;turned their oral argument into what Politico called &ldquo;a remarkable, 80-minute venting session&rdquo; tells you everything about how broken the system has become.</p>
<p>The immediate catalyst was trying to figure out what to do with a case about <a href="https://www.techdirt.com/2025/09/10/the-untold-saga-of-what-happened-when-doge-stormed-social-security/" rel="noopener noreferrer" target="_blank">DOGE&rsquo;s access to Social Security data</a> after the Supreme Court issued one of its trademark unexplained emergency orders. But the real issue was much bigger: how are lower courts supposed to function when the highest court in the land operates like it&rsquo;s <a href="https://www.techdirt.com/2025/08/22/justice-jackson-correctly-defines-the-john-roberts-supreme-court-as-the-calvinball-court/" rel="noopener noreferrer" target="_blank">playing Calvinball</a>?</p>
<blockquote>
<p><em>&ldquo;They&rsquo;re leaving the circuit courts, the district courts out in limbo,&rdquo; said Judge James Wynn&hellip; &ldquo;We&rsquo;re out here flailing. &hellip; I&rsquo;m not criticizing the justices. They&rsquo;re using a vehicle that&rsquo;s there, but they are telling us nothing.</em> <strong><em>They could easily just give us direction and we would follow it</em></strong><em>.&rdquo;</em></p>
</blockquote>
<p>Judge Wynn didn&rsquo;t stop there:</p>
<blockquote>
<p><em>&ldquo;They cannot get amnesia in the future because they didn&rsquo;t write an opinion on it. Write an opinion,&rdquo; Wynn said. &ldquo;We need to understand why you did it. We judges would just love to hear your reasoning as to why you rule that way. It makes our job easier. We will follow the law. We will follow the Supreme Court, but we&rsquo;d like to know what it is we are following.&rdquo;</em></p>
</blockquote>
<p>I&rsquo;ve been writing about the law for almost three decades. I&rsquo;ve never seen anything like this. Ever. Not even in the same zip code as this. These are judges crying out for help under a completely lawless Supreme Court.</p>
<p>And, no, this wasn&rsquo;t just liberal judges complaining. Judge J. Harvie Wilkinson III&mdash;a Reagan appointee and one of the most respected conservative jurists in the country&mdash;was right there with them:</p>
<blockquote>
<p><em>&ldquo;The Supreme Court&rsquo;s action must mean something,&rdquo; said Judge J. Harvie Wilkinson III, a Reagan appointee. &ldquo;It doesn&rsquo;t do these things just for the kicks of it.&rdquo;</em></p>
</blockquote>
<p>Even Wilkinson can&rsquo;t figure out what the hell the Supreme Court is doing. When you&rsquo;ve lost Harvie Wilkinson&mdash;a judge so conservative and institutionally minded that he&rsquo;s <a href="https://virginialawreview.org/articles/in-tribute-judge-j-harvie-wilkinson-iii/" rel="noopener noreferrer" target="_blank">basically judicial royalty</a>&mdash;you&rsquo;ve completely broken the system.</p>
<p>The specific case that triggered this judicial revolt involves the Supreme Court&rsquo;s typical shadow docket bullshit. In June, <a href="https://www.supremecourt.gov/opinions/24pdf/24a1063_6j37.pdf" rel="noopener noreferrer" target="_blank">the Court overruled the Fourth Circuit&rsquo;s decision</a> and lifted an injunction against DOGE&rsquo;s use of Social Security data. But they did so in the most bizarre and troubling way. After sending the case back to the Fourth Circuit for more review, it said <strong>that even if the Fourth Circuit rules that DOGE is breaking the law, the stay will remain in place</strong>.</p>
<blockquote>
<p><em>By an apparent 6-3 vote, the justices went further, saying that no matter what the appeals court decided, the injunction would remain on hold until the case returned to the Supreme Court. Yet, the high court&rsquo;s majority offered no substantive rationale for the lower court to parse.</em></p>
</blockquote>
<p>So the Supreme Court basically said: &ldquo;We&rsquo;re overturning you, and also whatever you decide doesn&rsquo;t matter anyway, but we&rsquo;re not going to tell you why.&rdquo; This left the entire Fourth Circuit panel wondering what the fuck they&rsquo;re even supposed to do.</p>
<blockquote>
<p><em>That left many of the 15 4th Circuit judges on hand for Thursday&rsquo;s unusual en banc arguments puzzling at their role. One even suggested the appeals court should simply issue a one-line opinion saying the injunction is lifted and kick the case back to the Supreme Court to resolve.</em></p>
</blockquote>
<p>Some judges thought they should just give up entirely and punt the case back to SCOTUS since SCOTUS has already said whatever they decide here doesn&rsquo;t actually matter. Others insisted they had a constitutional duty to actually do their jobs:</p>
<blockquote>
<p><em>&ldquo;It sounds like some of my colleagues think that there&rsquo;s no work to be done, that we&rsquo;re done because the Supreme Court has told us what the answer is,&rdquo; said Judge Albert Diaz, an Obama appointee.</em></p>
<p><em>Judge Robert King said punting on the case would be a mistake.</em></p>
<p><em>&ldquo;We each have a commission and we have a robe and we have an oath to abide by,&rdquo; said King, a Clinton appointee.</em></p>
</blockquote>
<p>This perfectly captures the impossible position the Supreme Court has created. Lower court judges literally don&rsquo;t know if they&rsquo;re supposed to do their jobs or just rubber-stamp whatever vibes they think they&rsquo;re getting from the shadow docket.</p>
<p>The whole mess stems from a series of recent Supreme Court shadow docket rulings (without much explanation) basically telling lower courts <a href="https://www.techdirt.com/2025/07/24/supreme-court-to-lower-courts-ignore-actual-binding-precedent-follow-our-unexplained-shadow-docket-vibes-instead/" rel="noopener noreferrer" target="_blank">they have to follow SCOTUS shadow docket rulings</a> (also without much explanation) as binding precedent. But as we&rsquo;ve written about extensively, these aren&rsquo;t reasoned legal decisions&mdash;they&rsquo;re often unexplained orders issued with minimal briefing, no oral arguments, and little to no explanation of any reasoning.</p>
<p>This has created a situation where experienced federal judges&mdash;people who&rsquo;ve spent decades interpreting legal precedent (often longer than the Justices themselves)&mdash;literally can&rsquo;t figure out what the Supreme Court wants them to do.</p>
<p>What we&rsquo;re witnessing is the breakdown of the federal judiciary as a functioning institution. When Reagan and Obama appointees are united in open revolt, and Harvie Wilkinson can&rsquo;t figure out what the Supreme Court wants, the system has collapsed.</p>
<p>The three liberal Justices have been warning about this in dissent after dissent, while the conservative majority just keeps issuing more unexplained orders and then getting pissy when lower courts can&rsquo;t read their minds. This isn&rsquo;t jurisprudence. It&rsquo;s government by judicial decree, where constitutional law operates on vibes and the only consistent principle is &ldquo;give Trump whatever he wants.&rdquo;</p>
<p>When federal judges with decades of experience are reduced to public pleading for basic guidance during oral arguments, we&rsquo;ve crossed into judicial authoritarianism. The Supreme Court has effectively told the entire federal judiciary: &ldquo;Follow our orders, but we won&rsquo;t explain what they mean, and if you guess wrong, we&rsquo;ll scold you for defying us.&rdquo;</p>
<p>That&rsquo;s not how precedent works. That&rsquo;s not how courts work. That&rsquo;s not the rule of law. It&rsquo;s just nine people in robes demanding deference to their unexplained whims.</p>]]></content>
	<updated>2025-09-12T20:41:47+00:00</updated>
	<author><name>Mike Masnick</name></author>
	<source>
		<id>https://www.techdirt.com/</id>
		<link rel="self" href="https://www.techdirt.com/"/>
		<updated>2025-09-12T20:41:47+00:00</updated>
		<title>Techdirt.</title></source>

	<category term="4th circuit"/>

	<category term="doge"/>

	<category term="guidance"/>

	<category term="harvie wilkinson"/>

	<category term="james wynn"/>

	<category term="judges"/>

	<category term="precedent"/>

	<category term="robert king"/>

	<category term="scotus"/>

	<category term="shadow docket"/>

	<category term="social security"/>

	<category term="supreme court"/>

	<category term="t:1"/>

	<category term="vibes"/>


</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-12:/945395</id>
	<link href="https://theintercept.com/2025/09/12/proton-mail-journalist-accounts-suspended/" rel="alternate" type="text/html"/>
	<title type="html">Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency</title>
	<summary type="html"><![CDATA[<p>The company behind the Proton Mail email service, Proton, describes itself as a &ldquo;neutral and safe h...</p>]]></summary>
	<content type="html"><![CDATA[<p><span>The company behind</span> the Proton Mail email service, Proton, <a href="https://proton.me/#:~:text=We%20are%20a%20neutral%20and%20safe%20haven%20for%20your%20personal%20data%2C%20committed%20to%20defending%20your%20freedom" rel="noopener noreferrer" target="_blank">describes itself</a> as a &ldquo;neutral and safe haven for your personal data, committed to defending your freedom.&rdquo;</p>



<p>But last month, Proton disabled email accounts belonging to journalists reporting on security breaches of various South Korean government computer systems following a complaint by an unspecified cybersecurity agency. After a public outcry, and multiple weeks, the journalists&rsquo; accounts were eventually reinstated &mdash; but the reporters and editors involved still want answers on how and why Proton decided to shut down the accounts in the first place.</p>



<p>Martin Shelton, deputy director of digital security at the Freedom of the Press Foundation, highlighted that numerous newsrooms use Proton&rsquo;s services as alternatives to something like Gmail &ldquo;specifically to avoid situations like this,&rdquo; pointing out that &ldquo;While it&rsquo;s good to see that Proton is reconsidering account suspensions, journalists are among the users who need these and similar tools most.&rdquo; Newsrooms like The Intercept, the Boston Globe, and the Tampa Bay Times all rely on Proton Mail for<a href="https://theintercept.com/source/" rel="noopener noreferrer" target="_blank"> emailed tip submissions</a>.</p>



<p>Shelton noted that perhaps Proton should &ldquo;prioritize responding to journalists about account suspensions privately, rather than when they go viral.&rdquo;</p>



<p>On Reddit, Proton&rsquo;s official account <a href="https://www.reddit.com/r/ProtonMail/comments/1nd1nrc/is_that_true/ndg68pz/" rel="noopener noreferrer" target="_blank">stated</a> that &ldquo;Proton did not knowingly block journalists&rsquo; email accounts&rdquo; and that the &ldquo;situation has unfortunately been blown out of proportion.&rdquo; Proton did not respond to The Intercept&rsquo;s request for comment.</p>







<p><span>The two journalists</span> whose accounts were disabled were working on an <a href="https://phrack.org/issues/72/7_md" rel="noopener noreferrer" target="_blank">article</a> published in the August issue of the long-running hacker zine Phrack. The story described how a sophisticated hacking operation &mdash; what&rsquo;s known in cybersecurity parlance as an APT, or advanced persistent threat &mdash; had wormed its way into a number of South Korean computer networks, including those of the Ministry of Foreign Affairs and the military Defense Counterintelligence Command, or DCC.</p>



<p>The journalists, who published their story under the names Saber and cyb0rg, describe the hack as being consistent with the work of Kimsuky, a notorious North Korean state-backed APT <a href="https://home.treasury.gov/news/press-releases/jy1938" rel="noopener noreferrer" target="_blank">sanctioned</a> by the U.S. Treasury Department in 2023.</p>



<p>As they pieced the story together, emails viewed by The Intercept show that the authors followed cybersecurity best practices and conducted what&rsquo;s known as responsible disclosure: notifying affected parties that a vulnerability has been discovered in their systems prior to publicizing the incident.</p>



<p>Saber and cyb0rg created a dedicated Proton Mail account to coordinate the responsible disclosures, then proceeded to notify the impacted parties, including the Ministry of Foreign Affairs and the DCC, and also notified South Korean cybersecurity organizations like the Korea Internet and Security Agency, and <a href="https://www.krcert.or.kr/" rel="noopener noreferrer" target="_blank">KrCERT/CC</a>, the state-sponsored Computer Emergency Response Team. According to emails viewed by The Intercept, KrCERT wrote back to the authors, thanking them for their disclosure.</p>



<p>A note on cybersecurity jargon: CERTs are agencies consisting of cybersecurity experts specializing in dealing with and responding to security incidents. CERTs exist in over 70 countries &mdash; with some countries having multiple CERTs each specializing in a particular field such as the financial sector &mdash; and may be government-sponsored or private organizations. They adhere to a set of formal technical <a href="https://datatracker.ietf.org/doc/html/rfc2350" rel="noopener noreferrer" target="_blank">standards</a>, such as being expected to react to reported cybersecurity threats and security incidents. A high-profile example of a CERT agency in the U.S. is the Cybersecurity and Infrastructure Agency, which has recently been <a href="https://www.nextgov.com/cybersecurity/2025/06/cisa-projected-lose-third-its-workforce-under-trumps-2026-budget/405726/" rel="noopener noreferrer" target="_blank">gutted</a> by the Trump administration.</p>



<p></p>



<p>A week after the print issue of Phrack came out, and a few days before the digital version was released, Saber and cyb0rg found that the Proton account they had set up for the responsible disclosure notifications had been suspended. A day later, Saber discovered that his personal Proton Mail account had also been suspended. Phrack posted a timeline of the account suspensions at the top of the published article, and later highlighted the timeline in a viral social media <a href="https://x.com/phrack/status/1965385266904138241" rel="noopener noreferrer" target="_blank">post</a>. Both accounts were suspended owing to an unspecified &ldquo;potential policy violation,&rdquo; according to screenshots of account login attempts reviewed by The Intercept.</p>



<p>The suspension notice instructed the authors to fill out <a href="https://proton.me/support/appeal-abuse" rel="noopener noreferrer" target="_blank">Proton&rsquo;s abuse appeals form</a> if they believed the suspension was in error. Saber did so, and received a reply from a member of Proton Mail&rsquo;s Abuse Team who went by the name Dante.</p>



<p>In an email viewed by The Intercept, Dante told Saber that their account &ldquo;has been disabled as a result of a direct connection to an account that was taken down due to violations of our terms and conditions while being used in a malicious manner.&rdquo; Dante also provided a link to <a href="https://proton.me/legal/terms" rel="noopener noreferrer" target="_blank">Proton&rsquo;s terms of service</a>, going on to state, &ldquo;We have clearly indicated that any account used for unauthorized activities, will be sanctioned accordingly.&rdquo; The response concluded by stating, &ldquo;We consider that allowing access to your account will cause further damage to our service, therefore we will keep the account suspended.&rdquo;</p>



<p>On August 22, a Phrack editors reached out to Proton, writing that no hacked data was passed through the suspended email accounts, and asked if the account suspension incident could be deescalated. After receiving no response from Proton, the editor sent a follow-up email on September 6. Proton once again did not reply to the email.</p>



<p>On September 9, the official Phrack X account made a <a href="https://x.com/phrack/status/1965385266904138241" rel="noopener noreferrer" target="_blank">post</a> asking Proton&rsquo;s official account asking why Proton was &ldquo;cancelling journalists and ghosting us,&rdquo; adding: &ldquo;need help calibrating your moral compass?&rdquo; The post quickly went viral, garnering over 150,000 views.</p>



<p>Proton&rsquo;s official account replied the following day, <a href="https://x.com/ProtonPrivacy/status/1965701661705322849" rel="noopener noreferrer" target="_blank">stating</a> that Proton had been &ldquo;alerted by a CERT that certain accounts were being misused by hackers in violation of Proton&rsquo;s Terms of Service. This led to a cluster of accounts being disabled. Our team is now reviewing these cases individually to determine if any can be restored.&rdquo; Proton then <a href="https://x.com/ProtonPrivacy/status/1965828424963895605" rel="noopener noreferrer" target="_blank">stated</a> that they &ldquo;stand with journalists&rdquo; but &ldquo;cannot see the content of accounts and therefore cannot always know when anti-abuse measures may inadvertently affect legitimate activism.&rdquo;</p>



<p>Proton did not publicly specify which CERT had alerted them, and didn&rsquo;t answer The Intercept&rsquo;s request for the name of the specific CERT which had sent the alert. KrCERT also did not reply to The Intercept&rsquo;s question about whether they were the CERT that had sent the alert to Proton.</p>



  <div>
    <a href="https://theintercept.com/2025/01/28/proton-mail-andy-yen-trump-republicans/" rel="noopener noreferrer" target="_blank">
              <img decoding="async" src="https://theintercept.com/wp-content/uploads/2025/01/new-GettyImages-1848352193-e1738076074973.jpg?w=440&amp;h=440&amp;crop=1" alt="" loading="lazy" referrerpolicy="no-referrer">            <span>
      <h2>
        Related      </h2>
      <h3>Proton Mail Says It&rsquo;s &ldquo;Politically Neutral&rdquo; While Praising Republican Party</h3>
    </span>
    </a>
  </div>



<p>Later in the day, Proton&rsquo;s founder and CEO Andy Yen <a href="https://x.com/andyyen/status/1965767030688317832" rel="noopener noreferrer" target="_blank">posted</a> on X that the two accounts had been reinstated. Neither Yen nor Proton explained why the accounts had been reinstated, whether they had been found to not violate the terms of service after all, why had they been suspended in the first place, or why a member of the Proton Abuse Team reiterated that the accounts had violated the terms of service during Saber&rsquo;s appeals process.</p>



<p>Phrack noted that the account suspensions created a &ldquo;real impact to the author. The author was unable to answer media requests about the article.&rdquo; The co-authors, Phrack pointed out, were also in the midst of the responsible disclosure process and working together with the various affected South Korean organizations to help fix their systems. &ldquo;All this was denied and ruined by Proton,&rdquo; Phrack stated.&nbsp;</p>



<p>Phrack editors said that the incident leaves them &ldquo;concerned what this means to other whistleblowers or journalists. The community needs assurance that Proton does not disable accounts unless Proton has a court order or the crime (or ToS violation) is apparent.&rdquo;</p>
<p>The post <a href="https://theintercept.com/2025/09/12/proton-mail-journalist-accounts-suspended/" rel="noopener noreferrer" target="_blank">Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency</a> appeared first on <a href="https://theintercept.com" rel="noopener noreferrer" target="_blank">The Intercept</a>.</p>]]></content>
	<updated>2025-09-12T20:56:29+00:00</updated>
	<author><name>Nikita Mazurov</name></author>
	<source>
		<id>https://theintercept.com</id>
		<link rel="self" href="https://theintercept.com"/>
		<updated>2025-09-12T20:56:29+00:00</updated>
		<title>The Intercept</title></source>

	<category term="technology"/>


	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2025/01/new-GettyImages-1848352193-e1738076074973.jpg?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2025/09/boatvid1-e1757086018627.png?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2025/09/Screenshot-2025-09-10-at-3.40.44-PM-e1757533798317.png?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="image/generic" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2025/09/Screenshot-2025-09-10-at-7.31.53-PM-e1757547158823.png?w=440&amp;h=440&amp;crop=1"/>

	<link rel="enclosure" 
		type="" 
		length="1"
		href="https://theintercept.com/wp-content/uploads/2025/09/GettyImages-1848351309-e1757709459132.jpeg?fit=5000%2C2500"/>

</entry>

<entry>
	<id>tag:news.unknownlamer.org,2025-09-10:/944726</id>
	<link href="https://www.eff.org/deeplinks/2025/09/san-francisco-gets-invasive-billionaire-bought-surveillance-hq" rel="alternate" type="text/html"/>
	<title type="html">San Francisco Gets An Invasive Billionaire-Bought Surveillance HQ</title>
	<summary type="html"><![CDATA[<p>San Francisco billionaire Chris Larsen once again has wielded his wallet to keep city residents unde...</p>]]></summary>
	<content type="html"><![CDATA[<div><div><div><p><span>San Francisco billionaire Chris Larsen once again has wielded his wallet to keep city residents under the eye of all-seeing police surveillance.</span><span>&nbsp;</span></p>
<p><span>The San Francisco Police Commission, the Board of Supervisors, and Mayor Daniel Lurie </span><a href="https://www.sf.gov/news-mayor-lurie-takes-key-step-towards-opening-new-real-time-investigation-center-that-will-leverage-new-technology-to-improve-public-safety" target="_blank" rel="noopener noreferrer"><span>have signed off</span></a><span> on Larsen&rsquo;s $9.4 million gift of a new Real-Time Investigations Center. The plan involves moving the city&rsquo;s existing police tech hub from the public Hall of Justice not to </span><a href="https://www.sanfranciscopolice.org/your-sfpd/sfpd-headquarters" target="_blank" rel="noopener noreferrer"><span>the city&rsquo;s brand-new police headquarters</span></a><span> but instead to a sublet in the Financial District building of Ripple Labs, Larsen&rsquo;s crypto-transfer company. Although the city </span><a href="https://www.sfchronicle.com/crime/article/chris-larsen-sfpd-donation-tech-20357671.php" target="_blank" rel="noopener noreferrer"><span>reportedly won&rsquo;t be paying for the space</span></a><span>, the lease reportedly cost Ripple $2.3 million and will last until December 2026.</span><span>&nbsp;</span></p>
<p><span>The deal will also include a $7.25 million gift from the San Francisco Police Community Foundation that Larsen created. Police foundations are semi-public fundraising arms of police departments that allow them to buy technology and gear that the city will not give them money for.&nbsp;</span><span>&nbsp;</span></p>
<p><span>In Los Angeles, the </span><a href="https://www.latimes.com/california/story/2023-01-04/lapd-police-foundation-private-funding-arm" target="_blank" rel="noopener noreferrer"><span>city&rsquo;s police foundation got $178,000 from the company Target</span></a><span> to pay for the services of the data analytics company Palantir to use for predictive policing. In Atlanta, the city&rsquo;s police foundation funds a </span><a href="https://atlantapolicefoundation.org/programs/operation-shield/" target="_blank" rel="noopener noreferrer"><span>massive surveillance apparatus</span></a><span> as well as the much-maligned </span><a href="https://www.theguardian.com/us-news/2025/apr/11/copy-city-legal-case-police-foundations" target="_blank" rel="noopener noreferrer"><span>Cop City training complex</span></a><span>. (Despite police foundations&rsquo; insistence that they are not public entities and therefore do not need to be transparent or answer public records requests, a judge recently ordered the Atlanta Police Foundation </span><a href="https://georgiarecorder.com/2025/06/04/atlanta-police-foundation-ordered-to-comply-with-open-records-requests-over-cop-city-documents/" target="_blank" rel="noopener noreferrer"><span>to release documentation</span></a><span> related to Cop City.)</span><span>&nbsp;</span></p>
<p><span>A police foundation in San Francisco brings the same concerns: that an unaccountable and untransparent fundraising arm shmoozing with corporations and billionaires would fund unpopular surveillance measures without having to reveal much to the public.&nbsp;</span><span>&nbsp;</span></p>
<p><span>Larsen was one of the deep pockets behind last year&rsquo;s </span><a href="https://www.eff.org/deeplinks/2024/03/voting-no-prop-e-easy-and-important-san-francisco" rel="noopener noreferrer" target="_blank"><span>Proposition E</span></a><span>, a ballot measure to supercharge surveillance in the city. The measure usurped the city&rsquo;s 2019 surveillance transparency and accountability ordinance, which had required the SFPD to get the elected Board of Supervisors&rsquo; approval before buying and using new surveillance technology. This common-sense democratic hurdle was, apparently, a bridge too far for the SFPD and for Larsen.&nbsp;</span><span>&nbsp;</span></p>
<p><span>We&rsquo;re no fans of </span><a href="https://www.eff.org/deeplinks/2020/11/eff-publishes-new-research-real-time-crime-centers-us" target="_blank" rel="noopener noreferrer"><span>real-time crime centers</span></a><span> (RTCCs), as they&rsquo;re often called elsewhere, to start with. They&rsquo;re basically control rooms that pull together all feeds from a vast warrantless digital dragnet, often including automated license plate readers, fixed cameras, officers&rsquo; body-worn cameras, drones, and other sources. It&rsquo;s a means of consolidating constant surveillance of the entire population, tracking everyone wherever they go and whatever they do &ndash; worrisome at any time, but especially in a time of rising authoritarianism.&nbsp;</span><span>&nbsp;</span></p>
<p><span>Think of what this data could do if it got into federal hands; imagine how vulnerable city residents would be subject to harassment if every move they made was centralized and recorded downtown. But you don&rsquo;t have to imagine, because SFPD already has been caught </span><a href="https://sfstandard.com/2025/09/08/sfpd-flock-alpr-ice-data-sharing/" target="_blank" rel="noopener noreferrer"><span>sharing automated license plate reader data with out-of-state law enforcement agencies assisting in federal immigration investigations</span></a><span>.</span><span>&nbsp;</span></p>
<p><span>We&rsquo;re especially opposed to RTCCs using live feeds from non-city surveillance cameras to push that panopticon&rsquo;s boundaries even wider, as San Francisco&rsquo;s does. Those semi-private networks of some 15,000 cameras, </span><a href="https://www.eff.org/cases/williams-v-san-francisco" rel="noopener noreferrer" target="_blank"><span>already abused</span></a><span> by SFPD to surveil lawful protests against police violence, were funded in part by &ndash; you guessed it &ndash; </span><a href="https://www.eff.org/deeplinks/2020/07/san-francisco-police-accessed-business-district-camera-network-spy-protestors" target="_blank" rel="noopener noreferrer"><span>Chris Larsen</span></a><span>.</span><span>&nbsp;</span></p>
<p><span>These technologies could potentially endanger San Franciscans by directing armed police at them due to reliance on a faulty algorithm or by putting already-marginalized communities at further risk of overpolicing and surveillance. But studies find that these technologies just <a href="https://www.aclu.org/sites/default/files/images/asset_upload_file708_35775.pdf" rel="noopener noreferrer" target="_blank">don&rsquo;t work</a>. If the goal is to stop crime before it happens, to spare someone the hardship and the trauma of getting robbed or hurt, cameras clearly do not accomplish this. There&rsquo;s plenty of footage of crime occurring that belies the idea that surveillance is an effective deterrent, and although police often look to technology as a silver bullet to fight crime, </span><a href="https://www.economist.com/united-states/2023/12/27/americas-new-policing-tech-isnt-cutting-crime" target="_blank" rel="noopener noreferrer"><span>evidence</span></a><span> suggests that it does little to alter the historic ebbs and flows of criminal activity.</span><span>&nbsp;</span></p>
<p><span>Yet now this unelected billionaire &ndash; who already helped gut police accountability and transparency rules and helped fund sketchy surveillance of people exercising their First Amendment rights &ndash; wants to bankroll, expand, and host the police&rsquo;s tech nerve center.</span><span>&nbsp;</span></p>
<p><span>Policing must be a public function so that residents can control - and demand accountability and transparency from - those who serve and protect but also surveil and track us all. Being financially beholden to private interests erodes the community&rsquo;s trust and control and can leave the public high and dry if a billionaire&rsquo;s whims change or conflict with the will of the people. Chris Larsen could have tried to address the root causes of crime that affect our community; instead, he exercises his bank account's muscle to decide that surveillance is best for San Franciscans with less in their wallets.</span><span>&nbsp;</span></p>
<p><span>Elected officials should have said &ldquo;thanks but no thanks&rdquo; to Larsen and ensured that the San Francisco Police Department remained under the complete control and financial auspices of nobody except the people of San Francisco. Rich people should not be allowed to fund the further degradation of our privacy as we go about our lives in our city&rsquo;s public places. Residents should carefully watch what comes next to decide for themselves whether a false sense of security is worth living under constant, all-seeing, billionaire-bankrolled surveillance.</span><span>&nbsp;</span></p>

</div></div></div>]]></content>
	<updated>2025-09-10T16:04:41+00:00</updated>
	<author><name>Josh Richman, Matthew Guariglia</name></author>
	<source>
		<id>https://www.eff.org/rss/updates.xml</id>
		<link rel="self" href="https://www.eff.org/rss/updates.xml"/>
		<updated>2025-09-10T16:04:41+00:00</updated>
		<title>Deeplinks</title></source>

	<category term="street-level surveillance"/>


	<link rel="enclosure" 
		type="image/png" 
		length="67391"
		href="https://www.eff.org/files/banner_library/surveillance-og-2.png"/>

</entry>


</feed>
<!-- vim:ft=xml
	  -->
