20
I Use This!
Activity Not Available

News

Posted almost 9 years ago
Diesen Artikel gibt es auch in Englisch. Was ist Conversations? Conversations ist eine App für Android Smartphones, mit der man sich gegenseitig Nachrichten, Bilder, etc schicken kann, sehr ähnlich wie WhatsApp. Es gibt allerdings ein paar wichtige ... [More] Unterschiede zu WhatsApp: Conversations verwendet nicht Deine Telefon-Nummer zur Identifikation, und nicht Dein Adressbuch um Kontakte zu finden. Deine ID sieht aus wie eine Email-Adresse (Deine sogenannte Jabber-ID), und Kontakte findest Du indem Du Deine Jabber-ID mit Bekannten austauschst, genau wie bei Email-Adressen oder Telefonnummern auch. Conversations benutzt ein offenes Protokoll, genannt XMPP, das von vielen anderen Programmen auf vielen verschiedenen Systemen genutzt werden kann, z.B. auch auf Desktop PCs. Conversations ist Open Source, d.h. jeder kann den Quellcode einsehen, und z.B. auf Sicherheitsprobleme überprüfen, oder sich vergewissern was das Programm eigentlich macht, oder es ändern, etc. XMPP baut auf eine dezentrale Infrastruktur, das bedeutet daß nicht ein Unternehmen alles kontrolliert, sondern daß es viele verschiedene Anbieter gibt, oder man z.B. selbst entsprechende Server betreiben kann, wenn man möchte. Conversations sammelt und verkauft keinerlei Informationen über Dich und Deine Kontakte. Es gibt noch einige andere Unterschiede, aber ich will hier nicht im Detail darauf eingehen, das haben andere schon viel besser getan. Conversations installieren Von Google Play Conversations lässt sich ganz einfach von Google Play installieren. Es kostet dort allerdings momentan 2,39€. Ich möchte allen, die die Möglichkeit haben empfehlen, die App zu kaufen, ihr unterstützt damit die Entwicklung dieser wirklich guten App. Alternative: Von F-Droid Allen, die Google Play nicht nutzen können, oder die aus welchen Gründen auch immer nicht 2,39€ dafür zahlen können oder möchten, sei die Installation über F-Droid ans Herz gelegt. F-Droid ist ein alternativer App Store, der aussschliesslich Open Source Software bereitstellt. Dazu muss man sich zunächst F-Droid installieren. Dann kann man in der F-Droid App nach ‘Conversations’ suchen, und dort installieren. Das ist kostenlos und legal. Jabber-Account einrichten Als nächstes musst Du einen Jabber Account einrichten. Dazu benötigst Du zwei Dinge: eine ID, und einen Anbieter. Den ersten Teil, die ID, kannst Du selbst wählen, z.B. einen Phantasienamen, oder etwas wie vorname.nachname, aber das ist wirklich Dir überlassen. Um einen Anbieter zu finden, empfehle ich diese Liste: https://gultsch.de/compliance_ranked.html. Die Anbieter ganz oben unterstützen die meisten Features die für Smartphone-Nutzer wichtig sind. Ich kann trashserver.net empfehlen, da dieser Server die Registrierung direkt aus der Conversations-App heraus unterstützt, und auch sonst sehr gut gewartet wird. Wenn Du dem Entwickler von Conversations zusätzlich Unterstützung zukommen lassen möchtest, dann ist ein Account auf conversations.im empfehlenswert, dies kostet aber momentan 8 Euro im Jahr. Ich finde, das ist es wert, aber das muss jeder selbst entscheiden. Wenn Du z.B. die ID ‘max.mustermann’ auf dem Anbieter ‘anbieter.de’ aussuchst, ist Deine Jabber-ID: [email protected] . Wenn Du Dich für eine ID und einen Anbieter entschieden hast, dann kannst Du ganz einfach einen Account einrichten, indem Du Conversations startest und im Einrichtungs-Bildschirm die gewünschte Jabber-ID eingibst, das Häkchen bei ‘Neues Konto auf Server erstellen’ aktivierst, Dein gewünschtest Passwort 2x eingibst und dann auf ‘Weiter’ tippst. Kontakte hinzufügen Anders als in WhatsApp musst Du in Conversations Deine Kontakte selbst hinzufügen. Dazu einfach auf das Symbol mit dem ‘+’ neben Männchen tippen, die Jabber-ID des Kontaktes eingeben, fertig. Und dann kannst Du loschatten! Viel Spaß! [Less]
Posted almost 9 years ago
The IcedTea project provides a harness to build the source code from OpenJDK using Free Software build tools, along with additional features such as the ability to build against system libraries and support for alternative virtual machines and ... [More] architectures beyond those supported by OpenJDK. This release updates our OpenJDK 7 support in the 2.6.x series with the January 2017 security fixes from OpenJDK 7 u131. If you find an issue with the release, please report it to our bug database under the appropriate component. Development discussion takes place on the distro-pkg-dev OpenJDK mailing list and patches are always welcome. Full details of the release can be found below. What’s New? New in release 2.6.9 (2017-02-14) Security fixes S8138725: Add options for Javadoc generation S8140353: Improve signature checking S8151934, CVE-2017-3231: Resolve class resolution S8156804, CVE-2017-3241: Better constraint checking S8158406: Limited Parameter Processing S8158997: JNDI Protocols Switch S8159507: RuntimeVisibleAnnotation validation S8161218: Better bytecode loading S8161743, CVE-2017-3252: Provide proper login context S8162577: Standardize logging levels S8162973: Better component components S8164143, CVE-2017-3260: Improve components for menu items S8164147, CVE-2017-3261: Improve streaming socket output S8165071, CVE-2016-2183: Expand TLS support S8165344, CVE-2017-3272: Update concurrency support S8166988, CVE-2017-3253: Improve image processing performance S8167104, CVE-2017-3289: Additional class construction refinements S8167223, CVE-2016-5552: URL handling improvements S8168705, CVE-2016-5547: Better ObjectIdentifier validation S8168714, CVE-2016-5546: Tighten ECDSA validation S8168728, CVE-2016-5548: DSA signing improvments S8168724, CVE-2016-5549: ECDSA signing improvments Import of OpenJDK 7 u131 build 0 S6253144: Long narrowing conversion should describe the algorithm used and implied “risks” S6328537: Improve javadocs for Socket class by adding references to SocketOptions S6978886: javadoc shows stacktrace after print error resulting from disk full S6995421: Eliminate the static dependency to sun.security.ec.ECKeyFactory S6996372: synchronizing handshaking hash S7027045: (doc) java/awt/Window.java has several typos in javadoc S7054969: Null-check-in-finally pattern in java/security documentation S7072353: JNDI libraries do not build with javac -Xlint:all -Werror S7075563: Broken link in “javax.swing.SwingWorker” S7077672: jdk8_tl nightly fail in step-2 build on 8/10/11 S7088502: Security libraries don’t build with javac -Werror S7092447: Clarify the default locale used in each locale sensitive operation S7093640: Enable client-side TLS 1.2 by default S7103570: AtomicIntegerFieldUpdater does not work when SecurityManager is installed S7117360: Warnings in java.util.concurrent.atomic package S7117465: Warning cleanup for IMF classes S7187144: JavaDoc for ScriptEngineFactory.getProgram() contains an error S8000418: javadoc should used a standard “generated by javadoc” string S8000666: javadoc should write directly to Writer instead of composing strings S8000673: remove dead code from HtmlWriter and subtypes S8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK S8001669: javadoc internal DocletAbortException should set cause when appropriate S8008949: javadoc stopped copying doc-files S8011402: Move blacklisting certificate logic from hard code to data S8011547: Update XML Signature implementation to Apache Santuario 1.5.4 S8012288: XML DSig API allows wrong tag names and extra elements in SignedInfo S8016217: More javadoc warnings S8017325: Cleanup of the javadoc tag in java.security.cert S8017326: Cleanup of the javadoc tag in java.security.spec S8019772: Fix doclint issues in javax.crypto and javax.security subpackages S8020557: javadoc cleanup in javax.security S8020688: Broken links in documentation at http://docs.oracle.com/javase/6/docs/api/index. S8021108: Clean up doclint warnings and errors in java.text package S8021417: Fix doclint issues in java.util.concurrent S8021833: javadoc cleanup in java.net S8022120: JCK test api/javax_xml/crypto/dsig/TransformService/index_ParamMethods fails S8022175: Fix doclint warnings in javax.print S8022406: Fix doclint issues in java.beans S8022746: List of spelling errors in API doc S8024779: [macosx] SwingNode crashes on exit S8025085: [javadoc] some errors in javax/swing S8025218: [javadoc] some errors in java/awt classes S8025249: [javadoc] fix some javadoc errors in javax/swing/ S8025409: Fix javadoc comments errors and warning reported by doclint report S8026021: more fix of javadoc errors and warnings reported by doclint, see the description S8037099: [macosx] Remove all references to GC from native OBJ-C code S8038184: XMLSignature throws StringIndexOutOfBoundsException if ID attribute value is empty String S8038349: Signing XML with DSA throws Exception when key is larger than 1024 bits S8049244: XML Signature performance issue caused by unbuffered signature data S8049432: New tests for TLS property jdk.tls.client.protocols S8050893: (smartcardio) Invert reset argument in tests in sun/security/smartcardio S8059212: Modify sun/security/smartcardio manual regression tests so that they do not just fail if no cardreader found S8068279: (typo in the spec) javax.script.ScriptEngineFactory.getLanguageName S8068491: Update the protocol for references of docs.oracle.com to HTTPS. S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be updated for JDK-8061210 S8076369: Introduce the jdk.tls.client.protocols system property for JDK 7u S8139565: Restrict certificates with DSA keys less than 1024 bits S8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions S8140587: Atomic*FieldUpdaters should use Class.isInstance instead of direct class check S8143959: Certificates requiring blacklisting S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks S8148516: Improve the default strength of EC in JDK S8149029: Secure validation of XML based digital signature always enabled when checking wrapping attacks S8151893: Add security property to configure XML Signature secure validation mode S8155760: Implement Serialization Filtering S8156802: Better constraint checking S8161228: URL objects with custom protocol handlers have port changed after deserializing S8161571: Verifying ECDSA signatures permits trailing bytes S8163304: jarsigner -verbose -verify should print the algorithms used to sign the jar S8164908: ReflectionFactory support for IIOP and custom serialization S8165230: RMIConnection addNotificationListeners failing with specific inputs S8166393: disabledAlgorithms property should not be strictly parsed S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12 Sierra is very fast (Trackpad, Retina only) S8166739: Improve extensibility of ObjectInputFilter information passed to the filter S8166875: (tz) Support tzdata2016g S8166878: Connection reset during TLS handshake S8167356: Follow up fix for jdk8 backport of 8164143. Changes for CMenuComponent.m were missed S8167459: Add debug output for indicating if a chosen ciphersuite was legacy S8167472: Chrome interop regression with JDK-8148516 S8167591: Add MD5 to signed JAR restrictions S8168861: AnchorCertificates uses hardcoded password for cacerts keystore S8168993: JDK8u121 L10n resource file update S8169191: (tz) Support tzdata2016i S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for January CPU S8169911: Enhanced tests for jarsigner -verbose -verify after JDK-8163304 S8170131: Certificates not being blocked by jdk.tls.disabledAlgorithms property S8170268: 8u121 L10n resource file update – msgdrop 20 S8173622: Backport of 7180907 is incomplete S8173849: Fix use of java.util.Base64 in test cases S8173854: [TEST] Update DHEKeySizing test case following 8076328 & 8081760 Backports S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on __APPLE__and _LLP64 systems. S8000351, PR3316, RH1390708: Tenuring threshold should be unsigned S8153711, PR3315, RH1284948: [REDO] JDWP: Memory Leak: GlobalRefs never deleted when processing invokeMethod command S8170888, PR3316, RH1390708: [linux] Experimental support for cgroup memory limits in container (ie Docker) environments Bug fixes PR3318: Replace ‘infinality’ with ‘improved font rendering’ (–enable-improved-font-rendering) PR3318: Fix compatibility with vanilla Fontconfig PR3318: Fix glyph y advance PR3318: Always round glyph advance in 26.6 space PR3318: Simplify glyph advance handling PR3324: Fix NSS_LIBDIR substitution in make_generic_profile.sh broken by PR1989 AArch64 port S8165673, PR3320: AArch64: Fix JNI floating point argument handling The tarballs can be downloaded from: http://icedtea.classpath.org/download/source/icedtea-2.6.9.tar.gz http://icedtea.classpath.org/download/source/icedtea-2.6.9.tar.xz We provide both gzip and xz tarballs, so that those who are able to make use of the smaller tarball produced by xz may do so. The tarballs are accompanied by digital signatures available at: http://icedtea.classpath.org/download/source/icedtea-2.6.9.tar.gz.sig http://icedtea.classpath.org/download/source/icedtea-2.6.9.tar.xz.sig These are produced using my public key. See details below. PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 GnuPG >= 2.1 is required to be able to handle this key. SHA256 checksums: 86d0fb6182e10f2f92785dce919d03602694928f5e585d42034a3f8ff3bda079 icedtea-2.6.9.tar.gz 6660ee155cd6738cef2b7dcd83ce15eded595c801100900b51906c76d83b5f62 icedtea-2.6.9.tar.gz.sig 8e4f3eb8d41ef66f1797825343141046973c124b18bf7d4698fae0a9a25495ea icedtea-2.6.9.tar.xz ef7b9886ba619bc206a0b540b80ea11f85bac44e0658ea5588833830579c7c81 icedtea-2.6.9.tar.xz.sig The checksums can be downloaded from: http://icedtea.classpath.org/download/source/icedtea-2.6.9.sha256 A 2.6.9 ebuild for Gentoo is available. The following people helped with these releases: Matthias Dahl (PR3318 font rendering improvements) Christine Flood (S8000351/PR3316/RH1390708 CGroup memory limit handling) Severin Gehwolf (S8153711/PR3315/RH1284948 JDWP memory leak) Andrew Hughes (all other backports & bug fixes, release management) Ningsheng Jian (S8165673/PR3320 AArch64 JNI floating point argument handling) We would also like to thank the bug reporters and testers! To get started: $ tar xzf icedtea-2.6.9.tar.gz or: $ tar x -I xz -f icedtea-2.6.9.tar.xz then: $ mkdir icedtea-build $ cd icedtea-build $ ../icedtea-2.6.9/configure $ make Full build requirements and instructions are available in the INSTALL file. Happy hacking! [Less]
Posted almost 9 years ago
We are pleased to announce the release of IcedTea 3.3.0! The IcedTea project provides a harness to build the source code from OpenJDK using Free Software build tools, along with additional features such as the ability to build against system ... [More] libraries and support for alternative virtual machines and architectures beyond those supported by OpenJDK. This release updates our OpenJDK 8 support with the October 2016 bug fixes from OpenJDK 8 u112 and the January 2017 security fixes from OpenJDK 8 u121. The ‘infinality’ feature has been improved and is now known as ‘improved font rendering’. It no longer requires a patched FreeType and we intend to enable it by default from IcedTea 3.4.0 onwards. We also make the build a little easier on some platforms by removing the requirement for wget to be installed if downloading is disabled, and supporting older Kerberos installations which don’t use pkg-config. We also add support for picking up the strangely named JVM installation locations on RHEL 6 multilib platforms. If you find an issue with the release, please report it to our bug database under the appropriate component. Development discussion takes place on the distro-pkg-dev OpenJDK mailing list and patches are always welcome. Full details of the release can be found below. New in release 3.3.0 (2017-01-28) Security fixes S8138725: Add options for Javadoc generation S8140353: Improve signature checking S8151934, CVE-2017-3231: Resolve class resolution S8156804, CVE-2017-3241: Better constraint checking S8158406: Limited Parameter Processing S8158997: JNDI Protocols Switch S8159507: RuntimeVisibleAnnotation validation S8161218: Better bytecode loading S8161743, CVE-2017-3252: Provide proper login context S8162577: Standardize logging levels S8162973: Better component components S8164143, CVE-2017-3260: Improve components for menu items S8164147, CVE-2017-3261: Improve streaming socket output S8165071, CVE-2016-2183: Expand TLS support S8165344, CVE-2017-3272: Update concurrency support S8166988, CVE-2017-3253: Improve image processing performance S8167104, CVE-2017-3289: Additional class construction refinements S8167223, CVE-2016-5552: URL handling improvements S8168705, CVE-2016-5547: Better ObjectIdentifier validation S8168714, CVE-2016-5546: Tighten ECDSA validation S8168728, CVE-2016-5548: DSA signing improvments S8168724, CVE-2016-5549: ECDSA signing improvments New features PR3300: wget not required when downloading is disabled PR3301: Support RHEL multilib installations which use the /usr/lib/jvm/java-1.x.0-openjdk.${arch} naming PR3303: Allow Kerberos to be detected by old libs & headers method if pkg-config check fails Import of OpenJDK 8 u112 build 16 S6477756: GraphicsDevice.getConfigurations() is slow taking 3 or more seconds S7172749: Xrender: Class cast exception in 2D code running an AWT regression test S8017629: G1: UseSHM in combination with a G1HeapRegionSize > os::large_page_size() falls back to use small pages S8022203: Intermittent test failures in demo/jvmti/hprof S8022582: Relax response flags checking in sun.security.krb5.KrbKdcRep.check. S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics S8028486: java/awt/Window/WindowsLeak/WindowsLeak.java fails S8030780: test/com/sun/corba/cachedSocket/7056731.sh leaves HelloServer behind S8036630: Null ProtectionDomain in JVM can cause NPE because principals field is not initialized to an empty array S8042660: vm/mlvm/anonloader/stress/byteMutation failed with: assert(index >=0 && index < _length) failed: symbol index overflow S8044193: Need to add known answer tests for AES cipher S8044575: testlibrary_tests/whitebox/vm_flags/UintxTest.java failed: assert(!res || TypeEntriesAtCall::arguments_profiling_enabled()) failed: no profiling of arguments S8048601: Tests for JCE crypto ciphers (part 1) S8048621: Implement basic keystore tests S8048622: Enhance tests for PKCS11 keystores with NSS S8049021: Add smartcardio tests with APDU buffer S8049312: AES/CICO test failed with on several modes S8050402: Tests to check for use of policy files S8050409: Test for JAAS getPrivateCredentials S8054326: Confusing message in “Current rem set statistics” S8055772: get_source.sh : version check assumes English localization S8057791: Selection in JList is drawn with wrong colors in Nimbus L&F S8058865: JMX Test Refactoring S8067964: Native2ascii doesn’t close one of the streams it opens S8071487: javax/management/monitor/GaugeMonitorDeadlockTest.java timed out S8071909: Port testlibrary improvments in jdk/test to hotspot/test as required for DCMD test port S8073542: File Leak in jdk/src/java/base/unix/native/libnet/PlainDatagramSocketImpl.c S8074784: Additional tests for XML DSig API S8075007: Additional tests for krb5-related cipher suites with unbound server S8075297: Tests for RFEs 4515853 and 4745056 S8075299: Additional tests for krb5 settings S8075301: Tests for sun.security.krb5.principal system property S8077276: allocating heap with UseLargePages and HugeTLBFS may trash existing memory mappings (linux) S8078268: javax.swing.text.html.parser.Parser parseScript incorrectly optimized S8078382: Wrong glyph is displayed for a derived font S8080729: [macosx] java 7 and 8 JDialogs on multiscreen jump to parent frame on focus S8085903: New fix for memory leak in ProtectionDomain cache S8098581: SecureRandom.nextBytes() hurts performance with small size requests S8129740: Incorrect class file created when passing lambda in inner class constructor S8130127: streamline input parameter of Nashorn scripting $EXEC function S8130309: Need to bailout cleanly if creation of stubs fails when codecache is out of space S8130317: “ant test” fails to complete on Windows when run under cygwin shell S8133070: Hot lock on BulkCipher.isAvailable S8133309: Some unicode characters do not display any more after upgrading to Windows 10 S8134232: KeyStore.load() throws an IOException with a wrong cause in case of wrong password S8135322: ConstantPool::release_C_heap_structures not run in some circumstances S8136998: JComboBox prevents wheel mouse scrolling of JScrollPane S8137240: Negative lookahead in RegEx breaks backreference S8138906: [TEST_BUG] Test test/script/trusted/JDK-8087292.js intermittently fails. S8141148: LDAP “follow” throws ClassCastException with Java 8 S8141541: Simplify Nashorn’s Context class loader handling S8143640: Showing incorrect result while passing specific argument in the Java launcher tools S8143642: Nashorn shebang argument handling is broken S8144160: Regression: two tests fail on Windows with “ant test” target S8144221: fix Nashorn shebang argument handling on Mac/Linux S8144703: ClassCastException: sun.font.CompositeFont cannot be cast to PhysicalFont S8145305: fix Nashorn shebang handling on Cygwin S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks S8146975: NullPointerException in IIOPInputStream.inputClassFields S8147026: Convert an assert in ClassLoaderData to a guarantee S8147451: Crash in Method::checked_resolve_jmethod_id(_jmethodID*) S8147585: Annotations with lambda expressions has parameter result in wrong behavior. S8147969: Print size of DH keysize when errors are encountered S8148140: arguments are handled differently in apply for JS functions and AbstractJSObjects S8148984: [macosx] Chinese Comma cannot be entered using Pinyin Input Method on OS X S8150219: ReferenceError in 1.8.0_72 S8150234: Windows 10 App Containers disallow access to ICMP calls S8150814: correct package declaration in Nashorn test S8151722: TESTBUG: New test compiler/native/TestDirtyInt.sh should be modified S8153149: Uninitialised memory in WinAccessBridge.cpp:1128 S8153192: (se) Selector.select(long) uses wrong timeout after EINTR (lnx) S8153781: Issue in XMLScanner: EXPECTED_SQUARE_BRACKET_TO_CLOSE_INTERNAL_SUBSET when skipping large DOCTYPE section with CRLF at wrong place S8153948: sun/security/mscapi/ShortRSAKey1024.sh fails with “Field length overflow” S8154009: Some methods of java.security.Security require more permissions, than necessary S8154069: Jaws reads wrong values from comboboxes when no element is selected S8154144: Tests in com/sun/jdi fails intermittently with “jdb input stream closed prematurely” S8154469: Update FSF address S8154553: Incorrect GPL header in package-info.java reported S8154558: Incorrect GPL header in ProcessEnvironment_md.c reported S8154816: Caps Lock doesn’t work as expected when using Pinyin Simplified input method S8154831: CastII/ConvI2L for a range check is prematurely eliminated S8155001: SystemTray.remove() leaks GDI Objects in Windows S8155106: MHs.Lookup.findConstructor returns handles for array classes S8155214: java/lang/invoke/PermuteArgsTest.java fails due to exhausted code cache S8156478: 3 Buffer overrun defect groups in jexec.c S8156521: Minor fixes and cleanups in NetworkInterface.c S8156714: Parsing issue with automatic semicolon insertion S8156836: SIGSEGV: Test test/compiler/jsr292/VMAnonymousClasses.java fails with JTREG 4.2 b02 S8156896: Script stack trace should display function names S8157160: JSON.stringify does not work on ScriptObjectMirror objects S8157242: Some java/lang/invoke tests miss othervm S8157444: exclude jjs shebang handling test from runs S8157603: TestCipher.java doesn’t check one of the decrypted message as expected S8157680: Callback parameter of any JS builtin implementation should accept any Callable S8157819: TypeError when a java.util.Comparator object is invoked as a function S8158059: The fix for 8050402 was partially committed S8158072: Need a test for JDK-7172749 S8158111: Make handling of 3rd party providers more stable S8158178: java.awt.SplashScreen.getSize() returns incorrect size for high dpi splash screens S8158338: Nashorn’s ScriptLoader split delegation has to be adjusted S8158373: SIGSEGV: Metadata::mark_on_stack S8158467: AccessControlException is thrown on public Java class access if “script app loader” is set to null S8158495: CCE: sun.java2d.NullSurfaceData cannot be cast to sun.java2d.opengl.OGLSurfaceData S8158802: com.sun.jndi.ldap.SimpleClientId produces wrong hash code S8158871: Long response times with G1 and StringDeduplication S8159822: Non-synchronized access to shared members of com.sun.jndi.ldap.pool.Pool S8160122: Backport of JDK-8159244 used wrong version of the JDK 9 fix S8160518: Semicolon is not recognized as comment starting character (Kerberos) S8160693: ScriptRunData.java uses bitwise AND instead of logical AND S8161144: Fix for JDK-8147451 failed: Crash in Method::checked_resolve_jmethod_id(_jmethodID*) S8162510: 8u112 L10n resource file updates S8164453: 8u112 L10n resource file update – msgdrop 20 Import of OpenJDK 8 u121 build 13 S8037099: [macosx] Remove all references to GC from native OBJ-C code S8059212: Modify sun/security/smartcardio manual regression tests so that they do not just fail if no cardreader found S8139565: Restrict certificates with DSA keys less than 1024 bits S8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions S8148516: Improve the default strength of EC in JDK S8151893: Add security property to configure XML Signature secure validation mode S8152438: Threads may do significant work out of the non-shared overflow buffer S8153438: Avoid repeated “Please insert a smart card” popup windows S8154005: Add algorithm constraint that specifies the restriction date S8154015: Apply algorithm constraints to timestamped code S8159410: InetAddress.isReachable returns true for non existing IP adresses S8160108: Implement Serialization Filtering S8161228: URL objects with custom protocol handlers have port changed after deserializing S8161571: Verifying ECDSA signatures permits trailing bytes S8163304: jarsigner -verbose -verify should print the algorithms used to sign the jar S8163583: [macosx] Press “To Back” button on the Dialog,the Dialog moves behind the Frame S8164908: ReflectionFactory support for IIOP and custom serialization S8165230: RMIConnection addNotificationListeners failing with specific inputs S8166389: [TEST_BUG] closed/java/security/Security/ReadProp/ReadProp.sh failing S8166393: disabledAlgorithms property should not be strictly parsed S8166432: Bad 8u112 merge of sun/security/tools/jarsigner/warnings/Test.java S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12 Sierra is very fast (Trackpad, Retina only) S8166739: Improve extensibility of ObjectInputFilter information passed to the filter S8166875: (tz) Support tzdata2016g S8166878: Connection reset during TLS handshake S8167356: Follow up fix for jdk8 backport of 8164143. Changes for CMenuComponent.m were missed S8167459: Add debug output for indicating if a chosen ciphersuite was legacy S8167472: Chrome interop regression with JDK-8148516 S8167591: Add MD5 to signed JAR restrictions S8168861: AnchorCertificates uses hardcoded password for cacerts keystore S8168963: Backout JDK-8154005 S8168993: JDK8u121 L10n resource file update S8169072: Backout JDK-8154015 S8169191: (tz) Support tzdata2016i S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for January CPU S8169911: Enhanced tests for jarsigner -verbose -verify after JDK-8163304 S8170131: Certificates not being blocked by jdk.tls.disabledAlgorithms property S8170268: 8u121 L10n resource file update – msgdrop 20 Bug fixes PR3271: Always round glyph advance in 26.6 space PR3271: Fix compatibility with vanilla Fontconfig PR3271: Fix glyph y advance PR3271: Replace ‘infinality’ with ‘improved font rendering’ (–enable-improved-font-rendering) PR3271: Simplify glyph advance handling PR3286: -ffp-contract not available on older GCCs PR3302: zip should be optional, as it’s only used in the manually invoked dist-openjdk and dist-openjdk-fsg rules PR3304: zip still a requirement of the underlying OpenJDK build PPC port S8170873, PR3280: PPC64/aarch64: Poor StrictMath performance due to non-optimized compilation AArch64 port S8130309, PR3280: Need to bailout cleanly if creation of stubs fails when codecache is out of space (AArch64 changes) S8132875, PR3280: AArch64: Fix error introduced into AArch64 CodeCache by commit for 8130309 S8165673, PR3280: AArch64: Fix JNI floating point argument handling S8170188, PR3280: jtreg test compiler/types/TestMeetIncompatibleInterfaceArrays.java causes JVM crash S8170873, PR3280: PPC64/aarch64: Poor StrictMath performance due to non-optimized compilation The tarballs can be downloaded from: http://icedtea.classpath.org/download/source/icedtea-3.3.0.tar.gz http://icedtea.classpath.org/download/source/icedtea-3.3.0.tar.xz We provide both gzip and xz tarballs, so that those who are able to make use of the smaller tarball produced by xz may do so. The tarballs are accompanied by digital signatures available at: http://icedtea.classpath.org/download/source/icedtea-3.3.0.tar.gz.sig http://icedtea.classpath.org/download/source/icedtea-3.3.0.tar.xz.sig These are produced using my public key. See details below. PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 GnuPG >= 2.1 is required to be able to handle this key. SHA256 checksums: ce74a343759bfe6a7332301835e7c6e77d01db588a1dab672816c9ce338474b1 icedtea-3.3.0.tar.gz efed173fa928897f02eed70c63b0e764800593c4800cb0e055a450df0d1aa045 icedtea-3.3.0.tar.gz.sig b764ff09674f9139f94dfe9df8f6393ed55af149c7bb1033fbf119f68cea750b icedtea-3.3.0.tar.xz 4ca9acdbec277afe2028508d36f30309a06a4317125f9207c9e95dce9335a0a0 icedtea-3.3.0.tar.xz.sig The checksums can be downloaded from: http://icedtea.classpath.org/download/source/icedtea-3.3.0.sha256 A 3.3.0 ebuild for Gentoo is available. The following people helped with these releases: Matthias Dahl (PR3271 font rendering improvements) Andrew Hughes (all other bug fixes and backports, release management) We would also like to thank the bug reporters and testers! To get started: $ tar xzf icedtea-3.3.0.tar.gz or: $ tar x -I xz -f icedtea-3.3.0.tar.xz then: $ mkdir icedtea-build $ cd icedtea-build $ ../icedtea-3.3.0/configure $ make Full build requirements and instructions are available in the INSTALL file. Happy hacking! [Less]
Posted almost 9 years ago
The IcedTea project provides a harness to build the source code from OpenJDK using Free Software build tools, along with additional features such as a PulseAudio sound driver, the ability to build against system libraries and support for alternative ... [More] virtual machines and architectures beyond those supported by OpenJDK. This release updates our OpenJDK 6 support in the 1.13.x series with the October 2016 security fixes from OpenJDK 6 b41. This is the final security update to IcedTea 1.x. Users should upgrade to IcedTea 2.x for OpenJDK 7 or 3.x for OpenJDK 8. See the earlier post on this for further details. If you find an issue with the release, please report it to our bug database under the appropriate component. Development discussion takes place on the distro-pkg-dev OpenJDK mailing list and patches are always welcome. There will be a final 1.14.0 release at some point and this can include fixes for any issues with this release. However, it will not include any further security backports. Full details of the release can be found below. What’s New? New in release 1.13.13 (2017-01-09) Security fixes S8151921: Improved page resolution S8155968: Update command line options S8155973, CVE-2016-5542: Tighten jar checks S8157176: Improved classfile parsing S8157739, CVE-2016-5554: Classloader Consistency Checking S8157749: Improve handling of DNS error replies S8157753: Audio replay enhancement S8158302: Handle contextual glyph substitutions S8158993, CVE-2016-5568: Service Menu services S8159495, PR3276: Fix index offsets S8159503: Amend Annotation Actions S8159511: Stack map validation S8159515: Improve indy validation S8159519, CVE-2016-5573: Reformat JDWP messages S8160090: Better signature handling in pack200 S8160094: Improve pack200 layout S8160591, CVE-2016-5582: Improve internal array handling S8160838, CVE-2016-5597: Better HTTP service Import of OpenJDK6 b41 S4787377: VK_STOP key on Solaris generates wrong Key Code S4947220: (process)Runtime.exec() cannot invoke applications with unicode parameters(win) S5036807: Pressing action keys “STOP/AGAIN/COMPOSE” generates keycode of F11/F12 keys. S5099725: AWT doesn’t seem to handle MappingNotify events under X11. S5100701: Toolkit.getLockingKeyState() does not work on XToolkit, but works on Motif S6324292: keytool -help is unhelpful S6464022: Memory leak in JOptionPane.createDialog S6501385: ColorChooser demo – two elemets have same mnemonic in it locale, GTK L&F S6535697: keytool can be more flexible on format of PEM-encoded X.509 certificates S6561126: keytool should use larger default keysize for keypairs S6566218: l10n of 6476932 S6606396: Notepad and Stylepad demos don’t run in Japanese locale. S6608456: need API to define RepaintManager per components hierarchy S6624200: Regression test fails: test/closed/javax/swing/JMenuItem/4654927/bug4654927.java S6675400: “Details” in English has to be “Details” in German S6680988: KeyEvent is still missing VK values for many keyboards S6683775: Painting artifacts is seen when panel is made setOpaque(false) for a translucent window S6693507: There are unnecessary compilation warnings in the com.sun.java.swing.plaf.motif package S6709758: keytool default cert fingerprint algorithm should be SHA1, not MD5 S6711676: Numpad keys trigger more than one KeyEvent. S6719382: Printing of AWT components on windows is not working S6726866: Repainting artifacts when resizing or dragging JInternalFrames in non-opaque toplevel S6727661: Code improvement and warnings removing from the swing/plaf packages S6727662: Code improvement and warnings removing from swing packages S6794764: Translucent windows are completely repainted on every paint event, on Windows S6796710: Html content in JEditorPane is overlapping on swing components while resizing the application. [TEST FRAMEWORK ONLY] S6802846: jarsigner needs enhanced cert validation(options) S6867657: Many JSN tests do not run under cygwin S6870812: enhance security tools to use ECC algorithms S6871299: Shift+Tab no longer generates a KEY_TYPED event; used to with JRE 1.5 S6871847: AlgorithmId.get(“SHA256withECDSA”) not available S6882559: new JEditorPane(“text/plain”,”") fails for null context class loader S6894719: (launcher)The option -no-jre-restrict-search is expected when -jre-no-restrict-search is documented. S6901170: HttpCookie parsing of version and max-age mis-handled S6911129: These tests do not work with CYGWIN: java/lang S6922482: keytool’s help on -file always shows ‘output file’ S6923681: Jarsigner crashes during timestamping S6939248: Jarsigner can’t extract Extended Key Usage from Timestamp Reply correctly S6959252: convert the anonymous arrays to named arrays in Java List Resource files S6969683: Generify ResolverConfiguration codes S6980510: Fix for 6959252 broke JConsole mnemonic keys S6982840: sun/security/tools/jarsigner/emptymanifest.sh fails S6987827: security/util/Resources.java needs improvement S6988163: sun.security.util.Resources dup and a keytool doc typo S7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert S7013850: Please change the mnemonic assignment system to avoid translation issue S7017818: NLS: JConsoleResources.java cannot be handled by translation team S7019937: Translatability bug – Remove Unused String – String ID , read end of file S7019938: Translatability bug – Remove Unused String – String ID can not specify Principal with a S7019940: Translatability bug – Remove unused string – String ID: provided null name S7019942: Translatability bug – String ID: trustedCertEntry, S7019945: Translatability bug – Translatability issue – String ID: * has NOT been verified! In order to veri S7019947: Translatability bug – Translatability issue – String ID: * The integrity of the information stored i S7019949: Translatability bug – Translatability issue – String ID: * you must provide your keystore password. S7020531: test: java/security/cert/CertificateFactory/openssl/OpenSSLCert.java file not closed after run S7021693: [ja, zh_CN] jconsole throws exception and fail to start in ja and zh_CN locales S7022005: [ja,zh_CN] javadoc, part of navigation bar in generated html are not translated. S7024118: possible hardcoded mnemonic for JFileChooser metal and motif l&f S7025267: NLS: t13y fix for 7021689 [ja] Notepad demo throws NPE S7028447: security-related resources Chinese translation errors S7028490: better suggestion for jarsigner when TSA is not accessible S7030174: Jarsigner should accept TSACert with an HTTPS id-ad-timeStamping SIA S7032018: The file list in JFileChooser does not have an accessible name S7032436: When running with the Nimbus look and feel, the JFileChooser does not display mnemonics S7034259: [all] incorrect mnemonic keys in JCP automatic update advanced settings dialog. S7034940: message drop 2 translation integration S7035843: [zh_CN, ja] JConsole mnemonic keys don’t work S7038803: [CCJK] Incorrect mnemonic key (0) is displayed on cancel button on messagedialog of JOptionPane S7038807: [CCJK] OK button on message dialog of JOptionpane is not translated S7040228: [zh_TW] extra (C) on cancel button on File Chooser dialog S7040257: [pt_BR,fr] Print dialog has duplicate mnemonic key. S7042323: [sv, de, es, it] Print dialog has duplicate mnemonic key S7042475: [ja,zh_CN] extra mnemonic key in jconsole S7043548: message drop 3 translation integration S7045132: sun.security.util.Resources_pt_BR.java translation error S7045184: GTK L&F doesn’t have hotkeys in jdk7 b141, while b139 has. S7062969: java -help still shows http://java.sun.com/javase/reference S7090158: Networking Libraries don’t build with javac -Werror S7090832: Some locale info are not localized for some languages. S7093156: NLS Please change the mnemonic assignment system to avoid translation issue (Swing files) S7102686: Restructure timestamp code so that jars and modules can more easily share the same code S7109085: Test use hotkeys not intended for Mac S7116786: RFE: Detailed information on VerifyErrors S7124171: 7u4 l10n message update related to Mac OS X port S7125055: ContentHandler.getContent API changed in error S7132247: java/rmi/registry/readTest/readTest.sh failing with Cygwin S7142339: PKCS7.java is needlessly creating SHA1PRNG SecureRandom instances when timestamping is not done S7145375: 7u4 l10n message update related to langtools S7145960: sun/security/mscapi/ShortRSAKey1024.sh failing on windows S7146099: NLS: [de,es,it,ko,pt_BR]launcher_**.properties, double backslash issue. S7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp S7158712: Synth Property “ComboBox.popupInsets” is ignored S7169226: NLS: Please change the mnemonic assignment system for windows and motif properties S7174970: NLS [ccjk] Extra mnemonic keys at standard filechooserdialog (open and save) in metal L&F S7175367: NLS: 7u6 message drop10 integration S7176894: back out LocaleNames_xx.properties files from 7u6 message drop10 S7178145: Change constMethodOop::_exception_table to optionally inlined u2 table. S7181632: nsk classLoad001_14 failure and CompileTheWorld crash after 7178145. S7182226: NLS: jdk7u6 message drop20 integration S7183203: ShortRSAKeynnn.sh tests intermittent failure S7187051: ShortRSAKeynnn.sh tests should do cleanup before start test S7194449: String resources for Key Tool and Policy Tool should be in their respective packages S8000626: Implement dead key detection for KeyEvent on Linux S8003890: corelibs test scripts should pass TESTVMOPTS S8008764: 7uX l10n resource file translation update S8009168: accessibility.properties syntax issue S8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161 S8010297: Missing isLoggable() checks in logging code S8010782: clean up source files containing carriage return characters S8014048: Online user guide of jconsole points incorrect link S8014431: cleanup warnings indicated by the -Wunused-value compiler option on linux S8015265: revise the fix for 8007037 S8016579: (process) IOException thrown by ProcessBuilder.start() method is incorrectly encoded S8019541: 7u40 l10n resource file translation update S8020708: NLS mnemonics missing in SwingSet2/JInternalFrame demo S8023338: Update jarsigner to encourage timestamping S8024302: Clarify jar verifications S8024756: method grouping tabs are not selectable S8026741: jdk8 l10n resource file translation update 5 S8027787: 7u51 l10n resource file translation update 1 S8030698: Several GUI labels in jconsole need correction S8030878: JConsole issues meaningless message if SSL connection fails S8035988: 7u60 l10n resource file translation update 1 S8038837: Add support to jarsigner for specifying timestamp hash algorithm S8048147: Privilege tests with JAAS Subject.doAs S8048357: PKCS basic tests S8049171: Additional tests for jarsigner’s warnings S8055176: 7u71 l10n resource file translation update S8057530: (process) Runtime.exec throws garbled message in jp locale S8059177: jdk8u40 l10n resource file translation update 1 S8065609: 7u76 l10n resource file translation update S8076486: [TESTBUG] javax/security/auth/Subject/doAs/NestedActions.java fails if extra VM options are given S8077953: [TEST_BUG] com/sun/management/OperatingSystemMXBean/TestTotalSwap.java Compilation failed after JDK-8077387 S8078628, PR3152: Zero build fails with pre-compiled headers disabled S8080628: No mnemonics on Open and Save buttons in JFileChooser S8083601: jdk8u60 l10n resource file translation update 2 S8140530, PR3276: Creating a VolatileImage with size 0,0 results in no longer working g2d.drawString S8142926: OutputAnalyzer’s shouldXXX() calls return this S8143134: L10n resource file translation update S8147077: IllegalArgumentException thrown by api/java_awt/Component/FlipBufferStrategy/indexTGF_General S8148127: IllegalArgumentException thrown by JCK test api/java_awt/Component/FlipBufferStrategy/indexTGF_General in opengl pipeline S8150611: Security problem on sun.misc.resources.Messages* S8157077: 8u101 L10n resource file updates S8157653: [Parfait] Uninitialised variable in awt_Font.cpp S8158734: JEditorPane.createEditorKitForContentType throws NPE after 6882559 S8159684: (tz) Support tzdata2016f S8162411: Service Menu services 2 S8162419: closed/com/oracle/jfr/runtime/TestVMInfoEvent.sh failing after JDK-8155968 S8162511: 8u111 L10n resource file updates S8162792: Remove constraint DSA keySize < 1024 from jdk.jar.disabledAlgorithms in jdk8 S8164452: 8u111 L10n resource file update – msgdrop 20 S8165816: jarsigner -verify shows jar unsigned if it was signed with a weak algorithm S8166381: Back out changes to the java.security file to not disable MD5 S8169448, PR3205: OpenJDK 6 fails to build without pre-compiled headers S8171415: Remove Java 7 features from testlibrary S8171954: Add stubs for sun.security.tools.KeyTool and sun.security.tools.JarSigner S8172159: Remove @Override annotation on interfaces added by b41 updates S8172252: Remove over-zealous switch to for-each loop in SortingFocusTraversalPolicy Backports S6974985, PR3276: Java2Demo threw exceptions when xrender enabled in OEL5.5 S6985593, PR3276: Crash in Java_sun_java2d_loops_MaskBlit_MaskBlit on oel5.5-x64 Bug fixes PR3174: systemtap: type definition ‘symbolOopDesc’ not found PR3175: invalid zip timestamp handling leads to error updating JAR files PR3213: Disable ARM32 JIT by default PR3275: Update generated files after OpenJDK 6 b41 update The tarballs can be downloaded from: http://icedtea.classpath.org/download/source/icedtea6-1.13.13.tar.gz http://icedtea.classpath.org/download/source/icedtea6-1.13.13.tar.xz We provide both gzip and xz tarballs, so that those who are able to make use of the smaller tarball produced by xz may do so. The tarballs are accompanied by digital signatures available at: http://icedtea.classpath.org/download/source/icedtea6-1.13.13.tar.gz.sig http://icedtea.classpath.org/download/source/icedtea6-1.13.13.tar.xz.sig PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 GnuPG >= 2.1 is required to be able to handle this key. SHA256 checksums: b0456b5efaa2cd884943287256ec7bd9945ac02d49d8e3295141391cc376f96b icedtea6-1.13.13.tar.gz 057be0084bd1730505e55c4e1b3302dd35a0e508f64e4fda28f0f709b1a9e30c icedtea6-1.13.13.tar.gz.sig 4fcfd0a4114f7b116e7a429894819b40bd43ee0935b90fd83978e1e3c8d2e92d icedtea6-1.13.13.tar.xz 9040dda8279bc709104c5c028a5849bc880784343408391b09f9b52961df9bde icedtea6-1.13.13.tar.xz.sig The checksums can be downloaded from: http://icedtea.classpath.org/download/source/icedtea6-1.13.13.sha256 A 1.13.13 ebuild for Gentoo is available. The following people helped with these releases: Andrew Hughes (all backports and all other bug fixes, release management) Ricardo Ribalda (PR3175) Mark Wielaard (PR3174) We would also like to thank the bug reporters and testers! To get started: $ tar xzf icedtea6-1.13.13.tar.gz or: $ tar x -I xz -f icedtea6-1.13.13.tar.xz then: $ mkdir icedtea-build $ cd icedtea-build $ ../icedtea6-1.13.13/configure $ make Full build requirements and instructions are available in the INSTALL file. Happy hacking! [Less]
Posted almost 9 years ago
Following the proposed end-of-life of OpenJDK 6 upstream, we will be concluding support for the IcedTea 1.x series with the following upcoming releases: 1.13.13, containing the October 2016 security updates in the upcoming OpenJDK 6 b41 release. ... [More] 1.14.0, based on the same b41 release but containing the changes from IcedTea 1.x HEAD which were thought too disruptive for the stable branch release. The remaining proposed changes for 1.14.0 will be reviewed and the more extensive tasks dropped, given the upcoming discontinuation of this major release series. We have no plans to produce backports of the security updates for January 2017 and beyond, either upstream in OpenJDK 6 or in IcedTea 1.x. Others are, of course, welcome to take over maintainership of IcedTea 1.x if they wish to do so. Many thanks for your support over the years. [Less]
Posted almost 9 years ago
Welcome to Wildebeest blogs. This is your first post. Edit or delete it, then start blogging!
Posted about 9 years ago
After many years, I was finally able to update PDFKit, GNUstep's PDF Framework which is based on xpdf. The update to 3.03 and 3.04 required updates to the internal APIs.This brings a lot of  improvements (and also all the security fixes) of the newer ... [More] xpdf.Important new fixes are flowing in too, compared to the last release.CropSize instead of MediaSize is now used to determine the NSSize of the image, thus fixing a strange scale issue that affected certain PDFs (The view was allocated for the MediaSize, but the rendering was done on the CropSize).Furthermore, several static instances of classes were removed, so that multiple PDF documents can be opened in an application, this was a long undiscovered issue! Workspace Content Inspector and ViewPDF To all steppers who use PDFKit, please test... and report issues, especially new ones, a release is due soon! No regression known at the moment. [Less]
Posted about 9 years ago
After many years, I was finally able to update PDFKit, GNUstep's PDF Framework which is based on xpdf. The update to 3.03 and 3.04 required updates to the internal APIs.This brings a lot of  improvements (and also all the security fixes) of the newer ... [More] xpdf.Important new fixes are flowing in too, compared to the last release.CropSize instead of MediaSize is now used to determine the NSSize of the image, thus fixing a strange scale issue that affected certain PDFs (The view was allocated for the MediaSize, but the rendering was done on the CropSize).Furthermore, several static instances of classes were removed, so that multiple PDF documents can be opened in an application, this was a long undiscovered issue! Workspace Content Inspector and ViewPDF To all steppers who use PDFKit, please test... and report issues, especially new ones, a release is due soon! No regression known at the moment. [Less]
Posted about 9 years ago
After turning off comments on this blog a few years ago, the time has now come to remove all the posts containing links. The reason is again pretty much the same as it was when I decided to turn off the comments - I still live in Hamburg, Germany.So ... [More] , I've chosen to simply remove all the posts containing links. Unfortunately, that were pretty much all of them. I only left my old post up explaining why this blog allows no comments, now updated to remove all links, of course.Over the past years, writing new blog posts here has become increasingly rare for me. Most of my 'social media activity' has long moved over to Twitter.Unfortunately, I mostly use Twitter as a social bookmarking tool, saving and sharing links to things that I find interesting.As a consequence, I've signed up for a service that automatically deletes my tweets after a short period of time. I'd link to it, but ... [Less]
Posted about 9 years ago
After turning off comments on this blog a few years ago, the time has now come to remove all the posts containing links. The reason is again pretty much the same as it was when I decided to turn off the comments - I still live in Hamburg, Germany.So ... [More] , I've chosen to simply remove all the posts containing links. Unfortunately, that were pretty much all of them. I only left my old post up explaining why this blog allows no comments, now updated to remove all links, of course.Over the past years, writing new blog posts here has become increasingly rare for me. Most of my 'social media activity' has long moved over to Twitter.Unfortunately, I mostly use Twitter as a social bookmarking tool, saving and sharing links to things that I find interesting.As a consequence, I've signed up for a service that automatically deletes my tweets after a short period of time. I'd link to it, but ... [Less]