+ <item>
+ <title>Freedombox on Dreamplug, Raspberry Pi and virtual x86 machine</title>
+ <link>http://people.skolelinux.org/pere/blog/Freedombox_on_Dreamplug__Raspberry_Pi_and_virtual_x86_machine.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Freedombox_on_Dreamplug__Raspberry_Pi_and_virtual_x86_machine.html</guid>
+ <pubDate>Fri, 14 Mar 2014 11:00:00 +0100</pubDate>
+ <description><p>The <a href="https://wiki.debian.org/FreedomBox">Freedombox
+project</a> is working on providing the software and hardware for
+making it easy for non-technical people to host their data and
+communication at home, and being able to communicate with their
+friends and family encrypted and away from prying eyes. It has been
+going on for a while, and is slowly progressing towards a new test
+release (0.2).</p>
+
+<p>And what day could be better than the Pi day to announce that the
+new version will provide "hard drive" / SD card / USB stick images for
+Dreamplug, Raspberry Pi and VirtualBox (or any other virtualization
+system), and can also be installed using a Debian installer preseed
+file. The Debian based Freedombox is now based on Debian Jessie,
+where most of the needed packages used are already present. Only one,
+the freedombox-setup package, is missing. To try to build your own
+boot image to test the current status, fetch the freedom-maker scripts
+and build using
+<a href="http://packages.qa.debian.org/vmdebootstrap">vmdebootstrap</a>
+with a user with sudo access to become root:
+
+<pre>
+git clone http://anonscm.debian.org/git/freedombox/freedom-maker.git \
+ freedom-maker
+sudo apt-get install git vmdebootstrap mercurial python-docutils \
+ mktorrent extlinux virtualbox qemu-user-static binfmt-support \
+ u-boot-tools
+make -C freedom-maker dreamplug-image raspberry-image virtualbox-image
+</pre>
+
+<p>Root access is needed to run debootstrap and mount loopback
+devices. See the README for more details on the build. If you do not
+want all three images, trim the make line. But note that thanks to <a
+href="https://bugs.debian.org/741407">a race condition in
+vmdebootstrap</a>, the build might fail without the patch to the
+kpartx call.</p>
+
+<p>If you instead want to install using a Debian CD and the preseed
+method, boot a Debian Wheezy ISO and use this boot argument to load
+the preseed values:</p>
+
+<pre>
+url=<a href="http://www.reinholdtsen.name/freedombox/preseed-jessie.dat">http://www.reinholdtsen.name/freedombox/preseed-jessie.dat</a>
+</pre>
+
+<p>But note that due to <a href="https://bugs.debian.org/740673">a
+recently introduced bug in apt in Jessie</a>, the installer will
+currently hang while setting up APT sources. Killing the
+'<tt>apt-cdrom ident</tt>' process when it hang a few times during the
+installation will get the installation going. This affect all
+installations in Jessie, and I expect it will be fixed soon.</p>
+
+Give it a go and let us know how it goes on the mailing list, and help
+us get the new release published. :) Please join us on
+<a href="irc://irc.debian.org:6667/%23freedombox">IRC (#freedombox on
+irc.debian.org)</a> and
+<a href="http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss">the
+mailing list</a> if you want to help make this vision come true.</p>
+</description>
+ </item>
+
+ <item>
+ <title>How to add extra storage servers in Debian Edu / Skolelinux</title>
+ <link>http://people.skolelinux.org/pere/blog/How_to_add_extra_storage_servers_in_Debian_Edu___Skolelinux.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/How_to_add_extra_storage_servers_in_Debian_Edu___Skolelinux.html</guid>
+ <pubDate>Wed, 12 Mar 2014 12:50:00 +0100</pubDate>
+ <description><p>On larger sites, it is useful to use a dedicated storage server for
+storing user home directories and data. The design for handling this
+in <a href="http://www.skolelinux.org/">Debian Edu / Skolelinux</a>, is
+to update the automount rules in LDAP and let the automount daemon on
+the clients take care of the rest. I was reminded about the need to
+document this better when one of the customers of
+<a href="http://www.slxdrift.no/">Skolelinux Drift AS</a>, where I am
+on the board of directors, asked about how to do this. The steps to
+get this working are the following:</p>
+
+<p><ol>
+
+<li>Add new storage server in DNS. I use nas-server.intern as the
+example host here.</li>
+
+<li>Add automoun LDAP information about this server in LDAP, to allow
+all clients to automatically mount it on reqeust.</li>
+
+<li>Add the relevant entries in tjener.intern:/etc/fstab, because
+tjener.intern do not use automount to avoid mounting loops.</li>
+
+</ol></p>
+
+<p>DNS entries are added in GOsa², and not described here. Follow the
+<a href="https://wiki.debian.org/DebianEdu/Documentation/Wheezy/GettingStarted">instructions
+in the manual</a> (Machine Management with GOsa² in section Getting
+started).</p>
+
+<p>Ensure that the NFS export points on the server are exported to the
+relevant subnets or machines:</p>
+
+<p><blockquote><pre>
+root@tjener:~# showmount -e nas-server
+Export list for nas-server:
+/storage 10.0.0.0/8
+root@tjener:~#
+</pre></blockquote></p>
+
+<p>Here everything on the backbone network is granted access to the
+/storage export. With NFSv3 it is slightly better to limit it to
+netgroup membership or single IP addresses to have some limits on the
+NFS access.</p>
+
+<p>The next step is to update LDAP. This can not be done using GOsa²,
+because it lack a module for automount. Instead, use ldapvi and add
+the required LDAP objects using an editor.</p>
+
+<p><blockquote><pre>
+ldapvi --ldap-conf -ZD '(cn=admin)' -b ou=automount,dc=skole,dc=skolelinux,dc=no
+</pre></blockquote></p>
+
+<p>When the editor show up, add the following LDAP objects at the
+bottom of the document. The "/&" part in the last LDAP object is a
+wild card matching everything the nas-server exports, removing the
+need to list individual mount points in LDAP.</p>
+
+<p><blockquote><pre>
+add cn=nas-server,ou=auto.skole,ou=automount,dc=skole,dc=skolelinux,dc=no
+objectClass: automount
+cn: nas-server
+automountInformation: -fstype=autofs --timeout=60 ldap:ou=auto.nas-server,ou=automount,dc=skole,dc=skolelinux,dc=no
+
+add ou=auto.nas-server,ou=automount,dc=skole,dc=skolelinux,dc=no
+objectClass: top
+objectClass: automountMap
+ou: auto.nas-server
+
+add cn=/,ou=auto.nas-server,ou=automount,dc=skole,dc=skolelinux,dc=no
+objectClass: automount
+cn: /
+automountInformation: -fstype=nfs,tcp,rsize=32768,wsize=32768,rw,intr,hard,nodev,nosuid,noatime nas-server.intern:/&
+</pre></blockquote></p>
+
+<p>The last step to remember is to mount the relevant mount points in
+tjener.intern by adding them to /etc/fstab, creating the mount
+directories using mkdir and running "mount -a" to mount them.</p>
+
+<p>When this is done, your users should be able to access the files on
+the storage server directly by just visiting the
+/tjener/nas-server/storage/ directory using any application on any
+workstation, LTSP client or LTSP server.</p>
+</description>
+ </item>
+
+ <item>
+ <title>Hvordan bør RFC 822-formattert epost lagres i en NOARK5-database?</title>
+ <link>http://people.skolelinux.org/pere/blog/Hvordan_b_r_RFC_822_formattert_epost_lagres_i_en_NOARK5_database_.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Hvordan_b_r_RFC_822_formattert_epost_lagres_i_en_NOARK5_database_.html</guid>
+ <pubDate>Fri, 7 Mar 2014 15:20:00 +0100</pubDate>
+ <description><p>For noen uker siden ble NXCs fri programvarelisenserte
+NOARK5-løsning
+<a href="http://www.nuug.no/aktiviteter/20140211-noark/">presentert hos
+NUUG</a> (video
+<a href="https://www.youtube.com/watch?v=JCb_dNS3MHQ">på youtube
+foreløbig</a>), og det fikk meg til å titte litt mer på NOARK5,
+standarden for arkivhåndtering i det offentlige Norge. Jeg lurer på
+om denne kjernen kan være nyttig i et par av mine prosjekter, og for ett
+av dem er det mest aktuelt å lagre epost. Jeg klarte ikke finne noen
+anbefaling om hvordan RFC 822-formattert epost (aka Internett-epost)
+burde lagres i NOARK5, selv om jeg vet at noen arkiver tar
+PDF-utskrift av eposten med sitt epostprogram og så arkiverer PDF-en
+(eller enda værre, tar papirutskrift og lagrer bildet av eposten som
+PDF i arkivet).</p>
+
+<p>Det er ikke så mange formater som er akseptert av riksarkivet til
+langtidsoppbevaring av offentlige arkiver, og PDF og XML er de mest
+aktuelle i så måte. Det slo meg at det måtte da finnes en eller annen
+egnet XML-representasjon og at det kanskje var enighet om hvilken som
+burde brukes, så jeg tok mot til meg og spurte
+<a href="http://samdok.com/">SAMDOK</a>, en gruppe tilknyttet
+arkivverket som ser ut til å jobbe med NOARK-samhandling, om de hadde
+noen anbefalinger:
+
+<p><blockquote>
+<p>Hei.</p>
+
+<p>Usikker på om dette er riktig forum å ta opp mitt spørsmål, men jeg
+lurer på om det er definert en anbefaling om hvordan RFC
+822-formatterte epost (aka vanlig Internet-epost) bør lages håndteres
+i NOARK5, slik at en bevarer all informasjon i eposten
+(f.eks. Received-linjer). Finnes det en anbefalt XML-mapping ala den
+som beskrives på
+&lt;URL: <a href="https://www.informit.com/articles/article.aspx?p=32074">https://www.informit.com/articles/article.aspx?p=32074</a> &gt;? Mitt
+mål er at det skal være mulig å lagre eposten i en NOARK5-kjerne og
+kunne få ut en identisk formattert kopi av opprinnelig epost ved
+behov.</p>
+</blockquote></p>
+
+<p>Postmottaker hos SAMDOK mente spørsmålet heller burde stilles
+direkte til riksarkivet, og jeg fikk i dag svar derfra formulert av
+seniorrådgiver Geir Ivar Tungesvik:</p>
+
+<p><blockquote>
+<p>Riksarkivet har ingen anbefalinger når det gjelder konvertering fra
+e-post til XML. Det står arkivskaper fritt å eventuelt definere/bruke
+eget format. Inklusive da - som det spørres om - et format der det er
+mulig å re-etablere e-post format ut fra XML-en. XML (e-post)
+dokumenter må være referert i arkivstrukturen, og det må vedlegges et
+gyldig XML skjema (.xsd) for XML-filene. Arkivskaper står altså fritt
+til å gjøre hva de vil, bare det dokumenteres og det kan dannes et
+utrekk ved avlevering til depot.</p>
+
+<p>De obligatoriske kravene i Noark 5 standarden må altså oppfylles -
+etter dialog med Riksarkivet i forbindelse med godkjenning. For
+offentlige arkiv er det særlig viktig med filene loependeJournal.xml
+og offentligJournal.xml. Private arkiv som vil forholde seg til Noark
+5 standarden er selvsagt frie til å bruke det som er relevant for dem
+av obligatoriske krav.</p>
+</blockquote></p>
+
+<p>Det ser dermed ut for meg som om det er et lite behov for å
+standardisere XML-lagring av RFC-822-formatterte meldinger. Noen som
+vet om god spesifikasjon i så måte? I tillegg til den omtalt over,
+har jeg kommet over flere aktuelle beskrivelser (søk på "rfc 822
+xml", så finner du aktuelle alternativer).</p>
+
+<ul>
+
+<li><a href="http://www.openhealth.org/xmtp/">XML MIME Transformation
+protocol (XMTP)</a> fra OpenHealth, sist oppdatert 2001.</li>
+
+<li><a href="https://tools.ietf.org/html/draft-klyne-message-rfc822-xml-03">An
+XML format for mail and other messages</a> utkast fra IETF datert
+2001.</li>
+
+<li><a href="http://www.informit.com/articles/article.aspx?p=32074">xMail:
+E-mail as XML</a> en artikkel fra 2003 som beskriver python-modulen
+rfc822 som gir ut XML-representasjon av en RFC 822-formattert epost.</li>
+
+</ul>
+
+<p>Finnes det andre og bedre spesifikasjoner for slik lagring? Send
+meg en epost hvis du har innspill.</p>
+</description>
+ </item>
+
+ <item>
+ <title>Lenker for 2014-02-28</title>
+ <link>http://people.skolelinux.org/pere/blog/Lenker_for_2014_02_28.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Lenker_for_2014_02_28.html</guid>
+ <pubDate>Fri, 28 Feb 2014 13:30:00 +0100</pubDate>
+ <description><p>Her er noen lenker til tekster jeg har satt pris på å lese de siste
+månedene. Det er mye om varsleren Edward Snowden, som burde få all
+hjelp, støtte og beskyttelse Norge kan stille opp med for å ha satt
+totalitær overvåkning på sakskartet, men også endel annet
+tankevekkende og interessant.</p>
+
+<ul>
+
+<li>2013-12-21
+<a href="http://www.dagbladet.no/2013/12/21/nyheter/thomas_drake/nsa/overvakning/snowden/30925886/">-
+NSA tenker som Stasi</a> - Dagbladet.no</li>
+
+<li>2013-12-19 <a href="http://www.dagensit.no/article2732734.ece">-
+Staten har ikke rett til å vite alt om deg</a> - DN.no</li>
+
+<li>2013-12-21
+<a href="http://www.dagbladet.no/2013/12/21/nyheter/krig_og_konflikter/politikk/utenriks/30961126/">Nye
+mål for NSAs spionasje avslørt</a> - Dagbladet.no</li>
+
+<li>2013-12-19
+<a href="http://www.dagbladet.no/2013/12/19/nyheter/nsa/usa/politikk/barack_obama/30918684/">«NSA
+bør fjernes fra sin makt til å samle inn metadata fra amerikanske
+telefonsamtaler»</a> - Dagbladet.no</li>
+
+<li>2013-12-18
+<a href="http://www.dagbladet.no/2013/12/18/kultur/meninger/hovedkronikk/debatt/snowden/30901089/">Etterretning,
+overvåking, frihet og sikkerhet</a> - Dagbladet.no</li>
+
+<li>2013-12-17
+<a href="http://www.nrk.no/verden/snowden-vil-ha-asyl-i-brasil-1.11423444">Snowden
+angriper USA i åpent brev</a> - nrk.no</li>
+
+<li>2013-12-17
+<a href="http://www.digi.no/925820/rettslig-nederlag-for-etterretning">Rettslig
+nederlag for etterretning</a> - digi.no</li>
+
+<li>2013-12-21
+<a href="http://www.dagbladet.no/2013/12/21/kultur/meninger/hovedkommentar/kommentar/etterretning/30963284/">Truende
+nedkjøling</a> - dagbladet.no</li>
+
+<li>2013-12-20
+<a href="http://www.aftenposten.no/viten/Matematikk-og-forstaelse-7411849.html">Matematikk
+og forståelse</a> - aftenposten.no</li>
+
+<li>2013-10-20
+<a href="http://www.nrk.no/viten/ny-studie_sovn-reinser-hjernen-var-1.11306106">Vi
+søv for å reinse hjernen vår, ifølgje ny studie</a> - nrk.no</li>
+
+<li>2013-12-11
+<a href="http://www.nrk.no/buskerud/julebaksten-i-vasken-1.11410033">Rotterace
+i kloakken</a> - nrk.no</li>
+
+<li>2013-12-30
+<a href="http://www.aftenposten.no/viten/Apne-brev-og-frie-tanker-7413734.html">Åpne
+brev og frie tanker</a> - aftenposten.no</li>
+
+<li>2014-01-12
+<a href="http://www.aftenposten.no/viten/Stopp-kunnskapsapartheidet-7428229.html">Stopp dagens kunnskapsapartheid!</a> - aftenposten.no</li>
+
+<li>2014-01-09
+<a href="http://www.aftenposten.no/nyheter/uriks/EU-rapport-Britisk-og-amerikansk-overvaking-ser-ut-til-a-vare-ulovlig-7428933.html">EU-rapport:
+Britisk og amerikansk overvåking ser ut til å være ulovlig</a> -
+aftenposten.no</li>
+
+<li>2013-10-23 Professor Jan Arild Audestad
+<a href="http://www.digi.no/924008/advarer-mot-konspirasjonsteori">Advarer
+mot konspirasjonsteori</a> i digi.no og sier han ikke tror NSA kan
+avlytte mobiltelefoner, mens han noen måneder senere forteller:</li>
+
+<li>2014-01-09
+<a href="http://www.aftenposten.no/nyheter/iriks/--Vi-ble-presset-til-a-svekke-mobilsikkerheten-pa-80-tallet-7410467.html">-
+Vi ble presset til å svekke mobilsikkerheten på 80-tallet</a> -
+aftenposten.no</li>
+
+<li>2014-02-12
+<a href="http://tv.nrk.no/program/koid20005814/et-moete-med-edward-snowden">Et
+møte med Edward Snowden</a> - intervju sendt av nrk, tilgjengelig til
+2015-01-31</li>
+
+<li>2014-02-17
+<a href="http://politiken.dk/debat/profiler/jessteinpedersen/ECE2210356/litteraturredaktoeren-helle-thornings-tavshed-om-snowden-er-en-skandale/">Litteraturredaktøren:
+Helle Thornings tavshed om Snowden er en skandale</a> -
+politiken.dk</li>
+
+<li>2014-02-21
+<a href="http://www.aftenposten.no/meninger/kronikker/Bra-a-ha-en-Storebror-7476734.html">Bra å ha en «Storebror»</a> - aftenposten.no</li>
+
+<li>2014-02-28
+<a href="http://johnchristianelden.blogg.no/1393536806_narkotikasiktet_stort.html">"Narkotikasiktet
+Stortingsmann" - Spillet bak kulissene</a> - John Christian Eldens
+blogg</li>
+
+<li>2014-02-28
+<a href="http://www.aftenposten.no/meninger/Heksejakt-pa-hasjbrukere-7486283.html">Heksejakt
+på hasjbrukere</a> - aftenposten.no</li>
+
+</ul>
+</description>
+ </item>
+
+ <item>
+ <title>New home and release 1.0 for netgroup and innetgr (aka ng-utils)</title>
+ <link>http://people.skolelinux.org/pere/blog/New_home_and_release_1_0_for_netgroup_and_innetgr__aka_ng_utils_.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/New_home_and_release_1_0_for_netgroup_and_innetgr__aka_ng_utils_.html</guid>
+ <pubDate>Sat, 22 Feb 2014 21:45:00 +0100</pubDate>
+ <description><p>Many years ago, I wrote a GPL licensed version of the netgroup and
+innetgr tools, because I needed them in
+<a href="http://www.skolelinux.org/">Skolelinux</a>. I called the project
+ng-utils, and it has served me well. I placed the project under the
+<a href="http://www.hungry.com/">Hungry Programmer</a> umbrella, and it was maintained in our CVS
+repository. But many years ago, the CVS repository was dropped (lost,
+not migrated to new hardware, not sure), and the project have lacked a
+proper home since then.</p>
+
+<p>Last summer, I had a look at the package and made a new release
+fixing a irritating crash bug, but was unable to store the changes in
+a proper source control system. I applied for a project on
+<a href="https://alioth.debian.org/">Alioth</a>, but did not have time
+to follow up on it. Until today. :)</p>
+
+<p>After many hours of cleaning and migration, the ng-utils project
+now have a new home, and a git repository with the highlight of the
+history of the project. I published all release tarballs and imported
+them into the git repository. As the project is really stable and not
+expected to gain new features any time soon, I decided to make a new
+release and call it 1.0. Visit the new project home on
+<a href="https://alioth.debian.org/projects/ng-utils/">https://alioth.debian.org/projects/ng-utils/</a>
+if you want to check it out. The new version is also uploaded into
+<a href="http://packages.qa.debian.org/n/ng-utils.html">Debian Unstable</a>.</p>
+</description>
+ </item>
+
+ <item>
+ <title>Testing sysvinit from experimental in Debian Hurd</title>
+ <link>http://people.skolelinux.org/pere/blog/Testing_sysvinit_from_experimental_in_Debian_Hurd.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Testing_sysvinit_from_experimental_in_Debian_Hurd.html</guid>
+ <pubDate>Mon, 3 Feb 2014 13:40:00 +0100</pubDate>
+ <description><p>A few days ago I decided to try to help the Hurd people to get
+their changes into sysvinit, to allow them to use the normal sysvinit
+boot system instead of their old one. This follow up on the
+<a href="https://teythoon.cryptobitch.de//categories/gsoc.html">great
+Google Summer of Code work</a> done last summer by Justus Winter to
+get Debian on Hurd working more like Debian on Linux. To get started,
+I downloaded a prebuilt hard disk image from
+<a href="http://ftp.debian-ports.org/debian-cd/hurd-i386/current/debian-hurd.img.tar.gz">http://ftp.debian-ports.org/debian-cd/hurd-i386/current/debian-hurd.img.tar.gz</a>,
+and started it using virt-manager.</p>
+
+<p>The first think I had to do after logging in (root without any
+password) was to get the network operational. I followed
+<a href="https://www.debian.org/ports/hurd/hurd-install">the
+instructions on the Debian GNU/Hurd ports page</a> and ran these
+commands as root to get the machine to accept a IP address from the
+kvm internal DHCP server:</p>
+
+<p><blockquote><pre>
+settrans -fgap /dev/netdde /hurd/netdde
+kill $(ps -ef|awk '/[p]finet/ { print $2}')
+kill $(ps -ef|awk '/[d]evnode/ { print $2}')
+dhclient /dev/eth0
+</pre></blockquote></p>
+
+<p>After this, the machine had internet connectivity, and I could
+upgrade it and install the sysvinit packages from experimental and
+enable it as the default boot system in Hurd.</p>
+
+<p>But before I did that, I set a password on the root user, as ssh is
+running on the machine it for ssh login to work a password need to be
+set. Also, note that a bug somewhere in openssh on Hurd block
+compression from working. Remember to turn that off on the client
+side.</p>
+
+<p>Run these commands as root to upgrade and test the new sysvinit
+stuff:</p>
+
+<p><blockquote><pre>
+cat > /etc/apt/sources.list.d/experimental.list &lt;&lt;EOF
+deb http://http.debian.net/debian/ experimental main
+EOF
+apt-get update
+apt-get dist-upgrade
+apt-get install -t experimental initscripts sysv-rc sysvinit \
+ sysvinit-core sysvinit-utils
+update-alternatives --config runsystem
+</pre></blockquote></p>
+
+<p>To reboot after switching boot system, you have to use
+<tt>reboot-hurd</tt> instead of just <tt>reboot</tt>, as there is not
+yet a sysvinit process able to receive the signals from the normal
+'reboot' command. After switching to sysvinit as the boot system,
+upgrading every package and rebooting, the network come up with DHCP
+after boot as it should, and the settrans/pkill hack mentioned at the
+start is no longer needed. But for some strange reason, there are no
+longer any login prompt in the virtual console, so I logged in using
+ssh instead.
+
+<p>Note that there are some race conditions in Hurd making the boot
+fail some times. No idea what the cause is, but hope the Hurd porters
+figure it out. At least Justus said on IRC (#debian-hurd on
+irc.debian.org) that they are aware of the problem. A way to reduce
+the impact is to upgrade to the Hurd packages built by Justus by
+adding this repository to the machine:</p>
+
+<p><blockquote><pre>
+cat > /etc/apt/sources.list.d/hurd-ci.list &lt;&lt;EOF
+deb http://darnassus.sceen.net/~teythoon/hurd-ci/ sid main
+EOF
+</pre></blockquote></p>
+
+<p>At the moment the prebuilt virtual machine get some packages from
+http://ftp.debian-ports.org/debian, because some of the packages in
+unstable do not yet include the required patches that are lingering in
+BTS. This is the completely list of "unofficial" packages installed:</p>
+
+<p><blockquote><pre>
+# aptitude search '?narrow(?version(CURRENT),?origin(Debian Ports))'
+i emacs - GNU Emacs editor (metapackage)
+i gdb - GNU Debugger
+i hurd-recommended - Miscellaneous translators
+i isc-dhcp-client - ISC DHCP client
+i isc-dhcp-common - common files used by all the isc-dhcp* packages
+i libc-bin - Embedded GNU C Library: Binaries
+i libc-dev-bin - Embedded GNU C Library: Development binaries
+i libc0.3 - Embedded GNU C Library: Shared libraries
+i A libc0.3-dbg - Embedded GNU C Library: detached debugging symbols
+i libc0.3-dev - Embedded GNU C Library: Development Libraries and Hea
+i multiarch-support - Transitional package to ensure multiarch compatibilit
+i A x11-common - X Window System (X.Org) infrastructure
+i xorg - X.Org X Window System
+i A xserver-xorg - X.Org X server
+i A xserver-xorg-input-all - X.Org X server -- input driver metapackage
+#
+</pre></blockquote></p>
+
+<p>All in all, testing hurd has been an interesting experience. :)
+X.org did not work out of the box and I never took the time to follow
+the porters instructions to fix it. This time I was interested in the
+command line stuff.<p>
+</description>
+ </item>
+
+ <item>
+ <title>A fist full of non-anonymous Bitcoins</title>
+ <link>http://people.skolelinux.org/pere/blog/A_fist_full_of_non_anonymous_Bitcoins.html</link>
+ <guid isPermaLink="true">http://people.skolelinux.org/pere/blog/A_fist_full_of_non_anonymous_Bitcoins.html</guid>
+ <pubDate>Wed, 29 Jan 2014 14:10:00 +0100</pubDate>
+ <description><p>Bitcoin is a incredible use of peer to peer communication and
+encryption, allowing direct and immediate money transfer without any
+central control. It is sometimes claimed to be ideal for illegal
+activity, which I believe is quite a long way from the truth. At least
+I would not conduct illegal money transfers using a system where the
+details of every transaction are kept forever. This point is
+investigated in
+<a href="https://www.usenix.org/publications/login">USENIX ;login:</a>
+from December 2013, in the article
+"<a href="https://www.usenix.org/system/files/login/articles/03_meiklejohn-online.pdf">A
+Fistful of Bitcoins - Characterizing Payments Among Men with No
+Names</a>" by Sarah Meiklejohn, Marjori Pomarole,Grant Jordan, Kirill
+Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. They
+analyse the transaction log in the Bitcoin system, using it to find
+addresses belong to individuals and organisations and follow the flow
+of money from both Bitcoin theft and trades on Silk Road to where the
+money end up. This is how they wrap up their article:</p>
+
+<p><blockquote>
+<p>"To demonstrate the usefulness of this type of analysis, we turned
+our attention to criminal activity. In the Bitcoin economy, criminal
+activity can appear in a number of forms, such as dealing drugs on
+Silk Road or simply stealing someone else’s bitcoins. We followed the
+flow of bitcoins out of Silk Road (in particular, from one notorious
+address) and from a number of highly publicized thefts to see whether
+we could track the bitcoins to known services. Although some of the
+thieves attempted to use sophisticated mixing techniques (or possibly
+mix services) to obscure the flow of bitcoins, for the most part
+tracking the bitcoins was quite straightforward, and we ultimately saw
+large quantities of bitcoins flow to a variety of exchanges directly
+from the point of theft (or the withdrawal from Silk Road).</p>
+
+<p>As acknowledged above, following stolen bitcoins to the point at
+which they are deposited into an exchange does not in itself identify
+the thief; however, it does enable further de-anonymization in the
+case in which certain agencies can determine (through, for example,
+subpoena power) the real-world owner of the account into which the
+stolen bitcoins were deposited. Because such exchanges seem to serve
+as chokepoints into and out of the Bitcoin economy (i.e., there are
+few alternative ways to cash out), we conclude that using Bitcoin for
+money laundering or other illicit purposes does not (at least at
+present) seem to be particularly attractive."</p>
+</blockquote><p>
+
+<p>These researches are not the first to analyse the Bitcoin
+transaction log. The 2011 paper
+"<a href="http://arxiv.org/abs/1107.4524">An Analysis of Anonymity in
+the Bitcoin System</A>" by Fergal Reid and Martin Harrigan is
+summarized like this:</p>
+
+<p><blockquote>
+"Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a
+complicated issue. Within the system, users are identified by
+public-keys only. An attacker wishing to de-anonymize its users will
+attempt to construct the one-to-many mapping between users and
+public-keys and associate information external to the system with the
+users. Bitcoin tries to prevent this attack by storing the mapping of
+a user to his or her public-keys on that user's node only and by
+allowing each user to generate as many public-keys as required. In
+this chapter we consider the topological structure of two networks
+derived from Bitcoin's public transaction history. We show that the
+two networks have a non-trivial topological structure, provide
+complementary views of the Bitcoin system and have implications for
+anonymity. We combine these structures with external information and
+techniques such as context discovery and flow analysis to investigate
+an alleged theft of Bitcoins, which, at the time of the theft, had a
+market value of approximately half a million U.S. dollars."
+</blockquote></p>
+
+<p>I hope these references can help kill the urban myth that Bitcoin
+is anonymous. It isn't really a good fit for illegal activites. Use
+cash if you need to stay anonymous, at least until regular DNA
+sampling of notes and coins become the norm. :)</p>
+
+<p>As usual, if you use Bitcoin and want to show your support of my
+activities, please send Bitcoin donations to my address
+<b><a href="bitcoin:15oWEoG9dUPovwmUL9KWAnYRtNJEkP1u1b&label=PetterReinholdtsenBlog">15oWEoG9dUPovwmUL9KWAnYRtNJEkP1u1b</a></b>.</p>
+</description>
+ </item>
+