

All Jupiter Broadcasting Shows
Jupiter Broadcasting
Every audio version of Jupiter Broadcasting's productions.
Episodes
Mentioned books

Jan 2, 2020 • 0sec
Why Computers Suck | BSD Now 331
How learning OpenBSD makes computers suck a little less, How Unix works, FreeBSD 12.1 Runs Well on Ryzen Threadripper 3970X, BSDCan CFP, HardenedBSD Infrastructure Goals, and more.
Headlines
Why computers suck and how learning from OpenBSD can make them marginally less horrible
How much better could things actually be if we abandoned the enterprise development model?
Next I will compare this enterprise development approach with non-enterprise development - projects such as OpenBSD, which do not hesitate to introduce ABI breaking changes to improve the codebase.
One of the most commonly referred to pillars of the project's philosophy has long been its emphasis on clean functional code. Any code which makes it into OpenBSD is subject to ongoing aggressive audits for deprecated, or otherwise unmaintained code in order to reduce cruft and attack surface. Additionally the project creator, Theo de Raadt, and his team of core developers engage in ongoing development for proactive mitigations for various attack classes many of which are directly adopted by various multi-platform userland applications as well as the operating systems themselves (Windows, Linux, and the other BSDs). Frequently it is the case that introducing new features (not just deprecating old ones) introduces new incompatibilities against previously functional binaries compiled for OpenBSD.
To prevent the sort of kernel memory bloat that has plagued so many other operating systems for years, the project enforces a hard ceiling on the number of lines of code that can ever be in ring 0 at a given time. Current estimates guess the number of bugs per line of code in the Linux kernel are around 1 bug per every 10,000 lines of code. Think of this in the context of the scope creep seen in the Linux kernel (which if I recall correctly is currently at around 100,000,000 lines of code), as well as the Windows NT kernel (500,000,000 lines of code) and you quickly begin to understand how adding more and more functionality into the most privileged components of the operating system without first removing old components begins to add up in terms of the drastic difference seen between these systems in the number of zero day exploits caught in the wild respectively.
How Unix Works: Become a Better Software Engineer
Unix is beautiful. Allow me to paint some happy little trees for you. I’m not going to explain a bunch of commands – that’s boring, and there’s a million tutorials on the web doing that already. I’m going to leave you with the ability to reason about the system.
Every fancy thing you want done is one google search away.
But understanding why the solution does what you want is not the same.
That’s what gives you real power, the power to not be afraid.
And since it rhymes, it must be true.
News Roundup
FreeBSD 12.1 Runs Refreshingly Well With AMD Ryzen Threadripper 3970X
For those of you interested in AMD's new Ryzen Threadripper 3960X/3970X processors with TRX40 motherboards for running FreeBSD, the experience in our initial testing has been surprisingly pleasant. In fact, it works out-of-the-box which one could argue is better than the current Linux support that needs the MCE workaround for booting. Here are some benchmarks of FreeBSD 12.1 on the Threadripper 3970X compared to Linux and Windows for this new HEDT platform.
It was refreshing to see FreeBSD 12.1 booting and running just fine with the Ryzen Threadripper 3970X 32-core/64-thread processor from the ASUS ROG ZENITH II EXTREME motherboard and all core functionality working including the PCIe 4.0 NVMe SSD storage, onboard networking, etc. The system was running with 4 x 16GB DDR4-3600 memory, 1TB Corsair Force MP600 NVMe SSD, and Radeon RX 580 graphics. It was refreshing to see FreeBSD 12.1 running well with this high-end AMD Threadripper system considering Linux even needed a boot workaround.
While the FreeBSD 12.1 experience was trouble-free with the ASUS TRX40 motherboard (ROG Zenith II Extreme) and AMD Ryzen Threadripper 3970X, DragonFlyBSD unfortunately was not. Both DragonFlyBSD 5.6.2 stable and the DragonFlyBSD daily development snapshot from last week were yielding a panic on boot. So with that, DragonFlyBSD wasn't tested for this Threadripper 3970X comparison but just FreeBSD 12.1.
FreeBSD 12.1 on the Threadripper 3970X was benchmarked both with its default LLVM Clang 8.0.1 compiler and again with GCC 9.2 from ports for ruling out compiler differences. The FreeBSD 12.1 performance was compared to last week's Windows 10 vs. Linux benchmarks with the same system.
BSDCan 2020 CFP
BSDCan 2020 will be held 5-6 (Fri-Sat) June, 2020 in Ottawa, at the University of Ottawa. It will be preceded by two days of tutorials on 3-4 June (Wed-Thu).
NOTE the change of month in 2020 back to June Also: do not miss out on the Goat BOF on Tuesday 2 June.
We are now accepting proposals for talks. The talks should be designed with a very strong technical content bias. Proposals of a business development or marketing nature are not appropriate for this venue.
See http://www.bsdcan.org/2020/
If you are doing something interesting with a BSD operating system, please submit a proposal. Whether you are developing a very complex system using BSD as the foundation, or helping others and have a story to tell about how BSD played a role, we want to hear about your experience. People using BSD as a platform for research are also encouraged to submit a proposal. Possible topics include:
How we manage a giant installation with respect to handling spam.
and/or sysadmin.
and/or networking.
Cool new stuff in BSD
Tell us about your project which runs on BSD
other topics (see next paragraph)
From the BSDCan website, the Archives section will allow you to review the wide variety of past BSDCan presentations as further examples.
Both users and developers are encouraged to share their experiences.
HardenedBSD Infrastructure Goals
2019 has been an extremely productive year with regards to HardenedBSD's infrastructure. Several opportunities aligned themselves in such a way as to open a door for a near-complete rebuild with a vast expansion.
The last few months especially have seen a major expansion of our infrastructure. We obtained a number of to-be-retired Dell R410 servers. The crash of our nightly build server provided the opportunity to deploy these R410 servers, doubling our build capacity.
My available time to spend on HardenedBSD has decreased compared to this time last year. As part of rebuilding our infrastructure, I wanted to enable the community to be able to contribute. I'm structuring the work such that help is just a pull request away. Those in the HardenedBSD community who want to contribute to the infrastructure work can simply open a pull request. I'll review the code, and deploy it after a successful review. Users/contributors don't need access to our servers in order to improve them.
My primary goal for the rest of 2019 and into 2020 is to become fully self-hosted, with the sole exception of email. I want to transition the source-of-truth git repos to our own infrastructure. We will still provide a read-only mirror on GitHub.
As I develop this infrastructure, I'm doing so with human rights in mind. HardenedBSD is in a very unique position. In 2020, I plan to provide production Tor Onion Services for the various bits of our infrastructure. HardenedBSD will provide access to its various internal services to its developers and contributors. The entire development lifecycle, going from dev to prod, will be able to happen over Tor.
Transparency will be key moving forward. Logs for the auto-sync script are now published directly to GitHub. Build logs will be, soon, too. Logs of all automated processes, and the code for those processes, will be tracked publicly via git. This will be especially crucial for development over Tor.
Integrating Tor into our infrastructure so deeply increases risk and maintenance burden. However, I believe that through added transparency, we will be able to mitigate risk. Periodic audits will need to be performed and published.
I hope to migrate HardenedBSD's site away from Drupal to a static site generator. We don't really need the dynamic capabilities Drupal gives us. The many security issues Drupal and PHP both bring also leave much to be desired.
So, that's about it. I spent the last few months of 2019 laying the foundation for a successful 2020. I'm excited to see how the project grows.
Beastie Bits
FuryBSD - KDE plasma flavor now available
DragonFly - git: virtio - Fix LUN scan issue w/ Google Cloud
LPI is looking for BSD Specialist learning material writers
ZFS sync/async + ZIL/SLOG, explained
BSD-Licensed Combinatorics library/utility
SSL client vs server certificates and bacula-fd
MaxxDesktop planning to come to FreeBSD Project Page
Feedback/Questions
Tom - ZFS Mirror with different speeds
Jeff - Knowledge is power
Johnny - Episode 324 response to Jacob
Pat - NYC*BUG meeting Jan Meeting Location
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
Your browser does not support the HTML5 video tag.

Jan 1, 2020 • 0sec
Conquering Planned Obsolescence | Self-Hosted 9
Master of details, open source advocate and YouTuber, Quindor from Intermittent.Tech joins us for a chat about tuya-convert to avoid planned hardware obsolescence, his new 100TB server build, highly available home setups, and his DIY LED project.Special Guest: Andries Faassen.Links:Intermit.Tech - YouTubeIntermittent Technology - My personal blogHome Assistant: Cheap multi-room Temperature SensorsHome Networking: 100TB 10Gbit Server - Last server bitsQuinLED.info - WiFi controllable DIY LED dimmerTuya-convert: A collection of scripts to flash Tuya IoT devices to alternative firmwares

Dec 31, 2019 • 0sec
Particularly Poor Predictions | LINUX Unplugged 334
We review our predictions and own up to what we got wrong, and what we got right in 2019.Special Guests: Alex Kretzschmar and Brent Gervais.Links:Q&A with Sam K - Acquisition Announcement Follow Up
Keep the conversation going join us on Telegram Jupiterbroadcasting.com/telegram
My recent Plasma Basic to Brilliant video is out
Mac Pro case clone
No More Secrets - This project provides a command line tool called nms that recreates the famous data decryption effect seen on screen in the 1992 hacker movie Sneakers.
hollywood - launch Byobu, open a random number of splits with random sizes, in each split run a noisy text app
cool-retro-term: A good looking terminal emulator which mimics the old cathode display

Dec 31, 2019 • 0sec
Brunch with Brent: Jackie DeVore | Jupiter Extras 43
Brent sits down with Jackie DeVore, co-host of horror podcast Sirens of Scream and multi-disciplinary artist. Our in-person chat explores the origins of her podcasting, creativity as a lifestyle, women in tech, art, and gaming, and her co-founding and recent launch of Hell Bunny Independents Club, a women's inclusive and supportive digital safe space.Special Guest: Jackie DeVore.Links:Sirens of ScreamHell Bunny Independents Club (HBIC)Jackie DeVore - Useless ProgressBrunch with Brent: Alex KretzschmarSelf-Hosted PodcastBrunch with Brent: Drew DeVoreSirens of Scream 62: Rob Sheridan / HIGH LEVELWarm Bodies - IMDbShaun of the Dead - IMDbTucker and Dale vs Evil - IMDbSirens of Scream Episode 66(6): The Soska Sisters, RABID, and the State of Horror as We Know It!Safety Not Guaranteed - IMDbRoom 104 (TV Series) - IMDbFour Rooms - IMDbNerds in BabelandJupiter Extras 27: Happy Halloween, 2019!Neil Gaiman - WikipediaCoraline - IMDbUser ErrorBrunch with Brent: Ell MarquezBrunch with Brent: Emma MarshallBrunch with Brent: Jill Bryant RynikerQueer Corners, Ottawa, Ontariowhiprsnapr brewing co. craft brewery - Ottawa, OntarioGhosts in the BurbsGhosts in the Burbs - MerchPortal 2 - SteamRedditgiftsJackie DeVore - @jackietherobot on TwitterJackie DeVore - @jackietherobot on InstagramBrent Gervais - @brentgervais on Twitter

Dec 29, 2019 • 0sec
Linux Action News 138
We review the major moments of the year's news, and discuss how they impacted our world.Links:Amazon takes aim at MongoDB with launch of Mongo-compatible DocumentDBMongoDB "open-source" Server Side Public License rejectedRedis Labs raises $60 million for its NoSQL databaseRedis Labs changes its open-source license — againKeeping Open Source Open – Open Distro for ElasticsearchChef goes 100% open sourceGoogle jumps into gaming with Google Stadia streaming serviceGoogle Stadia will be missing many features for Monday’s launchSupporting choice and competition in EuropePresenting search app and browser options to Android users in EuropeAndroid Developers Blog: Welcoming Android 10!Project Mainline is Google’s new way to speed up security updates in Android QAdiantum: encryption for the low endAll Chromebooks will also be Linux laptops going forwardGoogle gives most Chromebooks an extra year of software supportGoogle and fwupd sitting in a treePhoenix joins the LVFSPlease welcome HP to the LVFSLVFS Project AnnouncementAnnouncing the Open Sourcing of Windows CalculatorIntroducing Windows TerminalMicrosoft Will Release Their Edge Web Browser For LinuxMicrosoft Teams is now available on LinuxAnnouncing WSL 2Ubuntu 19.04 'Disco Dingo' Released with New FeaturesIntel 32bit packages on Ubuntu from 19.10 onwardsStatement on 32-bit i386 packages for Ubuntu 19.10 and 20.04 LTSEnhancing our ZFS support on Ubuntu 19.10Ubuntu 19.10 ReleasedWill Cooke, the Director of Engineering for the Ubuntu desktop, has left CanonicalCanonical announces Ubuntu Pro for Amazon Web ServicesRed Hat Opens the Linux Experience to Every Enterprise, Every Cloud and Every Workload with Red Hat Enterprise Linux 8Red Hat crosses US$3b annual revenue for first timeAnnouncing the release of Fedora 30IBM Closes Landmark Acquisition of Red Hat for $34 Billion; Defines Open, Hybrid Cloud FutureIntroducing Fedora CoreOSPresenting CentOS StreamFedora 31 is officially here!

Dec 26, 2019 • 0sec
Nebulous Networking | TechSNAP 419
From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.Links:Introducing Nebula, the open source global overlay network from Slack
nebula: A scalable overlay networking tool with a focus on performance, simplicity and security
Nebula VPN routes between hosts privately, flexibly, and efficiently
How to set up your own Nebula mesh VPN, step by step
LINUX Unplugged 329: Flat Network Truthers
Cloudy with a chance of neurons: The tools that make neural networks work
Welcome To Colaboratory
ImageColorizer Notebook
DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)

Dec 26, 2019 • 0sec
Happy Holidays, All(an) | BSD Now 330
Authentication Vulnerabilities in OpenBSD, NetBSD 9.0 RC1 is available, Running FreeNAS on a DigitalOcean droplet, NomadBSD 1.3 is here, at e2k19 nobody can hear you scream, and more.
Headlines
Authentication vulnerabilities in OpenBSD
We discovered an authentication-bypass vulnerability in OpenBSD's authentication system: this vulnerability is remotely exploitable in smtpd, ldapd, and radiusd, but its real-world impact should be studied on a case-by-case basis. For example, sshd is not exploitable thanks to its defense-in-depth mechanisms.
From the manual page of login.conf:
OpenBSD uses BSD Authentication, which is made up of a variety of authentication styles. The authentication styles currently provided are:
> passwd Request a password and check it against the password in the master.passwd file. See login_passwd(8).
> skey Send a challenge and request a response, checking it with S/Key (tm) authentication. See login_skey(8).
> yubikey Authenticate using a Yubico YubiKey token. See login_yubikey(8).
> For any given style, the program /usr/libexec/auth/login_style is used to
> perform the authentication. The synopsis of this program is:
> /usr/libexec/auth/login_style [-v name=value] [-s service] username class
This is the first piece of the puzzle: if an attacker specifies a username of the form "-option", they can influence the behavior of the authentication program in unexpected ways.
login_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user [class] The service argument specifies which protocol to use with the invoking program. The allowed protocols are login, challenge, and response. (The challenge protocol is silently ignored but will report success as passwd-style authentication is not challenge-response based).
This is the second piece of the puzzle: if an attacker specifies the username "-schallenge" (or "-schallenge:passwd" to force a passwd-style authentication), then the authentication is automatically successful and therefore bypassed.
Case study: smtpd
Case study: ldapd
Case study: radiusd
Case study: sshd
Acknowledgments: We thank Theo de Raadt and the OpenBSD developers for their incredibly quick response: they published patches for these vulnerabilities less than 40 hours after our initial contact. We also thank MITRE's CVE Assignment Team.
First release candidate for NetBSD 9.0 available!
Since the start of the release process four months ago a lot of improvements went into the branch - more than 500 pullups were processed!
This includes usbnet (a common framework for usb ethernet drivers), aarch64 stability enhancements and lots of new hardware support, installer/sysinst fixes and changes to the NVMM (hardware virtualization) interface.
We hope this will lead to the best NetBSD release ever (only to be topped by NetBSD 10 next year).
Here are a few highlights of the new release:
> Support for Arm AArch64 (64-bit Armv8-A) machines, including "Arm ServerReady"
compliant machines (SBBR+SBSA)
> Enhanced hardware support for Armv7-A
> Updated GPU drivers (e.g. support for Intel Kabylake)
> Enhanced virtualization support
> Support for hardware-accelerated virtualization (NVMM)
> Support for Performance Monitoring Counters
> Support for Kernel ASLR
> Support several kernel sanitizers (KLEAK, KASAN, KUBSAN)
> Support for userland sanitizers
> Audit of the network stack
> Many improvements in NPF
> Updated ZFS
> Reworked error handling and NCQ support in the SATA subsystem
> Support a common framework for USB Ethernet drivers (usbnet)
More information on the RC can be found on the NetBSD 9 release page
News Roundup
Running FreeNAS on a Digitalocean droplet
ZFS is awesome. FreeBSD even more so. FreeNAS is the battle-tested, enterprise-ready-yet-home-user-friendly software defined storage solution which is cooler then deep space, based on FreeBSD and makes heavy use of ZFS. This is what I (and soooooo many others) use for just about any storage-related task. I can go on and on and on about what makes it great, but if you're here, reading this, you probably know all that already and we can skip ahead.
I've needed an offsite FreeNAS setup to replicate things to, to run some things, to do some stuff, basically, my privately-owned, tightly-controlled NAS appliance in the cloud, one I control from top to bottom and with support for whatever crazy thing I'm trying to do. Since I'm using DigitalOcean as my main VPS provider, it seemed logical to run FreeNAS there, however, you can't. While DO supports many many distos and pre-setup applications (e.g OpenVPN), FreeNAS isn't a supported feature, at least not in the traditional way :)
Before we begin, here's the gist of what we're going to do:
> Base of a FreeBSD droplet, we'll re-image our boot block device with FreeNAS iso.
We'll then install FreeNAS on the second block device.
Once done we're going to do the ol' switcheroo: we're going to re-image our original
boot block device using the now FreeNAS-installed second block device.
Part 1: re-image our boot block device to boot FreeNAS install media.
Part 2: Install FreeNAS on the second block-device
Part 3: Re-image the boot block device using the FreeNAS-installed block device
NomadBSD 1.3 is now available
From the release notes:
> The base system has been changed to FreeBSD 12.1-RELEASE-p1
Due to a deadlock problem, FreeBSD's unionfs has been replaced by unionfs-fuse
The GPT layout has been changed to MBR. This prevents problems with Lenovo
systems that refuse to boot from GPT if "lenovofix" is not set, and systems that
hang on boot if "lenovofix" is set.
Support for ZFS installations has been added to the NomadBSD installer.
The rc-script for setting up the network interfaces has been fixed and improved.
Support for setting the country code for the wlan device has been added.
Auto configuration for running in VirtualBox has been added.
A check for the default display has been added to the graphics configuration scripts. This fixes problems where users with Optimus have their NVIDIA card disabled, and use the integrated graphics chip instead.
NVIDIA driver version 440 has been added.
nomadbsd-dmconfig, a Qt tool for selecting the display manager theme, setting the
default user and autologin has been added.
nomadbsd-adduser, a Qt tool for added preconfigured user accounts to the system has been added.
Martin Orszulik added Czech translations to the setup and installation wizard.
The NomadBSD logo, designed by Ian Grindley, has been changed.
Support for localized error messages has been added.
Support for localizing the password prompts has been added.
Some templates for starting other DEs have been added to ~/.xinitrc.
The interfaces of nomadbsd-setup-gui and nomadbsd-install-gui have been improved.
A script that helps users to configure a multihead systems has been added.
The Xorg driver for newer Intel GPUs has been changed from "intel" to "modesetting".
/proc has been added to /etc/fstab
A D-Bus session issue has been fixed which prevented thunar from accessing samba shares.
DSBBg which allows users to change and manage wallpapers has been added.
The latest version of update_obmenu now supports auto-updating the Openbox menu. Manually updating the Openbox menu after packet (de)installation is therefore no longer needed.
Support for multiple keyboard layouts has been added.
www/palemoon has been removed.
mail/thunderbird has been removed.
audio/audacity has been added.
deskutils/orage has been added.
the password manager fpm2 has been replaced by KeePassXC
mail/sylpheed has been replaced by mail/claws-mail
multimedia/simplescreenrecorder has been added.
DSBMC has been changed to DSBMC-Qt
Many small improvements and bug fixes.
At e2k19 nobody can hear you scream
After 2 years it was once again time to pack skis and snowshoes, put a satellite dish onto a sledge and hike through the snowy rockies to the Elk Lakes hut.
I did not really have much of a plan what I wanted to work on but there were a few things I wanted to look into. One of them was rpki-client and the fact that it was so incredibly slow. Since Bob beck@ was around I started to ask him innocent X509 questions ... as if there are innocent X509 questions! Mainly about the abuse of the X509_STORE in rpki-client. Pretty soon it was clear that rpki-client did it all wrong and most of the X509 verification had to be rewritten. Instead of only storing the root certificates in the store and passing the intermediate certs as a chain to the verification function rpki-client threw everything into it. The X509_STORE is just not built for such an abuse and so it was no wonder that this was slow.
Lucky me I pulled benno@ with me into this dark hole of libcrypto code. He managed to build up an initial diff to pass the chains as a STACK_OF(X509) and together we managed to get it working. A big thanks goes to ingo@ who documented most of the functions we had to use. Have a look at STACK_OF(3) and sk_pop_free(3) to understand why benno@ and I slowly turned crazy.
Our next challenge was to only load the necessary certificate revocation list into the X509_STORE_CTX. While doing those changes it became obvious that some of the data structures needed better lookup functions. Looking up certificates was done using a linear lookup and so we replaced the internal certificate and CRL tables with RB trees for fast lookups. deraadt@ also joined the rpki-client commit fest and changed the output code to use rename(2) so that files are replaced in an atomic operation. Thanks to this rpki-client can now be safely run from cron (there is an example in the default crontab).
I did not plan to spend most of my week hacking on rpki-client but in the end I'm happy that I did and the result is fairly impressive. Working with libcrypto code and especially X509 was less than pleasant. Our screams of agony died away in the snowy rocky mountains and made Bob deep dive into UVM with a smile since he knew that benno@ and I had it worse.
In case you wonder thanks to all changes at e2k19 rpki-client improved from over 20min run time to validate all VRPS to roughly 1min to do the same job. A factor 20 improvement!
Thanks to Theo, Bob and Howie to make this possible. To all the cooks for the great food and to Xplornet for providing us with Internet at the hut.
Beastie Bits
FOSDEM 2020 BSD Devroom schedule
Easy Minecraft Server on FreeBSD Howto
stats(3) framework in the TCP stack
4017 days of uptime
sysget - A front-end for every package manager
PlayOnBSD’s Cross-BSD Shopping Guide
Feedback/Questions
Pat asks about the proper disk drive type for ZFS
Brad asks about a ZFS rosetta stone
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
Your browser does not support the HTML5 video tag.
Special Guest: Mariusz Zaborski.

Dec 25, 2019 • 0sec
Tails + Virtualization | Choose Linux 25
Ultimate privacy in Distrohoppers, and the best ways to run other operating systems within your current Linux distro.Links:Tails — Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD. It aims at preserving your privacy and anonymity.Installing KVM on UbuntuVirtual machine manager — The virt-manager application is a desktop user interface for managing virtual machines through libvirt.Boxes — Boxes is an application that gives you access to virtual machines, running locally or remotely. It also allows you to connect to the display of a remote computer.LINUX Unplugged episode about virtualization — Our crew walks you through their PCI Passthrough setups that let them run Windows, macOS, and distro-hop all from one Linux machine.

Dec 24, 2019 • 0sec
Linux Wayback Machine | LINUX Unplugged 333
Open source won the last decade, but what if it hadn’t? We look back at some major milestones and reflect on a world where they never existed.Special Guests: Alex Kretzschmar and Brent Gervais.Links:Introducing netboot.xyz Docker Network Boot Server Image (PXE)
Tails - Celebrating 10 years of Tails!
Ten Years Past GNOME’s 10x10 Goal, The Linux Desktop Is Still Far From Having A 10% Marketshare - Phoronix
Linux Headlines
Jupiter Extras - NOW ON YouTube
Keep the conversation going join us on Telegram!
Container History in an Image
Shuttleworth’s grand vision for Ubuntu on phones, tablets, TV’s and smart screens everywhere in October 2011
Ubuntu Touch 1.0 in October 2013
BQ Aquaris E4.5 Ubuntu Edition in April 2015
Ubuntu phone killed in April 2017
UBports released first stable OTA in June 2017
Librem 5 crowdfunder in August 2017
Librem 5 starts shipping in December 2019
PinePhone announced at FOSDEM 2019
PinePhone Braveheart edition opens for pre-orders November 2019
Xdg-app becomes Flatpak in May 2016
Launched in December 2014
Skype snapped in February 2018
Chrome OS announced in July 2009
First widely available Chromebooks arrive June 2011
Chromebook Pixel in February 2013
Android apps arrive in September 2014
Network file share support arrives in September 2018
Linux apps beta arrives in stable channel in October 2018
In May 2019 it was announced that all new Chromebooks would support Linux apps
In Q4 of 2018, Chromebooks made up 21% of all notebooks sold in the US
Feedback: Aaarghhhhh!! (Chris’ Pronunciation)

Dec 24, 2019 • 0sec
Brunch with Brent: Catherine Kretzschmar | Jupiter Extras 42
Brent sits down with Catherine Kretzschmar, professional music teacher, coding bootcamp enlistee, and humanist celebrant, for an in-person connective chat on the relationship between music and coding, the quality-of-life implications of ever-evolving home automation, an intro to humanist celebrancy, and more.
Catherine is a good friend of the Jupiter Broadcasting family and wife of Alex Kretzschmar, co-host of Self-Hosted.Special Guest: Catherine Kretzcschmar.Links:Brunch with Brent: Alex KretzschmarSelf-Hosted PodcastHarmony Remotes - LogitechBeyond Sudoku - PuzzlerHumanist Celebrant - WikipediaBrent Gervais - @brentgervais on Twitter


